The present application relates to a device and a method for providing correct input, and in particular to a module, a user interface, a device and a method for handling accidental key presses.
More and more electronic devices such as mobile phones, MP3 players, Personal Digital Assistants (PDAs) are becoming smaller and smaller while having more and more information stored and/or accessible through them.
The environments in which these devices are used are also becoming more and more hectic with higher demands on fast access and multitasking, and not only in a professional environment but also in private and social environments. For example a user should be able to read a book, while holding a grocery bag in a rattling subway train and still be able to access the information stored in the device for the device to live up to the many requirements posed upon it by a user buying and using the device.
A consequence of the requirements for small devices paired with the requirement for easy access is that the space designated for keypads and keyboards become smaller and smaller resulting in smaller and smaller keys. This leads to an increased risk of accidentally pressing on more than one key at once thus giving conflicting signals to the device or causing additional unwanted input which corrupts a text that is being input.
Some prior art solutions for overcoming this problem have been proposed.
U.S. Pat. No. 7,289,043 discloses a portable telephone that has a key operation unit in which a plurality of small keys is arranged close to each other. A user sometimes depresses a plurality of keys at the same time. The portable telephone stores data regarding frequency of key determination made by the user in the past when the plurality of keys was depressed at the same time, with regard to a combination of these keys. When the plurality of keys is depressed at the same time, a key which has been most frequently determined is selected, and a number or the like corresponding to the key is displayed. Further, once the key is determined, data regarding the frequency of determination of the key is updated.
A disadvantage with this solution is that it requires a register to be kept and maintained containing data regarding the pressing frequency for each key and it also requires comparison software for determining which key should be taken as being the correct key. This requires additional computational and memory resources and thus leads to a slower operation and an increased cost for a device.
European Patent EP 1,185,921 discloses a method of correcting an input to a device, which a user interacts with by a series of touch actions, including the step of detecting each touch action, measuring the time interval between one or more touch actions, generating a first output in dependence on the one or more touch actions, checking the first output against a table of allowed outputs, and generating a revised output if the first output is or might be in error and if the time interval satisfies a predetermined time interval criterion.
A disadvantage with this solution is that it requires a table of allowed outputs to be kept and maintained and it also requires comparison software for determining which key should be taken as being the correct key. This requires additional computational and memory resources and thus leads to a slower operation and an increased cost for a device.
European Patent EP 1,791,051 discloses a system and a method of processing keystrokes being entered in an electronic device are provided. The method comprises: monitoring for activation of two or more keys on the device; determining whether a keystroke conflict occurs from the activation of the keys; and if a conflict has occurred, then executing further steps. The further steps include: identifying a selected key from the activated keys; generating a character associated with the selected key; and ignoring activation of any keys other than the selected key. The system comprises an electronic device with a display, a keypad and modules which perform the steps of the method as noted.
The selected key may be identified based on a dictionary match that has the same disadvantage as discussed above.
The selected key may also be identified based on the time lapsed between to key presses and this has the disadvantage that other keys are deactivated for a long time wherein no other key presses will be accepted thus slowing down the input speed possible.
The selected key may also be identified based on a highest ranking scheme similar to the one disclosed in U.S. Pat. No. 7,289,043 discussed above.
A device that provides for a quick and reliable way of differentiating between accidental and intentional key presses would be useful in modern day society, but due to the power needed to keep all the features of the device active and the size of the screen needed to display all the information at once would make this device too big to be easy to carry around.
On this background, it would be advantageous to provide a device and a method that overcomes or at least reduces the drawbacks indicated above by providing a module, a user interface, a device and a method for avoiding accidental key presses configured to ignore or deactivate neighboring or adjacent keys.
The disclosed embodiments provide a module for avoiding accidental key presses configured to detect a key press on a first key and to temporarily deactivate a second key being adjacent to said first key.
By taking advantage of lateral inhibition the adjacent or neighboring keys are deactivated or ignored and thus can not produce or generate any data input by mistake or accident.
A major advantage with such a module is that it can be implemented easily without requiring computational resources or memory resources for storing and maintaining tables, and dictionaries.
Another advantage of only deactivating the adjacent or neighboring keys is that other keys can still be used for input and also to be used for combined input.
Yet another advantage is that a user may still maintain a high input speed as remotely located keys where there is no risk of accidentally pressing the wrong key can still be input at a very high speed.
In one embodiment the module is further configured to generate key input data corresponding to said first key.
In one embodiment the module is further configured to detect a release of said first key and to reactivate said second key upon said release.
This enables a device incorporating such a module to receive fast and correct input as no timeout periods are measured. Also, as no timeout periods are used the input can be performed faster as no unnecessary waiting for timeout periods are induced when trying to input the same characters or characters adjacent each other.
In one embodiment the module is further configured to detect whether a time period since the detected key press has lapsed or not and reactivate said second key as said time period has lapsed.
This avoids sideways movements to result in accidental key presses.
In one embodiment the module is further configured to detect a release of said second key and to reactivate said second key upon said release.
This avoids data to be accidentally generated from a second key that is kept depressed while the first key is released.
