Password methods and systems for use on a mobile device
First Claim
Patent Images
1. A computer-implemented method of executing an action on a mobile communications device based on a received password, comprising:
- identifying, at the mobile communications device, wherein the mobile communications device comprises a radio transceiver, (i) a correspondence between a first password and a first action, (ii) a correspondence between a second password and a second action, and (iii) a correspondence between a third password and a third action;
wherein the first action is to unlock the mobile communications device;
wherein the second action comprises one of;
sending false information to a display of the mobile communications device, indicating that a user interface of the mobile communications device has failed, or sending a distress signal via the radio transceiver to a public safety answering point; and
wherein the third action comprises deleting at least a portion of information stored on the mobile communications device;
receiving, at the mobile communications device, a password which is one of the first password, the second password, or the third password;
searching for a degree within the received password, the degree being a string that does not exist in a stored authentic password associated with the mobile communications device; and
executing, at the mobile communications device, the action corresponding to the received password.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for operation upon a mobile device to handle a duress situation caused by another person. An input password is received from a user. The input password is decoded by the device. Responsive to the input password being a duress indication, a duress operation is performed to protect data on the mobile device.
70 Citations
15 Claims
-
1. A computer-implemented method of executing an action on a mobile communications device based on a received password, comprising:
-
identifying, at the mobile communications device, wherein the mobile communications device comprises a radio transceiver, (i) a correspondence between a first password and a first action, (ii) a correspondence between a second password and a second action, and (iii) a correspondence between a third password and a third action;
wherein the first action is to unlock the mobile communications device;
wherein the second action comprises one of;
sending false information to a display of the mobile communications device, indicating that a user interface of the mobile communications device has failed, or sending a distress signal via the radio transceiver to a public safety answering point; and
wherein the third action comprises deleting at least a portion of information stored on the mobile communications device;receiving, at the mobile communications device, a password which is one of the first password, the second password, or the third password; searching for a degree within the received password, the degree being a string that does not exist in a stored authentic password associated with the mobile communications device; and executing, at the mobile communications device, the action corresponding to the received password. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented system for executing an action on a mobile communications device based on a received password, comprising:
-
a radio transceiver; a processor; and a computer readable memory encoded with instructions for commanding the processor to perform actions comprising; identifying, at the mobile communications device, (i) a correspondence between a first password and a first action, (ii) a correspondence between a second password and a second action, and (iii) a correspondence between a third password and a third action;
wherein the first action is to unlock the mobile communications device;
where the second action comprises one of;
sending false information to a display of the mobile communications device, indicating that a user interface of the mobile communications device has failed, or sending a distress signal via the radio transceiver to a public safety answering point; and
wherein the third action comprises deleting at least a portion of information stored on the mobile communications device;receiving, at the mobile communications device, a password which is one of the first password, the second password, or the third password; searching for a degree within the received password, the degree being a string that does not exist in a stored authentic password associated with the mobile communications device; and executing, at the mobile communications device, the action corresponding to the received password. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-readable memory encoded with instructions for commanding a processor to execute an action on a mobile communications device based on a received password, the instructions causing the processor to perform actions comprising:
-
identifying, at the mobile communications device, wherein the mobile communications device comprises a radio transceiver, (i) a correspondence between first password and a first action, (ii) a correspondence between a second password and a second action, and (iii) a correspondence between a third password and a third action;
wherein the first action is to unlock the mobile communications device;
wherein the second action comprises one of;
sending false information to a display of the mobile communications device, indicating that a user interface of the mobile communications device has failed, or sending a distress signal via the radio transceiver to a public safety answering point; and
wherein the third action comprises deleting at least a portion of information stored on the mobile communications device;receiving, at the mobile communications device, a password which is one of the first password, the second password, or the third password; searching for a degree within the received password, the degree being a string that does not exist in a stored authentic password associated with the mobile communications device; and executing, at the mobile communications device, the action corresponding to the received password. - View Dependent Claims (12, 13, 14, 15)
-
Specification