Method and system for verifying transmission of multimedia messages

Information

  • Patent Grant
  • 10931811
  • Patent Number
    10,931,811
  • Date Filed
    Friday, April 21, 2017
    7 years ago
  • Date Issued
    Tuesday, February 23, 2021
    3 years ago
Abstract
Embodiments of the present invention provide a system for verifying sending of a voice or multimedia message. The system improves significantly over previous systems by preventing unwanted recording of messages, while also providing expedient user operation. A computing device receives a first trigger operation representing an instruction to generate a voice or multimedia message. The computing device records the voice or multimedia message, and receives a second trigger operation. In response to determining that the second trigger operation represents a send verification instruction, the device sends the voice or multimedia message to a second user or group. In response to determining that the second trigger operation represents a null instruction, the device cancels sending the voice or multimedia message.
Description
RELATED APPLICATION

Under 35 U.S.C. § 119, this application claims the benefit and right of priority of Chinese Patent Application No. 201610262275.1, filed 25 Apr. 2016, the disclosure of which is incorporated by reference herein. This application is related to U.S. patent application Ser. No. 15/179,592, entitled “METHOD AND APPARATUS FOR ACTIVATING APPLICATION FUNCTION” filed Jun. 10, 2016, which is incorporated herein by reference.


BACKGROUND
Field

The present disclosure relates to the field of communication technologies. More specifically, the present disclosure is related to a method and system for verifying transmission of multimedia messages.


Related Art

Various messaging applications, such as mobile instant messaging (IM) applications, have become ubiquitous in users' daily lives. Users can edit and transmit text messages via these applications, making their communications with one another cheaper, easier, and faster.


However, composing text messages can take considerable time. Moreover, spelling, typographical, or grammatical mistakes can occur, which can prompt repeated corrections by the sender, and frustrate the recipient. As a result, messaging applications often provide functions for sending voice, video, and multimedia messages, so users can communicate without having to type messages manually. However, such multimedia messaging functionality can also carry the risk of unintentionally recording or transmitting messages, increasing the potential for mistakes, miscommunication, and embarrassment.


SUMMARY

A system and method are provided for verifying sending of a voice or multimedia message. During operation, the system receives a first predefined trigger operation representing an instruction to generate a voice or multimedia message. The system then records the voice or multimedia message. The system receives a second predefined trigger operation. In response to determining that the second predefined trigger operation represents a verification instruction to send the voice or multimedia message, the system sends the voice or multimedia message to a second user or group. In response to determining that the second predefined trigger operation represents a null instruction, the system cancels sending of the voice or multimedia message.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1A illustrates a communication session window in an exemplary messaging application.



FIG. 1B illustrates recording a voice or multimedia message via an exemplary messaging application.



FIG. 1C illustrates an exemplary window for verifying sending of a voice or multimedia message.



FIG. 2A illustrates triggering recording of a voice or multimedia message by long-pressing an empty region of a communication session window.



FIG. 2B illustrates an exemplary page for recording, and verifying sending of, a voice or multimedia message.



FIG. 3 presents a flowchart illustrating a method for verifying sending of a voice or multimedia message, in accordance with an embodiment of the present invention.



FIG. 4 illustrates an exemplary user verification operation based on dragging a preset icon, in accordance with an embodiment of the present invention.



FIG. 5 illustrates an exemplary user verification operation based on dragging an icon to a preset target location, in accordance with an embodiment of the present invention.



FIG. 6 presents a flowchart illustrating a method for verifying sending of a voice or multimedia message by long-pressing an empty region of a window, in accordance with an embodiment of the present invention.



FIG. 7 illustrates triggering recording of a voice or multimedia message by long-pressing an empty region of a message list window, in accordance with an embodiment of the present invention.



FIG. 8 illustrates an exemplary page for verifying sending of a voice or multimedia message, in accordance with an embodiment of the present invention.



FIG. 9 presents a flowchart illustrating a method for verifying sending of a voice or multimedia message within an instant messaging application, in accordance with an embodiment of the present invention.



FIG. 10 presents a block diagram illustrating an exemplary system for verifying sending of a voice or multimedia message, according to embodiments of the present invention.





In the figures, like reference numerals refer to the same figure elements.


DETAILED DESCRIPTION

The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.


Overview


Embodiments of the present invention solve the problem of inadvertent recording of voice or multimedia messages by facilitating dependable yet expedient verification by a user. The system improves significantly over previous systems by providing more reliable user operation, while providing efficiency and simplicity of use. The system can record and send a voice or multimedia message to a target recipient, subject to a sender's explicit verification. The system gives the sender sufficient opportunity to cancel these operations, hence avoiding unwanted and accidental recording or transmission of messages.


Recording and Transmission of Voice or Multimedia Messages



FIG. 1A illustrates a communication session window 100 in an exemplary messaging application. As shown in FIG. 1A, two users Xiaohei and Xiaobai can exchange messages in a communication session. Xiaohei can enter text directly via input box 102 at the bottom of the session window. Xiaohei can also tap on microphone icon 104, next to input box 102, to initiate the voice or multimedia message function.



FIG. 1B illustrates recording a voice or multimedia message via an exemplary messaging application. When Xiaohei presses microphone icon 104, the messaging application's user interface may display a voice or multimedia acquisition layout, such that input box 102 converts to a voice acquisition function button 110. A notification, such as “hold to talk,” can display on button 110, prompting Xiaohei to record a message.



FIG. 1C illustrates an exemplary window for verifying sending of a voice or multimedia message. When Xiaohei presses voice acquisition button 110, the communication session window may convert to the layout shown in FIG. 1C, and recording can begin. Moreover, notification 120 such as “release to send” or “slide up to cancel” and timing information, such as “0:05” and indicative voice waveform 122 can inform Xiaohei that a voice or multimedia message is being acquired.


If Xiaohei has used the voice acquisition function recently, Xiaohei's mobile interface can remain in the voice acquisition layout as shown in FIG. 1B, and recording may falsely trigger if Xiaohei accidentally taps button 110. Furthermore, if Xiaohei records a voice message without realizing, Xiaohei might not be able to prevent transmission of the message by performing an active cancellation gesture, such as “sliding up.”


Meanwhile, some applications provide more convenient voice input functions. FIG. 2A illustrates triggering recording of a voice or multimedia message by press-and-holding an empty region of a communication session window 200. As shown in FIG. 2A, Xiaohei can press-and-hold empty region 202 of session window 200 to initiate recording. Triggering an application function by press-and-holding an empty space is described further in U.S. patent application Ser. No. 15/179,592, entitled “METHOD AND APPARATUS FOR ACTIVATING APPLICATION FUNCTION” filed Jun. 10, 2016, which is incorporated herein by reference. FIG. 2B illustrates an exemplary page 210 for recording and verifying transmission of a voice or multimedia message. After Xiaohei press-and-holds region 202, the user interface displays to a multimedia acquisition page as shown in FIG. 2B. Xiaohei's device can then initiate recording of the voice message. Acquisition page 210 may include a preset icon 212 and exemplary voice waveform and timing information 214 to inform Xiaohei that the voice message is being acquired. Information 214 may also include operational instructions regarding the use of icon 212, such as “release to send, slide up to cancel.”


However, in the scenario shown in FIG. 2A, Xiaohei could press empty region 202 inadvertently. In particular, region 202 is part of this application's standard communication session view 200. If region 202 occupies a large display area of window 200, it could be more likely than in the scenario of FIG. 1B for Xiaohei to trigger media acquisition inadvertently. If Xiaohei triggered media acquisition by pressing region 202 without knowledge, Xiaohei typically is not able to prevent transmission of the message by an active cancellation gesture, such as “sliding up.”


Verifying Sending of a Voice or Multimedia Message



FIG. 3 presents a flowchart illustrating a method 300 for verifying sending of a voice or multimedia message, in accordance with an embodiment of the present invention. Method 300 can be performed by devices running a messaging application, for example an instant messaging (IM) or enterprise instant messaging (EIM) application. One such EIM application is “DingTalk.”


During operation, the system checks whether a user's predefined triggering operation is detected (operation 302). The triggering operation represents an instruction by the user to generate a voice or multimedia message. In some embodiments, the user's predefined triggering operation can include a touch operation or gesture of the user, such as those listed in Table 1. In some embodiments, the system can allow the user to select the predefined triggering operation from a menu of such possibilities.









TABLE 1





Touch operations or gestures







Tap or press


Two-finger tap


Long-press


Finger release


Sliding


Dragging


Dragging to a target location


Thumb trace or arc


Pinch gesture


Pan gesture


Zoom gesture









Responsive to detecting the predefined triggering operation, the system starts the voice, video, or multimedia acquisition function (operation 304). For example, the user's mobile device may record voice using a built-in microphone, and may also record video using a built-in camera. The multimedia acquisition function can also be used for generating any other type of multimedia message, which is not limited by the present disclosure. The system can display a media acquisition screen or dialog, with a message such as “slide to finish recording.” As described further below, the acquisition screen or dialog can include a preset icon and/or a target for dragging. In some embodiments, the system may use an auxiliary voice or vibration prompt to inform the user when the voice or multimedia input function starts and/or ends.


Next, the system checks whether a user's predefined verification operation is detected (operation 306). The verification operation represents a confirmation instruction by the user to complete recording and/or to send the message. Responsive to detecting the predefined verification operation to confirm sending, the system then sends the acquired voice, video, or multimedia message (operation 308). Alternatively, the verification operation could instead receive a nullification instruction by the user to cancel sending and/or recording, or to redo the recording, of the message. After detecting such a nullification instruction, the system can cancel sending of the voice or multimedia message.


The user's predefined verification operation may include a second touch operation or gesture of the user, such as one of those listed in Table 1. The system may also allow the user to select the predefined verification operation from a menu of possibilities. In some embodiments, the second touch operation is continuous with the first touch operation. That is, the system can allow the user to perform both the first touch operation, indicative of an instruction to record the message, and the second touch operation, indicative of a confirmation instruction, continuously without lifting his or her finger. For example, suppose the first touch operation involves a tap, press, or long-press, and the second touch operation involves a sliding or dragging motion. Then these two operations represent distinct instructions, yet can be performed continuously.


User Verification Based on Dragging a Preset Icon


As mentioned above, the multimedia message acquisition screen can include a preset icon and/or a target for dragging. By making use of such a preset icon (by contrast with a configuration based on “release to send”), the system can improve reliability and minimize the chance of inadvertent transmission.



FIG. 4 illustrates an exemplary user verification operation based on dragging a preset icon, in accordance with an embodiment of the present invention. If the system shows a preset icon 402 on the voice or multimedia message acquisition page, icon 402 can additionally serve as a notification that recording has been activated, i.e. that voice or multimedia acquisition is in the “active” state. To prompt the user to press icon 402, the system may display icon 402 as a fingerprint or similar pattern. The user's verification operation can include dragging icon 402 by a minimum threshold distance (e.g. to location 404), in a particular direction, or to a preset trigger area. In some embodiments, the system can determine whether the user successfully moves an icon object such as 402 from a first position to a second position, such as location 404, in order to satisfy the user verification operation. In one embodiment, the system can impose a specific condition for the user's verification. For example, the user can be required to drag icon 402 to satisfy such conditions, which confirms the user's will, so the system can appropriately cancel accidental touching operations that might transmit the message by mistake.



FIG. 5 illustrates an exemplary user verification operation based on dragging an icon to a preset target location, in accordance with an embodiment of the present invention. The target location can be a fixed position on the current page, for example, the preset area marked by circular dotted line 504. When icon 502 is dragged to preset area 504 (e.g., partially or fully entering area 504), the system can consider the preset icon to be dragged to the target location, thereby confirming recording and/or transmission of the message. With the preset area in a fixed position, the verification condition to determine user intent can be relatively stringent, reducing the probability of false verification.


Alternatively, in some embodiments, the system may display preset icon 502 where the user triggering operation occurs, and locate preset verification area 504 relative to preset icon 502 (e.g., near icon 502). Such an arrangement can improve expediency, reduce complexity, and minimize disruption of the user's normal operation, e.g. by facilitating continuity of the triggering and verification operations. For example, because icon 502 is displayed where triggering occurs, the user can continue directly from triggering to dragging icon 502 to location 504, without lifting his or her finger. Likewise, when the preset verification area is located near preset icon 502, the user only needs to drag icon 402 a conveniently short distance.


Preventing Unintentional Transmission


In some embodiments of the present invention, if the user does not carry out both the triggering and verification operations, a message will not be sent. Note that, as described above, the system can adopt different user operations (possibly chosen by the user) as the triggering and verification operations. For example, the triggering operation could be configured as a screen press operation, whereas verification is a sliding operation. In this embodiment, if accidental touching occurs, it can only correspond at most to a single user operation. The user triggering and verification operations will not both coincide with a single accidental touching event, and the system thus prevents unintentional sending of the multimedia message.


By contrast, in existing systems, voice acquisition only requires one user operation—or at most one type of user operation. For example, referring back to FIG. 1A, in existing systems, voice acquisition can be triggered when a user presses microphone icon 104 or voice acquisition function button 110, and sending is confirmed when the user releases button 110. As a result, existing systems would record and send a multimedia message if a user accidentally presses his or her device, and subsequently releases contact with the device, whether intentionally or not.


By contrast with this existing “release to send and slide up to cancel” configuration, the present system can instead employ a “drag to send and release to cancel” configuration. In fact, consider that by replacing the “release to send” configuration with a “drag to send” configuration, the system can improve reliability and minimize unwanted transmission. By the same token, by replacing “slide up to cancel” with “release to cancel,” the system simplifies operational complexity in order to cancel transmission, thereby enhancing user experience.


Note also that a qualitative difference between the triggering operation and verification operation, safeguards against inadvertent sending. Moreover, accidental touching is typically a sudden incident (e.g., the user brushes the device inadvertently during movement). Therefore, by keeping the triggering and verification operations continuous, longer, and less likely to occur accidentally, the system can effectively prevent such problems. Clearly, the disclosed system and methods provide improved identification of the user's actual intention, while acquiring multimedia messages in accordance with the user's actual preferences, and avoiding erroneously sending spuriously recorded messages.


Verifying Message Sending Based on Long-Pressing a Region


In some embodiments, the present invention may preferably employ long-pressing in an empty region as the user's triggering operation, and dragging of a preset icon as the verification operation. Such operations can demarcate the user's intention especially reliably, so as to prevent unintentional recording and transmission. Yet these operations also provide especially convenient and expeditious operation to the user, in particular allowing the user to perform both operations in a single continuous motion.


