Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having rece
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password car gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may elect a request for authorization from a selectable queue of requests.
대표청구항▼
1. A system comprising: a first device logged into a first user account and configured to request authorization to perform a restricted activity on the first device by transmitting a request signal through a network before performing the restricted activity, receive an authorizing signal through the
1. A system comprising: a first device logged into a first user account and configured to request authorization to perform a restricted activity on the first device by transmitting a request signal through a network before performing the restricted activity, receive an authorizing signal through the network, and perform the restricted activity in response to receiving the authorizing signal, wherein the restricted activity includes accessing restricted content; anda second device logged into a second user account and configured to receive the request signal from the first device through the network, display an authentication input for authenticating an authorized user associated with the second user account, display an authorization input for authorizing the restricted activity on the first device, and transmit the authorizing signal through the network if the second device is authenticated and if the first device is authorized, wherein content on the first device that is common to the first user account and the second user account is not restricted content. 2. The system of claim 1, wherein the authorization input comprises a text input, a gesture input, or an option between the text input and the gesture input. 3. The system of claim 1, wherein the first device is configured to transmit the request signal to a plurality of second devices. 4. The system of claim 1, wherein the second device is configured to receive request signals from, and send authorizing signals to, a plurality of first devices. 5. The system of claim 1, wherein the second device is configured to receive the authentication input to authenticate the authorized user for a session, and the second device is configured to transmit the authorizing signal to the first device when the first device is authorized without additionally authenticating the authorized user on the second device during the session. 6. The system of claim 1, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 7. A method comprising: receiving, by a device associated with a first user account, request to access content on the device; andwhen the content is restricted for the first user account, requesting authorization, from a second user account, to access the restricted content on the device, wherein content that is common to the first user account and the second user account is not restricted. 8. The method of claim 7 further comprising: receiving, by the device, an authorization signal to access the restricted content. 9. The method of claim 7, wherein the authorization is requested from a plurality of user accounts having full authority. 10. The method of claim 7, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 11. A method comprising: receiving, by a device, a request for authorization to access restricted content on the device by a first user account logged into the device; anddetermining, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account. 12. The method of claim 11 further comprising: receiving, by the device, authorization input that authorizes the access; andtransmitting, by the device, an authorization signal in response to receiving the authorization input. 13. The method of claim 12, wherein the authorization input comprises a text input, a gesture input, or an option between the text input and the gesture input. 14. The method of claim 11 further comprising: receiving, by the device, authentication input to authenticate the user account having full authority. 15. The method of claim 11, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 16. A non-transitory computer-readable storage medium having executable instructions to cause a processor on a device to perform operations comprising: receiving a request from a first user account to access content on a device; andwhen the content is restricted for the first user account, requesting authorization, from a second user account, to access the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. 17. The non-transitory computer-readable storage medium of claim 16, wherein the operations further comprise: receiving an authorization signal to access the content that is restricted. 18. The non-transitory computer-readable storage medium of claim 16, wherein the operations further comprise: requesting authorization from a plurality of user accounts having full authority. 19. The non-transitory computer-readable storage medium of claim 16, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 20. A non-transitory computer-readable storage medium having executable instructions to cause a processor on a device to perform operations comprising: receiving a request for authorization to access restricted content on a device by a user account logged into the device; anddetermining, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. 21. The non-transitory computer-readable storage medium of claim 20, wherein the operations further comprise: receiving authorization input that authorizes the access; andtransmitting an authorization signal in response to receiving the authorization input. 22. The non-transitory computer-readable storage medium of claim 21, wherein the authorization input comprises a text input, a gesture input, or an option between the text input and the gesture input. 23. The non-transitory computer-readable storage medium of claim 20, wherein the operations further comprise: receiving authentication input to authenticate the user account having full authority. 24. The non-transitory computer-readable storage medium of claim 20, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 25. A device comprising: one or more processors;a network interface coupled to the one or more processors through the bus; anda memory coupled to the one or more processors through the bus, the memory storing instructions to cause the one or more processors to receive a request from a first user account to access content on the device; andwhen the content is restricted for the first user account, transmitting, through the network interface, a request for authorization from a second user account to access the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. 26. The device of claim 25, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content. 27. A device comprising: one or more processors;a network interface coupled to the one or more processors through a bus; anda memory coupled to the one or more processors through the bus, the memory storing instructions to cause the one or more processors to receive, through the network interface, a request for authorization to access restricted content on the device by a first user account logged into the device; anddetermine, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. 28. The device of claim 27, wherein the first user account has limited authority to access the restricted content and the second user account has full authority to access the restricted content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (142)
Cotterill, Stephen Hayden, Access control utilizing indirect authentication.
Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
Villa-Real, Antony-Euclid C., Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions.
Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Doroguskar, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
Radhakrishnan, Mina; Amin, Shalin; Chambers, Curtis; McKillen, Ryan; Kalanick, Travis Cordell, Enabling a user to verify a price change for an on-demand service.
Mitsuyu,Norihisa; Higuchi,Teruyuki, Fingerprint authenticating system for carrying out a fingerprint authentication by using a small fingerprint sensor.
Fitzpatrick Greg P. (Rochester MN) Haynes Thomas R. (Euless TX) Williams Marvin L. (Lewisville TX), Method and apparatus for accessing touch screen desktop objects via fingerprint recognition.
Clement, Patrick; Clement, Joelle; Kuhn, Jonathan; Moret, Antoine, Method and apparatus for using near field communication (NFC) to perform transactions on a mobile device.
Shieh Johnny Meng-Han ; Maddalozzo ; Jr. John ; McBrearty Gerald Francis, Method and system for calibrating touch screen sensitivities according to particular physical characteristics associated with a user.
Bilger Aaron ; Dudgeon Michael ; Finley Michael C. ; Wade John, Method and system for entry of encrypted and non-encrypted information on a touch screen.
William Wei ; Jeffery A. Dettloff ; Ronald J. Austin ; Richard G. Bean ; Harrold J. Rappold ; James L. Green, Method and system for storing preselected numbers for use in games of bingo.
Jung, Jae Lark; Bae, Kyoung duck, Method, mobile communication terminal and computer-readable recording medium for performing specific function when mobile recording medium for performing specific function when mobile communication terminal is activated.
Senga, Masahiro, Object identifying device, mobile phone, object identifying method, program executable on computer for operating the object identifying device and computer-readable medium including the program.
Allard David J. (Boynton Beach FL) Canova ; Jr. Francis J. (Boynton Beach FL) Johnson Debra A. G. (Fort Lauderdale FL) Lanier Charles S. (Delray Beach FL) Lewis James R. (Coconut Creek FL) Tiller Byr, Personal communicator having improved zoom and pan functions for editing information on touch sensitive display.
Pisula, Charles J.; Newman, Lucas C.; Anzures, Freddy Allen; Ganatra, Nitin K., Portable touch screen device, method, and graphical user interface for providing workout support.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Single sign-on access in an orchestration framework for connected devices.
Kushevsky, Mikhail; Fainshtein, Michael; Martinsons, Valdis Andris, System and method of loading a transaction card and processing repayment on a mobile device.
Jobs, Steven P.; Forstall, Scott; Christie, Greg; Ording, Bas; Chaudhri, Imran; Lemay, Stephen O.; Van Os, Marcel; Anzures, Freddy Allen; Matas, Mike, Telephone interface for a portable communication device.
Van Os, Marcel; Ahn, Charles; Alabi, Oluwatomiwa B.; Anton, Peter D.; Dicker, George R.; Pitschel, Donald W.; Steele, Glen W.; Tickner, Simon, User interfaces for stored-value accounts.
Parks, Jason; Pelly, Nicholas Julian; Hamilton, Jeffrey William; Hamilton, Robert William; Hooft, Maarten W., Zero-click sharing of application context across devices.
Parks, Jason; Pelly, Nicholas Julian; Hamilton, Jeffrey William; Hamilton, Robert William; Hooft, Maarten W., Zero-click sharing of application context across devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.