SYSTEMS AND METHODS FOR PERFORMING ACTIONS FOR USERS FROM A LOCKED DEVICE

Abstract
Systems and methods for providing actions for users of a computer device from a lock screen interface are provided. A computing device may comprise a touch-sensitive display screen that may allow a user to scroll through a set of user int rfaces that may comprise a set of lock screen interfaces—one of which may be associated with the user, if authorized for using the computing device. The computing device may allow the user to scroll to one of the following: a set of locked screen interfaces, a set of sign-in interfaces, a set of applications allowed for use (e.g., a camera) by the computer device (even if the user is not signed-in) and a new mode of functionality for computing device (e.g., a children's entertainment application). The computer system may allow swiping from multiple discernible directions to allow the scrolling through user interfaces in a natural manner.
Description
BACKGROUND

In many operating systems (e.g., Windows® Operating System), the concept of a “lock screen” provides safety and confidence for users of a computing device or platform. In some cases, such an operating system may be a multi-user environment—allowing multiple users to access/share such a computing device. In addition, a user's lock screen may be personalized and specific to each user on the computer device (e.g., computer, laptop, tablet, smart phone or the like).


In addition, when the device is in lock screen mode, it may not be possible to use features of the device unless and/or until at least one of the users have signed in (or otherwise, logged in) to the device.


SUMMARY

The following presents a simplified summary of the innovation in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview of the claimed subject matter. It is intended to neither identify key or critical elements of the claimed subject matter nor delineate the scope of the subject innovation. Its sole purpose is to present some concepts of the claimed subject matter in a simplified form as a prelude to the more detailed description that is presented later.


Systems and methods for providing actions for users of a computer device from a lock screen interface are provided. A computing device may comprise a touch-sensitive display screen that may allow a user to scroll through a set of user interfaces that may comprise a set of lock screen interfaces—one of which may be associated with the user, if authorized for using the computing device. The computing device may allow the user to scroll to one of the following: a set of locked screen interfaces, a set of sign-in interfaces, a set of applications allowed for use (e.g., a camera) by the computer device (even if the user is not signed-in) and a new mode of functionality for computing device (e.g., a children's entertainment application). The computer system may allow swiping from multiple discernible directions to allow the scrolling through user interfaces in a natural manner.


In one embodiment, a method for performing actions for users with a computing device in a locked state is presented, the method comprising: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface; allowing user to scroll from said first user interface to a second user interface; and wherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.


In another embodiment, a computing device is presented comprising: a controller; a touch-sensitive display; an operating system, said operating system capable of executing on said controller and said controlling said computing device; wherein said operating system is capable of managing a set of authorized users for said computing device and presenting associated user interfaces to users of said computing device; further wherein said operating system is capable of: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface; allowing user to scroll from said first user interface to a second user interface; and wherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.


Other features and aspects of the present system are presented below in the Detailed Description when read in connection with the drawings presented within this application.





BRIEF DESCRIPTION OF THE DRAWINGS

Exemplary embodiments are illustrated in referenced figures of the drawings. It is intended that the embodiments and figures disclosed herein are to be considered illustrative rather than restrictive.



FIG. 1 depicts one embodiment of a computer device/system in made in accordance with the principles of the present application



FIG. 2 shows one embodiment of a method of traversing a multi-user environment to allow different users to sign into a device similar to that shown in FIG. 1.



FIG. 3 shows one embodiment of a flowchart for allowing multiple users of a device from lock screen mode to access a set of allowed applications from their corresponding lock screens.



FIG. 4 shows one embodiment of a flowchart for allowing multiple users of a device to access their associated lock screens.



FIG. 5 shows one embodiment of a flowchart for allowing a user of a device to move from a user's lock screen to a set of other allowed applications, modes and other user's lock screens.





DETAILED DESCRIPTION

As utilized herein, terms “component,” “system,” “interface,” “controller” and the like are intended to refer to a computer-related entity, either hardware, software (e.g., in execution), and/or firmware. For example, any of these terms can be a process running on a processor, a processor, an object, an executable, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component and/or controller. One or more components/controllers can reside within a process and a component/controller can be localized on one computer and/or distributed between two or more computers.


The claimed subject matter is described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the subject innovation.


Introduction

While a device is in lock screen mode, it may be desirable to allow the use of some functionality and/or features of the device—even while the device is in such a mode. In many embodiment, various features and/or functionality may be made available and/or their usage from a device in a lock screen mode (e.g., possibly in a multi-user environment) may be made smoother. In many such embodiments, users may be allowed to directly scroll through or otherwise manipulate the lock screen surface—e.g., to switch the user that will sign in, or activate certain functions or features of the device (e.g., the camera or the like).


For merely one example, direct manipulation of a device in lock screen mode might allow the user to switch the locked device into a distinctly different mode (for example, as for children's entertainment application, like a “Kid's Corner”) while still in a locked state.



FIG. 1 is one embodiment 100 of an exemplary device 102 as may be employed in association with systems and/or methods of the present application. Device 102 may further comprise a controller 104 that may be executing an operating system 106. In one embodiment, device 102 may also comprise a touch screen—in which various touch and/or swiping gestures (e.g., in a number of directions as shown, vertical and/or horizontal directions 108) may invoke various actions by the operating system in response thereto.


In FIG. 1, device 102 is depicted in a lock screen mode (e.g., showing local time, or any other desired information thereon). From a lock screen mode, it may be possible that device 102 may have different mechanisms to place the device into different modes, allow a desired set of applications, or allow access to different users in a multi-user environment. For example, for a touch screen enabled device like 102, swiping gestures 108 (e.g. from vertical and/or horizontal directions) may produce desired actions from a lock screen mode.


It should be appreciated that, while FIG. 1 depicts a touch screen enabled computing device (e.g., Apple iPad® tablet or Microsoft Surface™ tablet), the systems, methods and principles of the present application may also find application in other devices and/or platforms—e.g., personal computers, laptops, smart devices or the like. Touch screen gestures or commands may possibly be substituted by suitable other I/O commands (e.g., touch pad, mouse, keyboard strokes, voice commands) or the like. Thus, where the application discusses touch gestures (such as swipes or the like), it may be possible to duplicate such gesture with another I/O command for a suitable computing device (e.g., that may not be touch-enabled).


Various Action Embodiments

In one embodiment, a lock screen may be directly manipulated in (e.g., a touch device) by various gestures and swipes. For example, a swipe in both a first direction may: (1) switch potential users that may sign in when it is swiped; (2) allow a current user to activate some feature and/or functionality (e.g., the camera) when it is swiped; or (3) enable another mode of functionality for the device. For one example, such utility may be desirable in order to allow the current user (whether an authorized user or otherwise) to capture a photo or video for a particular user in a multi-user environment prior to sign in. In another embodiment, swiping gestures (e.g., at the end of a horizontally panning list) may allow the user to switch the device into a distinct new mode, such as a children's entertainment application (“Kid's Corner” or the like). The following is a list of potentially desirable actions:


(i) User Switching From a Locked Device

When a device is locked, the lock screen for the user that was last active on the device may be shown. If another user wants to sign in to the device, the user may simply swipe e.g., to the left or to the right (or any other suitable direction) to find the user's own personalized lock screen. From there, the user may then swipe (possibly in a second direction) to sign in. FIG. 2 shows one embodiment of a flowchart (200) that allows a device and/or its operating system to switch access to the device by multiple users of such a device. At 202, a device in a lock screen mode for a first user may receive a swipe (or other gesture) in a first direction to switch user lock screens (e.g., to a second, authorized user). If the current user's lock screen is not displayed on the screen, then the device may continue to receive swipes/gestures to toggle between different user lock screens (back at 202).


If the current user's lock screen is displayed on the device, then the device may receive another swipe/gesture at 206 to produce the current user's sign on screen at 208. At this point, the current user may enter his/her sign on credentials (e.g., a password, other swipe gestures or the like) at 210—thereby allowing the current user to access the device (e.g., as at a Start screen or the like).


