Dynamic display control application for controlling graphical user interface elements based on activity data

ABSTRACT

The systems and methods disclosed herein are for a control application for reformatting the graphical user interface being displayed on a computing device. In one embodiment, the control application interfaces with the operating system of the device and disables certain functionality. The disabled functionality may be restored based on user activity data. In which case, the control application re-enables functionality of certain applications by displaying additional graphical user interface elements.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/487,827, titled “DYNAMIC DISPLAY CONTROL APPLICATION FOR CONTROLLINGGRAPHICAL USER INTERFACE ELEMENTS BASED ON ACTIVITY DATA,” filed Sep.28, 2021, which claims priority to and the benefit of U.S. ProvisionalPatent Application No. 63/084,561, titled “SYSTEMS AND METHODS FORTASK-BASED ENABLING OF FUNCTIONALITY,” filed on Sep. 28, 2020. Bothapplications are incorporated by reference in their entirety herein.

BACKGROUND Field of Art

This disclosure relates generally to graphical user interface controlsystems for automatically disabling functionality associated with adevice based on activity data.

Background

In modern computing devices, graphical user interfaces tend to bestatic. Generally, there is limited ability to control the graphicaluser interfaces. While this is generally fine in some contexts, thereare numerous challenges presented to parents and employers whosechildren and employees, respectively, who use graphical user interfaceson computing devices. For the parent, there is great concern about whatapps will be run by a child that can impact their mental and physicalhealth as well as situations when the device can be used. For theemployer, there is great concern about use of employer provided devicesto run non-work-related apps that can impact employee safety andefficiency. Unfortunately, the number of readily-available appsincreases daily such that parent or employer monitoring of multipledevices becomes a full-time job that is nearly impossible to performeffectively. In addition, given the somewhat addicting nature of certainapplications that may be available, it is increasingly difficult forparents to incentivize positive activity and appropriately limitactivity that, if consumed in large doses, may be harmful. Thatfunctionality is simply unavailable in most most smart phones andcomputing devices.

SUMMARY

Accordingly, it is an object of the present invention to provide methodsand systems for managing the graphical user interfaces of mobilecomputing devices. More specifically, systems and methods are disclosedherein for executing a control application on a mobile computer thatcauses the mobile computer to only display applications that areapproved for use based on activity data. Systems and methods areprovided herein for executing a dynamic display control application on aclient device, wherein the dynamic display control application comprisesfirst executable instructions, second executable instructions, and thirdexecutable instructions. The control application executes the firstexecutable instructions by disabling applications in a first list thatare executable by the first computing device. The control applicationalso displays a first graphical user interface (GUI) elementillustrating that applications in a first list are disabled. Thereafter,the control application executes the second executable instructions bydisplaying a second GUI element that comprises a first sectiondisplaying queries, second section displaying a plurality of responses,and a third section for receiving user input. Any user input that isprovided is received by the control application that automaticallydetermines whether the user has provided a threshold number of suitableresponses via the user input within a threshold amount of time. In oneembodiment, the control application makes this determination bycommunicating with a server system. The control system may alsoautomatically compute an access token grant, which is based on thenumber of suitable responses that are received within a threshold periodof time. In one embodiment, a threshold number of access tokens enableaccess to at least one application in the first list. The controlapplication also executes the third executable instructions bydisplaying a third GUI element which displays applications in the firstlist that are no longer disabled based on the number of access tokensthat are available to the user.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

The accompanying drawings illustrate several embodiments and, togetherwith the description, serve to explain the principles of the inventionaccording to the embodiments. It will be appreciated by one skilled inthe art that the particular arrangements illustrated in the drawings aremerely exemplary and are not to be considered as limiting of the scopeof the invention or the claims herein in any way.

FIG. 1 illustrates a system for a GUI control application in accordancewith an exemplary embodiment of the invention.

FIG. 2 illustrates modules associated with the GUI control applicationin accordance with an embodiment of the invention.

FIG. 3A illustrates a flowchart for task-based enabling of functionalityin accordance with an exemplary embodiment of the present invention.

FIG. 3B illustrates a flowchart for GUI control in accordance with anexemplary embodiment of the present invention.

FIG. 4A illustrates an exemplary GUI interface in accordance with anembodiment of the invention.

FIG. 4B illustrates an exemplary schedule management GUI interface inaccordance with an embodiment of the invention.

FIG. 4C illustrates an exemplary GUI interface for user input inaccordance with an embodiment of the invention.

FIG. 5 illustrates an exemplary computing device that supports anembodiment of the inventive disclosure.

FIG. 6 illustrates an exemplary standalone computing system thatsupports an embodiment of the inventive disclosure.

FIG. 7 illustrates on embodiment of the computing architecture thatsupports an embodiment of the inventive disclosure.

FIG. 8 illustrates an exemplary overview of a computer system thatsupports an embodiment of the inventive disclosure.

DETAILED DESCRIPTION OF EMBODIMENTS

The inventive systems and methods (hereinafter sometimes referred tomore simply as “system” or “method”) described herein significantlyreduce computation resources used to distract a student from onlinelearning. A student may use a device to access one or more quizzes(e.g., tests, etc.) on one or more particular subjects. The device maycomprise or be associated with additional functionality, such asapplications or control of additional devices. The additionalfunctionality may be disabled. The student may use the device toinitiate one of the one or more quizzes. The student may provide answersto the initiated quiz. The student may receive an amount of digitalcurrency (e.g., virtual currency, virtual points, cryptocurrency,digital tokens, etc.) based on the provided answers. The received amountof digital currency may be added to a total digital currency. Thestudent may use to the received digital currency to enable some or allof the disabled additional functionality of the device.

One or more different embodiments may be described in the presentapplication. Further, for one or more of the embodiments describedherein, numerous alternative arrangements may be described; it should beappreciated that these are presented for illustrative purposes only andare not limiting of the embodiments contained herein or the claimspresented herein in any way. One or more of the arrangements may bewidely applicable to numerous embodiments, as may be readily apparentfrom the disclosure. In general, arrangements are described insufficient detail to enable those skilled in the art to practice one ormore of the embodiments, and it should be appreciated that otherarrangements may be utilized and that structural, logical, software,electrical and other changes may be made without departing from thescope of the embodiments. Particular features of one or more of theembodiments described herein may be described with reference to one ormore particular embodiments or figures that form a part of the presentdisclosure, and in which are shown, by way of illustration, specificarrangements of one or more of the aspects. It should be appreciated,however, that such features are not limited to usage in the one or moreparticular embodiments or figures with reference to which they aredescribed. The present disclosure is neither a literal description ofall arrangements of one or more of the embodiments nor a listing offeatures of one or more of the embodiments that must be present in allarrangements.

Headings of sections provided in this patent application and the titleof this patent application are for convenience only and are not to betaken as limiting the disclosure in any way.

Devices that are in communication with each other need not be incontinuous communication with each other, unless expressly specifiedotherwise. In addition, devices that are in communication with eachother may communicate directly or indirectly through one or morecommunication means or intermediaries, logical or physical.

A description of an aspect with several components in communication witheach other does not imply that all such components are required. To thecontrary, a variety of optional components may be described toillustrate a wide variety of possible embodiments and in order to morefully illustrate one or more embodiments. Similarly, although processsteps, method steps, algorithms or the like may be described in asequential order, such processes, methods and algorithms may generallybe configured to work in alternate orders, unless specifically stated tothe contrary. In other words, any sequence or order of steps that may bedescribed in this patent application does not, in and of itself,indicate a requirement that the steps be performed in that order. Thesteps of described processes may be performed in any order practical.Further, some steps may be performed simultaneously despite beingdescribed or implied as occurring non-simultaneously (e.g., because onestep is described after the other step). Moreover, the illustration of aprocess by its depiction in a drawing does not imply that theillustrated process is exclusive of other variations and modificationsthereto, does not imply that the illustrated process or any of its stepsare necessary to one or more of the embodiments, and does not imply thatthe illustrated process is preferred. Also, steps are generallydescribed once per aspect, but this does not mean they must occur once,or that they may only occur once each time a process, method, oralgorithm is carried out or executed. Some steps may be omitted in someembodiments or some occurrences, or some steps may be executed more thanonce in a given aspect or occurrence.

When a single device or article is described herein, it will be readilyapparent that more than one device or article may be used in place of asingle device or article. Similarly, where more than one device orarticle is described herein, it will be readily apparent that a singledevice or article may be used in place of the more than one device orarticle.

The functionality or the features of a device may be alternativelyembodied by one or more other devices that are not explicitly describedas having such functionality or features. Thus, other embodiments neednot include the device itself.

Techniques and mechanisms described or referenced herein will sometimesbe described in singular form for clarity. However, it should beappreciated that particular embodiments may include multiple iterationsof a technique or multiple instantiations of a mechanism unless notedotherwise. Process descriptions or blocks in figures should beunderstood as representing modules, segments, or portions of code whichinclude one or more executable instructions for implementing specificlogical functions or steps in the process. Alternate implementations areincluded within the scope of various embodiments in which, for example,functions may be executed out of order from that shown or discussed,including substantially concurrently or in reverse order, depending onthe functionality involved, as would be understood by those havingordinary skill in the art.

FIG. 1 illustrates a system for controlling the display of a computingdevice by controlling the graphical user interface elements that can bedisplayed on the display device. The system may comprise a user device101, a control application 104, a display device 106, a network 110, anda remote server 112. The various computing devices described herein areexemplary and for illustration purposes only. The system may bereorganized or consolidated, as understood by a person of ordinary skillin the art, to perform the same tasks on one or more other servers orcomputing devices without departing from the scope of the invention.

The device operating system 102, the control application 104, and thedisplay device 106 may be embodied or stored on a user device 101. Theuser device may be located at a singular location, such as a residence,a school, a commercial site, etc. In one embodiment, the controlapplication 104 may communicate with the device operating system 102based on protocols that are enabled by the operating system 102 and/orthe device. In one embodiment, the user device 101 may use a short rangecommunication protocol to communicate with devices at the premises, suchas the control application 104 and/or the display device 106. The userdevice 101 may use a long range communication protocol to communicatewith the remote server 120 via the network 110.

The user device 101 (herein referred to as user input device, userdevice, or client device) may include, generally, a computer orcomputing device including functionality for communicating (e.g.,remotely) over the network 110. Data, such as lessons, quizzes, tests,answers, etc., may be collected from one or more remote servers, such asthe remote server 120 via the network 110. Data requests, such as arequest to access a website hosted by a remote server, such as theremote server 120, may be initiated by the user device 101. Clientdevice(s) 101 may be a server, a desktop computer, a laptop computer,personal digital assistant (PDA), an in- or out-of-car navigationsystem, a smart phone or other cellular or mobile phone, or mobilegaming device, among other suitable computing devices. Client devices101 may execute one or more client applications, such as a web browser(e.g., Microsoft Windows Internet Explorer, Mozilla Firefox, AppleSafari, Google Chrome, and Opera, etc.), or a dedicated application tosubmit user data, or to make prediction queries over the network 110.

In particular embodiments, each user device 101 may be an electronicdevice including hardware, software, or embedded logic components or acombination of two or more such components and capable of carrying outthe appropriate functions implemented or supported by the user device101. For example and without limitation, user device 101 may be adesktop computer system, a notebook computer system, a netbook computersystem, a handheld electronic device, or a mobile telephone. The presentdisclosure contemplates any user device as the user device 101. The userdevice 101 may enable a network user at the user device 101 to accessnetwork 110. The user device 101 may enable its user to communicate withother users at other client devices.

The user device 101 may have a web browser, such as MICROSOFT INTERNETEXPLORER, GOOGLE CHROME or MOZILLA FIREFOX, and may have one or moreadd-ons, plug-ins, or other extensions, such as TOOLBAR or YAHOOTOOLBAR. The user device 101 may enable a user to enter a UniformResource Locator (URL) or other address directing the web browser to aserver, and the web browser may generate a Hyper Text Transfer Protocol(HTTP) request and communicate the HTTP request to server. The servermay accept the HTTP request and communicate to the user device 101 oneor more Hyper Text Markup Language (HTML) files responsive to the HTTPrequest. The user device 101 may render a web page based on the HTMLfiles from server for presentation to the user. The present disclosurecontemplates any suitable web page files. As an example and not by wayof limitation, web pages may render from HTML files, Extensible HyperText Markup Language (XHTML) files, or Extensible Markup Language (XML)files, according to particular needs. Such pages may also executescripts such as, for example and without limitation, those written inJAVASCRIPT, JAVA, MICROSOFT SILVERLIGHT, combinations of markup languageand scripts such as AJAX (Asynchronous JAVASCRIPT and XML), and thelike. Herein, reference to a web page encompasses one or morecorresponding web page files (which a browser may use to render the webpage) and vice versa, where appropriate.

The user device 101 may also include an application that is loaded ontothe user device 101. The application obtains data from the network 110and displays it to the user within the application interface.

This disclosure contemplates any suitable number of client devices 101,including computing systems taking any suitable physical form. Asexample and not by way of limitation, computing systems may be anembedded computer system, a system-on-chip (SOC), a single-boardcomputer system (SBC) (such as, for example, a computer-on-module (COM)or system-on-module (SOM)), a desktop computer system, a laptop ornotebook computer system, an interactive kiosk, a mainframe, a mesh ofcomputer systems, a mobile telephone, a personal digital assistant(PDA), a server, or a combination of two or more of these. Whereappropriate, the computing system may include one or more computersystems; be unitary or distributed; span multiple locations; spanmultiple machines; or reside in a cloud, which may include one or morecloud components in one or more networks. Where appropriate, one or morecomputing systems may perform without substantial spatial or temporallimitation one or more steps of one or more methods described orillustrated herein. As an example, and not by way of limitation, one ormore computing systems may perform in real time or in batch mode one ormore steps of one or more methods described or illustrated herein. Oneor more computing system may perform at different times or at differentlocations one or more steps of one or more methods described orillustrated herein, where appropriate.

In one embodiment, the control application 104 interfaces with thedevice operating system 102 to control the display of graphical userinterface elements on the device display 106. For example, the controlapplication 104 generates codes that are acceptable by the deviceoperating system 102. The codes enable the control application 104 tooverride the default operation of the operating system 106. In thismanner, the control application 104 controls the user device 101. Thecontrol application reformats the display aspects of the user device101, and prevents a user from accessing certain applications. In oneembodiment, the control application 104 disables certain applicationsthat are listed in a first list. In another embodiment, the controlapplication 104 disables applications that are not in a first list. Thedisabled applications may not be used or accessed by the user of thecomputing device 101 until an access token is generated by the controlapplication 104. The access token enabling the control application 104to enable certain applications based on the associated permissions,which are described in greater detail below.

In one embodiment, the control application 104 may be located outside oraway from the user device 101. In that embodiment, the controlapplication 104 may use one or more short range communication protocolsto communicate with devices at the premises, such as the user device 101and/or the display device 106. The control application 104 may act as anintermediary between the user device 101 and the display device 106. Thecontrol application 104 may receive commands from the user device 101and control the display device 106 based on the commands. The controlapplication 104 may cause commands from the user device 101 intended forthe display device 106 to be ineffective under certain circumstances.The control application 104 may comprise a set-top box, a cable box, agateway, an access point, an internet-of-things device, the like, or anycombination of the foregoing. The display device 106 may comprise atelevision, monitor, etc.

The network 110 generally represents a network or collection of networks(such as the Internet or a corporate intranet, or a combination of both)over which the various components illustrated in FIG. 1 (including othercomponents that may be necessary to execute the system described herein,as would be readily understood to a person of ordinary skill in theart). In particular embodiments, network 110 is an intranet, anextranet, a virtual private network (VPN), a local area network (LAN), awireless LAN (WLAN), a wide area network (WAN), a metropolitan areanetwork (MAN), a portion of the Internet, or another network 110 or acombination of two or more such networks 110. One or more links connectthe systems and databases described herein to the network 110. Inparticular embodiments, one or more links each includes one or morewired, wireless, or optical links. In particular embodiments, one ormore links each includes an intranet, an extranet, a VPN, a LAN, a WLAN,a WAN, a MAN, a portion of the Internet, or another link or acombination of two or more such links. The present disclosurecontemplates any suitable network 110, and any suitable link forconnecting the various systems and databases described herein.

The network 110 connects the various systems and computing devicesdescribed or referenced herein. In particular embodiments, network 110is an intranet, an extranet, a virtual private network (VPN), a localarea network (LAN), a wireless LAN (WLAN), a wide area network (WAN), ametropolitan area network (MAN), a portion of the Internet, or anothernetwork or a combination of two or more such networks 110. The presentdisclosure contemplates any suitable network 110.

One or more links couple one or more systems, engines or devices to thenetwork 110. In particular embodiments, one or more links each includesone or more wired, wireless, or optical links. In particularembodiments, one or more links each includes an intranet, an extranet, aVPN, a LAN, a WLAN, a WAN, a MAN, a portion of the Internet, or anotherlink or a combination of two or more such links. The present disclosurecontemplates any suitable links coupling one or more systems, engines ordevices to the network 110.

In particular embodiments, each system or engine may be a unitary serveror may be a distributed server spanning multiple computers or multipledatacenters. Systems, engines, or modules may be of various types, suchas, for example and without limitation, web server, news server, mailserver, message server, advertising server, file server, applicationserver, exchange server, database server, or proxy server. In particularembodiments, each system, engine or module may include hardware,software, or embedded logic components or a combination of two or moresuch components for carrying out the appropriate functionalitiesimplemented or supported by their respective servers. For example, a webserver is generally capable of hosting websites containing web pages orparticular elements of web pages. More specifically, a web server mayhost HTML files or other file types, or may dynamically create orconstitute files upon a request, and communicate them to client devicesor other devices in response to HTTP or other requests from clientdevices or other devices. A mail server is generally capable ofproviding electronic mail services to various client devices or otherdevices. A database server is generally capable of providing aninterface for managing data stored in one or more data stores.

In particular embodiments, one or more data storages may becommunicatively linked to one or more servers via one or more links. Inparticular embodiments, data storages may be used to store various typesof information. In particular embodiments, the information stored indata storages may be organized according to specific data structures. Inparticular embodiment, each data storage may be a relational database.Particular embodiments may provide interfaces that enable servers orclients to manage, e.g., retrieve, modify, add, or delete, theinformation stored in data storage.

The system may also contain other subsystems and databases, which arenot illustrated in FIG. 1 , but would be readily apparent to a person ofordinary skill in the art. For example, the system may include databasesfor storing data, storing features, storing outcomes (training sets),and storing models. Other databases and systems may be added orsubtracted, as would be readily understood by a person of ordinary skillin the art, without departing from the scope of the invention.

FIG. 2 illustrates an implementation of a user device 200 in accordancewith an embodiment of the invention. The user device 200 may be orcomprise the user device 101 in FIG. 1 . The user device 200 maycomprise a short range transceiver 202, a long range transceiver 204, aprocessor 206, and logic 210. The logic 210 may comprise a test curator212, profile and/or setting data 214, an administrator 216, an operatingsystem 218, a web browser 220, and an application 222. Other systems anddatabases may be used, as would be readily understood by a person ofordinary skill in the art, without departing from the scope of theinvention.

The short range transceiver 202 may facilitate communication between theuser device 101 in FIG. 1 and other devices at the premises 100 in FIG.1 , such as the control application 104 and/or the display device 106(in embodiments where the control application 104 is embodied remotelyfrom the user device 101). The short range transceiver 202 mayfacilitate communication over Wi-Fi, Bluetooth, Zigbee, etc.

The long range transceiver 204 may facilitate communication between theuser device 101 in FIG. 1 and remote computing devices, such as theremote server 120 in FIG. 1 . The long range transceiver 204 mayfacilitate communication over a cellular network, a Wi-Fi network, etc.The long range transceiver 204 may facilitate communication over thenetwork 110 in FIG. 1 .

The processor 206 may execute commands saved in storage. The logic 210may comprise instructions and modules stored in memory. The processor206 may execute the logic 210.

The test curator 212 may retrieve tests from remote computing devices,such as the remote server 120 in FIG. 1 . The test curator 212 mayretrieve information from remote computing devices, such as the remoteserver 120 in FIG. 1 . In one embodiment, the test curator 212 may useretrieved information to create one or more tests. In anotherembodiment, the test may be created at the remote server 120. The remoteserver 120 may generate tests based on the grade level of the userand/or the user's demonstrated aptitude based on answers to previousquestions. For example, if 12 a user answered a threshold number ofquestions incorrectly, then the test may include a threshold number ofpreviously presented questions. Similarly, if the user answeredpreviously presented questions beyond a threshold amount of time limit,then the test may include a threshold number of previously presentedquestions. Conversely, if the user answered a threshold number ofquestions correctly and/or within a threshold period of time, then newquestions at or above the currently measured aptitude level may bepresented to the user.

The profile and/or setting data 214 may include information such aspermission levels, and or data related to an access token data. In oneembodiment, the profile data may include information about a user, suchas the user's grade level, or competence level. It may also includepermissions data, such as the amount of time the user may use thecomputing device. In one embodiment, the profile data may also containgranular data specifying the amount of time a user has to use one ormore applications within a broader allotment of total time.

In one embodiment, the profile and/or setting data 214 may store pointsor currency accumulated by each user. Currency may be accumulated by,for example, answering questions, answering a threshold number ofquestions correctly, answering a threshold number of questions correctlywithin a threshold amount of time, etc. The amount of accumulatedcurrency may be based on the difficulty level associated with thequestions or a test (a test being a plurality of questions). The profileand/or setting data 214 may comprise conditions for enabling and/ordisabling particular applications, such as the application 222, and/ordevices, such as the display device 106 in FIG. 1 , for particularusers.

The administrator 216 may enable and/or disable access to applications,such as the application 222, and/or devices, such as the display device106 in FIG. 1 . The administrator 216 may enable and/or disable accessto applications and/or devices based on information stored in theprofile and/or setting data 214.

These permissions may be set by a parent or an administrator. FIG. 4Aillustrates an exemplary graphical user interface for receivingpermissions based data. As illustrated in FIG. 4 , a variety of usersthat an administrator or an parent may want to permission areillustrated in a first section of the GUI 402. The user may beillustrated by their name, for example, or by their photograph, or someother identifier, as would be apparent to a person of ordinary skill inthe art. The applications that are installed on the user device, or maybe available to download on the user device are illustrated in a secondsection as element 403. The permissions setting for each user and eachapplication is illustrated in a third section of the graphical userinterface as 404 and 406. In one embodiment, the permission approved 404and permission denied 406 may be illustrated in the same section.However, the specific graphical user interface for the variouspermissions may be varied.

FIG. 4B illustrates an exemplary graphical user interface for settingpermissions. The first section of the graphical user interface 408illustrates a total duration of application usage permitted for aportion of time, such as a day, or a week, etc. The second section 410illustrates a start and/or stop time for permitted usage and/orunpermitted usage. The third section 412 illustrates incentivized time,which refers to additional time that a user can obtain via an accesstoken if the user provides a threshold number of answers within athreshold amount of time.

The operating system 218 may be the same as the operating systemdescribed in FIG. 1 as element 102. It may control the hardware and thesoftware of the user device 200. The operating system 218 may scheduletasks, execute applications, such as the application 222, and controlperipherals, such as a microphone, speaker, etc. associated with theuser device 200. The administrator 216 may cause the operating system218 to stop and/or resume responding to requests to execute one or moreapplications, such as the application 222 or an application forcontrolling the display device 106 in FIG. 1 .

The web browser 220 may allow the user device 101 in FIG. 1 to access awebsite hosted by a remote server, such as the remote server 120 in FIG.1 . The administrator 216 may cause the web browser 220 to stop and/orresume responding to requests for execution.

The GUI control application 222 may comprise any program executable onthe user device 200. The GUI control application 222 may facilitatecontrol of the display device 106 in FIG. 1 . The administrator 216 maycause the application 222 to stop and/or resume responding to requestsfor execution.

FIG. 3A illustrates a flowchart for task-based enablement offunctionality in accordance with an exemplary embodiment of the presentinvention.

At 300, a function associated with a user device may be disabled. Forexample, the application 222 in FIG. 2 associated with the user device200 in FIG. 2 may be disabled. As another example, a function forcontrolling the display device 106 in FIG. 1 associated with the userdevice 101 in FIG. 1 may be disabled. As another example, a functionassociated with the web browser 220 in FIG. 2 associated with the userdevice 200 in FIG. 2 .

At 302, a test may be displayed. For example, the user device 101 inFIG. 1 may display a test. The test may be retrieved from one or moreremote computing devices. The test may be created based on informationretrieved from one or more remote computing devices.

At 304, answers for the test may be received. For example, the userdevice 101 in FIG. 1 may receive answers for the test from a user.

At 306, an amount of digital currency may be determined based on thereceived answers. For example, the user device 101 in FIG. 1 maydetermine an amount of digital currency based on the received answers.The amount of digital currency determined may be based on a number ofcorrect answers. The amount of digital currency determined may be basedon a difficulty associated with the received answers. The amount ofdigital currency determined may be based on a difficulty associated withcorrect answers. The amount of digital currency determined may be basedon a subject associated with the received answers. The amount of digitalcurrency determined may be based on a subject associated with correctanswers. The digital currency may comprise virtual currency, virtualpoints, cryptocurrency, digital tokens, etc.

At 308, the determined amount may be added to a digital currency total.For example, the user device 101 in FIG. 1 may add the determined amountto a digital currency total. The digital currency total may comprise asum of digit currency determined from previous tests and the displayedtest for a user, subtracted by a sum of digit currency redeemed by theuser.

At 310, a redemption request may be received via a user input. Therequest may be to enable a certain application or a plurality ofapplications for a period of time.

If the user is in fact enabled to redeem the functionality, then theprocess at 312 may enable a function in response to redemption of atleast a portion of the digital currency total. For example, anapplication in a first list be enabled in response to redemption of atleast a portion of the digital currency total. As another example, afunction for controlling the display device 106 in FIG. 1 may be enabledin response to redemption of at least a portion of the digital currencytotal. As another example, a function associated with the web browser220 in FIG. 2 may be enabled in response to redemption of at least aportion of the digital currency total. The function may be enabled for atime period based on the amount in the portion of the digital currencytotal. The function may be disabled after the time period. The digitalcurrency total may be reduced by the portion of the digital currencytotal redeemed resulting in a new digital currency total.

FIG. 3B illustrates the graphical user interface modification that isenabled by the present invention. In one embodiment, a dynamic displaycontrol application is executed 350. The dynamic display controlapplication is also illustrated as a control application 104 in FIG. 1 ,and GUI control unit 222 in FIG. 2 . When the application is executed,it interfaces with the operating system of a user device and disables352 applications on a client device. In one embodiment, the disabledapplications may be provided in a first list, such as the oneillustrated in FIG. 4A. In other embodiments, the disabled applicationsmay be unlisted in a first list, or, in yet another embodiment, may bedesignated as un-permissioned (or permission rejected) in anothergraphical user interface, such as the one illustrated in FIG. 4A.

The process continues by displaying a first graphical user interface 354illustrating the applications that are disabled. The first graphicaluser interface may be a notification or a pop-up, or a page or screen.The first graphical user interface may be displayed by executing a firstset of executable instructions.

Thereafter, a second graphical user interface is displayed 356. Thesecond graphical user interface may be comprised of three sections,wherein a first section displays queries, a second section displays aplurality of possible responses, and a third section for receiving userinput. An exemplary second graphical user interface is illustrated inFIG. 4C. It illustrates a first section 420 of one or more queries. Asecond section 422, which illustrates a plurality of possible responses.And a third section 424, which illustrates a received user input. In oneembodiment, as illustrated in FIG. 4C, the second and third sections maybe the same. In other words, a graphical user interface illustratingpossible responses may each also receive a user selection via a userinput. The selected answer is then analyzed for correctness via thecontrol application or via a remote server. The second graphical userinterface may be displayed by executing a second set of executableinstructions.

Once a user input is received 358, additional questions may be presentedto the user via the second graphical user interface 356.

The process may automatically compute an access token grant 360 based onquestions as they are received in real time or until a plurality ofquestions are answered. The computation may be performed by the controlapplication executing on a client device, or may be computed at aserver. The computation may be based on whether the user has answeredthe question presented correctly and/or whether an answer or a pluralityof answers are received within a threshold amount of time. A furthercomputation may be performed to convert the user score into an accesstoken grant. A variety of different applications may be enabled for avarying amount of time based on a redemption of the access token grant.

Thereafter, the process displays a third GUI element by executing athird set of executable instructions, the third GUI elements displayingapplications in the first list that are no longer disbaled based on thenumber of access tokens that are available to the user. In other words,the third GUI element may illustrate applications that can be enabled bythe user based on the access token grants that are available to theuser.

Generally, the techniques disclosed herein may be implemented onhardware or a combination of software and hardware. For example, theymay be implemented in an operating system kernel, in a separate userprocess, in a library package bound into network applications, on aspecially constructed machine, on an application-specific integratedcircuit (ASIC), or on a network interface card.

Software/hardware hybrid implementations of at least some of theembodiments disclosed herein may be implemented on a programmablenetwork-resident machine (which should be understood to includeintermittently connected network-aware machines) selectively activatedor reconfigured by a computer program stored in memory. Such networkdevices may have multiple network interfaces that may be configured ordesigned to utilize different types of network communication protocols.A general architecture for some of these machines may be describedherein in order to illustrate one or more exemplary means by which agiven unit of functionality may be implemented. According to specificembodiments, at least some of the features or functionalities of thevarious embodiments disclosed herein may be implemented on one or moregeneral-purpose computers associated with one or more networks, such asfor example an end-user computer system, a client computer, a networkserver or other server system, a mobile computing device (e.g., tabletcomputing device, mobile phone, smartphone, laptop, or other appropriatecomputing device), a consumer electronic device, a music player, or anyother suitable electronic device, router, switch, or other suitabledevice, or any combination thereof. In at least some embodiments, atleast some of the features or functionalities of the various embodimentsdisclosed herein may be implemented in one or more virtualized computingenvironments (e.g., network computing clouds, virtual machines hosted onone or more physical computing machines, or other appropriate virtualenvironments).

Referring now to FIG. 5 , there is shown a block diagram depicting anexemplary computing device 10 suitable for implementing at least aportion of the features or functionalities disclosed herein. Computingdevice 10 may be, for example, any one of the computing machines listedin the previous paragraph, or indeed any other electronic device capableof executing software- or hardware-based instructions according to oneor more programs stored in memory. Computing device 10 may be configuredto communicate with a plurality of other computing devices, such asclients or servers, over communications networks such as a wide areanetwork a metropolitan area network, a local area network, a wirelessnetwork, the Internet, or any other network, using known protocols forsuch communication, whether wireless or wired.

In one aspect, computing device 10 includes one or more centralprocessing units (CPU) 12, one or more interfaces 15, and one or morebusses 14 (such as a peripheral component interconnect (PCI) bus). Whenacting under the control of appropriate software or firmware, CPU 12 maybe responsible for implementing specific functions associated with thefunctions of a specifically configured computing device or machine. Forexample, in at least one aspect, a computing device 10 may be configuredor designed to function as a server system utilizing CPU 12, localmemory 11 and/or remote memory 16, and interface(s) 15. In at least oneaspect, CPU 12 may be caused to perform one or more of the differenttypes of functions and/or operations under the control of softwaremodules or components, which for example, may include an operatingsystem and any appropriate applications software, drivers, and the like.

CPU 12 may include one or more processors 13 such as, for example, aprocessor from one of the Intel, ARM, Qualcomm, and AMD families ofmicroprocessors. In some embodiments, processors 13 may includespecially designed hardware such as application-specific integratedcircuits (ASICs), electrically erasable programmable read-only memories(EEPROMs), field-programmable gate arrays (FPGAs), and so forth, forcontrolling operations of computing device 10. In a particular aspect, alocal memory 11 (such as non-volatile random-access memory (RAM) and/orread-only memory (ROM), including for example one or more levels ofcached memory) may also form part of CPU 12. However, there are manydifferent ways in which memory may be coupled to system 10. Memory 11may be used for a variety of purposes such as, for example, cachingand/or storing data, programming instructions, and the like. It shouldbe further appreciated that CPU 12 may be one of a variety ofsystem-on-a-chip (SOC) type hardware that may include additionalhardware such as memory or graphics processing chips, such as a QUALCOMMSNAPDRAGON™ or SAMSUNG EXYNOS™ CPU as are becoming increasingly commonin the art, such as for use in mobile devices or integrated devices.

As used herein, the term “processor” is not limited merely to thoseintegrated circuits referred to in the art as a processor, a mobileprocessor, or a microprocessor, but broadly refers to a microcontroller,a microcomputer, a programmable logic controller, anapplication-specific integrated circuit, and any other programmablecircuit.

In one aspect, interfaces 15 are provided as network interface cards(NICs). Generally, NICs control the sending and receiving of datapackets over a computer network; other types of interfaces 15 may forexample support other peripherals used with computing device 10. Amongthe interfaces that may be provided are Ethernet interfaces, frame relayinterfaces, cable interfaces, DSL interfaces, token ring interfaces,graphics interfaces, and the like. In addition, various types ofinterfaces may be provided such as, for example, universal serial bus(USB), Serial, Ethernet, FIREWIRE™, THUNDERBOLT™, PCI, parallel, radiofrequency (RF), BLUETOOTH™, near-field communications (e.g., usingnear-field magnetics), 802.11 (WiFi), frame relay, TCP/IP, ISDN, fastEthernet interfaces, Gigabit Ethernet interfaces, Serial ATA (SATA) orexternal SATA (ESATA) interfaces, high-definition multimedia interface(HDMI), digital visual interface (DVI), analog or digital audiointerfaces, asynchronous transfer mode (ATM) interfaces, high-speedserial interface (HSSI) interfaces, Point of Sale (POS) interfaces,fiber data distributed interfaces (FDDIs), and the like. Generally, suchinterfaces 15 may include physical ports appropriate for communicationwith appropriate media. In some cases, they may also include anindependent processor (such as a dedicated audio or video processor, asis common in the art for high-fidelity A/V hardware interfaces) and, insome instances, volatile and/or non-volatile memory (e.g., RAM).

Although the system shown in FIG. 5 illustrates one specificarchitecture for a computing device 10 for implementing one or more ofthe embodiments described herein, it is by no means the only devicearchitecture on which at least a portion of the features and techniquesdescribed herein may be implemented. For example, architectures havingone or any number of processors 13 may be used, and such processors 13may be present in a single device or distributed among any number ofdevices. In one aspect, single processor 13 handles communications aswell as routing computations, while in other embodiments a separatededicated communications processor may be provided. In variousembodiments, different types of features or functionalities may beimplemented in a system according to the aspect that includes a clientdevice (such as a tablet device or smartphone running client software)and server systems (such as a server system described in more detailbelow).

Regardless of network device configuration, the system of an aspect mayemploy one or more memories or memory modules (such as, for example,remote memory block 16 and local memory 11) configured to store data,program instructions for the general-purpose network operations, orother information relating to the functionality of the embodimentsdescribed herein (or any combinations of the above). Programinstructions may control execution of or comprise an operating systemand/or one or more applications, for example. Memory 16 or memories 11,16 may also be configured to store data structures, configuration data,encryption data, historical system operations information, or any otherspecific or generic non-program information described herein.

The computing device 10 may be and/or comprise the user device 101 inFIG. 1 .

Because such information and program instructions may be employed toimplement one or more systems or methods described herein, at least somenetwork device embodiments may include nontransitory machine-readablestorage media, which, for example, may be configured or designed tostore program instructions, state information, and the like forperforming various operations described herein. Examples of suchnontransitory machine-readable storage media include, but are notlimited to, magnetic media such as hard disks, floppy disks, andmagnetic tape; optical media such as CD-ROM disks; magneto-optical mediasuch as optical disks, and hardware devices that are speciallyconfigured to store and perform program instructions, such as read-onlymemory devices (ROM), flash memory (as is common in mobile devices andintegrated systems), solid state drives (SSD) and “hybrid SSD” storagedrives that may combine physical components of solid state and hard diskdrives in a single hardware device (as are becoming increasingly commonin the art with regard to personal computers), memristor memory, randomaccess memory (RAM), and the like. It should be appreciated that suchstorage means may be integral and non-removable (such as RAM hardwaremodules that may be soldered onto a motherboard or otherwise integratedinto an electronic device), or they may be removable such as swappableflash memory modules (such as “thumb drives” or other removable mediadesigned for rapidly exchanging physical storage devices),“hot-swappable” hard disk drives or solid state drives, removableoptical storage discs, or other such removable media, and that suchintegral and removable storage media may be utilized interchangeably.Examples of program instructions include both object code, such as maybe produced by a compiler, machine code, such as may be produced by anassembler or a linker, byte code, such as may be generated by forexample a JAVA™ compiler and may be executed using a Java virtualmachine or equivalent, or files containing higher level code that may beexecuted by the computer using an interpreter (for example, scriptswritten in Python, Perl, Ruby, Groovy, or any other scripting language).

In some embodiments, systems may be implemented on a standalonecomputing system. Referring now to FIG. 6 above, there is shown a blockdiagram depicting a typical exemplary architecture of one or moreembodiments or components thereof on a standalone computing system.Computing device 20 includes processors 21 that may run software thatcarry out one or more functions or applications of embodiments, such asfor example a client application 24. Processors 21 may carry outcomputing instructions under control of an operating system 22 such as,for example, a version of MICROSOFT WINDOWS™ operating system, APPLEmacOS™ or iOS™ operating systems, some variety of the Linux operatingsystem, ANDROID™ operating system, or the like. In many cases, one ormore shared services 23 may be operable in system 20, and may be usefulfor providing common services to client applications 24. Services 23 mayfor example be WINDOWS™ services, user-space common services in a Linuxenvironment, or any other type of common service architecture used withoperating system 21. Input devices 28 may be of any type suitable forreceiving user input, including for example a keyboard, touchscreen,microphone (for example, for voice input), mouse, touchpad, trackball,or any combination thereof. Output devices 27 may be of any typesuitable for providing output to one or more users, whether remote orlocal to system 20, and may include for example one or more screens forvisual output, speakers, printers, or any combination thereof. Memory 25may be random-access memory having any structure and architecture knownin the art, for use by processors 21, for example to run software.Storage devices 26 may be any magnetic, optical, mechanical, memristor,or electrical storage device for storage of data in digital form (suchas those described above, referring to FIG. 5 ). Examples of storagedevices 26 include flash memory, magnetic hard drive, CD-ROM, and/or thelike.

The system 20 may be and/or comprise the user device 101 in FIG. 1 .

In some embodiments, systems may be implemented on a distributedcomputing network, such as one having any number of clients and/orservers. Referring now to FIG. 6 , there is shown a block diagramdepicting an exemplary architecture 30 for implementing at least aportion of a system according to one aspect on a distributed computingnetwork. According to the aspect, any number of clients 33 may beprovided. Each client 33 may run software for implementing client-sideportions of a system; clients may comprise a system 20 such as thatillustrated in FIG. 5 . In addition, any number of servers 32 may beprovided for handling requests received from one or more clients 33.Clients 33 and servers 32 may communicate with one another via one ormore electronic networks 31, which may be in various embodiments any ofthe Internet, a wide area network, a mobile telephony network (such asCDMA or GSM cellular networks), a wireless network (such as WiFi, WiMAX,LTE, and so forth), or a local area network (or indeed any networktopology known in the art; the aspect does not prefer any one networktopology over any other). Networks 31 may be implemented using any knownnetwork protocols, including for example wired and/or wirelessprotocols.

In addition, in some embodiments, servers 32 may call external services37 when needed to obtain additional information, or to refer toadditional data concerning a particular call. Communications withexternal services 37 may take place, for example, via one or morenetworks 31. In various embodiments, external services 37 may compriseweb-enabled services or functionality related to or installed on thehardware device itself. For example, in one aspect where clientapplications 24 are implemented on a smartphone or other electronicdevice, client applications 24 may obtain information stored in a serversystem 32 in the cloud or on an external service 37 deployed on one ormore of a particular enterprise's or user's premises.

In some embodiments, clients 33 or servers 32 (or both) may make use ofone or more specialized services or appliances that may be deployedlocally or remotely across one or more networks 31. For example, one ormore databases 34 may be used or referred to by one or more embodiments.It should be understood by one having ordinary skill in the art thatdatabases 34 may be arranged in a wide variety of architectures andusing a wide variety of data access and manipulation means. For example,in various embodiments one or more databases 34 may comprise arelational database system using a structured query language (SQL),while others may comprise an alternative data storage technology such asthose referred to in the art as “NoSQL” (for example, HADOOP CASSANDRA™,GOOGLE BIGTABLE™, and so forth). In some embodiments, variant databasearchitectures such as column-oriented databases, in-memory databases,clustered databases, distributed databases, or even flat file datarepositories may be used according to the aspect. It will be appreciatedby one having ordinary skill in the art that any combination of known orfuture database technologies may be used as appropriate, unless aspecific database technology or a specific arrangement of components isspecified for a particular aspect described herein. Moreover, it shouldbe appreciated that the term “database” as used herein may refer to aphysical database machine, a cluster of machines acting as a singledatabase system, or a logical database within an overall databasemanagement system. Unless a specific meaning is specified for a givenuse of the term “database”, it should be construed to mean any of thesesenses of the word, all of which are understood as a plain meaning ofthe term “database” by those having ordinary skill in the art.

Similarly, some embodiments may make use of one or more security systems36 and configuration systems 35. Security and configuration managementare common information technology (IT) and web functions, and someamount of each are generally associated with any IT or web systems. Itshould be understood by one having ordinary skill in the art that anyconfiguration or security subsystems known in the art now or in thefuture may be used in conjunction with embodiments without limitation,unless a specific security 36 or configuration system 35 or approach isspecifically required by the description of any specific aspect.

The one or more of the server(s) 32 may be and/or comprise the userdevice 101 in FIG. 1 .

FIG. 8 shows an exemplary overview of a computer system 40 as may beused in any of the various locations throughout the system. It isexemplary of any computer that may execute code to process data. Variousmodifications and changes may be made to computer system 40 withoutdeparting from the broader scope of the system and method disclosedherein. Central processor unit (CPU) 41 is connected to bus 42, to whichbus is also connected memory 43, nonvolatile memory 44, display 47,input/output (I/O) unit 48, and network interface card (NIC) 53. I/Ounit 48 may, typically, be connected to keyboard 49, pointing device 50,hard disk 52, and real-time clock 51. NIC 53 connects to network 54,which may be the Internet or a local network, which local network may ormay not have connections to the Internet. Also shown as part of system40 is power supply unit 45 connected, in this example, to a mainalternating current (AC) supply 46. Not shown are batteries that couldbe present, and many other devices and modifications that are well knownbut are not applicable to the specific novel functions of the currentsystem and method disclosed herein. It should be appreciated that someor all components illustrated may be combined, such as in variousintegrated applications, for example Qualcomm or Samsungsystem-on-a-chip (SOC) devices, or whenever it may be appropriate tocombine multiple capabilities or functions into a single hardware device(for instance, in mobile devices such as smartphones, video gameconsoles, in-vehicle computer systems such as navigation or multimediasystems in automobiles, or other integrated hardware devices).

The computer system 40 may be and/or comprise the user device 101 inFIG. 1 .

In various embodiments, functionality for implementing systems ormethods of various embodiments may be distributed among any number ofclient and/or server components. For example, various software modulesmay be implemented for performing various functions in connection withthe system of any particular aspect, and such modules may be variouslyimplemented to run on server and/or client components.

The skilled person will be aware of a range of possible modifications ofthe various embodiments described above. Accordingly, the presentinvention is defined by the claims and their equivalents.

As used herein any reference to “one embodiment” or “an embodiment”means that a particular element, feature, structure, or characteristicdescribed in connection with the embodiment is included in at least oneembodiment. The appearances of the phrase “in one embodiment” in variousplaces in the specification are not necessarily all referring to thesame embodiment.

Some embodiments may be described using the expression “coupled” and“connected” along with their derivatives. For example, some embodimentsmay be described using the term “coupled” to indicate that two or moreelements are in direct physical or electrical contact. The term“coupled,” however, may also mean that two or more elements are not indirect contact with each other, but yet still co-operate or interactwith each other. The embodiments are not limited in this context.

As used herein, the terms “comprises,” “comprising,” “includes,”“including,” “has,” “having” or any other variation thereof, areintended to cover a non-exclusive inclusion. For example, a process,method, article, or apparatus that comprises a list of elements is notnecessarily limited to only those elements but may include otherelements not expressly listed or inherent to such process, method,article, or apparatus. Further, unless expressly stated to the contrary,“or” refers to an inclusive or and not to an exclusive or. For example,a condition A or B is satisfied by any one of the following: A is true(or present) and B is false (or not present), A is false (or notpresent) and B is true (or present), and both A and B are true (orpresent).

In addition, use of the “a” or “an” are employed to describe elementsand components of the embodiments herein. This is done merely forconvenience and to give a general sense of the invention. Thisdescription should be read to include one or at least one and thesingular also includes the plural unless it is obvious that it is meantotherwise.

Upon reading this disclosure, those of skill in the art will appreciatestill additional alternative structural and functional designs for asystem and a process for task-based enabling of functionality throughthe disclosed principles herein. Thus, while particular embodiments andapplications have been illustrated and described, it is to be understoodthat the disclosed embodiments are not limited to the preciseconstruction and components disclosed herein. Various apparentmodifications, changes and variations may be made in the arrangement,operation and details of the method and apparatus disclosed hereinwithout departing from the spirit and scope defined in the appendedclaims.

What is claimed is:
 1. A computer-implemented method for dynamicallydisplaying applications on a mobile computer to display applicationsthat are approved for use based on activity data, thecomputer-implemented method comprising: executing a dynamic displaycontrol application on a client device, the dynamic display controlapplication comprising first executable instructions, second executableinstructions, and third executable instructions; disabling applicationsin a first list that are executable by the first computing device byexecuting the first executable instructions; displaying a firstgraphical user interface (GUI) element illustrating that applications ina first list are disabled; displaying a second GUI element by executingthe second executable instructions, the second GUI element comprising afirst section displaying queries, second section displaying a pluralityof responses, and a third section for receiving user input; receivinguser input; automatically determining whether the user has provided athreshold number of suitable responses via user input within a thresholdamount of time, the determining based on communication with a serversystem, the server system providing suitable responses for each queryand the threshold amount of time; automatically computing access tokengrant, the access token grant computed based on the number of suitableresponses that are received within a threshold period of time, athreshold number of access tokens enabling access to at least oneapplication in the first list; and displaying a third GUI element byexecuting the third executable instructions, the third GUI elementdisplaying applications in the first list that are no longer disabledbased on the number of access tokens that are available to the user. 2.The computer-implemented method of claim 1, wherein the first executableinstructions execute a first policy file, wherein the first policy fileis provided by a server system.
 3. The computer-implemented method ofclaim 1, wherein executing the first executable instructions disablesthe application switching capability, and further comprises disabling afile explorer or a task manager associated with the operating system ofthe client device.
 4. The computer-implemented method of claim 1,further comprising sending user input data to the server system.
 5. Thecomputer-implemented method of claim 1, wherein the access token grantis additionally computed based on parameters provided by the serversystem, the parameters being configurable by a second client device incommunication with the server system.
 6. The computer-implemented methodof claim 5, wherein the access token grant is additionally computedbased on a plurality of previous access token grants.
 7. Thecomputer-implemented method of claim 1, wherein executing the thirdexecutable instructions enables the application switching capability,and further enables a file explorer or a task manager associated withthe operating system of the client device.
 8. The computer-implementedmethod of claim 7, wherein the application switching capability isenabled based on access grants.
 9. A non-transitory computer-readablemedium embodying a program for dynamically displaying applications on aclient device to display applications that are approved for use based onactivity data, the program, when executed by a client device, causes theclient device to at least: disable applications in a first list that areexecutable by the client device by executing the first executableinstructions; display a first graphical user interface (GUI) elementillustrating that applications in a first list are disabled; display asecond GUI element by executing the second executable instructions, thesecond GUI element comprising a first section displaying queries, secondsection displaying a plurality of responses, and a third section forreceiving user input; receive user input; automatically determinewhether the user has provided a threshold number of suitable responsesvia user input within a threshold amount of time, the determining basedon communication with a server system, the server system providingsuitable responses for each query and the threshold amount of time;automatically compute an access token grant, the access token grantcomputed based on the number of suitable responses that are receivedwithin a threshold period of time, a threshold number of access tokensenabling access to at least one application in the first list; anddisplay a third GUI element by executing the third executableinstructions, the third GUI element displaying applications in the firstlist that are no longer disabled based on the number of access tokensthat are available to the user.
 10. A non-transitory computer-readablemedium embodying a program of claim 9, further causing the client deviceto disable application switching capability, and disable a file exploreror a task manager associated with the operating system of the clientdevice.
 11. A non-transitory computer-readable medium embodying aprogram of claim 9, further causing the client device to send user inputdata to the server system.
 12. A non-transitory computer-readable mediumembodying a program of claim 9, wherein the access token grant isadditionally computed based on parameters provided by the server system,the parameters being configurable by a second client device incommunication with the server system.
 13. A non-transitorycomputer-readable medium embodying a program of claim 12, wherein theaccess token grant is additionally computed based on a plurality ofprevious access token grants.
 14. A non-transitory computer-readablemedium embodying a program of claim 9, wherein executing the thirdexecutable instructions enables the application switching capability,and further enables a file explorer or a task manager associated withthe operating system of the client device.
 15. A non-transitorycomputer-readable medium embodying a program of claim 14, wherein theapplication switching capability is enabled based on access grants. 16.A system for dynamically displaying applications on a client device todisplay applications that are approved for use based on activity data,the system comprising: a client device executing a client application;and a computing environment executing a management service, thecomputing environment in communication with the client device over anetwork, wherein the client device is configured to: execute a dynamicdisplay control application, the dynamic display control applicationcomprising first executable instructions, second executableinstructions, and third executable instructions; disable applications ina first list that are executable by the first computing device byexecuting the first executable instructions; display a first graphicaluser interface (GUI) element illustrating that applications in a firstlist are disabled; display a second GUI element by executing the secondexecutable instructions, the second GUI element comprising a firstsection displaying queries, second section displaying a plurality ofresponses, and a third section for receiving user input; receive userinput; automatically determine whether the user has provided a thresholdnumber of suitable responses via user input within a threshold amount oftime, the determining based on communication with a server system, theserver system providing suitable responses for each query and thethreshold amount of time; automatically compute access token grant, theaccess token grant computed based on the number of suitable responsesthat are received within a threshold period of time, a threshold numberof access tokens enabling access to at least one application in thefirst list; and display a third GUI element by executing the thirdexecutable instructions, the third GUI element displaying applicationsin the first list that are no longer disabled based on the number ofaccess tokens that are available to the user.
 17. The system of claim16, wherein the first executable instructions execute a first policyfile, wherein the first policy file is provided by a server system. 18.The system of claim 16, wherein executing the first executableinstructions disables the application switching capability, and furthercomprises disabling a file explorer or a task manager associated withthe operating system of the client device.
 19. The system of claim 16,further comprising sending user input data to the server system.
 20. Thesystem of claim 16, wherein the access token grant is additionallycomputed based on parameters provided by the server system, theparameters being configurable by a second client device in communicationwith the server system.