Contextual device locking/unlocking
First Claim
1. A method comprising:
- receiving, by one or more computing devices of an online system, an indication from a first device of a first user of the online system, that a second device of a second user of the online system is within a proximity distance from the first device;
accessing, by one or more computing devices of the online system, social-networking information associated with the first user and the second user, wherein the social-networking information is stored on the online system;
determining, by one or more computing devices of the online system, that the second device is a trusted device based on the social-networking information; and
sending, by one or more computing devices of the online system, to the first device, instructions to update a lock status of the first device based on the determination that the second device is a trusted device.
1 Assignment
0 Petitions
Accused Products
Abstract
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.
17 Citations
21 Claims
-
1. A method comprising:
-
receiving, by one or more computing devices of an online system, an indication from a first device of a first user of the online system, that a second device of a second user of the online system is within a proximity distance from the first device; accessing, by one or more computing devices of the online system, social-networking information associated with the first user and the second user, wherein the social-networking information is stored on the online system; determining, by one or more computing devices of the online system, that the second device is a trusted device based on the social-networking information; and sending, by one or more computing devices of the online system, to the first device, instructions to update a lock status of the first device based on the determination that the second device is a trusted device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. One or more computer-readable non-transitory storage media embodying software operable when executed to:
-
receive an indication from a first device of a first user of an online system, that a second device of a second user of the online system is within a proximity distance from the first device; access social-networking information associated with the first user and the second user, wherein the social-networking information is stored on the online system; determine that the second device is a trusted device based on the social-networking information; and send to the first device, instructions to update a lock status of the first device based on the determination that the second device is a trusted device. - View Dependent Claims (17, 18)
-
-
19. A computing device comprising:
-
one or more computing devices of an online system; and a memory coupled to the one or more computing devices comprising instructions executable by the one or more computing devices, the one or more computing devices operable when executing the instructions to; receive an indication from a first device of a first user of an online system, that a second device of a second user of the online system is within a proximity distance from the first device; access social-networking information associated with the first user and the second user, wherein the social-networking information is stored on the online system; determine that the second device is a trusted device based on the social-networking information; and send to the first device, instructions to update a lock status of the first device based on the determination that the second device is a trusted device. - View Dependent Claims (20, 21)
-
Specification