Visual interfaces such as touch screens are available on most electronic devices, including mobile telephones with integrated personal digital assistant (PDA) features. The touch screens display graphics and text and enter commands to control the devices or to perform various other functions to execute operations on the device. Many screens, whether touch sensitive or not, automatically lock to prevent unintentional data entry.
However, when notifications about electronic mail messages or text messages are received by the device, the locked device prevents user interaction with the notifications until the user unlocks the device (e.g., after entering an unlock code). With existing systems, the user is unable to view, let alone interact with, the notifications with the device locked.
Embodiments of the invention enable user interaction with content and/or functionality through a locked user interface of a computing device. Configuration data describing content to present to a user through a display of a locked computing device is defined. The computing device receives one or more content items while the computing device is locked. Based on the configuration data, the received content items are transformed. The transformed content items are provided to the user through the display of the locked computing device.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Corresponding reference characters indicate corresponding parts throughout the drawings.
Referring to the figures, embodiments of the disclosure enable, at least, content and functionality to be selectively surfaced through a display 108 of a locked computing device 102 to improve the user experience with the computing device 102. The content includes data for consumption by a user 104 as well as data corresponding to functionality available to the user 104 while the computing device 102 is locked. By selectively displaying information through the display 108 of the locked computing device 102, the user 104 is able to view streams of notifications 114 and other content items 112 at a glance. By enabling selected functionality, the user 104 is able to interact with the locked computing device 102 without having to unlock the computing device 102 to manipulate the content items 112 or obtain additional information. Configuration data 116 specifies the content and functionality to be available through the display 108 of the locked computing device 102.
Referring again to
The memory area 110 further stores the configuration data 116. The configuration data 116 describes the content items 112 and/or functionality to present to the user 104 when the computing device 102 is locked. The configuration data 116 includes, for example, a file or metadata describing a characteristic, type, category, classification, or other descriptor of the content items 112 that are to be presented to the user 104 through the display 108 of the locked computing device 102. The configuration data 116 may also identify particular applications or functions (e.g., within applications) that are available for execution by the user 104 through the display 108 of the locked computing device 102. In general, the functionality available through the display 108 of the locked computing device 102 is a subset of the functionality available to the user 104 after the computing device 102 has been unlocked.
The configuration data 116 may be stored in one or more data structures of any form. The configuration data 116 may be plain text, encrypted, binary, or any other form. Additionally, the configuration data 116 may be organized into a hierarchy, with some criteria applying to one or more of the content items 112, or to one or more of the application programs 118 available to the computing device 102.
The configuration data 116 may be defined by the user 104. In such embodiments, the user 104 identifies the particular functionality desired to be available through the display 108 of the locked computing device 102. For example, the user 104 may drag-and-drop applications into a particular region of the display 108 to select those applications to be available when the computing device 102 is locked. The selected applications may act as a toolbar on the display 108 of the locked computing device 102.
The configuration data 116 may also be defined by application developers 126. In such embodiments, the application developer 126 of each application identifies the functionality that remains available to the user 104 when the computing device 102 becomes locked. The configuration data 116 in this example accompanies the installation or downloading of the application to the computing device 102. The identified functionality may represent a default setting, and may be overridden by the user 104 in some embodiments.
The memory area 110, or one or more computer-readable media, further stores computer-executable components for implementing aspects of the disclosure. Exemplary components include a profile component 120, an interface component 122, and a filter component 124. These components are described below with reference to
In general, the memory area 110 is associated with the computing device 102. For example, in
The display 108 includes any component for providing information to the user 104. For example, the display 108 includes any capacitive display capable of sensing touch input from the user 104 or another object such as a stylus. While aspects of the invention are described with reference to the display 108 being a touch sensitive or touch screen display, embodiments of the invention are operable with any display. For example, aspects of the invention are operable with non-touch sensitive displays such as found on devices that have a full or partial keyboard available for data entry. In such examples, the computing device 102 locks by disabling the keyboard from being used as a user input selection device for the computing device 102.
