Methods and system for implementing a secure lock screen
Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing devic...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | SHEPHERD MATTHEW E SCHIMPF DANIEL O ZWARICH CAMERON W ZHANG CHENDI SHAFFER JOSHUA H NIELSEN BENJAMIN E |
description | Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN105279422A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN105279422A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN105279422A3</originalsourceid><addsrcrecordid>eNrjZLDwTS3JyE8pVkjMS1EoriwuSc1VSMsvUsjMLchJzU3NK8nMS1dIVChOTS4tSlXIyU_OVihOLkpNzeNhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYGpkbmliZGRo7GxKgBAP01Liw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Methods and system for implementing a secure lock screen</title><source>esp@cenet</source><creator>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</creator><creatorcontrib>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</creatorcontrib><description>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20160127&DB=EPODOC&CC=CN&NR=105279422A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76318</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20160127&DB=EPODOC&CC=CN&NR=105279422A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHEPHERD MATTHEW E</creatorcontrib><creatorcontrib>SCHIMPF DANIEL O</creatorcontrib><creatorcontrib>ZWARICH CAMERON W</creatorcontrib><creatorcontrib>ZHANG CHENDI</creatorcontrib><creatorcontrib>SHAFFER JOSHUA H</creatorcontrib><creatorcontrib>NIELSEN BENJAMIN E</creatorcontrib><title>Methods and system for implementing a secure lock screen</title><description>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDwTS3JyE8pVkjMS1EoriwuSc1VSMsvUsjMLchJzU3NK8nMS1dIVChOTS4tSlXIyU_OVihOLkpNzeNhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYGpkbmliZGRo7GxKgBAP01Liw</recordid><startdate>20160127</startdate><enddate>20160127</enddate><creator>SHEPHERD MATTHEW E</creator><creator>SCHIMPF DANIEL O</creator><creator>ZWARICH CAMERON W</creator><creator>ZHANG CHENDI</creator><creator>SHAFFER JOSHUA H</creator><creator>NIELSEN BENJAMIN E</creator><scope>EVB</scope></search><sort><creationdate>20160127</creationdate><title>Methods and system for implementing a secure lock screen</title><author>SHEPHERD MATTHEW E ; SCHIMPF DANIEL O ; ZWARICH CAMERON W ; ZHANG CHENDI ; SHAFFER JOSHUA H ; NIELSEN BENJAMIN E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN105279422A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SHEPHERD MATTHEW E</creatorcontrib><creatorcontrib>SCHIMPF DANIEL O</creatorcontrib><creatorcontrib>ZWARICH CAMERON W</creatorcontrib><creatorcontrib>ZHANG CHENDI</creatorcontrib><creatorcontrib>SHAFFER JOSHUA H</creatorcontrib><creatorcontrib>NIELSEN BENJAMIN E</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHEPHERD MATTHEW E</au><au>SCHIMPF DANIEL O</au><au>ZWARICH CAMERON W</au><au>ZHANG CHENDI</au><au>SHAFFER JOSHUA H</au><au>NIELSEN BENJAMIN E</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Methods and system for implementing a secure lock screen</title><date>2016-01-27</date><risdate>2016</risdate><abstract>Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content-such as main user interfaces (UIs)-while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_CN105279422A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Methods and system for implementing a secure lock screen |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T01%3A58%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHEPHERD%20MATTHEW%20E&rft.date=2016-01-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN105279422A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |