In many operating systems (e.g., Windows® Operating System), the concept of a “lock screen” provides safety and confidence for users of a computing device or platform. In some cases, such an operating system may be a multi-user environment—allowing multiple users to access/share such a computing device. In addition, a user's lock screen may be personalized and specific to each user on the computer device (e.g., computer, laptop, tablet, smart phone or the like).
In addition, when the device is in lock screen mode, it may not be possible to use features of the device unless and/or until at least one of the users have signed in (or otherwise, logged in) to the device.
The following presents a simplified summary of the innovation in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview of the claimed subject matter. It is intended to neither identify key or critical elements of the claimed subject matter nor delineate the scope of the subject innovation. Its sole purpose is to present some concepts of the claimed subject matter in a simplified form as a prelude to the more detailed description that is presented later.
Systems and methods for providing actions for users of a computer device from a lock screen interface are provided. A computing device may comprise a touch-sensitive display screen that may allow a user to scroll through a set of user interfaces that may comprise a set of lock screen interfaces—one of which may be associated with the user, if authorized for using the computing device. The computing device may allow the user to scroll to one of the following: a set of locked screen interfaces, a set of sign-in interfaces, a set of applications allowed for use (e.g., a camera) by the computer device (even if the user is not signed-in) and a new mode of functionality for computing device (e.g., a children's entertainment application). The computer system may allow swiping from multiple discernible directions to allow the scrolling through user interfaces in a natural manner.
In one embodiment, a method for performing actions for users with a computing device in a locked state is presented, the method comprising: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface; allowing user to scroll from said first user interface to a second user interface; and wherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.
In another embodiment, a computing device is presented comprising: a controller; a touch-sensitive display; an operating system, said operating system capable of executing on said controller and said controlling said computing device; wherein said operating system is capable of managing a set of authorized users for said computing device and presenting associated user interfaces to users of said computing device; further wherein said operating system is capable of: presenting a first user interface to a user of a computing device, said first user interface being a first lock screen interface; allowing user to scroll from said first user interface to a second user interface; and wherein said second user interface being one of a group, said group comprising: a second lock screen, a set of applications allowed to be accessed by said user from said first lock screen and a new mode of functionality for said computing device.
Other features and aspects of the present system are presented below in the Detailed Description when read in connection with the drawings presented within this application.
Exemplary embodiments are illustrated in referenced figures of the drawings. It is intended that the embodiments and figures disclosed herein are to be considered illustrative rather than restrictive.
As utilized herein, terms “component,” “system,” “interface,” “controller” and the like are intended to refer to a computer-related entity, either hardware, software (e.g., in execution), and/or firmware. For example, any of these terms can be a process running on a processor, a processor, an object, an executable, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component and/or controller. One or more components/controllers can reside within a process and a component/controller can be localized on one computer and/or distributed between two or more computers.
The claimed subject matter is described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the subject innovation.
Introduction
While a device is in lock screen mode, it may be desirable to allow the use of some functionality and/or features of the device—even while the device is in such a mode. In many embodiment, various features and/or functionality may be made available and/or their usage from a device in a lock screen mode (e.g., possibly in a multi-user environment) may be made smoother. In many such embodiments, users may be allowed to directly scroll through or otherwise manipulate the lock screen surface—e.g., to switch the user that will sign in, or activate certain functions or features of the device (e.g., the camera or the like).
For merely one example, direct manipulation of a device in lock screen mode might allow the user to switch the locked device into a distinctly different mode (for example, as for children's entertainment application, like a “Kid's Corner”) while still in a locked state.
In
It should be appreciated that, while
In one embodiment, a lock screen may be directly manipulated in (e.g., a touch device) by various gestures and swipes. For example, a swipe in both a first direction may: (1) switch potential users that may sign in when it is swiped; (2) allow a current user to activate some feature and/or functionality (e.g., the camera) when it is swiped; or (3) enable another mode of functionality for the device. For one example, such utility may be desirable in order to allow the current user (whether an authorized user or otherwise) to capture a photo or video for a particular user in a multi-user environment prior to sign in. In another embodiment, swiping gestures (e.g., at the end of a horizontally panning list) may allow the user to switch the device into a distinct new mode, such as a children's entertainment application (“Kid's Corner” or the like). The following is a list of potentially desirable actions:
(i) User Switching from a Locked Device
When a device is locked, the lock screen for the user that was last active on the device may be shown. If another user wants to sign in to the device, the user may simply swipe e.g., to the left or to the right (or any other suitable direction) to find the user's own personalized lock screen. From there, the user may then swipe (possibly in a second direction) to sign in.
