H04M1/67

Device independent encrypted content access system

Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.

Electronic apparatus and method of selectively applying security mode in mobile device
11595507 · 2023-02-28 ·

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.

Electronic apparatus and method of selectively applying security mode in mobile device
11595507 · 2023-02-28 ·

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.

CONTROLLING ACCESS TO PROTECTED FUNCTIONALITY OF A HOST DEVICE USING A WIRELESS DEVICE
20180007558 · 2018-01-04 · ·

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.

ELECTRONIC DEVICE, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20180007192 · 2018-01-04 ·

An electronic device includes a display, and at least one controller that, when an operation to cancel limitation of operations of the electronic device is detected, is configured to cancel the limitation of operations and presents a first screen on the display. The at least one controller is further configured to present a second screen which is different from the first screen on the display when the operation to cancel the limitation of operations is an operation with a thumb.

ELECTRONIC DEVICE, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20180007192 · 2018-01-04 ·

An electronic device includes a display, and at least one controller that, when an operation to cancel limitation of operations of the electronic device is detected, is configured to cancel the limitation of operations and presents a first screen on the display. The at least one controller is further configured to present a second screen which is different from the first screen on the display when the operation to cancel the limitation of operations is an operation with a thumb.

STANDARD MOBILE COMMUNICATION DEVICE DISTRACTION PREVENTION AND SAFETY PROTOCOLS
20180013878 · 2018-01-11 ·

Methods and systems for providing standardized mobile device distraction prevention and safety protocols are disclosed. In particular, an embodiment of a method for activating a distraction prevention or safety protocol behavior in a mobile device when the mobile device satisfies a specific condition is disclosed. The method includes discovering one or more protocol activators configured to transmit discovery information associated with a specific condition. The method further includes activating distraction prevention safety protocol behavior in the mobile device based at least in part on the discovery information. In an implementation, the specific condition may be a specified environment itself and or include an event when the mobile device enters a specified environment or a specified sequence of numbers is dialed from the mobile device.

HANDLING NOTIFICATIONS

In particular embodiments, one or more notifications are presented on a screen of a personal computing device while the personal computing device is in a locked state. Entry of one or more user responses may be detected on the personal computing device while still in the locked state. Each user response may be associated with at least one notification. An authorization event associated with the personal computing device may be detected, thereby unlocking the personal computing device. The one or more user responses on the personal computing device may then be presented to the user for confirmation. Once user confirmation is received, confirmed user responses may then be published.

HANDLING NOTIFICATIONS

In particular embodiments, one or more notifications are presented on a screen of a personal computing device while the personal computing device is in a locked state. Entry of one or more user responses may be detected on the personal computing device while still in the locked state. Each user response may be associated with at least one notification. An authorization event associated with the personal computing device may be detected, thereby unlocking the personal computing device. The one or more user responses on the personal computing device may then be presented to the user for confirmation. Once user confirmation is received, confirmed user responses may then be published.

METHODS AND SYSTEMS TO PERFORM AT LEAST ONE ACTION ACCORDING TO A USER'S GESTURE AND IDENTITY

The present invention discloses methods and systems for performing at least one action at a system according to a user's gesture information. The required steps comprises of capturing the user's gestures information by a mobile apparatus, wherein the apparatus comprises an antenna, a processor, a storage medium, at least one accelerometer, wherein the accelerometer has at least 3 axis; comparing gesture information against one or more predefined gesture information at the mobile apparatus and when the gesture information matches a predefined gesture information, the mobile apparatus selects a first identity based on the predefined gesture information, sends encrypted information to a system through a reader wherein the encrypted information comprises the predefined gesture information, the first identity, a timestamp, and a device identity. The system performs at least one action according to the encrypted information. When the gesture information does not match any pre-defined gesture information, the mobile apparatus sends a failure notice to the user. The mobile apparatus or device does not send the encrypted information unless the device is physically close to the reader by a first wireless signal strength.