The processor 106 includes any quantity of processing units, and is programmed to execute computer-executable instructions for implementing aspects of the disclosure. The instructions may be performed by the processor 106 or by multiple processors executing within the computing device 102, or performed by a processor external to the computing device 102 (e.g., by a cloud service 202 such as in
While aspects of the invention are described with reference to the computing device 102 being a mobile computing device 402 such as a mobile telephone, embodiments of the invention are operable with any computing device. For example, aspects of the invention are operable with devices such as digital cameras, digital video cameras, laptop computers, gaming consoles (including handheld gaming consoles), portable music players, a personal digital assistant, an information appliance, and a personal communicator.
Some embodiments include the computing device 102 disconnected from a network. In such an embodiment, the content items 112 may include notifications 114 such as calendar or alarm alerts originating from the computing device 102 (e.g., not received from the network). Other embodiments contemplate the computing device 102 being connected to a network or cloud service 202, whether the connection is continuous or sporadic (e.g., as available), such as illustrated in
Referring next to
Referring next to
One or more of the content items 112 are received or accessed at 304 while the computing device 102 is locked. The computing device 102 is locked such that full access to the capabilities of the computing device 102 is unavailable, user entry is disabled, or interaction by the user 104 with the computing device 102 is otherwise limited. In some embodiments, the locked computing device 102 may be unlocked through entry of one or more of the following: a code, a gesture, and a button press.
The received content items 112 are analyzed by transforming, altering, filtering, modifying, or the like at 306 based on the defined configuration data 116. For example, if the received content items 112 have one or more data fields associated therewith, transforming the received content items 112 includes selecting one or more of the data fields for presentation based on the defined configuration data 116. The selected data fields are then presented to the user 104. Alternatively, the data within one or more of the data fields may be selected or modified for presentation to the user 104.
The transformed content items 112 are provided to the user 104 through the display 108 of the locked computing device 102 at 308. In embodiments in which a subset of the content items 112 are selected for presentation such as when the transforming operation includes filtering the content items 112, only the filtered content items 112 are presented to the user 104.
In some embodiments, the content items 112 are associated with one or more application programs 118. When provided to the user 104 at 308, the content items 112 may be provided using the associated application program 118. Similarly, when the user 104 interacts with the provided content items 112 (e.g., selects one or more of the content items 112), the computing device 102 may unlock and automatically execute the application program 118 associated with the selected content items 112.
The computing device 102 may also display representations of the application programs 118 associated with the received content items 112 as a toolbar or other grouping. The representations include, for example, text or images (e.g., icons) corresponding to the application programs 118.
Further, the computing device 102 may enable a subset of functionality of each of the application programs 118 associated with the presented content items 112, as defined by the configuration data 116. The subset of functionality is enabled through the display 108 of the locked computing device 102. The user 104 interacts with the application programs 118 via the presented content items 112 in accordance with the enabled subset of functionality.
For example, if an electronic mail message is received (e.g., the content item 112), the transformation at 306 may include selecting a sender field and a time stamp field to present to the user 104. The user 104 is then able to view the name or address of the person that sent the message, along with the time the message was sent. If the configuration data 116 specifies that limited functionality of a mail application is available, the user 104 may be able to view the subject field of the message without unlocking the computing device 102. However, in this example, if the user 104 wants to view the body of the message, the user 104 selects an icon on the display 108 corresponding to the mail application. Responsive to the selection, the computing device 102 is unlocked and the mail application is executed to present the body of the message to the user 104 (or present a list of the messages received by the mail application).
In some embodiments, the operations identified in
The filter component 124 may also select the content items 112 having criteria specified by the configuration data 116. For example, the criteria may specify that only content items 112 originating from a particular content provider 128 (e.g., a particular friend of the user 104) be displayed through the display 108 of the locked computing device 102. In such an example, a parent in a business meeting defines, in the configuration data 116, that only content items 112 (e.g., calls, messages, etc.) from a child of the parent are to be displayed when the computing device 102 is locked.
The interface component 122 provides the modified content items 112 to the user 104 through the display 108 of the locked computing device 102. The filter component 124 enables the user 104 to interact with the provided content items 112 according to the functionality described by the configuration data 116.
Referring next to
When the user 104 presses the power button or performs another input to wake up the mobile computing device 402, the interface in
Referring next to
The mobile computing device 402 in
Without fully unlocking the mobile computing device 402, however, the user 104 may be able to interact in a limited way with the displayed icons. The available limited interaction is defined in the configuration data 116. For example, while the mobile computing device 402 is still locked in the example of
Referring next to
In the examples of
In some embodiments, some of the content items 112 are displayed as full-screen notifications 114 rather than smaller icons. For example, content items 112 such as incoming calls or calendar appointment reminders are displayed full-screen. Such content items 112 may, however, offer user interaction similar to that of other, smaller icons. For example, the full-screen notifications 114 may be sliders that the user 104 can drag to reveal additional information. In the alarm example, one slider allows the user 104 to “snooze,” while another slider allows the user 104 to “ignore” the alarm.
The user 104, the application developers 126, or other entities may customize various aspects of the presentation of the content items 112 to the user 104. Such customization may be stored in, for example, the configuration data 116. The customization includes, but is not limited to, one or more of the following: clock features, text font, text size, contrast, shadows, other artwork on the display 108, input keypad, or other dialogs. For example, the icons may be displayed as fish, rocks, or other objects, and there may be different layouts for portrait and landscape orientation of the mobile computing device 402.
In some embodiments, the content items 112 are received by the computing device 102. The content items 112 are routed internally in the computing device 102 to a router for handling incoming content items 112. A database or other data structure is updated with information describing the receipt of the content items 112. A service listens for updates to the database. Upon detection of the content items 112, a device registry is updated. A component implementing the lock screen listens for the updates to the device registry. Upon detection of an update to the device registry, the component updates the display of the locked computing device 102 with the received content items 112.
Exemplary Operating Environment
By way of example and not limitation, computer readable media comprise computer storage media and communication media. Computer storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media. Combinations of each of the above storage media and communication media elements are also included within the scope of computer readable media.
Although described in connection with an exemplary computing system environment, embodiments of the invention are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with aspects of the invention include, but are not limited to, mobile computing devices, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, gaming consoles, microprocessor-based systems, set top boxes, programmable consumer electronics, mobile telephones, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
Embodiments of the invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. The computer-executable instructions may be organized into one or more computer-executable components or modules. Generally, program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the invention may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.
Aspects of the invention transform a general-purpose computer into a special-purpose computing device when configured to execute the instructions described herein.
The embodiments illustrated and described herein as well as embodiments not specifically described herein but within the scope of aspects of the invention constitute exemplary means for selectively presenting content to the user 104 through the locked display of the mobile computing device 402, and exemplary means for customizing, per application program 118, the presentation of content to the user 104 through the locked display of the mobile computing device 402.
The order of execution or performance of the operations in embodiments of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention.
