METHODS AND SYSTEM FOR IMPLEMENTING A SECURE LOCK SCREEN
First Claim
1. A method for implementing a secure lock screen, the method comprising:
- at a computing device;
receiving a request to launch an application;
identifying an entitlement associated with the application, wherein the entitlement indicates whether content of the application is permitted to be displayed when the computing device is in a locked-mode;
assigning the entitlement to a graphics context associated with the application; and
launching the application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.
15 Citations
20 Claims
-
1. A method for implementing a secure lock screen, the method comprising:
-
at a computing device; receiving a request to launch an application; identifying an entitlement associated with the application, wherein the entitlement indicates whether content of the application is permitted to be displayed when the computing device is in a locked-mode; assigning the entitlement to a graphics context associated with the application; and launching the application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a computing device, cause the computing device to carry out steps that include:
-
receiving a request to render a graphics context associated with an application, wherein the graphics context is associated with an entitlement that indicates whether the graphics context is permitted to be displayed when the computing device is in a locked-mode; determining that the computing device is in the locked-mode; and displaying the graphics context in accordance with the entitlement. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing device, comprising:
-
a display device; a processor; and a memory configured to store instructions that, when executed by the processor, cause the computing device to carry out steps that include; assigning an entitlement to a graphics context associated with an application executing on the computing device, wherein the entitlement indicates whether the graphics context is permitted to be displayed on the display device when the computing device is in a locked-mode; receiving a request to render the graphics context; determining that the computing device is in the locked-mode; and displaying the graphics context in accordance with the entitlement. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification