Limited-access state for inadvertent inputs
First Claim
1. A method, comprising:
- while operating in a first limited-access state, receiving, by a computing device, an indication of a first input;
responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning, by the computing device, from operating in the first limited-access state to operating in a second limited-access state, wherein the second limited-access state is different from the first limited-access state;
while operating in the second limited-access state;
outputting, by the computing device, for display, a graphical user interface comprising instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state; and
receiving, by the computing device, an indication of a second input, the second input being a gesture input that is defined by one or more touch events; and
responsive to determining, based at least in part on location information associated with the one or more touch events, that the indication of the second input satisfies a threshold of compliance with the instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state, transitioning, by the computing device, from operating in the second limited-access state to operating in the first limited-access state.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for a computing device operating in access-states are provided. One example method includes receiving, by the computing device operating in a first access state, an indication of first input and responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning the computing device to operate in a second access state. While the computing device is operating in the second access state, the method further includes outputting instructions for transitioning the computing device from operating in the second access state. The method further includes receiving, by the computing device operating in the second access state, an indication of a second input and responsive to determining that the indication of the second input satisfies a threshold of compliance with the instructions, transitioning the computing device from operating in the second access state to operating in the first access state.
-
Citations
20 Claims
-
1. A method, comprising:
-
while operating in a first limited-access state, receiving, by a computing device, an indication of a first input; responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning, by the computing device, from operating in the first limited-access state to operating in a second limited-access state, wherein the second limited-access state is different from the first limited-access state; while operating in the second limited-access state; outputting, by the computing device, for display, a graphical user interface comprising instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state; and receiving, by the computing device, an indication of a second input, the second input being a gesture input that is defined by one or more touch events; and responsive to determining, based at least in part on location information associated with the one or more touch events, that the indication of the second input satisfies a threshold of compliance with the instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state, transitioning, by the computing device, from operating in the second limited-access state to operating in the first limited-access state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computing device comprising:
-
a presence-sensitive input device; and one or more processors operable to; while the computing device is operating in a first limited-access state, receive an indication of a first input detected by the presence-sensitive input device; responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transition the computing device from operating in the first limited-access state to operating in a second limited-access state, wherein the second limited-access state is different from the first limited-access state; while operating in the second limited-access state; output, for display, a graphical user interface comprising instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state; and receive an indication of a second input, the second input being a gesture input that is defined by one or more touch events; and responsive to determining, based at least in part on location information associated with the one or more touch events, that the indication of the second input satisfies a threshold of compliance with the instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state, transition the computing device from operating in the second limited-access state to operating in the first limited-access state. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium encoded with instructions that, when executed by one or more processors of a computing device, cause the one or more processors to:
-
while operating in a first limited-access state, receive, while the computing device is operating in a first limited-access state, an indication of a first input; responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transition the computing device from operating in the first limited-access state to operating in a second limited-access state, wherein the second limited-access state is different from the first limited-access state; while operating in the second limited-access state; output, for display, a graphical user interface comprising instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state; and receive an indication of a second input, the second input being a gesture input that is defined by one or more touch events; and responsive to determining, based at least in part on location information associated with the one or more touch events, that the indication of the second input satisfies a threshold of compliance with the instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state, transition the computing device from operating in the second limited-access state to operating in the first limited-access state. - View Dependent Claims (19, 20)
-
Specification