If the current user's lock screen is displayed on the device, then the device may receive another swipe/gesture at 206 to produce the current user's sign on screen at 208. At this point, the current user may enter his/her sign on credentials (e.g., a password, other swipe gestures or the like) at 210—thereby allowing the current user to access the device (e.g., as at a Start screen or the like).
(ii) Multi-User Camera from a Locked Device
In another embodiment, while a device is locked, a current user may be able to activate one of a set of allowed applications (e.g., using the camera) from the lock screen. One paradigm example would be to capture a photo or video without first signing in.
In one paradigm example, a user may swipe down on the lock screen and the camera is activated for that user. Photos and videos that are captured will be placed into that user's “camera roll” folder. If a different user wanted to take photos or videos and have that media saved to her camera roll folder, the user may swipe from left to right on the lock screen to find her own personalized lock screen, then swipe up to activate the camera for the user and save the media to the user's own camera roll.
It may be appreciated that the set of allowed application for a given user may be different for different users of the device. This may be set by the administrator and/or owner of the device, as desired.
(iii) Activating a New Mode from a Locked Device
In another embodiment, while the device is locked, a user may be able to swipe to switch between various users' lock screens. In one embodiment, at the end of that list, a new mode may be presented to the user—into which the user may swipe into a screen that activates a new, distinct mode on the locked device, such as Kid's Corner, a demonstration mode, etc.
(iv) Distinct Behavior Accessible Via Directional Swipe from a Locked Device
In another embodiment, while the device is locked, it may be possible to allow a user to swipe in a number of distinct directions to access different behavior. For merely exemplary purposes, a user may engage in: (1) swiping up to unlock the device; (2) swiping down to access one of a set of allowed applications (e.g., the camera) for the user whose lock screen is shown; and/or (3) swiping left or right to switch between various users' lock screens, or goes into a new mode, like Kid's Corner.
If this is not the current user, then the current user may swipe/gesture (at 520b) to access other users' lock screens (506). Once the desired lock screen is presented by the device, then the current user may continue swiping/gesturing—as in 520a through 520d, and continue as desired.
In other embodiments, a user may swipe left or right, directly on the lock screen, to switch between various users' lock screens. Once on a particular lock screen, the user can swipe up to sign in for that user, or swipe down to activate the camera for that user. A user may swipe from a user's lock screen to a mode, such as Kid's Corner. This “mode” would likely be on the end of the list of users' lock screens. It could be on the far left end of the list or the far right end of the list. A user may activate the camera from a locked device for a particular user, after landing on that user's lock screen.
What has been described above includes examples of the subject innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the subject innovation are possible. Accordingly, the claimed subject matter is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.
In particular and in regard to the various functions performed by the above described components, devices, circuits, systems and the like, the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the claimed subject matter. In this regard, it will also be recognized that the innovation includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the claimed subject matter.
In addition, while a particular feature of the subject innovation may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes,” and “including” and variants thereof are used in either the detailed description or the claims, these terms are intended to be inclusive in a manner similar to the term “comprising.”
Number | Name | Date | Kind |
---|---|---|---|
7617530 | Ruzyski | Nov 2009 | B2 |
