A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
One or more embodiments relate generally to handheld electronic devices and more specifically to systems and methods for visually monitoring the progress of a security operation performed on an electronic device.
The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also be inventions.
Mobile electronic communication devices have evolved beyond simple telephone functionality and are now highly complex multifunctional devices with capabilities rivaling those of desktop or laptop computers. In addition to voice communications, many mobile communication devices are capable of capturing images, text messaging, e-mail communications, internet access, social networking, and running full-featured application software. A full range of mobile applications are available from online application stores that can be downloaded onto mobile communication devices. These applications can be games and/or services that provide additional capabilities. Moreover, mobile communication devices can support storage capabilities to locally store images, documents, files, and/or records that can be accessed offline by a user.
With so many objects provided by the mobile communication device, the risk of downloading malicious code increases and the chances of harboring and/or passing on a virus or worm are high. To address this threat, security software for mobile communication devices is now available to detect and remove suspicious code. Typically, the security software performs a series of security operations automatically when the device is powered on, when a predetermined period of time has elapsed, and/or when launched by the user. A security operation can include scanning all or at least some of the applications to detect malware, issuing an alert to the user when such code is detected, and if instructed, removing the malicious code. In addition, a security operation can include backing up data.
When security operations are being performed by the mobile communication device, it can be difficult for a user to know at a glance what operations have already been performed, what operations are currently ongoing, and what operations have not yet been performed. Although in some cases, a percentage of completion and/or an indication of how much time is remaining for the entire process is provided, there is no indication of which application has been scanned or which image or file has not yet been backed up.
In the following drawings like reference numbers are used to refer to like elements. Although the following figures depict various examples, the one or more implementations are not limited to the examples depicted in the figures.
It should be appreciated that the present invention can be implemented in numerous ways, including as a process, an apparatus, a system, a device, a method, or a computer readable medium such as a computer readable storage medium containing computer readable instructions or computer program code, or a computer network wherein computer readable instructions or computer program code are sent over optical or electronic communication links. Applications, software programs or computer readable instructions may be referred to as components or modules. Applications may take the form of software executing on a general purpose computer or be hardwired or hard coded in hardware. Applications may also be downloaded in whole or in part through the use of a software development kit, framework, or toolkit that enables the creation and implementation of the present invention. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
Systems and methods are provided for visually monitoring the progress of a security operation on an electronic device that hosts applications and stores documents, files, records, and images. The applications, documents, files, records, and images are collectively referred to as objects. In an embodiment, the inventive systems and methods permit a user of the electronic device to determine, at a glance, on which objects the security operation has been performed, on which object the security operation is currently being performed, and on which objects the security operation has not yet been performed.
According to an embodiment, when the security operation is launch for at least some of the objects, an operation window is displayed and includes, among other things, a first operation icon corresponding to a first object on which the security operation is currently being performed. In an embodiment, the first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object.
As used herein, the term “mobile communication device” refers to mobile phones, tablets, PDAs and smartphones. The term “mobile communications device” also refers to a class of laptop computers which run an operating system that is also used on mobile phones, tablets, PDAs, or smartphones. Such laptop computers are often designed to operate with a continuous connection to a cellular network or to the internet via a wireless link. Specifically, mobile communication devices include devices for which wireless communication services such as voice, messaging, data, or other wireless Internet capabilities are a primary function. As used herein, a “mobile communication device” may also be referred to as an “electronic device,” an “electronic client device,” “mobile device,” “mobile client,” or “handset.” However, a person having skill in the art will appreciate that while the present invention is disclosed herein as being used on mobile communication devices, the present invention may also be used on other computing platforms, including desktop, laptop, notebook, netbook, or server computers.
Prior to describing the subject matter in detail, an exemplary mobile communication device in which the subject matter may be implemented shall first be described. Those of ordinary skill in the art will appreciate that the elements illustrated in
In an embodiment, a local software component 175 is an application program that is downloaded to a mobile device and installed so that it integrates with the operating system 113. Much of the source code for the local software component 175 can be re-used between various mobile device platforms by using a cross-platform software architecture. In such a system, the majority of software functionality can be implemented in a cross-platform core module. The cross-platform core can be universal allowing it to interface with various mobile device operating systems by using a platform-specific module and a platform abstraction module that both interact with the mobile device operating system 113, which is described in U.S. patent application Ser. No. 12/255,626, entitled “SYSTEM AND METHOD FOR A MOBILE CROSS-PLATFORM SOFTWARE SYSTEM.” In another embodiment, the local software component 175 can be device, platform or operating system specific.
The mobile device 101 may operate in a networked environment using logical connections to one or more remote nodes via a communication interface. The remote node may be another computer, a server, a router, a peer device or other common network node, and typically includes many or all of the elements described above relative to the mobile device 101. The communication interface may interface with a wireless network and/or a wired network. Examples of wireless networks include, for example, a BLUETOOTH network, a wireless personal area network, a wireless 802.11 local area network (LAN), and/or wireless telephony network (e.g., a cellular, PCS, or GSM network). Examples of wired networks include, for example, a LAN, a fiber optic network, a wired personal area network, a telephony network, and/or a wide area network (WAN). Such networking environments are commonplace in intranets, the Internet, offices, enterprise-wide computer networks and the like.
It should be understood that the arrangement of mobile communication device 101 illustrated in
In the description that follows, the subject matter will be described with reference to acts and symbolic representations of operations that are performed by one or more devices, unless indicated otherwise. As such, it will be understood that such acts and operations, which are at times referred to as being computer-executed, include the manipulation by the processing unit of data in a structured form. This manipulation transforms the data or maintains it at locations in the memory system of the device, which reconfigures or otherwise alters the operation of the device in a manner well understood by those skilled in the art. The data structures where data is maintained are physical locations of the memory that have particular properties defined by the format of the data. However, while the subject matter is being described in the foregoing context, it is not meant to be limiting as those of skill in the art will appreciate that various of the acts and operation described hereinafter may also be implemented in hardware.
When a security operation is launched for at least some of the objects, in block 204, an operation window can be displayed on a display screen, e.g., 125, of the electronic device in block 206.
According to an embodiment, each operation icon 302 includes a thumbnail icon representing the object corresponding to the operation icon 302. The thumbnail icon is generated based on the nature of the security operation being performed. For example, when the security operation is a malware scan of a plurality of applications, the thumbnail icon representing an application object can be a graphic logo 306a associated with the application. Alternatively or in addition, when the security operation is a backup of a plurality of images, the thumbnail icon representing an image object can be a thumbnail image 306b of the image object.
According to an embodiment, the plurality of operation icons 302 includes a first operation icon 302a corresponding to a first object on which the security operation is currently being performed. According to an embodiment, the security operation can be performed on more than one object simultaneously and therefore, more than one first operation icon 302a, 302a′ corresponding to more than one first object can be displayed in the operation window 300b as shown in
In an embodiment, the completion indicator 304 can be a vertical bar extending above, below and behind the thumbnail icon, and moving in a direction along a horizontal axis of the first operation icon 302a from left to right, as is shown in
Alternatively, or in addition, the completion indicator 304a can be a horizontal bar extending beyond the right and left sides of the thumbnail icon, and moving in a direction along a vertical axis of the first operation icon 302a from top to bottom, as is shown in
According to an embodiment, at least one second operation icon 302b corresponding to at least one second object on which the security operation has been performed and completed can also be displayed in the operation window 300a, 300b. In addition, at least one third operation icon 302c corresponding to at least one third object on which the security operation has not yet been performed can also be displayed in the operation window 300a, 300b. In an embodiment, the visual appearance of the second operation icons 302b can be different from the visual appearance of the third operation icons 302c so that the user 110 can easily determine, at a glance, on which objects the security operation has been performed or has yet been performed.
For example, the backgrounds of the second 302b and third 302c operation icons can be differently shaded, as shown in
In an embodiment, the user 110 of the device can discover more detailed information relating to the security operation performed, being performed, or to be performed on an object by selecting the operation icon 302 corresponding to the object of interest. In response to receiving such a selection, an information window can be displayed that includes the detailed security operation information. For example, in
In another embodiment, when the user 110 selects a first operation icon 302a corresponding to a first object on which the security operation is being performed, as shown in
Any of the above embodiments may be used alone or together with one another in any combination. The one or more implementations encompassed within this specification may also include embodiments that are only partially mentioned or alluded to or are not mentioned or alluded to at all. Although various embodiments may have been motivated by various deficiencies with the prior art, which may be discussed or alluded to in one or more places in the specification, the embodiments do not necessarily address any of these deficiencies. In other words, different embodiments may address different deficiencies that may be discussed in the specification. Some embodiments may only partially address some deficiencies or just one deficiency that may be discussed in the specification, and some embodiments may not address any of these deficiencies.
In addition, one will appreciate that in the description above and throughout, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be evident, however, to one of ordinary skill in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form to facilitate explanation.
While one or more implementations have been described by way of example and in terms of the specific embodiments, it is to be understood that one or more implementations are not limited to the disclosed embodiments. To the contrary, it is intended to cover various modifications and similar arrangements as would be apparent to those skilled in the art. Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements.
Number | Date | Country | |
---|---|---|---|
Parent | 29431708 | Sep 2012 | US |
Child | 13715895 | US |