Method and apparatus for controlling access to applications
A technology of application program and control pair, applied in the field of application program, can solve problems such as unreliable authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Reference will now be made in detail to various embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the inventive aspects of the invention. It will be apparent, however, to those skilled in the art that the inventive aspects of the invention may be practiced without these specific details. In other instances, well-known methods, procedures, systems, and components have not been described in detail so as not to unnecessarily obscure aspects of the various embodiments.
[0028] figure 1 A mobile device 120 is illustrated in which multiple applications 122 , 124 , and 126 are accessible based on multiple security levels in response to speaker 110 voice commands in accordance with one embodiment of the invention. Mobile device 120 includes applications 122 , 124 , and 126 , which are accessible in response to voice comman...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com