Secure mobile device and allocation system
First Claim
1. A method of securely allocating mobile devices to at least one user, comprising the steps of:
- storing a plurality of mobile devices in an inoperative state under the control of a host computer, each of the plurality of mobile devices in communication with the host computer while in the inoperative state;
the host computer accepting as an input an identification code that uniquely identifies the at least one user;
the host computer selectively placing a mobile device among the plurality of mobile devices in an operative state based on the identification code; and
the host computer customizing operation of the selected mobile device to preset preferences of the at least one user, wherein customizing includes configuring keys of the mobile device to preset functional preferences of the at least one user.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of securely allocating mobile devices is disclosed. A plurality of mobile devices are stored in an inoperative state under the control of a host computer. A user enters an identification code, which is received by the host computer, and the host computer selectively places a mobile device in an operative state based on the identification code. If the selected mobile device is not returned within a first predetermined interval, then the selected mobile device is placed back in the inoperative state. If the selected mobile device is not returned within a second predetermined interval, then all data within the selected mobile device'"'"'s memory is purged. Additionally, the plurality of mobile devices can be stored in a secure area. Access to the secure area is granted based on the identification code.
-
Citations
56 Claims
-
1. A method of securely allocating mobile devices to at least one user, comprising the steps of:
-
storing a plurality of mobile devices in an inoperative state under the control of a host computer, each of the plurality of mobile devices in communication with the host computer while in the inoperative state; the host computer accepting as an input an identification code that uniquely identifies the at least one user; the host computer selectively placing a mobile device among the plurality of mobile devices in an operative state based on the identification code; and the host computer customizing operation of the selected mobile device to preset preferences of the at least one user, wherein customizing includes configuring keys of the mobile device to preset functional preferences of the at least one user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 53)
-
-
24. A mobile device allocation system for securely allocating mobile devices to a plurality of users, comprising:
-
at least one system backbone; at least one host computer coupled to the system backbone; and a plurality of mobile devices operatively configured to communicate to the host computer through the system backbone, wherein each of the plurality of mobile devices are stored in an inoperative state and in communication with the host computer while in the inoperative state, and the at least one host computer and a selected mobile device are operatively configured to place the selected mobile device in an operative state based upon an identification code accepted as an input by the host computer, said identification code uniquely identifying a user of the plurality of users, and wherein the host computer is operative to customize operation of the selected mobile device to preset preferences of at least one user of the plurality of users such that keys of the mobile device are configured to preset functional preferences of the at least one user. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 54)
-
-
55. A method of securely allocating mobile devices to at least one user, comprising the steps of:
-
storing a plurality of mobile devices in an inoperative state under the control of a host computer, each of the plurality of mobile devices in communication with the host computer while in the inoperative state; the host computer accepting as an input an identification code that uniquely identifies the at least one user; and the host computer selectively placing a mobile device among the plurality of mobile devices in an operative state based on the identification code. - View Dependent Claims (56)
-
Specification