1. Technical Field
This disclosure relates to the sharing of content (e.g., the online sharing of content), and more particularly to users who have more than one identity from which content may be shared.
2. Description of the Related Art
In recent years, there has been a proliferation of online content sharing services. For example, Facebook®, Twitter®, various other social networking services, and even email can all be considered to be online content sharing services. This has led to a corresponding proliferation in the number of identities than an individual may have that are usable for sharing content (and for various other activities). It has thus become difficult for individuals to manage and share content with the appropriate identity.
It is not uncommon for users to have multiple accounts and/or multiple identities, such as multiple email accounts, multiple usernames, etc. For instance, a user may prefer to keep at least two identities, one for business use and one for personal use, rather than intermixing business and personal communications. Further, the modern digital reality may often be even more complex. A user may have multiple personal identities for different activities, such as a first identity smitty-dude for gaming, a second identity smitty for social networks, a third identity @smitty77 for Twitter®, a fourth identity for some other reason, etc. A user may also have multiple business identities, such as a first identity companyname for the user's role as a representative or owner of the company, a second identity username@companydomain for the user primary business identity, a third identity customer-service@companydomain that the user uses to review and respond to customer inquiries, etc. Such multiple identities may thus include identities from different organizations (e.g., Twitter® vs. an email host). Finally, a user may have some or all of his multiple identities active on his computer or mobile device at the same time.
For purposes of this disclosure, the term “identity” is used to refer to information that identifies an individual or user within a particular information-sharing context. Examples of information-sharing contexts include email, websites, applications, and the like. Accordingly, examples of identities include, without limitation, email addresses, Twitter® handles, Facebook® names, website user names, message board handles, and the like. It is quite common for a user to have identities for professional use, and other identities for personal use. A user may also have multiple identities within a particular information-sharing context. For example, within the Salesforce1® application, different communities may be associated with different customers. Thus by choosing to share a content item with a particular community, the user is choosing to share it with a subset of all of the users of a particular information-sharing context (the Salesforce1® application, in this example).
The presence of multiple active identities may cause problems for the user if he or she shares a content item (e.g., by uploading a post or sending an email) from the wrong identity. Accordingly, it would be desirable to allow the user to easily control the identity with which a content item is associated.
Currently, if a user sharing a content item realizes in time that the wrong identity is selected, she can rectify the situation by first copying the link to the content item (e.g., to the clipboard), then exiting the first identity (which often means exiting the application), then re-opening the application using a different identity, and then posting the copied link. This can be a frustrating and time-consuming experience for the user. Thus, it would be advantageous to have a feature that allows for quick switching of identities.
Turning now to
In system 100, content-sharing application 102 allows a user to share a content item with a selected audience. The content item may in some cases be newly created, or it may be a content item which was discovered within content-sharing application 102 (e.g., after having been shared by another user, etc.). In some embodiments, it may be a content item from external data source 106, such as a different application or site.
Regardless of the source of the content item, it is commonly the case that the user wishes to share it with one or more of content recipients 108A-108M. Because the user has various identities 104A-104N, the content-sharing application receives a selection of which of the identities should be used to share the content item. The content item is then shared via network 110 with the desired recipients.
According to some embodiments, process flows according to this disclosure may include steps that are carried out on a mobile device. In other embodiments, a user may initiate certain aspects from a mobile device, but some steps may be carried out on a server computer system. The mobile device and the server computer system in such embodiments may be connected via a network such as the Internet. For example, in one embodiment, a user interface may be presented to a user via a mobile device, and a database of identities may be stored on a server in communication with the mobile device. In another embodiment, the database of identities may be stored locally at the mobile device. In some embodiments, a database may be used to store the items of content themselves. One of ordinary skill in the art with the benefit of this disclosure will understand that various types of database or other storage technologies may be used in accordance with this disclosure. One of ordinary skill in the art with the benefit of this disclosure will also understand that the teachings herein are applicable to various types of situations in which sharing content is a goal.
Turning now to
If the user selects (e.g., clicks or taps on) button 204, a dropdown menu as shown in
Turning now to
At step 302, a request to share a content item is received from a user. The content item may in some embodiments be a newly created content item such as new post 202, discussed above. In other embodiments, the content item may be a pre-existing content item, such as an article on a website, a map location, a text, contact information, a photo, a video, an audio clip, or the like. At step 302, it is noted that the request is associated with a first identity out of a plurality of identities associated with the user. For example, the first identity may be a default identity that the computing system has associated with the user. In other embodiments, the first identity may instead be a particular identity that the user has previously selected. The plurality of identities may in one embodiment be different identities all associated with the same information-sharing context (e.g., a particular application, etc.). Flow proceeds to step 304.
