Entries |
Document | Title | Date |
20080235595 | Device and method for accessing a multimedia timeline - Devices and methods for accessing a multimedia timeline are disclosed. A device may include a memory to store an access key to obtain access to a multimedia timeline. The device may also include an interface to send the access key to a multimedia device to obtain access to the multimedia timeline. The multimedia device may be configured to provide a graphical user interface to a display device for display of the multimedia timeline. | 09-25-2008 |
20080256458 | Data Access Control System for Shared Directories and Other Resources - A system manages directory access permissions without help-desk intervention. The system automatically manages user permissions to access processing system resources and includes a user interface providing data representing at least one display image enabling a user to request permission to access a particular processing system resource. A communication processor, in response to detection of a user request for permission to access a particular processing system resource, automatically, acquires a user identifier and user email address, determines an owner responsible for granting permission to access the particular processing system resource and an associated owner email address, emails a request message to the owner email address to grant the access of the user to the particular processing system resource and receives a response email message indicating grant of the access. An access manager, in response to a received grant of the access and updates access data to enable the user to access the particular processing system resource. | 10-16-2008 |
20080256459 | Control apparatus, program, computer-readable storage medium, imaging apparatus control system, and control method - A multifunctional apparatus control system includes a multifunctional apparatus an authentication information input device, an I/F converter, and a control server. The control server includes: a UI control section which transmits, to the multifunctional apparatus over a network, data of authentication screen which prompts the user to make preparations for causing the authentication information input device to acquire authentication information; an authentication information input device driver which controls the operation of the authentication information input device over the network and receives, over the network, the authentication information that the authentication information input device has acquired; an authenticating section which performs authentication based on the authentication information that the authentication information input device driver has received; and a device control section which permits the multifunctional apparatus to execute the job, in accordance with the authentication result of the authenticating section. This arrangement makes it possible to construct a flexible authentication system. | 10-16-2008 |
20080270911 | SYSTEM AND METHOD TO DEVELOP A CUSTOM APPLICATION FOR A MULTI-FUNCTION PERIPHERAL (MFP) - In general, the invention relates to adding custom applications to multi-function peripheral (MFP) devices. In some embodiments, a proxy device is used to provide registration and routing functions to third-party applications operating on host sites. Thus, the proxy device relieves the MFP device of the processing burden associated with application registration and message routing between multiple custom applications and the MFP device. In some embodiments, user interface (UI) templates are used to customize application displays on the MFP device. By using standard templates, such as templates based on XML, the MFP devices may include minimal support for parsing the templates, thereby reducing the burden placed on the device to accommodate the custom applications. | 10-30-2008 |
20080301564 | Build of material production system - Some embodiments of a build of material production system have been presented. In one embodiment, a graphical user interface (GUI) is presented via a client machine on factory floor to allow a user to submit a request to build a document from a master document in a predetermined natural language and a predetermined format. Further, a visual representation of a current build status of the document is provided in the GUI. | 12-04-2008 |
20090094525 | SYSTEM AND METHOD FOR DYNAMIC MEDIA INTEGRATION INTO WEB PAGES - Systems and methods for dynamic media integration into networked content are disclosed. The system in an example embodiment includes components to insert a trigger into publisher media, receive a request for access to a graphical user interface from a publisher, receive, via the graphical user interface, publisher instructions for modifying publisher media, create an annotation corresponding to the publisher instructions, and edit publisher web pages as view by a client browser when the trigger is activated. | 04-09-2009 |
20090158164 | MANAGING ICON INTEGRITY - Illustrative embodiments provide a computer implemented method, an apparatus in the form of a data processing system and a computer program product for managing icon integrity. In one illustrative embodiment, the computer implemented method comprises receiving a notification for a selected icon and determining whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon. | 06-18-2009 |
20090172558 | SYSTEM AND METHOD FOR PERSONALIZED CHANGE TRACKING FOR COLLABORATIVE AUTHORING ENVIRONMENTS - Personalized change-tracking functionality for collaboratively authored documents is provided. Initially, every document or page for a given user is marked as “new”, “unread” or “unaccessed”. Any time a user edits or even reads a portion of a document, that fact is captured and those segments of the document are marked, for only that user, as “read”. However, any time another user edits that same document, if those edits overwrite areas that the first user has read or edited, or open up new areas, all those areas revert to the “new” or “unread” status. Thus, the next time the user visits that document or page, the display module will show him not what is new, but what is new to him. | 07-02-2009 |
20090177972 | WEB PAGE SECURITY SYSTEM - A security application for granting different access rights to web pages and objects on each web page is disclosed. A data table assigns one or more function identifiers (FIDs) to users. A second data table assigns a different object identifier (OID) to each web page, and to assign a different OID for each object on each web page. A third data table assigns an FID to each OID. When a user attempts to access a web page or an object on the web page, a web server compares each of the user's FIDs to the FID assigned to the web page or object. The web server grants access to the web page or object if one of the user's FIDs matches the FID assigned to the web page or object, the user is granted access to the web page or object according to the function of the matched FID. | 07-09-2009 |
20090265638 | System and method for controlling secure content and non-secure content at a fuel dispenser or other retail device - A retail payment, advertising, and content switching system and method are disclosed. According to one embodiment, a secure content source or a non-secure content source is allowed to drive a customer user interface, respectively, without compromising security requirements. The content may be video, audio, prompts, or any other type of content. A secure controller is provided to control one or more user input devices and a user interface access module to control whether a secure source or a non-secure source drives the user interface, depending on the security mode of the system. The secure controller, the user interface access module, and the customer input devices are provided in an anti-tampering module. The secure controller prevents the non-secure source from providing unauthorized prompts on the customer user interface to “fake out” the customer so that sensitive customer information is not passed “in the clear.” | 10-22-2009 |
20090307601 | METHOD FOR REFLEXIVE SECURING OF COMPUTER DISPLAYS - A system for preventing unauthorized viewing of content displayed on a computer display is presented. Once the system is activated, a computer user's eyes are tracked. If some source of interruption enters the vicinity of the user, the computer user will reflexively glance or look at the distraction, which accordingly results in the user removing his focus from the content on the computer display. As the user's focus is diverted from the display due to the interruption, the eye tracking detects this. In response to the detected removal of focus, the computer display is locked out extremely rapidly such that the content is no longer displayed. | 12-10-2009 |
20100031159 | SYSTEMS, METHODS, AND INTERFACES FOR PUBLISHING AND DISTRIBUTING LEGAL EDUCATIONAL MATERIALS - To address this and/or other needs, the present inventor devised, among other things, an online educational materials publication and distribution system and method. One exemplary embodiment provides an educational publishing website that functions as a virtual community and marketplace where law professors can connect with one another and share and sell electronic, legal education materials to law faculty, staff, and students. The website not only enables law professors to self publish the materials to the entire law school community, but also serves as an alternative channel for legal publishers to sell and otherwise distribute branded and other materials to the law school market. | 02-04-2010 |
20100083128 | IMAGE EDITING METHOD, IMAGE EDITING DEVICE, AND COMPUTER READABLE MEDIUM FOR STORING IMAGE EDITING PROGRAM - An image editing method comprises: a step of acquiring identification information on each of a plurality of operation instruction units for instructing editing of an image, a step of automatically selecting one or more images for editing from a group of images to classify the one or more images into a group of usable images based on the identification information, a step of determining a right to edit reaching contents of processing which each operation instruction unit is authorized to perform against each image in the group of usable images, and a step of performing editing processing on an image to be edited in the group of usable images based upon the determined right to edit according to an editing instruction supplied from each operation instruction unit. | 04-01-2010 |
20100088610 | METHODS, SYSTEMS, DEVICES AND COMPUTER PROGRAM PRODUCTS FOR COLLECTING AND SHARING SELECTED PERSONAL DATA - Methods, systems, devices and computer program products obtain and share personal data of celebrities and others over a communications network. The methods include; (a) electronically capturing personal data associated with a plurality of celebrities; (b) electronically storing the captured data in a database of electronic personal data records, the records being correlated to a respective celebrity; (c) accepting user input to request data of interest for a particular celebrity; (d) electronically automatically extracting records in the historical data base related to the user input; and (e) electronically publishing celebrity personal data to the user based on the extracting step. | 04-08-2010 |
20100122179 | VISUAL CABINET SYSTEM FOR DATA DISPLAY METHOD USING ITS SYSTEM - A client-oriented system whereby a user can visually comprehend an itemized outline to immediately confirm the contents of data is provided. This system includes a WEB server and a database server. The WEB server includes a user browsing site, an image acquisition site and a screen image batch processor that accesses the data table of a database for a predetermined period of time and requests the image acquisition site to create a screen image associated with the new/updated data and obtains the screen image if there is new data and updated data. The user browsing site also includes a WEB screen creation unit that, when an authenticated user requests to display a predetermined screen associated with one of the data IDs included in user and data tables, creates the screen by providing a link for the obtained screen image for transition to another screen corresponding to the screen image. | 05-13-2010 |
20100131856 | Personalized, Online, Scientific Interface - An Internet-based personalized, online, scientific interface is described, operating from at least a proprietary web server connected to the Internet for sending display images produced at the web server from any software application to a client web browser. The interface is personalized and includes, in addition to providing a gateway to different information databases, a search function, an archiving function, a specific bookmark function, an access to uploaded abstracts, and a personalized area. The interface includes a tool for upload, creation, venue presentation, and highly interactive web delivery presentation of a scientific paper or a poster by an author, linked with an internal tool for reviewing, accepting, and grading submitted abstracts for review. Within the personalized page, the interface includes a management tool for all abstracts uploaded to the interface, a follow-up tool and a system for managing the academic currency associated with the uploaded presentations including the capacity to produce feedback report associated with comments and viewing statistics. A digital presentation system allows attendees to comment on specific slides of presentations, have live or deferred communications with the presenter, rate the presentation, and even archive part or all of the presentation in the interface for later retrieval. | 05-27-2010 |
20100199191 | COLLABORATIVE WORK APPARATUS AND METHOD OF CONTROLLING COLLABORATIVE WORK - A collaborative work apparatus includes: a display unit that simultaneously displays work contents edited or referenced by a plurality of users and cursors of a plurality of the users on a display screen; a cursor manipulation input unit that inputs a manipulation signal for each cursor; a cursor manipulation control unit that sets one or more manipulation areas on the display screen and executes control of cursor locations of each of the users on the display screen and control of granting/removing manipulation authority over each manipulation area to/from any one of the users in response to the cursor manipulation signal input from the user through the cursor manipulation input unit; and manipulation authority management unit that manages manipulation authority information representing which user has the manipulation authority over which manipulation area in response to the control of granting/removing the manipulation authority by the cursor manipulation control unit. | 08-05-2010 |
20100223558 | REMOTE DESKTOP CONNECTION TO ANY PRIVATE DESKTOP TO TAM E-SSO ACCESS AGENT - A method for enabling a client computer to remotely connect to any existing user desktop hosted under a window session in a host computer is provided. The method includes receiving user credentials in a first user interface of an access managing application; and inserting master credentials into a second user interface of an authentication system in response to the first user interface receiving the user credentials enabling the session to switch from the host computer to the client computer without deleting any existing user desktops in the host computer. | 09-02-2010 |
20100281391 | INFORMATION BROWSER SYSTEM AND METHOD FOR A WIRELESS COMMUNICATION DEVICE - An information browser system and method enables sending of information requests to remote information sources and receiving of requested information from the remote sources on a wireless communication device. Information in any of a plurality of formats, including WML, HTML and WMLScript, is converted into a format in which the information can be displayed or otherwise further processed by the device. Information browsing functions may also be integrated with other communication functions on a mobile communication device. | 11-04-2010 |
20100293473 | UNLOCKING EMOTICONS USING FEATURE CODES - Provided is a method of making a graphic available to be transmitted over a communication network. Access is granted to a graphic that a sender of a first communication can select for inclusion in the first communication to be transmitted over the communication network. Selection by the sender of a restricted graphic for inclusion in the first communication is prevented. Using a computer operatively connected to the communication network, the content of the first communication entered by the sender is received, and includes the graphic available for selection by the sender. The first communication including the graphic is transmitted over the communication network. A code associated with a product is received, and the product is registered based at least in part on the code. In response to successful registration of the product, the sender is granted access to the restricted graphic, allowing the sender to select the restricted graphic for inclusion in a second communication. | 11-18-2010 |
20100306668 | ASYNCHRONOUS IDENTITY ESTABLISHMENT THROUGH A WEB-BASED APPLICATION - A determination is made as to whether a user has been logged off from the web-based application accessed through a web browser on a computer. If it is determined that the user has been logged off from the web-based application, then a new user interface is provided through the web browser. The new user interface may enable the user to enter user credentials. The user credentials are received through the new user interface. A request to validate the user based on the user credentials is transmitted. Upon transmitting the request to validate the user, an instruction to remove the new user interface is received when the user is validated. Upon receiving the instruction, a display of the web-based application is transformed by removing the new user interface. | 12-02-2010 |
20110016406 | Network-Based Collage Editor - A network-based collage editor for creating and editing image and or text-based-based projects includes a graphics user interface (GUI) implemented in software executable from a digital medium. The GUI interprets dimensional ink printing instructions inputted manually, automatically, or via combination thereof and applies the instructions to output dimensional printing relative to one or more project items. | 01-20-2011 |
20110029885 | Confidential Presentations in Virtual Worlds - Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation. | 02-03-2011 |
20110029886 | Chassis Button To Activate Graphical User Interface To Enable User To Select Diagnostic And/or Recovery - A computer comprises a chassis, a button provided on the chassis, and a memory containing executable code. The executable code is caused to execute as a result of a user pressing the button. The code causes a graphical user interface to be displayed to the user providing the user with the ability to choose at least between a computer-diagnostic operation and a recovery operation. | 02-03-2011 |
20110041073 | Key-Based Storage and Retrieval of Information - An information interaction module (IIM) is described for interacting with information items using a hierarchical taxonomy of key elements. In one mode, the IIM allows a user to specify a key by successively entering a string of key elements which compose the key. At each stage in this operation, the IIM guides the users by identifying a set of key elements that can be entered next. Ultimately, the IIM retrieves an information item that is associated with the specified key. In another mode, the IIM also allows a user to store a new information item by identifying a key associated with the information item. The IIM can be implemented as a standalone browser or as a component within an authoring tool. The information items can have any level of granularity. | 02-17-2011 |
20110061000 | Interconnecting Applications on Personal Computers and Mobile Terminals Through a Web Server - Methods of communicatively connecting a local application on a mobile terminal to a Web application on a personal computer and related Web servers and mobile terminals are disclosed. A first session ID for the Web application and a corresponding first code may be communicated from a connector application on a Web server to the personal computer. A second code and user ID may be communicated from the mobile terminal to the connector application on the Web server. The connector application on the Web server may be operated to determine whether the first code from the personal computer matches the second code from the mobile terminal and, if so, to communicatively connect the local application on the mobile terminal to the Web application on the personal computer. | 03-10-2011 |
20110083080 | CLIENT SERVER SYSTEM AND CONNECTION METHOD - In at least one embodiment of the disclosure, a computing device comprises a network interface that receives terminal information corresponding to a terminal connected to a network. A storage device stores profile information defining that the terminal is permitted to connect to the computing device. A central processing unit refers to the received terminal information and the stored profile information and determines that the terminal is permitted to connect to the computing device. A display displays a participant display area. The display area shows a client name that corresponds to the terminal. An input mechanism accepts a user operation selecting the client name displayed in the participant display area to designate the terminal. The terminal provides image data to the computing device. The computing device supplies the image data provided by the terminal to an image display apparatus connected to the network. | 04-07-2011 |
20110099482 | INTERACTIVE MANAGEMENT OF WEB APPLICATION FIREWALL RULES - A computer implemented method, information processing system, and computer program product manage web application firewall rule configuration. A web application is analyzed. A set of data elements within the web application is identified. Each data element in the set of data elements stores information that is sent from a web client to a web server. Each data element in the set of data elements is analyzed. A data type is associated with each data element in the set of data element. The data type describes a type of data stored by the data element. A web application firewall rule recommendation is automatically generated for each data element based at least on the data type associated therewith. | 04-28-2011 |
20110138296 | METHOD AND DEVICE FOR BROWSING WEB PAGE SECURELY - A method and device for browsing a web page in a terminal device are provided. The method includes generating a first value to verify whether the received web page is browsable using the terminal device, comparing the first value with a second value for the web page, the second value being received from a server and stored in the terminal device, and selectively browsing the web page based on the comparison result. | 06-09-2011 |
20110161830 | FACETED PROFILES WITH CUSTOMIZED PRIVACY CONTROLS AND PERSONALIZED VIEW - An entity's profile is augmented. Viewer-supplied data is received from a first viewing computer to modify an initial profile for a profiled entity in order to create an augmented profile about the profiled entity. This viewer-supplied data is hidden from the profiled entity. The augmented profile is generated and transmitted to an authorized viewing computer that has requested the augmented profile. | 06-30-2011 |
20110214064 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING ONE OR MORE DATA SETS TO A USER - In accordance with embodiments, there are provided mechanisms and methods for displaying one or more data sets to a user. These mechanisms and methods for displaying one or more data sets to a user can enable enhanced data security, more relevant data display, reduced processing, etc. | 09-01-2011 |
20110225504 | Document Management Systems, Apparatuses And Methods Configured To Provide User Interface Customized For Specific User - Apparatuses, systems and methods are provided for accessing a document management application through a network, wherein a user interface that is customized for the specific user is provided. | 09-15-2011 |
20110225505 | User Specific Focus Parameters - Apparatuses, systems and methods are provided for accessing a document management application through a network, wherein one or more key terms and focus terms (selected from user-specific focus parameters) for selected search parameters are transmitted to the document management application for limiting a search to be performed by a search function of the document management application. | 09-15-2011 |
20110225506 | Service Cloud Console - Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for displaying object record information via a user interface provided in a web browser. A request to display a user interface component may be received. The user interface component may include first stored object record information associated with a first object record in a database stored on a server. Whether the requested user interface component including the first stored object record information is open in the user interface may be determined. When it is determined that the requested user interface component is not open in the user interface, the first stored object record information may be retrieved from the server. The requested user interface component at the client machine may be generated without reloading the user interface. | 09-15-2011 |
20110239124 | MULTI-FUNCTIONAL PERIPHERAL AND MULTI-FUNCTIONAL PERIPHERAL CONTROL SYSTEM - A multi-functional peripheral | 09-29-2011 |
20110252331 | METHOD AND SYSTEM FOR SOCIALIZING EVENTS - An example of a method includes determining, electronically, a social network associated with a user in response to the user visiting a web page. Further, the method includes determining, electronically, a first buddy of the user on the social network. Furthermore, the method includes identifying, electronically, a first event from events associated with the first buddy which matches an event associated with the web page. In addition, the method includes displaying the first event and information associated with the first buddy on the web page. | 10-13-2011 |
20110252332 | ELECTRONIC DEVICE AND METHOD FOR BROWSING INTERNET CONTENT UTILIZED THEREBY - In a method of browsing internet content using an electronic device, an image of a user is captured, a facial region from the captured image is examined, and facial characteristics are extracted from the facial region. An age of the user is estimated according to the extracted facial characteristics, and a privilege level for browsing the internet content of the user is determined accordingly. Additionally, category information of internet content of a webpage is acquired when the user opens the webpage to determine whether the user is permitted to browse the internet content, and a notification is displayed on a display screen of the electronic device to inform the user that the internet content is forbidden if the user is not permitted to browse the internet content. | 10-13-2011 |
20110258554 | HIERARCHICAL DISPLAY OF PROJECT INFORMATION IN A COLLABORATION ENVIRONMENT - Providing access to project information in a virtual collaboration environment is disclosed. A credential information associated with a user of the virtual collaboration environment is received. It is determined, based at least in part on the credential information, which portion or portions of a hierarchical set of project information the user is entitled to receive. A hierarchical display that includes the portion or portions of the hierarchical set of project information that it is determined the user is entitled to receive is provided to the user via the virtual collaboration environment. | 10-20-2011 |
20110283200 | EFFECTIVE SHARING OF CONTENT WITH A GROUP OF USERS - Techniques for sharing user interactions are disclosed. A user can effectively share content with a group of users in as little as one action by using a sharing control associated with the content. The sharing control can be implemented using links or voice activated commands. Other users can specify interest in user particular events and be automatically alerted to the occurrence of the events. The shared content may include many types of content such as news, alerts, messages, tables and/or charts. The sharing control can be displayed as a part of a web page, or in a display of a local application that is not a browser. The local application can be installed on a wireless PDA. | 11-17-2011 |
20110289423 | METHOD AND APPARATUS FOR CONTROLLING OBJECTS OF A USER INTERFACE - A method and apparatus for controlling objects of a user interface (UI) are provided. The method and apparatus simultaneously hide and move a selected object to a bottom of a UI when the object is encrypted, thereby not visually exposing the encrypted object to a third person, displaying, through the UI the encrypted object on a predetermined screen, directory or folder, and rearranging unselected objects to fill a space created when the selected object is hidden and moved. | 11-24-2011 |
20110314386 | IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING THE SAME - A method for operating an image display apparatus is discussed. The method according to an embodiment includes storing a Web site list including a plurality of Web sites and login information for the Web sites, connecting to servers of at least two of the stored Web sites using the stored login information, and displaying a list of the connected Web sites or Web pages of the connected Web sites on at least a part of a display. | 12-22-2011 |
20120005588 | Displaying Concurrently Presented Versions in Web Conferences - A method of providing a number of versions of a presentation in a web conference may comprise streaming at least two different versions of a presentation associated with a web conference over a network to at least one client device, and providing an option to the client device to view an alternative one of the versions. An associated computing system and computer program product are also described. Finally, a method of viewing a number of versions of a web conference presentation in a web conference may comprise, with a client device, joining a web conference presented over a network, and switching between at least two different versions of the presentation based on permissions assigned to a passcode. | 01-05-2012 |
20120005589 | MOBILE TERMINAL AND METHOD FOR CONTROLLING THE OPERATION OF THE MOBILE TERMINAL - A mobile terminal and a method for controlling operation of the mobile terminal are provided. In the method, a webpage that requires input of an authentication number for user authentication is displayed and a message including an authentication number is then received upon requesting an authentication number through the webpage. The authentication number is extracted from the message and the extracted authentication number is input to the webpage to allow the authentication process to be performed. Accordingly, it is possible to quickly and easily perform login authentication information input or the user authentication process using the mobile terminal. | 01-05-2012 |
20120030580 | Stable Anchors In User Interface to Support Life Cycle Extensions - According to some embodiments, a business service provider may define a stable user interface anchor entity associated with a business object data structure. A reference field may be associated with the stable user interface anchor, the reference field representing a path to a persistent node of the business object data structure. An end user adaptation to a user interface may then be applied in connection with the business object data structure, the adaptation referencing the stable user interface anchor entity. | 02-02-2012 |
20120036447 | JOB PROCESSING APPARATUS AND CONTROL METHOD FOR THE JOB PROCESSING APPARATUS - A job processing apparatus for performing a job process for a job input by a user includes a job determination unit configured to determine whether there is a job being executed or waiting to be executed for a user when the user logs into the job processing apparatus, and a job status display control unit configured to display a job execution information screen showing an execution status of the job being executed or waiting to be executed for the user when it is determined by the job determination unit that there is the job being executed or waiting to be executed. | 02-09-2012 |
20120124479 | Method And System For Tagging Content - Systems and methods for tagging digital content are provided. In some embodiments, a method comprises receiving and storing personal data of a first user of an internet-based social network. The personal data of the first user can include one or more digital images or other digital content that the first user is willing to share with other users of the social network. Accordingly, a request from a second user of the internet-based social network can be received to view some of the digital content of the first user. A viewer image can be used to tag the digital content of the first user allowing the owner of the digital content to quick determine the viewers. The viewer image can be a personal profile picture, an image, an icon, an avatar (two-dimensional or three-dimensional), or other on-screen representation that includes a visual indicator of the second user. | 05-17-2012 |
20120131471 | METHODS AND APPARATUSES FOR PROTECTING PRIVACY OF CONTENT - Methods and apparatuses are provided for protecting privacy of content. A method may include determining a predefined trigger for activating a private mode. The method may further include, responsive to the determined trigger, causing content at a display location to be concealed by causing display of an altered representation of the content at the display location. Corresponding apparatuses are also provided. | 05-24-2012 |
20120137225 | DISPLAY SCREEN USER IDENTIFICATION CARD FOR ACCESS TO SECURED DATABASES - An identification card with a planar member having a plurality of apertures formed therein and a plurality of prisms, each respectively mounted in one of the apertures so as to produce a refraction of a selected color of light transmitted through the aperture different from the refraction of a color of light transmitted through the other prisms in the plurality of other apertures. | 05-31-2012 |
20120151375 | Method for automatically inserting an embedded toolbar into a web browser directly by way of a gateway device - The present invention is to provide a method applicable to a network system for automatically inserting an embedded toolbar into a web browser directly by way of a gateway device, wherein a toolbar request instruction written in a dynamic scripting language is inserted into a web page message by the gateway device while the web page message is transmitted from a web server to a terminal device (e.g., a personal computer, personal digital assistant, etc.) through the gateway device, so as to enable the web browser of the terminal device to request an embedded toolbar serve for providing an embedded toolbar message according to the toolbar request instruction and then show an embedded toolbar corresponding to the embedded toolbar message on a web page received from the web server according to the web page message. Thus, a user of the terminal device doesn't have to install the embedded toolbar additionally. | 06-14-2012 |
20120173990 | MULTI-SOURCE ELECTRONIC FORMS WITH CONCEALED FIELDS - Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or more user, and selectively displaying the population data to each user. The population data may be displayed to the various users based on the security authorization of the user seeing the form. Upon completion of the form by the users, the form may be further completed and submitted for processing or approval. | 07-05-2012 |
20120290939 | APPARATUS, METHOD, COMPUTER PROGRAM AND USER INTERFACE - An apparatus, method, computer program and user interface wherein the apparatus comprises: at least one processor: and at least one memory including computer program code; wherein the at least one memory and the computer program code are configured to, with the at least one processor, enable the apparatus to: configure the apparatus in a first mode of operation in which access to at least one function of the apparatus is disabled; display a plurality of items where a subset of the displayed items are associated with information which satisfies a predetermined criteria, wherein the information comprises contextual information; detect user selection of one or more of the items; determine whether or not the selected items satisfy the predetermined criteria; if the predetermined criteria is satisfied, configure the apparatus in a second mode of operation in which access to the at least one function of the apparatus is enabled; and if the predetermined criteria is not satisfied the apparatus is not configured in the second mode of operation. | 11-15-2012 |
20120317494 | USER INTERFACE (UI) CONTROL FOR ATTESTATION PROCESS - Methods and apparatus involve attestation of items, such as user profiles, roles, assets, etc. In a computing environment, a compliance administrator initiates an attestation process, including specifying particular attributes of a user that require attestation. A workflow is launched to present the user with a workflow form in a browser page of his computing device. As part of the launch, a UI control makes calls to an attestation service to determine which attributes of the user were specified by the compliance administrator and to query an association between each of the specified attributes and a particular UI control and field value therefor. Upon obtaining the results, the particular UI control for the specified attributes are presented to the user in the workflow form, along with an attestation question UI control, and an option for the user to update at least one of their field values. | 12-13-2012 |
20130047090 | MULTIPLE STAKEHOLDERS FOR A SINGLE BUSINESS PROCESS - Methods and apparatus, including computer program products, implementing and using techniques for providing a customized representation of a business process involving one or more organizational entities that are accessible through a network. A user interface that can display a customized representation of a business process is provided. User information, including user privileges associated with the business process, is stored in a central repository that is accessible through the network. A request to view the business process is received from a first user through the user interface. The user privileges for the first user are retrieved from the central repository. A customized representation of the business process is displayed with the user interface. The customized representation is in compliance with the retrieved user privileges for the first user. | 02-21-2013 |
20130067346 | Content User Experience - A content user experience is described. In one or more implementations, a user interface is displayed that has selectable representations of content sources, at least one of which is available via a network. Responsive to selection of one or more of the content sources via the user interface, representations of content are displayed in the user interface using metadata obtained from the selected one or more content sources, the representations arranged according to a hierarchy used at a respective content source to arrange access to the content. Responsive to selection of one or more of the representations via the user interface; the content is obtained that corresponds to the selected representations and the obtained content is displayed in the user interface. | 03-14-2013 |
20130067347 | Sharing Digital Items - A user may make a digital item available to other users of a computer network, such as an instant messaging system, a chat environment, or a subscription-based computer network. Examples of digital items that may be shared with other users include digital representations of graphic images, photographs, audio segments, songs, video segments, movies, and text (such as lists of favorites (e.g., a list of favorite books, a list of favorite movies, and a list of favorite places to visit)). On-line presence information is provided to indicate the on-line presence of users with whom a digital item has been shared, may be shared or is being shared. For instance, an indication of the on-line or offline status of a user with whom an item has been shared or is being shared may be presented. | 03-14-2013 |
20130073978 | CAPABILITIES BASED MANAGEMENT OF VIRTUAL AREAS - Apparatus and methods of managing a virtual area based on communicant capabilities are described. The communicant capabilities are updated based on rules in response to events in the virtual area. An action by one communicant can affect the capabilities of another communicant. Communicant capabilities can be stored in respective server-side proxies and the virtual area can be managed without transmitting any of the capabilities to the communicants' client network nodes. Capability-based permissions checks can be performed against communicant capabilities with wildcarded attribute fields. | 03-21-2013 |
20130086479 | GENERATING STATE-DRIVEN ROLE-BASED LANDING PAGES - A method, computer system, and computer program product for generating state-driven role-based landing pages. An enterprise application user in a secure enterprise application environment provides user-specified content relevant to the user's role in the enterprise, and when the user invokes an enterprise application, initial screens displayed by the enterprise application are displayed as landing pages using the user-specified content. The method commences by validating an enterprise application user using a user profile and a security model where the security model serves to distinguish permitted or allowed enterprise application user activities from denied enterprise application activities. Once validated, then the method identifies a user's role or roles, and further, identifies the user's selection of subscriptions (e.g., subscriptions pertaining to content related to the user's role). Given the user role and the user's selection of subscriptions, systems keep track of user states to use when populating landing pages with subscription content. | 04-04-2013 |
20130097517 | Permission Control for Applications - In one embodiment, methods and systems enabling a user to control access by an application to one or more hardware components of a user's client device and to user data stored remotely and/or locally on the user's client device. | 04-18-2013 |
20130097518 | COOPERATIVE MOBILE ANALYTICS - A first computing device running a particular program is used to identify a second computing device also running the particular program and substantially co-located with the first computing device in a particular physical location. The first computing device and the second computing device are joined in a use session of the particular program. It is determined that the first computing device displays a first user interface of the particular program at a first instance, the first user interface showing a first context in a plurality of contexts. The second computing device displays a second user interface of the particular program at the first instance based at least in part on the first user interface showing the first context, the second user interface showing a second context in the plurality of contexts. | 04-18-2013 |
20130104049 | Methods and Systems for Preventing Unauthorized Access to Patient Information - An exemplary method includes a privacy management system 1) presenting, within a GUI, a patient list that initially includes a plurality of entries each comprising a plurality of obscured characters representative of patient information associated with a distinct patient included within a plurality of patients, 2) receiving user input representative of a search term comprising a sequence of one or more characters selected to identify a particular patient included within the plurality of patients, and 3) dynamically updating the patient list presented within the GUI in response to the user input by unobscuring a sequence of one or more obscured characters included in each entry of the patient list and that matches the sequence of one or more characters included in the search term and removing each entry included in the plurality of entries that does not include the search term from the patient list presented within the GUI. | 04-25-2013 |
20130117683 | WEB COMMAND PROMPT - A method of streamlined web site navigation includes providing a command line interface supplemental to a graphic user interface. The command line interface accepts entry of verbs and parameters from a web site-specific vocabulary. The web site-specific vocabulary allows a user to access functions of a graphic user interface page of the web site by entering at least one verb and without navigating page links to reach the graphic user interface page. The method receives data entered at the command line interface, including the at least one verb. The method continues with identifying a particular web page responsive to the verb, and sending the particular web page towards a client system. The method may further include receiving with the data entered at the command line interface at least one parameter that modifies the verb, and identifying the particular web page responsive to the verb combined with the parameter. | 05-09-2013 |
20130125010 | METHOD AND APPARATUS OF PROVIDING PERSONALIZED VIRTUAL ENVIRONMENT - An approach is provided for providing a personalized virtual environment for a visitor of a service community. A comparison is made of identification information of the visitor with contact entries of a plurality of registered users of a service community. Additionally, an identification is made of content of one or more of the plurality of registered users having a contact entry that matches the identification information of the visitor to provide a personalized virtual environment of the visitor in the service community. | 05-16-2013 |
20130139064 | METHODS FOR MANAGING AUTHORITY DESIGNATION OF GRAPHICAL USER INTERFACES - According to one aspect, a graphics management system receives a first message from a first process for granting one or more rights to a second process for accessing a GUI element owned by the first process. In response, the graphics management system transmits a second message to the second process, the second message offering the one or more rights to the second process. The graphics management system receives a third message from the second process indicating an acceptance of the offer. Thereafter, the graphics management system restricts access of the GUI element by the second process based on the one or more rights accepted by the second process. | 05-30-2013 |
20130198645 | MULTIPLE STAKEHOLDERS FOR A SINGLE BUSINESS PROCESS - Methods and apparatus, including computer program products, implementing and using techniques for providing a customized representation of a business process involving one or more organizational entities that are accessible through a network. A user interface that can display a customized representation of a business process is provided. User information, including user privileges associated with the business process, is stored in a central repository that is accessible through the network. A request to view the business process is received from a first user through the user interface. The user privileges for the first user are retrieved from the central repository. A customized representation of the business process is displayed with the user interface. The customized representation is in compliance with the retrieved user privileges for the first user. | 08-01-2013 |
20130212485 | COLLABORATIVE AND NON-COLLABORATIVE WORKSPACE APPLICATION CONTAINER WITH APPLICATION PERSISTENCE - The present disclosure includes, among other things, systems, methods and program products for collaborative and non-collaborative work spaces, each of which can be defined by a workspace definition that includes a workspace identifier referring to a workspace where an application container having a user interface can instantiate the workspace based on the workspace definition, and a collection of application identifiers each referring to an application provider for an application. Each application can be configured to execute in the application container for the instantiated workspace, and each application can have a visual representation in the user interface. The workspace definition can also include one or more participants, where each participant refers to one or more workspace participants. | 08-15-2013 |
20130232425 | DETERMINATION OF A TERMINAL'S POSITION FOR DISPLAYING A GUI ELEMENT - Computer-implemented method for providing access control to a function of an analyzer is presented. A user's log-in data is received from a first data entry terminal. Information descriptive of a position of the first data entry terminal is obtained. It is determined whether the position of the first data entry terminal is within a physical operating (PO) area of the analyzer. A user activatable position sensitive (PS) GUI element is displayed on the first data entry terminal if the position of the first data entry terminal is determined to be within the PO area. The activatable PS GUI element triggers, upon activation, the execution of the function. The execution of the function comprises the execution of a physical action by the analyzer. The display of the user activatable PS GUI element is otherwise prohibited or a non-activatable PS GUI element indicative of the function is displayed. | 09-05-2013 |
20130246933 | MULTIPLE STAKEHOLDERS FOR A SINGLE BUSINESS PROCESS - Methods and apparatus, including computer program products, implementing and using techniques for providing a customized representation of a business process involving one or more organizational entities that are accessible through a network. A user interface that can display a customized representation of a business process is provided. User information, including user privileges associated with the business process, is stored in a central repository that is accessible through the network. A request to view the business process is received from a first user through the user interface. The user privileges for the first user are retrieved from the central repository. A customized representation of the business process is displayed with the user interface. The customized representation is in compliance with the retrieved user privileges for the first user. | 09-19-2013 |
20130311894 | SECURITY ENHANCEMENT THROUGH APPLICATION ACCESS CONTROL - Security enhancement through application access control for cloud-based services and/or storage accounts is disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for providing, via the collaboration environment, applications for use by a user in the collaboration environment. The applications are selectable by a user, through the collaboration environment, for use in interaction and engagement with other users in the collaboration environment in collaboration sessions. The applications that are visible or available for use by the user is configurable by another user (e.g., administrator or IT specialist) with appropriate permissions, though a designated console. | 11-21-2013 |
20130311895 | Sharing Digital Items - A user may make a digital item available to other users of a computer network, such as an instant messaging system, a chat environment, or a subscription-based computer network. Examples of digital items that may be shared with other users include digital representations of graphic images, photographs, audio segments, songs, video segments, movies, and text (such as lists of favorites (e.g., a list of favorite books, a list of favorite movies, and a list of favorite places to visit)). On-line presence information is provided to indicate the on-line presence of users with whom a digital item has been shared, may be shared or is being shared. For instance, an indication of the on-line or offline status of a user with whom an item has been shared or is being shared may be presented. | 11-21-2013 |
20130326357 | INTERACTIVE BRANDING AND ADVERTISING USING DYNAMIC USER INPUT - A system adapted to manage user access to media content is described. The system includes: a communication module adapted to receive a user request to access content; a verification engine communicatively coupled to the communication module, the verification engine adapted to provide a query to a user and receive an associated response; and a content gateway communicatively coupled to the verification engine and the communication module, the content gateway adapted to provide content to the user if the verification engine determines that the response satisfies the query. An automated method adapted to control user access to web-based content includes: identifying a user interaction; providing a branding request; receiving a response to the request; and providing access to the content if the response matches a set of evaluation criteria. A graphical user interface (GUI) allows efficient implementation of the automated method and use of the system. | 12-05-2013 |
20130326358 | SYSTEM AND METHOD FO PROVIDING AN APPLICATION LOCK - A portable electronic device including: a memory for storing information relating to an application; a display for displaying at least a portion of the information stored on the memory; and a user interface for allowing the user to activate the application; a network interface for connecting the device to a network and for allowing the application to access a database connected to the network, the database storing application access information such that when the user activates the application, access to the application is locked or unlocked according to the access information. | 12-05-2013 |
20130339869 | SYSTEMS AND METHODS FOR PROVIDING A SPATIAL-INPUT-BASED MULTI-USER SHARED DISPLAY EXPERIENCE - An exemplary system includes a spatial input subsystem configured to detect gestures made by a plurality of users within a physical user space associated with a display screen. The system further includes a shared display subsystem communicatively coupled to the spatial input subsystem and configured to authenticate the plurality of users by identifying a plurality of user identities corresponding to the plurality of users based on characteristics of the plurality of hands, and execute a multi-user shared display session that provides the plurality of authenticated users with concurrent control of a display on the display screen. Corresponding systems and methods are also described. | 12-19-2013 |
20140006965 | METHOD OF ENTERING A USER INTERFACE IN A DEVICE AND THE DEVICE THEREOF | 01-02-2014 |
20140033060 | METHODS AND SYSTEMS FOR INTERACTIVE EVALUATION USING DYNAMICALLY GENERATED, INTERACTIVE RESULTANT SETS OF POLICIES - A method for interactive policy evaluation using dynamically generated, interactive resultant sets of policies includes the step of receiving, by a graphical user interface, at least one of: a description of a client requesting access to a resource, a description of the resource, and a description of a method of access requested by the client. The graphical user interface displays at least one policy applicable to the client request for access to the resource. The graphical user interface displays a decision made by applying the at least one policy to the received description. | 01-30-2014 |
20140040756 | SELECTIVE INBOX ACCESS IN HOMESCREEN MODE ON A MOBILE ELECTRONIC DEVICE - An electronic device, such as a mobile communication device, and a method are provided for selective access to certain homescreen panels displayable by the device. The device is provided with a homescreen display, which includes a plurality of panels. The panels include at least one panel that is a fullscreen view of a first application executing on the device. This first application can be a messaging application, and the fullscreen view can be a unified inbox view for a plurality of different message types. The panels also include at least one launch panel having a number of graphical user interface elements, such as icons, representing access points to a corresponding application on the device. When navigating from one of the launch panels to the fullscreen view, an intermediate lock interface for receiving an unlocking input is displayed. The unlocking input is received before the fullscreen view is displayed. | 02-06-2014 |
20140101564 | Rule-Based Binding - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rule-based binding. In one aspect, a method includes receiving first input to a graphical user interface (GUI) associating a property of a data model presented in the GUI with a data view component of a document presented in the GUI, wherein a change to a value of the data view component is reflected in a value of the property in the data model when the document is used in a workflow, and wherein the workflow is a logical sequence of documents, including the document, that is processed according to the logical sequence such that values for one or more data view components associated with the documents are received. | 04-10-2014 |
20140115488 | WALLPAPER ASSIGNMENT FOR MULTI-USER MOBILE DEVICE - Techniques are described for providing a unique wallpaper for a new user profile on a graphical user interface of a computing device. An example method includes initiating, by a computing device, a new user profile setup process to create a user profile at the computing device, the computing device having at least one other existing user profile. The method further includes automatically selecting, by the computing device, a wallpaper from a set of two or more wallpapers, wherein each wallpaper of the set of two or more wallpapers comprises a different graphical image, wherein the wallpaper is not associated with any of the other user profiles of the computing device. The method also includes automatically associating the wallpaper with the new user profile, such that the computing device displays the wallpaper in response to an attempt to access the user profile of the computing device. | 04-24-2014 |
20140115489 | CONTENT CONTROL APPARATUS AND METHOD THEREOF - A mobile terminal including a wireless communication unit configured to wirelessly communicate with at least one other terminal; a display unit including a touch screen; and a controller configured to enter the touch screen into a locked state, to display a lock screen and an application program icon for executing an application program on the lock screen when entering the locked state. | 04-24-2014 |
20140129953 | APPARATUS AND METHOD FOR SINGLE ACTION CONTROL OF SOCIAL NETWORK PROFILE ACCESS - A computer implemented method includes allowing a user to access a user-controlled social network profile page with posts in a specified order. A user is permitted to traverse an interface element across the specified order to establish a set position for the interface element. Access to posts is provided on a first side of the set position to define a viewable profile. Access to posts is blocked on a second side of the set position to define a non-viewable profile. | 05-08-2014 |
20140157141 | SYSTEMS AND METHODS FOR CONTROLLING A USER'S ABILITY TO BROWSE THE INTERNET - In a touch sensitive display system that can simultaneously receive inputs from and provide outputs to users through a touch sensitive display screen and that includes an Internet browser that can provide a controlled access to the Internet, wherein the browser includes a user interface for providing browser windows and a configuration interface including configuration panels, a method for controlling a user's ability to browse the Internet using the browser in accordance with a set of rules that places restrictions on Internet sites to which the user can navigate, is provided. The method includes: providing the configuration interface to a first user for configuring the browser with a set of rules and storing the rules in the browser; providing the user interface to receive from one of the second users an Internet site address to which the second user desires to navigate after the second user logs into the system. | 06-05-2014 |
20140164940 | APPLICATION WINDOWS AND DISPLAY DEVICES - A method of displaying application windows ( | 06-12-2014 |
20140164941 | DISPLAY DEVICE AND METHOD OF CONTROLLING THE SAME - A method of controlling a display device that displays an application execution window on a screen of the display device is provided. The method includes displaying at least one windows, each of the at least one window displaying an application, determining whether a lock command is input into a particular window of the at least one window, and if it is determined that the lock command is input, displaying only a window into which the lock command has been input in a locked state. | 06-12-2014 |
20140173450 | UNVEIL INFORMATION ON PROMPT - Embodiments of the invention provide systems and methods for controlling presentation of sensitive information in a user interface of an application. More specifically, embodiments of the present invention provide for masking the sensitive information when being entered by the user. However, if the user wants to verify the entry or display the sensitive information in readable text, the information can be displayed or unmasked upon request. For example, in response to the user clicking a button or other control of the user interface associated with the sensitive information or by another mouse or keyboard event, the requested sensitive information can be unmasked and displayed in the clear, for example as a tool tip or in the originally presented element of the user interface. The user can then close the tooltip or mask the information, e.g., after verification of what he/she typed. | 06-19-2014 |
20140189523 | USER INTERFACE FOR A COMPUTING DEVICE - There is disclosed a smartphone, tablet or other computing device comprising: (a) a touch sensitive display; (b) one or more processors; (c) computer memory; (d) one or more computer programs stored in the computer memory and configured to be executed by the one or more processors and including instructions for displaying a welcome screen with a pictorial infographic or a data visualization that graphically represents each of a number of variables relating to the device or one or more of its users. | 07-03-2014 |
20140208225 | MANAGING SENSITIVE INFORMATION - A method, system or computer usable program product for securing pages that contain sensitive information including utilizing a processor to provide a user interface on a display allowing a user to select a page as password protected on a device, responsive to a user utilizing the UI to select the page as password protected, receiving a password from the user, and requiring entry of the password before displaying the page on the display. | 07-24-2014 |
20140237375 | WEB-BASED OPERATING SYSTEM FRAMEWORK - The disclosure generally describes computer-implemented methods, software, and systems for providing a web-based operating system framework for client devices. One computer-implemented method includes receiving portal login credentials from a client device, analyzing, by operation of a computer, configuration data to determine a desired graphical user interface (GUI) for the portal to present on the client device, determining to present a particular web operating system (WOS) GUI configuration on the client device, displaying a graphical element representing an available application on the determined WOS GUI configuration, and monitoring the WOS for GUI interactions associated with the graphical element. | 08-21-2014 |
20140282047 | MOBILE TERMINAL AND CONTROL METHOD THEREOF - A mobile terminal including a terminal body; a display unit configured to display a lock screen including a plurality of regions in a lock mode in which an input of a control command with respect to an application is limited; and a controller configured to, when a touch input applied to a region among the plurality of regions of the lock screen to release the lock mode is sensed, detect information regarding a home screen corresponding to the touched region, and display the home screen corresponding to the touched region based on the detected information regarding the home screen corresponding to the touched region on the display unit. | 09-18-2014 |
20140282048 | SECURITY SYSTEM ACCESS PROFILES - An apparatus is provided for controlling access to a premises based system through a user interface device. Criteria are used for establishing a set of system functions that are accessible through the user interface device; and this set of system function is provided by determining an access characteristic associated with the user interface device, comparing the access characteristic to the criteria, and determine the set of system functions to provide the user interface based at least in part on the comparison. The criteria may be defined by an access profile containing a predetermined set of system functions. The access characteristic may include physical location of the user interface device, connection type, device type, and a device identifier. The set of functions may be automatically provided to the user interface device upon with a prompt to arm/disarm the system, and/or control other devices, such as through geo-fencing. | 09-18-2014 |
20140298190 | SYSTEMS AND METHODS FOR PERFORMING ACTIONS FOR USERS FROM A LOCKED DEVICE - Systems and methods for providing actions for users of a computer device from a lock screen interface are provided. A computing device may comprise a touch-sensitive display screen that may allow a user to scroll through a set of user int rfaces that may comprise a set of lock screen interfaces—one of which may be associated with the user, if authorized for using the computing device. The computing device may allow the user to scroll to one of the following: a set of locked screen interfaces, a set of sign-in interfaces, a set of applications allowed for use (e.g., a camera) by the computer device (even if the user is not signed-in) and a new mode of functionality for computing device (e.g., a children's entertainment application). The computer system may allow swiping from multiple discernible directions to allow the scrolling through user interfaces in a natural manner. | 10-02-2014 |
20140298191 | Interactive Elements in a User Interface - In particular embodiments, a computing device provides for presentation to a user a first user interface, the first user interface including a plurality of interactive elements. The computing device receives first user input selecting one of the interactive elements. In response to the first user input, the computing device provides for presentation to the user an animation associated with the selected one of the interactive elements. The computing device receives second user input associated with the selected one of the interactive element and, in response to the second user input, provides for presentation to the user a second user interface, the second user interface being associated with the selected one of the interactive elements. | 10-02-2014 |
20140331146 | USER INTERFACE APPARATUS AND ASSOCIATED METHODS - An apparatus comprising:
| 11-06-2014 |
20140351706 | INITIATION OF ACTIONS BY A PORTABLE COMPUTING DEVICE FROM A LOCKED STATE - A method and apparatus for performing an action while a portable computing device is in a locked state is disclosed. An unlock image is displayed in a first region of a touch-sensitive display. Responsive to detecting contact with the touch-sensitive display at the first region, an action image is displayed in a second region of the touch-sensitive display. While the unlock image remains stationary at the first region, movement of the contact with the touch-sensitive display is detected and a direction of movement of the contact is determined. Responsive to determining the direction of movement of the contact is towards the action image, the action image is visually modified to distinguish it from the unlock image. Responsive to the contact with the touch-sensitive display reaching the second region, an action associated with the action image is performed. | 11-27-2014 |
20140365903 | METHOD AND APPARATUS FOR UNLOCKING TERMINAL - Provided are a method and a terminal for unlocking a locked mode of the terminal. The terminal may include a display to display a home screen in an unlocked mode and a lock screen in a locked mode, an appearance of the lock screen being the same as a home screen, a user interface to receive inputs to unlock the lock screen, and a controller configured to unlock the lock screen based on the received inputs. The input may be received when the lock screen is displayed on the display in the lock mode, the input having a prescribed pattern. When the prescribed pattern of the input corresponds to a previously stored unlocking pattern, the lock screen may be unlocked to display the home screen. | 12-11-2014 |
20140365904 | METHOD FOR QUICKLY EXECUTING APPLICATION ON LOCK SCREEN IN MOBILE DEVICE, AND MOBILE DEVICE THEREFOR - A method for quickly executing an application on a lock screen in a mobile device is provided. The method includes displaying a lock screen on which a plurality of executable objects are displayed; receiving an unlock command by an input means; determining whether the received unlock command coincides with a preset unlock command; unlocking the lock screen if the received unlock command coincides with the preset unlock command; and executing an application associated with an object corresponding to a last position of the input means. By doing so, the mobile device may quickly execute an application upon unlocking. | 12-11-2014 |
20140372896 | USER-DEFINED SHORTCUTS FOR ACTIONS ABOVE THE LOCK SCREEN - Customized tasks can be performed above the lock screen in response to a user-defined shortcut input as an interaction with a user interface of a device while the device is in a locked state. A method for facilitating user-defined shortcuts for actions above the lock screen includes at least monitoring user interactions made with respect to the user interface of the device while the device is in the locked state for at least one interaction associated with at least one feature of an application. The user interaction may be a gestural input of a custom combination of one or more gestures on a designated region of the lock screen. The user-defined shortcut may be reconfigured at any time by a user. | 12-18-2014 |
20140372897 | PUBLISHING OF LEARNING APPLICATIONS IN A MODULAR LEARNING SYSTEM - A modular learning system is provided for publishing new and updated learning applications to users of the modular learning system. The learning application authors are validated by the modular learning system as credentialed learning application authors. The learning application authors are optionally granted access to use a content editing interface and revise information using a template provided by a template user. The resulting learning application may be translated and certified and requested for publication. After publication, update requests may be provided to the authoring user to remind the author to review and revise the learning application. | 12-18-2014 |
20150040024 | Information processing device having unlocking function - An information processing device having a touch panel includes an operation part, a display, an operation content determination part, and a display control part. The operation part displays an unlock icon while the display displays the predetermined lock screen in the locked state. The operation content determination part determines whether or not to release the locked state and whether to change the display content of the lock screen in response to a user's operation on the unlock icon. The display control part changes the display content of the lock screen based on the determination result. The unlock icon can be moved from the initial position to an end mark along a slide bar via a user's operation. The operation content determination part determines the instructed content of a user's operation based on the time length of a user's operation on the unlock icon or the position of the unlock icon. | 02-05-2015 |
20150046831 | Method and Apparatus for Unlocking Terminal - Embodiments of the present invention provide a method for unlocking a terminal, which includes: detecting, by a terminal, that a user touches an unlocking icon of the terminal, and playing a spreading animation of an application icon, where the unlocking icon is a graphical and interactive user interface object and is used to interact with the user to unlock the terminal; displaying the application icon at a preset location after the spreading animation is played; when it is detected that the user drags the unlocking icon, moving the unlocking icon according to a dragging track of the user; and when the location of the unlocking icon intersects the location of the application icon, performing an unlocking operation and entering an interface of an application. Correspondingly, the embodiments of the present invention further provide an apparatus for unlocking a terminal, so as to improve the user experience. | 02-12-2015 |
20150128063 | AGGREGATED INFORMATION ACCESS AND CONTROL USING A PERSONAL UNIFYING TAXONOMY - Techniques are described for providing users with aggregate access to and control over information from multiple storing applications and information services, and for enabling developers to integrate such aggregate access and control into applications. Textual markup language may represent the structure of grouping items. Examples using XML and XooML (“Cross Tool Mark-up Language,” an XML schema) are provided, such that users need not change the storing application or service in order for those users' informational structures to be represented. | 05-07-2015 |
20150379504 | APPARATUS AND METHOD FOR MANIPULATING IMAGES - An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises: displaying for manipulation at a browser-based user interface a graphical representation of at least a portion of an image held at a remote image store; providing an internet communications link coupling the user interface to a remote image processor; transferring information about manipulations applied to the graphical representation between the user interface and the remote image processor; and causing the remote image processor to access the remote image store and apply, to at least a portion of the image held in the store, manipulations emulating those applied to the graphical representation. In another embodiment according to the invention, there is disclosed a method for applying a personalized image to a financial account access means corresponding to a financial account of a customer. The method comprises: associating financial data, corresponding to the financial account of the customer, with a customer image identifier in a financial account association table maintained securely from a user interface; associating the customer image identifier with user image selection data based on user selections made on the user interface in relation to a graphical representation of at least a portion of an original image held in an image store; and applying the personalized image to the financial account access means, the personalized image being based on the user image selection data associated with the customer image identifier. | 12-31-2015 |
20160004392 | METHODS AND SYSTEMS FOR AN INTERMEDIATE GRAPHICAL DESKTOP SHARING PROTOCOL - Generating a universal graphical desktop sharing protocol is disclosed. The universal graphical desktop sharing protocol is configured to communicate information (e.g., a sequence of one or more desktop sharing events) that has been translated from a first graphical desktop sharing protocol and is available to be translated into a final graphical desktop sharing protocol. | 01-07-2016 |
20160011765 | SECURED AND FILTERED PERSONAL INFORMATION PUBLISHING | 01-14-2016 |
20160027278 | SYSTEM AND METHOD FOR ADAPTIVE INDIRECT MONITORING OF SUBJECT FOR WELL-BEING IN UNATTENDED SETTING - A system is provided for event-based monitoring of a subject's well-being within an unattended setting. A plurality of sensors are disposed within the setting for sensing disparate events, and an analytics processing portion is coupled to the sensors to collectively acquire sensing data therefrom, and map a plurality of sensed data points for a selected combination of disparate events to a conduct adaptively characterized for the subject. The mapping occurs according to a set of pre-established reference event patterns, relative to which each characterized conduct is screened for excessive aberration. The analytics processing portion actuates generation of a graphic user interface displaying at least one reporting page. The reporting page contains for each characterized conduct certain graphic indicia determined responsive to the screening thereof. At least one wirelessly coupled monitoring device actuates responsive to the analytics processing portion to render the graphic user interface for a remotely monitoring user. | 01-28-2016 |
20160044084 | SYSTEM AND METHOD FOR FACILITATING POSTING OF PUBLIC AND PRIVATE USER COMMENTS AT A WEB SITE - A software system and method that allows web site operators to adapt web pages for posting of public and private user comments. An administrator accesses a web site to enter data for creating reader comment areas. HTML code for the reader comment areas is generated for insertion into web pages. When the web page containing the code is posted to a web site, the code results in a reader comment display page where web site visitors can comment on the content of the particular web page where the reader comment area appears. Comments are saved at a remote web site accessible to the administrator. The administrator may review and manage the reader comments. A reader who makes a comment on a web page has the option of creating a personal journal comprising all comments entered by the reader at any web page enabled according to the invention. | 02-11-2016 |
20160062595 | ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - According to one embodiment, an electronic device includes storage including an operating system (OS) and circuitry. The circuitry executes the OS capable of creating a first user account and a second user account. The OS comprises a first function for prohibiting, according to a first setting, first functions of the OS out of functions available to the first user account while user has logged in to the second user account. The OS further comprises a second function for prohibiting, according to a second setting, second functions of the OS. One of the second functions coincides with one of the first functions. The first function is prohibited from being active while the second function is active or the second function is prohibited from being active while the first function is active. | 03-03-2016 |
20160085434 | SHARING DIGITAL ITEMS VIA A SOCIAL NETWORKING SYSTME - A user may make a digital item available to other users of a computer network, such as an instant messaging system, a chat environment, or a subscription-based computer network. Examples of digital items that may be shared with other users include digital representations of graphic images, photographs, audio segments, songs, video segments, movies, and text (such as lists of favorites (e.g., a list of favorite books, a list of favorite movies, and a list of favorite places to visit)). On-line presence information is provided to indicate the on-line presence of users with whom a digital item has been shared, may be shared or is being shared. For instance, an indication of the on-line or offline status of a user with whom an item has been shared or is being shared may be presented. | 03-24-2016 |
20160110036 | CONTENT MANAGEMENT SYSTEMS AND METHODS - A method includes presenting a list of current projects in a dashboard interface, upon a successful login from a first user; allowing the first user to create or upload an asset once the user selects a project from the list of current projects and is presented with the list of all assets in the project; notifying all users associated with the project with a first notification that the first user uploaded an asset; receiving comments to the asset from a second user via an asset viewer and then sending out a second notification to all users associated with the project; processing changes made by the first user to the asset via the asset viewer based on the comments from the second user on the asset and then sending out a third notification to all users associated with the project; and sharing the asset with clients once the second user sends approval. | 04-21-2016 |
20160132214 | APPLICATION DELIVERY AGENTS ON VIRTUAL DESKTOP INSTANCES - A service provider system may include an application fulfillment platform that delivers desktop applications to end users (e.g., to physical computing devices or virtual desktop instances). An application delivery agent installed on an end user's device may send requests to access platform control plane services on behalf of the agent or the end user (along with security credentials) and may retrieve messages directed to the device from a queue on the platform. Messages may be placed in the queue by control plane services in response to agent requests. Messages may include instructions for the agent to perform installing, uninstalling, updating, or reinstalling a virtualized desktop application package on the device. The agent may request and retrieve (from the queue) information about the intended (or assumed) installation state of applications on the device, compare it to locally stored information about the actual state, and initiate corrective action, if needed. | 05-12-2016 |
20160139744 | CROWDSOURCED DETERMINATION OF MOVABLE DEVICE LOCATION - The locations of electronic devices in an institutional facility are determined based on crowdsourced location reporting by users in an institutional setting and responding to device location queries. | 05-19-2016 |
20160154775 | EDITOR FOR WEBSITE AND WEBSITE MENU | 06-02-2016 |
20160171438 | DELIVERY MANAGEMENT SYSTEMS AND METHODS FOR ZERO-INVENTORY DISTRIBUTION | 06-16-2016 |
20160196419 | MULTI-ACTION LOCK SCREEN | 07-07-2016 |
20160202855 | Machine, Computer Readable Medium, and Computer-Implemented Method For File Management, Storage, and Display | 07-14-2016 |
20160203304 | ADAPTIVE ELECTRONIC DEVICE INTERFACE | 07-14-2016 |
20170235453 | INTEGRATED RESOURCE TRANSFER APPLICATION | 08-17-2017 |
20180024846 | METHOD FOR ENTERING OPERATING SYSTEM DESKTOP AND MOBILE INTELLIGENT TERMINAL | 01-25-2018 |