Abstract:
A method includes displaying a suggestion region above an on-screen keyboard. The suggestion region includes multiple suggested character strings. The method further includes: detecting a gesture that begins within a predefined key of the on-screen keyboard; and responsive to detecting the gesture: in accordance with a determination that the gesture ends within the predefined key, inserting a first character string into a text field; and in accordance with a determination that the gesture ends outside of the predefined key, inserting a second character string into the text field, wherein the second character string is different from the first character string.
Abstract:
An electronic device displays one or more views. A first view includes a plurality of gesture recognizers. The plurality of gesture recognizers in the first view includes one or more proxy gesture recognizers and one or more non-proxy gesture recognizers. Each gesture recognizer indicates one of a plurality of predefined states. A first proxy gesture recognizer in the first view indicates a state that corresponds to a state of a respective non-proxy gesture recognizer that is not in the first view. The device delivers a respective sub-event to the respective non-proxy gesture recognizer that is not in the first view and at least a subset of the one or more non-proxy gesture recognizers in the first view. The device processes the respective sub-event in accordance with states of the first proxy gesture recognizer and at least the subset of the one or more non-proxy gesture recognizers in the first view.
Abstract:
Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.
Abstract:
Some techniques are described herein for managing an interaction with a UI element of a respective application in a UI managed by a system process. Such techniques can allow the UI element to be (1) displayed by the system process with content provided by the respective application and (2) interacted with by a user without needing to display a user interface of the respective application. In some examples, an interaction with the UI element is provided to the system process and, via another system process, an action is identified and executed to update the UI element with different information provided by the respective application. Other techniques described herein can allow different endpoints of an application, such as different extensions or the application itself, to handle interactions with information provided by the application depending on a current state of an electronic device, the application, and/or the different extensions.
Abstract:
Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements.
Abstract:
A device displays a first user interface on a first display, including a plurality of objects and corresponding to a second user interface on a second display. While a first object is displayed as a selected object in the second user interface, the device: detects a first input requesting information about a second object; and in response to detecting the first input, displays information about the second object in the first user interface and maintains display of the first object as the selected object in the second user interface. After displaying the information, the device detects a second input selecting the second object. In response to detecting selection of the second input, the device: displays the second object as the selected object in the first user interface; and provides, to the second display, information that enables the second user interface to display the second object as the selected object.