Securing content using a wireless authentication factor

ABSTRACT

A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from an external or separate device that has previously been associated with the mobile device or with content stored on the mobile device.

BACKGROUND

A large and growing population of users is enjoying entertainment through the consumption of digital media items, such as music, movies, images, electronic books, and so on. The users employ various electronic devices to consume such media items. Among these electronic devices are electronic book (“eBook”) readers, cellular telephones, personal digital assistants (PDAs), portable media players, tablet computers, netbooks, and the like.

These electronic devices often use some sort of password-based protection mechanism in order to prevent unauthorized users from accessing content stored on or accessed through the electronic devices. In order to access content, a user is requested to enter an alphanumeric password. If the password matches a previously configured password, the user is allowed to access the content. Access is denied if the entered password does not match the previously configured password.

Simple password protection such as this is sufficient for many situations. However, password protection is notoriously weak, and subject to being broken by determined hackers. Furthermore, many users choose particularly weak passwords, such as their social security number, their birthday, the name of a family member, or some other phrase that can be eventually guessed by someone familiar with the user.

In order to increase the protection of sensitive data, two-factor authentication can be used. Two-factor authentication requires a user to supply two authentication factors rather than the previously mentioned single factor of a password. In two-factor authentication, one of the factors may be a password, but the other factor might consist of the user's possession of a particular hardware token or key.

As an example, an authorized user might be issued a specially configured USB device that stores information uniquely identifying the user. In order to use a computer or other device, the user may be asked to supply a password, and in addition to connect the USB device to the computer so that the computer can verify the information on the USB device that uniquely identifies the user. Thus, the user is asked to provide some type of knowledge or user secret, and also to prove physical possession of some type of unique token that has been specially prepared for the particular user.

The second factor can alternatively consist of some physical characteristic of the user, such as a fingerprint, a voice sample, or a retinal pattern. In this situation, the computer is equipped with hardware to sample the physical characteristic, such as a fingerprint reader, and verifies the user's fingerprint before determining the user to be authenticated.

Two-factor authentication is more secure, but is more difficult to configure than single-factor password authentication. In most cases, special hardware tokens are created and issued to each user. This can be expensive and inconvenient, and also requires that the user carry an additional, dedicated hardware device. In many cases, the user will simply connect or attach the hardware device to the electronic device and leave it there, which generally negates the effectiveness of the protection scheme.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical components or features.

FIG. 1 is a block diagram illustrating one example implementation of an architecture in which a mobile device utilizes an external wireless device for user authentication.

FIGS. 2 and 3 are flowcharts showing example procedures for authenticating a user and securing mobile device content.

FIG. 4 is a block diagram illustrating another example implementation of an architecture in which a mobile device utilizes an external wireless device for user authentication.

FIG. 5 is a block diagram illustrating example components of the mobile device shown in FIGS. 1 and 4.

DETAILED DESCRIPTION

This disclosure is directed towards an authentication scheme for mobile devices such as handheld electronic book (“eBook”) reader devices. For successful authentication, a user enters a pre-specified or configurable password. In addition, the mobile device detects whether it can receive a wireless signal from a separate electronic device belonging to the user. For example, the separate electronic device might be a headset, a cell phone, or a personal music player. The presence of a signal from the separate device is used as a second factor to authenticate the user. Thus, user authentication is predicated upon receiving the correct password from the user and upon receiving a signal from a device that has been pre-associated with the mobile device or with the user. In other implementations, meanwhile, authentication or access to content is predicated upon receiving biometric information and upon receiving the specified wireless signal.

Therefore, two authentication factors may be provided for authentication or for access to specified content: a user-possession factor (reception of a specified wireless signal), as well as a user-knowledge factor (the password) or a user-identity factor (biometric information). Of course, in each implementation the user may provide more than two factors for the purpose of authenticating or accessing the content.

FIG. 1 shows an environment 100 in which these techniques can be implemented and used. In this example, a mobile device 102 comprises a portable media device such as a dedicated eBook reader device. The mobile device 102 might alternatively comprise any other type of mobile or portable device, such as a cellular phone, a personal digital assistant, a personal music player, a tablet computer, a laptop computer, or any other portable device having resources or activities subject to protection from unauthorized users. Many such devices are considered personal to a specific user or to a small group of users. For example, an eBook reader device is often used exclusively by a single user or by a small group of users such as the primary user and his or her family. Small computers, music players, and other such devices are also often associated personally with particular users.

In this example, the mobile device 102 has a keyboard 104, a graphical display 106, and miscellaneous buttons or inputs 108. The keyboard 104 can be an alphanumeric keypad that a user can employ to enter text, numbers, and punctuation. The keyboard 104 can be used for various user input, including entry of passwords.

The display 106 is an example of a content rendering device upon which different content items can be displayed or otherwise rendered for a user. In addition, the display 106 can form a user interface for use in conjunction with the keyboard 104 to interact with a user 110 and allow the user 110 to navigate to different content items. Other content rendering devices might include speakers, headphones, or other types of displays. In addition, the display 106 might be touch-sensitive, allowing the user to touch the display itself in order to provide input, including alphanumeric input. In an embodiment using a touch-sensitive display surface, the keyboard 104 might be implemented as a virtual keypad on the touch-sensitive display 106, and passwords might be entered by touching the display surface 106.

The buttons 108 can be used for various user input functions, such as activating menus, turning pages, advancing to a subsequent song or media item, etc.

The mobile device 102 can store or have access to a plurality of media or content items, represented in FIG. 1 by symbol 112. Content items 112 can comprise a variety of different types of content, such as text, graphics, audio, video, contacts, notes, annotations, books, albums, files, etc. In the illustrated environment, where the mobile device 102 is an eBook reader device, the content items 112 might comprise eBooks, which in turn comprises text and graphics. Such eBooks might also include other types of media such as audio and video. Such media is rendered on the display 106 and/or other output devices such as audio speakers or headphones. Other content items rendered by an eBook reader device might comprise notes or other annotations (voice, textual, graphical, audio, or video) associated with particular eBook textual or graphical content. For purposes of this description, such notes or other annotations are considered to be separate content items from the primary content with which they might be associated.

In the particular embodiment illustrated by FIG. 1, the mobile device 102 has a wireless communications receiver or transceiver 114, represented in FIG. 1 by an antenna symbol. The wireless communications receiver or transceiver 114 is configured to communicate wirelessly with an external wireless communications device 116. The external wireless communications device 116 can be a personal and/or mobile device that belongs to or is associated with the user 110, such as the mobile phone shown in FIG. 1. The external wireless communications device 116 can be a personal electronic device that user 110 carries or has nearby, or a wireless device that has been pre-designated as being associated with the user 110. Examples of external wireless communications devices might include wireless headsets, other wireless accessories and audio devices, mobile telephones, personal media players, other eBook reader devices, digital storage devices, telephonic and other voice or data communications devices, access points, cell nodes, network devices, and other portable, mobile, or personal devices.

The wireless communications receiver or transceiver 114 can be a Bluetooth receiver or transceiver. Bluetooth technology and protocols are commonly used to connect with voice accessories such as headsets and hands-free automotive devices and are often used in conjunction with mobile telephonic devices. Many personal devices include Bluetooth wireless capabilities, including desktop computers, laptops and other small computers, smartphones, digital personal assistants, personal audio/media players, and so forth.

The wireless communications receiver or transceiver 114 can be a wireless local-area or wide-area network receiver, transceiver, or port, configured to communicate through a local-area or wide-area using conventional IP (Internet Protocol) and IP-related protocols for wireless network communications. Alternatively, the wireless communications receiver or transceiver 114 might be a cellular-based communications component or device such as used in mobile telephones or other personal communications devices. The receiver/transmitter 114 may also be configured to wirelessly interrogate objects for the presence of one or more RFID tags. The mobile device 102 may additionally or alternatively include any other technology capable of utilizing the use of RFID and/or RFID tags to detect the presence of associated external devices (e.g., mobile device, network component, etc.).

Note that the mobile device 102 might have two or more wireless communications receivers or transceivers 114, such as a network communications port and a Bluetooth port.

When a user attempts to access a particular content item 112, the mobile device 102 requests that the user enter a user secret 118, often referred to as a passcode or password. The password 118 can be preset within the mobile device 102, or can be configurable by the user 110. In most environments, the password comprises a sequence of alphanumeric and special characters, although other user secrets may be used. For instance, the user secret 118 could comprise selection of a particular series of buttons or other input devices on the device, application of a touch input at one or more particular locations of a touch screen, a particular force applied to the touch screen, utterance of a word or sound received by a microphone of the device, and/or any interaction with the mobile device 102 that has been pre-specified as the user secret 118.

The user may enter the user secret 118 directly onto the mobile device 102, may enter the user secret 118 via the external wireless communications device 116, or may enter the user secret 118 in any other manner. Furthermore, in some implementations, an entity other than (or in addition to) the user may enter or otherwise provide the secret. This entity could comprise another user or another device or system, or any combination thereof.

Before allowing the user 110 to access a particular content item 112, the mobile device 102 checks to make sure that the entered passcode 118 matches the preset or configured passcode of the mobile device 102. If the entered passcode 118 does not match, the user 110 is not allowed to access the requested content item. Thus, access to the particular content item 112 is predicated upon receiving a password or user secret 108 from the user 110 that corresponds to a pre-specified password.

In addition to such passcode protection, access to the particular content item 112 is predicated or conditioned upon receiving a wireless communications signal from the external wireless communications device 116 that has been pre-associated with the user 110. As already described, this wireless communications signal may be a Bluetooth signal, a wireless networking signal, or some other data communication signal that can be verified as originating from the user's external wireless communications device 116. Verifying that the signal originates from the user's wireless communications device 116 may comprise communicating bi-directionally with the external wireless communications device 116. In the context of Bluetooth technology, this may include the ability to “pair” with the external wireless communications device 116, or to establish a “pairing” of the mobile device 102 and the external wireless communications device 116. In the context of wireless networking, verification may involve determining that the mobile device 102 is able to properly authenticate with the external wireless communications device 116 using appropriate security and encryption protocols, such as WPA, WEP, SSH, or IPSEC protocols.

FIGS. 2 and 3 illustrate actions performed in order to access content items on mobile device 102. For ease of understanding, the processes shown in FIGS. 2 and 3 are delineated as separate acts or operations represented as independent blocks. However, these separately delineated acts should not be construed as necessarily order dependent in their performance. The order in which the process is described is not intended to be construed as a limitation, and any number of the described process blocks maybe be combined in any order or in parallel to implement the process, or an alternate process. Moreover, it is also possible that one or more of the provided process blocks be omitted. For purposes of discussion, the processes will be described in the context of environment 100 described with reference to FIG. 1.

FIG. 2 illustrates setup actions 200, comprising an action 202 of specifying user/item permissions, an action 204 of pre-specifying a user secret, and an action 206 of associating one or more external devices with a user.

The action 202 comprises setting up user permissions for individual content items 112 or groups of content items 112. Such permissions might be specified and established by a content provider at the time a content item is provided to the mobile device 102, based on licensing or usage rights. Alternatively, the user 110 might specify certain content items that only the user 110 can access or that only certain other users are allowed to access.

As an example, the user 110 might purchase an eBook from a content provider. The content provider might impose certain restrictions on usage of the eBook, such as limiting its access to a group of users comprising the family of the user 110. When reading the eBook, the user 110 may create a new content item comprising notes and annotations relating to the eBook. The user 110 might specify that only he or she is permitted to access the notes and annotations. Such permissions can be specified through an appropriate user interface utilizing the keys 104 and the display 106.

The action 204 of specifying or pre-specifying the user secret 118 comprises establishing a passcode or password to be associated with the device 102 or with the user 110 and/or other users of the mobile device 102. The user secret 118 can be established during setup of the mobile device 102 and potentially changed by the user 110 at different times. In other implementations, the action 204 comprises pre-specifying biometric information (e.g., a fingerprint, a retinal scan, etc.) with the user. Furthermore, a device may be used by multiple different people and, as such, may be associated with multiple different user secrets and/or with multiple different pieces of biometric information.

The action 206 of associating an external device 116 with the user 110 comprises connecting with the external device 116 and selecting that device as an authentication factor. As described above, the external device 116 can be a communications device, and can be a device that is personal to the user 110, such as a cellular telephone, a wireless headset, a personal music player, etc.

During setup of the mobile device 102, the user 110 might be presented with a list of detected external devices. For example, such a list might include several detected wireless access points, one or more Bluetooth accessories, a Bluetooth equipped phone, a personal media player having wireless networking capabilities, etc. In some embodiments, the user 110 is asked to select one or more of such devices that belong to or are normally present along with the user 110. In response, the mobile device 102 records an association between the user 110 and the indicated device.

Alternatively, a content provider might specify a particular external wireless device 116 as being associated with the user 110 for purposes of temporary user authentication. For example, selling or renting a particular external wireless device 116 to a user 110 might give that user access rights to some particular content or content items 112. Access to those content items would be premised upon the mobile device 102 being able to detect the presence or proximity of the external wireless device 116.

As another example, a content provider might provide a content item 112 such as a movie, limited to access only by certain users who have been granted access to a network component, such as a particular wireless access point. In this situation, the access point is associated with the user 110 and access to the content is permitted only if the mobile device 102 is able to detect the presence or proximity of the access point. One situation where this might be useful is when wirelessly distributing content within an airplane or some other transportation vehicle, or within any other particular location that includes a network component transmitting a wireless signals. Using the example of an airplane, a user who purchases the content might be associated for purposes of authentication with a wireless access point or distribution transceiver within the airplane. As long as the user's mobile device 102 can detect the physical presence or proximity of the access point, the user is permitted access to the content. When the access point can no longer be detected, the user is denied access to the content.

FIG. 3 illustrates a method 300 of authenticating a user of a mobile or portable device, and of accessing content items on the device. That is, this figure illustrates a method of controlling accessing to a mobile or portable device, which may comprise controlling access to any programs, data, applications, or any other information or subset of information stored on or accessible by the device. Authentication procedures are shown within block 302.

Generally, successful authentication is predicated upon (a) receiving an entered password 118 corresponding to a pre-specified password and (b) receiving a wireless signal and verifying that the received wireless signal is from the separate electronic device 116 that has been pre-associated with the user 110 of the mobile device 102. In some instances, successful authentication may be predicated upon receiving a valid password and receiving multiple different wireless signals from respective separate electronic devices.

More specifically, block 304 represents receiving a request by the user 110 to access or render a particular content item 112. It is assumed in this example that the requested content item 112 has been protected against unauthorized access by associating it with a particular user 110, or with multiple such users. It is also assumed that the procedures of FIG. 2 have already been performed with respect to the requested content item and the users authorized to access the content item.

An action 306 comprises prompting the user 110 for the user secret or password 118 that has been previously established for this user and receiving the password entered by the user 110. In practice, a prompt might be presented on the display 108, instructing the user 110 to enter the password 118. The user 110 uses keys 106 to enter the password. In some embodiments, however, the user 110 may speak the password into a microphone of the device, or the user may enter the password in any other suitable manner.

At 308, the mobile device 102 determines whether the entered password matches the password previously established for this user. If the entered password does not match the previously established or pre-specified password, authentication fails and the mobile device 110 denies access to the requested content item at 310. If the entered password does match the previously established password, further authentication is performed at 312.

Action 312 comprises receiving one or more analog or digital wireless communications signals. As already described, at least one of the received wireless signals is expected to be a signal originating from the external device 116 associated with the user 110. The signal might be an identifiable wide-area or local-area networking signal such as a wireless networking or WiFi signal. Alternatively, the signal might be a Bluetooth signal or some other wireless signal used by an external wireless accessory or independent communications device. In some embodiments, the wireless communications signal is a signal that can be verified as originating from a particular wireless communications device.

Action 314 comprises determining whether at least one of the received signals is from the external wireless device 116 that has been pre-associated with the user 110. Such determining or verifying can be accomplished by detecting characteristics of the received wireless signal or data conveyed by the wireless signal. A wireless networking signal, for example, often conveys a unique network name or device identifier that can be used to verify that the signal is from a particular device. Bluetooth signals, similarly, convey device identifiers that can be used to verify that a signal is from a particular device or type of device.

Furthermore, the verification 314 can be based upon successful bi-directional communications with the external device from which the received signal emanates. In the case of WiFi or Bluetooth signals, for example, verification can be premised upon the ability to establish a communications channel with the external wireless device 116. This adds a further degree of protection since some current or previous user setup is often needed in order for such a communications channel to be established, such as entering a code or password associated with the external device 116.

If none of the received wireless signals is from the external device 116 that has previously been associated with the authorized user 110, authentication fails and the mobile device 102 denies access to the requested content item at 310. If at least one of the received wireless signals is from the external device 116 that has previously been associated with the authorized user 110, authentication is declared to be successful, and the mobile device 102 permits access to the requested content item at 316. While FIG. 3 illustrates receiving an entered passcode at 306 prior to receiving a wireless signal at 312, these operations may occur in the opposite order or in parallel in other implementations.

Using the authentication 302 of FIG. 3, two authentication factors are provided: a user-knowledge factor (the password), and a user-possession factor (proximity of the pre-associated external wireless device). In other implementations, meanwhile, the user may provide proof of who the user is (biometric information, such as a fingerprint, a retinal scan, etc.), along with the user-possession factor.

FIG. 4 shows an alternative environment 400 in which the techniques described above can be implemented. This embodiment includes elements of FIG. 1, including the mobile device 102, the user 110, the external wireless device 116, and the user secret 118. Similar elements have been designated with the same reference numerals used in FIG. 1.

In this example, the wireless communications receiver or transceiver 114 is a wireless local-area or wide-area network transceiver configured to communicate through a local-area or wide-area network to receive electronic media for storage and rendering on the mobile device 102. In the illustrated example, in which the mobile device 102 is an eBook reader device, the received media comprise eBooks.

The wireless communications receiver or transceiver 114 of the mobile device 102 can be a Wi-Fi receiver, transceiver, or port, configured to use conventional IP and IP-related protocols for wireless network communications. The wireless communications receiver or transceiver 114 can communicate with various web sites, resources, and content providers through a public or private network infrastructure 402 such as the Internet, a proprietary voice and/or data communications infrastructure, or some combination thereof.

This environment 400 can include a media or content source 404 from which individual media items 406 can be obtained. This might be some type of service provider, database, storage cache, or other source from which content items can be streamed or downloaded. The wireless communications receiver or transceiver 114 is configured in this example to receive electronic media for storing and/or rendering on the mobile device 102.

Thus, in this embodiment, a single wireless receiver or transceiver 114 is used to both (a) communicate with a content provider and receive content items from the content provider, and (b) verify presence or proximity of an external wireless device 116 that has been pre-associated with the user 110. Note, however, that other embodiments may have two or more wireless receivers or transceivers 114, and might use two different wireless receivers or transceivers 114 for communicating with a content provider and verifying an external wireless device, respectively.

FIG. 5 illustrates example components that might be implemented in the mobile device 102. In the embodiment shown in FIG. 5, the mobile device 102 may be a dedicated, handheld eBook reader device equipped with a passive display, such as a reflective display, to display electronic documents, such as electronic books or “eBooks”. Of course, other implementations may employ any other type of display, as an emissive display, a projection display, and/or the like. The terms “book” and/or “eBook”, as used herein, include electronic or digital representations of printed works, as well as digital content that may include text, multimedia, hypertext, and/or hypermedia. Examples of printed and/or digital works include, but are not limited to, books, magazines, newspapers, periodicals, journals, reference materials, telephone books, textbooks, anthologies, instruction manuals, proceedings of meetings, forms, directories, maps, web pages etc. Accordingly, the terms book and/or eBook may include any content that is in electronic or digital form.

In a very basic configuration, the mobile device 102 includes a processing unit 502 composed one of one or more processors, and memory 504. Depending on the configuration of the mobile device 102, the memory 504 is an example of computer storage media and may include volatile and nonvolatile memory. Thus, the memory 504 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, or other memory technology, or any other medium which can be used to store media items or applications and data which can be accessed by the mobile device 102.

The memory 504 may be used to store any number of functional components that are executable on the processing unit 502, as well as data and content items that are rendered by the mobile device 102. Thus, the memory 504 may store an operating system 506 and an eBook storage database to store one or more content items 508, such as eBooks and audio books.

A user interface module 510 may also be provided in memory 504 and executed on the processing unit 502 to facilitate user operation of the mobile device 102. The UI module 510 may provide menus and other navigational tools to facilitate selection and rendering of the content items or eBooks 508. The UI module 510 may further include a browser or other application that facilitates access to sites over a network, such as websites, content providers, or online merchants.

A content presentation application 512 renders the content items 508. The content presentation application 512 may be implemented as various applications depending upon the content items. For instance, the application 512 may be an electronic book reader application for rending electronic books, or an audio player for playing audio books, or a video player for playing video, and so forth.

The memory 504 may further store a network communication module 514 to manage communication between the mobile device 102 and other devices or entities, such as the external wireless device 116, network 402, and/or content source 404 (FIGS. 1 and 4).

The mobile device 102 in this environment may also include an authentication module or logic component 516 responsible for performing and coordinating the authentication procedures described above in conjunction with other components of the mobile device 102. In particular, authentication module 516 can be configured to condition or predicate access to or rendering of a particular content item based on successful authentication of a user who has been pre-authorized for access to the particular content item. Successful authentication, in turn, is conditioned or predicated in part upon receiving a wireless signal from an external wireless device that has been pre-associated with the authorized user. In some embodiments, successful authentication is further conditioned or predicated upon verifying that the received wireless signal is from the particular external device that has been associated with the user, such as by authenticating with the external device or communicating bi-directionally with the external device.

The authentication module 516 can be configured to additionally condition or predicate access to a particular content item on a factor other than receiving the wireless signal from the external electronic device, such as receiving a user-entered password matching a pre-defined password.

The mobile device 102 may further include the keyboard 104 and the display 106. In the case where the mobile device 102 is an eBook reader device, the display 106 can use ePaper display technology, which is bi-stable, meaning that it is capable of holding text or other rendered images even when very little or no power is supplied to the display. Some example ePaper-like displays that may be used with the implementations described herein include bi-stable LCDs, MEMS, cholesteric, pigmented electrophoretic, and others. In other implementations, or for other types of devices, the display may be embodied using other technologies, such as LCDs and OLEDs, and may further include a touch screen interface. In some implementations, a touch sensitive mechanism may be included with the display to form a touch-screen display.

The mobile device 102 may further be equipped with various other input/output (I/O) components 518. Such components may include various user interface controls (e.g., buttons, joystick, etc.), audio speaker, connection ports, and so forth.

One or more wireless communication devices or interfaces 520 are provided to facilitate communication with external, remote computing sources over various networks, such as the network 402, or with other local devices such as the external wireless device 116. Content (e.g., eBooks, magazines, audio books, etc.), as well as program modules, may be transferred to the mobile device 102 via the communication interfaces(s) 520. The communication interface(s) 520 can support connections to various networks, such as cellular networks, radio, WiFi networks, short range networks (e.g., Bluetooth), IR, and so forth. The communication interfaces(s) 520 can support both wired and wireless communications with various types of networks (e.g., network 106), including the Internet.

The eBook reader device 102 may have additional features or functionality. For example, the eBook reader device 102 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. The additional data storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.

Various instructions, methods and techniques described herein may be considered in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. for performing particular tasks or implement particular abstract data types. These program modules and the like may be executed as native code or may be downloaded and executed, such as in a virtual machine or other just-in-time compilation execution environment. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media.

CONCLUSION

Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as illustrative forms of implementing the claims. 

What is claimed is:
 1. A computer-implemented method of controlling access to an electronic book (eBook) reader device, comprising: associating a stored user secret or biometric information with the eBook reader device; associating an external device with the eBook reader device, the external device being different from the eBook reader device; receiving a user secret or biometric information from a user of the eBook reader device; receiving a wireless communications signal; and granting access to the eBook reader device based at least partly on (a) the received user secret or biometric information matching the stored user secret or biometric information, respectively, associated with the eBook reader device and (b) the received wireless communications signal originating from the external device associated with the eBook reader device.
 2. The computer-implemented method of claim 1, wherein the external device associated with the eBook reader device is a personal mobile device or a network component.
 3. A computer-implemented method of controlling access to a portable device, comprising: associating a stored user secret or biometric information with the portable device; associating an external device with a user, the external device being different from the portable device; receiving a user secret or biometric information from a user; receiving a wireless communications signal; and granting access to the portable device based at least partly on (a) the received user secret or biometric information matching the stored user secret or the biometric information, respectively, associated with the portable device and (b) the received wireless communications signal originating from the external device associated with the user.
 4. The computer-implemented method of claim 3, wherein the external device associated with the user is a network component.
 5. The computer-implemented method of claim 3, wherein the external device associated with the user is a personal mobile device.
 6. The computer-implemented method of claim 5, wherein the personal mobile device comprises a communications device.
 7. The computer-implemented method of claim 5, wherein the personal mobile device comprises a Bluetooth accessory.
 8. The computer-implemented method of claim 5, wherein the personal mobile device comprises a wireless headset.
 9. The computer-implemented method of claim 3, wherein the wireless communications signal comprises a Bluetooth signal that can be verified as originating from the external device, the external device being a pre-specified personal mobile device.
 10. The computer-implemented method of claim 3, wherein the wireless communications signal comprises a wireless networking signal that can be verified as originating from the external device, the external device being a pre-specified personal mobile device.
 11. The computer-implemented method of claim 3, wherein the receiving the wireless communications signal comprises communicating bi-directionally with the external device, the external device being a pre-specified personal mobile device or a pre-specified network component.
 12. The computer-implemented method of claim 3, wherein the receiving the wireless communications signal comprises communicating bi-directionally with the external device, the external device being a pre-specified personal mobile device or a pre-specified network component, and wherein the communicating bi-directionally comprises using a wireless local area networking protocol.
 13. A computer-implemented method of controlling access to content items stored on or accessible by a mobile device, comprising: associating an external device with a subset of one or more of the content items; receiving a wireless communications signal; determining that the received wireless communications signal originated from the external device associated with the subset of one or more content items; and granting access to the subset of one or more content items based at least in part on the determining that the received wireless communications signal originated from the external device that has been associated with the subset of one or more content items.
 14. The computer-implemented method of claim 13, further comprising refraining from granting access to the subset of one or more content items based at least in part on determining that the received wireless communications signal does not originate from the external device that has been associated with the subset of one or more content items.
 15. The computer-implemented method of claim 13, wherein the external device that has been associated with the subset of one or more content items is a personal mobile device or a network component.
 16. The computer-implemented method of claim 13, wherein the granting access is additionally based upon a factor other than determining that the received wireless communications signal originated from the external device that has been associated with the subset of one or more content items.
 17. The computer-implemented method of claim 13, wherein the granting access is additionally based upon receiving an entered user secret corresponding to a pre-specified user secret.
 18. The computer-implemented method of claim 13, wherein the granting access is additionally based upon receiving biometric information of a user corresponding to pre-specified biometric information.
 19. The computer-implemented method of claim 13, further comprising granting access to content items other than the subset of one or more content items after determining that the received wireless communications signal does not originate from the external device that has been associated with the subset of one or more content items.
 20. The computer-implemented method of claim 13, wherein the external device is a mobile communications device.
 21. The computer-implemented method of claim 13, wherein the external device is a Bluetooth accessory.
 22. The computer-implemented method of claim 13, wherein the external device is a wireless headset.
 23. The computer-implemented method of claim 13, wherein the received wireless communications signal is a Bluetooth signal that can be verified as originating from the external device based at least partly on transmitted identification information from the external device.
 24. The computer-implemented method of claim 13, wherein the received wireless communications signal is a wireless networking signal that can be verified as originating the external device.
 25. The computer-implemented method of claim 13, wherein the determining that the received wireless communications signal originated from the external device associated with the subset of one or more content items comprises communicating bi-directionally with the external device.
 26. The computer-implemented method of claim 13, wherein the determining that the received wireless communications signal originated from the external device associated with the subset of one or more content items comprises communicating bi-directionally with the external device using a wireless local area networking protocol.
 27. One or more non-transitory, computer-readable storage media maintaining instructions that, when executed by one or more processors of a portable device, program the one or more processors to perform operations comprising: associating a stored user secret or biometric information with the portable device; associating an external device with a user, the external device being different from the portable device; receiving a user secret or biometric information from a user; receiving a wireless communications signal; and granting access to the portable device based at least partly on (a) the received user secret or biometric information matching the stored user secret or the biometric information, respectively, associated with the portable device and (b) the received wireless communications signal originating from the external device associated with the user.
 28. The one or more non-transitory, computer-readable storage media of claim 27, wherein the external device associated with the eBook reader device is a personal mobile device or a network component.
 29. The one or more non-transitory, computer-readable storage media of claim 27, wherein the instructions further program the one or more processors to perform operations comprising: associating a stored user secret or biometric information with the portable device; associating an external device with a user, the external device being different from the portable device; receiving a user secret or biometric information from a user; receiving a wireless communications signal; and granting access to the portable device based at least partly on (a) the received user secret or biometric information matching the stored user secret or the biometric information, respectively, associated with the portable device and (b) the received wireless communications signal originating from the external device associated with the user.
 30. The one or more non-transitory, computer-readable storage media of claim 27, wherein the instructions further program the one or more processors to perform operations comprising: determining that the received wireless communications signal originated from the external device based at least in part on bi-directional communication between the portable device and the external device.
 31. The one or more non-transitory, computer-readable storage media of claim 27, wherein the grant of access to the portable device includes a grant of access to one or more content items associated with the portable device.
 32. The one or more non-transitory, computer-readable storage media of claim 27, wherein the grant of access to the one or more content items is further based upon verification that the wireless signal from the external device comprises identification information.
 33. The one or more non-transitory, computer-readable storage media of claim 32, wherein the instructions further program the one or more processors to perform operations comprising: granting access to a subset of the one or more content items in response to determining that the received wireless communications signal does not originate from the external device.
 34. The one or more non-transitory, computer-readable storage media of claim 33, wherein the external device is associated with the subset of the one or more content items.
 35. The one or more non-transitory, computer-readable storage media of claim 27, wherein the received wireless communications signal is a Bluetooth signal that can be verified as originating from the external device based at least partly on transmitted identification information from the external device.
 36. The one or more non-transitory, computer-readable storage media of claim 27, wherein the received wireless communications signal is a wireless networking signal that can be verified as originating from the external device.
 37. The one or more non-transitory, computer-readable storage media of claim 27, wherein the external device is a Bluetooth accessory.
 38. The one or more non-transitory, computer-readable storage media of claim 27, wherein the external device is a tablet computer. 