Access to Locked Functions
Total Page:16
File Type:pdf, Size:1020Kb
(19) TZZ 45__¥9AT (11) EP 2 451 139 A9 (12) CORRECTED EUROPEAN PATENT APPLICATION (15) Correction information: (51) Int Cl.: Corrected version no 1 (W1 A1) H04M 1/67 (2006.01) Corrections, see Description Paragraph(s) 16, 20, 22, 31 (48) Corrigendum issued on: 13.02.2013 Bulletin 2013/07 (43) Date of publication: 09.05.2012 Bulletin 2012/19 (21) Application number: 10189894.8 (22) Date of filing: 03.11.2010 (84) Designated Contracting States: (72) Inventor: Hymel, James Allen AL AT BE BG CH CY CZ DE DK EE ES FI FR GB Waterloo Ontario N2L 5Z5 (CA) GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR (74) Representative: Roberts, Gwilym Vaughan et al Designated Extension States: Kilburn & Strode LLP BA ME 20 Red Lion Street London WC1R 4PJ (GB) (71) Applicant: Research In Motion Limited Waterloo, ON N2L 3W8 (CA) Remarks: Amended claims in accordance with Rule 137(2) EPC. (54) Access to locked functions (57) A mobile communications device can have a locked mode in which the mobile communications device is protected against unauthorized use. A mobile commu- nications device includes device applications implement- ed by a software program or firmware program that en- ables an application to be temporarily operable or oper- able under certain conditions when the mobile commu- nications device is locked. Device applications can in- clude a camera enabled for image data acquisition and a microphone or an audio recorder or a microphone and an audio recorder enabled for audio data acquisition. Ac- quired image data and audio data can be stored locally to the mobile communications device or stored externally to the mobile communications device. The mobile com- munications device can be configured to operate appli- cations under different conditions. The mobile commu- nications device can be configured to display a message that applications have been operated while the mobile communications device was locked or in a locked mode. EP 2 451 139 A9 Printed by Jouve, 75001 PARIS (FR) 1 EP 2 451 139 A9 2 Description features described as part of one implementation of the technology can be used on another implementation to FIELD OF THE TECHNOLOGY yield a still further implementation. Thus, it is intended that the present technology cover such modifications and [0001] The present disclosure relates generally to mo- 5 variations that come within the scope of the technology. bile communications devices. More specifically, enabling [0013] In order to facilitate an understanding of envi- implementations relate to mobile communications devic- ronments in which example implementations described es having a lock mode that can be bypassed and incor- herein can operate, reference is made to FIG. 1, which porating a camera assembly. The technology provides shows, in block diagram form, a communication system means and methods whereby a camera assembly in a 10 100 in which implementations of the technology can be mobile communicationsdevice may be utilized under cer- applied. The communication system 100 may comprise tain conditions without compromising security of the mo- a number of mobile communications devices103 that bile communications device. The technology extends the may be connected to the remainder of system 100 in any functionality of device applications in a secure manner. of several different ways. Accordingly, several instances In at least one implementation, the technology provides 15 of mobile communications devices 103 are depicted in for the temporary utilization of one or more mobile com- FIG. 1 employing different example ways of connecting munication device applications without the inputting of to system 100. an otherwise required password. The technology can be [0014] These figures are exemplary only, and those customized dynamically on a per device basis. persons skilled in the art will appreciate that additional 20 elements and modifications may be necessary to make BRIEF DESCRIPTION OF THE DRAWINGS the communications device, e.g., 103 operable in partic- ular network environments. While in the illustrated imple- [0002] FIG. 1 illustrates a communication system in- mentations, the communication devices, e.g., 103 may cluding a mobile communications device to which exam- comprise smart phones, in other implementations, the ple implementations of the technology can be applied. 25 communications devices may comprise personal digital [0003] FIG. 2 illustrates a block diagram of a mobile assistants (PDA), tablet computers, laptop computers, communications device. desktop computers, servers, or other communications [0004] Fig. 3 illustrates the steps of an exemplary devices capable of sending and receiving electronic mes- method within the technology. sages. [0005] FIG. 4 illustrates the steps of an exemplary30 [0015] Mobile communications devices 103 are con- method within the ,technology. nected to a wireless network 101 that may comprise one [0006] FIG. 5 illustrates a front view of a mobile com- or more of a Wireless Wide Area Network (WWAN) 102 munications device to which example implementations and a Wireless Local Area Network (WLAN) 104 or other of the technology can be applied. suitable network arrangements. In some implementa- [0007] FIG. 6 illustrates a rear view of a mobile com- 35 tions, the mobile communications devices 103 are con- munications device to which example implementations figured to communicate over both the WWAN102 and of the technology can be applied. WLAN 104, and to roam between these networks. In [0008] Fig. 7 illustrates an implementation of a front some implementations, the wireless network101 may view of a mobile communications device with a display comprise multiple WWANs 102 and WLANs 104. displaying device options. 40 [0016] The WWAN 102 may be implemented as any [0009] FIG. 8 illustrates a first alternative implementa- suitable wireless access network technology. By way of tion of a mobile communications device display display- example, but not limitation, the WWAN 102 may be im- ing alternative display options. plemented as a wireless network that includes a number [0010] FIG.9 illustrates a second alternative imple- of transceiver base stations 108 where each of the base mentation of a mobile communications device display 45 stations 108 provides wireless Radio Frequency (RF) displaying alternative display options. coverage to a corresponding area or cell. The WWAN [0011] FIG. 10 illustrates a mobile communications de- 102 is typically operated by a mobile network service vice display displaying an exemplary notification within provider that provides subscription packages to users of the technology. the mobile communications devices 103. In some imple- 50 mentations, the WWAN 102 conforms to one or more of DETAILED DESCRIPTION the following wireless network types: Mobitex Radio Net- work, DataTAC, GSM (Global System for Mobile Com- [0012] Reference will now be made in detail to imple- munication), GPRS (General Packet Radio System), TD- mentations of the technology. Each example is provided MA (Time Division Multiple Access), CDMA (Code Divi- by way of explanation of the technology only, not as a 55 sion Multiple Access), CDPD (Cellular Digital Packet Da- limitation of the technology. It will be apparent to those ta), iDEN (integrated Digital Enhanced Network), EvDO skilled in the art that various modifications and variations (Evolution-Data Optimized) CDMA2000, EDGE (En- can be made in the present technology. For instance, hanced Data rates for GSM Evolution), UMTS (Universal 2 3 EP 2 451 139 A9 4 Mobile Telecommunication Systems), HSPDA (High- the access point 114 is part of an enterprise WLAN 104 Speed Downlink Packet Access), IEEE 802.16e (also re- in which the wireless connector system 120 resides), or ferred to as Worldwide Interoperability for Microwave Ac- indirectly, as indicated by the dashed line in FIG. 1, via cess or "WiMAX"), or various other networks. Although the transport facilities 112 if the access point 114 is a WWAN 102 is described as a "Wide- Area" network, that 5 personal Wi-Fi network or Wi-Fi hotspot (in which case term is intended herein also to incorporate wireless Met- a mechanism for securely connecting to the wireless con- ropolitan Area Networks (WMAN) and other similar tech- nector system 120, such as a virtual private network nologies for providing coordinated service wirelessly (VPN), may be used). The AP interface116 provides over an area larger than that covered by typical WLANS. translation and routing services between the access [0017] The WWAN 102 may further comprise a wire- 10 points 114 and the wireless connector system 120 to fa- less network gateway 110 that connects the mobile com- cilitatecommunication, directlyor indirectly, withthe wire- munications devices 103 to transport facilities 112, and less connector system 120. through the transport facilities 112 to a wireless connec- [0021] The wireless connector system 120 may be im- tor system 120. Transport facilities may include one or plemented as one or more servers, and is typically locat- more private networks or lines, the Internet, a virtual pri- 15 ed behind a firewall 113. The wireless connector system vate network, or any other suitable network. The wireless 120 manages communications, including email, Hyper- connector system 120 may be operated, for example, by text Transfer Protocol (HTTP), and HTTP Secure (HT- an organization or enterprise such as a corporation, uni- TPS) communications to and from a set of managed mo- versity, or governmental department, which allows ac- bile communications devices 103. The wireless connec- cess to a network 124 such as an internal or enterprise 20 tor system 120 also provides administrative control and network (e.g., an intranet), and its resources, or the wire- management capabilities over users and mobile commu- less connector system 120 may be operated by a mobile nications devices 103 that might connect to the wireless network provider. In some implementations, the network connector system 120. 124 may be realized using the Internet rather than, or in [0022] The wireless connector system 120 allows the addition to, an internal or enterprise network.