US20130305354A1 - Restricted execution modes - Google Patents
Restricted execution modes Download PDFInfo
- Publication number
- US20130305354A1 US20130305354A1 US13/726,099 US201213726099A US2013305354A1 US 20130305354 A1 US20130305354 A1 US 20130305354A1 US 201213726099 A US201213726099 A US 201213726099A US 2013305354 A1 US2013305354 A1 US 2013305354A1
- Authority
- US
- United States
- Prior art keywords
- application
- shared
- restricted execution
- access
- device application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/68—Gesture-dependent or behaviour-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- a mobile phone can be used for text, email, and voice communications, but may also be used for entertainment, such as to listen to music, surf the Internet, watch video content, gaming, and for photo and video imaging.
- a portable tablet device may be utilized for email, browser, navigation, and other computing applications, as well as for the various entertainment and photo features.
- a seemingly unlimited number of third-party applications and features are also available for download to a device.
- Parents of younger children that do not yet have their own mobile phones often find that a child wants to “play” with their phone to play games, take pictures, listen to music, and other activities.
- a parent may pass his or her phone to a young child in the back seat of the car while driving to keep the child entertained.
- the parent may not know then what features and applications the childe access on the device, such as a Web browser or unintentionally accessing an email application, or which device settings may have been changed, such as audio settings, alarm settings, calendar notices, and the like.
- a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface happens without receiving a PIN code or other authentication credential entered on the device lock screen.
- the mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated.
- the restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated.
- the restricted execution service restricts device application access to the device content via the shared device application while the restricted execution mode is activated when the device application calls the shared device application with a request for the device content.
- the restricted execution service can allow the device application access to the device content via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content.
- the request token indicates that the device application is permitted to access the device content via the shared device application in the shared space.
- a device application may be implemented or designed so that a user can designate to allow the device application access to the device content if the device application is included in the shared space as a shared device application.
- a device application may be designed as not to be allowed access to the device content even if the device application is included in the shared space.
- this type of a device application may also be implemented as not even being eligible for user-designation to be included in the shared space.
- a device application that is included in the shared space can initiate a task call to access the device content.
- the restricted execution service restricts access to the device content based on one or more of the device application tasks being designated as restricted while the restricted execution mode is activated.
- the restricted execution service can also restrict the device application from a file system of the mobile device while the restricted execution mode is activated.
- FIG. 1 illustrates an example of restricted execution modes.
- FIG. 2 illustrates an example system in which embodiments of restricted execution modes can be implemented.
- FIG. 3 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments.
- FIG. 4 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments.
- FIG. 5 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments.
- FIG. 6 illustrates an example system in which embodiments of private interaction hubs can be implemented.
- FIG. 7 illustrates an example system in which embodiments of restricted execution modes and/or family coordination can be implemented.
- FIG. 8 illustrates various client device services and features in accordance with one or more embodiments.
- FIG. 9 illustrates examples of a family hub in accordance with one or more embodiments.
- FIG. 10 illustrates an example system with an example device that can implement embodiments of restricted execution modes.
- Embodiments of restricted execution modes are described and provide a restricted execution service that can be implemented as a client device service or application, such as in a mobile phone, portable tablet device, or other type of computing and/or communication device.
- Restricted execution modes enable implementation of a shared space on a device where a user owner can include device applications that a guest or child can access without requiring a password, and the device applications will be programmatically prevented from being able to access other private device content on the device.
- Restricted execution modes enable the user owner to make some experiences available without password access, and without compromising the security of sensitive personal or corporate data.
- restricted execution modes allow applications to run, but restricts access to sensitive data or experiences using several mechanisms, such as security capabilities, blocked navigation, and application origin. If an application has a particular security capability, a runtime check is made centrally when the application attempts to access a protected resource, and if the application is running in a restricted execution zone, an error is returned that can be handled by the application.
- a device application may be referred to as running in a restricted execution “zone”.
- An application task which is generally synonymous to an application programming interface (or API) call, may include aspects of a data access API call, but it also includes a request to initiate a particular action or actions different than data access, and the task request may incorporate metadata associated with the action of the requested task.
- API application programming interface
- the level of functionality is provided on a task-by-task basis to determine whether the action or actions of a requested task will be available in the restricted execution mode during run-time origination of a task request.
- a device application can be executed by the device, but only some functions of the device application will execute when the restricted execution mode is activated on the device.
- Examples of restricting the functionality of a device application may include not permitting the device application to be launched altogether or limiting the device application to calling only a restricted subset of API calls that is narrower than the normal set of API calls available to the application when the mobile device is running in normal user mode.
- Restricting access to device content also may include disallowing certain API calls that provide access to particular sets of data or content.
- restricting functionality or access does not include analyzing or changing Access Control Lists (ACLs), Access Control Entries (ACEs), or similar file-system access control metadata maintained by a file system.
- ACLs Access Control Lists
- ACEs Access Control Entries
- a device application can be restricted from access to device content while a restricted execution mode is activated on a device.
- FIG. 1 illustrates an example of user interfaces of a restricted execution mode.
- An example mobile device 100 may be any one or combination of a mobile phone, tablet device, computing device, communication, entertainment, gaming, navigation, and/or other type of portable electronic device.
- a shared space can be implemented for user access to functionality of device applications without a password, as well as for access to any applications, functions, and features of the mobile device 100 that are designated by the user in the shared space.
- the example mobile device 100 includes an integrated display device 102 on which user interfaces can be displayed, such as a device lock screen 104 that indicates the device is locked at 106 .
- a user owner of the mobile device may set-up the device to lock when not in use so that someone else cannot access the full functionality of applications, such as email and text, and/or have access to the Internet via a browser application without providing authentication credentials such as a personal identification number (PIN), login, or other authentication credential.
- PIN personal identification number
- the user owner of the mobile device 100 can allow another person to use the phone, and hand the phone over without having to unlock the device from the device lock screen 104 by entering a PIN or other credential.
- a person that has borrowed the phone can swipe the device lock screen with a gesture input to access a shared space user interface 110 , which is illustrated at 112 when displayed on the display device, and which provides access to a limited subset of application functionality.
- the borrower does not enter a PIN or other credential to access the shared space user interface.
- the gesture input may be any type of user and/or gesture input in any direction on the integrated display device 102 of the mobile device.
- any type of device, button, and/or gesture inputs may be utilized effective to transition from the device lock screen 104 to the shared space user interface 110 .
- FIG. 2 illustrates an example system 200 in which embodiments of restricted execution modes can be implemented.
- the example system includes the mobile device 100 as described with reference to FIG. 1 , with the integrated display device 102 on which a user interface can be displayed, such as the shared space user interface 110 that is representative of a shared space on the device.
- the mobile device can be implemented with various components, such as a processor and/or memory system, as well as any number and combination of differing components as further described with reference to the example device shown in FIG. 10 to implement embodiments of restricted execution modes.
- the mobile device 100 includes a restricted execution service 202 that can be implemented as a software application (e.g., executable instructions) stored on computer-readable storage media, such as any suitable memory device or electronic data storage. Additionally, the restricted execution service 202 can be executed with a processing system at the mobile device to implement embodiments of restricted execution modes as described herein.
- the restricted execution service 202 may be implemented as an independent device application that is executable on the device to interface with the many applications, features, and functions of the device.
- the example system 200 may also include a cloud storage and service 206 that can include any type of cloud-based (e.g., network-based) data services 208 used to store or maintain accessible data 210 (e.g., data accessible by device applications on the mobile device 100 ).
- cloud-based e.g., network-based
- Any of the devices and services (e.g., implemented as server devices) described herein can communicate via a network 212 , which can be implemented to include a wired and/or a wireless network.
- the network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet.
- the network may also include mobile operator networks that are managed by a mobile network operator and/or other network operators, such as a communication service provider, mobile phone provider, and/or Internet service provider.
- mobile network operator such as a mobile network operator and/or other network operators, such as a communication service provider, mobile phone provider, and/or Internet service provider.
- peer-to-peer communication techniques may be utilized, such as multiple devices connected using a peer-to-peer communication network.
- the restricted execution service 202 is implemented to manage a restricted execution mode 214 of a shared space 216 , such as to limit and/or restrict device applications 218 and shared device applications 220 that are included in the shared space 216 that is accessible without a PIN or authentication credential.
- the device applications 218 can include any type of software applications, and the functions and features thereof, that run on the device, such as for user interaction with messaging, gaming, media playback, document viewing, and communication applications.
- the device applications may also include system-level components that users of a device generally do not access or utilize, but that typically run in the background while the device is operational.
- the shared device applications can include any subset of the device applications, and are designated as a shared device application when included in the shared space 216 for limited and/or restricted functionality when a restricted execution mode 214 is activated on the device.
- a user owner of the mobile device 100 can choose the device applications and features, and/or device content, that can be included in the shared space and accessed by a child or guest while the restricted execution mode is activated.
- a device application may be allowed a restricted level of functionality while running in the shared space (i.e., the application may be executed), yet generally cannot access device content 222 that is restricted from access, such as contacts, email, and calendar databases, as well as limited access to the device file system.
- the content databases, device file system, Internet access, and other device content and features can be protected from device application access when the restricted execution mode is activated.
- a device application that can access the Internet, email, contacts, etc. when a device is unlocked and operating in a normal user mode will be automatically restricted when the restricted execution mode is activated, such as if the device application has been added to the shared space and is allowed limited functionality in the shared space.
- a digital camera application that has been added to the shared space may allow a user to take and view new photos, but previous photos will be restricted from viewing the restricted execution mode is activated on the device.
- the shared space user interface 110 of the shared space is customizable by the user owner of the device.
- the user owner can add applications, such as games and music applications, to the shared space so that the applications are recognized and can be launched in the shared space, perhaps with limited functionality.
- applications that are not recognized in the shared space cannot be launched in the shared space.
- the restricted execution service 202 will check if the browser application is pinned and recognized in the shared space. If the browser application is not recognized in the shared space, then the restricted execution service will fail to launch the application, or if the browser application is recognized, then the browser application can be launched in the shared space by the game application.
- an input can be received, such as a gesture input or device selectable control input, and the restricted execution service 202 initiates a transition from displaying the device lock screen 104 to display the shared space user interface 110 of the shared space 216 without receiving a PIN code or other authentication credential entered on the device lock screen.
- the restricted execution service 202 is implemented to manage the shared space 216 when the restricted execution mode 214 is activated.
- the restricted execution service 202 can activate the restricted execution mode 214 of the mobile device 100 , and restrict access of a device application 218 to the device content 222 , to a file system of the mobile device, and/or to limit the application to a limited set of functionality or tasks while the restricted execution mode is activated.
- the shared space 216 can include a shared device application 220 , and the restricted execution service 202 can allow the shared device application access to the device content 222 while the restricted execution mode 214 is activated.
- the restricted execution service 202 can determine whether a device application 218 is implemented or designed so that a user can designate to allow the device application access to the device content if the device application is included in the shared space 216 as a shared device application.
- a device application may be designed as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a device application may also be implemented as not even being eligible for user-designation to be included in the shared space.
- a configuration of a device application may be designed or programmed to indicate whether the device application is ever to be allowed to run (e.g., execute) in a restricted mode, irrespective of user choice.
- a confidential corporate application or another application downloaded from a third-party application store that may access private corporate data can be configured to never be allowed to run (e.g., execute) in any restricted mode, even if a user would like it to do so.
- a configuration of some device applications may be user-controlled to indicate whether the device application is to be allowed to run in a particular restricted mode, such as allowing a subset of games or applications in a kid zone restricted mode, or allowing a subset of camera lens applications to run when the phone is locked.
- the restricted execution service 202 can also be implemented to validate whether or not a given device application can be navigated to regardless of the reason for the navigation request, taking into account the current restricted mode and the target application's system and user configuration. Additionally, a separate navigation stack can be maintained for a normal mode user experience and for the current restricted execution mode. The restricted execution service 202 is also implemented to allow or disallow migration of applications from the normal mode stack to the restricted mode stack or vice-versa based on scenario needs, and to determine when to close applications on each stack based on available resources and transitions into and out of a restricted mode.
- a device application 218 may initiate a task call to a shared device application 220 with a request for the device content 222 , and the restricted execution service 202 can restrict the device application access to the device content via the shared device application while the restricted execution mode 214 is activated.
- the device application may also initiate a task call to the operating system 204 to request device content access, and the restricted execution service can restrict the access to the device content based on one or more device application tasks being designated as restricted while the restricted execution mode is activated.
- the device application 218 can initiate a task call to the shared device application 220 with a request for the device content 222 , and the request includes a request token that indicates the device application is permitted to access the device content via the shared device application in the shared space 216 .
- the restricted execution service 202 can then allow the device application access to the device content via the shared device application based on the request token while the restricted execution mode is activated.
- the restricted execution service can also deactivate the restricted execution mode 214 responsive to a PIN code or authentication credential entered on the device lock screen, and return to a normal user mode of the mobile device in which the device application 218 has unrestricted access to the device content 222 .
- the restricted execution service 200 implements a mechanism to indicate in which restricted modes a device application can run (e.g., execute) based on a task information field of a device application task.
- the task information field indicates whether a specific task can be allowed to execute in a shared space when the restricted execution mode is activated.
- This new field will be a bit mask, which a navigation server will use to compare to the navigation filter mask that MobileUI will give to it when a restricted mode is entered.
- These are marked per task instead of by application because some first-party device applications have tasks that can be allowed to function in a child share space (e.g., Kid's Corner), but not all of the application functionality is allowed while a restricted execution mode is activated on a device.
- the restricted execution service can trace an API task call through the application layer from an originator (e.g., device application) that initiates the task call based on a token that is passed along to a core system component that would not otherwise be able to determine whether the task call was originated from a device application running in the shared space.
- the token can be utilized to determine if the task call is protected from a restricted execution mode.
- Example methods 300 , 400 , and 500 are described with reference to respective FIGS. 3-5 in accordance with one or more embodiments of restricted execution modes.
- any of the services, components, modules, methods, and operations described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or any combination thereof.
- Example methods may be described in the general context of executable instructions stored on computer-readable storage media that is local and/or remote to a computer processing system, and implementations can include software applications, programs, functions, and the like.
- FIG. 3 illustrates example method(s) 300 of restricted execution modes.
- the order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method.
- a device lock screen is displayed on an integrated display device of a mobile device.
- the mobile device 100 FIG. 1
- the display is transitioned from the device lock screen to display a shared space user interface of a shared space without a PIN code or other authentication credential entered on the device lock screen.
- an input system of the mobile device 100 receives an input, such as a gesture input or device selectable control input, and the input is effective to transition from displaying the device lock screen 104 to display the shared space user interface 110 of a shared space 216 without a PIN code or other authentication credential entered on the device lock screen.
- a restricted execution mode of the mobile device is activated.
- the restricted execution service 202 at the mobile device 100 activates the restricted execution mode 214 of the mobile device in response to entering the shared space.
- access of a device application to device content is restricted while the restricted execution mode is activated.
- the restricted execution service 202 at the mobile device 100 restricts access of a device application 218 to the device content 222 while the restricted execution mode 214 is activated.
- the restricted execution mode is deactivated responsive to a PIN code or other authentication credential entered on the device lock screen.
- the restricted execution service 202 at the mobile device 100 deactivates the restricted execution mode responsive to a PIN code or other authentication credential entered on the device lock screen.
- the device returns to a user mode of the mobile device in which the device application has unrestricted access to the device content.
- the restricted execution service 202 at the mobile device 100 returns to a user mode of the mobile device in which the device application 218 has unrestricted access to the device content 222 .
- FIG. 4 illustrates example method(s) 400 of restricted execution mode.
- the order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method.
- a shared device application that is included in the shared space is allowed access to the device content while the restricted execution mode is activated.
- the restricted execution service 202 FIG. 2
- the mobile device 100 allows access to the device content 222 to a shared device application 220 that is included in the shared space 216 while the restricted execution mode is activated.
- the device application that requests access to the device content via the shared device application is restricted while the restricted execution mode is activated on the device.
- restricted execution service 202 at the mobile device 100 restricts a device application 218 task call to the shared device application 220 with a request to access the device content 222 while the restricted execution mode is activated on the device.
- the device application is allowed access to the device content via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content.
- restricted execution service 202 at the mobile device 100 allows access to the device content 222 by the device application 218 via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content.
- the request token indicates that the device application is permitted to access the device content via the shared device application in the shared space.
- FIG. 5 illustrates example method(s) 500 of restricted execution modes.
- the order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method.
- access to the device content is restricted based on device application tasks being designated as restricted while the restricted execution mode is activated, where the device application initiates a task call to access the device content.
- restricted execution service 202 FIG. 2
- restricted execution service 202 at the mobile device 100 restricts access to the device content 222 based on device application tasks being designated as restricted while the restricted execution mode 214 is activated, where a device application 218 initiates task calls to access the device content.
- the device application is restricted from a file system of the mobile device while the restricted execution mode is activated.
- restricted execution service 202 at the mobile device 100 restricts a device application 218 from a file system of the mobile device while the restricted execution mode is activated.
- the device application is determined as user-designated to allow the device application access to the device content in a restricted execution mode if the device application is included in the shared space as a shared device application.
- the device application is determined as designed as not to be allowed access to the device content even if the device application is included in the shared space.
- restricted execution service 202 at the mobile device 100 can determine whether a device application user-designated to allow the device application access to the device content in a restricted execution mode if the device application is included in the shared space as a shared device application.
- the restricted execution service 202 may also determine that a device application is designed (e.g., programmed) as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a programmed device application may also be implemented as not even being eligible for user-designation to be included in the shared space.
- a device application is designed (e.g., programmed) as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a programmed device application may also be implemented as not even being eligible for user-designation to be included in the shared space.
- a device provides multiple restricted execution modes, such as a first restricted execution mode associated with a child shared space for facilitating sharing a mobile device with a child and a second restricted execution mode associated with a safe driving shared space for facilitating safer driving by a user of a mobile device.
- These various restricted execution modes may each impose a different set of limitations on the functionality of the device.
- the child-related execution mode might block access to email data, changes to device settings, or in-app purchases, while the second driving safety restricted execution zone might block graphical user interfaces that could distract a driver from the road.
- a user may be able to reach different shared spaces, each of which has a different restricted execution mode associated with it. For example, from the lock screen, a user might enter a first gesture (e.g., a left swipe) to reach a first shared space having a first restricted execution mode and a second different gesture (e.g., a right swipe) to reach a second, different shared space having a second restricted execution mode.
- a shared space associated with a restricted execution mode may be accessed from different entry points than receiving an input (e.g., a gesture input) on the lock screen.
- restricted execution modes may be utilized to support and implement one or more restricted execution modes associated with a child shared space of a device for facilitating sharing the device with a child.
- This Restricted Execution Modes application incorporates a related U.S. patent application Ser. No. 13/726,095 filed Dec. 22, 2012 entitled “Mobile Device Child Share”, the disclosure of which is incorporated by reference herein in its entirety.
- Mobile device child share enables implementation of a “Kid's Corner” (also referred to as a kid space or child zone) for parental control of any applications, data, functions, and features of a mobile device so that a parent can allow a child to play with the device without having access to the restricted applications, data, functions, and features.
- Kid's Corner is a child shared space that provides a custom destination on a mobile phone just for a child, and where the child goes to “play” on the device.
- Child access is restricted with a restricted execution mode to only the applications, games, music, videos, movies and other content that a parent chooses. All of the settings and content outside of the Kid's Corner is protected and purchases can be blocked while in the Kid's Corner.
- the blocked and/or restricted applications and features of a mobile device may include the ability to make a phone call, send a text or access email, and access the Internet, such as to post to social networks or to search the Internet.
- restricted execution modes may be utilized to support and implement one or more restricted execution modes associated with a safe driving shared space of a device for facilitating safe driving modes.
- This Restricted Execution Modes application incorporates a related U.S. patent application Ser. No. 13/726,097 filed Dec. 22, 2012 entitled “Mobile Device Safe Driving”, the disclosure of which is incorporated by reference herein in its entirety.
- Mobile device safe driving enables implementation of one or more safe driving modes to minimize driver distractions of a mobile phone while driving a vehicle.
- FIG. 6 illustrates an example system 600 in which embodiments of private interaction hubs and restricted access modes can be implemented.
- the system 600 includes an example mobile device 602 , which may be any one or combination of a wired or wireless device, such as a mobile phone, tablet, computing, communication, entertainment, gaming, media playback, and/or other type of device. Any of the devices can be implemented with various components, such as a processing system and memory, as well as any number and combination of differing components as further described with reference to the example device shown in FIG. 10 .
- the mobile device 602 may implement techniques previously described in whole in or part, such as the techniques described with reference to the restricted execution service 202 .
- the mobile device 602 includes an integrated display device 604 on which user interfaces can be displayed, such as a hub user interface 606 of a hub application 608 .
- the hub user interface offers a unified interactive view of the hub data 610 for a single, private interaction hub and the hub application 608 aggregates disparate types of the hub data 610 originating from the various member users of the private interaction hub.
- the hub user interface may provide a single unified access point to shared hub messages, status updates, check-ins, hub calendar events, hub media, hub applications, and other types of hub content.
- a private interaction hub (or simply “hub”) is a private network or association of member users who voluntarily elect to privately interact and collaborate with each other in a bi-directional manner.
- the hub data 610 includes any shared data or metadata that is used to facilitate the interaction and collaboration between the members of a private interaction hub, and may include shared data for messaging, notes, contact management, documents, tasks, location updates, photos, calendar events, applications (to include collaborative gaming applications), and/or other media content, such as any type of audio, music, video, and/or image data that may be available or accessed from any source.
- the hub user interface can include various selectable user interface tiles 612 , such as a members tile that is selectable to initiate a display of the constituent members of the private interaction hub.
- the user interface tiles 612 may also include hub chat and/or messages tiles to allow a hub member to participate in shared messaging threads with the other member users of the hub. For example, as shown, the member “Bob” has asked “Anyone up for a round right now?”
- the user interface tiles 612 may also include a photo album tile that is selectable to view photos shared by any of the hub members with the hub, and a shared notebook tile from which the hub members can view shared notes.
- the golf hub may include a shared notes document that compiles the hub members' collective research of new golf equipment.
- the hub user interface 606 may also display a shared calendar that allows a member of the hub to view, edit, and post calendar events that will be shared with all of the other hub members.
- the calendar tile shows an upcoming tee time at St. Andrews on Saturday at 9:00 a.m. for all of the members.
- a group item e.g., the message from Bob
- tile e.g., the messaging tile
- further details about the selected item or group items related to the selected tile may be displayed by the hub application itself or the hub application may call a different device application 636 (e.g., a messaging application) to display further details about the item(s).
- the hub application may provide additional details or options to the user to permit the user to interact further with the hub data. For example, the hub application may display controls to allow the user to edit or reply to Bob's message. Alternatively or in addition, when a user selects or otherwise engages with a piece of displayed hub data (e.g., Bob's message), the hub application may launch or call another device application to permit the user to further interact with the piece of hub data (e.g., the hub application may call a native messaging application).
