Abstract:
A computer-implemented method for use in conjunction with a computing device with a touch screen display comprises: detecting one or more finger contacts with the touch screen display, applying one or more heuristics to the one or more finger contacts to determine a command for the device, and processing the command. The one or more heuristics comprise: a heuristic for determining that the one or more finger contacts correspond to a one-dimensional vertical screen scrolling command, a heuristic for determining that the one or more finger contacts correspond to a two-dimensional screen translation command, and a heuristic for determining that the one or more finger contacts correspond to a command to transition from displaying a respective item in a set of items to displaying a next item in the set of items.
Abstract:
The digital assistant displays a digital assistant object in an object region of a display screen. The digital assistant then obtains at least one information item based on a speech input from a user. Upon determining that the at least one information item can be displayed in its entirety in the display region of the display screen, the digital assistant displays the at least one information item in the display region, where the display region and the object region are not visually distinguishable from one another. Upon determining that the at least one information item cannot be displayed in its entirety in the display region of the video display screen, the digital assistant displays a portion of the at least one information item in the display region, where the display region and the object region are visually distinguishable from one another.
Abstract:
Systems, methods and computer readable media for providing or managing or using voicemails are described. In one embodiment, a method includes receiving, at a first data processing system, data representing an expiration time of a voicemail left for a user of the first data processing system and storing the data representing the expiration time for later use by the first data processing system. Systems, media, and other methods are also described.
Abstract:
In some implementations, a computing device can be configured to automatically turn off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
Apparatus and methods to communicate audio data from either an active wireless device or a requesting wireless device to one or more audio reproduction devices that are simultaneously communicatively coupled to both the active wireless device and to the requesting wireless device are disclosed. Responsive to a request from the requesting wireless device to transmit audio data to the one or more audio reproduction devices, the active wireless device determines whether to transmit audio data from the requesting wireless device based at least in part on an audio status of the active wireless device and a set of predetermined arbitration criteria that prioritizes among applications and operating system processes that generate the audio data.
Abstract:
A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
Abstract:
A computer-implemented method for management of voicemail messages, performed at a portable electronic device with a touch screen display, includes: displaying a list of voicemail messages; detecting selection by a user of a respective voicemail message in the list; responding to the user selection of the respective voicemail message by initiating playback of the user-selected voicemail message; displaying a progress bar for the user-selected voicemail message, wherein the progress bar indicates the portion of the user-selected voicemail message that has been played; detecting movement of a finger of the user from a first position on the progress bar to a second position on the progress bar; and responding to the detection of the finger movement by restarting playback of the user-selected voicemail message at a position within the user-selected voicemail message corresponding substantially to the second position on the progress bar.
Abstract:
A location-aware device detects if a personal or point of interest region has been entered or exited and a current context of the device. In response, an operating mode is selected based on the region and a current context of the device. The operating mode is configurable by a user, including setting geofence parameters, context parameters and operating mode parameters.
Abstract:
Touch inputs such as single-finger contacts and multiple-finger contacts are detected at an electronic device and translated into electronic touch communications for playback at an external electronic device.
Abstract:
A portable multifunction device displays a first user interface object and a second user interface object on a touch screen display. Upon detecting a finger-down event at the first user interface object and one or more finger-dragging events on the touch screen display, the device moves the first user interface object on the touch screen display along a path determined by the finger-dragging events until the first user interface object at least in part overlaps the second user interface object. Upon detecting a finger-up event at the second user interface object, the device visually replaces the second user interface object with the first user interface object.