(ii) Multi-User Camera From a Locked Device

In another embodiment, while a device is locked, a current user may be able to activate one of a set of allowed applications (e.g., using the camera) from the lock screen. One paradigm example would be to capture a photo or video without first signing in. FIG. 3 is one embodiment of a flowchart (300) of allowing potentially multiple users of a device to access a set of allowed application while still in a lock screen mode. Device 302 may exhibit User l′s lock screen. If the current user desiring to use the device is not User 1, then a swipe (320c or 320b) may toggle the lock screen of the current user to the fore (e.g., at 304 or 308). One the current user's lock screen is exhibited, then a swipe (e.g., 320a or 320d) in e.g., potentially a second direction may exhibit a set of allowed applications to be selected from by the current user (e.g., at 306 or 310).


In one paradigm example, a user may swipe down on the lock screen and the camera is activated for that user. Photos and videos that are captured will be placed into that user's “camera roll” folder. If a different user wanted to take photos or videos and have that media saved to her camera roll folder, the user may swipe from left to right on the lock screen to find her own personalized lock screen, then swipe up to activate the camera for the user and save the media to the user's own camera roll.


It may be appreciated that the set of allowed application for a given user may be different for different users of the device. This may be set by the administrator and/or owner of the device, as desired.


(iii) Activating a New Mode From a Locked Device


In another embodiment, while the device is locked, a user may be able to swipe to switch between various users' lock screens. In one embodiment, at the end of that list, a new mode may be presented to the user—into which the user may swipe into a screen that activates a new, distinct mode on the locked device, such as Kid's Corner, a demonstration mode, etc. FIG. 4 shows one embodiment of a flowchart (400) that allows a current user to switch user's lock screen or choose an alternative functional mode. Device 402 may present User l′s lock screen. If this is not the desired current user, then the current user may swipe and/or gesture (420b) to present other user (e.g., User 2) lock screen. This swipe may be continued (e.g., in a first direction) until the current user's lock screen is presented or all of the authorized user's lock screens have been presented (at 406). At this point, the current user may swipe (420a) to produce a new mode of functionality for the device (e.g., a children's entertainment mode—“Kid's Corner” or the like). The swipe/gesture 420a may be in a new, second direction—or continue in the first direction, after the list of authorized user's lock screens have been exhausted.


(iv) Distinct Behavior Accessible via Directional Swipe From a Locked Device

In another embodiment, while the device is locked, it may be possible to allow a user to swipe in a number of distinct directions to access different behavior. For merely exemplary purposes, a user may engage in: (1) swiping up to unlock the device; (2) swiping down to access one of a set of allowed applications (e.g., the camera) for the user whose lock screen is shown; and/or (3) swiping left or right to switch between various users' lock screens, or goes into a new mode, like Kid's Corner.



FIG. 5 shows one embodiment of a flowchart (500) of such a process. Device 502 may present User 1's lock screen. If this is the current user, then User 1 may swipe/gesture (520c) to access a sign-on screen. Alternatively, User 1 may swipe/gesture (520a) to access a set of allowed applications from the lock screen (e.g., the camera) at 504. In another embodiment, User 1 may swipe/gesture (520d) to place the device into another mode of functionality at 510.


If this is not the current user, then the current user may swipe/gesture (at 520b) to access other users' lock screens (506). Once the desired lock screen is presented by the device, then the current user may continue swiping/gesturing—as in 520a through 520d, and continue as desired.


Alternative Embodiments

In other embodiments, a user may swipe left or right, directly on the lock screen, to switch between various users' lock screens. Once on a particular lock screen, the user can swipe up to sign in for that user, or swipe down to activate the camera for that user. A user may swipe from a user's lock screen to a mode, such as Kid's Corner. This “mode” would likely be on the end of the list of users' lock screens. It could be on the far left end of the list or the far right end of the list. A user may activate the camera from a locked device for a particular user, after landing on that user's lock screen.


What has been described above includes examples of the subject innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the subject innovation are possible. Accordingly, the claimed subject matter is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.


