Method and apparatus for differentiated access control
First Claim
Patent Images
1. A method for providing differentiated access control to individual applications on a computing device, the method comprising:
- forming a plurality of application subsets;
setting an expiry time on the computing device for each of the plurality of application subsets, the expiry time for each of the plurality of application subsets being independently configurable;
resetting the expiry time for at least one of the application subsets if activity occurs on the computing device prior to the expiry time for the at least one application subset; and
locking each application associated with an application subset to prevent each application associated with that application subset from being launched or enabled if the expiry time for that application subset is reached.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer.
-
Citations
21 Claims
-
1. A method for providing differentiated access control to individual applications on a computing device, the method comprising:
-
forming a plurality of application subsets; setting an expiry time on the computing device for each of the plurality of application subsets, the expiry time for each of the plurality of application subsets being independently configurable; resetting the expiry time for at least one of the application subsets if activity occurs on the computing device prior to the expiry time for the at least one application subset; and locking each application associated with an application subset to prevent each application associated with that application subset from being launched or enabled if the expiry time for that application subset is reached. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device comprising:
-
a processor; a user interface; and memory, wherein the computing device is configured to; form a plurality of application subsets; set an expiry time on the computing device for each of the plurality of application subsets, the expiry time for each of the plurality of application subsets being independently configurable; reset the expiry time for at least one of the application subsets if activity occurs on the computing device prior to the expiry time for the at least one application subset; and lock each application associated with an application subset to prevent each application associated with that application subset from being launched or enabled if the expiry time for that application subset is reached. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable medium having stored thereon executable code for execution by processor of a computing device, the executable code comprising instructions for:
-
forming a plurality of application subsets; setting an expiry time on the computing device for each of the plurality of application subsets, the expiry time for each of the plurality of application subsets being independently configurable; resetting the expiry time for at least one of the application subsets if activity occurs on the computing device prior to the expiry time for the at least one application subset; and locking each application associated with an application subset to prevent each application associated with that application subset from being launched or enabled if the expiry time for that application subset is reached.
-
Specification