PROTECTED MODE FOR MOBILE COMMUNICATION AND OTHER DEVICES
First Claim
1. One or more computer-readable storage media containing instructions which, when executed by one or more processors disposed in a computing device, perform a method comprising:
- receiving a request from a device administrator to enter a protected mode of operation that limits access to one or more features available from the computing device;
switching from a normal mode of operation in which full device functionality is available to the protected mode of operation;
receiving a request from a user while in the protected mode of operation to access at least one feature available on the device;
determining if the feature requested by the user is included in a database specifying features of the device to be inaccessible to the user while in the protected mode of operation; and
if the feature requested by the user is included in the database, preventing the user from accessing the feature while the device is in the protected mode of operation.
2 Assignments
0 Petitions
Accused Products
Abstract
An electronic device includes at least one memory unit, a plurality of applications residing on at least one of the memory units and a database residing on at least one of the memory units. The database is configured to store a record specifying a subset of the plurality of applications that are to be inaccessible to a user when in a protected mode of operation. The protected mode is designed for a user (e.g., child or friend borrowing the device) who can potentially use the device with setting that are configured under the primary user'"'"'s (e.g. parent, device administrator) supervision. The device also includes a user interface through which a primary user and not other users can specify the subset of the plurality of applications to be included in the record. A processor is operatively associated with the memory unit, the database and the user interface. The processor is configured to switch, in response to a request from the primary user and not other users, between a normal mode operation in which all of the applications in the plurality of applications are available for use and the protected mode of operation.
96 Citations
20 Claims
-
1. One or more computer-readable storage media containing instructions which, when executed by one or more processors disposed in a computing device, perform a method comprising:
-
receiving a request from a device administrator to enter a protected mode of operation that limits access to one or more features available from the computing device; switching from a normal mode of operation in which full device functionality is available to the protected mode of operation; receiving a request from a user while in the protected mode of operation to access at least one feature available on the device; determining if the feature requested by the user is included in a database specifying features of the device to be inaccessible to the user while in the protected mode of operation; and if the feature requested by the user is included in the database, preventing the user from accessing the feature while the device is in the protected mode of operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An electronic device, comprising:
-
at least one memory unit; a plurality of applications residing on at least one of the memory units; a database residing on at least one of the memory units, said database being configured to store a record specifying a subset of the plurality of applications that are to be inaccessible to a user when in a protected mode of operation; a user interface through which a device administrator and not other users can specify the subset of the plurality of applications to be included in the record; and a processor operatively associated with the at least one memory unit, the database and the user interface, said processor being configured to switch, in response to a request from the device administrator and not other users, between a normal mode operation in which all of the applications in the plurality of applications are available for use and the protected mode of operation. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of controlling user access to a computing device, comprising:
-
receiving a request from a user to access at least one feature available from a computing device while the computing device is in a protected mode of operation; determining if the feature requested by the user is accessible while the computing device is in the protected mode of operation; and allowing the user to access the requested feature only if the requested feature is determined to be accessible while the computing device is in the protected mode of operation. - View Dependent Claims (18, 19, 20)
-
Specification