Patent application number | Description | Published |
20100037154 | METHOD AND APPARATUS FOR BINDING USER INTERFACE OBJECTS TO APPLICATION OBJECTS - A graphical user interface (GUI) and accompanying functionality for binding Web page definitional elements to a back-end state (e.g., client- or server-side back-end state) and custom logic is provided. In one embodiment, a template containing definitional elements, custom logic, and bindings are generated that define all or a portion of a Web page based on input received and functionality provided by the invention. | 02-11-2010 |
20110119683 | OBJECT GRAPH EDITING CONTEXT AND METHODS OF USE - The present invention comprises a novel system for managing changes to a graph of data bearing objects. In one embodiment, an object graph manager object referred to as an editing context is used to identify changes made to data bearing enterprise objects and to notify other interested objects when changes occur. As a result, data bearing objects need not themselves contain code necessary for monitoring changes. In another embodiment of the invention, the editing context is used to provide event-based “undo” capabilities. In another embodiment of the invention, each enterprise object has a primary key that is used to maintain the identification between an enterprise object instance and a corresponding database row. In another embodiment of the invention, multiple levels of editing contexts are used to provide multiple isolated object graphs, each of which allows independent manipulation of the underlying data bearing objects. | 05-19-2011 |
20110179192 | DISTRIBUTING AND SYNCHRONIZING OBJECTS - A method and apparatus for distributing and synchronizing objects. One or more embodiments of the invention provide for distributing copies of the objects locally. By copying objects (including the data and behavior for the object) into local address space, the object's methods may be executed locally thereby avoiding excessive network traffic. The state of the various object copies across a network may not be synchronized due to local changes and modifications. To synchronize the objects, one or more embodiments of the invention provide for the use of a policy that specifies conditions as to when objects are synchronized. Embodiments of the invention provide flexibility in setting the policy to accommodate varying applications. For example, a policy may provide for synchronization that is based temporally (e.g., every 10 minutes or daily at 10:00 P.M.). Alternatively, a policy may provide for synchronization based on the type or number of messages transmitted. In one or more embodiments, a default policy may be utilized that provides for the synchronization of local objects whenever a client issues a request from the remote server. In such an embodiment, the remote server transmits any updated object information when it responds to the local object request. The updated object information may be utilized to synchronize the objects. | 07-21-2011 |
20120317310 | DISTRIBUTING AND SYNCHRONIZING OBJECTS - A system for distributing and synchronizing objects. One or more embodiments of the invention provide for distributing copies of the objects locally. By copying objects into local address space, the object's methods may be executed locally thereby avoiding excessive network traffic. The state of the various object copies across a network may not be synchronized due to local changes and modifications. To synchronize the objects, one or more embodiments of the invention provide for the use of a policy that specifies conditions as to when objects are synchronized. Embodiments of the invention provide flexibility in setting the policy to accommodate varying applications. Alternatively, a policy may provide for synchronization based on the type or number of messages transmitted. In one or more embodiments, a default policy may be utilized that provides for the synchronization of local objects whenever a client issues a request from the remote server. | 12-13-2012 |
Patent application number | Description | Published |
20120084689 | Managing Items in a User Interface - User interface changes related to moving items in a user interface are disclosed. An operation (e.g., a drag operation) can be initiated on selected items by moving a cursor or pointing device in the user interface, and an animation can be presented illustrating representations of the selected items moving from their respective original locations toward a current location of the cursor or pointing device and forming a cluster in proximity to the current location of the cursor or pointing device. As the cluster of items is moved over a container object in the user interface, the representations of the items can adopt the appearance style defined by that container object. The representations of the items can also be shown to depart from the cluster and move toward anticipated locations of the items in the container object as a preview of a drop operation into the container object. | 04-05-2012 |
20120185762 | Saveless Documents - Saveless documents are disclosed. According to some implementations, a method can include displaying a current version of a document in a first user interface of a computing device, receiving an indication to display previously saved versions of the document, and, in response to receiving the indication, displaying a second user interface having the current version displayed in a first portion of the second user interface and a particular previous version of the document displayed in a sequence of previous versions of the document in a second portion of the second user interface. Methods can include automatically saving documents and creating versions of documents. A method can include automatically restoring the layout of documents on a display. A computer-readable medium and system for performing the methods are also disclosed. | 07-19-2012 |
20120185933 | USER ACCOUNT FOR SYSTEM PROTECTION OR RECOVERY - In one embodiment, a data processing system includes a guest account that is configured to assist in the protection and recovery of the data processing system when it is lost or stolen. In one embodiment, the guest account can allow Internet access and can include a web browser to allow the guest, who might be a thief, to use the system to browse the Internet. While such use occurs, the system can perform actions specified by an authorized user of the system, and such actions can include determining a location of the system and transmitting the location to the authorized user, erasing data on the system, displaying a message, capturing an image, etc. | 07-19-2012 |
20140365794 | BROWSER-DRIVEN POWER SAVING - The embodiments disclosed herein describe ways that a browser application or other process can reduce power usage by a computing device. Methods include the process suspending one or more plug-ins on a web page by replacing them with a snapshot taken from the plug-in, and reducing processing on non-media plug-ins and non-visible portions of web pages running in the browser, but not currently in focus, such as when a tab is in the background behind a different tab, when a browser window is minimized, or when the web page is entirely or partially occluded. | 12-11-2014 |
20140365855 | CONTENT LIST MANAGEMENT - A content application includes one or more content list panels. The content application provides mechanisms that allow the user to easily manage article representations included in the content lists such as adding article representations a content list and editing the items directly in menus associated with the content lists. | 12-11-2014 |
20150346973 | SEAMLESSLY ENABLING LARGER UI - A system and method are disclosed for displaying a graphical user interface (GUI) on a device display. The display has dimensions of a first size. The GUI is configured for output on a display of the first size, but the device reports the second size. The reporting is responsive to receiving a request to configure the GUI for output on a display of a second size, according to some embodiments. The GUI, configured for output on a display of the second size, is displayed on the device display that has dimensions of the first size. | 12-03-2015 |
Patent application number | Description | Published |
20120124566 | SHARED RESOURCE DEPENDENCIES - Described herein are methods for sharing resource dependencies between applications stored on a system. For example, in at least certain embodiments, a computer-implemented method for sharing resource dependencies includes installing or initiating installation of multiple application bundles having one or more applications and respective resources on the system. Next, an installer determines identifiers (e.g., hash signatures) for first and second resources and determines whether the resources are identical if an identifier for the first resource matches an identifier for the second resource. Then, a link is created from the second application bundle to the first resource of the first application bundle if the first resource is identical to the second resource. The second resource may be removed from the system if it has been installed. Alternatively, installation of the second resource is terminated if it has not been installed on the system. | 05-17-2012 |
20130019233 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STOREAANM Pardehpoosh; Pedraum R.AACI Palo AltoAAST CAAACO USAAGP Pardehpoosh; Pedraum R. Palo Alto CA USAANM Federighi; Craig M.AACI Los Altos HillsAAST CAAACO USAAGP Federighi; Craig M. Los Altos Hills CA USAANM Feldman; Daniel I.AACI San FranciscoAAST CAAACO USAAGP Feldman; Daniel I. San Francisco CA USAANM Quirk; Gregory T.AACI Maple GlenAAST PAAACO USAAGP Quirk; Gregory T. Maple Glen PA USAANM Matthew; Jack R.AACI San FranciscoAAST CAAACO USAAGP Matthew; Jack R. San Francisco CA USAANM Lee-Kang; JackieAACI SunnyvaleAAST CAAACO USAAGP Lee-Kang; Jackie Sunnyvale CA USAANM Ciudad; Jean-PierreAACI San FranciscoAAST CAAACO USAAGP Ciudad; Jean-Pierre San Francisco CA USAANM Gromek; Monika E.AACI OaklandAAST CAAACO USAAGP Gromek; Monika E. Oakland CA USAANM Burkholder; Thomas K.AACI VancouverAACO CAAAGP Burkholder; Thomas K. Vancouver CAAANM Pu; Daniel EmilAACI San FranciscoAAST CAAACO USAAGP Pu; Daniel Emil San Francisco CA USAANM Gharabally; SamAACI San FranciscoAAST CAAACO USAAGP Gharabally; Sam San Francisco CA USAANM Verosub; Ellis MarshallAACI San CarlosAAST CAAACO USAAGP Verosub; Ellis Marshall San Carlos CA USAANM Hwang; Yoon SubAACI AlamedaAAST CAAACO USAAGP Hwang; Yoon Sub Alameda CA US - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019234 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019237 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application for installation on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives from a client device a software adoption request including an identifier associated with a user account and a proof of entitlement associated with a software package or the user account, verifies the proof of entitlement by comparing the proof of entitlement to a database, and if the proof of entitlement is verified, adopts the software package as part of the user account. | 01-17-2013 |
20130332159 | USING FAN THROTTLING TO ENHANCE DICTATION ACCURACY - A dictation computer that includes a fan speed regulator is described. The fan speed regulator monitors a speech recognition unit to determine when the speech recognition unit is activated. Upon detection that the speech recognition unit is activated, the fan speed regulator ducks the speed of a cooling fan embedded within the dictation computer to an optimized speed of rotation over a delay time interval. The fan speed regulator may include components to adapt the optimized speed and delay time to the characteristics of the dictation computer and the user. Other embodiments are also described. | 12-12-2013 |
20140253584 | Subpixel Shape Smoothing Based On Predicted Shape Background Information - Methods and apparatus for a predictive rendering component that may generate a rendering of a character based at least in part on predictive information regarding the background into which the character is to be rendered. Using such predictive information, the predictive rendering component may produce a rendering of a character that blends into the character background more smoothly than if the predictive background information were not used. In this way, the predictive rendering component improves upon previous implementations of font smoothing. | 09-11-2014 |
20140283128 | Specifying Applications to Share in a Shared Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. In some embodiments, the device provides tools to select applications for the secondary access mode. | 09-18-2014 |
20140283135 | Mobile Computing Device with Multiple Access Modes - Some embodiments of the invention provide a mobile device that restricts access to its applications. The mobile device, displays, on the device's touch screen display, a lock screen page for accessing the device in a primary access mode or a secondary access mode. The primary access mode provides access to several of the device's applications, and the secondary access mode provides access to a limited set of the applications. The mobile device receives a touch input on the lock screen page to access the device in the secondary access mode. The mobile device unlocks the device to the secondary access mode by allowing access to the set of applications and restricting access to the remaining applications in the plurality of applications. | 09-18-2014 |
20140283141 | Switching a Mobile Device from Operating in a Primary Access Mode to a Secondary Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. | 09-18-2014 |
20140283142 | Analyzing Applications for Different Access Modes - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the mobile device automatically selects applications to share or keep private based metadata associated with the applications. | 09-18-2014 |
20150074615 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANIPULATING USER INTERFACES BASED ON FINGERPRINT SENSOR INPUTS - An electronic device with a display and a fingerprint sensor displays a fingerprint enrollment interface and detects, on the fingerprint sensor, a plurality of finger gestures performed with a finger. The device collects fingerprint information from the plurality of finger gestures performed with the finger. After collecting the fingerprint information, the device determines whether the collected fingerprint information is sufficient to enroll a fingerprint of the finger. When the collected fingerprint information for the finger is sufficient to enroll the fingerprint of the finger, the device enrolls the fingerprint of the finger with the device. When the collected fingerprint information for the finger is not sufficient to enroll the fingerprint of the finger, the device displays a message in the fingerprint enrollment interface prompting a user to perform one or more additional finger gestures on the fingerprint sensor with the finger. | 03-12-2015 |
20150146945 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANIPULATING USER INTERFACES BASED ON FINGERPRINT SENSOR INPUTS - An electronic device with a display and a fingerprint sensor displays a fingerprint enrollment interface and detects, on the fingerprint sensor, a plurality of finger gestures performed with a finger. The device collects fingerprint information from the plurality of finger gestures performed with the finger. After collecting the fingerprint information, the device determines whether the collected fingerprint information is sufficient to enroll a fingerprint of the finger. When the collected fingerprint information for the finger is sufficient to enroll the fingerprint of the finger, the device enrolls the fingerprint of the finger with the device. When the collected fingerprint information for the finger is not sufficient to enroll the fingerprint of the finger, the device displays a message in the fingerprint enrollment interface prompting a user to perform one or more additional finger gestures on the fingerprint sensor with the finger. | 05-28-2015 |
20150347010 | CONTINUITY - At an electronic device, detecting a compatible external device, where the external device is executing or has executed a first application. The detection may be made wirelessly. The electronic device also receives usage information regarding the first application from the external device. Display an affordance for user selection based on the received information. When the affordance is selected, launch a second application on the electronic device, the second application corresponding to the first application. In some examples, the second application is a different version of the first application. Launching the second application may additionally include bringing the second application to the same state as the first application. For example, if e-mail is being drafted on the external device, the electronic device may launch an e-mail editor showing the draft. In this way, a user can seamlessly transition from the use of one electronic device to another electronic device. | 12-03-2015 |
20150347738 | PROXIMITY UNLOCK AND LOCK OPERATIONS FOR ELECTRONIC DEVICES - The described embodiments perform a proximity unlock operation. For the proximity unlock operation, a first electronic device in a locked operating state detects that an authorized second electronic device is in proximity to the first electronic device. Based on detecting the authorized second electronic device in proximity to the first electronic device, the first electronic device transitions from a locked operating state to an unlocked operating state. In the described embodiments, the transition to the unlocked operating state occurs without the user performing a manual authentication step that is performed in existing electronic devices to cause the transition from the locked operating state to the unlocked operating state. | 12-03-2015 |
20150348029 | USER INTERFACE FOR PAYMENTS - The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided. | 12-03-2015 |
20150350141 | MESSAGE USER INTERFACES FOR CAPTURE AND TRANSMITTAL OF MEDIA AND LOCATION CONTENT - A device provides user interfaces for capturing and sending media, such as audio, video, or images, from within a message application. The device detects a movement of the device and in response, plays or records an audio message. The device sends the recorded audio message in response to detecting a movement of the device. The device removes messages from a conversation based on expiration criteria. The device shares a location with one or more message participants in a conversation. | 12-03-2015 |
20150350296 | CONTINUITY - At an electronic device, detecting a compatible external device, where the external device is executing or has executed a first application. The detection may be made wirelessly. The electronic device also receives usage information regarding the first application from the external device. Display an affordance for user selection based on the received information. When the affordance is selected, launch a second application on the electronic device, the second application corresponding to the first application. In some examples, the second application is a different version of the first application. Launching the second application may additionally include bringing the second application to the same state as the first application. For example, if e-mail is being drafted on the external device, the electronic device may launch an e-mail editor showing the draft. In this way, a user can seamlessly transition from the use of one electronic device to another electronic device. | 12-03-2015 |
20150350297 | CONTINUITY - At an electronic device, detecting a compatible external device, where the external device is executing or has executed a first application. The detection may be made wirelessly. The electronic device also receives usage information regarding the first application from the external device. Display an affordance for user selection based on the received information. When the affordance is selected, launch a second application on the electronic device, the second application corresponding to the first application. In some examples, the second application is a different version of the first application. Launching the second application may additionally include bringing the second application to the same state as the first application. For example, if e-mail is being drafted on the external device, the electronic device may launch an e-mail editor showing the draft. In this way, a user can seamlessly transition from the use of one electronic device to another electronic device. | 12-03-2015 |