Abstract:
A computing device and method of controlling access to a computing device. An application to be used when the computing device is in a locked state is selected, wherein in the locked state, only use of the selected application is permitted. The computing device enters the locked state. Use of the selected application without unlocking the computing device is allowed.
Abstract:
A computing device and method of controlling access to a computing device. A software lock request is received via an input device of the computing device. In response to receiving the software lock request, a picklist of a plurality of applications executable on the computing device is displayed on a display of the computing device. A selection of one or more impermissible applications from the plurality of applications executable on the computing device or one or more permitted applications from the plurality of applications executable on the computing device is received receiving via the input device. A locked state is entered. In the locked state, access is not permitted to the one or more impermissible applications and access is permitted to other applications of the plurality of applications executable on the computing device.
Abstract:
Methods and devices for providing a warning associated with credentials to be stored in a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises receiving a request to store, in the credential store, at least one credential for a specified service, determining whether a secure connection between the computing device and the specified service is available, associating the specified service with a level of security based on at least one of an availability of the secure connection or one or more properties of the secure connection, and providing a warning in response to determining that at least one credential stored in the credential store corresponds to the at least one credential for the specified service and is for a service that is associated with a level of security different from the level of security with which the specified service is associated.
Abstract:
A method and device to simplify message reply composition on a communications device, using a partially transparent overlay to allow a user to freely scroll and move around to other sections of a message or message chain while still being able to see and edit the reply being composed. When the reply is scrolled such that the composition field is not visible on the display screen, the device displays the overlay when the user enters text or on user request. The user may then type text into the overlay while viewing the underlying portion of the reply message, such as previous messages in the string.
Abstract:
An indoor positioning system and method that correlates map locations to respective wireless access point (AP) fingerprints, and wherein each wireless AP fingerprint is a plurality of wireless AP signal measurements associated with the correlated map location. The method includes receiving position-inference data associated with a user; determining a probable location inside the building based on the position-inference data; receiving wireless AP signal measurements detected by a wireless device associated with the user; associating the probable location with the wireless device based on the association between the position-inference data and the user of the wireless device; and updating the wireless AP fingerprint correlated to the probable location using the received wireless AP signal measurements. The method and system use crowd-sourcing to build and refine the wireless AP fingerprints.
Abstract:
Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting, and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store. In at least one embodiment, each of the credentials accessed within the period is associated with a different user account.
Abstract:
A method of determining room occupancy of a room in a facility having an indoor positioning system with wireless access point fingerprints each correlated to a location in the facility. The method may include receiving a request from a computing device for a room occupancy assessment associated with the room. It may further include obtaining location data that correlates to the locations of wireless devices associated with one or more people from the indoor positioning system and determining based on the location data whether the room is occupied. The determination of whether the room is occupied is then sent to the computing device.
Abstract:
A computing device and method of controlling access to a computing device. An application to be used when the computing device is in a locked state is selected, wherein in the locked state, only use of the selected application is permitted. The computing device enters the locked state. Use of the selected application without unlocking the computing device is allowed.
Abstract:
An indoor positioning system and method that correlates map locations to respective wireless access point (AP) fingerprints, and wherein each wireless AP fingerprint is a plurality of wireless AP signal measurements associated with the correlated map location. The method includes receiving position-inference data associated with a user; determining a probable location inside the building based on the position-inference data; receiving wireless AP signal measurements detected by a wireless device associated with the user; associating the probable location with the wireless device based on the association between the position-inference data and the user of the wireless device; and updating the wireless AP fingerprint correlated to the probable location using the received wireless AP signal measurements. The method and system use crowd-sourcing to build and refine the wireless AP fingerprints.
Abstract:
A method of determining room occupancy of a room in a facility having an indoor positioning system with wireless access point fingerprints each correlated to a location in the facility. The method may include receiving a request from a computing device for a room occupancy assessment associated with the room. It may further include obtaining location data that correlates to the location of one or more people from the indoor positioning system and determining from the location data associated with the room whether the room is occupied. The determination of whether the room is occupied is then sent to the computing device.