Contextual device locking/unlocking
First Claim
1. A method comprising:
- by a computing device associated with a first user, detecting an event using one or more sensors of the computing device;
by the computing device, in response to detecting the event, determining unique data associated with a second user, wherein the event was triggered by the second user;
by the computing device, assessing a state of the computing device;
by the computing device, identifying the second user based on social-networking information associated with the first user and the second user, wherein the computing device looks up the social-networking information using the unique data; and
by the computing device, updating a lock status of the computing device, wherein the lock status comprises a level of access to access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device, the updating based on the event, the social-networking information, and the state, and wherein the level of access of the updated lock status is based on the social-networking information.
2 Assignments
0 Petitions
Accused Products
Abstract
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.
48 Citations
20 Claims
-
1. A method comprising:
-
by a computing device associated with a first user, detecting an event using one or more sensors of the computing device; by the computing device, in response to detecting the event, determining unique data associated with a second user, wherein the event was triggered by the second user; by the computing device, assessing a state of the computing device; by the computing device, identifying the second user based on social-networking information associated with the first user and the second user, wherein the computing device looks up the social-networking information using the unique data; and by the computing device, updating a lock status of the computing device, wherein the lock status comprises a level of access to access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device, the updating based on the event, the social-networking information, and the state, and wherein the level of access of the updated lock status is based on the social-networking information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer-readable non-transitory storage media embodying software operable when executed to:
-
by a computing device associated with a first user, detect an event using one or more sensors of the computing device; by the computing device, in response to detecting the event, determining unique data associated with a second user, wherein the event was triggered by the second user; by the computing device, assess a state of the computing device; by the computing device, identify the second user based on social-networking information associated with the first user and the second user, wherein the computing device looks up the social-networking information using the unique data; and by the computing device, update a lock status of the computing device, wherein the lock status comprises a level of access to access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device, the updating based on the event, the social-networking information, and the state, and wherein the level of access of the updated lock status is based on the social-networking information. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computing device comprising:
-
one or more processors of a computing device associated with a first user; a sensor; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; detect an event using the sensor; in response to detecting the event, determine unique data associated with a second user, wherein the event was triggered by the second user; assess a state of the computing device; identify the second user based on social-networking information associated with the first user and the second user, wherein the processors look up the social-networking information using the unique data; and update a lock status of the computing device, wherein the lock status comprises a level of access to access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device, the updating based on the event, the social-networking information, and the state, and wherein the level of access of the updated lock status is based on the social-networking information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification