Abstract:
Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the functionality of a software program (e.g., a widget) based on one or more operations that the widget intends to take. One or more embodiments may include limiting the functionality of a widget that is located on and/or accessible via a lock screen of a mobile device. One or more embodiments may include preventing a widget from causing an application to perform sensitive actions when a system is in an un-authenticated state. One or more embodiments may include preventing a widget from installing and/or displaying on a particular screen of a mobile device (e.g., a lock screen) if the widget includes a function that indicates that a sensitive operation will be taken.
Abstract:
A computing device is described that outputs for display at a presence-sensitive screen a lock screen graphical user interface. The lock screen graphical user interface includes an unlock region and a widget region including a first widget. The computing device receives an indication of a user input received at a location of the presence-sensitive screen within the widget region. The computing device determines a characteristic of the user input including at least one of a shape, a length, a velocity, and an acceleration. Responsive to determining that the determined characteristic exceeds a threshold, the computing device outputs for display an updated widget region of the lock screen graphical user interface that includes a second widget.
Abstract:
While a computing device is in a limited-access state, the computing device may output for display a user interface element. Responsive to the computing device receiving an indication of a first user input at a region of a presence-sensitive input device that corresponds to at least a portion of the user interface element as displayed, the computing device may alter the visual appearance of the user interface element to indicate that the user interface element is selected. Responsive to the computing device determining that it has received the indication of the second user input at the region of the presence-sensitive input device within the predefined period of time subsequent to receiving the indication of the first user input, the computing device may activate the user interface element.
Abstract:
Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the functionality of a software program (e.g., a widget) based on one or more operations that the widget intends to take. One or more embodiments may include limiting the functionality of a widget that is located on and/or accessible via a lock screen of a mobile device. One or more embodiments may include preventing a widget from causing an application to perform sensitive actions when a system is in an un-authenticated state. One or more embodiments may include preventing a widget from installing and/or displaying on a particular screen of a mobile device (e.g., a lock screen) if the widget includes a function that indicates that a sensitive operation will be taken.