Patent application number | Description | Published |
20110279384 | Automatic Derivation of Analogous Touch Gestures From A User-Defined Gesture - Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In an embodiment, a method automatically interprets touch gestures on a mobile device. In the method, a user input is received that defines a first touch gesture to initiate a first action on an application of the mobile device. A second touch gesture is received on a touch screen of the mobile device. The second touch gesture is similar, but not identical, to the first touch gesture, and has a different orientation, size or position from the first touch gesture. In response to receipt of the second touch gesture, a second action is determined on the application of the mobile device according to a difference between the first and second touch gestures in orientation, size or position on the screen of the mobile device. Finally, the second action is initiated. | 11-17-2011 |
20110283241 | Touch Gesture Actions From A Device's Lock Screen - Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In a first embodiment, a computer-implemented method executes an action on a mobile device. A lock screen view is displayed on the mobile device to prevent unauthorized and inadvertent access to the mobile device's data. While the mobile device is locked, a touch gesture having a pre-defined shape is detected on a touch screen of the mobile device independently of the initial position of the touch gesture on the touch screen. In response to detection of the touch gesture, a particular action is executed on the mobile device while the mobile device stays locked. The particular action determined according to the pre-defined shape. In this way, detection of the touch gesture causes the particular action to execute while keeping the mobile device locked. | 11-17-2011 |
20110289506 | MANAGEMENT OF COMPUTING RESOURCES FOR APPLICATIONS - The subject matter of this disclosure can be implemented in, among other things, a method. In these examples, the method includes receiving a resource request message to obtain access to a computing resource, and storing the resource request message in a data repository that stores a collection of resource request messages received from a group of applications executing on the computing device. The method may also include responsive to determining that the resource request message received from the first application has a highest priority of the collection of resource request messages, determining whether a second application currently has access to the computing resource, issuing a resource lost message to the second application to indicate that the second application has lost access to the computing resource, and issuing a resource request granted message to the first application, such that the first application obtains access to the computing resource. | 11-24-2011 |
20110294478 | Telephone Caller Classification - In general, the subject matter described in this specification can be embodied in methods, systems, and program products for identifying telephone spam. An indication of an incoming telephone call and a calling device telephone number for the incoming telephone call is received. An indication that the calling device telephone number has been determined to be a source of telephone spam based on identifications by one or more users, other than a user of a mobile telephone, that the calling device telephone number is a source of telephone spam is received. A secondary alert is output to the user of the mobile telephone that is different than a default alert. The default alert is output to the user of the mobile telephone if the calling device telephone number is not determined to be a source of telephone spam. | 12-01-2011 |
20120015639 | Telephone Caller Classification - In general, the subject matter described in this specification can be embodied in methods, systems, and program products for identifying telephone spam. An indication of an incoming telephone call and a calling device telephone number for the incoming telephone call is received. An indication that the calling device telephone number has been determined to be a source of telephone spam based on identifications by one or more users, other than a user of a mobile telephone, that the calling device telephone number is a source of telephone spam is received. A secondary alert is output to the user of the mobile telephone that is different than a default alert. The default alert is output to the user of the mobile telephone if the calling device telephone number is not determined to be a source of telephone spam. | 01-19-2012 |
20120023503 | MANAGEMENT OF COMPUTING RESOURCES FOR APPLICATIONS - The subject matter of this disclosure can be implemented in, among other things, a method. In these examples, the method includes receiving a resource request message to obtain access to a computing resource, and storing the resource request message in a data repository that stores a collection of resource request messages received from a group of applications executing on the computing device. The method may also include responsive to determining that the resource request message received from the first application has a highest priority of the collection of resource request messages, determining whether a second application currently has access to the computing resource, issuing a resource lost message to the second application to indicate that the second application has lost access to the computing resource, and issuing a resource request granted message to the first application, such that the first application obtains access to the computing resource. | 01-26-2012 |
20120060128 | DIRECT, GESTURE-BASED ACTIONS FROM DEVICE'S LOCK SCREEN - Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In a first embodiment, a computer-implemented method executes an action on a mobile device. A lock screen view is displayed on the mobile device to prevent unauthorized and inadvertent access to the mobile device's data. While the mobile device is locked, a touch gesture having a pre-defined shape is detected on a touch screen of the mobile device independently of the initial position of the touch gesture on the touch screen. In response to detection of the touch gesture, a particular action is executed on the mobile device while the mobile device stays locked. The particular action determined according to the pre-defined shape. In this way, detection of the touch gesture causes the particular action to execute while keeping the mobile device locked. | 03-08-2012 |
20120084651 | Automatic Derivation Of Analogous Touch Gestures From A User-Defined Gesture - Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In an embodiment, a user input is received that defines a first touch gesture to initiate a first action on an application of the mobile device. A second touch gesture is received on a touch screen of the mobile device. The second touch gesture is similar, but not identical, to the first touch gesture, and has a different orientation, size or position from the first touch gesture. In response to receipt of the second touch gesture, a second action is determined on the application of the mobile device according to a difference between the first and second touch gestures in orientation, size or position on the screen of the mobile device. Finally, the second action is initiated. | 04-05-2012 |