摘要 |
Techniques for a computing device operating in access-states are provided. One example method includes receiving, by the computing device operating in a first access state, an indication of first input and responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning the computing device to operate in a second access state. While the computing device is operating in the second access state, the method further includes outputting instructions for transitioning the computing device from operating in the second access state. The method further includes receiving, by the computing device operating in the second access state, an indication of a second input and responsive to determining that the indication of the second input satisfies a threshold of compliance with the instructions, transitioning the computing device from operating in the second access state to operating in the first access state. |
主权项 |
1. A method, comprising:
while operating in a first limited-access state, receiving, by a computing device, an indication of a first input; responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning, by the computing device, from operating in the first limited-access state to operating in a second limited-access state, wherein the second limited-access state is different from the first limited-access state; while operating in the second limited-access state:
outputting, by the computing device, for display, a graphical user interface comprising instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state; andreceiving, by the computing device, an indication of a second input, the second input being defined by one or more touch events; and responsive to determining, based at least in part on location information associated with the one or more touch events, that the indication of the second input satisfies a threshold of compliance with the instructions that specify user-provided input for transitioning the computing device from operating in the second limited-access state to operating in the first limited-access state, transitioning, by the computing device, from operating in the second limited-access state to operating in the first limited-access state. |