In one embodiment the module comprises logic circuitry for deactivating or reactivating said second key. This allows for a fast and computationally undemanding way of controlling the input.
The aspects of the disclosed embodiments are also directed to providing a user interface incorporating or configured to incorporate a module according to above.
In one embodiment the user interface is further configured to execute a first and a second application, wherein said user interface is configured to detect a key press on a first key and to temporarily deactivate a second key being adjacent to said first key when executing said first application.
In one embodiment the first application comprises an input field and wherein said user interface is configured to detect a key press on a first key and to temporarily deactivate a second key being adjacent to said first key when said input field is active.
The aspects of the disclosed embodiments are also directed to providing a device incorporating or configured to incorporate a module according to above.
The aspects of the disclosed embodiments are also directed to providing a device incorporating or configured to incorporate a user interface according to above.
In one embodiment the device is a mobile phone.
In one embodiment the device is a mobile communications terminal.
In one embodiment the device is a personal digital assistant (PDA).
In one embodiment the device is a laptop computer.
In one embodiment the device is a notebook computer.
In one embodiment the device is a palmtop computer.
In one embodiment the device is a camera, video or photography.
In one embodiment the device is an external keyboard.
In one embodiment the device is a game console.
Such devices and user interface has the same advantages as has been discussed above.
The aspects of the disclosed embodiments are also directed to providing a computer readable medium including at least computer program code for controlling a user interface comprising a keypad, said computer readable medium comprising software code for detecting a key press of a first key and software code for deactivating a second key.
Such a computer readable medium and the embodiments below have the same advantages as has been discussed above.
In one embodiment the computer readable medium further comprises software code for generating key input data corresponding to said first key.
In one embodiment the computer readable medium further comprises software code for detecting a release of said first key and for reactivating said second key upon said release.
In one embodiment the computer readable medium further comprises software code for detecting whether a time period since the detected key press has lapsed or not and reactivating said second key as said time period has lapsed.
In one embodiment the computer readable medium further comprises software code for detecting a release of said second key and to for reactivating said second key upon said release.
The aspects of the disclosed embodiments are also directed to providing a device incorporating and implementing a computer readable medium according to above.
The aspects of the disclosed embodiments are also directed to providing a device for avoiding accidental key presses comprising means for detecting a key press on a first key and means for temporarily deactivating a second key being adjacent to said first key.
Such a device and the embodiments below have the same advantages as has been discussed above.
In one embodiment the device further comprises means for generating key input data corresponding to said first key.
In one embodiment the device further comprises means for means for detecting a release of said first key and means for reactivating said second key upon said release.
The aspects of the disclosed embodiments are also directed to providing a method for avoiding accidental key presses comprising detecting a key press on a first key and temporarily deactivating a second key being adjacent to said first key.
Such a method and the embodiments described below have the same advantages as has been discussed above.
In one embodiment the method further comprises generating key input data corresponding to said first key.
In one embodiment the method further comprises detecting a release of said first key and reactivating said second key upon said release.
In one embodiment the method further comprises detecting whether a time period since the detected key press has lapsed or not and reactivating said second key as said time period has lapsed.
In one embodiment the method further comprises detecting a release of said second key and reactivating said second key upon said release.
The aspects of the disclosed embodiments are also directed to providing a device incorporating and implementing a method according to above.
Further objects, features, advantages and properties of device, method and computer readable medium according to the present application will become apparent from the detailed description.
In the following detailed portion of the present description, the teachings of the present application will be explained in more detail with reference to the example embodiments shown in the drawings, in which:
In the following detailed description, the device, the method and the software product according to the teachings for this application in the form of a cellular/mobile phone will be described by the embodiments. It should be noted that although only a mobile phone is described the teachings of this application can also be used in any electronic device such as in portable electronic devices such as laptops, PDAs, mobile communication terminals, electronic books and notepads and other electronic devices offering access to information.
The mobile terminals 100, 106 are connected to a mobile telecommunications network 110 through Radio Frequency, RF links 102, 108 via base stations 104, 109. The mobile telecommunications network 110 may be in compliance with any commercially available mobile telecommunications standard, such as Group Spéciale Mobile, GSM, Universal Mobile Telecommunications System, UMTS, Digital Advanced Mobile Phone system, D-AMPS, The code division multiple access standards CDMA and CDMA2000, Freedom Of Mobile Access, FOMA, and Time Division-Synchronous Code Division Multiple Access, TD-SCDMA.
The mobile telecommunications network 110 is operatively connected to a wide area network 120, which may be Internet or a part thereof. An Internet server 122 has a data storage 124 and is connected to the wide area network 120, as is an Internet client computer 126. The server 122 may host a www/wap server capable of serving www/wap content to the mobile terminal 100.
A public switched telephone network (PSTN) 130 is connected to the mobile telecommunications network 110 in a familiar manner. Various telephone terminals, including the stationary telephone 132, are connected to the PSTN 130.
The mobile terminal 100 is also capable of communicating locally via a local link 101 to one or more local devices 103. The local link can be any type of link with a limited range, such as Bluetooth, a Universal Serial Bus (USB) link, a Wireless Universal Serial Bus (WUSB) link, an IEEE 802.11 wireless local area network link, a Radio Standard link for example an RS-232 serial link, etc. The local devices 103 can for example be various sensors that can communicate measurement values to the mobile terminal 100 over the local link 101.
An embodiment 200 of the mobile terminal 100 is illustrated in more detail in
The internal component, software and protocol structure of the mobile terminal 200 will now be described with reference to
The MMI 334 also includes one or more hardware controllers, which together with the MMI drivers cooperate with the first display 336/203, and the keypad 338/204 as well as various other Input/Output devices such as microphone, speaker, vibrator, ringtone generator, LED indicator, etc. As is commonly known, the user may operate the mobile terminal through the man-machine interface thus formed.
The software also includes various modules, protocol stacks, drivers, etc., which are commonly designated as 330 and which provide communication services (such as transport, network and connectivity) for an RF interface 306, and optionally a Bluetooth interface 308 and/or an IrDA interface 310 for local connectivity. The RF interface 306 comprises an internal or external antenna as well as appropriate radio circuitry for establishing and maintaining a wireless link to a base station (e.g. the link 102 and base station 104 in
The mobile terminal also has a Subscriber Identity Module (SIM) card 304 and an associated reader. As is commonly known, the SIM card 304 comprises a processor as well as local work and data memory.
In
The keypad 504 has a plurality of keys 504a as can be seen in
Thus, in the example shown in
In a further step 425 key input data corresponding to the first key 504a′ is generated and in this example carrying the character ‘D’.
In a consecutive step 430 the second keys 504b″ are reactivated again and future presses on these keys will not be ignored.
In one embodiment the second keys are reactivated as the first key is released. As a user begins moving his finger or a stylus away from the keypad there is a very low risk of further accidental key presses and the adjacent keys can be reactivated again.
In one embodiment the second keys are reactivated after a short time period has lapsed from the release of the first key. This time period ensures that even sideways movements do not cause any accidental key presses.
In one embodiment the second keys 504a″ are reactivated as one of them has been released.
In one embodiment the second keys 504a″ are reactivated as all of them has been released.
In one embodiment the second keys 504a″ are reactivated as they are each released.
As only the adjacent keys or second keys 504a″ are deactivated, key input can still be received through the other keys which allows for a faster overall input speed. In
As the adjacent or second keys are deactivated and any input generated by them is ignored there is no need for memory and computational expensive actions such as storing tables, comparing against such tables and making predictive text input decisions.
It is also easy to implement the deactivation and the following reactivation in hardware or in firmware as a simple circuit, such as logic circuitry in the form of integrated circuits, logic gates or the like, or program instructions ignoring input generated by the adjacent keys is required.
In one embodiment the feature of deactivating the adjacent keys is only active for applications. And in one embodiment the feature of deactivating the adjacent keys is only active for certain fields in an application.
One exemplary embodiment is a personal digital assistant where the feature of deactivating adjacent keys upon a key press is activated for a messaging application and deactivated for a voice call dialing application. This has the advantage of allowing a user to input text correctly and to input a phone number quickly where the likelihood of pressing the same or adjacent keys is very high.
As no timeout periods are used a user is able to input text very quickly even when inputting characters f the same type or corresponding to adjacent keys.
This solution takes full advantage (as does the solution described with reference to
The various aspects of what is described above can be used alone or in various combinations. The teaching of this application may be implemented by a combination of hardware and software, but can also be implemented in hardware or software. The teaching of this application can also be embodied as computer readable code on a computer readable medium. It should be noted that the teaching of this application is not limited to the use in mobile communication terminals such as mobile phones, but can be equally well applied in Personal digital Assistants (PDAs), game consoles, MP3 players, personal organizers or any other device designed for providing information while maintaining low power consumption.
The teaching of the present application has numerous advantages. Different embodiments or implementations may yield one or more of the following advantages. It should be noted that this is not an exhaustive list and there may be other advantages which are not described herein. For example, one advantage of the teaching of this application is that accidental key presses are avoided while still allowing fast input through remotely located keys.
Another exemplary advantage of the teaching of the present application is that the method and implementation described does not require expensive and time and computation requiring actions to determine whether a key press is accidental or not.
Although the teaching of the present application has been described in detail for purpose of illustration, it is understood that such detail is solely for that purpose, and variations can be made therein by those skilled in the art without departing from the scope of the teaching of this application.
For example, although the teaching of the present application has been described in terms of a mobile phone, it should be appreciated that the teachings of the present application may also be applied to other types of electronic devices, such as music players, palmtop computers and the like. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the teachings of the present application.
Features described in the preceding description may be used in combinations other than the combinations explicitly described.
Whilst endeavouring in the foregoing specification to draw attention to those features of the invention believed to be of particular importance it should be understood that the Applicant claims protection in respect of any patentable feature or combination of features hereinbefore referred to and/or shown in the drawings whether or not particular emphasis has been placed thereon.
The term “comprising” as used in the claims does not exclude other elements or steps. The term “a” or “an” as used in the claims does not exclude a plurality. A unit or other means may fulfill the functions of several units or means recited in the claims.