Mobile device security using multiple profiles
First Claim
Patent Images
1. A method of securing access to a mobile electronic device, the method comprising:
- storing, in a memory of a mobile electronic device, a first user profile so that the first user profile requires a first access credential;
associating, by a processor of the mobile electronic device, the first user profile with a first device feature configuration;
storing, in the memory of the mobile electronic device, a second user profile so that the second user profile is associated with a second access credential that differs from the first access credential;
associating, by the processor, the second user profile with second device feature configuration that is different from the first device feature configuration;
by the processor, causing the device to display a first security interface;
by the processor, receiving the first access credential;
by the processor, in response to receiving the first access credential via the first security interface, outputting a first application interface corresponding to the first device configuration, the first application interface including a first set of icons operative to initiate a plurality of mobile device applications, wherein one of the applications is a hidden security application, and wherein the hidden security application comprises a clock application that comprises an alarm function;
receiving, by the processor, a command to execute the hidden security application;
executing, by the processor, the hidden security application so that the device executes a second security interface, wherein the second security interface comprises an alarm setting interface;
by the processor, receiving the second access credential, wherein receiving the second access credential comprises receiving, via the alarm setting interface, an expected sequence of alarm times; and
by the processor, in response to receiving the second access credential via the second security interface, outputting a second application interface corresponding to the second device configuration, the second application interface including a second set of icons operative to initiate a plurality of mobile device applications.
0 Assignments
0 Petitions
Accused Products
Abstract
A mobile electronic device operates in accordance with at least two different application configurations. The device starts by operating in accordance with the first configuration after it receives a first access credential. The first configuration includes a hidden security application. When the device executes the hidden security application, a user may enter a second access credential via the second security application. When the device receives the second access credential, it then switches to a second application configuration.
29 Citations
3 Claims
-
1. A method of securing access to a mobile electronic device, the method comprising:
-
storing, in a memory of a mobile electronic device, a first user profile so that the first user profile requires a first access credential; associating, by a processor of the mobile electronic device, the first user profile with a first device feature configuration; storing, in the memory of the mobile electronic device, a second user profile so that the second user profile is associated with a second access credential that differs from the first access credential; associating, by the processor, the second user profile with second device feature configuration that is different from the first device feature configuration; by the processor, causing the device to display a first security interface; by the processor, receiving the first access credential; by the processor, in response to receiving the first access credential via the first security interface, outputting a first application interface corresponding to the first device configuration, the first application interface including a first set of icons operative to initiate a plurality of mobile device applications, wherein one of the applications is a hidden security application, and wherein the hidden security application comprises a clock application that comprises an alarm function; receiving, by the processor, a command to execute the hidden security application; executing, by the processor, the hidden security application so that the device executes a second security interface, wherein the second security interface comprises an alarm setting interface; by the processor, receiving the second access credential, wherein receiving the second access credential comprises receiving, via the alarm setting interface, an expected sequence of alarm times; and by the processor, in response to receiving the second access credential via the second security interface, outputting a second application interface corresponding to the second device configuration, the second application interface including a second set of icons operative to initiate a plurality of mobile device applications.
-
-
2. A method of securing access to a mobile electronic device, the method comprising:
-
storing, in a memory of a mobile electronic device, a first user profile so that the first user profile requires a first access credential; associating, by a processor of the mobile electronic device, the first user profile with a first device feature configuration; storing, in the memory of the mobile electronic device, a second user profile so that the second user profile is associated with a second access credential that differs from the first access credential; associating, by the processor, the second user profile with second device feature configuration that is different from the first device feature configuration; by the processor, causing the device to display a first security interface; by the processor, receiving the first access credential; by the processor, in response to receiving the first access credential via the first security interface, outputting a first application interface corresponding to the first device configuration, the first application interface including a first set of icons operative to initiate a plurality of mobile device applications, wherein one of the applications is a hidden security application, and wherein the hidden security application comprises a clock application that comprises a stop watch function; receiving, by the processor, a command to execute the hidden security application; executing, by the processor, the hidden security application so that the device executes a second security interface, wherein the second security interface comprises a stop/start interface; by the processor, receiving the second access credential, wherein receiving the second access credential comprises receiving, via the stop/start interface, an expected sequence of clock stop commands; and by the processor, in response to receiving the second access credential via the second security interface, outputting a second application interface corresponding to the second device configuration, the second application interface including a second set of icons operative to initiate a plurality of mobile device applications.
-
-
3. A method of securing access to a mobile electronic device, the method comprising:
-
storing, in a memory of a mobile electronic device, a first user profile so that the first user profile requires a first access credential; associating, by a processor of the mobile electronic device, the first user profile with a first device feature configuration; storing, in the memory of the mobile electronic device, a second user profile so that the second user profile is associated with a second access credential that differs from the first access credential; associating, by the processor, the second user profile with second device feature configuration that is different from the first device feature configuration; by the processor, causing the device to display a first security interface; by the processor, receiving the first access credential; by the processor, in response to receiving the first access credential via the first security interface, outputting a first application interface corresponding to the first device configuration, the first application interface including a first set of icons operative to initiate a plurality of mobile device applications, wherein one of the applications is a hidden security application; receiving, by the processor, a command to execute the hidden security application; executing, by the processor, the hidden security application so that the device executes a second security interface; by the processor, receiving the second access credential; and by the processor, in response to receiving the second access credential via the second security interface, outputting a second application interface corresponding to the second device configuration, the second application interface including a second set of icons operative to initiate a plurality of mobile device applications, wherein; the hidden security application comprises a financial investments application; the second security interface comprises a financial investments interface configured to display identifying information for a plurality of tradeable securities; and the second access credential comprises receiving, via the financial investments interface, a selection of a predetermined sequence of securities.
-
Specification