When introducing elements of aspects of the invention or the embodiments thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
Having described aspects of the invention in detail, it will be apparent that modifications and variations are possible without departing from the scope of aspects of the invention as defined in the appended claims. As various changes could be made in the above constructions, products, and methods without departing from the scope of aspects of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
This application claims the benefit of U.S. Provisional Application No. 61/119,810, filed Dec. 4, 2008, the entirety of which is hereby incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
6243724 | Mander et al. | Jun 2001 | B1 |
6466969 | Bunney et al. | Oct 2002 | B1 |
6574484 | Carley | Jun 2003 | B1 |
7120865 | Horvitz et al. | Oct 2006 | B1 |
7231231 | Kokko et al. | Jun 2007 | B2 |
7453443 | Rytivaara et al. | Nov 2008 | B2 |
7516884 | Chase-Salerno et al. | Apr 2009 | B2 |
7660864 | Markki et al. | Feb 2010 | B2 |
7881283 | Cormier et al. | Feb 2011 | B2 |
20040085351 | Tokkonen | May 2004 | A1 |
20040121823 | Noesgaard et al. | Jun 2004 | A1 |
20040243682 | Markki et al. | Dec 2004 | A1 |
20050240880 | Banks et al. | Oct 2005 | A1 |
20060003742 | Seligmann et al. | Jan 2006 | A1 |
20060017692 | Wehrenberg et al. | Jan 2006 | A1 |
20060129947 | Hamzy et al. | Jun 2006 | A1 |
20060161749 | Chen et al. | Jul 2006 | A1 |
20060259537 | Emberton et al. | Nov 2006 | A1 |
20070014280 | Cormier et al. | Jan 2007 | A1 |
20070028176 | Perdomo et al. | Feb 2007 | A1 |
20070107014 | Howard et al. | May 2007 | A1 |
20070145680 | Rosenberg | Jun 2007 | A1 |
20070150842 | Chaudhri et al. | Jun 2007 | A1 |
20070207782 | Tran | Sep 2007 | A1 |
20070260866 | Wang et al. | Nov 2007 | A1 |
20070279419 | Seebach | Dec 2007 | A1 |
20070280458 | Aberethy et al. | Dec 2007 | A1 |
20070285390 | Yee et al. | Dec 2007 | A1 |
20070288582 | Major et al. | Dec 2007 | A1 |
20080020803 | Rios et al. | Jan 2008 | A1 |
20080040688 | Hoffman et al. | Feb 2008 | A1 |
20080086387 | O'Rourke et al. | Apr 2008 | A1 |
20080094356 | Ording et al. | Apr 2008 | A1 |
20080104595 | Kawachiya et al. | May 2008 | A1 |
20080200142 | Abdel-Kader et al. | Aug 2008 | A1 |
20080220752 | Forstall et al. | Sep 2008 | A1 |
20090137284 | Liyanaarachchi | May 2009 | A1 |
20090149203 | Backholm et al. | Jun 2009 | A1 |
20090265763 | Davies et al. | Oct 2009 | A1 |
20090282130 | Antoniou et al. | Nov 2009 | A1 |
20090282485 | Bennett | Nov 2009 | A1 |
20090284482 | Chin | Nov 2009 | A1 |
20090288032 | Chang et al. | Nov 2009 | A1 |
20100017759 | Birnbaum et al. | Jan 2010 | A1 |
20100060586 | Pisula et al. | Mar 2010 | A1 |
20100079380 | Nurmi | Apr 2010 | A1 |
20100081414 | Poisner | Apr 2010 | A1 |
20100123724 | Moore et al. | May 2010 | A1 |
20100146235 | Weber et al. | Jun 2010 | A1 |
20100146384 | Peev et al. | Jun 2010 | A1 |
20100146437 | Woodcock et al. | Jun 2010 | A1 |
20100159995 | Stallings et al. | Jun 2010 | A1 |
20100273457 | Freeman et al. | Oct 2010 | A1 |
20110004845 | Ciabarra | Jan 2011 | A1 |
Number | Date | Country |
---|---|---|
1569064 | Aug 2005 | EP |
1657898 | May 2006 | EP |
1953663 | Aug 2008 | EP |
2007-235844 | Sep 2007 | JP |
2007274240 | Oct 2007 | JP |
2007295176 | Nov 2007 | JP |
2008053988 | Mar 2008 | JP |
2008-236184 | Oct 2008 | JP |
2008-288924 | Nov 2008 | JP |
2009188549 | Aug 2009 | JP |
20060016426 | Feb 2006 | KR |
100673163 | Jan 2007 | KR |
1020070024165 | Mar 2007 | KR |
100722278 | May 2007 | KR |
2286016 | Oct 2006 | RU |
2319314 | Mar 2008 | RU |
200844843 | Nov 2008 | TW |
Entry |
---|
S2 Applications for windows mobile, S2U Pertinent pages: S2U2 readme first , wayback machine page from Nov. 3, 2008. http://replay.waybackmachine.org/20100620050147/http://ac-s2.com/. |
Desktop Lock 7.2.1 , TopLang Software Pertinent page: wayback machine Main Desktop Lock page Oct. 12, 2008 http://replay.waybackmachine.org/20081012104906/http://www.toplang.com/desktoplock.htm. |
Thomas, Review: IntelliScreen 1.05, 69/22/2008, iSource.com, pp. 2-9. |
Thomas, Intelliscreen 2.1—Hello Quickview!, Jan. 9, 2008, iSource.com, pp. 2-3. |
IntelliScreen 2.2 for iPhone 2.1/3G Firmware Released! No Author, Sep. 27, 2008, pp. 1-2. |
Brooke, IntelliScreen 1.00-1.03, Jun. 5, 2008, Apple iPhone School, pp. 1-2 Retrieved: http://www.appleiphoneschool.com/2008/06/05/intelliscreen-101/. |
“Sunscape—Slide to Lock/Unlock Utility”, Retrieved at <<http://www.1800pocketpc.com/2008/09/01/sunscape-slide-to-lock-unlock-utility.html>>, Sep. 1, 2008, pp. 8. |
“Organic Lock 0.8.1.5”, Retrieved at <<http://www.1800pocketpc.com/2008/05/30/organic-lock-0815-an-almost-android-like-unlock-utility-for-pocketpc.html>>, May 30, 2008, pp. 7. |
“ThrottleLock 0.3”, Retrieved at <<http://www.1800pocketpc.com/2008/08/31/throttlelock-03-pattern-based-lock-like-on-android.html>>, Aug. 31, 2008, pp. 7. |
“Slide to Unlock 2 [S2U2] 1.50d—iphone like Slide to Lock Unlock for Windows Mobile”, Retrieved at <<http://www.1800pocketpc.com/2009/02/26/slide-to-unlock-2-s2u2-150d-iphone-like-slide-to-lock-unlock-for-windows-mobile.html>>, Feb. 26, 2009, pp. 8. |
Multicellphone, “TalkLock by CellAvant—Free TouchScreen Lock App for BlackBerry Storm”, Retrieved at <<http://www.multicellphone.com/talklock-by-cellavant-free-touchscreen-lock-app-for-blackberry-storm/>>, Jan. 5, 2009, pp. 5. |
“PocketShield v1.1.3: PPC Software”, Retrieved at <<http://ppcmobiles.blogspot.com/2008/11/pocketshield-v113-ppc-software.html>>, Mar. 2, 2009, pp. 6. |
Deleon, Nicholas, “Slide 2 Unlock: Slide to Unlock Any Pocket PC”, Retrieved at <<http://www.crunchgear.com/2007/06/08/slide-2-unlock-slide-to-unlock-any-pocket-pc/>>, Jun. 8, 2007, pp. 8. |
“International Search Report”, Mailed Date: Jul. 15, 2010, Application No. PCT/US2009/066601, Filed Date: Dec. 3, 2009, pp. 8. |
“Intelliborn—Everyday Problems, Everyday Solutions”, Retrieved at <<http://web.archive.org/web/20080516231423/http://www.intelliborn.com/>>, Retrieved Date: Sep. 6, 2011, pp. 2. |
“Pop-Up Email Notifications”, Retrieved at <<http://modmyi.com!forurns/3rd-party-apps-requests/414421-pop-up-email-notifications.html>>, Retrieved Date: Sep. 6, 2011, pp. 4. |
“Intelliborn—IntelliScreen FAQs”, Retrieved at <<http://web.archive.org/web/20080517141928/http://www.intelliborn.com/IntelliScreenFAQs.html>>, Retrieved Date: Sep. 5, 2011, pp. 3. |
Non-Final Office action, Mailed Date Aug. 31, 2011, U.S. Appl. No. 12/474,281. |
Non-final Office action, Mailed Date Jun. 28, 2011, U.S. Appl. No. 12/430,901. |
Final Office action, Mailed Dated Aug. 19, 2011, U.S. Appl. No. 12/430,901. |
“Gumballtech”, Retrieved at <<http://www.gumballtech.com/2009/11/21/iphone-lockscreen-battle-lockinfo-vs-cydgets-v>>, Retrieved Date: Nov. 17, 2011, pp. 12. |
“Definition of Capture”, Retrieved at <<http://www.merriam-webster.com/dictionary/capture>>, Retrieved Date: Jan. 12, 2012, pp. 3. |
“Advisory Action in U.S. Appl. No. 12/430,901”, Dated: Dec. 9, 2011, pp. 4. |
“Final Office Action in U.S. Appl. No. 12/474,281”, Dated: Jan. 17, 2012, pp. 32. |
“First Office Action in China Patent Application No. 200980149061.1”, Dated: Apr. 16, 2012, pp. 8. |
“Second Office Action in China Patent Application No. 200980149061.1”, Dated: Sep. 11, 2012, pp. 6. |
“Advisory Action in U.S. Appl. No. 12/430,901”, Dated: Oct. 5, 2012, pp. 3. |
“Final Rejection in U.S. Appl. No. 12/430,901”, Dated: Aug. 6, 2012, pp. 32. |
“What is the Gobbler?—Yahoo! for Teachers”, Retrieved at <<http://help.yahoo.com/l/us/yahoo/teachers/teachers-237717.html#, Apr. 2009, pp. 1. |
“S2U2 (Slide 2 Unlock 2)”, Retrieved at <<http://web.archive.org/web/20081019021449/http://s2u2.eqvipage.dk/S2U2-index.html>>, Oct. 2008, pp. 3. |
“S2 Applications for Windows Mobile”, Retrieved at <<http://67.43.3.117/˜acs2co/S2U2-readme.html>>, Aug. 6, 2010, pp. 3. |
“Spb Mobile Shell 2.1 User Manual”, Retrieved at <<http://www.spbsoftwarehouse.com/products/mobileshell/Spb%20Mobile%20Shell%20User%20Manual.pdf>>, 2008, pp. 1-21. |
Martellaro, John, “Security Flaw Allows Access to Screen Locked iPhone”, Retrieved at <<http://www.ipodobserver.com/story/37028>>, Aug. 27, 2008, pp. 3. |
“Warden Security for Windows Mobile Smartphone”, Retrieved at <<http://store.handmark.com/p/2086//Warden-Security-for-Windows-Mobile-Smartphone/->>, Retrieved Date: Nov. 6, 2008, pp. 6. |
“Program Lock Pro v2.12e”, Retrieved at <<http://www.fileheap.com/software-program-lock-pro-download-26198.html>>, Apr. 8, 2007, pp. 3. |
“Non-Final Rejection in U.S. Appl. No. 12/430,901”, Dated: Jan. 30, 2012, pp. 33. |
Miller, Matthew, “Apple Files Notification Screen Patent, Is this Really that Unique?”, Retrieved at <<http://blogs.zdnet.com/cell-phones/?=122>>, Sep. 19, 2008, p. 1. |
Chewar, et al., “Unpacking Critical Parameters for Interface Design: Evaluating Notification Systems with the IRC Framework”, Retrieved at <<http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.74.5721&rep=rep1&type=pdf>>, Aug. 1-4, 2004, Cambridge, Massachusetts, USA, pp. 10. |
Matthews, et al., “Designing Glanceable Peripheral Displays”, Retrieved at <<http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS-2006-113.pdf>>, Sep. 7, 2006, pp. 11. |
