Embodiments of present inventive concepts relate to electronic systems, and more particularly, to methods of processing electronic files in electronic memory and related systems and computer program products.
When an electronic file is downloaded to an electronic system over the Internet, from another peer device, etc., the electronic file may be automatically saved in a download directory in electronic memory of the system. Often, such electronic files are viewed/used only once, but additional steps are required to actually delete the electronic file from memory.
With a PDF file that is downloaded from the Internet, for example, a user may view the PDF file using a PDF reader and then close the PDF reader. Closing the PDF reader, however, will not delete the PDF file from the system if the PDF file is stored in a download directory of system memory (as is typically the case with any file that has been downloaded).
To actually delete the file from memory, the user must identify/locate the file in the download directory, and then either delete the file or move it to the trash bin. Identifying/locating the file in the download directory, however, may be a non-trivial task, particularly if many files have been saved in the download directory. For example, the user may need to actually open and view the file using the PDF reader to confirm that the correct file is being deleted, and then close PDF reader, before deleting the file.
Deleting a file after viewing may thus require three or more steps and/or more than a trivial amount of time. Accordingly, there continues to exist a need for improved methods to delete files from memory.
According to first embodiments of inventive concepts disclosed herein, a method is provided to process an electronic file in a location in memory of an electronic system. The method includes rendering a visual representation of the electronic file in a window on a display. Responsive to user input designating deletion while the window including the visual representation of the electronic file is open on the display, the window including the visual representation of the electronic file on the display is closed, and the electronic file from the location in the memory is deleted.
By both closing and deleting a file responsive to a same user input designating deletion, user time and effort may be reduced thereby improving a user experience. Otherwise, the user may be required to close the file, and then find the file in a directory system of the memory and delete it, requiring more user time and effort. In addition, the file may not be easy to locate if the user does not know/remember the name and/or location of the file in the directory system of the memory. Downloaded files, for example, may be saved in a download directory using names defined by the system so that the user may not be able to easily identify a particular downloaded file for deletion based on its name. Moreover, downloaded files may only be used/viewed once so that easy/efficient deletion is particularly useful. Combined close/delete operations according to the first embodiments may also be useful for application installers which are typically used only once. Combined close/delete operations may also be useful when reviewing/deleting different versions of a same file (e.g., document), allowing the user to open/view the file and then close and delete the file using the same user input designating deletion.
According to some aspects of the first embodiments, rendering the visual representation of the electronic file in the window includes rendering a close symbol in the window, and a delete symbol is substituted for the close symbol in the window responsive to user input selecting an alternate function. The user input designating deletion is thus be provided by user input selecting the delete symbol in the window. For example, the user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input selecting the delete symbol may include user input selecting the delete symbol while holding the one or the combination of keys on the keyboard.
The user input selecting the alternate function may, for example, include holding one key (e.g., the “Alt” key, the “Ctrl” key, the “Function” key, etc.) to select deleting the file from its initial location and saving it to another location (e.g., a memory trash bin), also referred to as moving the file from the initial location to the other location. The user input selecting the alternate function may, for example, include holding a combination of keys (e.g., the “Shift” and “Alt” keys, the “Shift” and “Ctrl” keys, the “Shift” and “Function” keys, etc.) to select permanently deleting the file from its initial location (without saving to another location). Different keys and/or key combinations may thus be used to select different file delete options. Moreover, use of a combination of keys to select permanent deletion reduces the likelihood that a permanent deletion may be performed by accident.
According to some aspects of the first embodiments, the user input designating deletion includes at least one of user input selecting a menu item from a menu bar on the display, and/or user input selecting a button from a tool bar.
