SYSTEM AND METHOD FOR PREVENTING AND/OR LIMITING USE OF A MOBILE DEVICE
First Claim
Patent Images
1. A method, comprising:
- receiving, by a mobile device, a message indicating that the mobile device is in a certain location, wherein the message includes both location information and a state of events currently occurring at the certain location;
determining a user-configured security policy of the mobile device based on the certain location information and the state of events; and
at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy,wherein the user-configured security policy is located on the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and a method for preventing and/or limiting use of mobile devices are provided. The method includes receiving, by a mobile device, a message indicating that the mobile device is in a certain location, and determining a user-configured security policy of the mobile device based on the certain location. The method further includes at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy.
-
Citations
27 Claims
-
1. A method, comprising:
-
receiving, by a mobile device, a message indicating that the mobile device is in a certain location, wherein the message includes both location information and a state of events currently occurring at the certain location; determining a user-configured security policy of the mobile device based on the certain location information and the state of events; and at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy, wherein the user-configured security policy is located on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 26, 27)
-
-
15. A system implemented in hardware, comprising:
a computer infrastructure operable to; receive a message indicating that the computer infrastructure is in an area of a field created by a transmitter, the message including location information and a status of one or more events currently associated with the area; determine a user-configured security profile of the computer infrastructure based on the location information and the status of the one or more events; and at least one of disable and enable one or more functions of the computer infrastructure based on the determined user-configured security profile, wherein the user-configured security policy is located on the computer infrastructure. - View Dependent Claims (16, 17, 18, 19)
-
20. A computer program product comprising a computer usable storage medium having readable program code embodied in the storage medium, the computer program product includes at least one component operable to:
-
receive a message indicating that a mobile device is in a certain location, wherein the message is received from a transmitter positioned at the certain location and the message includes both location information and a state of events currently occurring at the certain location; determine a user-configured security policy of the mobile device based on the location information and the state of events; and at least one of disable and enable one or more functions of the mobile device based on the determined user-configured security policy, wherein the user-configured security policy is located on the mobile device. - View Dependent Claims (21)
-
-
22. A method of deploying a system for preventing or limiting use of a mobile device, comprising:
providing a computer infrastructure operable to; create a short range field detectable by the mobile device in an area of the short range field; detect that the mobile device is in the area; and send a message to the mobile device indicating that the mobile device is in the area and a state of events that are currently occurring within the area, to trigger a user-configured security profile of the mobile device selected based on the area and the state of events, wherein the user-configured security profile is used to at least one of disable and enable one or more functions of the mobile device, wherein the user-configured security policy is located on the mobile device. - View Dependent Claims (23)
-
24. A computer system for preventing or limiting use of a mobile device, comprising:
-
a CPU, a computer readable memory and a computer readable storage media; first program instructions to receive a message indicating that the computer system is in an area of a field created by a transmitter, the message including both location information associated with the area and a state of events currently occurring in the area; second program instructions to access a security manager to determine a user-configured security profile of the computer system based on the location information and the state of events, the security manager comprising one or more user-configured security profiles of the computer system; and third program instructions to at least one of disable and enable one or more functions of the computer system based on the determined user-configured security profile, wherein the user-configured security profile comprises at least one event associated with the area, wherein the determining of the user-configured security profile comprises matching the at least one event of the user-configured security profile to the state of events currently occurring from the message, wherein the user-configured security policy is located on the mobile device, and wherein the first, second and third program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (25)
-
Specification