The present disclosure relates to peripherals for mobile devices and in one aspect relates to covers including flip covers for mobile devices.
Mobile devices may have various accessories, including cases or holders. Such items are designed to attach to, support or otherwise hold the mobile device. Examples of cases include flip type cases in which a cover may be folded over the screen of the mobile device when the device is not in use, sleeves, supports or other similar covers.
In some cases it may be useful for a mobile device to know the type of accessory associated with the device. For example, a type of flip cover may have a window at a particular location. In this case, the device may need to know the type of the flip cover in order to utilize the window properly.
In order to configure a device for use with a particular accessory, currently either the accessory type needs to be manually input into the mobile device, or in some cases electronics may be provided within the accessory to communicate with the device. Such electronics increase the cost of the cover and require specialized connections such as near field communications or an actual physical electrical connection to the cover of the device. Configuring the accessory within a menu on the mobile device is cumbersome and leads to a poor user experience.
The present disclosure will be better understood with reference to the drawings, in which:
The present disclosure provides a method at a mobile device for recognizing and adapting to a peripheral device, the method comprising: obtaining a reading from a magnetic sensor on the mobile device associated with a magnet on the peripheral device; determining, from the reading, at least one of a polarity or a magnetic field strength of the magnet; identifying a type of the peripheral device based on the at least one of the polarity or magnetic field strength of the magnet; and adapting the mobile device to the type of the peripheral device.
The present disclosure further provides a mobile device configured for recognizing and adapting to a peripheral device, the mobile comprising: a processor; a user interface; and a magnetic sensor, wherein the mobile device is configured to: obtain a reading from a magnetic sensor on the mobile device associated with a magnet on the peripheral device; determine, from the reading, at least one of a polarity or a magnetic field strength of the magnet; identify a type of the peripheral device based on the at least one of the polarity or magnetic field strength of the magnet; and adapt the mobile device to the type of the peripheral device.
The present disclosure further provides a non-transitory computer readable medium for storing instructions which when executed by a processor at a mobile device enable recognizing and adapting the mobile device to a peripheral device, the instructions comprising code for: obtaining a reading from a magnetic sensor on the mobile device associated with a magnet on the peripheral device; determining, from the reading, at least one of a polarity or a magnetic field strength of the magnet; identifying a type of the peripheral device based on the at least one of the polarity or magnetic field strength of the magnet; and adapting the mobile device to the type of the peripheral device.
The present disclosure is described below with regard to flip covers and sleeve covers for mobile devices. However, the present disclosure could be used with other types of accessories, including other device holders, chargers, docking stations, among others. The present disclosure is thus not limited to covers and the description of covers is utilized only for illustration purposes.
The present disclosure relates to techniques for identifying customized peripherals for a mobile device utilizing a magnetic field generated within the peripheral. In one example, a variety of covers with physical magnets may comprise the peripheral. The covers may come in a variety of types and the behavior of the device may be customized to suit the type of cover being used. In order to allow for this functionality, the device must identify the type of cover being used.
In accordance with one embodiment of the present disclosure, a magnetometer such as a Hall Effect sensor may be utilized within the mobile device to measure a magnetic field strength of a magnet within the mobile device peripheral. The polarity and/or the magnetic field strength may then be utilized to identify the peripheral from an enumerated list of peripherals for the device.
For example, a Hall Effect sensor capable of distinguishing between four magnetic field strengths and magnetic field polarities may be used to identify eight peripherals, since each of the magnetic field strengths may be recognized both in the positive and negative polarity. In other embodiments two peripherals may be identified based on the positive or negative polarity. In other embodiments, the Hall Effect sensor may be more sensitive and more devices may be identified. In still further embodiments, a plurality of magnets may be utilized with a plurality of Hall Effect sensors to expand the range of peripheral devices that may be identified.
Reference is now made to the Figures. Like numerals are used in the different drawings.
Referring to
In another example, as shown in
Similarly, reference is now made to
In a further embodiment, instead of having a single magnetic sensor, a device may have a plurality of magnetic sensors. For example, reference is now made to
In the embodiment of
In the example of
While the above discusses flip cases and windows, in other embodiments the behavior of the device may be customized for the flip case. In some instances, instead of a window, the case may not cover a portion of the screen and the behavior of the device may be modified for this aspect of the case. Other aspects of the case may also be identified and utilized by the device based on the magnetic strength of the one or more magnets in the case. For example, a particular case may have a button for a camera feature in a particular location corresponding to a button or key on the mobile device. The mobile device behavior may be modified to allow for the pressing of button or key on the device to take a picture. Thus the present disclosure is not limited to particular windows or features of the case, but rather allows for the identification of the peripheral by the mobile device in order to customize the behavior of the mobile device.
Further, instead of a flip case, the second peripheral may be a sleeve that the device may be placed in to. Reference is now made to
As seen in
Similar to the flip case, various customization may be provided with regard to the sleeve. For example, in
Thus, as seen in
As with the embodiments of
Further, as with the embodiment of
Besides flip cases and sleeves, the present disclosure could be used with other types of peripherals. Examples may include bicycle mounts for holding a mobile device, car mounts, running or exercise holders, or other type of cases, charging pads, among others.
In each of the embodiments, the mobile device identifies the peripheral through the use of the magnetic field and polarity of the magnet. Reference is now made to
In particular, the process of
The obtaining of the magnetic field readings may be done after a threshold amount of time in which the magnetic field is stable. Thus, for example, when the flip cover is being closed the magnetic field will vary as the cover is being closed. However, once the cover is closed for a threshold time period then the reading may be taken and may be determinative of the type of case that the device is in.
In one example, each magnetic sensor will continuously determine the magnetic field. As the case is closed the magnetic sensor will begin to detect an increasing magnetic field. After the case is closed the magnetic field will stabilize and the magnetic sensor can register a value after a threshold time period.
In one embodiment, the obtaining at block 1220 only obtains the polarity of each magnet. In other embodiments, the obtaining at block 1220 obtains a magnetic field strength but ignores polarity. In still another embodiment the obtaining at block 1220 obtains both a field strength and polarity for each magnet in the case.
Once the magnetic field information, including field strength and/or polarity, is identified at the magnetic field sensor, the process then proceeds to block 1230 in which the type of peripheral is determined. For example, the mobile device may have stored in memory a table indicating field strength and polarity with regard to various peripheral types. Such table may also be determinative of the type of behavior that the device should exhibit based on that peripheral.
Reference is made to Table 1 below, which shows a table for a case having a single magnet in which the magnetic field polarity may be determined, and in which four magnetic field strengths may be distinguished.
As seen in Table 1 above, the polarity may be positive or negative and the strength may be one of four values. This is merely meant as an example and in other cases fewer or more field strengths could be measured based on the type of sensor used within the mobile device.
In practice, a reading could be made by a magnetic sensor and the reading approximated to one of the enumerated values, such as those shown in Table 1.
In the example of Table 1 above, the peripheral is identified through a identifier such as a binary identifier and a behavior may be associated with each of the types of peripherals. In other cases the peripheral does not need to be specifically identified, but merely the behavior associated with the peripheral needs to be configured.
The behavior, for example, may be a particular file that specifies the type of information and the location of the information that the device should display when the peripheral is being utilized. In other cases the behavior may be enumerated directly in Table 1.
In another example, if two sensors are utilized, each having the ability to distinguish between two field strengths and the two polarities, then 16 peripherals may be identified. Reference is made to Table 2 below.
As seen in Table 2 above, the use of a sensors that can identify only two different field strengths and the polarity therefore leads to 16 combinations, meaning 16 peripherals can be identified.
Thus the number of peripherals identified can be varied based the number of sensors and magnets, and/or the sensitivity of such sensors to the differences in field strength.
Referring again to
From block 1240, the process proceeds to block 1250 and ends.
Tables 1 or 2 may be provided to the device during device manufacture. In other instances, the tables may be provisioned to the device, for example over the air or when the device establishes a connection to another computing device, among other options.
The different magnetic field strengths may be provided through the use of different sized magnets within the peripheral, or through the use of different magnetic materials for each peripheral device. Thus, a first peripheral device may use a larger sized magnet than a second peripheral device. The magnetic size may be varied based on the width (e.g. diameter), height or both of the magnet. In other cases different magnetic materials may be utilized within the different peripheral devices.
The orientation of the magnet can be used to change polarity
The magnetic sensor on the device may include a Hall Effect sensor, which are known to those in the art. Such Hall Effect sensors may include the ability to distinguish between the polarities of the magnet. The Hall Effect sensors may further include the ability to distinguish between various magnetic field strengths of the magnet.
The above may be utilized with any mobile device. One example of a mobile device is provided below with regard to
Mobile device 1300 may be any user equipment, and in one case may be a two-way wireless communication device having voice and data communication capabilities. Depending on the exact functionality provided, the mobile device may be referred to as a data messaging device, a two-way pager, a wireless e-mail device, a cellular telephone with data messaging capabilities, a wireless Internet appliance, a wireless device, a user equipment, or a data communication device, as examples.
Where mobile device 1300 is enabled for two-way communication, it may incorporate a communication subsystem 1311, including both a receiver 1312 and a transmitter 1314, as well as associated components such as one or more antenna elements 1316 and 1318, local oscillators (LOs) 1313, and a processing module such as a digital signal processor (DSP) 1320. As will be apparent to those skilled in the field of communications, the particular design of the communication subsystem 1311 will be dependent upon the communication network in which the device is intended to operate.
Network access requirements will also vary depending upon the type of network 1319. In some networks network access is associated with a subscriber or user of mobile device 1300. A mobile device may require a removable user identity module (RUIM) or a subscriber identity module (SIM) card in order to operate on a network. The SIM/RUIM interface 1344 is normally similar to a card-slot into which a SIM/RUIM card can be inserted and ejected. The SIM/RUIM card can have memory and hold many key configurations 1351, and other information 1353 such as identification, and subscriber related information.
When required network registration or activation procedures have been completed, mobile device 1300 may send and receive communication signals over the network 1319. As illustrated in
Signals received by antenna 1316 through communication network 1319 are input to receiver 1312, which may perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection and the like. A/D conversion of a received signal allows more complex communication functions such as demodulation and decoding to be performed in the DSP 1320. In a similar manner, signals to be transmitted are processed, including modulation and encoding for example, by DSP 1320 and input to transmitter 1314 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission over the communication network 1319 via antenna 1318. DSP 1320 not only processes communication signals, but also provides for receiver and transmitter control. For example, the gains applied to communication signals in receiver 1312 and transmitter 1314 may be adaptively controlled through automatic gain control algorithms implemented in DSP 1320.
Mobile device 1300 generally includes a processor 1338 which controls the overall operation of the device. Communication functions, including data and voice communications, are performed through communication subsystem 1311. Processor 1338 also interacts with further device subsystems such as the display 1322, flash memory 1324, random access memory (RAM) 1326, auxiliary input/output (I/O) subsystems 1328, serial port 1330, one or more keyboards or keypads 1332, speaker 1334, microphone 1336, other communication subsystem 1340 such as a short-range communications subsystem and any other device subsystems generally designated as 1342. Serial port 1330 could include a USB port or other port known to those in the art.
Processor 1338 may further interact with one or more magnetic sensors 1341 in accordance with the embodiments described above.
Some of the subsystems shown in
Operating system software used by the processor 1338 may be stored in a persistent store such as flash memory 1324, which may instead be a read-only memory (ROM) or similar storage element (not shown). Those skilled in the art will appreciate that the operating system, specific device applications, or parts thereof, may be temporarily loaded into a volatile memory such as RAM 1326. Received communication signals may also be stored in RAM 1326.
As shown, flash memory 1324 can be segregated into different areas for both computer programs 1358 and program data storage 1350, 1352, 1354 and 1356. These different storage types indicate that each program can allocate a portion of flash memory 1324 for their own data storage requirements. Processor 1338, in addition to its operating system functions, may enable execution of software applications on the mobile device. A predetermined set of applications that control basic operations, including at least data and voice communication applications for example, will normally be installed on mobile device 1300 during manufacturing. Other applications could be installed subsequently or dynamically.
Applications and software may be stored on any computer readable storage medium. The computer readable storage medium may be a tangible or in transitory/non-transitory medium such as optical (e.g., CD, DVD, etc.), magnetic (e.g., tape) or other memory known in the art.
One software application may be a personal information manager (PIM) application having the ability to organize and manage data items relating to the user of the mobile device such as, but not limited to, e-mail, calendar events, voice mails, appointments, and task items. Naturally, one or more memory stores would be available on the mobile device to facilitate storage of PIM data items. Such PIM application may have the ability to send and receive data items, via the wireless network 1319. Further applications may also be loaded onto the mobile device 1300 through the network 1319, an auxiliary I/O subsystem 1328, serial port 1330, short-range communications subsystem 1340 or any other suitable subsystem 1342, and installed by a user in the RAM 1326 or a non-volatile store (not shown) for execution by the processor 1338. Such flexibility in application installation increases the functionality of the device and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 1300.
In a data communication mode, a received signal such as a text message or web page download will be processed by the communication subsystem 1311 and input to the processor 1338, which may further process the received signal for output to the display 1322, or alternatively to an auxiliary I/O device 1328.
A user of mobile device 1300 may also compose data items such as email messages for example, using the keyboard 1332, which may be a complete alphanumeric keyboard or telephone-type keypad, among others, in conjunction with the display 1322 and possibly an auxiliary I/O device 1328. Such composed items may then be transmitted over a communication network through the communication subsystem 1311.
For voice communications, overall operation of mobile device 1300 is similar, except that received signals would typically be output to a speaker 1334 and signals for transmission would be generated by a microphone 1336. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on mobile device 1300. Although voice or audio signal output is generally accomplished primarily through the speaker 1334, display 1322 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information for example.
Serial port 1330 in
Other communications subsystems 1340, such as a short-range communications subsystem, is a further optional component which may provide for communication between mobile device 1300 and different systems or devices, which need not necessarily be similar devices. For example, the subsystem 1340 may include an infrared device and associated circuits and components or a Bluetooth™ communication module to provide for communication with similarly enabled systems and devices. Subsystem 1340 may further include non-cellular communications such as WiFi or WiMAX.
The embodiments described herein are examples of structures, systems or methods having elements corresponding to elements of the techniques of this application. This written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the techniques of this application. The intended scope of the techniques of this application thus includes other structures, systems or methods that do not differ from the techniques of this application as described herein, and further includes other structures, systems or methods with insubstantial differences from the techniques of this application as described herein.