According to some aspects of the first embodiments, the electronic file is a first electronic file, the location is a first location in memory, the window is a first window, the user input designating deletion is a first user input designating deletion, and deleting the first electronic file includes deleting the first electronic file from the first location in the memory and saving the first electronic file in a second location in memory. In addition, a visual representation of a second electronic file is rendered in a second window on the display. Responsive to second user input designating permanent deletion while the second window is open on the display wherein the second user input is different than the first user input, the second window presenting the second electronic file is closed, and the second electronic file is permanently deleted from the memory. Different user inputs may thus be used to select different file delete options. Moreover, use of a combination of keys to select permanent deletion reduces the likelihood that a permanent deletion may be performed by accident.
According to some aspects of the first embodiments, a visual representation of a delete symbol is rendered on the display outside the window including the visual representation of the electronic file responsive to user input selecting an alternate function. The user input designating deletion thus includes user input dragging the window including the visual representation of the electronic file to the visual representation of the delete symbol. More particularly, the user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input dragging the window may include user input dragging the window to the visual representation of the delete symbol while holding the one or the combination of keys on the keyboard.
According to some aspects of the first embodiments, rendering the visual representation of the electronic file includes rendering the visual representation of the electronic file in the window on the display using a software application and providing a path of the electronic file defining the location of the electronic file in a file directory system of the memory. Deleting the electronic file includes deleting the electronic file from the location in the memory using the path of the electronic file.
According to some aspects of the first embodiments, deleting the electronic file includes deleting the electronic file from memory responsive to the user input designating deletion while the window is open on the display and responsive to determining that the user is authorized to delete the file. By requiring user authorization, a likelihood that a file is improperly deleted may be reduced.
According to some aspects of the first embodiments, the location is a first location in the memory, and deleting the electronic file includes deleting the electronic file from the first location in the memory and saving the electronic file in a second location in the memory (such as a memory trash bin).
According to some aspects of the first embodiments, deleting the electronic file includes permanently deleting the electronic file from the memory (without saving the file in another location such as a memory trash bin).
According to second embodiments of inventive concepts disclosed herein, an electronic system includes an electronic memory including an electronic file in a location in the electronic memory and a processor coupled to the memory. More particularly, the processor is configured to render a visual representation of the electronic file in a window on a display, to close the window including the visual representation of the electronic file on the display responsive to user input designating deletion while the window including the visual representation of the electronic file is open on the display, and to delete the electronic file from the location in the memory responsive to the user input designating deletion.
According to some aspects of the second embodiments, the processor is configured to render a close symbol in the window including the visual representation of the electronic file and to substitute a delete symbol for the close symbol in the window responsive to user input selecting an alternate function, and the user input designating deletion includes user input selecting the delete symbol in the window.
The user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input selecting the delete symbol may include user input selecting the delete symbol (e.g., using a pointing device) while holding the one or the combination of keys on the keyboard.
According to some aspects of the second embodiments, the user input designating deletion includes at least one of user input selecting a menu item from a menu bar on the display, and/or user input selecting a button from a tool bar.
According to some aspects of the second embodiments, the electronic file is a first electronic file, the location is a first location in memory, the window is a first window, the user input designating deletion is a first user input designating deletion, and the processor is configured to delete the first electronic file by deleting the first electronic file from the first location in the memory and saving the first electronic file in a second location in memory (e.g., a trash bin). In addition, the processor is configured to render a visual representation of a second electronic file in a second window on the display, to close the second window presenting the second electronic file responsive to second user input designating permanent deletion while the second window is open on the display wherein the second user input is different than the first user input, and to permanently delete the second electronic file from the memory responsive to the second user input designating permanent deletion while the second window is open on the display.
According to some aspects of the second embodiments, the processor is further configured to render a visual representation of a delete symbol on the display outside the window including the visual representation of the electronic file responsive to user input selecting an alternate function, and the user input designating deletion includes user input dragging the window including the visual representation of the electronic file to the visual representation of the delete symbol. For example, the user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input dragging the window may include user input dragging the window to the visual representation of the delete symbol while holding the one or the combination of keys on the keyboard.
According to some aspects of the second embodiments, the processor is configured to render the visual representation of the electronic file in the window on the display using a software application, to provide a path of the electronic file defining the location of the electronic file in a file directory system of the memory, and to delete the electronic file from the location in the memory using the path of the electronic file.
According to some aspects of the second embodiments, the processor is configured to delete the electronic file from memory responsive to user input designating deletion while the window is open on the display and responsive to determining that the user is authorized to delete the file.
According to some aspects of the second embodiments, the location is a first location in the memory, and the processor is configured to delete the electronic file by deleting the electronic file from the first location in the memory and saving the electronic file in a second location in the memory.
According to some aspects of the second embodiments, the processor is configured to delete the electronic file by permanently deleting the electronic file from the memory.
According to third embodiments of inventive concepts disclosed herein, a computer program product includes a computer readable storage medium having computer readable program coded embodied therein. The computer readable program code includes computer readable program code configured to render a visual representation of an electronic file in a window on a display wherein the electronic file is in a location in memory of an electronic system. The computer readable program code also includes computer readable program code configured to close the window including the visual representation of the electronic file on the display responsive to user input designating deletion while the window including the visual representation of the electronic file is open on the display. The computer readable program code further includes computer readable program code configured to delete the electronic file from the location in the memory responsive to the user input designating deletion.
According to some aspects of the third embodiments, the computer readable program code further includes computer readable program code configured to render the visual representation of the electronic file in the window by rendering a close symbol in the window, and computer readable program code configured to substitute a delete symbol for the close symbol in the window responsive to user input selecting an alternate function. The user input designating deletion is thus be provided by user input selecting the delete symbol in the window. For example, the user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input selecting the delete symbol may include user input selecting the delete symbol while holding the one or the combination of keys on the keyboard.
According to some aspects of the third embodiments, the user input designating deletion includes at least one of user input selecting a menu item from a menu bar on the display, and/or user input selecting a button from a tool bar.
According to some aspects of the third embodiments, the electronic file is a first electronic file, the location is a first location in memory, the window is a first window, the user input designating deletion is a first user input designating deletion, and deleting the first electronic file includes deleting the first electronic file from the first location in the memory and saving the first electronic file in a second location in memory. In addition, the computer readable program code includes computer readable program code configured to render a visual representation of a second electronic file in a second window on the display. The computer readable program code also includes computer readable program code configured to close the second window presenting the second electronic file and permanently delete the second electronic file from the memory responsive to second user input designating permanent deletion while the second window is open on the display, wherein the second user input is different than the first user input.
According to some aspects of the third embodiments, the computer readable program code includes computer readable program code configured to render a visual representation of a delete symbol on the display outside the window including the visual representation of the electronic file responsive to user input selecting an alternate function. The user input designating deletion thus include user input dragging the window including the visual representation of the electronic file to the visual representation of the delete symbol. For example, the user input selecting the alternate function may include user input holding one or a combination of keys on a keyboard, and the user input dragging the window may include user input dragging the window to the visual representation of the delete symbol while holding the one or the combination of keys on the keyboard.
According to some aspects of the third embodiments, the computer readable program code includes computer readable program code configured to render the visual representation of the electronic file by rendering the visual representation of the electronic file in the window on the display using a software application and providing a path of the electronic file defining the location of the electronic file in a file directory system of the memory, and to delete the electronic file by deleting the electronic file from the location in the memory using the path of the electronic file.
According to some aspects of the third embodiments, the computer readable program code includes computer readable program code configured to delete the electronic file by deleting the electronic file from memory responsive to the user input designating deletion while the window is open on the display and responsive to determining that the user is authorized to delete the file.
According to some aspects of the third embodiments, the location is a first location in the memory, and the computer readable program code includes computer readable program code configured to delete the electronic file by deleting the electronic file from the first location in the memory and saving the electronic file in a second location in the memory.
According to some aspects of the third embodiments, the computer readable program code includes computer readable program code configured to delete the electronic file by permanently deleting the electronic file from the memory.
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated herein and constitute a part of this application, illustrate certain non-limiting embodiments of inventive concepts. In the drawings:
Embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings. Other embodiments may take many different forms and should not be construed as limited to the embodiments set forth herein. Like numbers refer to like elements throughout.
