Methods and system for implementing a secure lock screen
First Claim
1. A method for implementing a secure lock screen, the method comprising, at a computing device that is in a locked-mode:
- receiving a first request to launch a first application, wherein the first application is associated with a first entitlement that indicates;
a first graphics context for the first application that is permitted to be displayed when the computing device is in the locked-mode, anda first depth level for the first application that indicates a first position of the first application within a hierarchy;
displaying the first graphics context within the secure lock screen in response to determining that the first depth level satisfies a threshold;
receiving a second request to launch a second application, wherein the second application is associated with a second entitlement that indicates;
a second graphics context for the second application that is permitted to be displayed when the computing device is in the locked-mode, anda second depth level that is inherited from the first depth level, wherein the second depth level reflects a second position of the second application within the hierarchy; and
displaying the second graphics context for the second application within the secure lock screen in response to determining that the second depth level satisfies the threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.
23 Citations
20 Claims
-
1. A method for implementing a secure lock screen, the method comprising, at a computing device that is in a locked-mode:
-
receiving a first request to launch a first application, wherein the first application is associated with a first entitlement that indicates; a first graphics context for the first application that is permitted to be displayed when the computing device is in the locked-mode, and a first depth level for the first application that indicates a first position of the first application within a hierarchy; displaying the first graphics context within the secure lock screen in response to determining that the first depth level satisfies a threshold; receiving a second request to launch a second application, wherein the second application is associated with a second entitlement that indicates; a second graphics context for the second application that is permitted to be displayed when the computing device is in the locked-mode, and a second depth level that is inherited from the first depth level, wherein the second depth level reflects a second position of the second application within the hierarchy; and displaying the second graphics context for the second application within the secure lock screen in response to determining that the second depth level satisfies the threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a computing device, cause the computing device to implement a secure lock screen while the computing device is in a locked-mode, by carrying out steps that include:
-
receiving a first request to launch a first application, wherein the first application is associated with a first entitlement that indicates; a first graphics context for the first application that is permitted to be displayed when the computing device is in the locked-mode, and a first depth level for the first application that indicates a first position of the first application within a hierarchy; displaying the first graphics context within the secure lock screen in response to determining that the first depth level satisfies a threshold; receiving a second request to launch a second application, wherein the second application is associated with a second entitlement that indicates; a second graphics context for the second application that is permitted to be displayed when the computing device is in the locked-mode, and a second depth level that is inherited from the first depth level, wherein the second depth level reflects a second position of the second application within the hierarchy; and displaying the second graphics context for the second application within the secure lock screen in response to determining that the second depth level satisfies the threshold. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing device configured to implement a secure lock screen while the computing device is in a locked-mode, the computing device comprising:
-
a display device; a processor; and a memory configured to store instructions that, when executed by the processor, cause the computing device to carry out steps that include; receiving a first request to launch a first application, wherein the first application is associated with a first entitlement that indicates; a first graphics context for the first application that is permitted to be displayed when the computing device is in the locked-mode, and a first depth level for the first application that indicates a first position of the first application within a hierarchy; displaying the first graphics context within the secure lock screen in response to determining that the first depth level satisfies a threshold; receiving a second request to launch a second application, wherein the second application is associated with a second entitlement that indicates; a second graphics context for the second application that is permitted to be displayed when the computing device is in the locked-mode, and a second depth level that is inherited from the first depth level, wherein the second depth level reflects a second position of the second application within the hierarchy; and displaying the second graphics context for the second application within the secure lock screen in response to determining that the second depth level satisfies the threshold. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification