COMPUTATIONALLY IMPLEMENTED METHOD WITH LOCKDOWN CAPABILITY
20170372047 · 2017-12-28
Inventors
Cpc classification
H04W4/021
ELECTRICITY
International classification
Abstract
The present invention relates to a computationally implemented method wherein the computationally implemented method enables its use on the user smart device and run on Android/IOS platforms. The present invention enables at least one user to use the computationally implemented method on a smart device and also enables at least one mentor to use the same computationally implemented method at the same time, wherein the use of this computationally implemented method by the mentor enables the mentor to control the computationally implemented method of the user through the lockdown mode. The lockdown mode of the mentor enables him/her to control the computationally implemented method of the user and thus lock the smart device of the user to restrain the user from opening any other application, close out of the computationally implemented method, or receive any notification during the use of the computationally implemented method.
Claims
1- A computationally implemented method comprising: a. setting a lock down code, by using a lock down unit, enabled on a computer or smart device, wherein the lock down unit enables entering the lock down code via at least one of a mentor in a smart device of at least one of a user; b. setting a time restriction on the lock down code, wherein the time restriction on the lock down code enables the user smart device to function as the computationally implemented method for the period of time; and c. exiting the lock down unit, wherein the exit through the lock down unit is enabled by entering the lock down code.
2- The method in claim 1; wherein the computationally implemented method do not allow any incoming calls, texts, emails or push notifications on the user smart device.
3- The method in claim 1; wherein after entering the lock down code there appears a notification enabling at least one of the mentor to know about a current status of at least one of the user.
4- The method in claim 1; wherein an alert system enables at least one of the mentors to know about the activity of at least one the user.
5- The method in claim 1; wherein the computationally implemented method implements automatic and manual date restriction for the usage of the computationally implemented method by at least one of the user or by at least one of the mentor.
6- The method in claim 1; wherein the computationally implementation method further enables automatic deletion of history of at least one of the user wherein the deletion is either enabled by at least one of the mentor or at least one of the user.
7- The method in claim 1; wherein the computationally implemented method providing number of data mining options is to be accessed by at least one of the user or by at least one of the mentor, wherein the data mining options enable showing the usage of the computationally implemented method and its features to indicate statistics on the performance of the users.
8- The method in claim 1; wherein the computationally implemented method further provides variations like English dictionary, calculator, formula sheets and options for various subjects to at least one of the user and to at least one of the mentor.
9- The method in claim 1; wherein the computationally implemented method is provided with zoom in and zooms out feature.
10- The method in claim 1; wherein the lock down code created further comprises individual and mass lock down code feature.
11- A computationally implemented method comprising: a. setting a lock down code by using a lock down unit, wherein the lock down unit enables entering the lock down code via at least one of a mentor in at least one of a user smart device; b. setting a time restriction on the lock down code, wherein the time restriction on the lock down code enables the user smart device to function as the computationally implemented method for the period of time; and c. providing a double security measures, wherein the double security enables the entry and exit through the lock down unit by enabling time restriction on the lock down code.
12- The method in claim 11; wherein the computationally implemented method do not allow any incoming calls, texts, emails or push notifications on the user smart device.
13- The method in claim 11; wherein after entering the lock down code there appears a notification enabling at least one of the mentor to know about a current status of at least one of the user.
14- The method in claim 11; wherein an alert system enables at least one of the mentors to know about the activity of at least one the user.
15- The method in claim 11; wherein the computationally implemented method implements automatic and manual date restriction for the usage of the computationally implemented method by at least one of the user or by at least one of the mentor.
16- The method in claim 11; wherein the computationally implementation method further enables automatic deletion of history of at least one of the user wherein the deletion is either enabled by at least one of the mentor or at least one of the user.
17- The method in claim 11; wherein the computationally implemented method providing number of data mining options is to be accessed by at least one of the user or by at least one of the mentor.
18- The method in claim 11; wherein the computationally implemented method further provides variations like English dictionary, calculator, formula sheets and options for various subjects to at least one of the user and to at least one of the mentor.
19- The method in claim 11; wherein the computationally implemented method is provided with zoom in and zooms out feature.
20- The method in claim 11; wherein the lock down code created further comprises individual and mass lock down code feature.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] The following drawings illustrates exemplary embodiment; however, they are helpful in illustrating objects, features and advantages of the present invention because the present invention will be more apparent from the following detailed description taken in conjunction with accompanying drawings in which:
[0013]
DETAIL DESCRIPTION OF THE INVENTION
[0014] Reference will now be made in detail to the exemplary embodiment (s) of the invention, examples of which are illustrated in the accompanying drawings. Whenever possible, the same reference numerals will be used throughout the drawings to refer to the same or like parts.
[0015] References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a particular feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment” does not necessarily refer to the same embodiment.
[0016] Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although any methods and materials similar or equivalent to those described herein can also be used in the practice or testing of the present invention, the preferred methods and materials are now described. All publications, patents and patent computationally implemented methods mentioned herein are incorporated herein in their entirety.
[0017] The present invention relates to a computationally implemented method which enables its use on the user smart device and runs on Android/IOS platforms but not limited to these only. The present invention enables at least one user to use the computationally implemented method on a smart device and also enables at least one mentor to use the same computationally implemented method at the same time, wherein the use of this computationally implemented method is for controlling the computationally implemented method of the user through the lockdown mode by the mentor. The lockdown mode of the mentor enables him/her to control the computationally implemented method of the user and thus lock the smart device of the user to restrain the user from opening any other application, close out of the computationally implemented method or receive any notification during the use of the computationally implemented method. Therefore, converting the user smart device solely into a computationally implemented method, wherein during the lockdown mode wherein the user cannot exit out the computationally implemented method, cannot call, send text, open other application, receive new notification, open internet, other social media sites, take pictures and also the user smart device do not make any noise during the lock down mode.
[0018]
[0019] STEP.102 of
[0020] STEP.104 of
[0021] STEP.106 of
[0022] STEP.108 of
[0023] In the preferred embodiment of the present invention the method is been used by a teacher wherein, the teacher is enabled to register on the computationally implemented method, and is also enabled to create a group of students from the class. The teacher provides the group of students a name and a unique code. The students get entered into the group by two ways: [0024] I. the teacher is enabled to send the students a unique code for enabling the lock down mode and have the student text/email it to a general account; or [0025] II. the teacher is enabled to add students manually by entering their email/unique code that is linked with the student's account.
Once a student is registered into an account, his/her name appears in black on the roster displayed on the computationally implemented method of the teacher. The teacher selects the unique ID appearing by the name of the student in the roster (in case they have students with the same name). When the teacher wants to set the group of students into lockdown mode, the teacher first selects the group of students and customizes the computationally implemented method if he/she chooses to do so. To customize the computationally implemented method, the teacher clicks the link which pull up all computationally implemented method functionalities. The teacher is enabled to “X” out any functions he/she does not want the student to use at that time (eventually add date and time range). The teacher then tells the students to open the computationally implemented method computationally implemented method on their smart device and select the “lockdown mode”. The student then get prompted to log in and enter their email/ID linked to the account. Once the student has logged in, his/her name now appear in green with a check mark next to it and his/her smart device have a green border on the screen. If a student tries to back out at this point, his/her name goes to red with an X by it and the border turn red. As the students are all logging in, the teacher enter the timer and the lockdown code that they create. Once all students names are in green, the teacher select “enter lockdown code.” When the teacher does this a “starts timer” button appears on the student's device. If the student tried to exit, open another application at this point, their name appear in red with an X, the border on his/her smart device turn red, and the website/app make a noise to notify the teacher. If the teacher is controlling it by their own device, it pop up as a notification banner. The student also not able to have access to the computationally implemented method until he/she actuates “start timer.”
[0026] In other embodiment of the present invention if a student is in class and the computationally implemented method is in lock down mode, the teacher prompts the student to go to “Lockdown Mode” and the student have to sign in using his/her email/ID (if they have forgotten this, the teacher is enabled to look it up in the class settings). The student is able to change the email linked to the account but cannot change the ID. Once a student logs in, his/her name appears in green with a check mark next to it and if he/she tries to open any other application or exit out his/her name appear in red with an X by it and notify the teacher.
[0027] In another embodiment of the present invention, the parent is enabled to create a login/ID for the user, wherein the user is enabled to login using the email/ID created by his/her parent and the user remain in the parent's account until the parent deletes the user from his/her account. Herein, the user name show up in black on the parent's home page and the parent instruct the user to open the computationally implemented method and select “Lockdown Mode” which then prompt the user to login using the account created by the parent. Once the user has done this, his/her name appears in green with a check mark next to it on the computationally implemented method of the parent and the parent is then enabled to enter in a timer with a lockdown code. Once the parent hits “enter lockdown code” the user get a “start timer” option to open the computationally implemented method and a green border appear showing it is in lockdown mode. The parent then unlocks the user device manually, through his/her own computationally implemented method or let the timer run out.
[0028] While the invention has been described in detail with specific reference to preferred embodiments thereof, it is understood that variations and modifications thereof may be made without departing from the true spirit and scope of the invention.