Private and public applications
First Claim
1. A method performed by one or more processors executing on a computer device, the method comprising:
- determining a current geographic location of the computer device;
determining a frequency of use of an application on the computer device at the current geographic location;
determining a level of importance of the application on the computer device at the current geographic location;
designating the application on the computer device for private functionality and public functionality, where the computer device has a public mode and a private mode of operation, where the application is automatically designated based on the current geographic location of the computer device, the frequency of use of the application and the level of importance of the application at the current geographic location;
wherein designating the application on the computer device for private functionality comprises allowing limited access to one or more specific functions of the application while the computing device in a locked mode;
wherein the private functionality of the application includes a purchasing functionality allowing a user to conduct a purchase through the application;
determining that the computer device is running in the public mode of operation;
while the computer device is running in the public mode of operation, enforcing a security wall on the application with respect to the private functionality of the application, wherein enforcing the security wall includes allowing user access to the public functionality of the application but not the private functionality of the application; and
in response to receiving a security input, switching from the public mode of operation to the private mode of operation of the computer device and presenting one or more objects that are selectable to invoke public and private applications while the computer device is in the private mode of operation.
1 Assignment
0 Petitions
Accused Products
Abstract
Designating applications for public access or private access on a computing device is disclosed. An application on the computing device is designated for private functionality or public functionality. A security wall is enforced with respect to the application if the application is designated for private functionality, wherein enforcing the security wall includes preventing access to the application until a security input is received. Access to the application is provided if the application is designated for public functionality, wherein providing access to the application includes allowing a user to access the application without receiving the security input from the user.
-
Citations
13 Claims
-
1. A method performed by one or more processors executing on a computer device, the method comprising:
-
determining a current geographic location of the computer device; determining a frequency of use of an application on the computer device at the current geographic location; determining a level of importance of the application on the computer device at the current geographic location; designating the application on the computer device for private functionality and public functionality, where the computer device has a public mode and a private mode of operation, where the application is automatically designated based on the current geographic location of the computer device, the frequency of use of the application and the level of importance of the application at the current geographic location; wherein designating the application on the computer device for private functionality comprises allowing limited access to one or more specific functions of the application while the computing device in a locked mode; wherein the private functionality of the application includes a purchasing functionality allowing a user to conduct a purchase through the application; determining that the computer device is running in the public mode of operation; while the computer device is running in the public mode of operation, enforcing a security wall on the application with respect to the private functionality of the application, wherein enforcing the security wall includes allowing user access to the public functionality of the application but not the private functionality of the application; and in response to receiving a security input, switching from the public mode of operation to the private mode of operation of the computer device and presenting one or more objects that are selectable to invoke public and private applications while the computer device is in the private mode of operation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product embodied in a non-transitory computer-readable storage medium, the computer program product including instructions that, when executed, perform operations comprising:
-
determining a current geographic location of a computer device; determining a frequency of use of an application on the computer device at the current geographic location; determining a level of importance of the application on the computer device at the current geographic location; designating the application on the computer device for private functionality and public functionality, where the computer device has a public mode and a private mode of operation, where the application is automatically designated based on the current geographic location of the computer device, the frequency of use of the application and the level of importance of the application at the current geographic location; wherein designating the application on the computer device for private functionality comprises allowing limited access to one or more specific functions of the application while the computer device in a locked mode; wherein the private functionality of the application includes a purchasing functionality allowing a user to conduct a purchase through the application; determining that the computer device is running in the public mode of operation; while the computer device is running in the public mode of operation, enforcing a security wall on the application with respect to the private functionality of the application, wherein enforcing the security wall includes allowing user access to the public functionality of the application but not the private functionality of the application; and in response to receiving a security input, switching from the public mode of operation to the private mode of operation of the computer device and presenting one or more objects that are selectable to invoke public and private applications while the computer device is in the private mode of operation. - View Dependent Claims (8, 9, 10)
-
-
11. A computer device comprising:
-
one or more processors; and a non-transitory computer-readable storage medium operable to store instructions which, when executed by the one or more processors, causes the one or more processors to perform operations comprising; determining a current geographic location of the computer device; determining a frequency of use of an application on the computer device at the current geographic location; determining a level of importance of the application on the computer device at the current geographic location; designating the application on the computer device for private functionality and public functionality, where the computer device has a public mode and a private mode of operation, where the application is automatically designated based on the current geographic location of the computer device, the frequency of use of the application and the level of importance of the application at the current geographic location; wherein designating the application on the computer device for private functionality comprises allowing limited access to one or more specific functions of the application while the computer device in a locked mode; wherein the private functionality of the application includes a purchasing functionality allowing a user to conduct a purchase through the application; determining that the computer device is running in the public mode of operation; while the computer device is running in the public mode of operation, enforcing a security wall on the application with respect to the private functionality of the application, wherein enforcing the security wall includes allowing user access to the public functionality of the application but not the private functionality of the application; and in response to receiving a security input, switching from the public mode of operation to the private mode of operation of the computer device and presenting one or more objects that are selectable to invoke public and private applications while the computer device is in the private mode of operation. - View Dependent Claims (12, 13)
-
Specification