Securing content using a wireless authentication factor
First Claim
Patent Images
1. A computer-implemented method of controlling access to an electronic book (eBook) reader device, comprising:
- associating a stored user secret or biometric information with the eBook reader device;
associating an external device with the eBook reader device, the external device being different from the eBook reader device;
receiving a user secret or biometric information from a user of the eBook reader device;
receiving a wireless communications signal; and
granting access to the eBook reader device based at least partly on (a) the received user secret or biometric information matching the stored user secret or biometric information, respectively, associated with the eBook reader device and (b) the received wireless communications signal originating from the external device associated with the eBook reader device.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from an external or separate device that has previously been associated with the mobile device or with content stored on the mobile device.
55 Citations
38 Claims
-
1. A computer-implemented method of controlling access to an electronic book (eBook) reader device, comprising:
-
associating a stored user secret or biometric information with the eBook reader device; associating an external device with the eBook reader device, the external device being different from the eBook reader device; receiving a user secret or biometric information from a user of the eBook reader device; receiving a wireless communications signal; and granting access to the eBook reader device based at least partly on (a) the received user secret or biometric information matching the stored user secret or biometric information, respectively, associated with the eBook reader device and (b) the received wireless communications signal originating from the external device associated with the eBook reader device. - View Dependent Claims (2)
-
-
3. A computer-implemented method of controlling access to a portable device, comprising:
-
associating a stored user secret or biometric information with the portable device; associating an external device with a user, the external device being different from the portable device; receiving a user secret or biometric information from a user; receiving a wireless communications signal; and granting access to the portable device based at least partly on (a) the received user secret or biometric information matching the stored user secret or the biometric information, respectively, associated with the portable device and (b) the received wireless communications signal originating from the external device associated with the user. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method of controlling access to content items stored on or accessible by a mobile device, comprising:
-
associating an external device with a subset of one or more of the content items; receiving a wireless communications signal; determining that the received wireless communications signal originated from the external device associated with the subset of one or more content items; and granting access to the subset of one or more content items based at least in part on the determining that the received wireless communications signal originated from the external device that has been associated with the subset of one or more content items. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. One or more non-transitory, computer-readable storage media maintaining instructions that, when executed by one or more processors of a portable device, program the one or more processors to perform operations comprising:
-
associating a stored user secret or biometric information with the portable device; associating an external device with a user, the external device being different from the portable device; receiving a user secret or biometric information from a user; receiving a wireless communications signal; and granting access to the portable device based at least partly on (a) the received user secret or biometric information matching the stored user secret or the biometric information, respectively, associated with the portable device and (b) the received wireless communications signal originating from the external device associated with the user. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification