Patent classifications
H04M1/67
Mobile terminal device with function limitation, function limitation method thereof, and processing program used in same
The purpose is to provide a mobile terminal device that can limit the use of the application by detecting the user position of the mobile terminal device and the speed of the vehicle by itself. To this end, provided is a function limitation method of a mobile terminal device with function limitation capable of limiting a use of an application, including, a step of determining whether or not a limitation target application of the mobile terminal device is in activation, a usage position check step of determining, by the mobile terminal device, a user of the mobile terminal device is on a driver seat, and a speed check step of calculating, by the mobile terminal device, a vehicle in which the user of the mobile terminal device is riding is traveling, in which the use of the application is limited or terminated when the user of the mobile terminal device is on the driver seat, and the vehicle is traveling.
SYSTEM, METHOD, AND ARTICLE OF MANUFACTURE TO CONTINUOUSLY PROVIDE A GLIMPSE INTO A NAVIGATION APPLICATION RUNNING IN THE BACKGROUND OF THE MOBILE DEVICE THAT IS IN A SCREEN LOCKED STATE
A navigation application running in the foreground of the mobile device is run in the background when the mobile device enters a screen locked state. A display may be activated while the mobile device remains in the screen locked state, and an image is rendered over a lock screen of the mobile device, where the image providing a glimpse into the navigation application running in the background while the mobile device remains in the screen locked state. The image displayed over the lock screen is iteratively updated to provide a continuous glimpse into the navigation application running in the background of the mobile device that is in the screen locked state, without having to unlock the mobile device.
SYSTEM, METHOD, AND ARTICLE OF MANUFACTURE TO CONTINUOUSLY PROVIDE A GLIMPSE INTO A NAVIGATION APPLICATION RUNNING IN THE BACKGROUND OF THE MOBILE DEVICE THAT IS IN A SCREEN LOCKED STATE
A navigation application running in the foreground of the mobile device is run in the background when the mobile device enters a screen locked state. A display may be activated while the mobile device remains in the screen locked state, and an image is rendered over a lock screen of the mobile device, where the image providing a glimpse into the navigation application running in the background while the mobile device remains in the screen locked state. The image displayed over the lock screen is iteratively updated to provide a continuous glimpse into the navigation application running in the background of the mobile device that is in the screen locked state, without having to unlock the mobile device.
USER TERMINAL DEVICE AND DISPLAYING METHOD THEREOF
A user terminal device and a controlling method thereof are provided. The user terminal device includes a display configured to be divided into a first area and a second area which is larger than the first area with reference to a folding line, a cover disposed on a rear side of the display, a detector configured to detect a user interaction on the display and the cover, and a controller configured to, in response to the display being folded along the folding line such that the first area and the second area face each other, control the detector to detect a user interaction through an exposure area, which is an exposed part of the second area, and the cover, and, in response to the display being folded such that the two parts of the cover face with each other with reference to the folding line, control the detector to detect a user interaction through the first area and the second area.
Method, device, and system for providing privacy for communications
A communication system, method and communication terminal are configured to facilitate private outputting of content of a message or communication session. A communication terminal can be configured via data included in a message or via a privacy setting to output content of data from a communication session or message in accordance with a pre-selected privacy setting or one or more privacy rules. For instance, a communication terminal may be configured to suppress a text to speech function for certain text messages, email messages, instant messages, or social networking messages that it receives having the privacy parameter set therein. As another example, a user may set the privacy parameter in his or her terminal so that any such message received by that terminal is output in accordance with the privacy setting or rules. A detection of nearby people can affect how certain content may be output via a terminal.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
ELECTRONIC APPARATUS AND METHOD OF SELECTIVELY APPLYING SECURITY MODE IN MOBILE DEVICE
A method of a mobile device configured to photograph an object includes controlling a display panel to display an image, a touch panel to receive a user input, and a network interface to wirelessly communicate with an external network, unlocking the mobile device when the mobile device is in an area condition, a wireless communication condition, and a time condition, and unlocking the mobile device according to a password when the mobile device is not in the time condition.
ELECTRONIC APPARATUS AND METHOD OF SELECTIVELY APPLYING SECURITY MODE IN MOBILE DEVICE
A method of a mobile device configured to photograph an object includes controlling a display panel to display an image, a touch panel to receive a user input, and a network interface to wirelessly communicate with an external network, unlocking the mobile device when the mobile device is in an area condition, a wireless communication condition, and a time condition, and unlocking the mobile device according to a password when the mobile device is not in the time condition.
Terminal and control method thereof
A terminal for checking a security request level of a fingerprint verification request is provided. The terminal includes a fingerprint recognition sensor configured to acquire a fingerprint image; and a controller configured to check a security request level of a fingerprint verification request when the fingerprint verification request is received, to determine an verification level depending on the security request level, and to perform fingerprint verification in a manner corresponding to the verification level by using the fingerprint image. The controller controls the fingerprint recognition sensor to acquire a fingerprint image of a first level when the security request level is less than or equal to the security request level of a previous verification request that has been completed before the fingerprint verification request, and an elapsed time from the previous verification request is within a threshold time.