Access Management
First Claim
1. A method, comprising:
- determining a current authentication request is invalid;
determining a delay time; and
delaying submission of a next authentication request until after the delay time has expired.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, computing devices and computer-readable media for access management are disclosed. A method of passcode authentication includes: maintaining a count for failed authentication attempts, displaying a visual representation of a current count for failed authentication attempts on an authentication interface. An additional method of passcode authentication is also disclosed which includes: maintaining a count for failed authentication attempts; determining a current authentication request invalid; determining a delay time based on the count for failed authentication attempts; and delaying submission of a second authentication attempt until after the delay time has expired, wherein the delaying submission manifests in a delayed visual feedback of user input, in a delayed processing of user input, or in an inability to enter user input for during the delay time.
-
Citations
27 Claims
-
1. A method, comprising:
-
determining a current authentication request is invalid; determining a delay time; and delaying submission of a next authentication request until after the delay time has expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
displaying an authentication interface for an access control management interface in a mobile telephone device; maintaining an attempt count for failed authentication attempts; receiving a current authentication request; verifying the current authentication request; determining whether the current authentication request is valid; and if the current authentication request is valid, proceeding to activate a restricted interface; and resetting the attempt count; if the current authentication request is invalid, determining a delay time; and delaying submission of a next authentication request until after the delay time has expired. - View Dependent Claims (16, 17)
-
-
18. A method, comprising:
-
receiving a user selection in an access management interface regarding an access restriction to an object in a mobile device; identifying an attribute of the object; and modifying the attribute of the object according to the user selection. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A computer-readable medium having instructions stored thereon, which when executed by a processor, causes the processor to perform operations comprising:
-
determining a current authentication request is invalid; determining a delay time; and delaying submission of a next authentication request until after the delay time has expired.
-
-
25. A computing device, comprising:
-
a touch screen display; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including; instructions for determining a current authentication request is invalid; instruction for determining a delay time; and instruction for delaying submission of a next authentication request until after the delay time has expired.
-
-
26. A graphical user interface on a multifunction mobile device with a touch screen display, comprising:
-
an interface for receiving a passcode entry for authentication; a visual representation of an attempt count for failed authentication attempts; and
a keypad.
-
-
27. A graphical user interface on a multifunction mobile device with a touch screen display, comprising:
-
an interface for activating or deactivating an access control management interface that is operatively coupled to an authentication interface; and an interface for changing access control settings of objects existing on the multifunction mobile device; and
wherein;the interface for changing access control settings is inactive when the authentication interface has not been passed, and the interface for changing access control settings is active when the authentication interface has been passed.
-
Specification