Abstract:
Systems and methods for registering key inputs are provided. A system includes an input module configured to detect a first key input by a user at a point on a layout of primary keys. The system includes a correction module configured to determine whether the first key input is associated with a single one of the primary keys or a plurality of the primary keys. The input module is configured to detect a second key input if the first key input is determined to be associated with the plurality of the primary keys. The second key input includes a swipe gesture by the user from the point at which the first key input is detected on the layout towards a particular one of the plurality of the primary keys. The system includes a selection module configured to register the first or second key input as an actual key input.
Abstract:
Systems and methods for registering key inputs are provided. A system includes an input module configured to detect a first key input by a user at a point on a layout of primary keys. The system includes a correction module configured to determine whether the first key input is associated with a single one of the primary keys or a plurality of the primary keys. The input module is configured to detect a second key input if the first key input is determined to be associated with the plurality of the primary keys. The second key input includes a swipe gesture by the user from the point at which the first key input is detected on the layout towards a particular one of the plurality of the primary keys. The system includes a selection module configured to register the first or second key input as an actual key input.
Abstract:
Disclosed herein are methods, systems, and computer readable media for locking a computing device. Periodic images are received from a camera on a computing device. Each of the images is compared to a stored image of a user. A determination is made that one of the images does not match the stored image, and the computing device is locked upon determining that one of the images does not match the stored image.
Abstract:
A browser-based fetch of an external library may include a browser receiving a request from a web application to load an external library and determining whether the web browser has a bundled version of the library. If the bundled version exists, the browser may load the bundled version. If the bundled version does not exist, the browser may fetch the external library. When the external library is configured to send data to the remote server the method may include the browser intercepting a request to send the data to the remote server, determining that the data may be sent at a later time, and storing the data until a connection with the remote server is established. Additionally, a web store may inspect a web application for use of an external library and prevent the web application from being added to the web store when the external library is not trusted.