Owner privacy in a shared mobile device
First Claim
Patent Images
1. A computer implemented system comprising:
- one or more processors; and
memory storing computer-executable instructions for execution by the one or more processors, the memory comprising;
an analysis component to analyze one or more applications stored on a mobile device for presence and an amount of personal information that is accessible by the one or more applications, the personal information associated with an owner of the mobile device;
a usage profile to designate a range of access for a non-owner user of the mobile device to the personal information; and
an access control component to regulate the range of access for the non-owner user based at least in part on an access mode automatically designated in response to determining, by the analysis component, the amount of the personal information that is accessible by the one or more applications.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods that regulate range of access to personal information of a mobile unit'"'"'s owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner'"'"'s trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like.
74 Citations
20 Claims
-
1. A computer implemented system comprising:
-
one or more processors; and memory storing computer-executable instructions for execution by the one or more processors, the memory comprising; an analysis component to analyze one or more applications stored on a mobile device for presence and an amount of personal information that is accessible by the one or more applications, the personal information associated with an owner of the mobile device; a usage profile to designate a range of access for a non-owner user of the mobile device to the personal information; and an access control component to regulate the range of access for the non-owner user based at least in part on an access mode automatically designated in response to determining, by the analysis component, the amount of the personal information that is accessible by the one or more applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer implemented method comprising:
-
analyzing, by one or more processors, one or more applications stored on a mobile device for existence of personal data accessible by the one or more applications, the personal data stored on the mobile device and associated with an owner of the mobile device; defining, by at least one of the one or more processors, a usage profile to designate a range of access for a non-owner user of the mobile device to the personal data; automatically designating, by at least one of the one or more processors, an access mode based at least in part on determining an amount of the personal data that is accessible by the one or more applications; and regulating, by at least one of the one or more processors, the range of access to the personal data based at least in part on the access mode. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A tangible computer readable storage device storing instructions that enable actions for controlling access to a mobile device, the actions comprising:
-
analyzing one or more applications stored on the mobile device for presence of personal information accessible by the one or more applications, the personal information stored on the mobile device and associated with an owner of the mobile device; automatically designating an access level for a non-owner user of the mobile device based at least in part on determining an amount of the personal information that is accessible by the one or more applications; and regulating a range of access for the non-owner users to the personal information based at least in part on the access level.
-
Specification