Dantzich, et al., “Scope: Providing Awareness of Multiple Notifications at a Glance”, Retrieved at <<http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.5200&rep=rep1&type=pdf>>, 2002, pp. 11. |
Miller, et al., “The InfoCanvas: Information Conveyance through Personalized, Expressive Art”, Retrieved at <<http://www.cc.gatech.edu/˜john.stasko/papers/chi01.pdf>>, Apr. 2001, pp. 2. |
Cadiz, et al., “Sideshow: Providing Peripheral Awareness of Important Information”, Retrieved at <<http://research.microsoft.com/research/coeUSideshowITRs/01-83.pdf>>, Sep. 14, 2001, pp. 9. |
Zhang, et al., “Info-Lotus: A Peripheral Visualization for Email Notification”, Retrieved at <<http://research.microsoft.com/acid/infolotus.pdf>>, Apr. 2-7, 2005, Portland, Oregon, USA, pp. 4. |
“Intelliborn”, Retrieved at <<http://web.archive.org/web/20080516231423/http://www.intelliborn.com>>, Sep. 6, 2011, pp. 2. |
“Advisory Action in U.S. Appl. No. 12/474,281”, Dated: Mar. 30, 2012, pp. 4. |
“International Search Report”, Mailed Date: Jun. 16, 2010, Application No. PCT/US2009/064869, Filed Date: Nov. 17, 2009, pp. 11. |
“First Office Action in China Patent Application No. 200980149001.X”, Dated: Mar. 31, 2012, pp. 6. |
“Second Office Action in China Patent Application No. 200980149001.X”, Dated: Sep. 6, 2012, pp. 6. |
“Third Office Action in China Patent Application No. 200980149001.X”, Dated: Oct. 18, 2012, pp. 6. |
Sacco, AI., “Six Essential Apple iPhone Security Tips”, Available at: <http://www.techworld.com.au/article/263077/six—essentialapple—iphone—security—tips?fp=4&fpid=303>, Oct. 8, 2008, pp. 3. |
“Notice of Allowability”, U.S. Appl. No. 12/474,281, Mailed Date: Nov. 19, 2012, filed May 29, 2009, pp. 9. |
“Notice of Allowability”, Application No. 200980149001.X, Mailed Date: Jan. 23, 2013, Filed Date: Nov. 17, 2009, pp. 8. |
“European Search Report”, Application No. EP/09/83/0844, Mailed Date: Feb. 13, 2013, Filed Date: Nov. 17, 2009, pp. 7. |
Sadun Erica, “Taking Your iPod touch to the Max”, Mar. 28, 2008, Retrieved at<<http://techbus.safaribooksonline.com/book/hardware-and-gadgets/9781590599877>>, pp. 4. |
“Notice of Allowance in China Application No. 200980149061.1”, Mailed Date: Jan. 15, 2013, filed Dec. 3, 2009, pp. 6. |
“Non-final Office Action in U.S. Appl. No. 12/430,901”, Mailed Date: Jun. 28, 2011, filed Apr. 28, 2009, pp. 24. |
“Final Office Action in U.S. Appl. No. 12/430,901”, Mailed Date: Sep. 19, 2011, filed Apr. 28, 2009, pp. 28. |
“Office Action in Japan Application No. 2011-539701”, Mailed Date: Jul. 3, 2013, Filed Date: Sep. 11, 2013, pp. 6. |
“Non-Final Office Action for U.S. Appl. No. 12/430,901”, Mailed Date: Jun. 13, 2013, 39 pages. |
“Office Action for Mexican Patent Application No. MX/a/2011/005928”, with English summary, Mailed Date: Mar. 26, 2013, 4 pages. |
“Office Action for Russian Patent Application No. 2011122602”, with English summary, Mailed Date: Nov. 27, 2013, 7 pages. |
“Final Office Action for U.S. Appl. No. 12/430,901”, Mailed Date: Nov. 21, 2013, 36 pages. |
“Final Office Action for Japanese Patent Application No. 2011-539701”, with English summary, Mailed Date: Dec. 25, 2013, 6 pages. |
