×

Mobile device security using multiple profiles

  • US 9,075,967 B2
  • Filed: 12/31/2012
  • Issued: 07/07/2015
  • Est. Priority Date: 12/31/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of securing access to a mobile electronic device, the method comprising:

  • storing, in a memory of a mobile electronic device, a first user profile so that the first user profile requires a first access credential;

    associating, by a processor of the mobile electronic device, the first user profile with a first device feature configuration;

    storing, in the memory of the mobile electronic device, a second user profile so that the second user profile is associated with a second access credential that differs from the first access credential;

    associating, by the processor, the second user profile with second device feature configuration that is different from the first device feature configuration;

    by the processor, causing the device to display a first security interface;

    by the processor, receiving the first access credential;

    by the processor, in response to receiving the first access credential via the first security interface, outputting a first application interface corresponding to the first device configuration, the first application interface including a first set of icons operative to initiate a plurality of mobile device applications, wherein one of the applications is a hidden security application, and wherein the hidden security application comprises a clock application that comprises an alarm function;

    receiving, by the processor, a command to execute the hidden security application;

    executing, by the processor, the hidden security application so that the device executes a second security interface, wherein the second security interface comprises an alarm setting interface;

    by the processor, receiving the second access credential, wherein receiving the second access credential comprises receiving, via the alarm setting interface, an expected sequence of alarm times; and

    by the processor, in response to receiving the second access credential via the second security interface, outputting a second application interface corresponding to the second device configuration, the second application interface including a second set of icons operative to initiate a plurality of mobile device applications.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×