Software – Ahmed E. Hassan, John F. Wilson, Daryl Joseph Martin, BlackBerry Ltd

Abstract for “Secure device sharing”

“A method for controlling access to a computing devices. An input device on the computing device receives a software lock request. A picklist of all the applications that can be executed on the computing devices is displayed upon receipt of the software lock request. The input device receives a selection of either one or more prohibited applications from the plurality. The locked state is entered. The locked state prevents access to any impermissible application. However, other applications that are executable on the computing devices can be accessed.

Background for “Secure device sharing”

“Security is a problem with many sophisticated electronic devices, particularly handheld and mobile. These devices offer more functionality over time and allow for more applications such as gaming, voice calling, instant messaging, document creation, and e-mail. The devices are now more desirable to be shared with others, but only for specific purposes. A device owner might only want to share their device with coworkers to allow them to see a specific e-mail message. Another example is that the device owner might only want to share their device with children to play games, but not to allow them to access e-mail or other messaging apps. Another example is when the device owner wants to share it with a colleague for voice calls, but not allowing them access to e mail or other applications.

“Accordingly, it would benefit to provide a mechanism or method to facilitate sharing of devices without compromising security.”

Summary for “Secure device sharing”

“Security is a problem with many sophisticated electronic devices, particularly handheld and mobile. These devices offer more functionality over time and allow for more applications such as gaming, voice calling, instant messaging, document creation, and e-mail. The devices are now more desirable to be shared with others, but only for specific purposes. A device owner might only want to share their device with coworkers to allow them to see a specific e-mail message. Another example is that the device owner might only want to share their device with children to play games, but not to allow them to access e-mail or other messaging apps. Another example is when the device owner wants to share it with a colleague for voice calls, but not allowing them access to e mail or other applications.

“Accordingly, it would benefit to provide a mechanism or method to facilitate sharing of devices without compromising security.”

Click here to view the patent on Google Patents.