SYSTEM AND METHOD FOR AUTHENTICATION WITH A COMPUTER STYLUS
First Claim
1. A method for securing operation of a computing device operated with a stylus, the method comprising:
- recognizing a pre-defined gesture performed by a stylus on a touch screen, the pre-defined gesture defined as a user command to lock an item displayed on the touch screen;
determining a location at which the gesture was performed;
determining identity of the stylus performing the gesture;
locking an item displayed at the location determined; and
recording identity of the stylus initiating the command to lock.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing operation of a computing device operated with a stylus includes recognizing a pre-defined gesture performed by a stylus on a touch screen, the pre-defined gesture defined as a user command to lock an item displayed on the touch screen, determining a location of the gesture, determining identity of the stylus, locking an item displayed at the location determined, and recording identity of the stylus. A method for operating a computing device with a stylus includes receiving a command with a stylus to add restricted annotations to a document, receiving identity of the stylus, linking an annotation to the identity, restricting display of the annotation on the document to a computing device receiving input from the stylus; and displaying the document absent the at least one annotation on a computing device on which input from the stylus is not received.
-
Citations
34 Claims
-
1. A method for securing operation of a computing device operated with a stylus, the method comprising:
-
recognizing a pre-defined gesture performed by a stylus on a touch screen, the pre-defined gesture defined as a user command to lock an item displayed on the touch screen; determining a location at which the gesture was performed; determining identity of the stylus performing the gesture; locking an item displayed at the location determined; and recording identity of the stylus initiating the command to lock. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for operating a computing device operated with a stylus, the method comprising:
-
receiving a command with a stylus to add restricted annotations to a document; receiving identity of the stylus providing the command; linking at least one annotation to the identity of the stylus, responsive to receiving the command; restricting display of the at least one annotation on the document to a computing device receiving input from the stylus; and displaying the document absent the at least one annotation on a computing device on which input from the stylus is not received. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for operating a computing device operated with a stylus, the method comprising:
-
receiving a command with a stylus to track changes to a document; receiving identity of the stylus providing the command; linking changes to the document to the identity of the stylus responsive to receiving the command with the stylus; and displaying the changes to the document that is linked to the identity of the stylus with a same color. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A method for securing operation of a computing device operated with a stylus, the method comprising:
-
recognizing a pre-defined gesture performed by a stylus on a touch screen, the pre-defined gesture defined as a user command to lock an item displayed on the touch screen; determining identity of the stylus performing the gesture; locking an item displayed on the touch screen; and recording identity of the stylus initiating the command to lock. - View Dependent Claims (34)
-
Specification