Contextual device locking/unlocking
First Claim
1. A method comprising:
- receiving, by one or more computer servers of an online social network, from a first client device associated with a first user, unique data identifying a second user, the unique data being determined in response to an event detected by the first client device, wherein the event was triggered by the second user;
accessing, by one or more computer servers of the online social network, social-networking information associated with the first user and the second user, wherein the one or more computer servers of the online social network look up the social-networking information using the received unique data;
determining, by one or more computer servers of the online social network, a level of access to access interfaces of the first client device, functionality of the first client device, or content accessible from the first client device, wherein the determining is based on the social-networking information; and
sending, by one or more computer servers of the online social network, instructions to evaluate a lock status of the first client device, the instructions comprising the determined level of access to the first client device.
1 Assignment
0 Petitions
Accused Products
Abstract
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by one or more computer servers of an online social network, from a first client device associated with a first user, unique data identifying a second user, the unique data being determined in response to an event detected by the first client device, wherein the event was triggered by the second user; accessing, by one or more computer servers of the online social network, social-networking information associated with the first user and the second user, wherein the one or more computer servers of the online social network look up the social-networking information using the received unique data; determining, by one or more computer servers of the online social network, a level of access to access interfaces of the first client device, functionality of the first client device, or content accessible from the first client device, wherein the determining is based on the social-networking information; and sending, by one or more computer servers of the online social network, instructions to evaluate a lock status of the first client device, the instructions comprising the determined level of access to the first client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more computer-readable non-transitory storage media embodying software operable when executed to:
-
receive, by one or more computer servers of an online social network, from a first client device associated with a first user, unique data identifying a second user, the unique data being determined in response to an event detected by the first client device, wherein the event was triggered by the second user; access, by one or more computer servers of the online social network, social-networking information associated with the first user and the second user, wherein the one or more computer servers of the online social network look up the social-networking information using the received unique data; determine, by one or more computer servers of the online social network, a level of access to access interfaces of the first client device, functionality of the first client device, or content accessible from the first client device, wherein the determining is based on the social-networking information; and send, by one or more computer servers of the online social network, instructions to evaluate a lock status of the first client device, the instructions comprising the determined level of access to the first client device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computing device comprising:
-
one or more computer servers of an online social network; and a memory coupled to the one or more computer servers comprising instructions executable by the one or more computer servers, the one or more computer servers operable when executing the instructions to; receive from a first client device associated with a first user, unique data identifying a second user, the unique data being determined in response to an event detected by the first client device, wherein the event was triggered by the second user; access social-networking information associated with the first user and the second user, wherein the one or more computer servers look up the social-networking information using the received unique data; determine a level of access to access interfaces of the first client device, functionality of the first client device, or content accessible from the first client device, wherein the determining is based on the social-networking information; and send instructions to evaluate a lock status of the first client device, the instructions comprising the determined level of access to the first client device. - View Dependent Claims (17, 18, 19, 20)
-
Specification