Patent classifications
H04M1/724634
MOBILE COMPUTING TERMINAL WITH MORE THAN ONE LOCK SCREEN AND METHOD OF USING THE SAME
A method and a system for displaying information and content in a lock screen system having a plurality of screens so as to provide a screen lock for preventing an unintended input of a user terminal device, and a computer-readable recording medium. The method includes setting information and content on a plurality of lock screen, displaying the plurality of lock screens, providing a screen movement between the plurality of lock screens, executing an existing external application so as to provide detailed information for the information and content displayed on the plurality of lock screens, unlocking the plurality of lock screens, and posting an advertisement on a part of the plurality of lock screens. Users can easily confirm simple information and content and use the as a new medium and means for expressing themselves by setting the lock screen windows according to the personalities of the users.
System And Method For Discouraging Inappropriate Use Of A Mobile Device
A system and method for discouraging the in appropriate use of a mobile device including registering a mobile device with a monitoring application running on a system coupled with a network. A mobile device is linked with the monitoring application through the network. The operational status of the mobile device is monitored to detect if a change occurs in the operational status. A change in the operational status of the mobile device is reported to the monitoring program with time information and the status change is displayed in a graphical interface, and a notification message is sent to a system user. Beacons might also be implemented to advise a device user to disable a mobile device to be monitored.
Devices, methods, and graphical user interfaces for providing notifications and application information
A computer system displays a first user interface that includes respective selectable representations of a plurality of categories for media items associated with the computer system, including at least a first selectable representation of a first category and a second selectable representation of a second category. While displaying the first user interface for configuring the system user interface, the computer system detects a first input selecting a set of one or more of the plurality of categories. After the set of one or more of the plurality of categories were selected by the first input, the computer system displays the system user interface, wherein displaying the system user interface includes, over time displaying the system user interface with a plurality of versions of the first background that respectively include media items selected from media items in respective categories in the set of one or more of the plurality of categories.
CONTROL METHOD, APPARATUS AND STORAGE MEDIUM
This application provides a method for controlling devices, a device control apparatus, and a computer readable storage medium. The method for controlling devices includes determining that a state of a connection between a first device and a second device has changed; determining that the first device is in a target state, wherein in the target state, the first device is connected to the second device through a first connection, and based on the first connection, the first device maintains an unlocked screen state; and performing a first operation, the first operation being used to make the first device exit the target state.
Portable terminal
A portable terminal device sets a security level for each application in accordance with position, and stores the level in a memory. The security level determines whether each application is displayed or made executable on a display portion in locked state and unlocked state. A controller refers to the security level and determines the application displayed on the display portion in accordance with position information acquired by a position information acquisition unit (GPS reception unit), and makes executable the application selected by the user. Thus, the portable terminal device offers user-friendliness while ensuring security strength.
PORTABLE TERMINAL
A portable terminal device sets a security level for each application in accordance with position, and stores the level in a memory. The security level determines whether each application is displayed or made executable on a display portion in locked state and unlocked state. A controller refers to the security level and determines the application displayed on the display portion in accordance with position information acquired by a position information acquisition unit (GPS reception unit), and makes executable the application selected by the user. Thus, the portable terminal device offers user-friendliness while ensuring security strength.
Device, method, and graphical user interface for updating a background for home and wake screen user interfaces
A method includes: while displaying a wake screen with a first media item as a background and foreground objects displayed over the first media item, detecting first user input that corresponds to a request to display a media gallery; in response to detecting the first user input, ceasing display of the foreground objects; detecting a second user input that corresponds to a request to navigate through media items in the media gallery; in response to detecting the second user input, replacing the first media item with a second media item in the media gallery; detecting a third input that corresponds to a request to dismiss the media gallery; and, in response to detecting the third user input, redisplaying the foreground objects on the display device over a media item from the media gallery that is selected as the background for the wake screen.
Mobile Phone Storage Assembly For Driver Safety in Vehicles
A mobile phone storage assembly includes a housing, an electromagnetic locking assembly, a wireless charger, a microprocessor, and a wiring assembly. The housing includes a case and a cover pivotably attached to the case. The locking assembly includes a first member attached to the case and a second member attached to the cover. The charger is mounted in the case and is operatively connected to the locking assembly to actuate the locking assembly upon charging of a mobile phone. The microprocessor is mounted in the case and operatively connected to the charger and the locking assembly, and is wirelessly pairable to a mobile phone to detect the presence thereof. The wiring assembly connects the microprocessor to a vehicle ignition system. The microprocessor sends a signal to activate the vehicle ignition system when the case has been locked and a paired mobile phone in the case is being charged.
Incoming call volume control method and electronic device
This application provides an incoming call volume control method and an electronic device. The method includes: An electronic device determines to start a detection based on a state of a display screen, a state of an optical proximity sensor, and an incoming call situation. During the detection, if target biological feature information is detected by the electronic device, the electronic device may adjust an incoming call volume. Therefore, a convenient and fast incoming call volume adjustment mode is provided, which enables a user to adjust the incoming call volume without operating the electronic device. Moreover, the electronic device starts the detection when a specific condition is satisfied, thereby effectively reducing power consumption while ensuring time relevancy and high efficiency of the detection.
Secure selective disclosure of protected information
A system and method for selective disclosure of protected information are provided. Embodiments provide a way to provide limited access to protected information during an emergency. A user may have a medical emergency, and may store protected information on a smartphone that may be useful for an emergency responder, such as certain medical information. The smartphone may provide selective access to only relevant medical information, or may allow a responder to call emergency contact numbers without exposing the actual number. Emergency responders have designated near-field communication chips or other electronic keys to unlock the protected information. Alternatively, near-field communication chips embedded in a wearable allow emergency responders to access protected information at a user's smartphone. Once the emergency responder has established his or her role, the user's smartphone unlocks and provides appropriate access until the responder indicates that access is done and the smartphone relocks.