Electronic system 100 may be any electronic device, such as a desktop computer, a laptop computer, a handheld computer, a tablet computer, a smartphone, a personal digital assistant, etc. Accordingly, elements of the user interface 121 may vary depending on the type of device. In some embodiments (e.g., smaller devices such as smartphones), display 121a may be a touch sensitive display, and a separate keyboard 121b and/or pointing device 121c may be omitted. In other embodiments (e.g., a laptop computer), display 121a, keyboard 121b, pointing device 121c, speaker 121d, and microphone 121e may be integrated in the device. In still other embodiments (e.g., a desktop computer), elements of user interface 121 (e.g., display 121a, keyboard 121b, pointing device 121c (e.g., a mouse) may be provided outside electronic system with wired/wireless couplings through I/O interface 1011 to processor 101. Accordingly, all elements of user interface 121 may be integrated within electronic system 100; some elements of user interface 121 may be integrated within electronic system 100 with other elements being provided external to electronic system 100; or all elements of user interface 121 may be provided external to electronic system 100.
Memory 103 may include an operating system 105, applications 107 (including a plurality of applications 107a to 107n, also referred to as application programs), and data 109. Operating system 105 includes software executed by processor 101 to manage resources for the electronic system 100 and to provide common services for the different applications. Each application (e.g., 107a to 107n) includes software that may be executed by processor 101 to provide a particular user function/service (e.g., word processing, spread sheet, e-mail, etc.). Data 109 portions of memory 103 may be used to store information as files that may be organized by directories (also referred to as folders). Moreover, a location of each file in memory 103 may be defined by a path (also referred to as a map). While not shown separately, a memory trash bin (also referred to as a trash bin) may be used to store files deleted from other portions of memory 103, and the memory trash bin may be included as a director/folder in data 109 portion of memory 103.
Whenever an electronic file (also referred to as a file) is opened in a window by processor 101 running an application 107 (so that a visual representation of the file is rendered in the window on display 121a), operating system 105 (running on processor 101) may collect information about the file including a path of the file in a file system defining a location of the file in a data 109 portion of memory 103. The path may be obtained by maintaining a map from the window to the opened file.
The operating system 105 (running on processor 101) may thus associate the file with the window (also referred to as a dialog) used to open/render the visual representation of the file on display 121a.
With the file opened/rendered in the window on display 121a, the file and/or application 107 may be used as normal.
Once the user is done using the file/window, the user may click a special symbol (also referred to as a button) or a menu item which states “quit and move current file to trash bin”, or the user may hold the “Alt” key and click the close symbol/button of the window (dialog). Another menu option may state “quit and permanently delete current file without throwing it to trash bin,” or a different combination of keys (e.g., “Shift” and “Alt”) may be held while clicking the close symbol/button of the window. Accordingly, the window/file may be closed and the file may be deleted in a single operation. By requiring a combination of keys for permanent deletion, a likelihood of accidental permanent deletion may be reduced.
The window (dialog) will be closed and the file will be permanently deleted from data 109 memory 103 (also referred to as the file system), or the window will be closed and the file will be moved from its initial location in data 109 memory 103 to a trash bin if permission allows. If a current user closing the window has no permission to delete the file, an error window may be provided notifying the user that it is not possible to delete the file, and the file will be maintained in its initial location in data 109 memory 103. By requiring appropriate authorization before allowing deletion, a likelihood of undesired/inappropriate file deletion may be reduced.
Instead of clicking the close symbol/button with a key combination, the user can close the window/file and move the file to the trash bin by instead pressing and holding a key combination (e.g., “Ctrl” and “Shift”), dragging the top panel of the opened window (while holding the key combination), and dropping the window to a visual representation of a trash bin that has appeared the moment drag motion was initiated (while continuing holding the key combination). Since this close/delete service may be provided system-wide as a feature of operating system 105, the application(s) 107 may not have to implement additional functionality.
