H04M1/724634

Systems and methods for performing actions for users from a locked device

Systems and methods for providing actions for users of a computer device from a lock screen interface are provided. A computing device may comprise a touch-sensitive display screen that may allow a user to scroll through a set of user interfaces that may comprise a set of lock screen interfacesone of which may be associated with the user, if authorized for using the computing device. The computing device may allow the user to scroll to one of the following: a set of locked screen interfaces, a set of sign-in interfaces, a set of applications allowed for use (e.g., a camera) by the computer device (even if the user is not signed-in) and a new mode of functionality for computing device (e.g., a children's entertainment application). The computer system may allow swiping from multiple discernible directions to allow the scrolling through user interfaces in a natural manner.

Network-based Device Locking Management

Network-based device management is described. In an example, a server may receive, from a device, a request to change from a first, locked state to a second state. The server may access data associated with at least one of the device or an account associated with the device, and may compare the data with one or more predetermined rules. Satisfaction of the one or more predetermined rules may be necessary to effectuate a change from the first, locked state to the second state. The server may determine that the data satisfies the one or more predetermined rules and the server may send, to the device, an instruction to enable the device to change from the first, locked state to the second state. The instruction may direct an application on the device to effectuate a change to the subscriber identity module (SIM) card associated with the device.

Method and system for communication
10110725 · 2018-10-23 · ·

Provided is a computer implemented method and system for delivering text messages, emails, and messages from a messenger application to a user while the user is engaged in an activity, such as driving, exercising, or working. Typically, the emails and other messages are announced to the user and read aloud without any user input. In Drive Mode, while the user is driving, a clean interface is shown to the user, and the user can hear announcements and messages/emails aloud without looking at the screen of the phone, and use gestures to operate the phone. After a determination is made that a new text message and/or email has arrived, the user is informed aloud of the text message/email/messenger message and in most instances, and if the user takes no further action, the body and/or subject of the text message/email/messenger message is read aloud to the user. All messages can be placed in a single queue, and read to the user in order of receipt.

OUT GOING ONLY
20180288216 · 2018-10-04 ·

An improved cellular communications device having a keyboard, an LCD screen, a microphone, a speaker, a computer processor, and a transmitter, the improvement comprising a computer application programmed with up to six telephone numbers, and configured to only make outgoing calls to these specifically programmed contacts, unless purposely unlocked by a parent or caregiver. Excluding internet access and other smartphone frills structured and arranged to provide children and adults with an easy-to-use cellular device that facilitates voice communication without all of the distractions and interruptions common to traditional cellular phones.

Policy controls for mobile device management systems

A method for wireless policy enforcement of an MDM device according to the detection of a preselected state is provided. In one embodiment, the method includes providing a software application for execution by the MDM device, such that the MDM device determines whether or not the preselected state is present. If the preselected state is present, the software application is further operable to notify an MDM server, which then pushes temporary policy controls to the MDM device. The temporary policy controls overwrite existing policy controls and remove non-whitelisted application tiles from the MDM device home screen. Non-whitelisted application tiles can be selected by the MDM administrator and can include texting functions, social media applications, and internet browsers. The preselected state can include the presence or absence of motion, a minimum speed, location, date and time, proximity to a signal source, internet connectivity, Bluetooth connectivity, and combinations of the foregoing.

Devices, methods, and graphical user interfaces for providing notifications and application information

A computer system displays a first version of a first user interface that includes first user interface objects displayed concurrently with a first background. The first user interface objects include content from a first plurality of applications. In response to detecting a first input, when the first input includes movement in a first direction, the system replaces display of the first version of the first user interface with a second user interface that includes representations of a second plurality of applications. When the first input includes second movement in a second direction, the system replaces display of the first version of the first user interface with display of a second version of the first user interface that includes second user interface objects displayed with a second background. The second user interface objects correspond to a third plurality of applications and include content from the third plurality of applications.

Context-sensitive control of radar-based gesture-recognition

This document describes techniques and systems for radar-based gesture-recognition with context-sensitive gating and other context-sensitive controls. Sensor data from a proximity sensor and/or a movement sensor produces a context of a user equipment. The techniques and systems enable the user equipment to recognize contexts when a radar system can be unreliable and should not be used for gesture-recognition, enabling the user equipment to automatically disable or gate the output from the radar system according to context. The user equipment prevents the radar system from transitioning to a high-power state to perform gesture-recognition in contexts where radar data detected by the radar system is likely due to unintentional input. By so doing, the techniques conserve power, improve accuracy, or reduce latency relative to many common techniques and systems for radar-based gesture-recognition.

Method for unlocking screen and electronic device using the same

Disclosed are an electronic device and a method for unlocking screen. The electronic device includes a touch screen, a storage and a processor. The touch screen displays unlocking blocks and non-unlocking blocks in the screen-locking mode of the electronic device. A plurality of files are stored in the storage. In the screen-locking mode, the processor detects a motion track generated when an object is touching the touch screen. If the object has touched the unlocking blocks and the motion track is satisfied with a first unlocking sequence, the processor makes the screen-locking mode released and loads all files. If the object has touched the unlocking blocks and the motion track is satisfied with a second unlocking sequence, the processor makes the screen-locking mode released and loads some of the files. Thus, according to different motion tracks, the electronic device determines to load all or some of the files.

APPLICATIONS, METHODS, AND SYSTEMS FOR PREVENTING A MOBILE DEVICE USER FROM OPERATING FUNCTIONS OF A MOBILE DEVICE WHILE OPERATING A MOTOR VEHICLE
20180248999 · 2018-08-30 ·

A computer application for preventing a mobile device user from operating a mobile device while operating a motor vehicle. The computer application determines pertinent mobile devices within the motor vehicle. The application provides a user interface to each of the pertinent mobile devices for selecting a motor vehicle operator device. The application causes all pertinent mobile devices to move into a locked configuration if a motor vehicle operator device is not identified and causes non-operator devices to move into the unlocked configuration if a motor vehicle operator device is identified. The computer application causes the motor vehicle operator device to remain in the locked configuration if the motor vehicle is moving and causes the motor vehicle operator device to move into an unlocked configuration if the motor vehicle is not moving, or if the motor vehicle operator device is no longer one of the pertinent mobile devices.

Fingerprint activation of a panic mode of operation for a mobile device
10064060 · 2018-08-28 · ·

Fingerprint actuation is described for unlocking a mobile device and activating customized mobile device functions by using a fingerprint authentication technique. The mobile device uses a fingerprint sensor to authenticate a user for allowing secure access to certain mobile device functions or contents, and provides a utility in addition to unlocking the mobile device. This allows the user to control access to one or more mobile device functions concurrently with invoking fingerprint authentication in order to unlock the mobile device when the user presses a finger to the fingerprint sensor. The mobile device may be unlocked using a designated finger that activates a panic mode of operation, wherein personal data stored on the mobile device is not accessible or viewable to the user. In other implementations, the user may register particular fingerprints to be associated with different modes of operation and activate the different modes based on the particular fingerprints.