System and method for controlling access to a function performed by a wireless device
First Claim
Patent Images
1. A method for controlling access to a function performed by a wireless device, comprising:
- receiving, by the wireless device, an authentication;
detecting, by the wireless device, an accessory device coupled to the wireless device;
operating, at the wireless device and in response to detection of the accessory device, in an enhanced security mode in which a user of the wireless device is not required to provide the authentication to obtain access to the function performed by the wireless device while the wireless device is operating in the enhanced security mode; and
permitting performance of the function by the wireless device while the accessory device is detected and while the wireless device is operating in the enhanced security mode, wherein the operating in the enhanced security mode comprises extending an amount of time of access to the function so that the amount of time of access permitted in the enhanced security mode is greater than an amount of time of access permitted while the wireless device is in a mode different from the enhanced security mode.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for extending an authentication of a wireless device are disclosed. For example, the method includes authenticating access to the wireless device via a first authentication. The method detects a bonded authentication device as a second authentication. The method permits access to the wireless device when the bonded authentication device is detected.
14 Citations
18 Claims
-
1. A method for controlling access to a function performed by a wireless device, comprising:
-
receiving, by the wireless device, an authentication; detecting, by the wireless device, an accessory device coupled to the wireless device; operating, at the wireless device and in response to detection of the accessory device, in an enhanced security mode in which a user of the wireless device is not required to provide the authentication to obtain access to the function performed by the wireless device while the wireless device is operating in the enhanced security mode; and permitting performance of the function by the wireless device while the accessory device is detected and while the wireless device is operating in the enhanced security mode, wherein the operating in the enhanced security mode comprises extending an amount of time of access to the function so that the amount of time of access permitted in the enhanced security mode is greater than an amount of time of access permitted while the wireless device is in a mode different from the enhanced security mode. - View Dependent Claims (2, 3, 4, 13, 14)
-
-
5. A non-transitory computer-readable medium having stored thereon a plurality of instructions, the plurality of instructions including instructions which, when executed by a processor, cause the processor to perform a method for controlling access to a function performed by a wireless device, comprising:
-
receiving, by the wireless device, an authentication; detecting, by the wireless device, an accessory device coupled to the wireless device; operating, at the wireless device an in response to detection of the accessory device, in an enhanced security mode in which a user of the wireless device is not required to provide the authentication to obtain access to the function performed by the wireless device while the wireless device is operating in the enhanced security mode; and permitting performance of the function by the wireless device while the accessory device is detected while and the wireless device is operating in the enhanced security mode, wherein the operating in the enhanced security mode comprises extending an amount of time of access to the function so that the amount of time of access permitted in the enhanced security mode is greater than an amount of time of access permitted while the wireless device is in a mode different from the enhanced security mode. - View Dependent Claims (6, 7, 8, 15, 16)
-
-
9. A wireless device comprising a processor operable to:
-
receive an authentication; detect an accessory device; operate in an enhanced security mode, in response to detection of the accessory device, in which a user of the wireless device is not required to provide the authentication to obtain access to a function performed by the wireless device while the wireless device is operating in the enhanced security mode; and permit performance of the function by the wireless device while the accessory device is detected and while the wireless device is operating in the enhanced security mode, wherein the processor is operable to operate in the enhanced security mode by extending an amount of time of access to the function so that the amount of time of access permitted in the enhanced security mode is greater than an amount of time of access permitted while the wireless device is in a mode different from the enhanced security mode. - View Dependent Claims (10, 11, 12, 17, 18)
-
Specification