“Notice of Allowance for European Patent Application No. 09830844.8”, Mailed Date: Dec. 10, 2013, 36 pages. |
“Advisory Action for U.S. Appl. No. 12/430,901”, Mailed Date: Feb. 10, 2014, 5 pages. |
“Notice of Allowance for Japanese Patent Application No. 2011-539564”, Mailed Date: Nov. 25, 2013, 8 pages. |
“Notice of Allowance for Russian Patent Application No. 2011122658”, with English summary, Mailed Date: Nov. 13, 2013, 15 pages. |
Notice of Allowance for Mexican Patent Application No. MX/a/2011/005928, Mailed Date: Aug. 21, 2013, 3 pages. |
“Office Action for Australian Patent Application No. 2009322760”, Mailed Date: Mar. 7, 2014, 3 pages. |
Thomas, “Review: Intelliscreen 1.05 iSource”, Retrieved at <http://isource.com/2008/06/22/review-intelliscreen-105/>>, Jun. 22, 2008, 10 pages. |
Thomas, “Intelliscreen 2.1—Hello Quickview Source”, Retrieved at <<http://isource.com/2008/09/01/intelliscreen-21-hello-quickview/>>, Sep. 1, 2008, 4 pages. |
“IntelliScreen 2.2 for iPhone 2.1/3G Firmware Released!”, Retrieved at <<http://web.archive.org/web/20080927061220/http://www.intelliborn.com/>>, Retrieved Date: Dec. 23, 2011, 3 pages. |
“Desktop Lock 7.2.1”, Retrieved at <<http://replay.waybackmachine.org/20081012104906/http://www.toplang.com/desktoplock.htm>>, TopLang Software Pertinent page: wayback machine Main Desktop Lock page, Oct. 12, 2008, 2 pages. |
“Supplementary Search Report Issued in European Patent Application No. 09831125.1”, Mailed Date: Apr. 1, 2014, 7 Pages. |
“Office Action Issued in Australian Patent Application No. 2009322286”, Mailed Date: May 28, 2014, 4 Pages. |
“Notice of Allowance Issued in Russian Patent Application No. 2011122602”, Mailed Date: Jul. 18, 2014, 17 Pages. |
“Office Action Issued in Russian Patent Application No. 2011122602”, Mailed Date: Apr. 15, 2014, 3 Pages. (w/o English Translation). |
“Office Action Issued in Australia Patent Application No. 2009322286”, Mailed Date: Mar. 25, 2014, 3 Pages. |
“Notice of Allowance Issued in Australia Patent Application No. 2009322286”, Mailed Date: Jul. 25, 2014, 2 Pages. |
“Notice of Allowance Issued in Japan Patent Application No. 2011-539701”, Mailed Date: Aug. 8, 2014, 4 Pages. |
“Office Action Issued in Israel Patent Application No. 212301”, Mailed Date: Nov. 3, 2014, 3 Pages. (Without English Translation). |
“Capture—Definition and More from the Free Merriam-Webster Dictionary”, Retrieved on: Jan. 5, 2012, Available at: https://web.archive.org/web/20120119092301/http://www.merriam-webster.com/dictionary/capture, 3 pages. |
“Notice of Allowance Issued in Australian Patent Application No. 2009322760”, Mailed Date: May 2, 2014, 2 Pages. |
“Office Action Issued in Israel Patent Application No. 212300”, Mailed Date: Dec. 10, 2014, 2 Pages. (Without English Translation). |
“Office Action and Search Report Issued in Taiwan Patent Application No. 98139599”, Mailed Date: Oct. 20, 2014, 13 Pages. |
Number | Date | Country | |
---|---|---|---|
20100146384 A1 | Jun 2010 | US |
Number | Date | Country | |
---|---|---|---|
61119810 | Dec 2008 | US |