Protecting Personal Information Upon Sharing a Personal Computing Device
First Claim
1. A method comprising:
- pre-loading, by a computing device, information associated with a potential temporary user, wherein the information is pre-loaded after an invitation to use the computing device was sent to the potential temporary user, the invitation comprising log-in information;
receiving, by the computing device, user input comprising the log-in information; and
providing, by the computing device, a personalized interface based at least in part on the information associated with the potential temporary user.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a temporary user is able to use another'"'"'s personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted.
-
Citations
20 Claims
-
1. A method comprising:
-
pre-loading, by a computing device, information associated with a potential temporary user, wherein the information is pre-loaded after an invitation to use the computing device was sent to the potential temporary user, the invitation comprising log-in information; receiving, by the computing device, user input comprising the log-in information; and providing, by the computing device, a personalized interface based at least in part on the information associated with the potential temporary user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer-readable non-transitory storage media of a computing device embodying software that is operable when executed to:
-
pre-load information associated with a potential temporary user, wherein the information is pre-loaded after an invitation to use the computing device was sent to the potential temporary user, the invitation comprising log-in information; receive user input comprising the log-in information; and provide a personalized interface based at least in part on the information associated with the potential temporary user. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; pre-load, by the computing device, information associated with a potential temporary user, wherein the information is pre-loaded after an invitation to use the computing device was sent to the potential temporary user, the invitation comprising log-in information; receive, by the computing device, user input comprising the log-in information; and provide, by the computing device, a personalized interface based at least in part on the information associated with the potential temporary user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification