-
公开(公告)号:US09921853B2
公开(公告)日:2018-03-20
申请号:US15142710
申请日:2016-04-29
Applicant: Google LLC
Inventor: John Nicholas Jitkoff , Kan Liu
IPC: G06F9/00 , G06F15/177 , G06F9/44 , G06F1/32 , G06F3/0484 , G06F3/0483 , G06F17/22 , H04L29/08 , G06F9/445 , G06F17/30
CPC classification number: G06F9/442 , G06F1/3203 , G06F1/3228 , G06F1/3246 , G06F1/3265 , G06F1/3287 , G06F1/3296 , G06F3/0483 , G06F3/04842 , G06F3/04847 , G06F9/4418 , G06F9/445 , G06F9/451 , G06F17/2247 , G06F17/30575 , G06F17/30876 , H04L67/10 , Y02D10/153 , Y02D10/171 , Y02D10/44 , Y02D50/20
Abstract: Various features for a computer operating system include mechanisms for operating where a single native application, in the form of a Web browser, exists for an operating system, and all other applications run as Web apps of the browser application. A computer-implemented object tracking method includes instantiating, a first time, an operating system object on a computing device; automatically identifying contextual meta data that defines a state of objects that are open on the computing device, other than the instantiated operating system object, when the operating system object is instantiated; and storing the identifying contextual meta data in correlation with the operating system object, wherein the contextual meta data identifies one or more objects that are active in the operating system when the operating system object is instantiated.
-
公开(公告)号:US20180131683A1
公开(公告)日:2018-05-10
申请号:US15862578
申请日:2018-01-04
Applicant: GOOGLE LLC
Inventor: Joshua Woodward , Jay Pierre Civelli , Dirk Balfanz , Marco Fucci , Alexei Czeskis , Nishit Shah , Kan Liu , Michal Levin
Abstract: The subject technology provides for detecting, by a first computing device, a second computing device being within a predetermined distance of the first computing device, the first computing device being in a locked mode. The subject technology receives an access key from the second computing device. Additionally, the subject technology exits, by the first computing device, the locked mode based on the access key from the second computing device.
-