Method of locking an application on a computing device
First Claim
Patent Images
1. A computer-implemented method comprising:
- associating each of a plurality of guest users identified by a respective biometric identifier to sets of functions within one or more applications;
executing an application on a computing device while in an unlocked state, the unlocked state providing unrestricted user access to all applications and functionalities of the computing device;
receiving, in the unlocked state, a predetermined gesture user input signifying that the executing application on the computing device is to be locked;
in response to the predetermined gesture user input, locking the executing application; and
reading a biometric identifier and allowing access to selective sets of functions within the locked application that correspond to the guest user identified by the read biometric identifier.
5 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the user input, locking a user within the application to thereby permit the user to utilize functionalities of the application without exiting from the application or switching to another application on the computing device.
29 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
associating each of a plurality of guest users identified by a respective biometric identifier to sets of functions within one or more applications; executing an application on a computing device while in an unlocked state, the unlocked state providing unrestricted user access to all applications and functionalities of the computing device; receiving, in the unlocked state, a predetermined gesture user input signifying that the executing application on the computing device is to be locked; in response to the predetermined gesture user input, locking the executing application; and reading a biometric identifier and allowing access to selective sets of functions within the locked application that correspond to the guest user identified by the read biometric identifier. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium comprising instructions in code which when loaded into a memory and executed by a processor of a computing device cause the computing device to:
-
associate each of a plurality of guest users identified by a respective biometric identifier to sets of functions within one or more applications; execute an application on a computing device while in an unlocked state, the unlocked state providing unrestricted user access to all applications and functionalities of the computing device; receive on the computing device that is the unlocked state a predetermined gesture user input signifying that the executing application on the computing device is to be locked; and in response to the predetermined gesture user input, lock the executing application; and read a biometric identifier to allow access to selective sets of functions within the locked application that correspond to the guest user identified by the read biometric identifier. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computing device comprising:
-
a memory for storing an application; a processor operatively coupled to the memory for; associating each of a plurality of guest users identified by a respective biometric identifier to sets of functions within one or more applications; and executing the application while in an unlocked state, the unlocked state providing unrestricted user access to all applications and functionalities of the computing device; and a user interface for; receiving on the computing device that is the unlocked state, a predetermined gesture user input, wherein the processor is configured to lock the executing application in response to the predetermined gesture user input, and reading a biometric identifier and allowing access to selective sets of functions within the locked application that correspond to the guest user identified by the read biometric identifier. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification