Unlock instant, AI-driven research and patent intelligence for your innovation.

Contextual device locking/unlocking

A technology of equipment and computing equipment, applied in the direction of branch office equipment, internal/peripheral computer component protection, unauthorized/fraud phone call prevention, etc.

Active Publication Date: 2015-07-01
META PLATFORMS INC
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The event can be a lock trigger event or an unlock trigger event

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Contextual device locking/unlocking
  • Contextual device locking/unlocking
  • Contextual device locking/unlocking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Figure 1A and Figure 1B is an exemplary page wireframe of an embodiment of contextual locking / unlocking of a user computing device. In a particular embodiment, the mobile device 100 includes a touch screen 105 and a camera 110 . The mobile device 100 can connect to the social networking system through a communication network such as a cellular network or Wi-Fi. exist Figure 4 Specific embodiments of a network environment associated with a social networking system are described in further detail in related texts of this specification. The mobile device 100 is able to detect its own location via GPS. The mobile device 100 may also include an accelerometer capable of detecting motion of the mobile device 100 in three dimensions. The mobile device 100 may also include a gyroscope that detects the orientation of the mobile device 100 (eg, detects whether the mobile device 100 is tilted up or down, or turned horizontally). The mobile device 100 may further include sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.

Description

technical field [0001] The present invention relates generally to computing devices and, in particular, to security measures for computing devices. Specifically, the present invention relates to a method, a computer-readable non-transitory storage medium, and a computing device. Background technique [0002] A computing device such as a smartphone, tablet, or laptop may include functionality to determine its position, direction, or orientation, such as a GPS receiver, compass, or gyroscope, among others. The device may also include functionality for wireless communication, such as Bluetooth communication, near field communication (NFC), or infrared (IR) communication, or communication with a wireless local area network (WLAN) or a cellular telephone network. The device may also include one or more cameras, scanners, touch screens, microphones, or speakers, among others. Computing devices may also execute software applications such as games, web browsers, or social networki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30H04M1/72448H04M1/72454
CPCH04M1/66G06Q10/10G06F21/30G06F21/88H04L67/18H04L63/101H04M1/72563G06Q50/01G06F21/32H04M1/72569G06F21/31G06F2221/032G06F2221/2139H04M1/72454H04L67/52H04M1/72448
Inventor 乔纳森·阿里·马图斯
Owner META PLATFORMS INC