H04M1/72463

Activation of cryptographically paired device
11540124 · 2022-12-27 · ·

An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.

Authentication techniques in response to attempts to access sensitive information

The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.

Terminal screen-on/off control method and apparatus, and terminal
11539832 · 2022-12-27 · ·

A terminal screen-on/off control method includes receiving an operation instruction that is sent by a user by using a first terminal; if the operation instruction meets a preset condition, determining a current state of a screen of a second terminal, and if the current state of the screen is on, controlling the second terminal to turn off the screen; or if the current state of the screen is off, controlling the second terminal to turn on the screen. The preset condition is used to determine whether the second terminal is to turn the screen on/off. The first terminal can be directly used to control the second terminal to turn the screen on/off. This operation is very simple.

Systems and methods for unlocking a mobile device
11539829 · 2022-12-27 · ·

Systems and methods for controlling access to a mobile device. A method for unlocking a mobile device includes detecting a user input comprising two or more user actions performed at one or more physical input buttons of the mobile device when the mobile device is in a lock state. The lock state prevents use of at least one functionality of the mobile device. Each user action corresponds to a code. The method also includes determining whether the detected user input is valid, and changing a state of the mobile device from the lock state to an unlock state to enable the use of the at least one functionality of the mobile device if the detected user input is valid.

RESOURCE CONNECTIVITY FOR MULTIPLE DEVICES

Methods for improving resource connectivity for users' various computing devices are disclosed. An example method may include establishing a local connection with a sending device, receiving device status information and task status information from the sending device using the local connection, the task status information identifying at least one media content, and generating a user interface that includes a graphical representation of the device status information and a first control that, when selected, executes the at least one media content in an application on the receiving device. Another example method may include detecting an interaction with a UI element that sets a network sharing status to an on state, identifying a locally stored network as shareable, generating an instance of a network data type for the locally stored network, and associating the instance with the user account so that the locally stored network is shared with the user's other devices.

RESOURCE CONNECTIVITY FOR MULTIPLE DEVICES

Methods for improving resource connectivity for users' various computing devices are disclosed. An example method may include establishing a local connection with a sending device, receiving device status information and task status information from the sending device using the local connection, the task status information identifying at least one media content, and generating a user interface that includes a graphical representation of the device status information and a first control that, when selected, executes the at least one media content in an application on the receiving device. Another example method may include detecting an interaction with a UI element that sets a network sharing status to an on state, identifying a locally stored network as shareable, generating an instance of a network data type for the locally stored network, and associating the instance with the user account so that the locally stored network is shared with the user's other devices.

Method and system for controlling a mobile communication device

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. The present method and system determines whether the vehicle is being operated by a user that may also have access to a mobile communication device which, if used concurrently while the vehicle is in operation, may lead to unsafe operation of the vehicle. If the mobile services control system determines that a vehicle operator has potentially unsafe access to a mobile communication device, the mobile services control system may restrict operator access to one or more services that would otherwise be available to the operator via the mobile communication device.

Method and system for controlling a mobile communication device

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. The present method and system determines whether the vehicle is being operated by a user that may also have access to a mobile communication device which, if used concurrently while the vehicle is in operation, may lead to unsafe operation of the vehicle. If the mobile services control system determines that a vehicle operator has potentially unsafe access to a mobile communication device, the mobile services control system may restrict operator access to one or more services that would otherwise be available to the operator via the mobile communication device.

Systems and methods for restricting capture of self-portrait images on mobile devices

The disclosed computer-implemented method for restricting capture of self-portrait images on mobile devices may include (i) capturing sensor data associated with a surrounding environment, (ii) detecting a user input for taking one or more self-portrait images, determining, based on the sensor data, one or more potential hazards associated with the taking of the self-portrait images within the surrounding environment, and (iv) performing a security action to protect against the potential hazards associated with the taking of the self-portrait images within the surrounding environment. Various other methods, systems, and computer-readable media are also disclosed.

Systems and methods for restricting capture of self-portrait images on mobile devices

The disclosed computer-implemented method for restricting capture of self-portrait images on mobile devices may include (i) capturing sensor data associated with a surrounding environment, (ii) detecting a user input for taking one or more self-portrait images, determining, based on the sensor data, one or more potential hazards associated with the taking of the self-portrait images within the surrounding environment, and (iv) performing a security action to protect against the potential hazards associated with the taking of the self-portrait images within the surrounding environment. Various other methods, systems, and computer-readable media are also disclosed.