Providing greater access to one or more items in response to verifying device transfer
First Claim
1. A computationally-implemented method, comprising:
- (a) acquiring one or more indicators that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device;
(b) detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user, including at least requesting biometric input that verifies the one or more indicators that the computing device has been transferred to the first user, wherein the one or more indicators include at least one or more sensed movements of the computing device; and
(c) providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user, including at least;
(1) providing greater visual access via the computing device to the one or more items, including at least;
(A) providing visually one or more visual representations of the one or more items via the computing device, the one or more visual representations not being previously presented through the computing device when the second user had possession of the computing device, including at least;
(i) replacing visually through the computing device and in response to said detecting of the input one or more obfuscating locum tenentes of one or more true visual representations of the one or more items with the one or more true visual representations, the one or more obfuscating locum tenentes having been presented through the computing device when the second user had possession of the computing device; and
wherein at least one of the acquiring, detecting, or providing is performed at least in part with one or more processing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
105 Citations
44 Claims
-
1. A computationally-implemented method, comprising:
-
(a) acquiring one or more indicators that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; (b) detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user, including at least requesting biometric input that verifies the one or more indicators that the computing device has been transferred to the first user, wherein the one or more indicators include at least one or more sensed movements of the computing device; and (c) providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user, including at least; (1) providing greater visual access via the computing device to the one or more items, including at least; (A) providing visually one or more visual representations of the one or more items via the computing device, the one or more visual representations not being previously presented through the computing device when the second user had possession of the computing device, including at least; (i) replacing visually through the computing device and in response to said detecting of the input one or more obfuscating locum tenentes of one or more true visual representations of the one or more items with the one or more true visual representations, the one or more obfuscating locum tenentes having been presented through the computing device when the second user had possession of the computing device; and wherein at least one of the acquiring, detecting, or providing is performed at least in part with one or more processing devices.
-
-
2. A computationally-implemented system, comprising:
-
(a) circuitry for acquiring one or more indicators that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; (b) circuitry for detecting input that verifies that the computing device has been transferred to the first user, the circuitry for detecting being responsive at least in part to the circuitry for acquiring, including at least; (1) circuitry for soliciting the input that verifies the one or more indicators that the computing device has been transferred to the first user, including at least; (A) circuitry for requesting biometric input that verifies the one or more indicators that the computing device has been transferred to the first user, wherein the one or more indicators include at least one or more sensed movements of the computing device; and (c) circuitry for providing at least greater access via the computing device to the one or more items, the circuitry for providing being responsive at least in part to the circuitry for detecting, including at least; (1) circuitry for providing greater visual access via the computing device to the one or more items, including at least; (A) circuitry for providing visually one or more visual representations of the one or more items via the computing device, the one or more visual representations not being previously presented through the computing device when the second user had possession of the computing device, including at least; (i) circuitry for replacing visually through the computing device and in response to said detecting of the input one or more obfuscating locum tenentes of one or more true visual representations of the one or more items with the one or more true visual representations, the one or more obfuscating locum tenentes having been presented through the computing device when the second user had possession of the computing device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A computationally-implemented system, comprising:
-
(a) means for acquiring one or more indicators that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; (b) means for detecting input that verifies that the computing device has been transferred to the first user, the circuitry means for detecting being responsive at least in part to the means for acquiring, including at least; (1) means for requesting biometric input that verifies the one or more indicators that the computing device has been transferred to the first user, wherein the one or more indicators include at least one or more sensed movements of the computing device; and (c) means for providing at least greater access via the computing device to the one or more items, the means for providing being responsive at least in part to the means for detecting, including at least; (1) means for providing greater visual access via the computing device to the one or more items, including at least; (A) means for providing visually one or more visual representations of the one or more items via the computing device, the one or more visual representations not being previously presented through the computing device when the second user had possession of the computing device, including at least; (i) means for replacing visually through the computing device and in response to said detecting of the input one or more obfuscating locum tenentes of one or more true visual representations of the one or more items with the one or more true visual representations, the one or more obfuscating locum tenentes having been presented through the computing device when the second user had possession of the computing device.
-
Specification