According to some embodiments shown in
If the user does not have permission to delete the file, an error message 535 may be generated if a file delete is attempted, as shown in
According to still other embodiments illustrated in
Close/delete operations according to embodiments disclosed herein may be used for any type of file that is delete-able after use, such as normal documents (e.g., word processor documents, spreadsheet documents, etc.), application installers, downloaded files, etc. Close/delete operations according to some embodiments may be particularly useful, for example, when used with application installers because there is normally no point to keeping an application installer after the related application program has been installed. Stated in other words, once an application installer file has been opened and used, there is generally no further use for the application installer file, and by closing and deleting the application installer file using a same operation, memory space and/or time may be saved. Combined close/delete operations may also be useful for downloaded files that are viewed only once.
While application installer files and downloaded files are discussed by way of example, combined close/delete operations may be useful for any type of file. For example, there may be several versions of a document file in a folder, but a user may only want to save one of the files without remembering a name of the particular file to be saved. Accordingly, the user may need to open each of the files to identify the file to be saved/maintained and the files to be deleted. With combined close/delete operations, each undesired file may be closed and deleted using combined close/delete operation so that a separate delete operation is not required after closing the file, thereby saving time.
Moreover, use of a key combination for permanent deletion may be relatively easy for a user to perform, but relatively difficult to execute by accident.
An advantage of combined close/delete operations according to some embodiments of inventive concepts is to reduce a number of operations needed to delete a file and thereby improve a user experience. Files downloaded from the Internet or other peer devices are usually by default stored in a Download directory/folder in data 109 memory 103, and many of these downloaded files may be viewed or used only once. Because it is not currently convenient to delete downloaded files (e.g., because the file names are automatically assigned and thus not easily identified), a relatively large number of downloaded files may pile up in the Download directory making it difficult to find the right downloaded file(s) to delete. Accordingly, the Download directory may be in such a mess after a relatively short period of use that the user may have to spend a significant amount of time to clean/organize the Download directory because the user is not sure which of the downloaded files should be kept and which should be deleted.
Combined close/delete operations of processor 101 using operating system 105 according to some embodiments of inventive concepts will be discussed in greater detail below with respect to the flow charts of
According to some embodiments illustrated in
As shown in
While the file is open (i.e., while the visual representation of the file is rendered in window 501 on display 121a), the user may provide input designating deletion of the file at block 203. As discussed in greater detail below, the user input designating file deletion may include: user input selecting an alternate function (holding a key or key combination) to substitute a delete symbol 507/509 for the close symbol/button 505 as shown in
Responsive to user input designating deletion at block 203, processor 101 may determine if the user is authorized to delete the file at block 205. Responsive to the user not having authorization to delete the file at block 205, processor 101 may render an error message 535 in the window 501 as shown in
Responsive to user input designating deletion at block 203 and responsive to the user having authorization to delete the file at block 205, processor 101 may close the window including the visual representation of the electronic file on the display 121a at block 207, and delete the electronic file from the location in the memory 103 at block 209. More particularly, processor 101 may delete the electronic file from the location in memory 103 using the path of the electronic file (defining the location of the electronic file in a file directory system of memory 103) that was provided when the file was opened.
According to some embodiments, when the visual representation of the file is initially rendered at block 201, the electronic file may be saved in a first location in memory 103 (e.g., in data 109 memory 103) defined by the path, and deleting the electronic file at block 209 may include deleting the electronic file from the first location in memory 103 and saving the electronic file in a second location in the memory 103 (e.g., in a trash bin in memory 103). According to some other embodiments, deleting the electronic file at block 209 may include permanently deleting the electronic file from memory 103 (e.g., deleting the file from memory without saving the file in another location such as a trash bin).
