Patent classifications
H04M1/72463
CONTEXT-BASED NOTIFICATIONS PRESENTATION
The present disclosure is related to automatically, based on contextual information and without needing explicit input from a user, modifying one or more settings associated with presenting a notification. In examples, settings may include automatically suspending notification presentation or automatically overriding a notification setting that suspends notification presentation. In addition, contextual information may include, among other things, information related to a computing device (e.g., device location or network signal strength), a rate of user interaction or engagement with an application (e.g., rate of information sharing, user reactions, etc.), and/or a calendar or schedule of a user. In examples, the contextual information may be analyzed (e.g., based on comparison to a threshold) to determine whether a condition is met, and based on the analysis, the one or more settings may be modified.
Quiet hours for notifications
In some implementations, a computing device can be configured to automatically turn off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Quiet hours for notifications
In some implementations, a computing device can be configured to automatically turn off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Device independent encrypted content access system
Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.
DEVICES WITH FOUND DEVICE ALERT APPLICATIONS
In example implementations, a mobile device is provided. The mobile device includes a button input, a wireless communication interface, a memory, and a processor. The input is to initiate a found device alert application from a locked screen of the mobile device. The wireless communication interface is to send a found device alert notification. The memory is to store user defined third-party contact information and the found device alert application. The processor is to execute the found device alert application in response to a signal generated by the input. The processor is to generate the found device alert notification and cause the wireless communication interface to transmit the found device alert notification to a location indicated by the third-party contact information.
Electronic apparatus and method of selectively applying security mode in mobile device
A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.
Electronic apparatus and method of selectively applying security mode in mobile device
A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.
Modify voice calls with a moving driver to reduce distractions
A system for reducing traffic accidents caused by distraction from a mobile telecom device. The system detects when the device is near a driver's seat of a moving vehicle. While the system is carrying a voice call between a remote voice device and the mobile device, the system modifies voice signal transmission between the devices by periodically playing a beep or other signal to remind the parties that one of them is driving and suspends voice signal transmission from the remote device to the mobile device when the system detects that circumstances affecting level of attention required for driving merit the driver paying greater attention.
SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR TIMER-BASED MANAGEMENT OF COMMUNICATION DEVICES
A method of management of a communication device in an aircraft may include transitioning the communication device from a normal mode to a disabled mode based on a calculated device sleep time based on data associated with transportation information of the device. One of these modes may be a state of the device in which a transceiver of the device is deactivated and the other mode may be a state of the device in which the transceiver is activated. Therefore, the device sleep time determines when the wireless device's transceiver may not be activated.
STANDARD MOBILE COMMUNICATION DEVICE DISTRACTION PREVENTION AND SAFETY PROTOCOLS
Methods and systems for providing standardized mobile device distraction prevention and safety protocols are disclosed. In particular, an embodiment of a method for activating a distraction prevention or safety protocol behavior in a mobile device when the mobile device satisfies a specific condition is disclosed. The method includes discovering one or more protocol activators configured to transmit discovery information associated with a specific condition. The method further includes activating distraction prevention safety protocol behavior in the mobile device based at least in part on the discovery information. In an implementation, the specific condition may be a specified environment itself and or include an event when the mobile device enters a specified environment or a specified sequence of numbers is dialed from the mobile device.