Here we consider in detail the system's operation in such embodiments. FIG. 6 presents a flowchart illustrating a method 600 for verifying sending of a voice or multimedia message by long-pressing an empty region of a window, in accordance with an embodiment of the present invention. In these embodiments, the system first detects a touch event (operation 602). The system then determines whether the touch event is a long-press event in an empty region of the current display (operation 604). That is, the system checks for a user's long-press in a region of the screen not containing any messages (including words, pictures, voice and emoticons). Note that step 604 coincides with step 302 of method 300, detecting the user triggering operation. A person skilled in the art will appreciate that the long-press operation discussed here is exemplary, and that the user triggering operation may be another operation such as those listed in Table 1, or any other operation, not limited by the present invention.


In response to detecting the long-press event in an empty region, the system can initiate the voice, video, or multimedia acquisition function (operation 606). The system then displays a preset icon and preset area (operation 608). The system may then detect a user dragging event (operation 610), and check whether the user has dragged the preset icon into the preset area (operation 612).


Here, a user dragging or sliding event can correspond to sliding of the user's finger, in contact with the preset icon, while the device displays the icon sliding synchronously with the touch point on the screen. A person skilled in the art will appreciate that dragging to the preset area is presented here as an exemplary operation, and the user verification operation may be any other operation. For example, the verification operation could include a thumb trace in an arc according to a minimum or maximum angular displacement, an operation the user can perform while holding the device with a single hand.


In some embodiments, the system may record the voice or multimedia message during active user triggering, and stop recording when the user ceases the triggering operation. Optionally, where the triggering operation is continuous with verification, if the user's finger remains in contact with the device without sliding, recording can continue; alternatively, if the user's finger slides or lifts from the device, recording can be stopped. In addition, in embodiments where triggering is continuous with verification, the system can continue recording until the user completes the verification operation (e.g., the icon dragging behavior), and then cease. This can allow the user to continue recording a message even in the case of beginning to slide the icon accidentally.


In some embodiments, the system can preview the message for the user. If the system detects the user's predefined preview operation, the system can stop recording, and play back the message (e.g., through the device's built-in loudspeaker and display, or an external headset), so the user can decide whether to confirm sending. For example, as shown in FIG. 5, the user verification operation is dragging icon 502 upward to preset area 504, the user preview operation may be dragging icon 502 downward a preset distance. The user preview operation can also be any other gesture, such as those listed in Table 1, that is distinct from the triggering and verification operations. In some embodiments, the system may automatically preview the message when recording completes. Consider that, even if transmission in existing systems can be canceled, the user may still be unable to determine whether he or she is satisfied with the current voice message. By virtue of previewing, the user can choose whether to send the message, improving usability. Moreover, if the message is long, the user may avoid canceling an actually satisfactory message, thus improving recording efficiency.


In some embodiments, when starting or ceasing recording, the system can execute an auxiliary reminder operation to notify the user of the change in state. For example, the reminder can include: playback of preset reminder audio, device vibration, flashing LED or light, device display flicker (e.g., suddenly adjusting to maximum brightness and maintaining for 0.5 seconds before restoring to initial brightness), and any other reminder operation.


Referring back to FIG. 6, in response to determining the preset icon has been dragged into the preset area, the system can send the voice or multimedia message (operation 614). By differentiating between the start of the voice acquisition function and the transmission of the message, the system uses the verification operation to determine whether actually to send the acquired message.


In some embodiments, the system can automatically determine the recipient or target object for the message. For example, when the user triggering operation occurs in an empty region of a communication session window, the recipient with whom the user corresponds in that communication session can be taken as the target object. Similar configurations can be implemented for group chats with multiple recipients.


Note that in some embodiments, the system can also allow triggering in a non-communication session window. Such direct triggering may enhance usability by providing the user a shortcut to recording without the need to enter into a communication application first. In some embodiments, such a direct triggering option may be user-configurable. FIG. 7 illustrates triggering recording of a voice or multimedia message by long-pressing an empty region 700 of a message list window, in accordance with an embodiment of the present invention. If the user long-presses empty region 700 in a non-communication session window, as in FIG. 7, the system may still determine that triggering has occurred, and initiate recording.



FIG. 8 illustrates an exemplary page for verifying sending of a voice or multimedia message, in accordance with an embodiment of the present invention. After acquisition of the message is stopped, as shown, the system may present a variety of options to the user. When the user selects the “Send Immediately” option 802, the system can select a target for sending, e.g. by taking a recipient of the selected communication session window as the target object. When the user instead selects option “Some Other Time” 804, the system need not immediately determine a target, and can instead cache the acquired message. In some embodiments, the user can instruct the system to cache the message by performing another gesture, such as those listed in Table 1. The user can then view, delete, and send the cached message at any time (or, in some embodiments, within a certain period of time) and choose a recipient at the time of sending.


In some embodiments, the system may automatically determine the recipient when sending the cached messages. The system can also cache messages that have already been sent, and the user can resend such cached messages to any target objects, including ones other than the original recipient. Furthermore, the user can replay cached messages, e.g. before deciding to send.


Verifying Sending within an Instant Messaging Application



FIG. 9 presents a flowchart illustrating a method 900 for verifying sending of a voice or multimedia message within an instant messaging application, in accordance with an embodiment of the present invention. During operation, the system can display a communication session window between a user and a recipient, wherein there is an empty region between message session contents displayed on the window (operation 902). The system then checks whether a user trigger operation is detected in the empty region (operation 904). Responsive to detecting the user trigger operation, the system then displays a voice or multimedia acquisition window and starts the voice or multimedia acquisition function, wherein the voice or multimedia acquisition window can include a preset icon and preset trigger area (operation 906). The system then checks whether the user has dragged the preset icon to the preset trigger area (operation 908). Responsive to detecting the user has dragged the preset icon to the preset area, the system then sends the acquired voice or multimedia message to the recipient from the communication session window (operation 910), or to a recipient determined by another method, as described above.


Exemplary Embodiments


One embodiment of the present invention provides a system and method for verifying sending of a voice or multimedia message. During operation, the system receives a first operation representing an instruction to allow a voice or multimedia message to be generated. The system then records the voice or multimedia message. Subsequently, the system receives a second operation. In response to determining that the second operation corresponds to a verification instruction to allow the voice or multimedia message to be sent, the system sends the voice or multimedia message to a second user or group.


In a variation on this embodiment, the first operation comprises a first touch operation of the user, and the second predefined trigger operation comprises a second touch operation of the user.


In a variation on this embodiment, the first operation and the second operation each comprise one or more of: a tap or press operation; a two-finger tap operation; a long press operation; a finger release operation; a sliding operation; a dragging operation; a dragging operation to a target location; a thumb trace operation; a pinch gesture operation; a pan gesture operation; and a zoom gesture operation.


In a variation on this embodiment, the first operation includes a long-press touch operation in an empty region unoccupied by any message within a communication session window.


In a variation on this embodiment, determining that the second operation corresponds to the verification instruction includes determining whether an icon object has been moved from a first position to a second position.


In a variation on this embodiment, the second operation is continuous with the first predefined trigger operation.


In a variation on this embodiment, the system further displays an icon to prompt the user for one or more of: beginning to record the voice or multimedia message; finishing to record the voice or multimedia message; and sending the voice or multimedia message.


In a variation on this embodiment, the system further generates an auxiliary voice or vibration prompt to inform the user of one or more of: beginning to record the voice or multimedia message; finishing to record the voice or multimedia message; and sending the voice or multimedia message.


In a variation on this embodiment, the system verifies sending of the voice or multimedia message within an instant messaging (IM) or enterprise instant messaging (EIM) application.


Exemplary Computer System



FIG. 10 presents a block diagram illustrating an exemplary system or digital device for verifying sending of a voice or multimedia message, according to embodiments of the present invention. In FIG. 10, digital device 1000 includes one or more processors 1002, a memory 1004, and a storage device or solid-state non-volatile memory 1006. Storage device 1006 typically stores instructions that can be loaded into memory 1004 and executed by processor 1002 to perform the methods mentioned above. As a result, system 1000 can perform the functions described above. Digital device 1000 can also include camera 1008 and microphone 1010, which can be used to record voice and/or multimedia messages, according to embodiments of the present invention. Digital device 1000 may also be coupled via one or more network interfaces to one or more networks. Specifically, device 1000 may be connected to local network, wireless network, or internet 1012, and may communicate with server 1014 via such a network. In some embodiments, server 1014 can perform some functions of the present invention, for example transmitting or serving up recorded voice and/or multimedia messages.


In one embodiment, processor 1002 can execute instructions in storage device 1006 in order to implement operating system 1030 and message verifying system 1032, which can comprise various modules. In one embodiment, instructions in storage device 1006 can implement a trigger receiving module 1034, a message recording module 1036, and a message sending module 1038.


Trigger receiving module 1034 can obtain instructions to receive the user triggering operation, which may include a first touch behavior. Message recording module 1036 may record a voice, video, or multimedia message. Message sending module 1038 may add the target user as a recipient of the alert.


In some embodiments, modules 1034, 1036, and 1038 can be partially or entirely implemented in hardware and can be part of processor 1002. Further, in some embodiments, the system may not include a separate processor and memory. Instead, in addition to performing their specific tasks, modules 1034, 1036, and 1038, either separately or in concert, may be part of general- or special-purpose computation engines.


The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. The computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media capable of storing computer-readable media now known or later developed.


The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium.


Furthermore, methods and processes described herein can be included in hardware modules or apparatus. These modules or apparatus may include, but are not limited to, an application-specific integrated circuit (ASIC) chip, a field-programmable gate array (FPGA), a dedicated or shared processor that executes a particular software module or a piece of code at a particular time, and/or other programmable-logic devices now known or later developed. When the hardware modules or apparatus are activated, they perform the methods and processes included within them.


The foregoing descriptions of various embodiments have been presented only for purposes of illustration and description. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention.

Claims
  • 1. A computer-executed method for verifying sending of voice messages, comprising: displaying, by a mobile computing device on a touchscreen display, a message-list user interface comprising a list of previously sent messages;detecting, by the mobile computing device, a first operation of a user on the touchscreen display, wherein the first operation comprises contacting a first empty region positioned between two adjacent entries of the list of previously sent messages;in response to detecting the user contacting the first empty region positioned between the two adjacent entries of the list of previously sent messages, displaying, on the touchscreen display, a voice-acquisition user interface on top of the message-list user interface, wherein the voice-acquisition user interface replaces the list of previously sent messages and displays an icon corresponding to the first empty region and a target area corresponding to a second empty region on the touch screen display while recording a voice message from the user, wherein the second empty region is different from the first empty region; andin response to detecting, by the mobile computing device, a second operation of the user on the touchscreen display that drags the displayed icon to the target area, sending the recorded voice message to a second user or group.
  • 2. The method of claim 1, wherein the first operation and the second operation each comprise one or more of: a tap or press operation;a two-finger tap operation;a long press operation;a finger release operation;a sliding operation;a dragging operation;a thumb trace operation;a pinch gesture operation;a pan gesture operation; anda zoom gesture operation.
  • 3. The method of claim 1, wherein the first operation comprises a long-press touch operation, and wherein the first empty region is unoccupied by any entry within a non-communication session window comprising the list of previously sent messages prior to the user performing the first operation.
  • 4. The method of claim 1, further comprising determining that the second operation corresponds to a verification instruction that allows the voice message to be sent.
  • 5. The method of claim 1, wherein the second operation is continuous with the first operation.
  • 6. The method of claim 1, further comprising displaying an icon to prompt the user for one or more of: beginning to record the voice message;finishing to record the voice message; andsending the voice message.
  • 7. The method of claim 1, further comprising generating an auxiliary voice or vibration prompt to inform the user of one or more of: beginning to record the voice message;finishing to record the voice message; andsending the voice message.
  • 8. The method of claim 1, wherein the method is performed within an instant messaging (IM) or enterprise instant messaging (EIM) application.
  • 9. A non-transitory computer-readable storage medium storing instructions that, when executed by a computer, cause the computer to perform a method for verifying sending of voice messages, the method comprising: displaying, by a mobile computing device on a touchscreen display, a message-list user interface comprising a list of previously sent messages;detecting, by the mobile computing device, a first operation of a user on the touchscreen display, wherein the first operation comprises contacting a first empty region positioned between two adjacent entries of the list of previously sent messages;in response to detecting the user contacting the first empty region positioned between the two adjacent entries of the list of previously sent messages, displaying, on the touchscreen display, a voice-acquisition user interface on top of the message-list user interface, wherein the voice-acquisition user interface replaces the list of previously sent messages and displays an icon corresponding to the first empty region and a target area corresponding to a second empty region on the touch screen display while recording a voice message from the user, wherein the second empty region is different from the first empty region; andin response to detecting, by the mobile computing device, a second operation of the user on the touchscreen display that drags the displayed icon to the target area, sending the recorded voice message to a second user or group.
  • 10. The non-transitory computer-readable storage medium of claim 9, wherein the first operation and the second operation each comprise one or more of: a tap or press operation;a two-finger tap operation;a long press operation;a finger release operation;a sliding operation;a dragging operation;a thumb trace operation;a pinch gesture operation;a pan gesture operation; anda zoom gesture operation.
  • 11. The non-transitory computer-readable storage medium of claim 9, wherein the first operation comprises a long-press touch operation, and wherein the first empty region is unoccupied by any entry within a non-communication session window comprising the list of previously sent messages prior to the user performing the first operation.
  • 12. The non-transitory computer-readable storage medium of claim 9, wherein the method further comprises determining that the second operation corresponds to a verification instruction that allows the voice or multimedia message to be sent.
  • 13. The non-transitory computer-readable storage medium of claim 9, wherein the second operation is continuous with the first operation.
  • 14. The non-transitory computer-readable storage medium of claim 9, wherein the method further comprises displaying an icon to prompt the user for one or more of: beginning to record the voice message;finishing to record the voice message; andsending the voice message.
  • 15. The non-transitory computer-readable storage medium of claim 9, wherein the method further comprises generating an auxiliary voice or vibration prompt to inform the user of one or more of: beginning to record the voice message;finishing to record the voice message; andsending the voice message.
  • 16. A computing system for verifying sending of voice messages, the system comprising: a set of processors; anda non-transitory computer-readable medium coupled to the set of processors storing instructions thereon that, when executed by the processors, cause the processors to perform a method for verifying sending of a voice message, the method comprising: displaying, by a mobile computing device on a touchscreen display, a message-list user interface comprising a list of previously sent messages;detecting, by the mobile computing device, a first operation of a user on the touchscreen display, wherein the first operation comprises contacting a first empty region positioned between two adjacent entries of the list of previously sent messages;in response to detecting the user contacting the first empty region positioned between the two adjacent entries of the list of previously sent messages, displaying, on the touchscreen display, a voice-acquisition user interface on top of the message-list user interface, wherein the voice-acquisition user interface replaces the list of previously sent messages and displays an icon corresponding to the first empty region and a target area corresponding to a second empty region on the touch screen display while recording a voice message from the user, wherein the second empty region is different from the first empty region; andin response to detecting, by the mobile computing device, a second operation of the user on the touchscreen display that drags the displayed icon to the target area, sending the recorded voice message to a second user or group.
  • 17. The computing system of claim 16, wherein the first operation and the second operation each comprise one or more of: a tap or press operation;a two-finger tap operation;a long press operation;a finger release operation;a sliding operation;a dragging operation;a thumb trace operation;a pinch gesture operation;a pan gesture operation; anda zoom gesture operation.
  • 18. The computing system of claim 16, wherein the first operation comprises a long-press touch operation, and wherein the first empty region was unoccupied by any entry within a non-communication session window comprising the list of previously sent messages prior to the user performing the first operation.
  • 19. The computing system of claim 16, wherein the method further comprises determining that the second operation corresponds to a verification instruction that allows the voice message to be sent.
  • 20. The computing system of claim 16, wherein the second operation is continuous with the first operation.
Priority Claims (1)
Number Date Country Kind
201610262275.1 Apr 2016 CN national
US Referenced Citations (160)
Number Name Date Kind
6424711 Bayless Jul 2002 B1
7035923 Yoakum Apr 2006 B1
7133687 El-Fishawy Nov 2006 B1
7159191 Koivuniemi Jan 2007 B2
7197122 Vuori Mar 2007 B2
7398252 Neofytides Jul 2008 B2
7603413 Herold Oct 2009 B1
7653691 Lasensky Jan 2010 B2
7669134 Christie Feb 2010 B1
7835955 Brodsky Nov 2010 B1
8165609 Fang Apr 2012 B2
8316096 Svendsen Nov 2012 B2
8352341 Greenberg Jan 2013 B1
8355699 Lo Jan 2013 B1
8548865 Ho Oct 2013 B1
8670791 Ye Mar 2014 B2
8768310 Oroskar Jul 2014 B1
8769022 Tivyan Jul 2014 B2
8788602 Wan Jul 2014 B1
8843117 Sigmund Sep 2014 B2
8856244 Madnani Oct 2014 B2
8880725 Ananthanarayanan Nov 2014 B2
8929871 Bradburn Jan 2015 B2
8968103 Zhou Mar 2015 B2
9021040 Andrews Apr 2015 B1
9117197 Sharma Aug 2015 B1
9143477 Murthy Sep 2015 B2
9185062 Yang Nov 2015 B1
9230244 Patil Jan 2016 B2
9253639 Lafuente Feb 2016 B1
9578160 Kim Feb 2017 B2
9800525 Lerner Oct 2017 B1
10021203 Papakipos Jul 2018 B2
10200332 Wu Feb 2019 B2
10417037 Gruber Sep 2019 B2
20020016163 Burgan Feb 2002 A1
20020120453 Lee Aug 2002 A1
20030084109 Balluff May 2003 A1
20030135559 Bellotti Jul 2003 A1
20030154249 Crockett Aug 2003 A1
20040002932 Horvitz Jan 2004 A1