- the hub application may launch or call another device application to permit the user to further interact with the piece of hub data (e.g., the hub application may call a native messaging application).
- the hub user interface 606 of the hub application 608 can also include user-selectable access to third-party applications, such as when an application is “pinned” to, or otherwise shared with a private interaction hub.
- a pinned third-party application may also utilize the shared hub data, such as shared application preferences or shared application state data.
- the golf hub shown displayed in the hub user interface 606 includes a live tile representing a third-party weather application that the members of the hub can quickly access to check the weather forecast at their local golf club, such as when planning an upcoming golf outing.
- a user of the mobile device 602 can also customize display aspects of a hub user interface, such as the content of the user interface and how the elements of the hub user interface are arranged.
- Another example of a hub user interface of the hub application 608 is a panoramic hub user interface, such as for a family-centric private interaction hub as shown and described in greater detail with reference to FIG. 9 .
- the example system 600 also includes a hub management service 614 , and a cloud storage and service 616 .
- the hub management service 614 manages the formation and maintenance of private interaction hubs 618 .
- the hub management service can correlate or associate member users of a hub by associating account identifiers 620 of the members with one or more of the private interaction hubs.
- the account identifier 620 of a member user may be associated with an identifier of a private interaction hub 618 in a data table that the hub management service maintains to correlate the hub members with one or more of the private interaction hubs.
- the hub management service 614 may also associate devices that correspond to hub members based on device identifiers.
- the account identifiers 620 can include user membership identifiers and/or sign-on credentials, such as an email and password combination, or a username and password combination.
- the sign-on credentials may be single sign-on (“SSO”) credentials that are utilized for authentication purposes at a number of Web services, including the cloud storage and service 616 .
- the cloud storage and service 616 can include any type of cloud-based (e.g., network-based) data and messaging services 622 .
- the messaging services may include any type of email, text (e.g., SMS, MMS), and/or instant messaging services.
- the data services may include any type of calendar, photo album, file or document sharing, location, mapping, music sharing, video sharing, gaming, contacts management, and/or notebook services, as well as any other type of services that can be used to share stored hub data 624 .
- the stored hub data can include any form of messages, updates, events, content, media, and information that is maintained for the private interaction hubs 618 , and is accessible from the mobile device 602 , either upon a request from a device and/or upon a data “push” to the device.
- the cloud storage and service 616 also maintains stored hub metadata 626 that includes settings and information pertaining to the private interaction hubs 618 , such as the name of a hub, the background image or photo of the hub, and an association of the
- hub management service 614 and the cloud storage and service 616 are shown as independent services, they may be implemented together as a single service.
- a server device or group of server devices can include implementations of both the hub management service 614 and the cloud storage and service 616 , representative of a single entity that may be the same server system, company system, domain, and the like.
- the cloud storage and service 616 and its constituent data and messaging services 622 , interchange the stored hub data 624 and the stored hub metadata 626 between the mobile devices that are associated with member users of a private interaction hub 618 .
- a data and/or messaging service of the cloud storage and service 616 can receive a copy of hub data 610 and/or hub metadata 628 from the mobile device 602 that is used by a hub member, store this hub data and hub metadata in the cloud storage as the respective stored hub data 624 and stored hub metadata 626 , and then distribute the stored hub data and stored hub metadata to other mobile devices associated with other member users of the same private interaction hub, as well as to other mobile devices associated with the same hub member.
- the stored hub metadata 626 can include membership information pertaining to the member users of a private interaction hub, hub identifiers that correlate a piece of hub data to a particular private interaction hub, user identifiers that correlate a piece of hub data to a particular member user, modification dates, and/or other metadata.
- the cloud storage and service 616 may utilize single sign-on (“SSO”) credentials for authentication purposes to limit the dissemination of the stored hub data 624 and the stored hub metadata 626 to only the authorized devices of hub members.
- SSO single sign-on
- any of the devices and services (e.g., implemented as server devices) described herein can communicate via a network 630 , which can be implemented to include a wired and/or a wireless network.
- the network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet.
- the network may also include mobile operator networks that are managed by a mobile network operator and/or other network operators, such as a communication service provider, mobile phone provider, and/or Internet service provider.
- the mobile device 602 includes an operating system 632 of the device, and the operating system includes a hub operating system service 634 that is implemented to integrate cloud-based services, a hub application 608 , and local device applications 636 with the operating system to implement aspects of the private interaction hubs 618 .
- the aspects that may be implemented include hub formation and membership maintenance, synchronizing the hub data 610 on the mobile device with the stored hub data 624 , as well as the hub metadata 628 with the stored hub metadata 626 , with the cloud storage and service 616 , and providing the hub application 608 and the local device applications 636 on the mobile device 602 with access to the hub data 610 and the hub metadata 628 .
- the hub operating system service 634 may directly access the stored hub metadata 626 at the cloud storage and service 616 .
- the hub operating system service 634 may also determine and maintain a local copy of the membership associations of member users account identifiers 620 and identifiers of the private interaction hubs.
- the hub operating system service 634 may also synchronize the stored hub data 624 from the cloud storage and service 616 with the hub data 610 at the mobile device 602 , and synchronize the stored hub metadata 626 from the cloud storage and service with the hub metadata 628 at the mobile device.
- the hub operating system service 634 may also synchronize with the cloud storage and service 616 (e.g., by sending changes or additions to hub data 610 and hub metadata 628 to the cloud storage and service 616 ). Such data synchronizations may occur in response to a user launching the hub application.
- the mobile device 602 includes the device applications 636 that permit a user of the mobile device to access, create, and/or modify the hub data 610 , private data 638 of the user, as well as the stored hub data 624 that is managed by any of the data and messaging services 622 at the cloud storage and service 616 .
- Some or all of the device applications 636 may be implemented as client-side components or modules of any of the data and messaging services 622 , or may be implemented as standalone, native applications (e.g., local device applications) at the mobile device.
- the device applications 636 typically each consume and provide access to only a portion or subset of the hub data 610 and the private data 638 , such as only a single type of hub data and private data (e.g., only messaging data, but not calendar data).
- Private data is data or metadata that is not associated with a private interaction hub and that has not been shared with other members of the hub (e.g., data that has not been shared via the cloud storage and service 616 ).
- the device applications 636 at the mobile device 602 may include a native or third-party messaging application that provides a user with messaging alerts and access to messaging threads.
- the messaging application provides access to both shared message threads shared with a private interaction hub and private message threads between a user of the mobile device and others who are not members of the hub.
- the messaging application also allows a user to send a message to all of the hub members without accessing a hub user interface of the hub application.
- the messaging application may not provide user access to other types of the hub data 610 , other than the hub messages. For example, the messaging application may not provide access to the shared calendar events or shared photo albums of the hub.
- the device applications 636 may also include a native or third-party calendaring application that provides scheduling alerts and access to a visual calendar.
- the calendaring application provides user access to both shared calendar events that are shared with hub members, and private calendar events (e.g., Exchange calendar events) that have not been shared with other members of the hub.
- the calendaring application also allows a user to create and/or share a calendar event to all members of the hub without accessing a hub user interface of the hub application.
- the application may not provide user access to other types of the hub data 610 , other than the hub calendar events. For example, the calendaring application may not provide access to the shared message threads or shared photo albums of the hub.
- the device applications 636 may also include a native or third-party media viewing and/or editing application that provides access to photo albums of digital photos or other digital media.
- the media application provides user access to both shared media files (e.g., photos, videos, and/or music) shared with a private interaction hub, and private media files that have not been shared with other members of the hub.
- the media application also allows a user to share media files with all members of the hub without accessing a hub user interface of the hub application.
- the media application may not provide user access to other types of hub data 610 , other than hub media files. For example, the media application may not provide access to the shared message threads or shared calendar events of the hub.
- the hub operating system service 634 can expose one or more Application Programming Interfaces (“APIs”), application binary interfaces, and/or other types of interfaces 640 to the hub application 608 and to the device applications 636 on the mobile device 602 to allow these applications to access, generate, and/or modify the hub data 610 and/or the hub metadata 628 , as described herein.
- the hub operating system service 634 can be implemented as an integrated software component or module of the operating system 632 .
- the hub operating system service can be maintained at the mobile device 602 as executable instructions that are stored on computer-readable storage media, such as any suitable memory device or electronic data storage as described with reference to the example device shown in FIG. 10 . Additionally, the hub operating system service can be executed with a processing system at the mobile device to implement aspects of private interaction hubs.
- the hub operating system service 634 can initiate the hub management service 614 to provision a private interaction hub 618 .
- a user of the mobile device 602 can start a private interaction hub 618 and also invite others to join an existing private interaction hub.
- the hub user interface 606 of the hub application 608 may provide an existing hub member with the option to add a new member to the hub, and the user may identify the prospective member by providing either a mobile device number, or by selecting an existing contact from one of their social networks or other contacts.
- the hub operating system service 634 can receive the request from an existing member user of the device and, in response, the hub operating system service 634 and/or the hub management service 614 communicates an invitation to join the hub as an SMS, MMS, or instant message sent to the prospective member's mobile device that may include a link to a registration site or other registration instructions.
- the hub operating system service 634 and/or the hub management service 614 receives (e.g., via a registration website) an acceptance to the invitation to join the private interaction hub that includes at least an account identifier (such as an SSO credential), and associates the new member with the existing hub at the hub management service 614 .
- Updated membership information including the new member's account identifier 620 may also be propagated to other mobile devices of other members in the private interaction hub from the hub management service 614 .
- the new member user joins the hub he or she may be prompted to download and/or install various applications configured to provide access to the stored hub data 624 and the stored hub metadata 626 , such as the hub application 608 and/or the any of the device applications 636 .
- the hub application 608 may also be the entry point by which a user creates a new hub and/or modifies the membership of an existing hub.
- a private interaction hub 618 can be provisioned for any association of people, such as family members, coworkers, friends, neighbors, and any other people that may be associated together in a hub.
- a member user of one private interaction hub may also be a member of multiple hubs, which can be based on a single member sign-on that identifies the member to the hub operating system service 634 and/or to the hub management service 614 .
- a person may be a member of a family hub that associates members of the person's family, as well as a member of a neighborhood hub that associates members of the person's neighborhood, and a golf hub that associates the person's friends that often golf together.
- the integration of the hub application 608 with the operating system 632 of the mobile device provides that a user of the device can view a message or update on the hub user interface 606 and in an application user interface of an application that is associated with the message or the update.
- a hub calendar is integrated with the calendar application (e.g., a device application 636 ) on the mobile device 602 , and a calendar update that is displayed in the hub user interface 606 can be selected by the user to initiate the update being displayed in a calendar user interface of the calendar application.
- the user may view the calendar user interface and select a calendar event that is associated with a private interaction hub to initiate a display of the hub calendar, which includes the calendar event for the members of the hub.
- a hub calendar event can be displayed in a hub user interface, and the device calendar application can access and display the hub calendar event along with any private data calendar events that only the user of the device has access to view in a user interface of the device calendar application.
- the hub application 608 and the device application 636 both acquire the same hub calendar event data (e.g., the same hub data 610 stored on the mobile device).
- the two different user interfaces e.g., a hub user interface and a device application user interface
- the hub messages and chat features are integrated with messaging applications (e.g., the device applications 636 ) on the mobile device 602 , and an email, text, or instant message that is displayed in the hub user interface 606 can be selected by the user of the mobile device 602 to initiate the message being displayed in a messaging application user interface.
- the user may view a recent message from a member of a private interaction hub in a messaging application user interface, and select the message to initiate a display of the hub messages interface, such as to view the discussion thread associated with the recent message.
- the hub operating system service 634 at the mobile device 602 can receive social network updates for the member users of a private interaction hub 618 , such as when two or more of the members of the hub are also “friends” on a public social network site, such as (e.g., FACEBOOK®, TWITTER®, or LINKEDIN®).
- the social network updates can be pulled from a social network site based on the established association of the account identifiers 620 of the hub members of a private interaction hub 618 at the hub management service 614 .
- the hub operating system service 634 can then aggregate the social network updates for a particular hub for display in the hub user interface 606 or on a homepage “live tile” associated with the hub.
- the hub operating system service 634 at the mobile device 602 can also be implemented to coordinate multi-user interactive updates to an event that is managed in a private interaction hub. For example, several members of a hub may participate in a multi-player interactive game, and each successive interactive update from a member of the hub is initiated by the member at a respective associated mobile device.
- FIG. 7 illustrates an example system 700 in which various embodiments of private interaction hubs, restricted execution modes, and/or family coordination can be implemented.
- the example system includes a client device 702 , which may be any one or combination of a mobile phone 704 , tablet device 706 , computing device 708 , communication, entertainment, gaming, navigation, and/or other type of portable electronic device.
- client devices 710 can be implemented with various components, such as a processor and/or memory system, as well as any number and combination of differing components as further described with reference to the example device shown in FIG. 10 .
- the example system 700 includes a device association service 712 that associates or correlates the client devices 710 by device identifiers 714 , user identifiers 716 , and/or by any other type of identifiable association.
- Any of the devices and services can communicate via a network 718 , which can be implemented to include wired and/or wireless networks.
- the network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet.
- the network may also include mobile operator networks that are managed by mobile operators, such as a communication service provider, cell-phone provider, and/or Internet service provider. A mobile operator can facilitate mobile data and/or voice communication for any type of a wireless device or mobile phone.
- the client devices 710 can each be associated with a different user, and the users are defined members of a family 720 .
- the example client device 702 is representative of the various client devices 710 in the family. Any of the client devices in the family can include services, such as software applications (e.g., computer-executable instructions), that can be executed by a processor or processor system to implement the embodiments described herein.
- the client device 702 includes a family coordination architecture 722 that implements features of a family hub; a parental control service 724 that implements features of a parent dashboard; a family check-in service 726 ; a device quiet service 728 that implements features of quiet time and quiet zone; a safe driving service 730 ; and a device sharing service 732 .
- the client device services are further described with reference to FIG. 8 .
- any one or combination of the various client device services may be abstracted for implementation by a network service provider, such as the device association service 712 .
- the client devices 710 that are associated in the family 720 can be interconnected through a central computing device or system (e.g., may be one of the client devices 710 ), which may be local to the multiple devices or may be located remotely from the devices.
- the central computing device may be a cloud service of one or more server computers that are connected to the multiple devices via the network 718 or other communication link.
- the interconnection architecture enables functionality across multiple devices to provide a common and seamless experience to a user of the multiple devices.
- Each of the client devices may have different physical configurations and capabilities, and the central computing device implements a platform to enable delivery of an experience that is both tailored to a particular device and yet common to all of the devices.
- FIG. 8 further illustrates the various client device services that are described with reference to FIG. 7 .
- the client device 702 includes the family coordination architecture 722 , the parental control service 724 , the family check-in service 726 , the device quiet service 728 , the safe driving service 730 , and the device sharing service 732 , which may be embodied as the restricted execution service 202 described with reference to FIGS. 1-6 .
- the family coordination architecture 722 may generally be implemented as a service, as described herein.
- any of the described services may be implemented and/or described in the general context of software, firmware, hardware (e.g., fixed logic circuitry), manual processing, applications, routines, programs, objects, components, data structures, procedures, modules, functions, or any combination thereof.
- a software implementation represents program code that performs specified tasks when executed by a computer processor.
- any of the processing, computation, filtering, code execution, etc. can be implemented with distributed computing services and/or devices, such as on a client device, a server device, and/or network-based service.
- the family coordination architecture 722 includes a family hub manager 800 that implements, coordinates, and/or manages various family features, such as family calendar 802 , family chat 804 , family shared contacts 806 , family journal and memories 808 , tasks and chores 810 , family keys 812 , and family budget 814 .
- the parental control service 724 implements features such as a parent dashboard manager 816 , age appropriate content control 818 , and safe social networking 820 .
- the device quiet service 728 implements features such as quiet time 822 and quiet zone 824 .
- the client device services can include, be integrated with, or implement any of the other client device services and applications.
- the family coordination architecture 722 can include any one or combination of the parental control service 724 , the family check-in service 726 , the device quiet service 728 , the safe driving service 730 , and the device sharing service 732 .
- the family coordination architecture may be implemented for the coordination of time, messaging, data, activities, and any other shared services.
- the shared services may be any of the client device services and/or any type of shared services that may be associated with a service and/or multi-system operator (MSO) devices.
- MSO multi-system operator
- the parental control service can be implemented to throttle, expand, manage, and/or reallocate data sharing of the client device services.
- any of the family features and/or applications of the family coordination architecture can be implemented as private, some private and some public, or private with optional user control to share information and data with public third-party services and applications.
- any of the client device services and applications described herein may be private, public, sharable, user-controllable, and/or any combination thereof.
- the family coordination architecture and/or the family hub manager can be implemented as an overall managing architecture, a collective embodiment of, and/or integration of any of the client device services and/or applications that may be implemented for expandability and instantiated together as the family coordination and/or the family hub architecture.
- any of the client device services can include, be integrated with, or implement any of the other client device services and applications, and collectively may be embodied as a family hub and/or coordination architecture or service.
- the device sharing service 732 can embody the restricted execution service 202 described with reference to FIGS. 1-6 , such as to implement a phone share feature provides that a user can share his or her phone (e.g., a mobile device) with another person, yet limit the other person's access to features, functions, and information on the phone. For example, a user owner of a mobile phone can activate a restricted execution mode on the device and then share the phone with a stranger. In the restricted execution mode, only outgoing phone calls will be allowed and the restricted execution mode enforces the task restrictions to restrict an incoming call, yet allow the outgoing call when the origin of the outgoing call is traced to the device phone application that has been included in the shared space.
- a phone share feature provides that a user can share his or her phone (e.g., a mobile device) with another person, yet limit the other person's access to features, functions, and information on the phone.
- a user owner of a mobile phone can activate a restricted execution mode on the device and then share the phone with
- a parent can share his or her phone with a child to play a game on the phone, but the child cannot answer phone calls, read emails, access texting, access any other data and phone settings, or initiate any type of a monetary transaction (e.g., to buy a phone app or music download).
- a phone user can share his or her photos on her phone with a friend that asks to look through the photos, but the friend cannot access any other phone data or settings.
- a phone user may also share his or her phone with anyone needing to make a phone call, but without giving access to any other phone data or settings.
- Phone share as a feature of a restricted execution mode can be pass-coded to only allow another person access to designated functionality of the phone based on user set restrictions.
- a phone share pass-code can be quickly initiated with a gesture, key input, or sequence of key inputs.
- phone share profiles can be implemented for different types of individuals, such as Friend, Parent, Stranger, Kid, Child, etc.
- the phone share features can also be implemented for a family phone in the house that any family member may take with them, such as when kids go out with friends, or a parent runs an errand to the store, or given to a house guest to use during their stay.
- the device sharing service 732 is also implemented to restrict incoming phone calls and message displays to limit the communication functions of the mobile device 1000 , yet can allow an outgoing phone call for shared use.
- the message displays may include email and text message displays, calendar events and alerts, instant messages, and any other messages that may be displayed for the user that owns the device (e.g., rather than the temporary, shared user).
- the device sharing service 732 can also restrict access to applications that allow a user to initiate a monetary transaction, such as via a browser, music, and/or gaming application via which a user can conduct a purchase transaction, download music, purchase and download an application, and any other type of monetary transaction.
- the device sharing service 732 can also be implemented to limit a younger child's ability to pair his or her phone with the car, or to send items to the printer in a home from a phone. As phones become NFC enabled and the phone can replace keys when providing secure access, device sharing service 732 can be implemented to limit the ability of a child to open some doors using a phone device.
- FIG. 9 is an example of a system 900 showing two different examples of hub user-interfaces 902 , 904 for a family-orientated hub.
- the description, layout, orientation, features, and organization of the text, images, photos, graphics, links, data, information, and presentation features shown with reference to the hub user interfaces, as well as with reference to any other user interfaces described herein and/or shown in the figures, are merely examples that may be altered in any aspect for various embodiments and/or implementations of mobile device check-in.
- the hub is a central space for membership-orientated coordination of communications, activities, information, and integration. Designated member relationships can be utilized to define how the data and information is managed, and can be implemented to leverage the social contract, such as between members of a defined familial group in the illustrated example.
- the hub is implemented as a user interface (e.g., via a client device application) for integration and aggregation of the membership-orientated communications, activities, and information.
- a hub can be implemented as a private, shared space between defined members.
- the hub contains links to other members' profiles, and based on restriction settings, allows aggregation for visibility of some of other members' data and information within the hub.
- the hub shares a group calendar which can be viewed and edited, a common text message window, a posting board, a shared photo album, a check-in feature, and any other type of shared information.
- Devices and/or device accounts can be associated within a set of devices or device accounts (e.g., a family phone account, user accounts, a connected set of devices, and so on), and all or a subset of the devices or accounts can communicate with other devices or accounts.
- the members of a hub can be defined by any number of different classes of people, such as Junior, Teen, Mom, Dad, (or Parent), Grandparent, Nanny, Life-Coach, and so on for the illustrated example of a family. Further, the members of a family can be defined to distinguish a live-in Nanny from a Babysitter, for example.
- membership of the hub as well as use of the hub by the members can be controlled by a select collection of users, such as one or two mobile phones by the associated users of the client devices.
- users such as one or two mobile phones by the associated users of the client devices.
- one of the members in the hub can be the designated control person, such as Mom who runs the household, employer, and so on.
- the hub can be provisioned, setup, and propagated out, e.g., automatically.
- the features and configuration of a hub may default to an automatic, easy setup, but any rule, feature, or configuration aspect can be readily modified by a user.
- Provisioning a hub may be based on billing, e.g., a family or corporate billing plan. However, if a phone device is changed to a different carrier, for example, the phone device can still receive texts related to the hub.
- provisioning a hub can be based on email addresses, phone numbers, user account identifiers, or any other identifier.
- a retail person selling a new phone package can easily identify the members each to their new phone devices and initiate the hub being instantiated. From a consumer perspective, it just works and members can walk out of the store all set up. All of the data and information can be shared with a single selection, and thus the members do not have to share each item (e.g., a grocery list, photos, calendar, etc.) individually and separately.
- the hub user interface may act as a shared space that is customizable and provides for user-generated and shared content. Some information can be shared, while other information is not. For example, Mom's complete Christmas list is not viewable by the other family members, but Dad and kids can add to the list (and only view their contribution). Hub setup may be performed “a la carte,” meaning only the features that members want displayed on the hub wall can be selected. For example, Mom wants to see the shopping list, whereas Dad does not shop and so wants to avoid having the list displayed on his device, yet he could still access the shopping list to add items when desired.
- the hub user interface integrates functions, calendar functionality, event and/or data summaries (i.e., on the “wall”), as well as content that is shared between the members of the hub (e.g., lists, documents, etc.).
- the hub user interface may include a “family check-in” or “check-in” option.
- the hub user interface may also include a chat section where location check-ins messaged are displayed along with other messages interchanged between the members of the hub.
- the hub “wall” is representative of an area via which members of the group may add to as desired, like a lunchroom bulletin board, family refrigerator, and so on.
- the information can be aggregated in pillars or columns and shown on the hub wall as illustrated.
- the hub wall can also represent an interrelation between any of the information and data that appears on the wall and its placement in time.
- the hub settings provide that a user can control which functions are integrated and displayed within the hub, such as on the wall.
- the hub information may also be context relevant to the members of the hub, and the calendar includes shared hub events. Calendar updates can be posted as notice events on the wall, and a user can look at the wall to see upcoming hub events, or the events that pertain to one or more other members of the hub. Messaging may also be performed that is private among the members of the hub.
- a member can instant text (or other communication) to all other members in the hub. Texting—such as for a work meeting—can divide each members' display on their respective devices into individual screens for each member.
- the hub may also be extensible, and may link to a hard drive on a home computer, or sync to just one of the other devices, the manager, or cloud control (e.g., from a network-based service).
- the hub may also be extensible to third parties that add a note on the hub wall, such as implemented with application program interfaces (APIs) for functions to post data to the hub.
- APIs application program interfaces
- a third-party application would not have access to the context of the hub wall, such as to obtain or display hub data.
- the private information and hub data could be encrypted and only decrypted by the phone devices that are associated with the hub.
- the hub supported by a hub coordination architecture may be thought of as a central space for coordination of communications, activities, information, and integration of members of the hub.
- Hubs may be defined to support a variety of different membership, such as for family members, coworkers, friends, acquaintances, fan clubs, and so forth. Therefore, although examples are discussed that relate to a family in the following discussion it should be readily apparent that membership in the hub may be defined in a variety of other ways without departing from the spirit and scope thereof.
- the hub coordination architecture may be used to support a variety of different functionality. An example of this functionality is described herein as a hub restricted execution service, and further aspects of private interaction hubs are also described herein.
- FIG. 10 illustrates an example system 1000 that includes an example device 1002 , which can implement embodiments of restricted execution modes.
- the example device 1002 can be implemented as any of the devices, services, and/or servers described with reference to the previous FIGS. 1-9 , such as any type of client or mobile device, mobile phone, tablet, computing, communication, entertainment, gaming, media playback, and/or other type of device.
- the mobile device 100 shown in FIGS. 1-2 may be implemented as the example device 1002 .
- the device 1002 includes communication devices 1004 that enable wired and/or wireless communication of device data 1006 , such as media content and the shared messages, updates, and events data at the device.
- the media content can include any type of audio, video, and/or image data.
- the communication devices 1004 can also include transceivers for cellular phone communication and/or for network data communication.
- the device 1002 also includes input/output (I/O) interfaces 1008 , such as data network interfaces that provide connection and/or communication links between the device, data networks, and other devices.
- I/O interfaces can be used to couple the device to any type of components, peripherals, and/or accessory devices.
- the I/O interfaces also include data input ports via which any type of data, media content, and/or inputs can be received, such as user inputs to the device, as well as any type of audio, video, and/or image data received from any content and/or data source.
- the I/O interfaces 1008 also support natural user interface (NUI) inputs to the device 1002 , such as any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like.
- NUI natural user interface
- Examples of natural user interface inputs may rely on speech recognition, touch and stylus recognition, gesture recognition on-screen and motion gesture recognition proximate the device, head, eye, and environment recognition and tracking, augmented reality and virtual reality systems, and any other type of audible, vision, touch, gesture, and/or machine intelligence that may determine user input intentions.
- the device 1002 includes a processing system 1010 that may be implemented at least partially in hardware, such as with any type of microprocessors, controllers, and the like that process executable instructions.
- the processing system can include components of an integrated circuit, programmable logic device, a logic device formed using one or more semiconductors, and other implementations in silicon and/or hardware, such as a processor and memory system implemented as a system-on-chip (SoC).
- SoC system-on-chip
- the device can be implemented with any one or combination of software, hardware, firmware, or fixed logic circuitry that may be implemented with processing and control circuits.
- the device 1002 may further include any type of a system bus or other data and command transfer system that couples the various components within the device.
- a system bus can include any one or combination of different bus structures and architectures, as well as control and data lines.
- the device 1002 also includes computer-readable storage media 1012 , such as data storage devices that can be accessed by a computing device, and that provide persistent storage of data and executable instructions (e.g., software applications, programs, functions, and the like).
- Examples of computer-readable storage media include volatile memory and non-volatile memory, fixed and removable media devices, and any suitable memory device or electronic data storage that maintains data for computing device access.
- the computer-readable storage media can include various implementations of random access memory (RAM), read-only memory (ROM), flash memory, and other types of storage media in various memory device configurations.
- computer-readable storage media is representative of media and/or devices that enable persistent and/or non-transitory storage of data in contrast to mere signal transmission, carrier waves, or signals per se.
- a computer-readable signal media may refer to a signal-bearing medium that transmits instructions, such as via a network.
- the signal media can embody computer-readable instructions as data in a modulated data signal, such as carrier waves or other transport mechanism.
- the computer-readable storage media 1012 provides storage of the device data 1006 and various device applications 1014 , such as an operating system that is maintained as a software application with the computer-readable storage media and executed by the processing system 1010 .
- the device applications also include a device share service 1016 that implements embodiments of restricted execution modes, such as when the example device 1002 is implemented as the mobile device 100 shown in FIG. 1 .
- An example of the device share service 1016 is the restricted execution service 202 that is integrated with the operating system 204 at the mobile device 100 , as described with reference to FIG. 1 .
- the device applications 1014 can also include any of the services and applications 1018 that implement embodiments of restricted execution modes.
- the example device 1002 also includes a family coordination architecture 1020 , which may be implemented in the general context of software, firmware, hardware (e.g., fixed logic circuitry), or any combination thereof to support embodiments of restricted execution modes and/or mobile devices family coordination.
- the device 1002 can also include a positioning system 1022 , such as a GPS transceiver, or similar positioning system components, that can be utilized to determine a global or navigational position of the device.
- the device 1002 also includes an audio and/or video system 1024 that generates audio data for an audio device 1026 and/or generates display data for a display device 1028 .
- the audio device and/or the display device include any devices that process, display, and/or otherwise render audio, video, display, and/or image data.
- the audio device and/or the display device are integrated components of the example device 1002 .
- the audio device and/or the display device are external, peripheral components to the example device.
- the techniques described for restricted execution modes may be implemented in a distributed system, such as over a “cloud” 1030 in a platform 1032 .
- the cloud 1030 includes and/or is representative of the platform 1032 for services 1034 and/or resources 1036 .
- the services 1034 may include the cloud storage and service 206 , and any of the data services 208 as described with reference to FIG. 1 .
- the resources 1036 may include the accessible data 210 as described with reference to FIG. 1 .
- the platform 1032 abstracts underlying functionality of hardware, such as server devices (e.g., included in the services 1034 ) and/or software resources (e.g., included as the resources 1036 ), and connects the example device 1002 with other devices, servers, etc.
- the resources 1036 may also include applications and/or data that can be utilized while computer processing is executed on servers that are remote from the example device 1002 .
- the services 1034 and/or the resources 1036 may facilitate subscriber network services, such as over the Internet, a cellular network, or Wi-Fi network.
- the platform 1032 may also serve to abstract and scale resources to service a demand for the resources 1036 that are implemented via the platform, such as in an interconnected device embodiment with functionality distributed throughout the system 1000 .
- the functionality may be implemented in part at the example device 1002 as well as via the platform 1032 that abstracts the functionality of the cloud 1030 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
- This application claims priority under 35 U.S.C. Section 119(e) to U.S. Provisional Application Ser. No. 61/580,147 filed Dec. 23, 2011 entitled “Mobile Device Shared”, the disclosure of which is incorporated by reference herein in its entirety. This application also claims priority under 35 U.S.C. Section 119(e) to U.S. Provisional Application Ser. No. 61/695,294 filed Aug. 30, 2012 entitled “Mobile Device Kid Space”, the disclosure of which is incorporated by reference herein in its entirety.
- Many types of devices, such as mobile phones, tablet devices, and other computing, communication, and entertainment devices increasingly offer more functions, applications, and features which are beneficial to a user, and can enhance one's personal time as well as work and social activities. For example, not only can a mobile phone be used for text, email, and voice communications, but may also be used for entertainment, such as to listen to music, surf the Internet, watch video content, gaming, and for photo and video imaging. Similarly, a portable tablet device may be utilized for email, browser, navigation, and other computing applications, as well as for the various entertainment and photo features. In addition to the many computing, communication, and entertainment applications that are available to a user of a mobile phone or tablet device, a seemingly unlimited number of third-party applications and features are also available for download to a device.
- Parents of younger children that do not yet have their own mobile phones often find that a child wants to “play” with their phone to play games, take pictures, listen to music, and other activities. Typically, a parent may pass his or her phone to a young child in the back seat of the car while driving to keep the child entertained. The parent may not know then what features and applications the childe access on the device, such as a Web browser or unintentionally accessing an email application, or which device settings may have been changed, such as audio settings, alarm settings, calendar notices, and the like.
- This Summary introduces features and simplified concepts of restricted execution modes, which are further described below in the Detailed Description and/or shown in the Figures. This Summary should not be considered to describe essential features of the claimed subject matter, nor used to determine or limit the scope of the claimed subject matter.
- Restricted execution modes is described. In embodiments, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface happens without receiving a PIN code or other authentication credential entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated.
- In embodiments, the restricted execution service restricts device application access to the device content via the shared device application while the restricted execution mode is activated when the device application calls the shared device application with a request for the device content. Alternatively, the restricted execution service can allow the device application access to the device content via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content. The request token indicates that the device application is permitted to access the device content via the shared device application in the shared space.
- In embodiments, a device application may be implemented or designed so that a user can designate to allow the device application access to the device content if the device application is included in the shared space as a shared device application. Alternatively, a device application may be designed as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a device application may also be implemented as not even being eligible for user-designation to be included in the shared space. A device application that is included in the shared space can initiate a task call to access the device content. However, the restricted execution service restricts access to the device content based on one or more of the device application tasks being designated as restricted while the restricted execution mode is activated. The restricted execution service can also restrict the device application from a file system of the mobile device while the restricted execution mode is activated.
- Embodiments of restricted execution modes are described with reference to the following Figures. The same numbers may be used throughout to reference like features and components that are shown in the Figures:
-
FIG. 1 illustrates an example of restricted execution modes. -
FIG. 2 illustrates an example system in which embodiments of restricted execution modes can be implemented. -
FIG. 3 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments. -
FIG. 4 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments. -
FIG. 5 illustrates example method(s) of restricted execution modes in accordance with one or more embodiments. -
FIG. 6 illustrates an example system in which embodiments of private interaction hubs can be implemented. -
FIG. 7 illustrates an example system in which embodiments of restricted execution modes and/or family coordination can be implemented. -
FIG. 8 illustrates various client device services and features in accordance with one or more embodiments. -
FIG. 9 illustrates examples of a family hub in accordance with one or more embodiments. -
FIG. 10 illustrates an example system with an example device that can implement embodiments of restricted execution modes. - Embodiments of restricted execution modes are described and provide a restricted execution service that can be implemented as a client device service or application, such as in a mobile phone, portable tablet device, or other type of computing and/or communication device. Restricted execution modes enable implementation of a shared space on a device where a user owner can include device applications that a guest or child can access without requiring a password, and the device applications will be programmatically prevented from being able to access other private device content on the device.
- There may be situations when a user owner of a device may want to have access to some content or applications on their mobile phone without unlocking the phone with a PIN code or other authentication credential. Restricted execution modes enable the user owner to make some experiences available without password access, and without compromising the security of sensitive personal or corporate data. In implementations, restricted execution modes allow applications to run, but restricts access to sensitive data or experiences using several mechanisms, such as security capabilities, blocked navigation, and application origin. If an application has a particular security capability, a runtime check is made centrally when the application attempts to access a protected resource, and if the application is running in a restricted execution zone, an error is returned that can be handled by the application. When a device is running in a restricted execution mode, a device application may be referred to as running in a restricted execution “zone”.
- For the blocked navigation security capability, applications often take advantage of built in tasks to complete user actions like sending an email, making a phone call, etc. When the restricted execution mode is activated on a device, the origination of a device application task at run-time is what is considered to determine whether the device application, and more specifically, whether the task will be allowed. An application task, which is generally synonymous to an application programming interface (or API) call, may include aspects of a data access API call, but it also includes a request to initiate a particular action or actions different than data access, and the task request may incorporate metadata associated with the action of the requested task. The level of functionality is provided on a task-by-task basis to determine whether the action or actions of a requested task will be available in the restricted execution mode during run-time origination of a task request. A device application can be executed by the device, but only some functions of the device application will execute when the restricted execution mode is activated on the device.
- Examples of restricting the functionality of a device application may include not permitting the device application to be launched altogether or limiting the device application to calling only a restricted subset of API calls that is narrower than the normal set of API calls available to the application when the mobile device is running in normal user mode. Restricting access to device content also may include disallowing certain API calls that provide access to particular sets of data or content. In many examples, restricting functionality or access does not include analyzing or changing Access Control Lists (ACLs), Access Control Entries (ACEs), or similar file-system access control metadata maintained by a file system. For example, a device application can be restricted from access to device content while a restricted execution mode is activated on a device.
- When running in a restricted execution zone, all application requested navigations are screened and only those allowed by the system can continue. Others fail in a backwards compatible way so that legacy applications do not need to be updated to run in the restricted execution zone. For the application origin security capability, only applications that originate and/or have been downloaded from a first-party provider can run (e.g., execute) in a restricted execution mode. This ensures that applications which have not been security checked, and may access sensitive and/or private data on a device, do not run without the user unlocking the device first.
- While features and concepts of restricted execution modes can be implemented in any number of different devices, systems, environments, and/or configurations, embodiments of restricted execution modes are described in the context of the following example devices, systems, and methods.
-
FIG. 1 illustrates an example of user interfaces of a restricted execution mode. An examplemobile device 100 may be any one or combination of a mobile phone, tablet device, computing device, communication, entertainment, gaming, navigation, and/or other type of portable electronic device. A shared space can be implemented for user access to functionality of device applications without a password, as well as for access to any applications, functions, and features of themobile device 100 that are designated by the user in the shared space. - The example
mobile device 100 includes anintegrated display device 102 on which user interfaces can be displayed, such as adevice lock screen 104 that indicates the device is locked at 106. For example, a user owner of the mobile device may set-up the device to lock when not in use so that someone else cannot access the full functionality of applications, such as email and text, and/or have access to the Internet via a browser application without providing authentication credentials such as a personal identification number (PIN), login, or other authentication credential. - The user owner of the
mobile device 100 can allow another person to use the phone, and hand the phone over without having to unlock the device from thedevice lock screen 104 by entering a PIN or other credential. As shown in the example 108, a person that has borrowed the phone can swipe the device lock screen with a gesture input to access a sharedspace user interface 110, which is illustrated at 112 when displayed on the display device, and which provides access to a limited subset of application functionality. The borrower does not enter a PIN or other credential to access the shared space user interface. In implementations, the gesture input may be any type of user and/or gesture input in any direction on theintegrated display device 102 of the mobile device. Alternatively or in addition, any type of device, button, and/or gesture inputs may be utilized effective to transition from thedevice lock screen 104 to the sharedspace user interface 110. -
FIG. 2 illustrates anexample system 200 in which embodiments of restricted execution modes can be implemented. The example system includes themobile device 100 as described with reference toFIG. 1 , with theintegrated display device 102 on which a user interface can be displayed, such as the sharedspace user interface 110 that is representative of a shared space on the device. Additionally, the mobile device can be implemented with various components, such as a processor and/or memory system, as well as any number and combination of differing components as further described with reference to the example device shown inFIG. 10 to implement embodiments of restricted execution modes. - The
mobile device 100 includes a restrictedexecution service 202 that can be implemented as a software application (e.g., executable instructions) stored on computer-readable storage media, such as any suitable memory device or electronic data storage. Additionally, the restrictedexecution service 202 can be executed with a processing system at the mobile device to implement embodiments of restricted execution modes as described herein. The restrictedexecution service 202 may be implemented as an independent device application that is executable on the device to interface with the many applications, features, and functions of the device. - The
example system 200 may also include a cloud storage andservice 206 that can include any type of cloud-based (e.g., network-based)data services 208 used to store or maintain accessible data 210 (e.g., data accessible by device applications on the mobile device 100). Any of the devices and services (e.g., implemented as server devices) described herein can communicate via anetwork 212, which can be implemented to include a wired and/or a wireless network. The network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet. The network may also include mobile operator networks that are managed by a mobile network operator and/or other network operators, such as a communication service provider, mobile phone provider, and/or Internet service provider. Alternatively or in addition, peer-to-peer communication techniques may be utilized, such as multiple devices connected using a peer-to-peer communication network. - The restricted
execution service 202 is implemented to manage a restrictedexecution mode 214 of a sharedspace 216, such as to limit and/or restrictdevice applications 218 and shareddevice applications 220 that are included in the sharedspace 216 that is accessible without a PIN or authentication credential. Thedevice applications 218 can include any type of software applications, and the functions and features thereof, that run on the device, such as for user interaction with messaging, gaming, media playback, document viewing, and communication applications. The device applications may also include system-level components that users of a device generally do not access or utilize, but that typically run in the background while the device is operational. The shared device applications can include any subset of the device applications, and are designated as a shared device application when included in the sharedspace 216 for limited and/or restricted functionality when a restrictedexecution mode 214 is activated on the device. - A user owner of the
mobile device 100 can choose the device applications and features, and/or device content, that can be included in the shared space and accessed by a child or guest while the restricted execution mode is activated. Further, a device application may be allowed a restricted level of functionality while running in the shared space (i.e., the application may be executed), yet generally cannot accessdevice content 222 that is restricted from access, such as contacts, email, and calendar databases, as well as limited access to the device file system. - The content databases, device file system, Internet access, and other device content and features can be protected from device application access when the restricted execution mode is activated. For example, a device application that can access the Internet, email, contacts, etc. when a device is unlocked and operating in a normal user mode will be automatically restricted when the restricted execution mode is activated, such as if the device application has been added to the shared space and is allowed limited functionality in the shared space. As an example, a digital camera application that has been added to the shared space may allow a user to take and view new photos, but previous photos will be restricted from viewing the restricted execution mode is activated on the device.
- The shared
space user interface 110 of the shared space is customizable by the user owner of the device. For example, the user owner can add applications, such as games and music applications, to the shared space so that the applications are recognized and can be launched in the shared space, perhaps with limited functionality. However applications that are not recognized in the shared space cannot be launched in the shared space. For example, if a game application that is pinned or recognized in the shared space attempts to itself launch a browser application (e.g., as part of the game's execution), the restrictedexecution service 202 will check if the browser application is pinned and recognized in the shared space. If the browser application is not recognized in the shared space, then the restricted execution service will fail to launch the application, or if the browser application is recognized, then the browser application can be launched in the shared space by the game application. - As described with reference to
FIG. 1 , an input can be received, such as a gesture input or device selectable control input, and the restrictedexecution service 202 initiates a transition from displaying thedevice lock screen 104 to display the sharedspace user interface 110 of the sharedspace 216 without receiving a PIN code or other authentication credential entered on the device lock screen. The restrictedexecution service 202 is implemented to manage the sharedspace 216 when the restrictedexecution mode 214 is activated. The restrictedexecution service 202 can activate the restrictedexecution mode 214 of themobile device 100, and restrict access of adevice application 218 to thedevice content 222, to a file system of the mobile device, and/or to limit the application to a limited set of functionality or tasks while the restricted execution mode is activated. - The shared
space 216 can include a shareddevice application 220, and the restrictedexecution service 202 can allow the shared device application access to thedevice content 222 while the restrictedexecution mode 214 is activated. The restrictedexecution service 202 can determine whether adevice application 218 is implemented or designed so that a user can designate to allow the device application access to the device content if the device application is included in the sharedspace 216 as a shared device application. Alternatively, a device application may be designed as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a device application may also be implemented as not even being eligible for user-designation to be included in the shared space. - In restricted modes, a configuration of a device application may be designed or programmed to indicate whether the device application is ever to be allowed to run (e.g., execute) in a restricted mode, irrespective of user choice. For example, a confidential corporate application or another application downloaded from a third-party application store that may access private corporate data can be configured to never be allowed to run (e.g., execute) in any restricted mode, even if a user would like it to do so. A configuration of some device applications may be user-controlled to indicate whether the device application is to be allowed to run in a particular restricted mode, such as allowing a subset of games or applications in a kid zone restricted mode, or allowing a subset of camera lens applications to run when the phone is locked.
- The restricted
execution service 202 can also be implemented to validate whether or not a given device application can be navigated to regardless of the reason for the navigation request, taking into account the current restricted mode and the target application's system and user configuration. Additionally, a separate navigation stack can be maintained for a normal mode user experience and for the current restricted execution mode. The restrictedexecution service 202 is also implemented to allow or disallow migration of applications from the normal mode stack to the restricted mode stack or vice-versa based on scenario needs, and to determine when to close applications on each stack based on available resources and transitions into and out of a restricted mode. - A
device application 218 may initiate a task call to a shareddevice application 220 with a request for thedevice content 222, and the restrictedexecution service 202 can restrict the device application access to the device content via the shared device application while the restrictedexecution mode 214 is activated. The device application may also initiate a task call to theoperating system 204 to request device content access, and the restricted execution service can restrict the access to the device content based on one or more device application tasks being designated as restricted while the restricted execution mode is activated. - Alternatively, the
device application 218 can initiate a task call to the shareddevice application 220 with a request for thedevice content 222, and the request includes a request token that indicates the device application is permitted to access the device content via the shared device application in the sharedspace 216. The restrictedexecution service 202 can then allow the device application access to the device content via the shared device application based on the request token while the restricted execution mode is activated. The restricted execution service can also deactivate the restrictedexecution mode 214 responsive to a PIN code or authentication credential entered on the device lock screen, and return to a normal user mode of the mobile device in which thedevice application 218 has unrestricted access to thedevice content 222. - The restricted
execution service 200 implements a mechanism to indicate in which restricted modes a device application can run (e.g., execute) based on a task information field of a device application task. The task information field indicates whether a specific task can be allowed to execute in a shared space when the restricted execution mode is activated. This new field will be a bit mask, which a navigation server will use to compare to the navigation filter mask that MobileUI will give to it when a restricted mode is entered. These are marked per task instead of by application because some first-party device applications have tasks that can be allowed to function in a child share space (e.g., Kid's Corner), but not all of the application functionality is allowed while a restricted execution mode is activated on a device. If a device application is allowed to run in a shared space, the restricted execution service can trace an API task call through the application layer from an originator (e.g., device application) that initiates the task call based on a token that is passed along to a core system component that would not otherwise be able to determine whether the task call was originated from a device application running in the shared space. The token can be utilized to determine if the task call is protected from a restricted execution mode. -
Example methods FIGS. 3-5 in accordance with one or more embodiments of restricted execution modes. Generally, any of the services, components, modules, methods, and operations described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or any combination thereof. Example methods may be described in the general context of executable instructions stored on computer-readable storage media that is local and/or remote to a computer processing system, and implementations can include software applications, programs, functions, and the like. -
FIG. 3 illustrates example method(s) 300 of restricted execution modes. The order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method. - At 302, a device lock screen is displayed on an integrated display device of a mobile device. For example, the mobile device 100 (
FIG. 1 ) displays adevice lock screen 104 on theintegrated display device 102 of the mobile device. At 304, the display is transitioned from the device lock screen to display a shared space user interface of a shared space without a PIN code or other authentication credential entered on the device lock screen. For example, an input system of themobile device 100 receives an input, such as a gesture input or device selectable control input, and the input is effective to transition from displaying thedevice lock screen 104 to display the sharedspace user interface 110 of a sharedspace 216 without a PIN code or other authentication credential entered on the device lock screen. - At 306, a restricted execution mode of the mobile device is activated. For example, the restricted
execution service 202 at themobile device 100 activates the restrictedexecution mode 214 of the mobile device in response to entering the shared space. At 308, access of a device application to device content is restricted while the restricted execution mode is activated. For example, the restrictedexecution service 202 at themobile device 100 restricts access of adevice application 218 to thedevice content 222 while the restrictedexecution mode 214 is activated. - At 310, the restricted execution mode is deactivated responsive to a PIN code or other authentication credential entered on the device lock screen. For example, the restricted
execution service 202 at themobile device 100 deactivates the restricted execution mode responsive to a PIN code or other authentication credential entered on the device lock screen. At 312, the device returns to a user mode of the mobile device in which the device application has unrestricted access to the device content. For example, the restrictedexecution service 202 at themobile device 100 returns to a user mode of the mobile device in which thedevice application 218 has unrestricted access to thedevice content 222. -
FIG. 4 illustrates example method(s) 400 of restricted execution mode. The order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method. - At 402, a shared device application that is included in the shared space is allowed access to the device content while the restricted execution mode is activated. For example, the restricted execution service 202 (
FIG. 2 ) at themobile device 100 allows access to thedevice content 222 to a shareddevice application 220 that is included in the sharedspace 216 while the restricted execution mode is activated. - At 404, the device application that requests access to the device content via the shared device application is restricted while the restricted execution mode is activated on the device. For example, restricted
execution service 202 at themobile device 100 restricts adevice application 218 task call to the shareddevice application 220 with a request to access thedevice content 222 while the restricted execution mode is activated on the device. - At 406, the device application is allowed access to the device content via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content. For example, restricted
execution service 202 at themobile device 100 allows access to thedevice content 222 by thedevice application 218 via the shared device application while the restricted execution mode is activated based on a request token that the device application includes in a task call to the shared device application for the device content. The request token indicates that the device application is permitted to access the device content via the shared device application in the shared space. -
FIG. 5 illustrates example method(s) 500 of restricted execution modes. The order in which the method is described is not intended to be construed as a limitation, and any number or combination of the method operations can be combined in any order to implement a method, or an alternate method. - At 502, access to the device content is restricted based on device application tasks being designated as restricted while the restricted execution mode is activated, where the device application initiates a task call to access the device content. For example, restricted execution service 202 (
FIG. 2 ) at themobile device 100 restricts access to thedevice content 222 based on device application tasks being designated as restricted while the restrictedexecution mode 214 is activated, where adevice application 218 initiates task calls to access the device content. - At 504, the device application is restricted from a file system of the mobile device while the restricted execution mode is activated. For example, restricted
execution service 202 at themobile device 100 restricts adevice application 218 from a file system of the mobile device while the restricted execution mode is activated. - At 506, the device application is determined as user-designated to allow the device application access to the device content in a restricted execution mode if the device application is included in the shared space as a shared device application. Alternatively, at 508, the device application is determined as designed as not to be allowed access to the device content even if the device application is included in the shared space. For example, restricted
execution service 202 at themobile device 100 can determine whether a device application user-designated to allow the device application access to the device content in a restricted execution mode if the device application is included in the shared space as a shared device application. The restrictedexecution service 202 may also determine that a device application is designed (e.g., programmed) as not to be allowed access to the device content even if the device application is included in the shared space. Additionally, this type of a programmed device application may also be implemented as not even being eligible for user-designation to be included in the shared space. - Although described herein as a single restricted execution mode, in some examples, a device provides multiple restricted execution modes, such as a first restricted execution mode associated with a child shared space for facilitating sharing a mobile device with a child and a second restricted execution mode associated with a safe driving shared space for facilitating safer driving by a user of a mobile device. These various restricted execution modes may each impose a different set of limitations on the functionality of the device. For example, the child-related execution mode might block access to email data, changes to device settings, or in-app purchases, while the second driving safety restricted execution zone might block graphical user interfaces that could distract a driver from the road.
- From the lock screen displayed on a device, without entering a PIN or other authentication credentials, a user may be able to reach different shared spaces, each of which has a different restricted execution mode associated with it. For example, from the lock screen, a user might enter a first gesture (e.g., a left swipe) to reach a first shared space having a first restricted execution mode and a second different gesture (e.g., a right swipe) to reach a second, different shared space having a second restricted execution mode. In some examples, a shared space associated with a restricted execution mode may be accessed from different entry points than receiving an input (e.g., a gesture input) on the lock screen.
- The features and concepts described herein for restricted execution modes may be utilized to support and implement one or more restricted execution modes associated with a child shared space of a device for facilitating sharing the device with a child. This Restricted Execution Modes application incorporates a related U.S. patent application Ser. No. 13/726,095 filed Dec. 22, 2012 entitled “Mobile Device Child Share”, the disclosure of which is incorporated by reference herein in its entirety. Mobile device child share enables implementation of a “Kid's Corner” (also referred to as a kid space or child zone) for parental control of any applications, data, functions, and features of a mobile device so that a parent can allow a child to play with the device without having access to the restricted applications, data, functions, and features. Kid's Corner is a child shared space that provides a custom destination on a mobile phone just for a child, and where the child goes to “play” on the device. In a child share space, child access is restricted with a restricted execution mode to only the applications, games, music, videos, movies and other content that a parent chooses. All of the settings and content outside of the Kid's Corner is protected and purchases can be blocked while in the Kid's Corner. The blocked and/or restricted applications and features of a mobile device may include the ability to make a phone call, send a text or access email, and access the Internet, such as to post to social networks or to search the Internet.
- The features and concepts described herein for restricted execution modes may be utilized to support and implement one or more restricted execution modes associated with a safe driving shared space of a device for facilitating safe driving modes. This Restricted Execution Modes application incorporates a related U.S. patent application Ser. No. 13/726,097 filed Dec. 22, 2012 entitled “Mobile Device Safe Driving”, the disclosure of which is incorporated by reference herein in its entirety. Mobile device safe driving enables implementation of one or more safe driving modes to minimize driver distractions of a mobile phone while driving a vehicle.
-
FIG. 6 illustrates anexample system 600 in which embodiments of private interaction hubs and restricted access modes can be implemented. Thesystem 600 includes an examplemobile device 602, which may be any one or combination of a wired or wireless device, such as a mobile phone, tablet, computing, communication, entertainment, gaming, media playback, and/or other type of device. Any of the devices can be implemented with various components, such as a processing system and memory, as well as any number and combination of differing components as further described with reference to the example device shown inFIG. 10 . As such, themobile device 602 may implement techniques previously described in whole in or part, such as the techniques described with reference to the restrictedexecution service 202. - The
mobile device 602 includes anintegrated display device 604 on which user interfaces can be displayed, such as ahub user interface 606 of ahub application 608. The hub user interface offers a unified interactive view of thehub data 610 for a single, private interaction hub and thehub application 608 aggregates disparate types of thehub data 610 originating from the various member users of the private interaction hub. For example, the hub user interface may provide a single unified access point to shared hub messages, status updates, check-ins, hub calendar events, hub media, hub applications, and other types of hub content. As described above, a private interaction hub (or simply “hub”) is a private network or association of member users who voluntarily elect to privately interact and collaborate with each other in a bi-directional manner. Thehub data 610 includes any shared data or metadata that is used to facilitate the interaction and collaboration between the members of a private interaction hub, and may include shared data for messaging, notes, contact management, documents, tasks, location updates, photos, calendar events, applications (to include collaborative gaming applications), and/or other media content, such as any type of audio, music, video, and/or image data that may be available or accessed from any source. - The basic functionality of an example private interaction hub is shown as a golf hub displayed in the
hub user interface 606 of thehub application 608. For example, the hub user interface can include various selectableuser interface tiles 612, such as a members tile that is selectable to initiate a display of the constituent members of the private interaction hub. Theuser interface tiles 612 may also include hub chat and/or messages tiles to allow a hub member to participate in shared messaging threads with the other member users of the hub. For example, as shown, the member “Bob” has asked “Anyone up for a round right now?” Theuser interface tiles 612 may also include a photo album tile that is selectable to view photos shared by any of the hub members with the hub, and a shared notebook tile from which the hub members can view shared notes. For example, the golf hub may include a shared notes document that compiles the hub members' collective research of new golf equipment. Thehub user interface 606 may also display a shared calendar that allows a member of the hub to view, edit, and post calendar events that will be shared with all of the other hub members. For example, the calendar tile shows an upcoming tee time at St. Andrews on Saturday at 9:00 a.m. for all of the members. When a user selects a group item (e.g., the message from Bob) or tile (e.g., the messaging tile), further details about the selected item or group items related to the selected tile may be displayed by the hub application itself or the hub application may call a different device application 636 (e.g., a messaging application) to display further details about the item(s). - When a user selects or otherwise engages with a piece of displayed hub data, such as the golf message from Bob, the hub application may provide additional details or options to the user to permit the user to interact further with the hub data. For example, the hub application may display controls to allow the user to edit or reply to Bob's message. Alternatively or in addition, when a user selects or otherwise engages with a piece of displayed hub data (e.g., Bob's message), the hub application may launch or call another device application to permit the user to further interact with the piece of hub data (e.g., the hub application may call a native messaging application).
- The
hub user interface 606 of thehub application 608 can also include user-selectable access to third-party applications, such as when an application is “pinned” to, or otherwise shared with a private interaction hub. A pinned third-party application may also utilize the shared hub data, such as shared application preferences or shared application state data. For example, the golf hub shown displayed in thehub user interface 606 includes a live tile representing a third-party weather application that the members of the hub can quickly access to check the weather forecast at their local golf club, such as when planning an upcoming golf outing. A user of themobile device 602 can also customize display aspects of a hub user interface, such as the content of the user interface and how the elements of the hub user interface are arranged. Another example of a hub user interface of thehub application 608 is a panoramic hub user interface, such as for a family-centric private interaction hub as shown and described in greater detail with reference toFIG. 9 . - The
example system 600 also includes a hub management service 614, and a cloud storage and service 616. The hub management service 614 manages the formation and maintenance of private interaction hubs 618. The hub management service can correlate or associate member users of a hub by associating account identifiers 620 of the members with one or more of the private interaction hubs. The account identifier 620 of a member user may be associated with an identifier of a private interaction hub 618 in a data table that the hub management service maintains to correlate the hub members with one or more of the private interaction hubs. The hub management service 614 may also associate devices that correspond to hub members based on device identifiers. The account identifiers 620 can include user membership identifiers and/or sign-on credentials, such as an email and password combination, or a username and password combination. The sign-on credentials may be single sign-on (“SSO”) credentials that are utilized for authentication purposes at a number of Web services, including the cloud storage and service 616. - The cloud storage and service 616 can include any type of cloud-based (e.g., network-based) data and messaging services 622. The messaging services may include any type of email, text (e.g., SMS, MMS), and/or instant messaging services. The data services may include any type of calendar, photo album, file or document sharing, location, mapping, music sharing, video sharing, gaming, contacts management, and/or notebook services, as well as any other type of services that can be used to share stored
hub data 624. The stored hub data can include any form of messages, updates, events, content, media, and information that is maintained for the private interaction hubs 618, and is accessible from themobile device 602, either upon a request from a device and/or upon a data “push” to the device. The cloud storage and service 616 also maintains storedhub metadata 626 that includes settings and information pertaining to the private interaction hubs 618, such as the name of a hub, the background image or photo of the hub, and an association of the hub members. - Although shown together as data and messaging services 622, various application data services and various messaging services may be operated on separate devices and/or operated by separate, distinct entities. Additionally, although the hub management service 614 and the cloud storage and service 616 are shown as independent services, they may be implemented together as a single service. Further, a server device (or group of server devices) can include implementations of both the hub management service 614 and the cloud storage and service 616, representative of a single entity that may be the same server system, company system, domain, and the like.
- The cloud storage and service 616, and its constituent data and messaging services 622, interchange the stored
hub data 624 and the storedhub metadata 626 between the mobile devices that are associated with member users of a private interaction hub 618. For example, a data and/or messaging service of the cloud storage and service 616 can receive a copy ofhub data 610 and/orhub metadata 628 from themobile device 602 that is used by a hub member, store this hub data and hub metadata in the cloud storage as the respective storedhub data 624 and storedhub metadata 626, and then distribute the stored hub data and stored hub metadata to other mobile devices associated with other member users of the same private interaction hub, as well as to other mobile devices associated with the same hub member. The storedhub metadata 626 can include membership information pertaining to the member users of a private interaction hub, hub identifiers that correlate a piece of hub data to a particular private interaction hub, user identifiers that correlate a piece of hub data to a particular member user, modification dates, and/or other metadata. - The cloud storage and service 616, and its constituent data and messaging services 622, may utilize single sign-on (“SSO”) credentials for authentication purposes to limit the dissemination of the stored
hub data 624 and the storedhub metadata 626 to only the authorized devices of hub members. Additionally, any of the devices and services (e.g., implemented as server devices) described herein can communicate via anetwork 630, which can be implemented to include a wired and/or a wireless network. The network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet. The network may also include mobile operator networks that are managed by a mobile network operator and/or other network operators, such as a communication service provider, mobile phone provider, and/or Internet service provider. - The
mobile device 602 includes anoperating system 632 of the device, and the operating system includes a huboperating system service 634 that is implemented to integrate cloud-based services, ahub application 608, andlocal device applications 636 with the operating system to implement aspects of the private interaction hubs 618. The aspects that may be implemented include hub formation and membership maintenance, synchronizing thehub data 610 on the mobile device with the storedhub data 624, as well as thehub metadata 628 with the storedhub metadata 626, with the cloud storage and service 616, and providing thehub application 608 and thelocal device applications 636 on themobile device 602 with access to thehub data 610 and thehub metadata 628. For example, the huboperating system service 634 may directly access the storedhub metadata 626 at the cloud storage and service 616. - The hub operating system service 634 (or alternatively, the hub application 608) may also determine and maintain a local copy of the membership associations of member users account identifiers 620 and identifiers of the private interaction hubs. The hub
operating system service 634 may also synchronize the storedhub data 624 from the cloud storage and service 616 with thehub data 610 at themobile device 602, and synchronize the storedhub metadata 626 from the cloud storage and service with thehub metadata 628 at the mobile device. The huboperating system service 634 may also synchronize with the cloud storage and service 616 (e.g., by sending changes or additions tohub data 610 andhub metadata 628 to the cloud storage and service 616). Such data synchronizations may occur in response to a user launching the hub application. - The
mobile device 602 includes thedevice applications 636 that permit a user of the mobile device to access, create, and/or modify thehub data 610,private data 638 of the user, as well as the storedhub data 624 that is managed by any of the data and messaging services 622 at the cloud storage and service 616. Some or all of thedevice applications 636 may be implemented as client-side components or modules of any of the data and messaging services 622, or may be implemented as standalone, native applications (e.g., local device applications) at the mobile device. Thedevice applications 636 typically each consume and provide access to only a portion or subset of thehub data 610 and theprivate data 638, such as only a single type of hub data and private data (e.g., only messaging data, but not calendar data). The device applications also typically present the consumed hub data to a user in conjunction with theprivate data 638. Private data is data or metadata that is not associated with a private interaction hub and that has not been shared with other members of the hub (e.g., data that has not been shared via the cloud storage and service 616). - The
device applications 636 at themobile device 602 may include a native or third-party messaging application that provides a user with messaging alerts and access to messaging threads. The messaging application provides access to both shared message threads shared with a private interaction hub and private message threads between a user of the mobile device and others who are not members of the hub. The messaging application also allows a user to send a message to all of the hub members without accessing a hub user interface of the hub application. The messaging application may not provide user access to other types of thehub data 610, other than the hub messages. For example, the messaging application may not provide access to the shared calendar events or shared photo albums of the hub. - The
device applications 636 may also include a native or third-party calendaring application that provides scheduling alerts and access to a visual calendar. The calendaring application provides user access to both shared calendar events that are shared with hub members, and private calendar events (e.g., Exchange calendar events) that have not been shared with other members of the hub. The calendaring application also allows a user to create and/or share a calendar event to all members of the hub without accessing a hub user interface of the hub application. The application may not provide user access to other types of thehub data 610, other than the hub calendar events. For example, the calendaring application may not provide access to the shared message threads or shared photo albums of the hub. - The
device applications 636 may also include a native or third-party media viewing and/or editing application that provides access to photo albums of digital photos or other digital media. The media application provides user access to both shared media files (e.g., photos, videos, and/or music) shared with a private interaction hub, and private media files that have not been shared with other members of the hub. The media application also allows a user to share media files with all members of the hub without accessing a hub user interface of the hub application. The media application may not provide user access to other types ofhub data 610, other than hub media files. For example, the media application may not provide access to the shared message threads or shared calendar events of the hub. - The hub
operating system service 634 can expose one or more Application Programming Interfaces (“APIs”), application binary interfaces, and/or other types ofinterfaces 640 to thehub application 608 and to thedevice applications 636 on themobile device 602 to allow these applications to access, generate, and/or modify thehub data 610 and/or thehub metadata 628, as described herein. The huboperating system service 634 can be implemented as an integrated software component or module of theoperating system 632. The hub operating system service can be maintained at themobile device 602 as executable instructions that are stored on computer-readable storage media, such as any suitable memory device or electronic data storage as described with reference to the example device shown inFIG. 10 . Additionally, the hub operating system service can be executed with a processing system at the mobile device to implement aspects of private interaction hubs. - In embodiments, the hub
operating system service 634 can initiate the hub management service 614 to provision a private interaction hub 618. A user of themobile device 602 can start a private interaction hub 618 and also invite others to join an existing private interaction hub. For example, thehub user interface 606 of thehub application 608 may provide an existing hub member with the option to add a new member to the hub, and the user may identify the prospective member by providing either a mobile device number, or by selecting an existing contact from one of their social networks or other contacts. - The hub
operating system service 634 can receive the request from an existing member user of the device and, in response, the huboperating system service 634 and/or the hub management service 614 communicates an invitation to join the hub as an SMS, MMS, or instant message sent to the prospective member's mobile device that may include a link to a registration site or other registration instructions. The huboperating system service 634 and/or the hub management service 614 receives (e.g., via a registration website) an acceptance to the invitation to join the private interaction hub that includes at least an account identifier (such as an SSO credential), and associates the new member with the existing hub at the hub management service 614. Updated membership information, including the new member's account identifier 620 may also be propagated to other mobile devices of other members in the private interaction hub from the hub management service 614. When the new member user joins the hub, he or she may be prompted to download and/or install various applications configured to provide access to the storedhub data 624 and the storedhub metadata 626, such as thehub application 608 and/or the any of thedevice applications 636. Thehub application 608 may also be the entry point by which a user creates a new hub and/or modifies the membership of an existing hub. - A private interaction hub 618 can be provisioned for any association of people, such as family members, coworkers, friends, neighbors, and any other people that may be associated together in a hub. Additionally, a member user of one private interaction hub may also be a member of multiple hubs, which can be based on a single member sign-on that identifies the member to the hub
operating system service 634 and/or to the hub management service 614. For example, a person may be a member of a family hub that associates members of the person's family, as well as a member of a neighborhood hub that associates members of the person's neighborhood, and a golf hub that associates the person's friends that often golf together. - The integration of the
hub application 608 with theoperating system 632 of the mobile device provides that a user of the device can view a message or update on thehub user interface 606 and in an application user interface of an application that is associated with the message or the update. For example, a hub calendar is integrated with the calendar application (e.g., a device application 636) on themobile device 602, and a calendar update that is displayed in thehub user interface 606 can be selected by the user to initiate the update being displayed in a calendar user interface of the calendar application. Alternatively, the user may view the calendar user interface and select a calendar event that is associated with a private interaction hub to initiate a display of the hub calendar, which includes the calendar event for the members of the hub. As another example, a hub calendar event can be displayed in a hub user interface, and the device calendar application can access and display the hub calendar event along with any private data calendar events that only the user of the device has access to view in a user interface of the device calendar application. Thehub application 608 and thedevice application 636 both acquire the same hub calendar event data (e.g., thesame hub data 610 stored on the mobile device). The two different user interfaces (e.g., a hub user interface and a device application user interface) display the same calendar event data. - In another example, the hub messages and chat features are integrated with messaging applications (e.g., the device applications 636) on the
mobile device 602, and an email, text, or instant message that is displayed in thehub user interface 606 can be selected by the user of themobile device 602 to initiate the message being displayed in a messaging application user interface. Alternatively, the user may view a recent message from a member of a private interaction hub in a messaging application user interface, and select the message to initiate a display of the hub messages interface, such as to view the discussion thread associated with the recent message. - In embodiments, the hub
operating system service 634 at themobile device 602 can receive social network updates for the member users of a private interaction hub 618, such as when two or more of the members of the hub are also “friends” on a public social network site, such as (e.g., FACEBOOK®, TWITTER®, or LINKEDIN®). The social network updates can be pulled from a social network site based on the established association of the account identifiers 620 of the hub members of a private interaction hub 618 at the hub management service 614. The huboperating system service 634 can then aggregate the social network updates for a particular hub for display in thehub user interface 606 or on a homepage “live tile” associated with the hub. The huboperating system service 634 at themobile device 602 can also be implemented to coordinate multi-user interactive updates to an event that is managed in a private interaction hub. For example, several members of a hub may participate in a multi-player interactive game, and each successive interactive update from a member of the hub is initiated by the member at a respective associated mobile device. -
FIG. 7 illustrates anexample system 700 in which various embodiments of private interaction hubs, restricted execution modes, and/or family coordination can be implemented. The example system includes aclient device 702, which may be any one or combination of amobile phone 704,tablet device 706,computing device 708, communication, entertainment, gaming, navigation, and/or other type of portable electronic device. Any of theclient devices 710 can be implemented with various components, such as a processor and/or memory system, as well as any number and combination of differing components as further described with reference to the example device shown inFIG. 10 . - The
example system 700 includes adevice association service 712 that associates or correlates theclient devices 710 bydevice identifiers 714,user identifiers 716, and/or by any other type of identifiable association. Any of the devices and services can communicate via anetwork 718, which can be implemented to include wired and/or wireless networks. The network can also be implemented using any type of network topology and/or communication protocol, and can be represented or otherwise implemented as a combination of two or more networks, to include IP-based networks and/or the Internet. The network may also include mobile operator networks that are managed by mobile operators, such as a communication service provider, cell-phone provider, and/or Internet service provider. A mobile operator can facilitate mobile data and/or voice communication for any type of a wireless device or mobile phone. - The
client devices 710 can each be associated with a different user, and the users are defined members of afamily 720. Theexample client device 702 is representative of thevarious client devices 710 in the family. Any of the client devices in the family can include services, such as software applications (e.g., computer-executable instructions), that can be executed by a processor or processor system to implement the embodiments described herein. In this example, theclient device 702 includes afamily coordination architecture 722 that implements features of a family hub; aparental control service 724 that implements features of a parent dashboard; a family check-inservice 726; a devicequiet service 728 that implements features of quiet time and quiet zone; asafe driving service 730; and adevice sharing service 732. The client device services are further described with reference toFIG. 8 . - Additionally, any one or combination of the various client device services may be abstracted for implementation by a network service provider, such as the
device association service 712. For example, theclient devices 710 that are associated in thefamily 720 can be interconnected through a central computing device or system (e.g., may be one of the client devices 710), which may be local to the multiple devices or may be located remotely from the devices. In embodiments, the central computing device may be a cloud service of one or more server computers that are connected to the multiple devices via thenetwork 718 or other communication link. The interconnection architecture enables functionality across multiple devices to provide a common and seamless experience to a user of the multiple devices. Each of the client devices may have different physical configurations and capabilities, and the central computing device implements a platform to enable delivery of an experience that is both tailored to a particular device and yet common to all of the devices. -
FIG. 8 further illustrates the various client device services that are described with reference toFIG. 7 . Theclient device 702 includes thefamily coordination architecture 722, theparental control service 724, the family check-inservice 726, the devicequiet service 728, thesafe driving service 730, and thedevice sharing service 732, which may be embodied as the restrictedexecution service 202 described with reference toFIGS. 1-6 . In embodiments, thefamily coordination architecture 722 may generally be implemented as a service, as described herein. Generally, any of the described services may be implemented and/or described in the general context of software, firmware, hardware (e.g., fixed logic circuitry), manual processing, applications, routines, programs, objects, components, data structures, procedures, modules, functions, or any combination thereof. A software implementation represents program code that performs specified tasks when executed by a computer processor. In embodiments, any of the processing, computation, filtering, code execution, etc. can be implemented with distributed computing services and/or devices, such as on a client device, a server device, and/or network-based service. - In this example of the client device services, the
family coordination architecture 722 includes afamily hub manager 800 that implements, coordinates, and/or manages various family features, such asfamily calendar 802,family chat 804, family sharedcontacts 806, family journal andmemories 808, tasks andchores 810,family keys 812, andfamily budget 814. Theparental control service 724 implements features such as a parent dashboard manager 816, age appropriate content control 818, and safe social networking 820. The devicequiet service 728 implements features such asquiet time 822 andquiet zone 824. The various client device services and features are further described throughout the document. - Any of the client device services can include, be integrated with, or implement any of the other client device services and applications. For example, the
family coordination architecture 722 can include any one or combination of theparental control service 724, the family check-inservice 726, the devicequiet service 728, thesafe driving service 730, and thedevice sharing service 732. In embodiments, the family coordination architecture may be implemented for the coordination of time, messaging, data, activities, and any other shared services. The shared services may be any of the client device services and/or any type of shared services that may be associated with a service and/or multi-system operator (MSO) devices. Further, the parental control service can be implemented to throttle, expand, manage, and/or reallocate data sharing of the client device services. - Any of the family features and/or applications of the family coordination architecture can be implemented as private, some private and some public, or private with optional user control to share information and data with public third-party services and applications. Similarly, any of the client device services and applications described herein may be private, public, sharable, user-controllable, and/or any combination thereof. In embodiments, the family coordination architecture and/or the family hub manager can be implemented as an overall managing architecture, a collective embodiment of, and/or integration of any of the client device services and/or applications that may be implemented for expandability and instantiated together as the family coordination and/or the family hub architecture. Further, any of the client device services can include, be integrated with, or implement any of the other client device services and applications, and collectively may be embodied as a family hub and/or coordination architecture or service.
- The
device sharing service 732 can embody the restrictedexecution service 202 described with reference toFIGS. 1-6 , such as to implement a phone share feature provides that a user can share his or her phone (e.g., a mobile device) with another person, yet limit the other person's access to features, functions, and information on the phone. For example, a user owner of a mobile phone can activate a restricted execution mode on the device and then share the phone with a stranger. In the restricted execution mode, only outgoing phone calls will be allowed and the restricted execution mode enforces the task restrictions to restrict an incoming call, yet allow the outgoing call when the origin of the outgoing call is traced to the device phone application that has been included in the shared space. - In an implementation, a parent can share his or her phone with a child to play a game on the phone, but the child cannot answer phone calls, read emails, access texting, access any other data and phone settings, or initiate any type of a monetary transaction (e.g., to buy a phone app or music download). Similarly, a phone user can share his or her photos on her phone with a friend that asks to look through the photos, but the friend cannot access any other phone data or settings. A phone user may also share his or her phone with anyone needing to make a phone call, but without giving access to any other phone data or settings.
- Phone share as a feature of a restricted execution mode can be pass-coded to only allow another person access to designated functionality of the phone based on user set restrictions. A phone share pass-code can be quickly initiated with a gesture, key input, or sequence of key inputs. Additionally, phone share profiles can be implemented for different types of individuals, such as Friend, Parent, Stranger, Kid, Child, etc. The phone share features can also be implemented for a family phone in the house that any family member may take with them, such as when kids go out with friends, or a parent runs an errand to the store, or given to a house guest to use during their stay.
- The
device sharing service 732 is also implemented to restrict incoming phone calls and message displays to limit the communication functions of themobile device 1000, yet can allow an outgoing phone call for shared use. The message displays may include email and text message displays, calendar events and alerts, instant messages, and any other messages that may be displayed for the user that owns the device (e.g., rather than the temporary, shared user). In a shared use mode of the mobile device, thedevice sharing service 732 can also restrict access to applications that allow a user to initiate a monetary transaction, such as via a browser, music, and/or gaming application via which a user can conduct a purchase transaction, download music, purchase and download an application, and any other type of monetary transaction. Although, there may be instances when a child may be allowed to access more money, such as to take a cab in an emergency. Thedevice sharing service 732 can also be implemented to limit a younger child's ability to pair his or her phone with the car, or to send items to the printer in a home from a phone. As phones become NFC enabled and the phone can replace keys when providing secure access,device sharing service 732 can be implemented to limit the ability of a child to open some doors using a phone device. -
FIG. 9 is an example of asystem 900 showing two different examples of hub user-interfaces - The hub is a central space for membership-orientated coordination of communications, activities, information, and integration. Designated member relationships can be utilized to define how the data and information is managed, and can be implemented to leverage the social contract, such as between members of a defined familial group in the illustrated example. In one or more implementations, the hub is implemented as a user interface (e.g., via a client device application) for integration and aggregation of the membership-orientated communications, activities, and information. A hub can be implemented as a private, shared space between defined members. The hub contains links to other members' profiles, and based on restriction settings, allows aggregation for visibility of some of other members' data and information within the hub. The hub shares a group calendar which can be viewed and edited, a common text message window, a posting board, a shared photo album, a check-in feature, and any other type of shared information.
- Devices and/or device accounts can be associated within a set of devices or device accounts (e.g., a family phone account, user accounts, a connected set of devices, and so on), and all or a subset of the devices or accounts can communicate with other devices or accounts. The members of a hub can be defined by any number of different classes of people, such as Junior, Teen, Mom, Dad, (or Parent), Grandparent, Nanny, Life-Coach, and so on for the illustrated example of a family. Further, the members of a family can be defined to distinguish a live-in Nanny from a Babysitter, for example.
- Additionally, membership of the hub as well as use of the hub by the members can be controlled by a select collection of users, such as one or two mobile phones by the associated users of the client devices. For example, one of the members in the hub can be the designated control person, such as Mom who runs the household, employer, and so on.
- From a single configuration of the members, the hub can be provisioned, setup, and propagated out, e.g., automatically. The features and configuration of a hub may default to an automatic, easy setup, but any rule, feature, or configuration aspect can be readily modified by a user. Provisioning a hub may be based on billing, e.g., a family or corporate billing plan. However, if a phone device is changed to a different carrier, for example, the phone device can still receive texts related to the hub. Alternatively or in addition, provisioning a hub can be based on email addresses, phone numbers, user account identifiers, or any other identifier.
- A retail person selling a new phone package, for instance, can easily identify the members each to their new phone devices and initiate the hub being instantiated. From a consumer perspective, it just works and members can walk out of the store all set up. All of the data and information can be shared with a single selection, and thus the members do not have to share each item (e.g., a grocery list, photos, calendar, etc.) individually and separately.
- The hub user interface may act as a shared space that is customizable and provides for user-generated and shared content. Some information can be shared, while other information is not. For example, Mom's complete Christmas list is not viewable by the other family members, but Dad and Kids can add to the list (and only view their contribution). Hub setup may be performed “a la carte,” meaning only the features that members want displayed on the hub wall can be selected. For example, Mom wants to see the shopping list, whereas Dad does not shop and so wants to avoid having the list displayed on his device, yet he could still access the shopping list to add items when desired.
- The hub user interface integrates functions, calendar functionality, event and/or data summaries (i.e., on the “wall”), as well as content that is shared between the members of the hub (e.g., lists, documents, etc.). For example, the hub user interface may include a “family check-in” or “check-in” option. The hub user interface may also include a chat section where location check-ins messaged are displayed along with other messages interchanged between the members of the hub. The hub “wall” is representative of an area via which members of the group may add to as desired, like a lunchroom bulletin board, family refrigerator, and so on. In implementations, the information can be aggregated in pillars or columns and shown on the hub wall as illustrated. The hub wall can also represent an interrelation between any of the information and data that appears on the wall and its placement in time. The hub settings provide that a user can control which functions are integrated and displayed within the hub, such as on the wall.
- The hub information may also be context relevant to the members of the hub, and the calendar includes shared hub events. Calendar updates can be posted as notice events on the wall, and a user can look at the wall to see upcoming hub events, or the events that pertain to one or more other members of the hub. Messaging may also be performed that is private among the members of the hub. A member can instant text (or other communication) to all other members in the hub. Texting—such as for a work meeting—can divide each members' display on their respective devices into individual screens for each member.
- The hub may also be extensible, and may link to a hard drive on a home computer, or sync to just one of the other devices, the manager, or cloud control (e.g., from a network-based service). The hub may also be extensible to third parties that add a note on the hub wall, such as implemented with application program interfaces (APIs) for functions to post data to the hub. A third-party application, however, would not have access to the context of the hub wall, such as to obtain or display hub data. The private information and hub data could be encrypted and only decrypted by the phone devices that are associated with the hub.
- Thus, the hub supported by a hub coordination architecture may be thought of as a central space for coordination of communications, activities, information, and integration of members of the hub. Hubs may be defined to support a variety of different membership, such as for family members, coworkers, friends, acquaintances, fan clubs, and so forth. Therefore, although examples are discussed that relate to a family in the following discussion it should be readily apparent that membership in the hub may be defined in a variety of other ways without departing from the spirit and scope thereof. Accordingly, the hub coordination architecture may be used to support a variety of different functionality. An example of this functionality is described herein as a hub restricted execution service, and further aspects of private interaction hubs are also described herein.
-
FIG. 10 illustrates anexample system 1000 that includes anexample device 1002, which can implement embodiments of restricted execution modes. Theexample device 1002 can be implemented as any of the devices, services, and/or servers described with reference to the previousFIGS. 1-9 , such as any type of client or mobile device, mobile phone, tablet, computing, communication, entertainment, gaming, media playback, and/or other type of device. For example, themobile device 100 shown inFIGS. 1-2 may be implemented as theexample device 1002. - The
device 1002 includescommunication devices 1004 that enable wired and/or wireless communication ofdevice data 1006, such as media content and the shared messages, updates, and events data at the device. The media content can include any type of audio, video, and/or image data. Thecommunication devices 1004 can also include transceivers for cellular phone communication and/or for network data communication. - The
device 1002 also includes input/output (I/O) interfaces 1008, such as data network interfaces that provide connection and/or communication links between the device, data networks, and other devices. The I/O interfaces can be used to couple the device to any type of components, peripherals, and/or accessory devices. The I/O interfaces also include data input ports via which any type of data, media content, and/or inputs can be received, such as user inputs to the device, as well as any type of audio, video, and/or image data received from any content and/or data source. - The I/
O interfaces 1008 also support natural user interface (NUI) inputs to thedevice 1002, such as any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of natural user interface inputs may rely on speech recognition, touch and stylus recognition, gesture recognition on-screen and motion gesture recognition proximate the device, head, eye, and environment recognition and tracking, augmented reality and virtual reality systems, and any other type of audible, vision, touch, gesture, and/or machine intelligence that may determine user input intentions. - The
device 1002 includes aprocessing system 1010 that may be implemented at least partially in hardware, such as with any type of microprocessors, controllers, and the like that process executable instructions. The processing system can include components of an integrated circuit, programmable logic device, a logic device formed using one or more semiconductors, and other implementations in silicon and/or hardware, such as a processor and memory system implemented as a system-on-chip (SoC). Alternatively or in addition, the device can be implemented with any one or combination of software, hardware, firmware, or fixed logic circuitry that may be implemented with processing and control circuits. Thedevice 1002 may further include any type of a system bus or other data and command transfer system that couples the various components within the device. A system bus can include any one or combination of different bus structures and architectures, as well as control and data lines. - The
device 1002 also includes computer-readable storage media 1012, such as data storage devices that can be accessed by a computing device, and that provide persistent storage of data and executable instructions (e.g., software applications, programs, functions, and the like). Examples of computer-readable storage media include volatile memory and non-volatile memory, fixed and removable media devices, and any suitable memory device or electronic data storage that maintains data for computing device access. The computer-readable storage media can include various implementations of random access memory (RAM), read-only memory (ROM), flash memory, and other types of storage media in various memory device configurations. - Generally, computer-readable storage media is representative of media and/or devices that enable persistent and/or non-transitory storage of data in contrast to mere signal transmission, carrier waves, or signals per se. A computer-readable signal media may refer to a signal-bearing medium that transmits instructions, such as via a network. The signal media can embody computer-readable instructions as data in a modulated data signal, such as carrier waves or other transport mechanism.
- The computer-
readable storage media 1012 provides storage of thedevice data 1006 andvarious device applications 1014, such as an operating system that is maintained as a software application with the computer-readable storage media and executed by theprocessing system 1010. In this example, the device applications also include adevice share service 1016 that implements embodiments of restricted execution modes, such as when theexample device 1002 is implemented as themobile device 100 shown inFIG. 1 . An example of thedevice share service 1016 is the restrictedexecution service 202 that is integrated with theoperating system 204 at themobile device 100, as described with reference toFIG. 1 . - The
device applications 1014 can also include any of the services andapplications 1018 that implement embodiments of restricted execution modes. Theexample device 1002 also includes afamily coordination architecture 1020, which may be implemented in the general context of software, firmware, hardware (e.g., fixed logic circuitry), or any combination thereof to support embodiments of restricted execution modes and/or mobile devices family coordination. Thedevice 1002 can also include apositioning system 1022, such as a GPS transceiver, or similar positioning system components, that can be utilized to determine a global or navigational position of the device. - The
device 1002 also includes an audio and/orvideo system 1024 that generates audio data for anaudio device 1026 and/or generates display data for adisplay device 1028. The audio device and/or the display device include any devices that process, display, and/or otherwise render audio, video, display, and/or image data. In implementations, the audio device and/or the display device are integrated components of theexample device 1002. Alternatively, the audio device and/or the display device are external, peripheral components to the example device. - In embodiments, at least part of the techniques described for restricted execution modes may be implemented in a distributed system, such as over a “cloud” 1030 in a
platform 1032. The cloud 1030 includes and/or is representative of theplatform 1032 forservices 1034 and/orresources 1036. For example, theservices 1034 may include the cloud storage andservice 206, and any of thedata services 208 as described with reference toFIG. 1 . Additionally, theresources 1036 may include theaccessible data 210 as described with reference toFIG. 1 . - The
platform 1032 abstracts underlying functionality of hardware, such as server devices (e.g., included in the services 1034) and/or software resources (e.g., included as the resources 1036), and connects theexample device 1002 with other devices, servers, etc. Theresources 1036 may also include applications and/or data that can be utilized while computer processing is executed on servers that are remote from theexample device 1002. Additionally, theservices 1034 and/or theresources 1036 may facilitate subscriber network services, such as over the Internet, a cellular network, or Wi-Fi network. Theplatform 1032 may also serve to abstract and scale resources to service a demand for theresources 1036 that are implemented via the platform, such as in an interconnected device embodiment with functionality distributed throughout thesystem 1000. For example, the functionality may be implemented in part at theexample device 1002 as well as via theplatform 1032 that abstracts the functionality of the cloud 1030. - Although embodiments of restricted execution modes have been described in language specific to features and/or methods, the appended claims are not necessarily limited to the specific features or methods described. Rather, the specific features and methods are disclosed as example implementations of restricted execution modes.
Claims (20)
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/726,099 US20130305354A1 (en) | 2011-12-23 | 2012-12-22 | Restricted execution modes |
KR1020147020747A KR20140113985A (en) | 2011-12-23 | 2012-12-23 | Restricted execution modes |
CN201280063918.XA CN104012150B (en) | 2011-12-23 | 2012-12-23 | The limited execution pattern and its method of mobile equipment |
PCT/US2012/071557 WO2013096949A1 (en) | 2011-12-23 | 2012-12-23 | Restricted execution modes |
JP2014548998A JP6275650B2 (en) | 2011-12-23 | 2012-12-23 | Restricted execution mode |
EP12859485.0A EP2795970A4 (en) | 2011-12-23 | 2012-12-23 | Restricted execution modes |
US14/686,300 US9665702B2 (en) | 2011-12-23 | 2015-04-14 | Restricted execution modes |
JP2017047278A JP2017130960A (en) | 2011-12-23 | 2017-03-13 | Restricted execution modes |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161580147P | 2011-12-23 | 2011-12-23 | |
US201261695294P | 2012-08-30 | 2012-08-30 | |
US13/726,099 US20130305354A1 (en) | 2011-12-23 | 2012-12-22 | Restricted execution modes |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/686,300 Continuation US9665702B2 (en) | 2011-12-23 | 2015-04-14 | Restricted execution modes |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130305354A1 true US20130305354A1 (en) | 2013-11-14 |
Family
ID=48669604
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/726,099 Abandoned US20130305354A1 (en) | 2011-12-23 | 2012-12-22 | Restricted execution modes |
US14/686,300 Active US9665702B2 (en) | 2011-12-23 | 2015-04-14 | Restricted execution modes |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/686,300 Active US9665702B2 (en) | 2011-12-23 | 2015-04-14 | Restricted execution modes |
Country Status (6)
Country | Link |
---|---|
US (2) | US20130305354A1 (en) |
EP (1) | EP2795970A4 (en) |
JP (2) | JP6275650B2 (en) |
KR (1) | KR20140113985A (en) |
CN (1) | CN104012150B (en) |
WO (1) | WO2013096949A1 (en) |
Cited By (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110030067A1 (en) * | 2009-07-30 | 2011-02-03 | Research In Motion Limited | Apparatus and method for controlled sharing of personal information |
US20140189523A1 (en) * | 2013-01-02 | 2014-07-03 | Canonical Limited | User interface for a computing device |
US20140229863A1 (en) * | 2013-02-14 | 2014-08-14 | Luke St. Clair | Lock Screen with Socialized Applications |
US20140245027A1 (en) * | 2013-02-22 | 2014-08-28 | Samsung Electronics Co., Ltd. | Device and method for providing safety of data by using multiple modes in device |
US20140280552A1 (en) * | 2013-03-15 | 2014-09-18 | Audi Ag | Method to transmit real-time in-vehicle information to an internet service |
US20140283012A1 (en) * | 2013-03-13 | 2014-09-18 | Research In Motion Limited | Method of locking an application on a computing device |
US20140289872A1 (en) * | 2013-03-25 | 2014-09-25 | Samsung Electronics Co., Ltd. | Data sharing control method and data sharing control terminal |
US8874162B2 (en) | 2011-12-23 | 2014-10-28 | Microsoft Corporation | Mobile device safe driving |
US20140379799A1 (en) * | 2013-06-21 | 2014-12-25 | Microsoft Corporation | Augmenting content obtained from different content sources |
US20150067873A1 (en) * | 2013-09-05 | 2015-03-05 | Fujitsu Limited | Information processing device and method for limiting function |
US9230076B2 (en) | 2012-08-30 | 2016-01-05 | Microsoft Technology Licensing, Llc | Mobile device child share |
US20160057278A1 (en) * | 2013-03-29 | 2016-02-25 | Citrix Systems, Inc. | Mobile Device Locking based on Context |
KR20160039950A (en) * | 2014-10-02 | 2016-04-12 | 현대모비스 주식회사 | Communication device for vehicle and method thereof |
US9325752B2 (en) | 2011-12-23 | 2016-04-26 | Microsoft Technology Licensing, Llc | Private interaction hubs |
US9363250B2 (en) | 2011-12-23 | 2016-06-07 | Microsoft Technology Licensing, Llc | Hub coordination service |
US20160162681A1 (en) * | 2014-12-03 | 2016-06-09 | Fih (Hong Kong) Limited | Communication device and quick selection method |
US9420432B2 (en) | 2011-12-23 | 2016-08-16 | Microsoft Technology Licensing, Llc | Mobile devices control |
US20160241544A1 (en) * | 2013-10-28 | 2016-08-18 | Tencent Technology (Shenzhen) Company Limited | User identity verification method and system, password protection apparatus and storage medium |
US9467834B2 (en) | 2011-12-23 | 2016-10-11 | Microsoft Technology Licensing, Llc | Mobile device emergency service |
US20160371500A1 (en) * | 2014-06-27 | 2016-12-22 | Jerry Huang | Fast Data Protection Using Dual File Systems |
US9665702B2 (en) | 2011-12-23 | 2017-05-30 | Microsoft Technology Licensing, Llc | Restricted execution modes |
US20170199627A1 (en) * | 2014-06-20 | 2017-07-13 | Sony Corporation | Information processing device, information processing method, and program |
US20170300709A1 (en) * | 2015-06-08 | 2017-10-19 | Microsoft Technology Licensing, Llc | Limited-access functionality accessible at login screen |
US9820231B2 (en) | 2013-06-14 | 2017-11-14 | Microsoft Technology Licensing, Llc | Coalescing geo-fence events |
US9880604B2 (en) | 2011-04-20 | 2018-01-30 | Microsoft Technology Licensing, Llc | Energy efficient location detection |
US9973489B2 (en) | 2012-10-15 | 2018-05-15 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US9998866B2 (en) | 2013-06-14 | 2018-06-12 | Microsoft Technology Licensing, Llc | Detecting geo-fence events using varying confidence levels |
US20180205876A1 (en) * | 2017-01-13 | 2018-07-19 | Microsoft Technology Licensing, Llc | Capturing and viewing private photos and videos |
US10063595B1 (en) | 2011-10-11 | 2018-08-28 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
US10097584B2 (en) | 2013-03-29 | 2018-10-09 | Citrix Systems, Inc. | Providing a managed browser |
US10114536B2 (en) * | 2013-03-29 | 2018-10-30 | Microsoft Technology Licensing, Llc | Systems and methods for performing actions for users from a locked device |
US20180373426A1 (en) * | 2015-11-20 | 2018-12-27 | Beijing Kingsoft Internet Security Software Co., Ltd. | Information Showing Method and Apparatus, and Electronic Device |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
US10423766B2 (en) | 2014-06-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Data protection system based on user input patterns on device |
US10430073B2 (en) | 2015-07-17 | 2019-10-01 | Crown Equipment Corporation | Processing device having a graphical user interface for industrial vehicle |
US10474849B2 (en) | 2014-06-27 | 2019-11-12 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
US10476885B2 (en) | 2013-03-29 | 2019-11-12 | Citrix Systems, Inc. | Application with multiple operation modes |
US10545748B2 (en) | 2012-10-16 | 2020-01-28 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
US20200084623A1 (en) * | 2018-09-06 | 2020-03-12 | International Business Machines Corporation | Controlling operation of a mobile device based on user identification |
US10649754B2 (en) * | 2015-01-28 | 2020-05-12 | Ricoh Company, Ltd. | Image processing device and electronic whiteboard |
US10728188B2 (en) * | 2010-12-15 | 2020-07-28 | Samsung Electronics Co., Ltd. | Interface for managing messages in a mobile terminal |
US10754986B2 (en) * | 2017-03-24 | 2020-08-25 | Cover Communications, Llc. | Communication device with selectively shared access modes and incoming communication |
US10754466B2 (en) | 2016-11-22 | 2020-08-25 | Crown Equipment Corporation | User interface device for industrial vehicle |
US10762225B2 (en) | 2018-01-11 | 2020-09-01 | Microsoft Technology Licensing, Llc | Note and file sharing with a locked device |
US20200379730A1 (en) * | 2019-05-31 | 2020-12-03 | Apple Inc. | User interfaces for audio media control |
US10885226B1 (en) * | 2018-06-06 | 2021-01-05 | NortonLifeLock, Inc. | Systems and methods for enforcing secure shared access on computing devices by content state pinning |
US10902152B2 (en) * | 2017-06-30 | 2021-01-26 | Oracle International Corporation | Restricting plug-in application recipes |
US10908896B2 (en) | 2012-10-16 | 2021-02-02 | Citrix Systems, Inc. | Application wrapping for application management framework |
US10984133B1 (en) * | 2017-08-02 | 2021-04-20 | Styra, Inc. | Defining and distributing API authorization policies and parameters |
US11023300B2 (en) | 2017-06-30 | 2021-06-01 | Oracle International Corporation | Governing access to third-party application programming interfaces |
US11038889B2 (en) * | 2018-11-20 | 2021-06-15 | Cisco Technology, Inc. | System and method for migrating existing access control list policies to intent based policies and vice versa |
US11048810B2 (en) * | 2019-04-26 | 2021-06-29 | Motorola Mobility Llc | Electronic device that scans for wearable device with access key |
US11080410B1 (en) | 2018-08-24 | 2021-08-03 | Styra, Inc. | Partial policy evaluation |
US11327815B1 (en) | 2018-08-23 | 2022-05-10 | Styra, Inc. | Validating policies and data in API authorization system |
US11675608B2 (en) | 2019-05-31 | 2023-06-13 | Apple Inc. | Multi-user configuration |
US11683408B2 (en) | 2017-05-16 | 2023-06-20 | Apple Inc. | Methods and interfaces for home media control |
US11681568B1 (en) | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
US11700326B2 (en) | 2014-09-02 | 2023-07-11 | Apple Inc. | Phone user interface |
US11714597B2 (en) | 2019-05-31 | 2023-08-01 | Apple Inc. | Methods and user interfaces for sharing audio |
US11750734B2 (en) | 2017-05-16 | 2023-09-05 | Apple Inc. | Methods for initiating output of at least a component of a signal representative of media currently being played back by another device |
US11755273B2 (en) | 2019-05-31 | 2023-09-12 | Apple Inc. | User interfaces for audio media control |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US11782598B2 (en) | 2020-09-25 | 2023-10-10 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US11785387B2 (en) | 2019-05-31 | 2023-10-10 | Apple Inc. | User interfaces for managing controllable external devices |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11853463B1 (en) | 2018-08-23 | 2023-12-26 | Styra, Inc. | Leveraging standard protocols to interface unmodified applications and services |
US11893052B2 (en) | 2011-08-18 | 2024-02-06 | Apple Inc. | Management of local and remote media items |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11907013B2 (en) | 2014-05-30 | 2024-02-20 | Apple Inc. | Continuity of applications across devices |
US11907519B2 (en) | 2009-03-16 | 2024-02-20 | Apple Inc. | Device, method, and graphical user interface for moving a current position in content at a variable scrubbing rate |
US11960615B2 (en) | 2021-06-06 | 2024-04-16 | Apple Inc. | Methods and user interfaces for voice-based user profile management |
US12001650B2 (en) | 2014-09-02 | 2024-06-04 | Apple Inc. | Music user interface |
US12020086B2 (en) | 2021-04-19 | 2024-06-25 | Styra, Inc. | Defining and distributing API authorization policies and parameters |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2508016A (en) * | 2012-11-19 | 2014-05-21 | Samsung Electronics Co Ltd | Switching a device to a restricted mode |
US20140173747A1 (en) * | 2012-12-13 | 2014-06-19 | Apple Inc. | Disabling access to applications and content in a privacy mode |
US9898642B2 (en) * | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
KR20150031010A (en) * | 2013-09-13 | 2015-03-23 | 삼성전자주식회사 | Apparatus and method for providing lock screen |
US10726159B2 (en) | 2014-01-31 | 2020-07-28 | Maxell, Ltd. | Portable terminal device executing an application in accordance with a selection made by a user |
US10223540B2 (en) * | 2014-05-30 | 2019-03-05 | Apple Inc. | Methods and system for implementing a secure lock screen |
JP6424499B2 (en) * | 2014-07-10 | 2018-11-21 | 株式会社リコー | Image forming apparatus, information processing method, and program |
KR102396685B1 (en) * | 2015-10-08 | 2022-05-11 | 삼성전자 주식회사 | Apparatus and method for monitoring of electronic device |
JP6746456B2 (en) * | 2016-09-30 | 2020-08-26 | シャープ株式会社 | Bulletin board management system, bulletin board server, and housing complex management device |
US10505983B2 (en) * | 2016-11-09 | 2019-12-10 | Airwatch Llc | Enforcing enterprise requirements for devices registered with a registration service |
US10623389B2 (en) * | 2017-05-11 | 2020-04-14 | International Business Machines Corporation | Authenticating a device based on communication patterns in a group of devices |
US10887306B2 (en) | 2017-05-11 | 2021-01-05 | International Business Machines Corporation | Authenticating an unknown device based on relationships with other devices in a group of devices |
CN115549918A (en) * | 2017-06-15 | 2022-12-30 | 创新先进技术有限公司 | Information processing method, device and equipment |
US20190073347A1 (en) * | 2017-09-01 | 2019-03-07 | Google Inc. | Lockscreen note-taking |
CN109151149A (en) * | 2018-07-13 | 2019-01-04 | 北京小米移动软件有限公司 | terminal control method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060136998A1 (en) * | 2004-11-19 | 2006-06-22 | Kabushiki Kaisha Toshiba | Security management system, medical device and method for managing security |
US20090282473A1 (en) * | 2008-05-12 | 2009-11-12 | Microsoft Corporation | Owner privacy in a shared mobile device |
US20110088086A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US8660531B2 (en) * | 2010-11-03 | 2014-02-25 | Blackberry Limited | Access to locked functions |
US20140189608A1 (en) * | 2013-01-02 | 2014-07-03 | Canonical Limited | User interface for a computing device |
US20140199966A1 (en) * | 2013-01-11 | 2014-07-17 | Apple Inc. | Bypassing security authentication scheme on a lost device to return the device to the owner |
US20150074615A1 (en) * | 2013-09-09 | 2015-03-12 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
Family Cites Families (294)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07203015A (en) | 1993-12-28 | 1995-08-04 | Casio Comput Co Ltd | Portable telephone system |
US7822989B2 (en) | 1995-10-02 | 2010-10-26 | Corestreet, Ltd. | Controlling access to an area |
US5883598A (en) | 1995-12-15 | 1999-03-16 | Signatron Technology Corporation | Position location system and method |
US7714778B2 (en) | 1997-08-20 | 2010-05-11 | Tracbeam Llc | Wireless location gateway and applications therefor |
US6339826B2 (en) | 1998-05-05 | 2002-01-15 | International Business Machines Corp. | Client-server system for maintaining a user desktop consistent with server application user access permissions |
US6405033B1 (en) | 1998-07-29 | 2002-06-11 | Track Communications, Inc. | System and method for routing a call using a communications network |
US20010039587A1 (en) | 1998-10-23 | 2001-11-08 | Stephen Uhler | Method and apparatus for accessing devices on a network |
CN1110764C (en) | 1998-11-23 | 2003-06-04 | 黎明网络有限公司 | Integrated information service platform system and its method |
US7353234B2 (en) | 1998-12-30 | 2008-04-01 | Aol Llc, A Delaware Limited Liability Company | Customized user interface based on user record information |
US8601022B2 (en) | 1999-02-12 | 2013-12-03 | Robert L. Gropper | Auto update utility for digital address books |
US6286001B1 (en) | 1999-02-24 | 2001-09-04 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
US6799047B1 (en) | 1999-02-25 | 2004-09-28 | Microsoft Corporation | Locating and tracking a user in a wireless network through environmentally profiled data |
FR2791853B1 (en) * | 1999-04-01 | 2001-05-25 | Sagem | MOBILE APPARATUS AND METHOD FOR MANAGING A SLEEP MODE IN SUCH A MOBILE APPARATUS |
US6920455B1 (en) | 1999-05-19 | 2005-07-19 | Sun Microsystems, Inc. | Mechanism and method for managing service-specified data in a profile service |
US6546002B1 (en) | 1999-07-07 | 2003-04-08 | Joseph J. Kim | System and method for implementing an intelligent and mobile menu-interface agent |
US6549768B1 (en) | 1999-08-24 | 2003-04-15 | Nokia Corp | Mobile communications matching system |
US6446069B1 (en) | 1999-09-17 | 2002-09-03 | International Business Machines Corporation | Access control system for a multimedia datastore |
US7634455B1 (en) | 1999-09-23 | 2009-12-15 | Agile Software Corporation | Method and apparatus for providing controlled access to software objects and associated documents |
KR20010055775A (en) | 1999-12-13 | 2001-07-04 | 윤종용 | Method for controlling paging alert level of wireless communicator in mobile communication system |
US6678508B1 (en) | 2000-02-07 | 2004-01-13 | Ericsson Inc. | Power conservation method for mobile communications device with two receivers |
US7321774B1 (en) | 2002-04-24 | 2008-01-22 | Ipventure, Inc. | Inexpensive position sensing device |
WO2001069384A2 (en) | 2000-03-14 | 2001-09-20 | Buzzpad, Inc. | Method and apparatus for forming linked multi-user groups of shared software applications |
US6847892B2 (en) | 2001-10-29 | 2005-01-25 | Digital Angel Corporation | System for localizing and sensing objects and providing alerts |
US6662023B1 (en) * | 2000-07-06 | 2003-12-09 | Nokia Mobile Phones Ltd. | Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused |
CA2414467A1 (en) | 2000-07-10 | 2002-01-17 | United Parcel Service Of America, Inc. | Method for determining conflicting paths between mobile airborne vehicles and associated system and computer software program product |
US20070042790A1 (en) | 2000-07-14 | 2007-02-22 | Norman Mohi | Locating system and method |
US6519530B2 (en) | 2000-08-15 | 2003-02-11 | Ewatchdogs, Inc. | Intelligent remote location system |
GB2366697A (en) | 2000-08-31 | 2002-03-13 | Nokia Mobile Phones Ltd | Transmission of user profile via messaging service |
JP3671832B2 (en) | 2000-10-31 | 2005-07-13 | 日本電気株式会社 | Mobile phone terminal |
US7669051B2 (en) | 2000-11-13 | 2010-02-23 | DigitalDoors, Inc. | Data security system and method with multiple independent levels of security |
US7346921B2 (en) | 2001-04-30 | 2008-03-18 | Ge Capital Corporation | Definition of low-level security rules in terms of high-level security concepts |
US20040015940A1 (en) | 2001-05-29 | 2004-01-22 | 3Com Corporation | Intelligent device upgrade engine |
US20030003907A1 (en) | 2001-06-29 | 2003-01-02 | Cheng-Shing Lai | Mobile phone monitor and remote control system |
JP2003032353A (en) | 2001-07-16 | 2003-01-31 | Kyocera Corp | Mobile terminal and information access restriction method therefor |
KR100761473B1 (en) | 2001-07-19 | 2007-09-27 | 삼성전자주식회사 | File management system for portable device and a mathod of the same |
US6504480B1 (en) | 2001-08-09 | 2003-01-07 | Hewlett-Packard Company | Electronic device security |
US7530099B2 (en) | 2001-09-27 | 2009-05-05 | International Business Machines Corporation | Method and system for a single-sign-on mechanism within application service provider (ASP) aggregation |
US7076797B2 (en) | 2001-10-05 | 2006-07-11 | Microsoft Corporation | Granular authorization for network user sessions |
US7171557B2 (en) | 2001-10-31 | 2007-01-30 | Hewlett-Packard Development Company, L.P. | System for optimized key management with file groups |
US20030139192A1 (en) | 2002-01-18 | 2003-07-24 | Mazen Chmaytelli | Multi-user mobile telephone station and a method of providing a multi-user mobile telephone station |
US8126889B2 (en) | 2002-03-28 | 2012-02-28 | Telecommunication Systems, Inc. | Location fidelity adjustment based on mobile subscriber privacy profile |
US7161914B2 (en) | 2002-04-11 | 2007-01-09 | Ntt Docomo, Inc. | Context aware application level triggering mechanism for pre-authentication, service adaptation, pre-caching and handover in a heterogeneous network environment |
US7096030B2 (en) | 2002-06-28 | 2006-08-22 | Nokia Corporation | System and method for initiating location-dependent applications on mobile devices |
US6895290B2 (en) | 2002-07-11 | 2005-05-17 | International Business Machines Corporation | Limiting the damaging effects of loud music from audio systems, particularly from automobile audio systems |
US20040039909A1 (en) | 2002-08-22 | 2004-02-26 | David Cheng | Flexible authentication with multiple levels and factors |
US7222360B1 (en) | 2002-11-27 | 2007-05-22 | Sprint Communications Company L.P. | Continuous biometric authentication using frame preamble for biometric data |
US6990333B2 (en) | 2002-11-27 | 2006-01-24 | Microsoft Corporation | System and method for timed profile changes on a mobile device |
US7796944B2 (en) | 2002-12-17 | 2010-09-14 | Motorola Mobility, Inc. | Communication system for dynamic management of a plurality of objects and method therefor |
US6941134B2 (en) | 2002-12-19 | 2005-09-06 | Cingular Wireless Ii, Llc | Automated device behavior management based on preset preferences |
US7308255B2 (en) | 2003-02-10 | 2007-12-11 | Microsoft Corporation | Extending mobile phone networks |
US6990353B2 (en) | 2003-02-19 | 2006-01-24 | Lucent Technologies Inc. | Communication to one mobile station of update of call participation availability status of another mobile station |
AU2004214808B2 (en) | 2003-02-25 | 2008-07-10 | Boston Communications Group, Inc. | Method and system for providing supervisory control over wireless phone usage |
US7359713B1 (en) | 2003-02-28 | 2008-04-15 | Trimble Navigation Limited | Battery consumption optimization for mobile users |
US7324801B2 (en) | 2003-03-06 | 2008-01-29 | Motorola, Inc. | Emergency call-back for a wireless communication device equipped with a user removable module |
US20040192352A1 (en) | 2003-03-25 | 2004-09-30 | Nokia Corporation | Energy efficient object location reporting system |
US7894177B2 (en) | 2005-12-29 | 2011-02-22 | Apple Inc. | Light activated hold switch |
US20090093688A1 (en) | 2003-05-30 | 2009-04-09 | Michael Mathur | System, Device, and Method for Remote Monitoring and Servicing |
US8971913B2 (en) | 2003-06-27 | 2015-03-03 | Qualcomm Incorporated | Method and apparatus for wireless network hybrid positioning |
US6980124B2 (en) | 2003-07-15 | 2005-12-27 | Autosafe International, Inc. | Wireless security, telemetry and control system |
US7089594B2 (en) | 2003-07-21 | 2006-08-08 | July Systems, Inc. | Application rights management in a mobile environment |
US7613472B2 (en) | 2003-09-17 | 2009-11-03 | Sony Ericsson Mobile Communications Ab | System and method of sharing a contact list among mobile phones |
US7212613B2 (en) | 2003-09-18 | 2007-05-01 | International Business Machines Corporation | System and method for telephonic voice authentication |
US7200687B2 (en) | 2003-09-25 | 2007-04-03 | International Business Machines Coporation | Location-based non-uniform allocation of memory resources in memory mapped input/output fabric |
US20050070276A1 (en) | 2003-09-26 | 2005-03-31 | Mcgarry Rob | Systems and methods that provide modes of access for a phone |
KR100910604B1 (en) | 2003-09-26 | 2009-08-03 | 디즈니엔터프라이지즈,인크. | Cell phone parental conrtol |
GB0322716D0 (en) | 2003-09-29 | 2003-10-29 | Symbian Ltd | Multi-user mobile telephones for community access to services |
KR20050037613A (en) | 2003-10-20 | 2005-04-25 | 에스케이텔레텍주식회사 | Method for setting user mode of mobile phone |
US7725732B1 (en) | 2003-12-16 | 2010-05-25 | Ballard Claudio R | Object authentication system |
US20050143171A1 (en) | 2003-12-30 | 2005-06-30 | Loose Timothy C. | Gaming machine having sampled software verification |
WO2005069675A1 (en) | 2004-01-20 | 2005-07-28 | Omron Corporation | Device and method for telephone countermeasure in using telephone during driving |
US7397908B2 (en) | 2004-02-05 | 2008-07-08 | Vtech Telecommunications Limited | System and method for telephone operation in quiet mode |
US7142848B2 (en) | 2004-02-26 | 2006-11-28 | Research In Motion Limited | Method and system for automatically configuring access control |
US20050210104A1 (en) | 2004-03-19 | 2005-09-22 | Marko Torvinen | Method and system for presence enhanced group management and communication |
JP2005292082A (en) | 2004-04-05 | 2005-10-20 | Denso Corp | Controller for satellite navigation |
WO2005103874A2 (en) | 2004-04-16 | 2005-11-03 | Cascade Basic Research Corp. | Modelling relationships within an on-line connectivity universe |
JP4165452B2 (en) * | 2004-05-25 | 2008-10-15 | 日本電気株式会社 | Mobile communication terminal and information management method thereof |
JP2006045908A (en) | 2004-08-04 | 2006-02-16 | Denso Corp | In vehicle apparatus remote control system |
US20060046706A1 (en) | 2004-08-26 | 2006-03-02 | Jiansong Lin | Monitoring and remote control of wireless communication device accessories and functionality |
US7274925B2 (en) | 2004-10-29 | 2007-09-25 | International Business Machines Corporation | Methods and apparatus for flexible communication device usage attribution |
US7317927B2 (en) | 2004-11-05 | 2008-01-08 | Wirelesswerx International, Inc. | Method and system to monitor persons utilizing wireless media |
US7026984B1 (en) | 2004-11-08 | 2006-04-11 | Cingular Wireless Ii, L.L.C. | Intelligent utilization of resources in mobile devices |
US7408506B2 (en) | 2004-11-19 | 2008-08-05 | Intel Corporation | Method and apparatus for conserving power on a mobile device through motion awareness |
KR100499311B1 (en) | 2004-11-19 | 2005-07-04 | (주)프러스텍 | Location share system using gps-handie talkie and, wireless and wired repeater |
US7668830B2 (en) | 2004-11-29 | 2010-02-23 | Nokia Corporation | Access rights |
US20060253570A1 (en) | 2005-01-25 | 2006-11-09 | Pratik Biswas | Self-organizing sensor node network |
US8948724B2 (en) | 2005-01-31 | 2015-02-03 | Nec Corporation | Communication terminal offering privacy protection for hands-free functionality using an analysis process |
US8565788B2 (en) | 2005-02-03 | 2013-10-22 | Mexens Intellectual Property Holding Llc | Method and system for obtaining location of a mobile device |
KR20060092487A (en) | 2005-02-18 | 2006-08-23 | 정광종 | Remote control for mobilephone |
JP4980247B2 (en) | 2005-02-22 | 2012-07-18 | スカイフック ワイヤレス,インク. | Continuous data optimization in positioning systems |
US8472923B2 (en) | 2005-03-10 | 2013-06-25 | At&T Intellectual Property Ii, L.P. | Monitoring mobile phone communications |
US8509859B2 (en) | 2005-03-11 | 2013-08-13 | Qualcomm Incorporated | Apparatus and methods for control of sleep modes in a transceiver |
US7933583B2 (en) | 2005-04-27 | 2011-04-26 | Nokia Corporation | Method and apparatus for digital image processing of an image from an image sensor |
US7472301B2 (en) | 2005-05-27 | 2008-12-30 | Codman Neuro Sciences Sárl | Circuitry for optimization of power consumption in a system employing multiple electronic components, one of which is always powered on |
US20060293057A1 (en) | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
US20070028176A1 (en) | 2005-07-26 | 2007-02-01 | Perdomo Jorge L | Method and system for providing limited access to a locked computing device |
US8880047B2 (en) | 2005-08-03 | 2014-11-04 | Jeffrey C. Konicek | Realtime, location-based cell phone enhancements, uses, and applications |
US7656272B2 (en) | 2005-08-28 | 2010-02-02 | Marcon International, Inc. | Gaming security system and associated methods for selectively granting access |
US7522038B2 (en) | 2005-08-29 | 2009-04-21 | Stericycle, Inc. | Emergency contact system and method |
US7573984B2 (en) | 2005-09-02 | 2009-08-11 | Verizon Business Global Llc | Systems and methods for providing emergency contact services |
US7779280B2 (en) | 2005-09-16 | 2010-08-17 | Gary Stephen Shuster | Low power mode for portable computer system |
US7933632B2 (en) | 2005-09-16 | 2011-04-26 | Microsoft Corporation | Tile space user interface for mobile devices |
US20070072616A1 (en) | 2005-09-23 | 2007-03-29 | Cyrus Irani | Preventing cellphone usage when driving |
US8270933B2 (en) | 2005-09-26 | 2012-09-18 | Zoomsafer, Inc. | Safety features for portable electronic device |
US20070091037A1 (en) | 2005-10-21 | 2007-04-26 | Yee-Chun Lee | Energy Efficient Compact Display For Mobile Device |
US20070111726A1 (en) | 2005-11-15 | 2007-05-17 | Sony Ericsson Mobile Communications Ab | User profiles for mobile terminals |
US20070168971A1 (en) | 2005-11-22 | 2007-07-19 | Epiphany, Inc. | Multi-tiered model-based application testing |
US7676234B2 (en) | 2005-11-23 | 2010-03-09 | Research In Motion Limited | Routing of a short message originated by a mobile device |
US20070180509A1 (en) | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US7545961B2 (en) | 2005-12-22 | 2009-06-09 | Daon Holdings Limited | Biometric authentication system |
US7480870B2 (en) | 2005-12-23 | 2009-01-20 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US20090005061A1 (en) | 2005-12-30 | 2009-01-01 | Trueposition, Inc. | Location quality of service indicator |
US20070218938A1 (en) | 2006-03-20 | 2007-09-20 | Conexant Systems, Inc. | Sleep Mode Systems and Methods |
JP4887855B2 (en) | 2006-03-22 | 2012-02-29 | 日本電気株式会社 | Portable electronic device and control method thereof |
CN100466783C (en) | 2006-04-06 | 2009-03-04 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
US20070245398A1 (en) | 2006-04-12 | 2007-10-18 | Bellsouth Intellectual Property Corporation | Universal parental control |
US7958562B2 (en) | 2006-04-27 | 2011-06-07 | Xerox Corporation | Document access management system |
US8843560B2 (en) | 2006-04-28 | 2014-09-23 | Yahoo! Inc. | Social networking for mobile devices |
US20070264981A1 (en) | 2006-04-28 | 2007-11-15 | Douglas Miller | Restricted feature access for portable electronic devices |
US20070300140A1 (en) | 2006-05-15 | 2007-12-27 | Nokia Corporation | Electronic device having a plurality of modes of operation |
JP2009540648A (en) | 2006-06-08 | 2009-11-19 | シアラン ブラッドレー | SIM-based firewall method and apparatus |
US20080014964A1 (en) | 2006-07-12 | 2008-01-17 | Loc-Aid Technologies, Inc. | System and method for generating use statistics for location-based applications |
US20080020803A1 (en) * | 2006-07-18 | 2008-01-24 | Motorola, Inc. | Methods and devices for restricting access to mobile communication device functionality |
US20080032703A1 (en) | 2006-08-07 | 2008-02-07 | Microsoft Corporation | Location based notification services |
US8170603B2 (en) | 2006-08-28 | 2012-05-01 | Sony Ericsson Mobile Communications Ab | Differentiated access to a data item store |
US8106856B2 (en) | 2006-09-06 | 2012-01-31 | Apple Inc. | Portable electronic device for photo management |
US8595356B2 (en) | 2006-09-28 | 2013-11-26 | Microsoft Corporation | Serialization of run-time state |
US7787870B2 (en) | 2006-09-29 | 2010-08-31 | Motorola, Inc. | Method and system for associating a user profile to a caller identifier |
US8331899B2 (en) | 2006-10-02 | 2012-12-11 | Sony Mobile Communications Ab | Contact list |
US7831264B2 (en) | 2006-10-23 | 2010-11-09 | Sony Ericsson Mobile Communications Ab | Tracking a group of mobile terminals |
US20080096518A1 (en) | 2006-10-23 | 2008-04-24 | Motorola, Inc. | Overriding telecommunication quiet zone defaults for emergency contact list communications |
US20080111698A1 (en) | 2006-11-09 | 2008-05-15 | International Business Machines Corporation | Mobile device power management |
US8108414B2 (en) | 2006-11-29 | 2012-01-31 | David Stackpole | Dynamic location-based social networking |
US8311730B2 (en) | 2006-11-29 | 2012-11-13 | Neff Ryan A | Vehicle position determination system |
US20080154780A1 (en) | 2006-12-22 | 2008-06-26 | Nortel Networks Limited | Sharing usage rights |
US7987378B2 (en) | 2007-01-05 | 2011-07-26 | Apple Inc. | Automatic power-off of bluetooth device from linked device |
KR100872348B1 (en) | 2007-01-11 | 2008-12-05 | 삼성전자주식회사 | System and method for energy management for sensor network using the spanning tree |
US7783703B2 (en) | 2007-01-29 | 2010-08-24 | Sony Corporation | Shared home media platform to support multi-user control |
US20090017910A1 (en) | 2007-06-22 | 2009-01-15 | Broadcom Corporation | Position and motion tracking of an object |
CA2679931A1 (en) | 2007-03-02 | 2008-09-12 | Aegis Mobility, Inc. | Management of mobile device communication sessions to reduce user distraction |
US7680882B2 (en) | 2007-03-06 | 2010-03-16 | Friendster, Inc. | Multimedia aggregation in an online social network |
US7869792B1 (en) | 2007-03-13 | 2011-01-11 | Sprint Spectrum L.P. | Handset based dynamic parental controls |
US20080254767A1 (en) | 2007-04-10 | 2008-10-16 | Sharp Laboratories Of America, Inc. | System and method for limiting access to features in a mobile telecommunications device |
US8046839B2 (en) | 2007-04-13 | 2011-10-25 | Qualcomm Incorporated | Mobile unit parental control |
US9066199B2 (en) | 2007-06-28 | 2015-06-23 | Apple Inc. | Location-aware mobile device |
US8275352B2 (en) | 2007-06-28 | 2012-09-25 | Apple Inc. | Location-based emergency information |
US8127254B2 (en) | 2007-06-29 | 2012-02-28 | Nokia Corporation | Unlocking a touch screen device |
US8291067B2 (en) | 2007-06-29 | 2012-10-16 | Microsoft Corporation | Providing access to presence information using multiple presence objects |
JP2009017239A (en) * | 2007-07-04 | 2009-01-22 | Nec Corp | Mobile phone terminal and mode changing method by authentication function thereof |
US7629891B1 (en) | 2007-07-30 | 2009-12-08 | Scott Douglas Bell | Personal safety check-in and follow-up system and method |
DE102007035855B4 (en) | 2007-07-31 | 2013-07-04 | Aloqa Gmbh | location method |
US20090045927A1 (en) | 2007-08-15 | 2009-02-19 | Qualcomm Incorporated | System for alerting remote vehicle operator of unsafe transportation network conditions |
DE102007042337A1 (en) | 2007-09-06 | 2009-03-12 | Siemens Ag | Control device and method for controlling a medical diagnostic and / or therapeutic system and medical diagnostic and / or therapeutic system |
TWI617936B (en) * | 2007-09-24 | 2018-03-11 | 蘋果公司 | Embedded authentication systems in an electronic device |
US8701210B2 (en) | 2007-10-02 | 2014-04-15 | Computime, Ltd. | Adjustable feature access for a controlled environmental system |
US8645842B2 (en) | 2007-11-05 | 2014-02-04 | Verizon Patent And Licensing Inc. | Interactive group content systems and methods |
US8189878B2 (en) | 2007-11-07 | 2012-05-29 | Verizon Patent And Licensing Inc. | Multifactor multimedia biometric authentication |
US8065724B2 (en) | 2007-12-14 | 2011-11-22 | International Business Machines Corporation | Computer method and apparatus for authenticating unattended machines |
US20090157560A1 (en) | 2007-12-14 | 2009-06-18 | Bank Of America Corporation | Information banking and monetization of personal information |
US8538376B2 (en) | 2007-12-28 | 2013-09-17 | Apple Inc. | Event-based modes for electronic devices |
JP5258020B2 (en) | 2008-01-25 | 2013-08-07 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Technology to control communication |
US8588814B2 (en) | 2008-02-05 | 2013-11-19 | Madhavi Jayanthi | Client in mobile device for sending and receiving navigational coordinates and notifications |
US8910299B2 (en) * | 2008-02-08 | 2014-12-09 | Steven Charles Michalske | Emergency information access on portable electronic devices |
US8060018B2 (en) | 2008-02-08 | 2011-11-15 | Yahoo! Inc. | Data sharing based on proximity-based ad hoc network |
WO2009105666A1 (en) | 2008-02-22 | 2009-08-27 | Cellblock Telecommunications Company, Inc. | Vehicle based system for disabling a cell phone while traveling |
US7898428B2 (en) | 2008-03-06 | 2011-03-01 | Research In Motion Limited | Safety for mobile device users while driving |
US8201263B2 (en) | 2008-04-17 | 2012-06-12 | Sony Ericsson Mobile Communications Ab | Method and apparatus for enabling access to contact information |
JP2009267666A (en) | 2008-04-24 | 2009-11-12 | Aisin Aw Co Ltd | In-vehicle unit and program |
US8072379B2 (en) | 2008-05-12 | 2011-12-06 | Qualcomm Incorporated | GPS power savings using low power sensors |
US8744493B2 (en) | 2008-05-28 | 2014-06-03 | Via Telecom, Inc. | Localized silence area for mobile devices |
US8477139B2 (en) * | 2008-06-09 | 2013-07-02 | Apple Inc. | Touch screen device, method, and graphical user interface for manipulating three-dimensional virtual objects |
JP5223491B2 (en) * | 2008-06-24 | 2013-06-26 | 日本電気株式会社 | Terminal device, operation mode change method and operation mode change control program used for the terminal device |
KR101517967B1 (en) | 2008-07-07 | 2015-05-06 | 엘지전자 주식회사 | Controlling a Mobile Terminal |
US8115609B2 (en) | 2008-07-22 | 2012-02-14 | Nissaf Ketari | Multi function bluetooth apparatus |
KR20100010860A (en) | 2008-07-23 | 2010-02-02 | 엘지전자 주식회사 | Mobile terminal and event control method thereof |
US8725171B2 (en) | 2008-09-04 | 2014-05-13 | Qualcomm Incorporated | System and method of providing mode changes to wireless devices |
KR101505681B1 (en) | 2008-09-05 | 2015-03-30 | 엘지전자 주식회사 | Mobile Terminal With Touch Screen And Method Of Photographing Image Using the Same |
JP4220575B1 (en) | 2008-09-12 | 2009-02-04 | 株式会社東芝 | Information processing device |
US8363098B2 (en) | 2008-09-16 | 2013-01-29 | Plantronics, Inc. | Infrared derived user presence and associated remote control |
US20100074450A1 (en) | 2008-09-23 | 2010-03-25 | Shiun-Chih Liao | System for adjusting playing volume automatically and method for the same |
US20100079380A1 (en) * | 2008-09-30 | 2010-04-01 | Nokia Corporation | Intelligent input device lock |
US8204649B2 (en) | 2008-10-09 | 2012-06-19 | University Of Utah Research Foundation | Integrated systems and method for preventing mobile computing device use while driving |
AU2009308749A1 (en) | 2008-10-31 | 2010-05-06 | University Of Utah Research Foundation | Integrated vehicle key and mobile phone system for preventing mobile phone use while driving |
US9400879B2 (en) | 2008-11-05 | 2016-07-26 | Xerox Corporation | Method and system for providing authentication through aggregate analysis of behavioral and time patterns |
TWI380047B (en) | 2008-11-25 | 2012-12-21 | Univ Nat Taiwan | Energy efficient indoor localization method and system by footstep-based mobility estimation |
KR101562841B1 (en) | 2008-11-27 | 2015-10-23 | 삼성전자주식회사 | Apparatus and method for providing map service using global positioning service in a mobile terminal |
JP5326527B2 (en) | 2008-11-28 | 2013-10-30 | 富士通株式会社 | Authentication apparatus and authentication method |
US8665216B2 (en) | 2008-12-03 | 2014-03-04 | Tactile World Ltd. | System and method of tactile access and navigation for the visually impaired within a computer system |
US9197738B2 (en) * | 2008-12-04 | 2015-11-24 | Microsoft Technology Licensing, Llc | Providing selected data through a locked display |
US20100146437A1 (en) * | 2008-12-04 | 2010-06-10 | Microsoft Corporation | Glanceable animated notifications on a locked device |
US8443303B2 (en) | 2008-12-22 | 2013-05-14 | Verizon Patent And Licensing Inc. | Gesture-based navigation |
KR101565768B1 (en) * | 2008-12-23 | 2015-11-06 | 삼성전자주식회사 | Apparatus and method for unlocking a locking mode of portable terminal |
EP2382527A2 (en) | 2008-12-30 | 2011-11-02 | France Telecom | User interface to provide enhanced control of an application program |
US8433343B2 (en) | 2008-12-30 | 2013-04-30 | Centurylink Intellectual Property Llc | Wireless handset vehicle safety interlock database |
KR101480470B1 (en) | 2009-01-13 | 2015-01-26 | 엘지전자 주식회사 | Mobile terminal and method for controlling touch lock screen thereof |
WO2010081836A1 (en) | 2009-01-16 | 2010-07-22 | Tele Atlas B.V. | Method for computing an energy efficient route |
US8521122B2 (en) | 2009-01-28 | 2013-08-27 | Blackberry Limited | Mobile device user interface for displaying emergency information |
US8355751B2 (en) | 2009-02-18 | 2013-01-15 | Research In Motion Limited | Automatic activation of speed measurement in mobile device based on available motion indicia |
CN101815116A (en) * | 2009-02-20 | 2010-08-25 | 中兴通讯股份有限公司 | Mobile telephone method and device based on multi-user |
US9704138B2 (en) | 2009-02-24 | 2017-07-11 | At&T Intellectual Property I, L.P. | Calendar overlay features |
US8261361B2 (en) * | 2009-03-11 | 2012-09-04 | Microsoft Corporation | Enabling sharing of mobile communication device |
CN101852848B (en) | 2009-04-01 | 2013-07-31 | 鸿富锦精密工业(深圳)有限公司 | Active globe positioning tracing equipment and position reporting method thereof |
US20100255856A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Location Sensing Selection for Mobile Devices |
US8490176B2 (en) | 2009-04-07 | 2013-07-16 | Juniper Networks, Inc. | System and method for controlling a mobile device |
US8254890B2 (en) | 2009-04-08 | 2012-08-28 | Research In Motion Limited | System and method for managing items in a list shared by a group of mobile devices |
US8060571B2 (en) | 2009-04-15 | 2011-11-15 | Sling Media, Inc. | Sharing of audio/visual content with a selected user |
JP5377062B2 (en) * | 2009-04-28 | 2013-12-25 | 京セラドキュメントソリューションズ株式会社 | Image forming apparatus |
US8405505B2 (en) | 2009-05-26 | 2013-03-26 | Qualcomm Incorporated | Power management of sensors within a mobile device |
US8204833B2 (en) | 2009-05-27 | 2012-06-19 | Softroute Corporation | Method for fingerprinting and identifying internet users |
US9258408B2 (en) | 2009-06-04 | 2016-02-09 | Nokia Technologies Oy | Method and apparatus for third-party control of device behavior |
US9086875B2 (en) | 2009-06-05 | 2015-07-21 | Qualcomm Incorporated | Controlling power consumption of a mobile device based on gesture recognition |
DE102009024656A1 (en) | 2009-06-12 | 2011-03-24 | Volkswagen Ag | A method of controlling a graphical user interface and graphical user interface operator |
BRPI0924541A2 (en) * | 2009-06-16 | 2014-02-04 | Intel Corp | CAMERA APPLICATIONS ON A PORTABLE DEVICE |
US8812232B2 (en) | 2009-06-22 | 2014-08-19 | Nokia Corporation | Method and apparatus for reducing energy consumption of a user equipment |
WO2011011544A1 (en) | 2009-07-21 | 2011-01-27 | Scott Ferrill Tibbitts | Method and system for controlling a mobile communication device in a moving vehicle |
US8213962B2 (en) | 2009-07-21 | 2012-07-03 | Verizon Patent And Licensing Inc. | Vehicle computer link to mobile phone |
US9386447B2 (en) | 2009-07-21 | 2016-07-05 | Scott Ferrill Tibbitts | Method and system for controlling a mobile communication device |
US20110047484A1 (en) | 2009-08-19 | 2011-02-24 | Onehub Inc. | User manageable collaboration |
WO2011023244A1 (en) | 2009-08-25 | 2011-03-03 | Tele Atlas B.V. | Method and system of processing data gathered using a range sensor |
US8228234B2 (en) | 2009-08-27 | 2012-07-24 | Hewlett-Packard Development Company, L.P. | Power saving system and method for mobile computing device |
US9294603B2 (en) | 2009-09-16 | 2016-03-22 | Try Safety First, Inc. | Standard mobile communication device distraction prevention and safety protocols |
US9106275B2 (en) | 2009-09-24 | 2015-08-11 | Blackberry Limited | Accelerometer tap detection to initiate NFC communication |
GB2534308A (en) | 2009-09-25 | 2016-07-20 | Find-Me Tech Pty Ltd | Tracking system |
US8437779B2 (en) | 2009-10-19 | 2013-05-07 | Google Inc. | Modification of dynamic contact lists |
EP2499850A4 (en) | 2009-11-11 | 2014-02-26 | Chen Shiang Khoo | Personal protection system with automatic emergency contact notification based on registered events |
MX2012005570A (en) | 2009-11-11 | 2012-12-17 | Lifestream Corp | Wireless device emergency services connection and panic button, with crime and safety information system. |
US20110167342A1 (en) | 2009-12-08 | 2011-07-07 | Isaac De La Pena | Child-safe media interaction |
US20110167344A1 (en) | 2010-01-04 | 2011-07-07 | Yang Pan | Media delivery system based on media assets stored in different devices connectable through a communication means |
CN101778165A (en) | 2010-01-06 | 2010-07-14 | 宇龙计算机通信科技(深圳)有限公司 | Unlocking method and system of screen and mobile terminal |
US20110171958A1 (en) | 2010-01-11 | 2011-07-14 | Suzann Hua | Mobile device usage management via home subscriber server operation and profile |
KR20100022509A (en) * | 2010-02-09 | 2010-03-02 | 김규천 | Electronic device having means of multi-unlock and control method for the same |
KR101673918B1 (en) | 2010-02-11 | 2016-11-09 | 삼성전자주식회사 | Method and apparatus for providing plural informations in a portable terminal |
KR101640506B1 (en) | 2010-02-12 | 2016-07-18 | 삼성전자주식회사 | Method and apparatus of providing SNS widget |
US8310380B2 (en) | 2010-03-02 | 2012-11-13 | Invensense Inc. | Selectable communication interface configurations for motion sensing device |
US20110215903A1 (en) | 2010-03-04 | 2011-09-08 | Nokia Corporation | Apparatus and Associated Methods |
JP5370228B2 (en) * | 2010-03-19 | 2013-12-18 | 日本電気株式会社 | Mobile terminal device, unlocking method and program |
US8798610B2 (en) | 2010-03-26 | 2014-08-05 | Intel Corporation | Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone |
WO2011126911A1 (en) | 2010-03-30 | 2011-10-13 | Authentic8, Inc | Disposable browsers and authentication techniques for a secure online user environment |
JP5397699B2 (en) | 2010-03-31 | 2014-01-22 | 日本電気株式会社 | Mobile communication terminal and function restriction control method thereof |
US9019068B2 (en) | 2010-04-01 | 2015-04-28 | Apple Inc. | Method, apparatus and system for automated change of an operating mode relating to a wireless device |
EP2553968A1 (en) | 2010-04-02 | 2013-02-06 | Interdigital Patent Holdings, Inc. | Low mobility states and procedures |
JP5513957B2 (en) * | 2010-04-02 | 2014-06-04 | 株式会社ジャパンディスプレイ | Display device, authentication method, and program |
KR101706941B1 (en) * | 2010-04-19 | 2017-02-15 | 엘지전자 주식회사 | Mobile terminal and quick access operation control method thereof |
US20110264246A1 (en) | 2010-04-23 | 2011-10-27 | W2W Llc | Cellular phone software application to promote safety and selectively deter unsafe phone use |
KR101106470B1 (en) | 2010-04-27 | 2012-01-25 | 김익환 | Method for Obtaining Location Information of Members in the Group by Using Mobile Devices and System Thereof |
GB201006996D0 (en) | 2010-04-27 | 2010-06-09 | Panaram Ltd | Telephone call blocking |
US8390444B2 (en) | 2010-04-30 | 2013-03-05 | Hewlett-Packard Development Company, L.P. | Sensor-location system for locating a sensor in a tract covered by an earth-based sensor network |
US20110276901A1 (en) | 2010-05-04 | 2011-11-10 | Qwest Communications International Inc. | Family chat |
US9204193B2 (en) | 2010-05-14 | 2015-12-01 | Rovi Guides, Inc. | Systems and methods for media detection and filtering using a parental control logging application |
US20110283241A1 (en) | 2010-05-14 | 2011-11-17 | Google Inc. | Touch Gesture Actions From A Device's Lock Screen |
US9405845B2 (en) | 2010-05-17 | 2016-08-02 | Microsoft Technology Licensing, Llc | Adaptable layouts for social feeds |
US8427942B2 (en) | 2010-06-03 | 2013-04-23 | Deutsche Telekom Ag | Method, apparatus, and system for connecting a mobile client to wireless networks |
JP2012008771A (en) | 2010-06-24 | 2012-01-12 | Sony Corp | Information processing device, information processing system, information processing method and program |
US8284398B2 (en) | 2010-06-24 | 2012-10-09 | Met One Instruments, Inc. | Nephelometer with concentration-modulated sample flow |
US8862092B2 (en) | 2010-06-25 | 2014-10-14 | Emergensee, Inc. | Emergency notification system for mobile devices |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US20120046020A1 (en) | 2010-08-18 | 2012-02-23 | John Tomasini | System and Method for Deactivating Mobile Communication Devices within a Vehicle |
US9390625B2 (en) | 2010-09-29 | 2016-07-12 | Cyber Physical Systems, Inc. | System and method for automatic traffic accident determination and notification |
KR101685991B1 (en) | 2010-09-30 | 2016-12-13 | 엘지전자 주식회사 | Mobile terminal and control method for mobile terminal |
US20120084737A1 (en) | 2010-10-01 | 2012-04-05 | Flextronics Id, Llc | Gesture controls for multi-screen hierarchical applications |
US9027117B2 (en) | 2010-10-04 | 2015-05-05 | Microsoft Technology Licensing, Llc | Multiple-access-level lock screen |
EP2438872B1 (en) | 2010-10-08 | 2020-11-04 | Biotronik AG | Medical implant, in particular a stent, for implantation in an animal body and/or human body |
US8706172B2 (en) | 2010-10-26 | 2014-04-22 | Miscrosoft Corporation | Energy efficient continuous sensing for communications devices |
EP2451139B1 (en) | 2010-11-03 | 2015-01-07 | BlackBerry Limited | Access to locked functions |
US8396485B2 (en) | 2010-11-09 | 2013-03-12 | Apple Inc. | Beacon-based geofencing |
US8504831B2 (en) | 2010-12-07 | 2013-08-06 | At&T Intellectual Property I, L.P. | Systems, methods, and computer program products for user authentication |
US9684080B2 (en) | 2010-12-09 | 2017-06-20 | Microsoft Technology Licensing, Llc | Low-energy GPS |
AU2011202838B2 (en) | 2010-12-21 | 2014-04-10 | Lg Electronics Inc. | Mobile terminal and method of controlling a mode screen display therein |
US8560678B2 (en) | 2010-12-22 | 2013-10-15 | Facebook, Inc. | Providing relevant notifications based on common interests between friends in a social networking system |
US9336637B2 (en) | 2011-03-17 | 2016-05-10 | Unikey Technologies Inc. | Wireless access control system and related methods |
US8994880B2 (en) | 2011-03-25 | 2015-03-31 | Sony Corporation | System and methods for automatic power saving via device location identification |
US9131343B2 (en) | 2011-03-31 | 2015-09-08 | Teaneck Enterprises, Llc | System and method for automated proximity-based social check-ins |
US9880604B2 (en) | 2011-04-20 | 2018-01-30 | Microsoft Technology Licensing, Llc | Energy efficient location detection |
US8971924B2 (en) | 2011-05-23 | 2015-03-03 | Apple Inc. | Identifying and locating users on a mobile network |
US20120306637A1 (en) | 2011-06-01 | 2012-12-06 | Johnson Controls Technology Company | System and method for selectively altering content of a vehicle interface |
US20120317162A1 (en) | 2011-06-10 | 2012-12-13 | Samsung Electronics Co., Ltd. | Communication and exchange of group-related information using a central server |
EP2737733A4 (en) | 2011-07-27 | 2015-09-09 | Seven Networks Inc | Parental control of mobile content on a mobile device |
US20130036211A1 (en) | 2011-08-01 | 2013-02-07 | Samsung Electronics Co., Ltd. | Coordinated service to multiple mobile devices |
KR101910380B1 (en) | 2011-08-08 | 2018-10-22 | 엘지전자 주식회사 | Mobile terminal |
US8571538B2 (en) | 2011-08-10 | 2013-10-29 | Qualcomm Incorporated | Web-based parental controls for wireless devices |
US8521180B2 (en) | 2011-08-12 | 2013-08-27 | Disney Enterprises, Inc. | Location-based automated check-in to a social network recognized location using a token |
JP5712084B2 (en) * | 2011-08-18 | 2015-05-07 | 京セラ株式会社 | Portable electronic device, control method, and control program |
KR101860022B1 (en) | 2011-09-21 | 2018-05-23 | 삼성전자 주식회사 | Method and apparatus for providing information about a call recipient in a user device |
KR20130039586A (en) | 2011-10-12 | 2013-04-22 | 삼성전자주식회사 | Method and apparatus for providing lock function of touch device |
WO2013061156A2 (en) | 2011-10-27 | 2013-05-02 | Cell Rox, Ltd. | Systems and method for implementing multiple personas on mobile technology platforms |
US9325752B2 (en) | 2011-12-23 | 2016-04-26 | Microsoft Technology Licensing, Llc | Private interaction hubs |
US9710982B2 (en) | 2011-12-23 | 2017-07-18 | Microsoft Technology Licensing, Llc | Hub key service |
US9420432B2 (en) | 2011-12-23 | 2016-08-16 | Microsoft Technology Licensing, Llc | Mobile devices control |
US20130225152A1 (en) | 2011-12-23 | 2013-08-29 | Microsoft Corporation | Automatically quieting mobile devices |
US20130305354A1 (en) | 2011-12-23 | 2013-11-14 | Microsoft Corporation | Restricted execution modes |
US9467834B2 (en) | 2011-12-23 | 2016-10-11 | Microsoft Technology Licensing, Llc | Mobile device emergency service |
US20130225151A1 (en) | 2011-12-23 | 2013-08-29 | Microsoft Corporation | Mobile device parental control |
US8874162B2 (en) | 2011-12-23 | 2014-10-28 | Microsoft Corporation | Mobile device safe driving |
US9230076B2 (en) | 2012-08-30 | 2016-01-05 | Microsoft Technology Licensing, Llc | Mobile device child share |
-
2012
- 2012-12-22 US US13/726,099 patent/US20130305354A1/en not_active Abandoned
- 2012-12-23 JP JP2014548998A patent/JP6275650B2/en active Active
- 2012-12-23 EP EP12859485.0A patent/EP2795970A4/en not_active Ceased
- 2012-12-23 CN CN201280063918.XA patent/CN104012150B/en active Active
- 2012-12-23 WO PCT/US2012/071557 patent/WO2013096949A1/en active Application Filing
- 2012-12-23 KR KR1020147020747A patent/KR20140113985A/en active Search and Examination
-
2015
- 2015-04-14 US US14/686,300 patent/US9665702B2/en active Active
-
2017
- 2017-03-13 JP JP2017047278A patent/JP2017130960A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060136998A1 (en) * | 2004-11-19 | 2006-06-22 | Kabushiki Kaisha Toshiba | Security management system, medical device and method for managing security |
US20090282473A1 (en) * | 2008-05-12 | 2009-11-12 | Microsoft Corporation | Owner privacy in a shared mobile device |
US20110088086A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US8660531B2 (en) * | 2010-11-03 | 2014-02-25 | Blackberry Limited | Access to locked functions |
US20140189608A1 (en) * | 2013-01-02 | 2014-07-03 | Canonical Limited | User interface for a computing device |
US20140199966A1 (en) * | 2013-01-11 | 2014-07-17 | Apple Inc. | Bypassing security authentication scheme on a lost device to return the device to the owner |
US20150074615A1 (en) * | 2013-09-09 | 2015-03-12 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
Cited By (117)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11907519B2 (en) | 2009-03-16 | 2024-02-20 | Apple Inc. | Device, method, and graphical user interface for moving a current position in content at a variable scrubbing rate |
US20110030067A1 (en) * | 2009-07-30 | 2011-02-03 | Research In Motion Limited | Apparatus and method for controlled sharing of personal information |
US8875219B2 (en) * | 2009-07-30 | 2014-10-28 | Blackberry Limited | Apparatus and method for controlled sharing of personal information |
US10728188B2 (en) * | 2010-12-15 | 2020-07-28 | Samsung Electronics Co., Ltd. | Interface for managing messages in a mobile terminal |
US11171894B2 (en) | 2010-12-15 | 2021-11-09 | Samsung Electronics Co., Ltd. | Interface for managing messages in a mobile terminal |
US9880604B2 (en) | 2011-04-20 | 2018-01-30 | Microsoft Technology Licensing, Llc | Energy efficient location detection |
US11893052B2 (en) | 2011-08-18 | 2024-02-06 | Apple Inc. | Management of local and remote media items |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10469534B2 (en) | 2011-10-11 | 2019-11-05 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
US10402546B1 (en) | 2011-10-11 | 2019-09-03 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
US10063595B1 (en) | 2011-10-11 | 2018-08-28 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
US11134104B2 (en) | 2011-10-11 | 2021-09-28 | Citrix Systems, Inc. | Secure execution of enterprise applications on mobile devices |
US10249119B2 (en) | 2011-12-23 | 2019-04-02 | Microsoft Technology Licensing, Llc | Hub key service |
US9710982B2 (en) | 2011-12-23 | 2017-07-18 | Microsoft Technology Licensing, Llc | Hub key service |
US9736655B2 (en) | 2011-12-23 | 2017-08-15 | Microsoft Technology Licensing, Llc | Mobile device safe driving |
US9325752B2 (en) | 2011-12-23 | 2016-04-26 | Microsoft Technology Licensing, Llc | Private interaction hubs |
US9363250B2 (en) | 2011-12-23 | 2016-06-07 | Microsoft Technology Licensing, Llc | Hub coordination service |
US8874162B2 (en) | 2011-12-23 | 2014-10-28 | Microsoft Corporation | Mobile device safe driving |
US9680888B2 (en) | 2011-12-23 | 2017-06-13 | Microsoft Technology Licensing, Llc | Private interaction hubs |
US9420432B2 (en) | 2011-12-23 | 2016-08-16 | Microsoft Technology Licensing, Llc | Mobile devices control |
US9665702B2 (en) | 2011-12-23 | 2017-05-30 | Microsoft Technology Licensing, Llc | Restricted execution modes |
US9491589B2 (en) | 2011-12-23 | 2016-11-08 | Microsoft Technology Licensing, Llc | Mobile device safe driving |
US9467834B2 (en) | 2011-12-23 | 2016-10-11 | Microsoft Technology Licensing, Llc | Mobile device emergency service |
US9230076B2 (en) | 2012-08-30 | 2016-01-05 | Microsoft Technology Licensing, Llc | Mobile device child share |
US9973489B2 (en) | 2012-10-15 | 2018-05-15 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US10545748B2 (en) | 2012-10-16 | 2020-01-28 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
US10908896B2 (en) | 2012-10-16 | 2021-02-02 | Citrix Systems, Inc. | Application wrapping for application management framework |
US11245785B2 (en) | 2013-01-02 | 2022-02-08 | Canonical Limited | User interface for a computing device |
US11706330B2 (en) | 2013-01-02 | 2023-07-18 | Canonical Limited | User interface for a computing device |
US20140189523A1 (en) * | 2013-01-02 | 2014-07-03 | Canonical Limited | User interface for a computing device |
US9124545B2 (en) * | 2013-02-14 | 2015-09-01 | Facebook, Inc. | Lock screen with socialized applications |
US20140229863A1 (en) * | 2013-02-14 | 2014-08-14 | Luke St. Clair | Lock Screen with Socialized Applications |
US20140245027A1 (en) * | 2013-02-22 | 2014-08-28 | Samsung Electronics Co., Ltd. | Device and method for providing safety of data by using multiple modes in device |
US9911009B2 (en) * | 2013-02-22 | 2018-03-06 | Samsung Electronics Co., Ltd | Device and method for providing safety of data by using multiple modes in device |
US9367672B2 (en) * | 2013-03-13 | 2016-06-14 | Blackberry Limited | Method of locking an application on a computing device |
US20140283012A1 (en) * | 2013-03-13 | 2014-09-18 | Research In Motion Limited | Method of locking an application on a computing device |
US20140280552A1 (en) * | 2013-03-15 | 2014-09-18 | Audi Ag | Method to transmit real-time in-vehicle information to an internet service |
US9883353B2 (en) * | 2013-03-15 | 2018-01-30 | Volkswagen Ag | Method to transmit real-time in-vehicle information to an internet service |
US9454674B2 (en) * | 2013-03-25 | 2016-09-27 | Samsung Electronics Co., Ltd. | Data sharing control method and data sharing control terminal |
US20140289872A1 (en) * | 2013-03-25 | 2014-09-25 | Samsung Electronics Co., Ltd. | Data sharing control method and data sharing control terminal |
US10476885B2 (en) | 2013-03-29 | 2019-11-12 | Citrix Systems, Inc. | Application with multiple operation modes |
US20160057278A1 (en) * | 2013-03-29 | 2016-02-25 | Citrix Systems, Inc. | Mobile Device Locking based on Context |
US10701082B2 (en) | 2013-03-29 | 2020-06-30 | Citrix Systems, Inc. | Application with multiple operation modes |
US10097584B2 (en) | 2013-03-29 | 2018-10-09 | Citrix Systems, Inc. | Providing a managed browser |
US10114536B2 (en) * | 2013-03-29 | 2018-10-30 | Microsoft Technology Licensing, Llc | Systems and methods for performing actions for users from a locked device |
US10965734B2 (en) | 2013-03-29 | 2021-03-30 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9820231B2 (en) | 2013-06-14 | 2017-11-14 | Microsoft Technology Licensing, Llc | Coalescing geo-fence events |
US9998866B2 (en) | 2013-06-14 | 2018-06-12 | Microsoft Technology Licensing, Llc | Detecting geo-fence events using varying confidence levels |
US20140379799A1 (en) * | 2013-06-21 | 2014-12-25 | Microsoft Corporation | Augmenting content obtained from different content sources |
US20150067873A1 (en) * | 2013-09-05 | 2015-03-05 | Fujitsu Limited | Information processing device and method for limiting function |
US20160241544A1 (en) * | 2013-10-28 | 2016-08-18 | Tencent Technology (Shenzhen) Company Limited | User identity verification method and system, password protection apparatus and storage medium |
US9635018B2 (en) * | 2013-10-28 | 2017-04-25 | Tencent Technology (Shenzhen) Company Limited | User identity verification method and system, password protection apparatus and storage medium |
US11907013B2 (en) | 2014-05-30 | 2024-02-20 | Apple Inc. | Continuity of applications across devices |
US10528213B2 (en) * | 2014-06-20 | 2020-01-07 | Sony Corporation | Information processing device and information processing method |
US11194437B2 (en) | 2014-06-20 | 2021-12-07 | Sony Corporation | Information processing device and information processing method |
US20170199627A1 (en) * | 2014-06-20 | 2017-07-13 | Sony Corporation | Information processing device, information processing method, and program |
US10474849B2 (en) | 2014-06-27 | 2019-11-12 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
US20160371500A1 (en) * | 2014-06-27 | 2016-12-22 | Jerry Huang | Fast Data Protection Using Dual File Systems |
US10423766B2 (en) | 2014-06-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Data protection system based on user input patterns on device |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
US9697375B2 (en) * | 2014-06-27 | 2017-07-04 | Microsoft Technology Licensing, Llc | Fast data protection using dual file systems |
US12001650B2 (en) | 2014-09-02 | 2024-06-04 | Apple Inc. | Music user interface |
US11700326B2 (en) | 2014-09-02 | 2023-07-11 | Apple Inc. | Phone user interface |
KR102327653B1 (en) | 2014-10-02 | 2021-11-17 | 현대모비스 주식회사 | Communication device for vehicle and method thereof |
KR20160039950A (en) * | 2014-10-02 | 2016-04-12 | 현대모비스 주식회사 | Communication device for vehicle and method thereof |
US20160162681A1 (en) * | 2014-12-03 | 2016-06-09 | Fih (Hong Kong) Limited | Communication device and quick selection method |
US10649754B2 (en) * | 2015-01-28 | 2020-05-12 | Ricoh Company, Ltd. | Image processing device and electronic whiteboard |
US20170300709A1 (en) * | 2015-06-08 | 2017-10-19 | Microsoft Technology Licensing, Llc | Limited-access functionality accessible at login screen |
US9959422B2 (en) * | 2015-06-08 | 2018-05-01 | Microsoft Technology Licensing, Llc | Limited-access functionality accessible at lock screen |
US11899871B2 (en) | 2015-07-17 | 2024-02-13 | Crown Equipment Corporation | Processing device having a graphical user interface for industrial vehicle |
US10949083B2 (en) | 2015-07-17 | 2021-03-16 | Crown Equipment Corporation | Processing device having a graphical user interface for industrial vehicle |
US10430073B2 (en) | 2015-07-17 | 2019-10-01 | Crown Equipment Corporation | Processing device having a graphical user interface for industrial vehicle |
US20180373426A1 (en) * | 2015-11-20 | 2018-12-27 | Beijing Kingsoft Internet Security Software Co., Ltd. | Information Showing Method and Apparatus, and Electronic Device |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US10754466B2 (en) | 2016-11-22 | 2020-08-25 | Crown Equipment Corporation | User interface device for industrial vehicle |
US11054980B2 (en) | 2016-11-22 | 2021-07-06 | Crown Equipment Corporation | User interface device for industrial vehicle |
US10936183B2 (en) | 2016-11-22 | 2021-03-02 | Crown Equipment Corporation | User interface device for industrial vehicle |
US20180205876A1 (en) * | 2017-01-13 | 2018-07-19 | Microsoft Technology Licensing, Llc | Capturing and viewing private photos and videos |
US10244161B2 (en) * | 2017-01-13 | 2019-03-26 | Microsoft Technology Licensing, Llc | Capturing and viewing private photos and videos |
US10484596B2 (en) * | 2017-01-13 | 2019-11-19 | Microsoft Technology Licensing, Llc | Capturing and viewing access-protected photos and videos |
US10754986B2 (en) * | 2017-03-24 | 2020-08-25 | Cover Communications, Llc. | Communication device with selectively shared access modes and incoming communication |
US11750734B2 (en) | 2017-05-16 | 2023-09-05 | Apple Inc. | Methods for initiating output of at least a component of a signal representative of media currently being played back by another device |
US11683408B2 (en) | 2017-05-16 | 2023-06-20 | Apple Inc. | Methods and interfaces for home media control |
US11809923B2 (en) | 2017-06-30 | 2023-11-07 | Oracle International Corporation | Governing access to third-party application programming interfaces |
US11023300B2 (en) | 2017-06-30 | 2021-06-01 | Oracle International Corporation | Governing access to third-party application programming interfaces |
US10902152B2 (en) * | 2017-06-30 | 2021-01-26 | Oracle International Corporation | Restricting plug-in application recipes |
US11507696B2 (en) | 2017-06-30 | 2022-11-22 | Oracle International Corporation | Restricting plug-in application recipes |
US11496517B1 (en) | 2017-08-02 | 2022-11-08 | Styra, Inc. | Local API authorization method and apparatus |
US11258824B1 (en) * | 2017-08-02 | 2022-02-22 | Styra, Inc. | Method and apparatus for authorizing microservice APIs |
US10990702B1 (en) | 2017-08-02 | 2021-04-27 | Styra, Inc. | Method and apparatus for authorizing API calls |
US11604684B1 (en) | 2017-08-02 | 2023-03-14 | Styra, Inc. | Processing API calls by authenticating and authorizing API calls |
US11681568B1 (en) | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
US10984133B1 (en) * | 2017-08-02 | 2021-04-20 | Styra, Inc. | Defining and distributing API authorization policies and parameters |
US10762225B2 (en) | 2018-01-11 | 2020-09-01 | Microsoft Technology Licensing, Llc | Note and file sharing with a locked device |
US10885226B1 (en) * | 2018-06-06 | 2021-01-05 | NortonLifeLock, Inc. | Systems and methods for enforcing secure shared access on computing devices by content state pinning |
US11853463B1 (en) | 2018-08-23 | 2023-12-26 | Styra, Inc. | Leveraging standard protocols to interface unmodified applications and services |
US11762712B2 (en) | 2018-08-23 | 2023-09-19 | Styra, Inc. | Validating policies and data in API authorization system |
US11327815B1 (en) | 2018-08-23 | 2022-05-10 | Styra, Inc. | Validating policies and data in API authorization system |
US11741244B2 (en) | 2018-08-24 | 2023-08-29 | Styra, Inc. | Partial policy evaluation |
US11080410B1 (en) | 2018-08-24 | 2021-08-03 | Styra, Inc. | Partial policy evaluation |
US20200084623A1 (en) * | 2018-09-06 | 2020-03-12 | International Business Machines Corporation | Controlling operation of a mobile device based on user identification |
US11038889B2 (en) * | 2018-11-20 | 2021-06-15 | Cisco Technology, Inc. | System and method for migrating existing access control list policies to intent based policies and vice versa |
US11048810B2 (en) * | 2019-04-26 | 2021-06-29 | Motorola Mobility Llc | Electronic device that scans for wearable device with access key |
US11714597B2 (en) | 2019-05-31 | 2023-08-01 | Apple Inc. | Methods and user interfaces for sharing audio |
US11853646B2 (en) * | 2019-05-31 | 2023-12-26 | Apple Inc. | User interfaces for audio media control |
US11785387B2 (en) | 2019-05-31 | 2023-10-10 | Apple Inc. | User interfaces for managing controllable external devices |
US11755273B2 (en) | 2019-05-31 | 2023-09-12 | Apple Inc. | User interfaces for audio media control |
US20200379730A1 (en) * | 2019-05-31 | 2020-12-03 | Apple Inc. | User interfaces for audio media control |
US11620103B2 (en) | 2019-05-31 | 2023-04-04 | Apple Inc. | User interfaces for audio media control |
US11983551B2 (en) | 2019-05-31 | 2024-05-14 | Apple Inc. | Multi-user configuration |
US11675608B2 (en) | 2019-05-31 | 2023-06-13 | Apple Inc. | Multi-user configuration |
US11782598B2 (en) | 2020-09-25 | 2023-10-10 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US12020086B2 (en) | 2021-04-19 | 2024-06-25 | Styra, Inc. | Defining and distributing API authorization policies and parameters |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11960615B2 (en) | 2021-06-06 | 2024-04-16 | Apple Inc. | Methods and user interfaces for voice-based user profile management |
Also Published As
Publication number | Publication date |
---|---|
EP2795970A4 (en) | 2015-02-25 |
CN104012150B (en) | 2018-05-08 |
US20150220712A1 (en) | 2015-08-06 |
US9665702B2 (en) | 2017-05-30 |
EP2795970A1 (en) | 2014-10-29 |
KR20140113985A (en) | 2014-09-25 |
CN104012150A (en) | 2014-08-27 |
JP2015508530A (en) | 2015-03-19 |
WO2013096949A1 (en) | 2013-06-27 |
JP2017130960A (en) | 2017-07-27 |
JP6275650B2 (en) | 2018-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9665702B2 (en) | Restricted execution modes | |
US10249119B2 (en) | Hub key service | |
US9680888B2 (en) | Private interaction hubs | |
US9736655B2 (en) | Mobile device safe driving | |
EP2795939B1 (en) | Method, apparatus and computer readable storage medium for parental control of a device | |
EP2795971B1 (en) | Automatically quieting mobile devices | |
US9467834B2 (en) | Mobile device emergency service | |
US9420432B2 (en) | Mobile devices control | |
US20130217416A1 (en) | Client check-in | |
WO2019059908A1 (en) | Communication platform for minors | |
EP3460741A1 (en) | Communication platform for minors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KING, JOSEPH SPENCER;GOULDING, MICHAEL BURT;DERKSEN, TODD MYLES;AND OTHERS;SIGNING DATES FROM 20130329 TO 20130813;REEL/FRAME:031002/0927 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034544/0541 Effective date: 20141014 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |