A vast amount of content is available to a user via network access, and the amount is ever increasing. For example, users currently have access to billions of web pages via the Internet. Further, the types of content that are available is also increasing, from web pages to images to downloadable music and so on. Therefore, it may be difficult for the users to locate particular content of interest from this amount and types of content
A variety of techniques may be utilized to access and interact with content. For example, a user may access a “search engine” to search web pages. The search engine is typically accessed via a web site address and works as a stand-alone program that maintains a database of information collected over the Internet. For example, the search engine may be used like a card catalog to locate a particular web page of interest by performing text searches, such as to locate a web page having keywords that were provided by a user.
Traditional search engines, however, were configured for the sole purpose of providing an Internet search and thus were typically viewed via sparse web pages that were generally devoid of other content. One technique that was used to promote traffic to the search engine is through configuration as a web portal, such that the web portal acted as a “starting point” by the user for accessing content over the Internet. The web portal, for instance, may include search functionality as well as an output of content, such as news articles and sports scores. Although in some instances this output of content was customizable by the user, the customization caused the user to leave the initial “experience” when interacting with the search engine, such as to navigate from an initial web page to one or more other web pages to select content. Additionally, the initial experience may also be sparse, thereby adversely affecting the user's initial judgment of the search engine and making the customization seem daunting to the user.
A customizable service provider user interface is described. In an implementation, a user is logged onto a suite a web services, to which, the user has not previously logged on. A user interface is output having a plurality of portions, one or more of which are customizable by the user through use of one or more overlays to customize interaction with the suite of web services. In another implementation, the portions animate from an initial size to an expanded size when displayed.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The same reference numbers are utilized in instances in the discussion to reference like structures and components.
Overview
A vast amount of content is available to a user via the Internet. To access this content, a user may access a “search engine” to search web pages. Traditional search engines, however, were typically configured for the sole purpose of providing an Internet search and thus were viewed via sparse web pages that were generally devoid of other content. For example, the search engine may include a search portion configured to receive text and a logo of the service provider.
In order to promote traffic to the search engine for other purposes, the search engine may be configured as a web portal to act as a “starting point” by the user for accessing content over the Internet. The web portal, for instance, may also include content, such as news articles and sports scores. However, although this output of content may be customizable by the user in some instances, traditional customization techniques caused the user to navigate between different experiences. For example, the user may logon to a service and access a default web page. To customize the web page, the user navigates to other pages displayed separately from the web page to choose content. Thus, the user leaves the initial “experience” and navigates through one or more other experiences to customize the content. Therefore, the user was forced to navigate back to the customized page to determine if the customization was desired and continue navigating back and forth between the page(s) to make changes to perform additional customization. Additionally, the initial experience may also be sparse, thereby adversely affecting the user's initial judgment of the search engine and making the customization seem daunting. Further, this interface was traditionally provided separately from a user interface that related to local content.
Accordingly, a customizable service provider user interface is described. In an implementation, the user interface is customizable through the use of overlays such that the user remains in the experience being customized. For example, the overlay may be provided as a translucent layer over the experience being customized. As customizations are being made, the customizations may be viewed “through ” at least a portion of the overlay. Additionally, animations may be provided that improve the user's experience with the user interface. Further, the user interface may incorporate content that is local to a client device, thereby providing a “unified” experience. Further discussion of these and other techniques may be found in relation to
Exemplary Environment
The clients 104(n) may be configured in a variety of ways for accessing the service provider 102(m). For example, one or more of the clients 104(n) may be configured as a computing device, such as a desktop computer, a mobile station, an entertainment appliance, a set-top box communicatively coupled to a display device, a wireless phone, a game console, and so forth. Thus, the clients 104(n) may range from full resource devices with substantial memory and processor resources (e.g., personal computers, game consoles) to low-resource devices with limited memory, processing and/or display resources (e.g., traditional set-top boxes, hand-held game consoles, wireless phones). For purposes of the following discussion, the clients 104(n) may also relate to a person and/or entity that operate the clients. In other words, one or more of the clients 104(n) may describe logical clients that include users, software, and/or devices.
Although the network 106 is illustrated as the Internet, the network may assume a wide variety of configurations. For example, the network 106 may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on. Further, although a single network 106 is shown, the network 106 may be configured to include multiple networks.
The service provider 102(m) is illustrated as having a web service suite 110 having a plurality of services 112(s) (where “s” can be any integer from one to “S”) that are accessible via the network 106. The services 112(s) may be configured in a variety of ways to provide functionality over the network 106 to the clients 104(n). For example, the services 112(s) may be configured for access via platform-independent protocols and standards to exchange data over the network 106. The services 112(s), for instance, may be provided via an Internet-hosted module that is accessed via standardized network protocols, such as a simple object access protocol (SOAP) over hypertext transfer protocol (HTTP), extensible markup language (XML), and so on, further discussion of which may be found in relation to
A wide functionality may be made available via the plurality of services 112(s). For example, a web search 112(1) service (e.g., a search engine) may be provided to search the Internet, an email 112(2) service may be provided to send and receive email, and an instant messaging 112(3) service may be provided to provide instant messaging between the clients 104(n). Additional examples include a news 112(4) service, a shopping (e.g., “ecommerce”) 112(5) service and a web log 112(6) service. Further, productivity 112(7) services may also be provided, such as word processing, spreadsheets, presentations, drawings, note-taking, and so on. For instance, network access may be given to the client 104(n) to applications that were traditionally executed locally on the client 104(n) itself. Therefore, execution of the modules may be performed remotely at the service provider 102(m) and results of the execution may be communicated over the network 106 to the client 104(n). An authentication service 112(8) may also be provided to authenticate clients 104(n) to access other services, which may include other services provided by the service provider 102(m) as well as other services provided by other service providers. Although a few examples of services have been described, it should be apparent that a wide variety of other services 112(S) are also contemplated.
The service provider 102(m) is also illustrated as having a service manager module 114, which is representative of functionality used by the service provider 102(m) to manage access to the services 112(s) over the network 106, performance of the services 112(s), and so on. Although illustrated separately, the functionality represented by the service manager module 114 may be incorporated within the services 110(s) themselves.
The service manager module 114, for instance, may be utilized to generate a user interface 116 that is provided over the network 106 to the client 104(n) to enable the client 104(n) to interact with the services 112(s). For example, the user interface 116 may be output through use of a communication module 118(n) that is executable on the client 104(n) to render the user interface 116, and more particularly data used to form the user interface. The user interface 116 may be utilized for a variety of purposes and may be customizable via the client 104(n), further discussion of which may be found in relation to
Additionally, the service manager module 114 may manage a plurality of accounts 120(a) (where “a” can be any integer from one to “A”), each of which represents data that is utilized for interaction by the clients 104(n) with the plurality of service 112(s). For example, account 120(a) may correspond to a particular client 104(n) and include service authorizations 120(1) which indicate whether the client 104(n) is permitted to interact with particular ones of the services 112(s), if any, such as due to expiration or lack of payment information.
The account 120(a) may also include one or more persona(s) 120(2) of the client 104(n), which are used to provide different external representations of the client 104(n). For instance, a “work” persona may be utilized by the client 104(n) for interactions related to work (e.g., work email and instant messaging) and a “personal” persona may be used to interact with family and friends. Each persona may provide a different external representation for how other clients “see” the client, such as a different email address, user tile, and so on. The account 120(a) may also include authentication data 120(3) (e.g., name and password) that is used to authenticate the client's 104(n) identity. A wide variety of other client data 120(A) is also contemplated, such as personalized emoticons, audio files, and so on.
Generally, any of the functions described herein can be implemented using software, firmware (e.g., fixed logic circuitry), manual processing, or a combination of these implementations. The terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, or a combination of software and firmware. In the case of a software implementation, the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code can be stored in one or more computer readable memory devices, further description of which may be found in relation to
The server 202(x) and the client 104(n) each include a respective processor 204(x), 206(n) and respective memory 208(x), 210(n). Processors are not limited by the materials from which they are formed or the processing mechanisms employed therein. For example, processors may be comprised of semiconductor(s) and/or transistors (e.g., electronic integrated circuits (ICs)). In such a context, processor-executable instructions may be electronically-executable instructions. Alternatively, the mechanisms of or for processors, and thus of or for a computing device, may include, but are not limited to, quantum computing, optical computing, mechanical computing (e.g., using nanotechnology), and so forth. Additionally, although a single memory 208(x), 210(n) is shown, respectively, for the server 202(x) and the client 104(n), a wide variety of types and combinations of memory may be employed, such as random access memory (RAM), hard disk memory, removable medium memory, and so forth.
As previously described, the services 112(s) of
Additionally, a service may also be provided as a stand-alone service. For example, an authentication service 216 may be provided by a server 218 configured for network 106 access and that has a processor 220 and memory 222. The authentication service 216 includes an authentication service module 224 that is executable on the processor 220 to authenticate the client 104(n) using authentication data 226(a), where “a” can be any integer from one to “A”. For instance, the client 104(n) may provide a name and password which is authenticated by the authentication service module 224 using the authentication data 226(a). When the authentication is successful (i.e., the client 104(n) “is who they say they are”), the authentication service module 224 may pass a token to the client 104(n) that is used by the client to access services 110(s) of the service provider 102(m). The token may also be used to access other services by other service providers such that the client 104(n) is not forced to re-authenticate to access each of the plurality of service providers 102(m). A variety of other examples are also contemplated.
The service manager module 114 is also illustrated as being executed on the processor 204(x) and is storable in memory 208(x) of the server 202(x). As previously described, the service manager module 114 is representative of functionality that manages interaction of the client 104(n) with the plurality of services 112(s) of
Exemplary Procedures
The following discussion describes user interface techniques that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks. In portions of the following discussion, reference will be made to the environment 100 of
A logon is performed of a user onto a suite of web services (block 302). For example, the user interface 400 of
Once authenticated, a user interface is output having a plurality of portions (block 308). For example, the user interface 500 of
The scenarios, for instance, may relate to relationships, information, inspiration and protection. These scenarios are represented by the portions in the user interface 600 of
For example, an expanded size portion 602 may be displayed that includes representations of a plurality of the web services and a search portion (block 314). Thus, this expanded size portion 602 enables the user to navigate to services of interest and search for particular items of interest, such as email, instant messages, images, web sites, documents, and so on.
The expanded size portion 602 may also display descriptions of previous actions performed by the user via a plurality of the web services (block 316). For example, the expanded size portion 602 may describe actions performed by the user in conjunction with an Internet search service (e.g., “Searched on Klondike Gold Rush”), interacted with a web log service (e.g., “Posted comment on John's space”), interacted with a productivity service (e.g., “Shared a Document with Dan”), interacted with an email service (e.g., “Draft mail to Ethan”), interacted with an image service (e.g., “Added photos to library”), interacted with a document sharing service (e.g., “Updated 060505_plan.doc”), and so on. Thus, the user may be provided with a history of their interaction with a plurality of web services of the web service suite 110.
Likewise, an expanded size portion may be displayed that describes previous action performed by other users (block 318), such as communication attempts made by the other users to contact the authenticated user. For instance, expanded portion 604 includes a section titled “Who's trying to reach you” which may describe communication attempts made by other users via instant messaging, email, voice over Internet Protocol (VoIP), and so on. This expanded size portion 604 also includes content that describes “what else is going on in the world” since last login, such as news, changes made to the client device 104(n) (e.g., “What's new on your computer”), and so on.
An expanded size portion 606 may also be utilized to describe one or more external representations of the user (block 320). In this instance, expanded size portion 606 describes how the user is “seen” by other users, such as through the use of one or more person as previously described.
Through use of these portions 502-508, 602-608, the user may customize the user interface (block 322) for a personalized experience. For example, as shown in the user interface 700 of
For example, an input may be received that selects one of the web service representations (block 324). In response to the input, an overlay is output of actions that are performable using the corresponding web service (block 326). For example, the user interface 800 of
In another example, an input is received to select additional content (block 328). In response to the input, an overlay is output in the user interface having representations of additional content that, when selected, causes the additional content to be included in the user interface (block 330). For example, the user interface 900 of
Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.
Number | Name | Date | Kind |
---|---|---|---|
7342587 | Danzig et al. | Mar 2008 | B2 |
20020087289 | Halabieh | Jul 2002 | A1 |
20020097277 | Pitroda | Jul 2002 | A1 |
20040012626 | Brookins | Jan 2004 | A1 |
20060136829 | Abbar et al. | Jun 2006 | A1 |
20070106952 | Matas et al. | May 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20070204233 A1 | Aug 2007 | US |