Google Inc. – Patent Application – Limited Access State for Inadvertent Inputs
It has been reported by a New Reporter-Staff News Editor at Politics & Government Week, from Washington D.C. VerticalNews journalist report that a patent application filed on October 28 2013, by inventor Mittal, Sanjev Kumar from Bangalore had been made available online on February 12, 2015 and the patent assignee is said to be Google Inc.
The news editor gained the quote from the background information provided by the inventors – Computing devices such as mobile phones, tablet computers etc. can generally perform various functions like executing applications stored thereon and outputting information like documents, emails, pictures etc.; for display. Some of the computing devices could include limited access state which could prevent an unauthorized user from accessing and viewing applications as well as information that could be stored at the computing device resulting in effectively locking the computing device.
These computing devices helps the user to provide a specific input for instance the passcode, pattern or biometric information in order to unlock the computing device to gain access to the information or application which could be stored in the device. The locking techniques does provide some kind of security ensuring that only users knowing the specific input needed to unlock the computing device could access the application and information that is stored in the computing device.
Computing Devices Constructed to Execute Action
Some of the computing devices are constructed to execute an action in response to receiving greater than a threshold number of ineffective unlock efforts, for instance, the computing device could prevent extra unlocking efforts for a predetermined amount of time.
In such instances, the device could delete some or even all information that may be stored in the computing device in response to the attempts made of unsuccessful unlock which could be greater than a threshold number and in some other instances, information could be unintentionally deleted from the device.
As an enhancement to the background information to the patent application, VerticalNews correspondents also gained the summary information of the inventor for the patent application and in one instance; the disclosure was directed to a system which included receiving by a computing device functioning in a first limited access state which was an indication of a first input.
Procedure Focussed on Managing Access State
Procedures of this disclosure are focussed on managing access states of computing device and in some applications, it could operate in a first limited access state for instance a first locked state.
At the time of operating in the first limited access state, the computing device could be arranged to compare received user input to certain input which may be needed for transition of the computing device in operating in an access state – an unlocked state.
Receptive to receiving input from user which does not tend to correspond to the certain user input needed to unlock the computing device, it may switch from operating in the first limited access state to a second limited access state.
For instance, in response to defining that the received user input could most likely not be an attempt to unlock the computing device from first limited access state, the device could be constituted to switch to operating in the second limited access state.
No comments:
Post a Comment