7657849 | Chaudhri | Feb 2010 | B2 |
8136053 | Miller | Mar 2012 | B1 |
8341557 | Pisula | Dec 2012 | B2 |
8776095 | Huang | Jul 2014 | B2 |
9213822 | Dellinger | Dec 2015 | B2 |
9367672 | Eggerton | Jun 2016 | B2 |
9423952 | Tamegai | Aug 2016 | B2 |
9880717 | Persson | Jan 2018 | B1 |
20020038333 | Evans | Mar 2002 | A1 |
20030227487 | Hugh | Dec 2003 | A1 |
20050066202 | Evans | Mar 2005 | A1 |
20050107114 | Ocock | May 2005 | A1 |
20050188313 | Matthews | Aug 2005 | A1 |
20070204016 | Kunz | Aug 2007 | A1 |
20080036743 | Westerman | Feb 2008 | A1 |
20080126978 | Bai | May 2008 | A1 |
20080168403 | Westerman | Jul 2008 | A1 |
20080177821 | Tsao | Jul 2008 | A1 |
20090259968 | Hsieh | Oct 2009 | A1 |
20090282473 | Karlson | Nov 2009 | A1 |
20100223558 | Feng | Sep 2010 | A1 |
20100231537 | Pisula | Sep 2010 | A1 |
20100235794 | Ording | Sep 2010 | A1 |
20100306718 | Shim | Dec 2010 | A1 |
20120009896 | Bandyopadhyay et al. | Jan 2012 | A1 |
20120023573 | Shi | Jan 2012 | A1 |
20120032945 | Dare | Feb 2012 | A1 |
20120036552 | Dare et al. | Feb 2012 | A1 |
20120084734 | Wilairat | Apr 2012 | A1 |
20120154301 | Kang | Jun 2012 | A1 |
20120166998 | Cotterill et al. | Jun 2012 | A1 |
20120223959 | Lengeling | Sep 2012 | A1 |
20120259707 | Thielke | Oct 2012 | A1 |
20120284297 | Aguera-Arcas | Nov 2012 | A1 |
20120284673 | Lamb | Nov 2012 | A1 |
20120284789 | Kim | Nov 2012 | A1 |
20120331548 | Tseng | Dec 2012 | A1 |
20130035141 | Murakami | Feb 2013 | A1 |
20130069893 | Brinda | Mar 2013 | A1 |
20130203397 | Vidal | Aug 2013 | A1 |
20130305354 | King | Nov 2013 | A1 |
20130332885 | Ji | Dec 2013 | A1 |
20140189596 | Taniuchi | Jul 2014 | A1 |
20140223542 | Hicks | Aug 2014 | A1 |
20140237378 | Gonen | Aug 2014 | A1 |
20150074798 | Liu | Mar 2015 | A1 |
20160196419 | Kuscher | Jul 2016 | A1 |
20160371872 | Bao | Dec 2016 | A1 |
20170139584 | Santhiveeran | May 2017 | A1 |
Number | Date | Country |
---|---|---|
102402661 | Apr 2012 | CN |
102449916 | May 2012 | CN |
102830920 | Dec 2012 | CN |
102917348 | Feb 2013 | CN |
2424200 | Feb 2012 | EP |
2012088474 | Jun 2012 | WO |
Entry |
---|
“International Search Report & Written Opinion for PCT Patent Application No. PCT/US2013/060490”, dated Dec. 17, 2013, Filed Date: Sep. 19, 2013, 12 Pages. |
Florence Ion et al: “Hands-on: Multiple users, lock screen widgets round out Android 4.2 I Ars Technica”, Arstechnica, Nov. 14, 2812 (Nov. 14, 2812), XP855892155, Retrieved from the Internet:. |
Android 4.2 Feature Highlight: Multiple User Accounts—Published Date: Nov. 14, 2012 Proceedings: NA Author: Cameron Summerson pp. 5 http://www.androidpolice.com/2012/11/14/android-4-2-feature-highlight-multiple-user-accounts/. |
Personalise Your Phone—Retrieved Date: Feb. 27, 2013 Proceedings: NA Author: NA pp. 2 http://www.nokia.com/in-en/support/product/lumia820/userguide/?. |
Hands-on: Multiple Users, Lock Screen Widgets Round Out Android 4.2—Published Date: Nov. 14, 2012 Proceedings: NA Author: Florence Ion and Andrew Cunningham pp. 7 http://arstechnica.com/gadgets/2012/11/hands-on-multiple-users-lock-screen-widgets-round-out-android-4-2/. |
What is the Windows 8 lock screen?—Retrieved Date: Feb. 27, 2013 Proceedings: NA Author: NA pp. 4 http://www.soluto.com/kb/windows-8/what-is-the-windows-8-lock-screen/. |
Communication pursuant to Rules 161(1) and 162 EPC dated Nov. 6, 2015 from European Patent Application No. 13771291.5, 2 pages. |
Response dated May 17, 2016 to the Communication pursuant to Rules 161(1) and 162 EPC dated Nov. 6, 2015 from European Patent Application No. 13771291.5, 14 pages. |
International Preliminary Report on Patentability dated Oct. 8, 2015 from PCT Patent Application No. PCT/US2013/060490, 2 pages. |
First Office Action dated Mar. 30, 2017 from Chinese Patent Application No. 201380075253.6, 11 pages. |
Response filed Aug. 14, 2017 to the First Office Action dated Mar. 30, 2017 from Chinese Patent Application No. 201380075259.6, 11 pages. |
“Second Office Action Issued in Chinese Patent Application No. 201380075259.6”, dated Nov. 27, 2017, 9 Pages. (W/o English Translation). |
“Third Office Action Issued in Chinese Patent Application No. 201380075259.6”, dated Jun. 4, 2018, 11 pages. |
Number | Date | Country | |
---|---|---|---|
20140298190 A1 | Oct 2014 | US |