System and method of managing security between a portable computing device and a portable computing device docking station
First Claim
Patent Images
1. A method of managing portable computing device (PCD) and PCD docking station security, the method comprising:
- determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station;
initiating a back-end security call to a security center when it is determined that the PCD is not mated with the PCD docking station;
querying a user for a first access code;
determining whether the first access code is correct;
terminating the back-end security call when the first access code is correct;
providing limiting access to PCD content items and applications via the PCD docking station;
blocking access to a PCD docking station memory while providing the limiting access to PCD content items and applications via the PCD docking station;
determining whether access to the PCD docking station memory is attempted;
querying the user for a second access code when access to the PCD docking station memory is attempted;
determining whether the second access code is correct;
allowing full access to the PCD docking station memory when the second access code is correct; and
blocking access to the PCD docking station memory when the second access code is incorrect.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of managing portable computing device (PCD) and PCD docking station security is disclosed and may include determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station, initiating a back-end security call when the PCD is not mated with the PCD docking station, querying a user for a primary access code, and determining whether the primary access code is correct. The method may also include terminating the back-end security call when the access code is correct and providing limiting access to PCD content items and applications via the PCD docking station.
172 Citations
21 Claims
-
1. A method of managing portable computing device (PCD) and PCD docking station security, the method comprising:
-
determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station; initiating a back-end security call to a security center when it is determined that the PCD is not mated with the PCD docking station; querying a user for a first access code; determining whether the first access code is correct; terminating the back-end security call when the first access code is correct; providing limiting access to PCD content items and applications via the PCD docking station; blocking access to a PCD docking station memory while providing the limiting access to PCD content items and applications via the PCD docking station; determining whether access to the PCD docking station memory is attempted; querying the user for a second access code when access to the PCD docking station memory is attempted; determining whether the second access code is correct; allowing full access to the PCD docking station memory when the second access code is correct; and blocking access to the PCD docking station memory when the second access code is incorrect. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A portable computing device, comprising:
a processor configured with processor-executable instructions to perform operations comprising; determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station; initiating a back-end security call to a security center when it is determined that the PCD is not mated with the PCD docking station; querying a first access code; determining whether the first access code is correct; terminating the back-end security call when the first access code is correct; providing limiting access to PCD content items and applications via the PCD docking station; blocking access to a PCD docking station memory while providing the limiting access to PCD content items and applications via the PCD docking station; determining whether access to the PCD docking station memory is attempted; querying a second access code when access to the PCD docking station memory is attempted; determining whether the second access code is correct; allowing full access to the PCD docking station memory when the second access code is correct; and blocking access to the PCD docking station memory when the second access code is incorrect. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium having stored thereon processor-executable instructions configured to cause a processor to perform operations comprising:
-
determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station; initiating a back-end security call to a security center when it is determined that the PCD is not mated with the PCD docking station; querying a user for a first access code; determining whether the first access code is correct; terminating the back-end security call when the first access code is correct; providing limiting access to PCD content items and applications via the PCD docking station; blocking access to a PCD docking station memory while providing the limiting access to PCD content items and applications via the PCD docking station; determining whether access to the PCD docking station memory is attempted; querying the user for a second access code when access to the PCD docking station memory is attempted; determining whether the second access code is correct; allowing full access to the PCD docking station memory when the second access code is correct; and blocking access to the PCD docking station memory when the second access code is incorrect. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification