Protecting personal information upon sharing a personal computing device
First Claim
1. A method comprising, by one or more first computing devices:
- pre-loading personal information associated with a temporary user to a second computing device to be used by the temporary user, wherein;
one or more of the first computing devices have access to the personal information in a user account of the temporary user; and
the personal information is pre-loaded to the second computing device after an invitation to use the second computing device is sent by one or more of the first computing devices to the temporary user;
receiving an input from the temporary user in response to the invitation, wherein the input comprises log-in information associated with the user account of the temporary user; and
causing to be provided a personalized interface on the second computing device based at least in part on the personal information associated with the temporary user pre-loaded to the second computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a temporary user is able to use another'"'"'s personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted.
13 Citations
17 Claims
-
1. A method comprising, by one or more first computing devices:
-
pre-loading personal information associated with a temporary user to a second computing device to be used by the temporary user, wherein; one or more of the first computing devices have access to the personal information in a user account of the temporary user; and the personal information is pre-loaded to the second computing device after an invitation to use the second computing device is sent by one or more of the first computing devices to the temporary user; receiving an input from the temporary user in response to the invitation, wherein the input comprises log-in information associated with the user account of the temporary user; and causing to be provided a personalized interface on the second computing device based at least in part on the personal information associated with the temporary user pre-loaded to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable non-transitory storage media comprising software that is operable when executed by one or more first computing devices to:
-
pre-load personal information associated with a temporary user from one or more of the first computing devices to a second computing device to be used by the temporary user, wherein; one or more of the first computing devices have access to the personal information in a user account of the temporary user; and the personal information is pre-loaded to the second computing device after an invitation to use the second computing device is sent by one or more of the first computing devices to the temporary user; receive an input from the temporary user in response to the invitation, wherein the input comprises log-in information associated with the user account of the temporary user; and cause to be provided a personalized interface on the second computing device based at least in part on the personal information associated with the temporary user pre-loaded to the second computing device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A first computing device comprising:
-
one or more processors; and one or more memory devices coupled to the processors comprising instructions executable by the processors and operable when executed by the processors to; pre-load personal information associated with a temporary user from the first computing device to a second computing device to be used by the temporary user, wherein; the first computing device has access to the personal information in a user account of the temporary user; and the personal information is pre-loaded to the second computing device after an invitation to use the second computing device is sent by the first computing device to the temporary user; receive an input from the potential temporary user in response to the invitation, wherein the input comprises log-in information associated with the user account of the temporary user; and cause to be provided a personalized interface on the second computing device based at least in part on the personal information associated with the temporary user pre-loaded to the second computing device. - View Dependent Claims (14, 15, 16, 17)
-
Specification