CONTROLLING ACCESS TO A MOBILE DEVICE
First Claim
1. A method of controlling user access to a mobile device, comprising the steps of:
- (a) detecting at the mobile device the presence of a wireless device via a short-range wireless signal;
(b) identifying the wireless device from the wireless signal;
(c) accessing at the mobile device a list that includes the identity of one or more trusted wireless devices;
(d) comparing the identity of the detected wireless device with the identity or identities included with the list of trusted wireless devices;
(e) determining that the identity of the detected wireless device is included with the list of trusted wireless devices; and
(f) deactivating a passcode requirement used by the mobile device based on the determination of step (e).
3 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling user access to a mobile device includes detecting at the mobile device the presence of a wireless device via a short-range wireless signal; identifying the wireless device from the wireless signal; accessing at the mobile device a list that includes the identity of one or more trusted wireless devices and is stored at the mobile device; comparing the identity of the detected wireless device with the identity or identities include with the list of trusted wireless devices; determining that the identity of the detected wireless device is included with the list of trusted wireless devices; and deactivating a passcode requirement used by the mobile device based on the determination that the identity of the detected wireless device is included with the list of trusted wireless devices.
25 Citations
19 Claims
-
1. A method of controlling user access to a mobile device, comprising the steps of:
-
(a) detecting at the mobile device the presence of a wireless device via a short-range wireless signal; (b) identifying the wireless device from the wireless signal; (c) accessing at the mobile device a list that includes the identity of one or more trusted wireless devices; (d) comparing the identity of the detected wireless device with the identity or identities included with the list of trusted wireless devices; (e) determining that the identity of the detected wireless device is included with the list of trusted wireless devices; and (f) deactivating a passcode requirement used by the mobile device based on the determination of step (e). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of controlling user access to a mobile device, comprising the steps of:
-
(a) designating a vehicle telematics unit as a trusted wireless device using a mobile device; (b) establishing a short-range wireless link between the vehicle telematics unit and the mobile device after designating the vehicle telematics unit as a trusted wireless device; (c) detecting that the short-range wireless link currently exists between the vehicle telematics unit and the mobile device; and (d) deactivating a passcode requirement used by the mobile device while the short-range wireless link exists between the mobile device and the vehicle telematics unit. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of controlling user access to a mobile device, comprising the steps of:
-
(a) detecting at the mobile device the presence of a vehicle telematics unit via a short-range wireless signal; (b) identifying the vehicle telematics unit from the short-range wireless signal; (c) accessing at the mobile device a list that includes the identity of one or more trusted wireless devices; (d) comparing the identity of the vehicle telematics unit with the identity or identities included with the list of trusted wireless devices; (e) determining that the identity of the vehicle telematics unit is included with the list of trusted wireless devices; (f) determining that the mobile device and the vehicle telematics unit are located within a user-defined geo-fenced area; and (g) deactivating a passcode requirement used by the mobile device based on the determinations made in steps (e) and (f). - View Dependent Claims (16, 17, 18, 19)
-
Specification