Location enabled bookmark and profile
First Claim
Patent Images
1. A computer-based method for modifying the configuration of a computing device, comprising:
- detecting a location for a computing device;
determining, based on the detected location, that the computing device has crossed a first geographic boundary corresponding to a first location profile;
disabling at least one input/output feature of the computing device in response to crossing the first geographic boundary; and
changing the status of at least one content source by making the at least one content source accessible or inaccessible in response to crossing the first geographic boundary, the at least one content source comprising a physical or logical data storage structure that can be used for storage on the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Location based profiles are used to modify the configuration of a computing device based on a detected location. The location based profiles allow features such as cameras to be enabled and disabled. Physical and logical data storage partitions can also be mounted and unmounted, and the home screen displayed by a device can be modified. Location bookmarks can be used to further customize the appearance and function of a computing device.
16 Citations
20 Claims
-
1. A computer-based method for modifying the configuration of a computing device, comprising:
-
detecting a location for a computing device; determining, based on the detected location, that the computing device has crossed a first geographic boundary corresponding to a first location profile; disabling at least one input/output feature of the computing device in response to crossing the first geographic boundary; and changing the status of at least one content source by making the at least one content source accessible or inaccessible in response to crossing the first geographic boundary, the at least one content source comprising a physical or logical data storage structure that can be used for storage on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-based method for modifying the configuration of a computing device, comprising:
-
detecting a location for a computing device; determining, based on the detected location, that the computing device has crossed a first geographic boundary corresponding to a first location profile; disabling at least one input/output feature of the computing device in response to crossing the first geographic boundary; enabling at least one input/output feature of the computing device different from the disabled feature in response to crossing the first geographic boundary; modifying the displayed home screen in response to crossing the first geographic boundary; and making at least one content source accessible in response to crossing the first geographic boundary, the at least one content source comprising a physical or logical data storage structure that can be used for storage on the computing device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-based method for modifying the configuration of a computing device, comprising:
-
detecting a first location for a computing device; determining, based on the detected location, that the computing device has crossed a first geographic boundary corresponding to a first location profile; disabling at least one input/output feature of the computing device in response to crossing the first geographic boundary; changing the status of one or more content sources by making the one or more content sources accessible or inaccessible in response to crossing the first geographic boundary, the one or more content sources comprising a physical or logical data storage structure that can be used for storage on the computing device; detecting a second location for the computing device different from the first location; determining that the computing device has crossed a second geographic boundary corresponding to a second location profile, the second location profile having a different security authorization level than the first location profile; and enabling at least one additional content source different from the one or more content sources, the at least one additional content source comprising a physical or logical data storage structure that can be used for storage on the computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification