Patent application number | Description | Published |
20120124566 | SHARED RESOURCE DEPENDENCIES - Described herein are methods for sharing resource dependencies between applications stored on a system. For example, in at least certain embodiments, a computer-implemented method for sharing resource dependencies includes installing or initiating installation of multiple application bundles having one or more applications and respective resources on the system. Next, an installer determines identifiers (e.g., hash signatures) for first and second resources and determines whether the resources are identical if an identifier for the first resource matches an identifier for the second resource. Then, a link is created from the second application bundle to the first resource of the first application bundle if the first resource is identical to the second resource. The second resource may be removed from the system if it has been installed. Alternatively, installation of the second resource is terminated if it has not been installed on the system. | 05-17-2012 |
20130019233 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STOREAANM Pardehpoosh; Pedraum R.AACI Palo AltoAAST CAAACO USAAGP Pardehpoosh; Pedraum R. Palo Alto CA USAANM Federighi; Craig M.AACI Los Altos HillsAAST CAAACO USAAGP Federighi; Craig M. Los Altos Hills CA USAANM Feldman; Daniel I.AACI San FranciscoAAST CAAACO USAAGP Feldman; Daniel I. San Francisco CA USAANM Quirk; Gregory T.AACI Maple GlenAAST PAAACO USAAGP Quirk; Gregory T. Maple Glen PA USAANM Matthew; Jack R.AACI San FranciscoAAST CAAACO USAAGP Matthew; Jack R. San Francisco CA USAANM Lee-Kang; JackieAACI SunnyvaleAAST CAAACO USAAGP Lee-Kang; Jackie Sunnyvale CA USAANM Ciudad; Jean-PierreAACI San FranciscoAAST CAAACO USAAGP Ciudad; Jean-Pierre San Francisco CA USAANM Gromek; Monika E.AACI OaklandAAST CAAACO USAAGP Gromek; Monika E. Oakland CA USAANM Burkholder; Thomas K.AACI VancouverAACO CAAAGP Burkholder; Thomas K. Vancouver CAAANM Pu; Daniel EmilAACI San FranciscoAAST CAAACO USAAGP Pu; Daniel Emil San Francisco CA USAANM Gharabally; SamAACI San FranciscoAAST CAAACO USAAGP Gharabally; Sam San Francisco CA USAANM Verosub; Ellis MarshallAACI San CarlosAAST CAAACO USAAGP Verosub; Ellis Marshall San Carlos CA USAANM Hwang; Yoon SubAACI AlamedaAAST CAAACO USAAGP Hwang; Yoon Sub Alameda CA US - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019234 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019237 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application for installation on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives from a client device a software adoption request including an identifier associated with a user account and a proof of entitlement associated with a software package or the user account, verifies the proof of entitlement by comparing the proof of entitlement to a database, and if the proof of entitlement is verified, adopts the software package as part of the user account. | 01-17-2013 |
20130332159 | USING FAN THROTTLING TO ENHANCE DICTATION ACCURACY - A dictation computer that includes a fan speed regulator is described. The fan speed regulator monitors a speech recognition unit to determine when the speech recognition unit is activated. Upon detection that the speech recognition unit is activated, the fan speed regulator ducks the speed of a cooling fan embedded within the dictation computer to an optimized speed of rotation over a delay time interval. The fan speed regulator may include components to adapt the optimized speed and delay time to the characteristics of the dictation computer and the user. Other embodiments are also described. | 12-12-2013 |
20140253584 | Subpixel Shape Smoothing Based On Predicted Shape Background Information - Methods and apparatus for a predictive rendering component that may generate a rendering of a character based at least in part on predictive information regarding the background into which the character is to be rendered. Using such predictive information, the predictive rendering component may produce a rendering of a character that blends into the character background more smoothly than if the predictive background information were not used. In this way, the predictive rendering component improves upon previous implementations of font smoothing. | 09-11-2014 |
20140283128 | Specifying Applications to Share in a Shared Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. In some embodiments, the device provides tools to select applications for the secondary access mode. | 09-18-2014 |
20140283135 | Mobile Computing Device with Multiple Access Modes - Some embodiments of the invention provide a mobile device that restricts access to its applications. The mobile device, displays, on the device's touch screen display, a lock screen page for accessing the device in a primary access mode or a secondary access mode. The primary access mode provides access to several of the device's applications, and the secondary access mode provides access to a limited set of the applications. The mobile device receives a touch input on the lock screen page to access the device in the secondary access mode. The mobile device unlocks the device to the secondary access mode by allowing access to the set of applications and restricting access to the remaining applications in the plurality of applications. | 09-18-2014 |
20140283141 | Switching a Mobile Device from Operating in a Primary Access Mode to a Secondary Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. | 09-18-2014 |
20140283142 | Analyzing Applications for Different Access Modes - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the mobile device automatically selects applications to share or keep private based metadata associated with the applications. | 09-18-2014 |
20150074615 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANIPULATING USER INTERFACES BASED ON FINGERPRINT SENSOR INPUTS - An electronic device with a display and a fingerprint sensor displays a fingerprint enrollment interface and detects, on the fingerprint sensor, a plurality of finger gestures performed with a finger. The device collects fingerprint information from the plurality of finger gestures performed with the finger. After collecting the fingerprint information, the device determines whether the collected fingerprint information is sufficient to enroll a fingerprint of the finger. When the collected fingerprint information for the finger is sufficient to enroll the fingerprint of the finger, the device enrolls the fingerprint of the finger with the device. When the collected fingerprint information for the finger is not sufficient to enroll the fingerprint of the finger, the device displays a message in the fingerprint enrollment interface prompting a user to perform one or more additional finger gestures on the fingerprint sensor with the finger. | 03-12-2015 |