According to some other embodiments illustrated in
As shown in
While the file is open (i.e., while the visual representation of the file is rendered in window 501 on display 121a), the user may provide input (e.g., by holding a key or a combination of keys on keyboard 121b) to select an alternate function at block 301. Responsive to such user input selecting an alternate function at block 301, processor 101 may substitute a delete symbol 507/509 (also referred to as a delete button) for the close symbol/button 505 in window 501 at block 303 as shown in
Responsive to user input selecting the delete symbol at block 203′, processor 101 may determine if the user is authorized to delete the file at block 205. Responsive to the user not having authorization to delete the file at block 205, processor 101 may render an error message 535 in the window 501 as shown in
Responsive to user input selecting the delete symbol at block 203′ and responsive to the user having authorization to delete the file at block 205, processor 101 may close the window including the visual representation of the electronic file on the display 121a at block 207, and delete the electronic file from the location in the memory 103 at block 209. More particularly, processor 101 may delete the electronic file from the location in memory 103 using the path of the electronic file (defining the location of the electronic file in a file directory system of memory 103) that was provided when the file was opened.
According to some embodiments, when the visual representation of the file is initially rendered at block 201, the electronic file may be saved in a first location in memory 103 (e.g., in data 109 memory 103) defined by the path, and deleting the electronic file at block 209 may include deleting the electronic file from the first location in memory 103 and saving the electronic file in a second location in the memory 103 (e.g., in a trash bin in memory 103). According to some other embodiments, deleting the electronic file at block 209 may include permanently deleting the electronic file from memory 103 (e.g., deleting the file from memory without saving the file in another location such as a trash bin).
According to still other embodiments illustrated in
As shown in
While the first file is open (i.e., while the visual representation of the first file is rendered in the first window 501 on display 121a), the user may provide first input (e.g., by holding a key or a combination of keys on keyboard 121b) to select a first alternate function at block 301. At block 401, processor 101 may determine whether the first alternate function designates deletion of the first file and saving the first file in a trash bin (i.e., moving the first file from a first location in memory defined by the path to the trash bin) or permanent deletion (without saving in a trash bin). By way of example, holding a single key (e.g., an “Alt” key, a “Ctrl” key, a “Function” key, etc.) may designate deletion of the file and moving the file to the trash bin, while holding a combination of keys (e.g., a “Shift” key and an “Alt” key, a “Shift” key and a “Ctrl” key, a “Shift” key and a “Function” key, an “Alt” and a “Ctrl” key, a “Shift” key and a “Ctrl” key, etc.) may designate permanent deletion of the file (without moving the file to the trash bin).
Responsive to such user input selecting the alternate function to delete and move to the trash bin at blocks 301 and 401 (e.g., responsive to the user using a single designated key), processor 101 may substitute delete symbol 507 (also referred to as a delete button) for the close symbol/button 505 in the first window 501 at block 303 as shown in
Responsive to user input selecting the delete symbol at block 203′, processor 101 may determine if the user is authorized to delete the first file at block 205a. Responsive to the user not having authorization to delete the first file at block 205a, processor 101 may render an error message 535 in the first window 501 as shown in
Responsive to user input selecting the delete symbol at block 203′ and responsive to the user having authorization to delete the first file at block 205a, processor 101 may close the first window including the visual representation of the first electronic file on the display 121a at block 207a, save the first electronic file in the trash bin at block 408, and delete the first electronic file from the first location in memory 103 at block 209a (defined by the first path). More particularly, processor 101 may delete the first electronic file from the first location in memory 103 using the first path (defining the location of the first electronic file in a file directory system of memory 103) that was provided when the first file was opened.
Still referring to
As shown in
While the second file is open (i.e., while the visual representation of the second file is rendered in the second window 501 on display 121a), the user may provide second input (e.g., by holding a combination of keys on keyboard 121b) to select a second alternate function at block 301. At block 401, processor 101 may determine whether the second alternate function designates deletion of the second file and saving the second file in a trash bin (i.e., moving the second file from a second location in memory defined by the path to the trash bin) or permanent deletion (without saving in a trash bin). As discussed above, holding a combination of keys (e.g., a “Shift” key and an “Alt” key, a “Shift” key and a “Ctrl” key, a “Shift” key and a “Function” key, an “Alt” and a “Ctrl” key, a “Shift” key and a “Ctrl” key, etc.) may designate permanent deletion of the second file (without moving the file to the trash bin).
Responsive to such user input selecting the alternate function to permanently delete the second file at blocks 301 and 401 (e.g., responsive to the user pressing a designated combination of keys on keyboard 121b), processor 101 may substitute permanent delete symbol 509 (also referred to as a permanent delete button) for the close symbol/button 505 in the second window 501 at block 303′ as shown in
Responsive to user input selecting the permanent delete symbol 509 at block 403, processor 101 may determine if the user is authorized to delete the second file at block 205b. Responsive to the user not having authorization to delete the second file at block 205b, processor 101 may render an error message 535 in the second window 501 as shown in
Responsive to user input selecting the permanent delete symbol 509 at block 403 and responsive to the user having authorization to delete the second file at block 205b, processor 101 may close the second window including the visual representation of the second electronic file on the display 121a at block 207b, and delete the second electronic file from the second location in memory 103 at block 209a (defined by the second path) without saving the second file to the trash bin. More particularly, processor 101 may delete the second electronic file from the second location in memory 103 using the second path (defining the location of the second electronic file in a file directory system of memory 103) that was provided when the second file was opened.
While first and second files are discussed by way of example with respect to
According to yet other embodiments illustrated in
As shown in
While the file is open (i.e., while the visual representation of the file is rendered in window 501 on display 121a), the user may select an alternate function at block 301′, for example, by holding one or a combination of keys on keyboard 121b (e.g., an “Alt” key, a “Ctrl” key, a “Function” key, a “Shift” key and an “Alt” key, a “Shift” key and a “Ctrl” key, a “Shift” key and a “Function” key, etc.). Responsive to the user input selecting an alternate function at block 301′, processor 101 may render a visual representation of a delete symbol 711 on the display 121a outside the window 501 at block 603 as shown in
At block 203″, the user may designate deletion by dragging the window 501 including the visual representation of the electronic file to the visual representation of the delete symbol 711 at block 203″. More particularly, the user may designate deletion by dragging the window 501 to the delete symbol 711 while holding the one key or the combination of keys on keyboard 121b as discussed above with respect to block 301′. The dragging operation may be performed as discussed above using pointing device 121c, using a “left click” to “grab” the window (e.g., in region 525) and moving the pointing device 121c to drag the window 501 to delete symbol 711. Once the window 501 has been dragged to delete symbol 711, the “left click” may be released to “drop” the window into the delete symbol 711 to complete the operation.
Responsive to user input dragging/dropping window 501 to/in delete symbol 711 at block 203″, processor 101 may determine if the user is authorized to delete the file at block 205. Responsive to the user not having authorization to delete the file at block 205, processor 101 may render an error message 535 in the window 501 as shown in
Responsive to user input dragging/dropping window 501 to/in delete symbol 711 at block 203″ and responsive to the user having authorization to delete the file at block 205, processor 101 may close the window including the visual representation of the electronic file on the display 121a at block 207, and delete the electronic file from the location in the memory 103 at block 209. More particularly, processor 101 may delete the electronic file from the location in memory 103 using the path of the electronic file (defining the location of the electronic file in a file directory system of memory 103) that was provided when the file was opened.
According to some embodiments, when the visual representation of the file is initially rendered at block 201, the electronic file may be saved in a first location in memory 103 (e.g., in data 109 memory 103) defined by the path, and deleting the electronic file at block 209 may include deleting the electronic file from the first location in memory 103 and saving the electronic file in a second location in the memory 103 (e.g., in a trash bin in memory 103). According to some other embodiments, deleting the electronic file at block 209 may include permanently deleting the electronic file from memory 103 (e.g., deleting the file from memory without saving the file in another location such as a trash bin).
Operations/blocks of
In the above-description of various embodiments of the present invention, it is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
When a node is referred to as being “connected”, “coupled”, “responsive”, or variants thereof to another node, it can be directly connected, coupled, or responsive to the other node or intervening nodes may be present. In contrast, when an node is referred to as being “directly connected”, “directly coupled”, “directly responsive”, or variants thereof to another node, there are no intervening nodes present. Like numbers refer to like nodes throughout. Furthermore, “coupled”, “connected”, “responsive”, or variants thereof as used herein may include wirelessly coupled, connected, or responsive. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. Well-known functions or constructions may not be described in detail for brevity and/or clarity. The term “and/or” includes any and all combinations of one or more of the associated listed items.
As used herein, the terms “comprise”, “comprising”, “comprises”, “include”, “including”, “includes”, “have”, “has”, “having”, or variants thereof are open-ended, and include one or more stated features, integers, nodes, steps, components or functions but does not preclude the presence or addition of one or more other features, integers, nodes, steps, components, functions or groups thereof. Furthermore, as used herein, the common abbreviation “e.g.”, which derives from the Latin phrase “exempli gratia,” may be used to introduce or specify a general example or examples of a previously mentioned item, and is not intended to be limiting of such item. The common abbreviation “i.e.”, which derives from the Latin phrase “id est,” may be used to specify a particular item from a more general recitation.
It will be understood that although the terms first, second, third, etc. may be used herein to describe various elements/operations, these elements/operations should not be limited by these terms. These terms are only used to distinguish one element/operation from another element/operation. Thus a first element/operation in some embodiments could be termed a second element/operation in other embodiments without departing from the teachings of present inventive concepts. The same reference numerals or the same reference designators denote the same or similar elements throughout the specification.
Example embodiments are described herein with reference to block diagrams and/or flowchart illustrations of computer-implemented methods, apparatus (systems and/or devices) and/or computer program products. It is understood that a block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions that are performed by one or more computer circuits. These computer program instructions may be provided to a processor of a general purpose computer circuit, special purpose computer circuit, and/or other programmable data processing circuit to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, transform and control transistors, values stored in memory locations, and other hardware components within such circuitry to implement the functions/acts specified in the block diagrams and/or flowchart block or blocks, and thereby create means (functionality) and/or structure for implementing the functions/acts specified in the block diagrams and/or flowchart block(s).
These computer program instructions may also be stored in a tangible computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instructions which implement the functions/acts specified in the block diagrams and/or flowchart block or blocks.
A tangible, non-transitory computer-readable medium may include an electronic, magnetic, optical, electromagnetic, or semiconductor data storage system, apparatus, or device. More specific examples of the computer-readable medium would include the following: a portable computer diskette, a random access memory (RAM) circuit, a read-only memory (ROM) circuit, an erasable programmable read-only memory (EPROM or Flash memory) circuit, a portable compact disc read-only memory (CD-ROM), and a portable digital video disc read-only memory (DVD/BlueRay).
The computer program instructions may also be loaded onto a computer and/or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer and/or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. Accordingly, embodiments of the present invention may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.) that runs on a processor such as a digital signal processor, which may collectively be referred to as “circuitry,” “a module” or variants thereof.
It should also be noted that in some alternate implementations, the functions/acts noted in the blocks may occur out of the order noted in the flowcharts. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Moreover, the functionality of a given block of the flowcharts and/or block diagrams may be separated into multiple blocks and/or the functionality of two or more blocks of the flowcharts and/or block diagrams may be at least partially integrated. Finally, other blocks may be added/inserted between the blocks that are illustrated. Moreover, although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
Many different embodiments have been disclosed herein, in connection with the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. Accordingly, the present specification, including the drawings, shall be construed to constitute a complete written description of various example combinations and subcombinations of embodiments and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.
Many variations and modifications can be made to the embodiments without substantially departing from the principles of present inventive concepts. All such variations and modifications are intended to be included herein within the scope of present inventive concepts.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2013/051292 | 11/5/2013 | WO | 00 |