In particular and in regard to the various functions performed by the above described components, devices, circuits, systems and the like, the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the claimed subject matter. In this regard, it will also be recognized that the innovation includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the claimed subject matter.


In addition, while a particular feature of the subject innovation may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes,” and “including” and variants thereof are used in either the detailed description or the claims, these terms are intended to be inclusive in a manner similar to the term “comprising.”

Claims
  • 1. A method for performing actions for users with a computing device in a locked state, the method comprising: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface;allowing user to scroll from said first user interface to a second user interface; andwherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.
  • 2. The method of claim 1 wherein said computing device further comprises: a controller;a display;an operating system, said operating system capable of executing on said controller and said controlling said computing device; andfurther wherein said operating system is capable of managing a set of authorized users for said computing device and presenting associated user interfaces to users of said computing device.
  • 3. The method of claim 2 wherein said computing device further comprises an I/O interface, said I/O interface capable of allowing users to input and receive data from said computing device.
  • 4. The method of claim 3 wherein said I/O interface comprises one of a group, said group comprising: a mouse, a keyboard and a touch screen.
  • 5. The method of claim 4 wherein said computing device is one of a group, said group comprising: a personal computer, a laptop, a tablet and a smart device.
  • 6. The method of claim 5 wherein said computing device comprises a touch screen, said touch screen capable of allowing users to swipe through a set of user interfaces presented by said operating system.
  • 7. The method of claim 6 wherein said computing device has a set of authorized users associated with said computing device.
  • 8. The method of claim 7 wherein each of said set of authorized users has an associated lock screen interface.
  • 9. The method of claim 8 wherein said method further comprises: allowing said user to scroll through a set of lock screen interfaces; andallowing said user select a sign-in screen interface associated with one of said set of lock screen interfaces;allowing said user access to user's account on said computer device, if said user provides suitable authorization input to said sign-in screen.
  • 10. The method of claim 8 wherein said method further comprises: allowing said user to scroll to a set of applications allowed by said computing system without said user having signed-in to said computer device.
  • 11. The method of claim 10 wherein one of said set of applications comprising a camera.
  • 12. The method of claim 8 wherein said method further comprises: allowing said user to scroll to an interface that provides a new mode of functionality.
  • 13. The method of claim 12 wherein said new mode of functionality comprises a children's entertainment application.
  • 14. A computing device comprising: a controller;a touch-sensitive display;an operating system, said operating system capable of executing on said controller and said controlling said computing device;wherein said operating system is capable of managing a set of authorized users for said computing device and presenting associated user interfaces to users of said computing device;further wherein said operating system is capable of:presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface;allowing user to scroll from said first user interface to a second user interface; andwherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.
  • 15. The computing device of claim 14 wherein said operating system is further capable of: allowing said user to scroll through a set of lock screen interfaces; andallowing said user select a sign-in screen interface associated with one of said set of lock screen interfaces;allowing said user access to user's account on said computer device, if said user provides suitable authorization input to said sign-in screen.
  • 16. The computing device of claim 15 wherein said operating system is further capable of: allowing said user to scroll to a set of applications allowed by said computing system without said user having signed-in to said computer device.
  • 17. The computing device of claim 16 wherein said operating system is further capable of: allowing said user to scroll to an interface that provides a new mode of functionality
  • 18. A computer-readable storage media storing instructions that when executed by a computing device cause the computing device to perform operations comprising: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface;allowing user to scroll from said first user interface to a second user interface; andwherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.
  • 19. The computer-readable storage media of claim 18 wherein the instructions, when executed by the computing device, further cause the computing device to perform operations comprising: allowing said user to scroll through a set of lock screen interfaces; andallowing said user select a sign-in screen interface associated with one of said set of lock screen interfaces;allowing said user access to user's account on said computer device, if said user provides suitable authorization input to said sign-in screen.
  • 20. The computer-readable storage media of claim 19 wherein the instructions, when executed by the computing device, further cause the computing device to perform operations comprising: allowing said user to scroll to a set of applications allowed by said computing system without said user having signed-in to said computer device.