20040006599 Bates Jan 2004 A1
20040085360 Pratt May 2004 A1
20040102962 Wei May 2004 A1
20050149855 Loo Jul 2005 A1
20050177368 Odinak Aug 2005 A1
20060093142 Schneier May 2006 A1
20060229890 Sattler Oct 2006 A1
20070060193 Kim Mar 2007 A1
20070105572 Kim May 2007 A1
20070123223 Letourneau May 2007 A1
20070233801 Eren Oct 2007 A1
20070299565 Oesterling Dec 2007 A1
20080112596 Rhoads May 2008 A1
20080114776 Sun May 2008 A1
20080168361 Forstall Jul 2008 A1
20080168379 Forstall Jul 2008 A1
20080307040 So Dec 2008 A1
20080307094 Karonen Dec 2008 A1
20090018903 Iyer Jan 2009 A1
20090240497 Usher Sep 2009 A1
20090287776 Corry Nov 2009 A1
20100004971 Lee Jan 2010 A1
20100005402 George Jan 2010 A1
20100017481 Chen Jan 2010 A1
20100023341 Ledbetter Jan 2010 A1
20100056109 Wilson Mar 2010 A1
20100105362 Yang Apr 2010 A1
20100205541 Rapaport Aug 2010 A1
20100216448 Jeon Aug 2010 A1
20100257490 Lyon Oct 2010 A1
20100323752 Park Dec 2010 A1
20110019662 Katis Jan 2011 A1
20110035687 Katis Feb 2011 A1
20110136431 Haaramo Jun 2011 A1
20110145823 Rowe Jun 2011 A1
20110173041 Breitenbach Jul 2011 A1
20110173548 Madnani Jul 2011 A1
20110243113 Hjelm Oct 2011 A1
20110258559 You Oct 2011 A1
20110313803 Friend Dec 2011 A1
20110314402 Kikin-Gil Dec 2011 A1
20120030301 Herold Feb 2012 A1
20120046077 Kim Feb 2012 A1
20120059842 Hille-Doering Mar 2012 A1
20120084308 Kang Apr 2012 A1
20120108268 Lau May 2012 A1
20120185547 Hugg Jul 2012 A1
20120290950 Rapaport Nov 2012 A1
20120311585 Gruber Dec 2012 A1
20130069969 Chang Mar 2013 A1
20130080580 Nagai Mar 2013 A1
20130086071 Riedel Apr 2013 A1
20130133055 Ali May 2013 A1
20130138726 Shin May 2013 A1
20130144702 Tabor Jun 2013 A1
20130173723 Herold Jul 2013 A1
20130227029 Hymel Aug 2013 A1
20130227041 Rideout Aug 2013 A1
20130268418 Sardi Oct 2013 A1
20130268765 Kent, Jr. Oct 2013 A1
20130275164 Gruber Oct 2013 A1
20130297493 Linden Nov 2013 A1
20130298006 Good Nov 2013 A1
20130311920 Koo Nov 2013 A1
20130332162 Keen Dec 2013 A1
20130332307 Linden Dec 2013 A1
20140025546 Seng Jan 2014 A1
20140035956 Hay Feb 2014 A1
20140070945 Dave Mar 2014 A1
20140074483 Van Os Mar 2014 A1
20140085487 Park Mar 2014 A1
20140101263 Wu Apr 2014 A1
20140164073 Mosley Jun 2014 A1
20140184544 Lim Jul 2014 A1
20140191986 Kim Jul 2014 A1
20140207659 Erez Jul 2014 A1
20140213318 Leem Jul 2014 A1
20140279315 Courter Sep 2014 A1
20140280615 Burlin Sep 2014 A1
20140297348 Ellis Oct 2014 A1
20140331150 Griffin Nov 2014 A1
20140372516 Watte Dec 2014 A1
20150039708 Liu Feb 2015 A1
20150081486 Niazi Mar 2015 A1
20150135046 Moore May 2015 A1
20150170104 Yamada Jun 2015 A1
20150207926 Brown Jul 2015 A1
20150256353 Busey Sep 2015 A1
20150264303 Chastney Sep 2015 A1
20150296450 Koo Oct 2015 A1
20150310567 Wu Oct 2015 A1
20150317590 Karlson Nov 2015 A1
20150346821 Ichimura Dec 2015 A1
20150350130 Yang Dec 2015 A1
20150350225 Perold Dec 2015 A1
20160048288 Lee Feb 2016 A1
20160055215 Kauwe Feb 2016 A1
20160062574 Anzures Mar 2016 A1
20160094509 Ye Mar 2016 A1
20160125363 Hung May 2016 A1
20160132971 Teh May 2016 A1
20160180845 Kim Jun 2016 A1
20160202889 Shin Jul 2016 A1
20160205049 Kim Jul 2016 A1
20160227019 Seol Aug 2016 A1
20160242007 Mihara Aug 2016 A1
20160330163 Le Gall Nov 2016 A1
20170041255 Dong Feb 2017 A1
20170118147 Dold Apr 2017 A1
20170142212 Bifulco May 2017 A1
20170171135 Wu Jun 2017 A1
20170185930 Perry Jun 2017 A1
20170185965 Nishizawa Jun 2017 A1
20170228699 Pang Aug 2017 A1
20170250937 Chien Aug 2017 A1
20170300537 Kim Oct 2017 A1
20180088784 Zhu Mar 2018 A1
20190012527 Wang Jan 2019 A1
20190014070 Mertvetsov Jan 2019 A1
Foreign Referenced Citations (17)
Number Date Country
101094233 Dec 2007 CN
103632332 Mar 2014 CN
105282328 Jan 2016 CN
105306600 Feb 2016 CN
2011059811 Mar 2011 JP
2011517380 Jun 2011 JP
2014106592 Jun 2014 JP
2014115716 Jun 2014 JP
1999037052 Jul 1999 WO
2007007330 Jan 2007 WO
2011117456 Sep 2011 WO
2014008782 Jan 2014 WO
2015017029 Feb 2015 WO
2015113458 Aug 2015 WO
2016016248 Feb 2016 WO
2016050146 Apr 2016 WO
2016054629 Apr 2016 WO
Non-Patent Literature Citations (5)
Entry
Gwynee, Guilford, “WeChat's little red envelopes are brilliant marketing for mobile payments,” published on the internet at https://qz.com, on Jan. 29, 2014 (Year: 2014).
Anonymous, “Crowdsource Your Company's Bonuses,” I Done This Blog, www.blog.idonethis.com, May 30, 2012 (Year:2012).
Hao Yunhong, Qian Chen, “Decentralization and Compensation Reforms in China: The Case of Xiaoshan InterTrade,” 2008 ISECS International Colloquium on Computing, Communication, Control and Management, IEEE Computer Society (Year: 2008).
Ozimec et al., “Moticational Inventives for developing salesforce performance in emerging markets,” University of Zagreb, Croatia, IEEE (Year: 2011).
“Managing Activities with TVACTA: TaskVista and Activity-Centered Task Assistant”, V Bellotti, JD Thornton-Proc. sigir Workshop on PIM, 2006 academia.edu (Year:2006).
Related Publications (1)
Number Date Country
20170310811 A1 Oct 2017 US