Patent classifications
H04M1/724634
Method and apparatus for controlling lock/unlock state of terminal through voice recognition
A method for controlling a terminal through a voice input is provided. The method includes receiving a voice input when the terminal is in a state in which the terminal is locked and performing an operation corresponding to the voice input if the voice input corresponds to a preset command.
APPARATUS AND METHOD FOR AUTOMATICALLY ACTIVATING A CAMERA APPLICATION BASED ON DETECTING AN INTENT TO CAPTURE A PHOTOGRAPH OR A VIDEO
A method of automatically activating a camera application implemented in a mobile device in locked mode starts with the processor receiving a first signal from an accelerometer. The device's processor activates the camera application when the processor determines that the mobile device has remained in a stationary portrait or landscape position for a period of time based on the first signal. Activating the camera application includes signaling by the processor to the display device to display a camera screen from a locked screen. The processor may also receive a second signal from a proximity sensor that detects presence of a nearby object to the mobile device. When the processor determines that there is presence of the nearby object to the mobile device based on the second signal, the mobile device remains in locked mode and the processor does not activate the camera application.
Remote profile modification for device recovery assist
A system is provided for recovering a mobile device by enabling an authorized user to remotely change the profile of the device to assist others in returning the device to the user. Initially, a user registers the mobile device with a recovery assist server. When the user is unable to locate the device because it is, for example, lost or stolen, the user indicates with the server that the device is missing. The device and the server are configured to communicate with each other, for example, periodically or, in another example, on device start up. If the device is identified as missing on the server, the operation of the mobile device is configured based on a missing profile associated with the mobile device. Once the device is located, the user indicates with the server that the device is no longer missing. When the device is unidentified as missing on the server, the operation of the mobile device is configured based on a user profile associated with the mobile device. When the mobile device is configured based on the missing profile, the mobile device may, for example, display a background image or play a ring tone to inform persons near the device that the device is considered mislaid and to provide such persons with information for returning the device.
Network-based device locking management
Network-based device management is described. In an example, a server may receive, from a device, a request to change from a first, locked state to a second state. The server may access data associated with at least one of the device or an account associated with the device, and may compare the data with one or more predetermined rules. Satisfaction of the one or more predetermined rules may be necessary to effectuate a change from the first, locked state to the second state. The server may determine that the data satisfies the one or more predetermined rules and the server may send, to the device, an instruction to enable the device to change from the first, locked state to the second state. The instruction may direct an application on the device to effectuate a change to the subscriber identity module (SIM) card associated with the device.
METHOD AND APPARATUS FOR MODIFYING INTERACTION WITH A MOBILE-DEVICE
Interaction with a handheld device is modified based upon the speed at which the handheld device is traveling, for example while being held in a passenger vehicle. If the handheld device appears to be moving faster than a pre-established threshold, a lockout flag indicates that interaction with the user must be modified. Then, the lockout flag is cleared only when the handheld device is held off at an angle and the user focuses gaze upon the display for a minimum amount of time. Once the lockout flag is cleared, interaction with the user returns to a normal state.
Device, Method, and Graphical User Interface for Updating a Background for Home and Wake Screen User Interfaces
A method includes: while displaying a wake screen with a first media item as a background and foreground objects displayed over the first media item, detecting first user input that corresponds to a request to display a media gallery; in response to detecting the first user input, ceasing display of the foreground objects; detecting a second user input that corresponds to a request to navigate through media items in the media gallery; in response to detecting the second user input, replacing the first media item with a second media item in the media gallery; detecting a third input that corresponds to a request to dismiss the media gallery; and, in response to detecting the third user input, redisplaying the foreground objects on the display device over a media item from the media gallery that is selected as the background for the wake screen.
Separating Sensitive Data From Mobile Devices For Theft Prevention
Concepts and technologies are disclosed herein for separating sensitive data from mobile devices for theft prevention. According to one aspect, a system includes a data security platform and a mobile device platform. The mobile device platform can detect that the data security platform is connected. The mobile device platform can determine whether the data security platform is part of an authenticated pair with the mobile device platform. In response to determining that the data security platform is part of an authenticated pair with the mobile device platform, the mobile device platform can access at least a portion of sensitive data that is stored in a memory component of the data security platform. If the data security platform is disconnected from the mobile device platform, the mobile device platform cannot function or can provide limited functionality, such as a function to communication with a 9-1-1 service.
WIRELESS DEVICE SECURITY SYSTEM
A device in a wireless device security system may include at least one processor configured to determine a location of the device with respect to a security area. The at least one processor may be further configured to provide an alert output when the determined location of the device is proximate to a boundary of the security area. The at least one processor may be further configured to prevent the device from responding to at least some user input when the determined location of the device is outside of the security area. The at least one processor may be further configured to provide a disturbance output when the determined location of the device is outside of the security area.
METHOD FOR LIMITING USAGE OF APPLICATION, AND TERMINAL
A method for limiting usage of an application on a mobile terminal is provided. In an implementation, a usage limitation condition is preset for the application, where the usage limitation condition includes at least one of a geographical location, a time, and a network condition of the mobile terminal. A current operation environment corresponding to the usage limitation condition is obtained in response to receiving an input operation of a user. Usage of the application is limited when the operation environment meets the usage limitation condition, and the application is normally used when the operation environment does not meet the usage limitation condition.
Apparatus, system, and method for inhibiting operation of mobile devices within a zone
Methods, systems, and apparatus for inhibiting a function of a mobile device in a predetermined detection zone are disclosed. A method includes receiving, by a mobile device, a first communication signal when the mobile device is located within a predetermined field of transmission, determining that the first communication signal was transmitted by a first beacon of a plurality of beacons, and inhibiting at least one function of the mobile device upon determining that the first communication signal was transmitted by the first beacon.