Methods and system for implementing a secure lock screen

Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing devic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SHEPHERD MATTHEW E, SCHIMPF DANIEL O, ZWARICH CAMERON W, ZHANG CHENDI, SHAFFER JOSHUA H, NIELSEN BENJAMIN E
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SHEPHERD MATTHEW E
SCHIMPF DANIEL O
ZWARICH CAMERON W
ZHANG CHENDI
SHAFFER JOSHUA H
NIELSEN BENJAMIN E
description Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN105279422A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN105279422A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN105279422A3</originalsourceid><addsrcrecordid>eNrjZLDwTS3JyE8pVkjMS1EoriwuSc1VSMsvUsjMLchJzU3NK8nMS1dIVChOTS4tSlXIyU_OVihOLkpNzeNhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYGpkbmliZGRo7GxKgBAP01Liw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Methods and system for implementing a secure lock screen</title><source>esp@cenet</source><creator>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</creator><creatorcontrib>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</creatorcontrib><description>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160127&amp;DB=EPODOC&amp;CC=CN&amp;NR=105279422A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76318</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160127&amp;DB=EPODOC&amp;CC=CN&amp;NR=105279422A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHEPHERD MATTHEW E</creatorcontrib><creatorcontrib>SCHIMPF DANIEL O</creatorcontrib><creatorcontrib>ZWARICH CAMERON W</creatorcontrib><creatorcontrib>ZHANG CHENDI</creatorcontrib><creatorcontrib>SHAFFER JOSHUA H</creatorcontrib><creatorcontrib>NIELSEN BENJAMIN E</creatorcontrib><title>Methods and system for implementing a secure lock screen</title><description>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDwTS3JyE8pVkjMS1EoriwuSc1VSMsvUsjMLchJzU3NK8nMS1dIVChOTS4tSlXIyU_OVihOLkpNzeNhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYGpkbmliZGRo7GxKgBAP01Liw</recordid><startdate>20160127</startdate><enddate>20160127</enddate><creator>SHEPHERD MATTHEW E</creator><creator>SCHIMPF DANIEL O</creator><creator>ZWARICH CAMERON W</creator><creator>ZHANG CHENDI</creator><creator>SHAFFER JOSHUA H</creator><creator>NIELSEN BENJAMIN E</creator><scope>EVB</scope></search><sort><creationdate>20160127</creationdate><title>Methods and system for implementing a secure lock screen</title><author>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN105279422A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SHEPHERD MATTHEW E</creatorcontrib><creatorcontrib>SCHIMPF DANIEL O</creatorcontrib><creatorcontrib>ZWARICH CAMERON W</creatorcontrib><creatorcontrib>ZHANG CHENDI</creatorcontrib><creatorcontrib>SHAFFER JOSHUA H</creatorcontrib><creatorcontrib>NIELSEN BENJAMIN E</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHEPHERD MATTHEW E</au><au>SCHIMPF DANIEL O</au><au>ZWARICH CAMERON W</au><au>ZHANG CHENDI</au><au>SHAFFER JOSHUA H</au><au>NIELSEN BENJAMIN E</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Methods and system for implementing a secure lock screen</title><date>2016-01-27</date><risdate>2016</risdate><abstract>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_CN105279422A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Methods and system for implementing a secure lock screen
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T01%3A58%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHEPHERD%20MATTHEW%20E&rft.date=2016-01-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN105279422A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true