Multiple time outs for applications in a mobile device
First Claim
Patent Images
1. A method for selectively controlling access by a mobile device to a plurality of network-based services, wherein the plurality of network-based services includes an e-mail service, comprising:
- associating the e-mail service with a plurality of user-enterable authentication parameters and an authentication timeout interval representing a period of time between authentications of the mobile device for the e-mail network-based service, including;
associating a first user-enterable authentication parameter in the plurality of user-enterable authentication parameters with a first e-mail source and a second user-enterable authentication parameter in the plurality of user-enterable authentication parameters with a second e-mail source;
requesting re-authentication of the mobile device by a network server of the mobile device for the e-mail service after the first authentication timeout interval has expired;
associating a second network-based service in the plurality of network-based services with a third user-enterable authentication parameter for the mobile device, and a second authentication timeout interval for the mobile device representing a period of time between authentications of the mobile device for the second network-based service; and
requesting re-authentication by the network server of the mobile device to the second network-based service after the second authentication timeout interval has expired;
wherein the first authentication interval is not equal to the second authentication timeout interval.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for revoking access to a mobile device includes providing a plurality of authenticated applications accessible by the mobile device, and providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications. Access to a first authenticated application is revoked after a first timeout interval and access to a second authenticated application is revoked after a second timeout interval.
-
Citations
16 Claims
-
1. A method for selectively controlling access by a mobile device to a plurality of network-based services, wherein the plurality of network-based services includes an e-mail service, comprising:
-
associating the e-mail service with a plurality of user-enterable authentication parameters and an authentication timeout interval representing a period of time between authentications of the mobile device for the e-mail network-based service, including; associating a first user-enterable authentication parameter in the plurality of user-enterable authentication parameters with a first e-mail source and a second user-enterable authentication parameter in the plurality of user-enterable authentication parameters with a second e-mail source; requesting re-authentication of the mobile device by a network server of the mobile device for the e-mail service after the first authentication timeout interval has expired; associating a second network-based service in the plurality of network-based services with a third user-enterable authentication parameter for the mobile device, and a second authentication timeout interval for the mobile device representing a period of time between authentications of the mobile device for the second network-based service; and requesting re-authentication by the network server of the mobile device to the second network-based service after the second authentication timeout interval has expired; wherein the first authentication interval is not equal to the second authentication timeout interval. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for selectively controlling access by a mobile device to a plurality of network-based services, wherein the plurality of network-based services includes an e-mail service, comprising:
a processor configured to; associate a first authentication timeout interval with the e-mail service, a first user-enterable authentication parameter with a first e-mail source and a second user-enterable authentication parameter in the plurality of user-enterable authentication parameters with a second e-mail source, request re-authentication of the mobile device after the first authentication timeout interval has expired, associate a second network-based service in the plurality of network-based services with a third user-enterable authentication parameter for the mobile device and a second authentication timeout interval for the mobile device representing a period of time between authentications of the mobile device for the second network-based service, request re-authentication of the mobile device to the second network-based service after the second authentication timeout interval has expired; wherein the first authentication interval is not equal to the second authentication timeout interval; and a secure memory configured to store the first user-enterable authentication parameter, the second user-enterable authentication parameter, and the third user-enterable parameter. - View Dependent Claims (11, 12, 13, 14, 15, 16)
Specification