主权项 |
1. A method comprising steps of:
while a mobile communications device is locked and connected to a network, detecting, by a proximity detection module in the mobile communications device, that a key device is also connected to the network, the key device performing a user authentication process; while the mobile communications device is locked and connected to the network, receiving, by a behavior modification module in the mobile communications device, information from a communication from the key device to the mobile communications device, the information indicating that the user authentication process has been successfully completed, the completed process resulting in an authenticated key device user; in response to detecting, by the proximity detection module, that the mobile communications device and the key device are connected to the network and in response to the receiving the information, by the behavior modification module, that the user authentication process has been successfully completed, authenticating, by the behavior modification module in the mobile communications device, the authenticated key device user to the mobile communications device; and based on the authenticating of the authenticated key device user to the mobile communications device, initiating the unlocking, by the behavior modification module, of the mobile communications device. |