At step 304, a selection of a second, different identity from the plurality of identities is received. For example, this selection could be received via a user interface element such as what was shown in
At step 306, the computing system causes the content item to be shared via the second identity. It is noted that the request to share the content item, the selection of the second identity, and the sharing are all associated with a single content-sharing workflow.
For purposes of this disclosure, the term “content-sharing workflow” refers to a series of steps performed via one or more user interface elements to share a content item. For example, a series of user interface elements that permit a user to select a content item to be shared via an application, select an identity with which to share the item, and then share the content item via the application would constitute a single content-sharing workflow. If, on the other hand, a user begins a content-sharing workflow, cancels the operation, and then re-commences sharing, this would constitute two different content-sharing workflows. For example, one or more dialog boxes might be user interface elements used in some cases to allow the user to share the content item. Thus
Turning now to
At step 402, a request to share a content item is received from a user. In this example, no default identity is selected for the user. Instead, at step 404, a selection of an identity is received from the user. For example, the user may be prompted with a list of available identities, and the selection may be based on that list. Flow proceeds to decision block 406.
At decision block 406, it is determined whether or not the selected identity is the correct one, or whether information indicating a selection of a different entity has been received from the user. For example, the user could be prompted to confirm that the selected identity is correct. In other embodiments, a user interface element could be displayed to the user to offer the user the option of selecting a different identity. If the selected identity is not correct at decision block 406, then flow loops back to step 404, and the user is able to select a different identity. If the selected identity is correct, then flow proceeds to step 408.
At step 408, the content is shared via the selected identity. Flow ends at step 408.
Turning now to
At
At
At
At
It should also be noted that in some embodiments, within a single content-sharing workflow, the user may share the same content item from multiple identities. For example, the user might select a first identity, complete the sharing process, and then be given an opportunity (e.g., via a “share again” button not shown in
It should also be noted that while
Turning now to
At step 602, a request is received from a user to share a content item. Various types of content items have already been described above, and this step may include any suitable type of content item. The request to share may be received at a mobile device or a server computer system, for example via an external application. Flow proceeds to step 604.
At step 604, an indication is received from the user of which application should be used to share the content item. For example, in some embodiments, an operating system-level dialog box may be used to provide the user with options for the available sharing applications. In some embodiments, this functionality may be built into an external application. Flow proceeds to step 606.
At step 606, an indication is received from the user of which identity (e.g., which identity within the context of the selected application) should be used to share the content item. Once the user has selected an identity, flow proceeds to step 608.
At step 608, an opportunity is provided to the user to select a different identity. For example, a button or other user interface element may be provided to the user to activate a list of possible identities. In some embodiments, a confirmation user interface element may be used to confirm that the user has already selected the correct identity. Once the user has selected a new identity or confirmed the existing identity, flow proceeds to step 610.
At step 610, the content item is shared via the selected application and from the selected identity. Flow ends at step 610.
As noted above, in some embodiments, the content item to be shared may not come from an external application. That is, in some cases, it may be unnecessary to consider the question of which application is to be used for sharing the content item, because the content item may be coming from the desired application.
Turning now to
As shown in
In this instance, as shown in
If the user selects button 704, a dropdown menu as shown in
At
For the sake of brevity, some elements in this content-sharing workflow similar to those shown at
Turning now to
At step 802, a request is received from a user to share a content item. The content item may be an existing content item (e.g., something previously shared by another user), or it may be a newly created content item. The request to share may be received at a mobile device or a server computer system, for example via an external application. Flow proceeds to step 804.
At step 804, an indication is received from the user of which identity (e.g., which identity within the context of the selected application) should be used to share the content item. Once the user has selected an identity, flow proceeds to step 806.
At step 806, an opportunity is provided to the user to select a different identity. For example, a button or other user interface element may be provided to the user to activate a list of possible identities. In some embodiments, a confirmation user interface element may be used to confirm that the user has already selected the correct identity. Once the user has selected a new identity or confirmed the existing identity, flow proceeds to step 808.
At step 808, the content item is shared from the selected identity. Flow ends at step 808.
