Abstract:
A computer-implemented method for management of voicemail messages, performed at a portable electronic device with a touch screen display, includes: displaying a list of voicemail messages; detecting selection by a user of a respective voicemail message in the list; responding to the user selection of the respective voicemail message by initiating playback of the user-selected voicemail message; displaying a progress bar for the user-selected voicemail message, wherein the progress bar indicates the portion of the user-selected voicemail message that has been played; detecting movement of a finger of the user from a first position on the progress bar to a second position on the progress bar; and responding to the detection of the finger movement by restarting playback of the user-selected voicemail message at a position within the user-selected voicemail message corresponding substantially to the second position on the progress bar.
Abstract:
Systems, methods and computer readable media for providing or managing or using voicemails are described. In one embodiment, a method includes receiving, at a first data processing system, data representing an expiration time of a voicemail left for a user of the first data processing system and storing the data representing the expiration time for later use by the first data processing system. Systems, media, and other methods are also described.
Abstract:
A computer- implemented method performed at a portable multifunction device (100) with a touch screen display (112) includes displaying a multiweek calendar (4934) on the touch screen display, detecting a contact (4950) on an individual day (4936) in the multiweek calendar (4934), and displaying at least a portion of a list of events (4938) on the contacted individual day while continuing to display the multiweek calendar (4934) in response to detecting the contact (4950) on the individual day (4936).
Abstract:
Systems, methods and machine (e.g. computer) readable media for providing or managing or using voicemails are described. In one embodiment, a method includes receiving at least notifications of voicemails at a mobile data processing system and storing a data structure at the mobile data processing system for deleted voicemails. In another embodiment, a method includes determining an extent of usage of a voicemail mailbox at a data processing system and determining a period of time representing how long a voicemail has been marked as deleted and determining, based on the extent of usage and based on the period of time, whether to delete the voicemail.
Abstract:
Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
Abstract:
Verfahren zum Entriegeln einer zweiten Vorrichtung durch eine erste Vorrichtung, umfassend:Empfangen von einem geheimen Schlüssel von der zweiten Vorrichtung;Empfangen von einer Benutzereingabe von einer Eingabe/Ausgabe-Vorrichtung; undin Übereinstimmung mit der Feststellung, dass das erste Gerät entriegelt ist,Übertragen des empfangenen geheimen Schlüssels an die zweite Vorrichtung zum Entriegeln der zweiten Vorrichtung.
Abstract:
In one aspect of the invention, a computer-implemented method is disclosed for use in conjunction with a portable electronic device with a touch screen display. Upon detecting an incoming telephone call from a caller, a text identifier of the caller is displayed; an image associated with the caller is displayed; a call answer icon is displayed, which if selected by a user of the device, answers the incoming telephone call; and a call decline icon is displayed, which if selected by the user of the device, declines the incoming telephone call.
Abstract:
In some implementations, a computing device can be configured to automatically tum off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
A method comprising: at an electronic device with a touch-sensitive display: detecting a user input and in response to detecting the user input, displaying a plurality of affordances representing contacts; detecting user selection of a displayed affordance representing a contact; in response to detecting user selection of the displayed affordance, replacing the display of the plurality of affordances with a display of contact information identifying a selected contact, the selected contact represented by the selected affordance; detecting a touch on the touch-sensitive display while displaying the contact information; in response to detecting the touch: displaying a drawing area, wherein the drawing area is responsive to touch input; detecting a first touch input in the drawing area representing a first stroke; displaying a visual representation, in the drawing area, of the first stroke; and sending data representing the first stroke to an external device associated with the selected contact.
Abstract:
Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.