System and method for providing secured access to mobile devices
First Claim
Patent Images
1. A method for securing data on a computing device, the method comprising:
- implementing, based on a policy of the computing device, one or more security features on the computing device to prevent access to a first resource of the computing device and allow access to a second resource of the computing device;
receiving a security code from a roaming device over a local, wireless communication port; and
using the security code to alter implementation of at least one of the security features by suspending or reducing one or more user actions user actions that would otherwise be required by the at least one of the security features in order to access the first resource of the computing device.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the presence of an authentication device having the proper authentication information is received by the mobile device.
34 Citations
41 Claims
-
1. A method for securing data on a computing device, the method comprising:
-
implementing, based on a policy of the computing device, one or more security features on the computing device to prevent access to a first resource of the computing device and allow access to a second resource of the computing device; receiving a security code from a roaming device over a local, wireless communication port; and using the security code to alter implementation of at least one of the security features by suspending or reducing one or more user actions user actions that would otherwise be required by the at least one of the security features in order to access the first resource of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for securing data on a first computing device, the method comprising:
-
on the first computing device, establishing a pairing with a designated roaming device; in response to a security event, making a determination as to whether the designated roaming device is present in an area of the first computing device; denying access to first data stored on the first computing device and allowing access to second data stored on the first computing device, based on a policy of the computing device, if the determination is that the designated roaming device is not present in the area of the first computing device;
elseproviding access to the first data stored on the first computing device, based on the policy of the computing device, if the determination is that the designated roaming device is present in the area of the first computing device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 32, 33, 34, 35)
-
-
23. A computing system for communicating between a laptop computer and a nearby mobile computing device, comprising:
-
a laptop computer housing; a display coupled to the housing; a plurality of buttons coupled to the housing; a transceiver configured for wireless communication with the mobile computing device; a memory configured to store first data and second data; and a processor configured to detect the presence of the mobile computing device, wherein the processor is configured to restrict access by a user to the first data via the display and allow the user access to the second data via the display, based on a policy of the processor, when the mobile computing device is absent, and wherein the processor is configured, based on the policy of the processor, to allow the user to access the first data and the second data via the display when the mobile computing device is present. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 36, 37)
-
-
38. A computing system for communicating between a handheld computing device and a nearby laptop computer having memory and a display, comprising:
-
a handheld computer having a housing configured to fit in a person'"'"'s pocket; a plurality of buttons coupled to the housing; a portable power source; a transceiver configured for wireless communication with the laptop computer; and a processor configured to send a message to the laptop computer to indicate the handheld computing device is present, the laptop computer being configured, based on a policy of the processor, to restrict access by a user to first data stored in the memory via the display and allow the user access to second data stored in the memory via the display until the message is received, the laptop computer being configured to allow the user access to the first data stored in the memory in response to receiving the message. - View Dependent Claims (39, 40)
-
-
41. A method for securing data on a computing device with a roaming device, the method comprising:
-
implementing, based on a policy of the roaming device, one or more security features on the computing device to prevent access to a first resource of the computing device and allow access to a second resource of the computing device; receiving a security code from the roaming device over a local, wireless communication port; and using the security code to alter implementation of at least one of the security features by suspending or reducing one or more user actions that would otherwise be required by the at least one of the security features in order to access the first resource of the computing device.
-
Specification