Turning now to
Computing device 910 may be any suitable type of device, including, but not limited to, a personal computer system, desktop computer, laptop or notebook computer, mobile phone, mainframe computer system, web server, workstation, or network computer. As shown, computing device 910 includes processing unit 950, storage subsystem 912, input/output (I/O) interface 930 coupled via interconnect 960 (e.g., a system bus). I/O interface 930 may be coupled to one or more I/O devices 940. Computing device 910 further includes network interface 932, which may be coupled to network 920 for communications with, for example, other computing devices.
As described above, processing unit 950 includes one or more processors. In some embodiments, processing unit 950 includes one or more coprocessor units. In some embodiments, multiple instances of processing unit 950 may be coupled to interconnect 960. Processing unit 950 (or each processor within processing unit 950) may contain a cache or other form of on-board memory. In some embodiments, processing unit 950 may be implemented as a general-purpose processing unit, and in other embodiments it may be implemented as a special purpose processing unit (e.g., an ASIC). In general, computing device 910 is not limited to any particular type of processing unit or processor subsystem.
As used herein, the terms “processing unit” or “processing element” refer to circuitry configured to perform operations or to a memory having program instructions stored therein that are executable by one or more processors to perform operations. Accordingly, a processing unit may be implemented as a hardware circuit implemented in a variety of ways. The hardware circuit may include, for example, custom very-large-scale integration (VLSI) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A processing unit may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like. A processing unit may also be configured to execute program instructions or computer instructions from any suitable form of non-transitory computer-readable media to perform specified operations.
Storage subsystem 912 is usable by processing unit 950 (e.g., to store instructions executable by and data used by processing unit 950). Storage subsystem 912 may be implemented by any suitable type of physical memory media, including hard disk storage, floppy disk storage, removable disk storage, flash memory, random access memory (RAM—SRAM, EDO RAM, SDRAM, DDR SDRAM, RDRAM, etc.), ROM (PROM, EEPROM, etc.), and so on. Storage subsystem 912 may consist solely of volatile memory in some embodiments. Storage subsystem 912 may store program instructions executable by computing device 910 using processing unit 950, including program instructions executable to cause computing device 910 to implement the various techniques disclosed herein.
I/O interface 930 may represent one or more interfaces and may be any of various types of interfaces configured to couple to and communicate with other devices, according to various embodiments. In some embodiments, I/O interface 930 is a bridge chip from a front-side to one or more back-side buses. I/O interface 930 may be coupled to one or more I/O devices 940 via one or more corresponding buses or other interfaces. Examples of I/O devices include storage devices (hard disk, optical drive, removable flash drive, storage array, SAN, or an associated controller), network interface devices, user interface devices or other devices (e.g., graphics, sound, etc.).
This specification includes references to “one embodiment,” “some embodiments,” or “an embodiment.” The appearances of these phrases do not necessarily refer to the same embodiment. Particular features, structures, or characteristics may be combined in any suitable manner consistent with this disclosure.
Various units, circuits, or other components may be described or claimed as “configured to” perform a task or tasks. In such contexts, “configured to” is used to connote structure by indicating that the units/circuits/components include structure (e.g., circuitry) that performs the task or tasks during operation. As such, the unit/circuit/component can be said to be configured to perform the task even when the specified unit/circuit/component is not currently operational (e.g., is not on). The units/circuits/components used with the “configured to” language include hardware—for example, circuits, memory storing program instructions executable to implement the operation, etc. Reciting that a unit/circuit/component is “configured to” perform one or more tasks is expressly intended not to invoke 35 U.S.C. §112(f) for that unit/circuit/component.
Although specific embodiments have been described above, these embodiments are not intended to limit the scope of the present disclosure (even where only a single embodiment is described with respect to a particular feature). Examples of features provided in the disclosure are intended to be illustrative rather than restrictive unless stated otherwise. The above description is intended to cover such alternatives, modifications, and equivalents as would be apparent to a person skilled in the art having the benefit of this disclosure. Although some example embodiments are described as providing various advantages, any particular embodiment according to this disclosure may provide some, all, or even none of such advantages.
The scope of the present disclosure includes any feature or combination of features disclosed herein (either explicitly or implicitly), or any generalization thereof, whether or not it mitigates any or all of the problems addressed herein. Accordingly, new claims may be formulated during prosecution of this application (or an application claiming priority thereto) to any such combination of features. In particular, with reference to the appended claims, features from dependent claims may be combined with those of the independent claims and features from respective independent claims may be combined in any appropriate manner and not merely in the specific combinations enumerated in the appended claims.
This application claims priority to U.S. Provisional Application Ser. No. 62/048,378, filed on Sep. 10, 2014, which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
62048378 | Sep 2014 | US |