H04M1/673

Mobile computing device with multiple access modes

Some embodiments of the invention provide a mobile device that restricts access to its applications. The mobile device, displays, on the device's touch screen display, a lock screen page for accessing the device in a primary access mode or a secondary access mode. The primary access mode provides access to several of the device's applications, and the secondary access mode provides access to a limited set of the applications. The mobile device receives a touch input on the lock screen page to access the device in the secondary access mode. The mobile device unlocks the device to the secondary access mode by allowing access to the set of applications and restricting access to the remaining applications in the plurality of applications.

Mobile computing device with multiple access modes

Some embodiments of the invention provide a mobile device that restricts access to its applications. The mobile device, displays, on the device's touch screen display, a lock screen page for accessing the device in a primary access mode or a secondary access mode. The primary access mode provides access to several of the device's applications, and the secondary access mode provides access to a limited set of the applications. The mobile device receives a touch input on the lock screen page to access the device in the secondary access mode. The mobile device unlocks the device to the secondary access mode by allowing access to the set of applications and restricting access to the remaining applications in the plurality of applications.

METHOD AND SYSTEM FOR IMPROVING SECURITY OF A MOBILE TERMINAL
20170277881 · 2017-09-28 ·

A method and system for improving security of a mobile terminal can be used to determine whether the obtained slide-to-unlock operation matches with prerecorded slide-to-unlock operation habits of an owner of the mobile terminal, thereby determine whether the current user is the owner, and perform corresponding processing. With this method and system, it is not required to remind a user to input verification information, such that the current user cannot perceive that verification is currently in process. Therefore, the validity of the verification can be ensured and the security of the mobile terminal can be improved effectively.

METHOD AND SYSTEM FOR IMPROVING SECURITY OF A MOBILE TERMINAL
20170277881 · 2017-09-28 ·

A method and system for improving security of a mobile terminal can be used to determine whether the obtained slide-to-unlock operation matches with prerecorded slide-to-unlock operation habits of an owner of the mobile terminal, thereby determine whether the current user is the owner, and perform corresponding processing. With this method and system, it is not required to remind a user to input verification information, such that the current user cannot perceive that verification is currently in process. Therefore, the validity of the verification can be ensured and the security of the mobile terminal can be improved effectively.

EMBEDDED ACTIVE MATRIX ORGANIC LIGHT EMITTING DIODE (AMOLED) FINGERPRINT SENSOR
20170279948 · 2017-09-28 ·

Various embodiments provide a handheld computing device, such as a cellular phone, that includes a fingerprint sensor embedded in the device's display active area. The fingerprint sensor is composed of a series of PIN diodes that are configured to operate in a photo-receiving mode. In various embodiments, the PIN diodes are formed as active matrix organic light emitting diodes (AMOLEDs) at least partially within the gap between pixels in the display active area.

EMBEDDED ACTIVE MATRIX ORGANIC LIGHT EMITTING DIODE (AMOLED) FINGERPRINT SENSOR
20170279948 · 2017-09-28 ·

Various embodiments provide a handheld computing device, such as a cellular phone, that includes a fingerprint sensor embedded in the device's display active area. The fingerprint sensor is composed of a series of PIN diodes that are configured to operate in a photo-receiving mode. In various embodiments, the PIN diodes are formed as active matrix organic light emitting diodes (AMOLEDs) at least partially within the gap between pixels in the display active area.

Battery anti-theft cage apparatus and method for use in a variety of smart devices
20170237839 · 2017-08-17 ·

The anti-theft cage apparatus protection and securing apparatus for use in a variety of smart devices enable a user to affix the apparatus to the back of the user's smart phone and secure the smart device's battery within the smart device, allowing the battery to be removed, and tracking function to be disabled, in the event the device is stolen. The apparatus includes at least one securing mechanism that may be locked to the back of the device and is housed within the securing mechanism's housing grooves. Once the apparatus is “locked,” the battery may not be removed until the user disables the locking device and removes the apparatus from around the smart device battery. When the smart device expires, the user may simply remove the apparatus from the smart device and insert into another smart device.

PORTABLE TERMINAL AND METHOD OF CONTROLLING LOCKING OF PORTABLE TERMINAL
20170230358 · 2017-08-10 ·

At least one processor controls unlocking based on received acceleration data and data representing a position on a touch panel where proximity or contact of an object is detected when a near field communicator receives acceleration data output from an acceleration sensor of a wearable terminal while locking has been set.

PORTABLE TERMINAL AND METHOD OF CONTROLLING LOCKING OF PORTABLE TERMINAL
20170230358 · 2017-08-10 ·

At least one processor controls unlocking based on received acceleration data and data representing a position on a touch panel where proximity or contact of an object is detected when a near field communicator receives acceleration data output from an acceleration sensor of a wearable terminal while locking has been set.

FINGERPRINT BASED SMART PHONE USER VERIFICATION

A touchscreen, now incorporated in most smartphones, tablets, laptops, and similar devices, presents an effective and transparent method to incorporate continuous active user verification schemes. The touchscreen element grid structure can be used to capture information, such as a set of one-dimensional time-varying signals produced as the user's finger moves past the grid intersections points. This information may be used to verify the user, or that a valid user currently has possession of the mobile device, even while the user is not consciously engaged in an active verification process. Further functions, such as habitual gesture recognition, can also be performed using the same grid outputs.