Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for implementing a secure lock screen

A security lock and lock mode technology, applied in computer security devices, data processing input/output processes, instruments, etc., can solve the problem of overall security at risk, etc.

Active Publication Date: 2019-04-02
APPLE INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, overall security continues to be at risk when traditional lock screens are implemented on computing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing a secure lock screen
  • Method and system for implementing a secure lock screen
  • Method and system for implementing a secure lock screen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] This section provides representative applications of methods and apparatus according to the presently described embodiments. These examples are provided only to add context and aid understanding of the described embodiments. It will thus be apparent to those skilled in the art that the presently described embodiments may be practiced without all or a portion of these specific embodiments. In other instances, well known process steps have not been described in detail to avoid unnecessarily obscuring the presently described embodiments. Other applications are possible, so the following examples should not be taken as limiting.

[0015] Embodiments disclosed herein set forth a technique for implementing a lock screen on a computing device. According to one embodiment, the secure lock screen is configured to allow specific applications to display their content, such as the main user interface (UI) or sub-UIs (referred to herein as widgets), while maintaining a desired ove...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for implementing a secure lock screen is disclosed herein. The secure lock screen is configured to allow certain applications to display their content (such as the main user interface (UI), etc.) while maintaining a desired overall level of security for the computing device. The graphical environments representing the drawing destinations associated with the application are tagged with entitlement information indicating whether each graphical environment should be displayed on the computing device when the computing device is in a locked mode. Specifically, the application manager tags each application that is initialized, where the tagging is based on the level of entitlement the application possesses. Then, the rendering server managing the graphics environment can recognize the tagged entitlement information and display or suppress the application's content according to the application's entitlement.

Description

technical field [0001] The described embodiments set forth a technique for implementing a secure lock screen on a computer device. Background technique [0002] Recent years have demonstrated an explosion in the number of individuals owning and operating computing devices (eg, smartphones and tablets). Typically, an individual uses his or her computing device to perform different types of activities throughout the day, such as making phone calls, sending and receiving electronic messages, accessing the Internet, and so on. Therefore, due to the sensitivity of the data typically stored on computing devices, the security level of computing devices is scrutinized. This data may include, for example, address book information, e-mail information, photographs, and the like. [0003] One method that attempts to provide a form of security includes a lock screen that can be done manually or automatically. Specifically, when in the lock screen, the lock screen is designed to allow ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/54G06F21/60
CPCG06F21/44G06F21/54G06F21/604G06F2221/2141G06F21/6281G06F21/31G06F3/0481G06F21/6218
Inventor M·E·谢泼德J·H·沙法尔张晨迪D·O·席姆夫B·E·尼尔森C·W·扎瓦奇
Owner APPLE INC