A system and method for controlling user access to a computing device (e.g. a mobile device). In some embodiments, access rights are provided to a user based on successfully verified authentication factors, even where the user is unable to provide all the authentication factors typically required for access to the computing device. In one broad aspect, one or more authentication factors are provided by a user, and are received and verified by a security module application residing and executing on the computing device. When less than all of the authentication factors that would typically be expected in authenticating a user for access to the computing device is received and successfully verified, a subset of the available access rights selected from a plurality of different pre-defined subsets of access rights is provided to the user. The specific access rights provided to the user are based on the successfully verified authentication factors.

 
Web www.patentalert.com

< METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING AN IMPROVED USER INTERFACE

> CANINE TRANSIENT RECEPTOR POTENTIAL V2 (CTRPV2) AND METHODS OF SCREENING FOR TRPV2 CHANNEL MODULATORS

> Mesothelin Vaccines and Model Systems

~ 00528