Multiple-access-level lock screen

A lock screen, access level technology, applied in the field of multi-level access lock screen

Active Publication Date: 2012-04-04
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although various improvements have been made in balancing security, pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple-access-level lock screen
  • Multiple-access-level lock screen
  • Multiple-access-level lock screen

Examples

Experimental program
Comparison scheme
Effect test

example 4

[0025] Example 4 - An Exemplary System Employing Various Technology Combinations

[0026] figure 1 is a block diagram of an example system 100 that implements one or more of the multi-level access lock screen techniques described herein. In this example, computing device 105 implements a multi-level access lock screen utility 120 that accepts user input 110 . User input 110 may include touch-based user input, such as one or more gestures on a touch screen. For example, a device operating system (OS) with a touch-based user interface (UI) system may receive touch-based user input information (e.g., indication information such as speed, direction, etc.), interpret it, and provide the interpreted touch-based User enters information to submit to multi-level access lock screen tool. Alternatively, user input 110 may include other input, such as keyboard input.

[0027] The multi-level access lock screen tool 120 presents a lock screen pane to the user. The multi-level access l...

example 8

[0042] Example 8 - An Exemplary Method of Applying a Combination of Techniques

[0043] figure 2 is a flowchart of an exemplary method 200 for implementing one or more of the multi-level access lock screen techniques described herein, and the method may be used, for example, in figure 1 implemented in the system shown. The techniques described herein may be generalized to operating system or hardware details, and may be applied in any of a variety of environments to take advantage of the described features.

[0044] At 210, the computing device receives a selection input comprising one or more gestures at a touchscreen of the computing device. For example, a user performs a gesture on a touchscreen of a computing device in a locked state. At 220, in response to the selection input, the computing device selects a first lock screen pane of the plurality of lock screen panes in the multi-level access lock screen user interface. Each lock screen pane of the plurality of lock ...

example 13

[0061] Example 13 - An Exemplary Method of Applying a Combination of Techniques

[0062] Figure 5 is a flowchart of an exemplary method 500 for implementing the multi-level access lock screen techniques described herein, and may be used, for example, in figure 1 implemented in the system shown.

[0063] At 510, the system receives an indicator at a computing device. For example, the system may receive a new text message or some other event, such as an indicator of a phone call. At 520, in response to the indicator, the system selects a lock screen pane from a multi-level access lock screen user interface that includes multiple lock screen panes, each lock screen pane associated with a different access screen having a corresponding different functionality. grades are associated. Such a lock screen pane may be referred to as an event-triggered lock screen pane. The selected lock screen pane is associated with an access level having a corresponding functionality associated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multiple-access-level lock screen system allows different levels of functionality to be accessed on a computing device. For example, when a device is in a locked state, a user can select (e.g., by making one or more gestures on a touchscreen) a full-access lock screen pane and provide input that causes the device to be fully unlocked, or a user can select a partial-access lock screen pane and provide input that causes only certain resources (e.g., particular applications, attached devices, documents, etc.) to be accessible. Lock screen panes also can be selected (e.g., automatically) in response to events. For example, when a device is in a locked state, a messaging access lock screen pane can be selected automatically in response to an incoming message, and a user can provide input at the messaging access lock screen pane that causes only a messaging application to be accessible.

Description

technical field [0001] The present application relates to a multi-level access lock screen technology, in particular, to a multi-level access lock screen technology including multiple lock screen panes. Background technique [0002] The conflicting balance between security, privacy, and usability becomes an important part of designing computing devices. For example, the increasing functionality of mobile computing devices, such as smartphones, makes it more likely that such devices will be shared among several users. A common scenario occurs when a user is with a group of family members or friends and someone borrows the user device to watch videos, view pictures, listen to music, play games, make phone calls, send messages, search for information on the Internet, etc. On the other hand, the advanced functionality of mobile computing devices (and the high reliance and trust that many users place on their devices) also makes such devices more likely to contain sensitive info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F3/048
CPCG06F21/31G06F21/629G06F21/36
Inventor W·维莱拉特
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products