METHOD AND SYSTEM FOR INVOKING A SECURITY FUNCTION OF A DEVICE BASED ON PROXIMITY TO ANOTHER DEVICE
First Claim
Patent Images
1. A method comprising:
- determining whether a proximity threshold between a first device and a second device is satisfied based on pairing information corresponding to a wireless link between the first device and the second device; and
generating a control signal to activate a security function to restrict access on either the first device or the second device based on the determination.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach for enabling a security function of a mobile device to be activated based on a change in proximity of another device is described. A notification service determines whether a proximity threshold between a first device and a second device is satisfied based on pairing information corresponding to a wireless link between the first device and the second device. The notification service also generates a control signal to activate a security function to restrict access on either the first device or the second device based on the determination.
79 Citations
20 Claims
-
1. A method comprising:
-
determining whether a proximity threshold between a first device and a second device is satisfied based on pairing information corresponding to a wireless link between the first device and the second device; and generating a control signal to activate a security function to restrict access on either the first device or the second device based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, determining whether a proximity threshold between a first device and a second device is satisfied based on pairing information corresponding to a wireless link between the first device and the second device; and generating a control signal to activate a security function to restrict access on either the first device or the second device based on the determination. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification