专利摘要:
METHOD AND OPERATING DEVICE OF A MOBILE DEVICE. The present invention relates to devices and methods for allowing smart phone users to "capture the moment" by allowing easy access to a camera application when a mobile device (100) is in an above (or locked) lock mode, while also preventing unauthorized access to other smart phone functionality. According to a modality of the disclosed technology, a method of operating a mobile device (100) that has a lock state state above and lock below comprises receiving invocation that requests input data from a camera application when the mobile device ( 100) is in the lock state above and invoke the requested camera application on the device, where one or more functions of the requested application are unavailable as a result of the mobile device (100) which is in the lock state above.
公开号:BR112013000658B1
申请号:R112013000658-7
申请日:2011-07-08
公开日:2021-03-02
发明作者:Shamik Bandyopadhyay;Donald A. Barnett;Vikram Kapoor;Veronica Y. Law;Kathryn C. Lemson;Tirthankar Sengupta;Divya Tyamagundlu;Ahmad Bilal
申请人:Microsoft Technology Licensing, Llc;
IPC主号:
专利说明:

TECHNICAL FIELD
[0001] The present invention relates to apparatus and methods for enhancing user experiences when using a mobile device that comprises an image capture device, such as a photo or video camera. BACKGROUND
[0002] With the growing popularity of mobile devices that have image capture functionality, including cell phone devices, handheld devices, handheld computers, smart phones, and PDAs, there is a need to improve the user experience by allowing quick access to image capture functionality from mobile devices while also preventing unauthorized and / or accidental access to other features on the device.
[0003] Mobile devices with cameras often have a locked mode to prevent accidental or unauthorized access to the device. However, in many situations, it is desirable to capture a photo or video without having to unlock a mobile device (for example, using a key combination, entering a personal identification number (PIN), or using fingerprint) in order to quickly and spontaneously "capture the moment".
[0004] So, there is ample opportunity for technology improvement to allow mobile device users quick access to a subset of image capture functionality in order to quickly capture images, while not allowing access to other mobile device functionality. , including access to private information on the mobile device. SUMMARY
[0005] Devices, computer-readable storage media, and methods to enable mobile device users to "capture the moment" through quick access to a subset of mobile device image capture features while the mobile device is in use are revealed. a blocked state. In certain embodiments, this access can be provided even when the device is in a state that requires authentication for access.
[0006] The techniques and tools described for solutions to improve the performance and experience of the mobile device can be deployed separately, or in various combinations with each other. As will be described in more detail below, the techniques and tools described can be deployed on hardware that includes touchscreen keyboards or hardware keyboards. As will become readily apparent to the person skilled in the art, the disclosed technology can be deployed using multiple portable platforms coupled with an image capture device, including, but not limited to, cell phones, smart phones, PDAs, devices laptops, laptops, PDAs, touchscreen tablet devices, tablet computers, and laptop computers.
[0007] In some examples of the disclosed technology, a method of operating a mobile device that has a plurality of authentication states, including a locked and unlocked state, includes receiving first input data that requires triggering an image capture application when the mobile device is in the locked state and triggers the requested application on the device, where one or more functions of the requested application available in the unlocked state are unavailable to a mobile device user while the mobile device is in the locked state.
[0008] In some examples, the method additionally includes receiving second input data requesting one of the unavailable functions and, based on the second input data, presenting a user interface for the operable user to change the state of the mobile device to the unlocked state. In some examples, the method additionally includes receiving third party input data and using the user interface and changing, based on the third party, the state of the mobile device to the unlocked state, and, after changing the state of the mobile device, providing the application requested on the mobile device, where at least one of the previously unavailable functions is made available to the user.
[0009] In some examples, the requested application is an image capture application. In some examples, the image capture application includes a camera roll. In some examples, the requested application has one or more functions available when it is in the locked state, including at least one or more of the following: capturing an image, providing a capture settings menu, or switching between image capture mode. video or photo. In some examples, functions unavailable in the locked state include at least one or more of the following: deleting an image, uploading an image, or uploading an image to a remote server.
[00010] In some examples of the revealed technology, the method additionally includes capturing an image and determining, after capture, the state of the mobile device, where, if the state of the mobile device is the unlocked state, the image is transmitted to a location remote from the mobile device, but if the state of the mobile device is the locked state, then do not transmit the image to a remote location of the mobile device. In some examples, the method additionally includes waking the mobile device from a standby state based on the receipt of first input data.
[00011] In some examples of the technology revealed, the requested application is an image capture application, and the first input data is received as a result of compressing an image capture button for a predefined duration. In some examples, the first input data is received as a result of the compression of a detected image capture button and the second input data received after detection of the compression of the image capture button. In some instances, the first input data is received as a result of compressing an image capture button at the same time with another button attached to the mobile device. In some examples, providing the requested application includes evaluating a previously stored user setting that allows the requested application to be triggered when the mobile device is in the locked state.
[00012] In some examples, the method additionally includes providing tactile feedback with the mobile device after receiving the first input data. In some examples, the method additionally includes evaluating a proximity sensor attached to the mobile device, and where the delivery of the requested application occurs unless the evaluation determines an object close to the mobile device. In some examples, determining an object in proximity uses a light sensor (for example, a photodiode) instead of a proximity sensor, while in other examples, determining an object in proximity uses signals from a proximity sensor and a sensor of light.
[00013] Another example of the disclosed technology includes one or more computer-readable media that store computer-readable instructions that, when executed by a computer, cause the computer to perform a method of operating a mobile device that has a plurality of states authentication, including a locked and unlocked state, where the method includes receiving first input data that requests an application to be triggered when the mobile device is in the locked state and triggering the requested application on the mobile device, where one or more of the application's functions requested available in the unlocked state are unavailable to a mobile device user while the mobile device is in the locked state.
[00014] In some examples of computer-readable media, the method additionally includes receiving second input data requesting one of the unavailable functions, based on the second input data, presenting a user interface for the operable user to change the state of the mobile device to the unlocked state, receive third party input data using the user interface, change, based on the third party, the state of the mobile device to the unlocked state, and provide, after changing the state of the mobile device, the requested application on mobile device, in which at least one of the previously unavailable functions is made available to the user.
[00015] An additional example of the technology disclosed is a device including one or more image capture devices, one or more input sources coupled to the image capture device, one or more processors, and one or more computer-readable media that store computer-readable instructions that, when executed by processors, cause the device to perform a method of triggering an image capture application. Computer-readable instructions include instructions for receiving input data from the input source, instructions for locking and unlocking the device using authentication, instructions for triggering the image capture application, where the image capture application is operable to capture an image using the image capture device, wherein the image capture application includes a set of a plurality of functions to capture and process the image. The image capture application can detect a locking state of the device, and if the device is unlocked, the image capture application allows access to the set of functions, but if the device is locked, the image capture application allows access to one, but not the full set of functions.
[00016] Some examples of the device additionally include a proximity sensor and proximity check instructions to assess the status of the proximity sensor, including computer-readable instructions to check the status of the proximity sensor after the input module receives the data from entry, instructions for avoiding triggering the image capture module if the assessed situation indicates that an object is in close proximity to a device, and instructions for allowing triggering of the image capture module if the verified situation indicates that an object is not in proximity to the device.
[00017] In some examples of the device, the input source is connected to a camera button, where the camera button is connected to a low power state power supply.
[00018] The antecedent and other objectives, resources and advantages of the invention will become more evident from the following detailed description, which proceeds with reference to the attached figures. BRIEF DESCRIPTION OF THE DRAWINGS
[00019] Figure 1 is a system diagram showing an exemplary mobile device, including a variety of optional hardware and software components.
[00020] Figures 2A and 2B illustrate a generalized example of a mobile device, including a touchscreen display, image capture device, proximity sensors, and buttons.
[00021] Figures 3A and 3B illustrate a generalized example of a mobile device when providing an image capture application.
[00022] Figures 4A and 4B illustrate a generalized example of a mobile device during presentation of settings and image capture options.
[00023] Figure 5A illustrates a generalized example of a mobile device during presentation of a lock screen.
[00024] Figure 5B illustrates a generalized example of a mobile device that features an authentication user interface.
[00025] Figure 6 is a flowchart that outlines an exemplary implementation of the revealed technology.
[00026] Figure 7 is a state diagram that outlines an exemplary implementation of the revealed technology.
[00027] Figure 8 is a flowchart that further details the example implementation illustrated in Figure 6.
[00028] Figure 9 is a state diagram that outlines an aspect of the revealed technology including the use of a proximity sensor.
[00029] Figure 10 is a block diagram that illustrates multiple power supplies from a mobile device.
[00030] Figure 11 illustrates a generalized example of a suitable computing environment in which the modalities, techniques and technologies described can be implemented.
[00031] Figure 12 is a block diagram illustrating a mobile device that comprises several modules stored in a computer-readable storage medium for triggering and running image capture applications in locked or unlocked states.
[00032] Figure 13 illustrates a generalized example of a suitable deployment environment for a mobile device connected to a computing cloud. DETAILED DESCRIPTION
[00033] This description is presented in the context of representative modalities that are not intended, in any way, to be limiting factors.
[00034] For use in this application and in the claims, the singular forms "one", "one" and "o / a" include the plural forms unless the context evidently indicates otherwise. In addition, the term "includes" means "comprises". Additionally, the term "coupled (a)" encompasses mechanical, electrical, magnetic, optical forms, as well as other practical forms of coupling or linking items, and does not exclude the presence of intermediate elements between the coupled items.
[00035] The equipment and methods described in this document should not be interpreted, in any way, as limiting. Instead, this description is aimed at all the new and not obvious features and aspects of the various modalities revealed, alone and in various combinations and sub-combinations with each other. The revealed systems, methods and apparatus are not limited to any specific aspect or feature or combinations thereof, nor do the revealed equipment and methods need one or more specific advantages to be present or problems to be solved.
[00036] Although the operations of some of the revealed methods are in a particular sequential order for convenient presentation, it should be understood that this form of description encompasses redisposition, unless a particular order is required by the specific language presented below. For example, the operations described sequentially can, in some cases, be rearranged, omitted or performed at the same time. In addition, for the sake of simplicity, the attached figures may not show the various ways in which the disclosed equipment and methods can be used in conjunction with other equipment and methods.
[00037] Additionally, the description sometimes uses terms such as "produce", "generate", "select", "capture" and "provide" to describe the revealed methods. These terms are high-level abstractions of the actual operations that are The actual operations that correspond to these terms may vary depending on the particular deployment and are readily discernible by those skilled in the art.
[00038] Any of the revealed methods can be deployed as computer executable instructions stored on one or more computer-readable storage media (for example, non-transitory computer-readable media, such as one or more volatile hard disk components (such as DRAM or SRAM), or non-volatile hard drive components (such as hard drives)) and run on a computer (for example, any commercially available computer, including smart phones or other mobile devices that include computing hardware). Any of the instructions executable on a computer to implement the revealed techniques as well as any data created and used during the implementation of the revealed modalities can be stored in one or more computer-readable media (for example, non-transitory computer-readable media). Computer executable instructions can be part of, for example, a dedicated software application or a software application that is accessed or downloaded via a browser or other software application (such as a remote computing application). Such software can be run, for example, on a single local computer (for example, any suitable commercially available computer) or in a network environment (for example, over the Internet, a wide area network, a local area network, a client server network (such as a cloud computing network), or another network) using one or more networked computers.
[00039] For clarity, only certain selected aspects of software-based deployments are described. Other details that are well known in the art are omitted. For example, it should be understood that the technology disclosed is not limited to any specific language or computer program. For example, the revealed technology can be implemented by software written in C ++, Java, Perl, JavaScript, HTML5, or any other suitable programming language. Likewise, the technology revealed is not limited to any particular computer or type of hardware. Certain details of suitable computers and hardware are well known and need not be presented in detail in this description.
[00040] In addition, any of the software-based modalities (which comprise, for example, instructions executable on a computer to make a computer perform any of the revealed methods) can be uploaded, downloaded, or remotely accessed through an appropriate means of communication. Such a suitable means of communication includes, for example, the Internet, the World Wide Web, an intranet, software applications, cable (including fiber optic cable), magnetic communications, electromagnetic communications (including RF, microwave, and communications by infrared), electronic communications, or other means of communication.
[00041] Theories of operation, scientific principles or other theoretical descriptions presented in this document in reference to the apparatus or methods of that description have been provided for the purposes of better understanding and are not intended to limit the scope. The apparatus and methods in the appended claims are not limited to those apparatus and methods that function in the manner described by such operating theories.
[00042] In the following description, certain terms can be used such as "above", "below", "upper", "lower", "horizontal", "vertical", "left", "right", "about", " in ”,“ next ”, and the like. These terms are used, where applicable, to provide some clarity of description when it comes to relative relationships. However, these terms are not intended to imply absolute relationships, positions and / or orientations .
[00043] For use in this description, locked means that a device is in a state in which at least some functions of the device are not accessible to a user as a result of the device being in the locked (or "locked") state. For use in this description, unlocked means that a device is in a state in which additional functionality is available that is not accessible to a user in the locked state. In addition, a device can be described as having other states that are not necessarily mutually exclusive with locked or unlocked authentication states. For example, in some embodiments, a device may be in a low power state or an active state while it is, at the same time, in a blocked state. Similarly, in some embodiments, a device may be in an unlocked state while it is, at the same time, in a low power or active state.
[00044] The technology revealed refers to the behavior of an image capture application on a mobile device that has a locked and unlocked state. Certain modalities of the technology revealed allow for a quick capture experience that allows the end user to "capture the moment" by providing intuitive mechanisms for the mobile device user to capture a photo while the device is locked, without having to go through the unlock delay the device.
[00045] For example, Yan is having lunch outside with his co-workers. Bob takes a big bite out of his untidy hamburger and, as planned, ketchup, mustard and condiments fall on the front of his shirt. Despite Bob's protests, Yan picks up his camera phone, which employs the revealed technology, including a locked and unlocked state. With one hand trying to defend himself from Bob's attempt to take the camera phone, Yan, with a single hand, takes a photo for future advantage. Yan can quickly take a photo as his camera phone allows him to capture photos even when the device is in a locked state.
[00046] The described technology includes several approaches to improve the speed disparity between capturing images with a mobile device camera when the mobile device is initially locked compared to when the device is unlocked. An exemplary approach is to allow mobile device users to quickly and directly access a subset of functions available in an image capture application for a mobile device. For example, it is desirable (but not necessary) for an image to be captured with a mobile device using only one hand. In addition, it is also desirable (but not necessary) that the image capture functionality on the device is intuitive and perceivable for a user unfamiliar with the device.
[00047] Another example approach, which can be used alone or in combination with the other approaches revealed, allows access to functions for quick image capture, while not allowing access to other functionality without unlocking the device. For example, users other than the primary user or owner of the device may want to quickly capture an image without having to unlock the device or know the password of the primary user. However, the primary user may not want users to be able to access other functions of the camera application, such as viewing previously captured images or sending images to other users via email or SMS.
[00048] Another example approach, which can be used alone or in combination with the other revealed approaches, to reduce the likelihood of accidental image capture (for example, while a mobile device is in a user's pocket or handbag) while the mobile device is in locked mode, while still allowing quick access to intentional image capture.
[00049] Another example approach, which can be used alone or in combination with the other revealed approaches allows for continuous integration with the regular locking / unlocking experience provided by the mobile device.
[00050] Another exemplary approach, which can be used alone or in combination with the other revealed approaches, provides the end user with a clear indication that the image capture device is operating in a locked state, while still meeting all restrictions and requirements relevant security measures that are applicable in the locked state.
[00051] In certain modalities of the disclosed technology, when in the locked state, an image capture application on the mobile device can allow access to a subset of functionality available in the unlocked state. For example, the functionality associated with the viewfinder (capture mode) of an image capture application can provide photo capture, video capture, display of a most recently captured photograph (that is, a "confirmation image"), and adjusting image capture settings, such as flash, zoom, autofocus, white balance, and other image operations. The display functionality available in the locked state typically includes operations that would not compromise the user's privacy if accessed by an authenticated user.
[00052] In addition, another feature normally available in unlocked state (s) can be disabled in locked state (s). For example, automatic uploading of photographs can be disabled in the locked state to prevent accidental or undesirably captured photographs from being uploaded to a remote server or computing cloud. Other functions that can be disabled include delete image, send to, use as, view image gallery, other private image operations.
[00053] In some examples, the user can proceed to an authentication screen of the locked display, and, after successfully authenticating, return to the display with all the features that are available only when in an unlocked state.
[00054] In some instances, a mobile device comprises a state of rest or additional waiting in addition to a blocked state. For example, if the device is in sleep mode in addition to being locked, then the lock state camera experience can be triggered when the end user triggers the mechanism to trigger the capture experience. Alternatively, if the device is in sleep mode, but not locked, then triggering the camera experience causes the regular (unlocked) camera experience to start. As reported above, the locked and unlocked states are not necessarily mutually exclusive with resting, waiting, active or other power states. I. EXAMPLIFYING MOBILE DEVICE
[00055] Figure 1 is a system diagram showing an exemplary mobile device 100 including a variety of optional hardware and software components, shown, in general, at 102. Any components 102 on the mobile device can communicate with any other component , although not all connections are shown, for ease of illustration. The mobile device can be any of a variety of computing devices (for example, cell phone, smart phone, laptop, Personal Digital Assistant (PDA), etc.) and can allow two-way wireless communications with one or more communications networks 104, such as a cellular or satellite network.
[00056] The illustrated mobile device 100 may include a controller or processor 110 (for example, signal processor, microprocessor, ASIC, or other control and processing logic circuitry) for carrying out such tasks as signal encoding, signal processing data, input / output processing, power control and / or other functions. An operating system 112 can control the allocation and use of components 102, including power states, blocked states, and unlock states, and provide support for one or more application programs 114. Application programs may include common mobile computing applications (for example, example, image capture applications, e-mail applications, calendars, contact managers, browsers, message exchange applications), or any other computational application.
[00057] The illustrated mobile device 100 may include hard disk 120. Hard disk 120 may include non-removable hard disk 122 and / or removable hard disk 124. Non-removable hard disk 122 may include RAM hard disk, ROM, flash, a hard drive, or other well-known hard disk storage technologies. Removable hard disk 124 may include a flash hard disk or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known hard disk storage technologies, such as "smart cards". Hard disk 120 can be used to store data and / or code to operate operating system 112 and application programs 1 14. Exemplary data may include Internet pages, text files, images, sound, video data, or other data set to be sent to and / or received from one or more network servers or other devices via one or more wired or wireless networks. Hard disk 120 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server in order to identify users and equipment.
[00058] Mobile device 100 can support one or more input devices 130, such as a touchscreen 132, microphone 134, camera 136, physical keyboard 138, trackball 140, and / or proximity sensor 142, and one or more output devices 150, such as a speaker152 and one or more displays 154. Other possible output devices (not shown) may include piezoelectric or tactile output devices. Some devices may serve more than one input / output function. For example, touchscreen 132 and display 154 can be combined into a single input / output device.
[00059] A wireless modem 160 can be coupled to an antenna (not shown) and can support bidirectional communication between the processor 10 and external devices, as is well understood in the art. Modem 160 is shown generically and may include a cellular modem for communication with the mobile communication network 104 and / or other land modems (for example, Bluetooth 164 or WiFi 162). Wireless modem 160 is typically configured to communicate with one or more cellular networks, such as a GSM network for data and voice communication on a single cellular network, between cellular networks, or between the mobile device and a public telephone network. switched (PSTN).
[00060] The mobile device may additionally include at least one input / output port 180, a power supply 182, a satellite navigation system receiver 184, such as a Global Positioning System (GPS) receiver, an accelerometer 186 , a gyroscope (not shown), and / or a physical connector 190, which can be a USB port, IEEE 1394 (Fire Wire) port, and / or RS232 port. The illustrated components 102 are not required or are all included, as any components can be deleted and other components can be added. II. EXAMPLIFYING MOBILE DEVICE
[00061] Figure 2A shows a front view 210 of an exemplary mobile device 200, while Figure 2B shows a rear view 250 of the mobile device. As shown, the mobile device 200 includes several hardware buttons, including a home button 220, a power button 222, and a camera shutter button (image capture) 224. A screen viewfinder is also shown. touchscreen 230, which is shown displaying a touchscreen unlock button 232, a touchscreen camera shutter button 234, and a locked mode indicator 236.
[00062] The mobile device 200 includes a microphone 240 and speaker 242, together with two proximity sensors 246 and 248, located below the surface of the mobile device. In some instances, a single, or three or more, proximity sensors can be used. Any suitable proximity sensor (s) can be employed. In some instances, proximity sensors 246 and 248 emit an infrared beam and receive a reflected infrared beam, which is reflected from the surface of a nearby object that has been illuminated by the emitted infrared beam. An intensity measurement, or other measured property for the received beam, can be used to determine if an object is close to the mobile device 200. In other examples, the touchscreen display 230 can be used as a proximity sensor. For example, capacity values detected using a capacitive touchscreen sensor attached to the 230 touchscreen display are used to determine if an object is nearby (for example, 1 cm from the touchscreen display touch). In some instances, using a touchscreen sensor, a limited number of rows or columns of the touchscreen display 230 is inactive during proximity detection in order to reduce power consumption. In some instances, an image sensor attached to a 260 camera lens can be used as a light sensor to detect an object near the mobile device 200. For example, objects near the mobile device 200 can be determined using light received through the camera lens 260 with the CMOS-based image sensor, CCD (charge-coupled device), or other suitable technology. In some instances, only a few rows, columns, or pixels of the image sensor are active during proximity verification, in order to reduce power consumption. In some examples of mobile devices that have multiple cameras, one of the cameras can be selected to perform proximity checking based on the selected camera that has lower power consumption, or that has an advantageous position for checking proximity when the mobile device is in a stored position. In some instances, a 280 photodiode can be used as a light sensor instead of a camera image sensor. In some examples, signals from one or more proximity sensors (for example, proximity sensors 246 and 248, and / or the touchscreen display 230) can be combined with signals from a light sensor (for example , an image sensor coupled to the camera lens 260 and / or a photodiode 280) in order to determine objects close to the mobile device 200 with enhanced accuracy.
[00063] The camera shutter button 224 of the mobile device 200 is a dedicated double-action camera shutter button, with the ability to detect "half compression" and "full compression" as separate separate actions. As readily understood by the person skilled in the art, a half compression refers to the partial actuation of a button or other control, while a total compression refers to an additional actuation of the button or control after a determined limit. In some examples, the 224 double-action camera shutter button is associated with the following attributes. When half compression is detected, input data is received with the mobile device that is associated with the auto-focusing functionality. When full compression is detected, input data is received which is associated with camera activation and image capture. In some examples, the end user can adjust an option to determine whether input data that results from half compression or full compression of the camera button initiates functionality when, for example, the viewfinder 230 is off or the device is in standby mode. In some instances, the camera shutter button 224 is not overloaded with other functions during particular operating states, for example, when the mobile device 200 is initializing. Various button rebound times (for example, 62 milliseconds) can be used to detect full compression, half compression, or both. In some instances, a single-action camera button can be used. Although the camera shutter button 224 is shown located on a front surface 205 of the mobile device 200, in other examples, a camera shutter button can be positioned in alternate locations. For example, camera shutter button 224 can be located at location 225 (on a side surface 206) or location 226 (on a back surface 207), respectively, on the mobile device.
[00064] Returning to the rear view 250 shown in Figure 2B, the exemplary mobile device 200 includes the camera lens 260 and an electronic flash 265. In some examples, there is no flash present on the mobile device 200. The individual components (for example , hardware buttons 220, 222, and 224, microphone 240, speaker 242, touchscreen display 230, camera lens 260 and flash 265) can be attached to a mobile device chassis (not shown), which is connected to internal components of the mobile device 200, for example: one or more processors, a piezoelectric actuator, a power supply, and a modem.
[00065] As shown in Figures 2A and 2B, there are several considerations that can be made when placing components on the mobile device 200, such as the home button 220, the power button 222, the camera shutter button 224, the camera lens 260, electronic flash 265, proximity sensors 246 and 248 and photodiode 280. For example, it is desirable that the placement of camera shutter button 224 allows or even encourages a user to naturally position the mobile device 200 in a landscape position when capturing images. It is also desirable that the camera shutter button 224 is positioned in such a way that the operation of the button is facilitated with the use of an index finger or thumb. For example, the camera shutter button 224 as shown can be easily accessed with the user's right thumb when capturing an image with the mobile device 200 in a landscape position. In other examples, the camera shutter button 224 can be moved to other suitable positions, for example, locations 224 or 226. It is also desirable for the camera shutter button 224 and / or the power button 222 to be positioned to avoid accidental action in order to mitigate the chance that an image capture application will be launched inadvertently.
[00066] Another desirable aspect of placing the camera shutter button 224 should be positioned in such a way that the user can easily actuate the button without covering the camera lens 260 or one or more of the proximity sensors 246 and 248. For example , as shown in Figure 2A, proximity sensors 246 and 248 and photodiode 280 are positioned in a location where the user's fingers are less likely to be close to proximity sensors when the camera shutter button 224 is engaged. III . EXAMPLE MOBILE DEVICE IMAGE CAPTURE APPLICATION
[00067] Figure 3A shows a front view 310 of an example mobile device 300 that displays an image capture application in a locked mode on a touchscreen display 305, while Figure 3B shows a front view 350 of the mobile device 300 that displays an image capture application in unlocked mode. The mobile device 300 in Figures 3A and 3B is shown after capturing an image using a camera attached to the mobile device.
[00068] As shown in Figure 3A, the mobile device 300 is displayed after capturing an image 315 using a camera (not shown) attached to the mobile device while the device was in locked mode. As shown, the display 305 of the mobile device 300 also includes a lock indicator 320, along with controls 330, 332, 334, 336, and 338, which can be used to control a subset of the image capture functionality available in mode of unlocked. These controls include a photo image capture mode button 330 (highlighted to indicate that photo capture is the currently selected capture mode), a 332 video capture mode control, 334 and 336 zoom and pan controls, and an option control 338. The mobile device 300 also includes several hardware buttons, including a camera shutter button 342 located on the side of the mobile device, as well as a search button 344, a home button 346, and a return button 348, which are located on a front surface of the mobile device. These hardware buttons 342, 344, 346 and 348 can be used to trigger and / or perform various operations using the mobile device 300. For example, the camera shutter button 342 can be used to trigger and / or perform a image capture application, as well as control functions in the image capture application, such as autofocusing and / or operating a camera shutter. The search button 344 can be used to trigger and / or perform a user interface to search for data. The home button 346 can be used to navigate the software functionality on the mobile device 300, for example, when setting the mobile device to a home screen state, or trigger other assigned functionality. The return button 348 can be used to navigate the software functionality, for example, when requesting a previously requested object that was viewed using the mobile device 300.
[00069] Referring to Figure 3B, the mobile device 300 is displayed after capturing a 360 image captured using a camera while the mobile device 300 was in an unlocked mode. As shown, the display 365 of the mobile device 300 does not include a locked indicator, and displays controls for additional functions that were not available in locked mode, including image email 370, save image 372, upload image 374, and delete image 376. Also shown on the right side of the mobile device are 300 controls that are also available in locked mode, including a 380 photo image capture mode button, a 382 video mode capture mode button, buttons zoom and pan 384 and 386, and an 388 option control button. The mobile device is shown displaying an exemplary "camera roll" application, which allows a user to view previously captured images (for example, image 362) while slide a finger 390 in the direction shown by arrow 392, which moves 360 and 362 images in the direction of the finger movement along the viewfinder 365. As shown, "toothed holes" in the film can m be displayed on 360 362 images to emphasize the camera roll metaphor, which is further discussed below.
[00070] Although the controls are shown as displayed on a touchscreen, some or all of the controls can be deployed with the use of hardware buttons. IV. EXAMPLIFIER MOBILE DEVICE SETTINGS
[00071] Figures 4A and 4B show an example mobile device 400 that displays options on a display 402. In view 410 shown in Figure 4A, mobile device 400 is shown showing a camera options menu 405 that includes radio buttons 420 to allow the camera button to wake up the phone, along with radio buttons to adjust options, including radio buttons 424 to include GPS information with pictures or videos, radio buttons 426 to automatically upload photos to a computing cloud , and radio buttons 428 to maintain GPS information with portraits that are uploaded to the computational cloud. In some examples, the camera setup options menu 405 and associated radio buttons 420, 424, 426 and 428 are available only when the mobile device 400 is in an unlocked mode. In this way, a mobile device user can configure privacy options to control whether and how GPS information and captured images are uploaded to the computing cloud. As shown, the mobile device 400 in Figure 4A is in an unlock mode, as indicated by the absence of an unlock indicator (which, if locked, would be located in the area indicated by the dotted circle 430).
[00072] In view 440 shown in Figure 4B, mobile device 400 is shown displaying a camera viewfinder settings menu 450 that includes a scroll bar 460 to adjust the autofocusing mode for the camera, a scroll bar 462 to adjust the white balance adjustment for the camera, and a 464 scroll bar to adjust the image effect adjustment for the camera. In the example shown, scroll bars can be adjusted using input data received from the 402 touchscreen display. In other examples, input data received from hardware buttons (for example, hardware buttons 470-472 ), or other input data sources can be used. As shown, display 402 also displays a locked indicator 480, which indicates that mobile device 400 is in a locked state. The settings available in the settings menu 450 are those associated with the display functionality of an image capture application, and thus, in this example, they can be accessed in locked and unlocked states. V. EXEMPLIFIER MOBILE DEVICE LOCK AUTHENTICATION SCREENS
[00073] Figure 5A shows a mobile device 500 that has a touch screen display 510, which displays a lock screen 515, including an unlock slider 520. A mobile device user can slide / drag a finger 525 in the direction indicated by the arrows displayed with the unlock slider 520 (finger movement is in any of the directions indicated by the arrow 522) in order to request a device to display an authentication screen, for example, as shown in Figure 5B. Although the authentication screen shown in Figure 5B uses a PIN panel, other techniques can be used, for example, voice recognition or fingerprint.
[00074] Figure 5B shows the mobile device 500 of Figure 5A after the user slides a finger on the unlock slider 520. As shown, the mobile device 500 features an authentication screen 530 including a PIN panel 540 on the display. touchscreen 510. The user can enter a PIN (for example, a four-digit sequence of numerals) using a finger 550 on the pin panel 540. If the PIN entered corresponds to a stored PIN, the user is authenticated successfully, and the device can enter an unlocked (unlocked) state. SAW. EXAMPLE DRIVING IMAGE CAPTURE APPLICATION IN BLOCKED MODE
[00075] Figure 6 is a flowchart 600 that outlines an exemplary method of receiving input data during a blocked state from a mobile device and starting and running an application in the blocked state that can be used in certain modalities of the disclosed technology.
[00076] In process block 610, the input data is received requesting the activation of an application while a device is in a blocked state. For example, a mobile device can receive input data from an input source such as one or more hardware buttons, a touchscreen, one or more accelerometers, or a microphone. The requested application may include an image capture application, such as a camera or video capture application, although other applications, such as voice recording, GPS, or other desired applications can be launched and / or executed. The device can be adjusted in the locked state using various techniques, including using an interval, a lock screen, etc. In some examples, input data is received using a specified hardware button or key, for example, a camera button on a mobile phone. In other examples, a set of key presses or touchscreen gestures can be used.
[00077] In process block 620, the application requested in process block 610 is triggered, although some functionality of the application is not provided as a result of the device in a locked state. For example, if the requested application is an image capture application, a subset of the normal application functionality is provided: magnification, offset, shutter and viewfinder options. Even if the application is launched, other functions that are normally available in unlock mode are not available. For example, the image capture functionality application, such as sending a captured image via e-mail, or other applications or functions normally available on the mobile device, such as e-mail, browser, contacts, and making calls, is prevented from being accessed. . In this way, a mobile device user is provided with useful functionality to immediately capture an image with the device, but not functionality that is not useful for image capture, or that could compromise the privacy of the primary user of the mobile device.
[00078] In process block 630, additional input data is received by requesting an unavailable function on the mobile device. For example, a request is received to request the use of the camera roll, or a request to view the contact list on the mobile device. The device remains in the locked state, and proceeds to process block 640.
[00079] In process block 640, as a result of the device receiving a request for an unavailable function, an authentication user interface is presented for the user to enter authentication credentials to unlock the device. For example, the user may be asked to enter a PIN number using the touchscreen of a mobile device, by pressing a key combination (such as "Call" and "*"), entering a password, or providing fingerprint or voice data for authentication. In some examples, after receiving authentication input, the mobile device can proceed directly to the requested functionality in process block 630, instead of presenting the regular device initial screen. VII. STATUS DIAGRAM FOR AN EXEMPLIFYING MOBILE DEVICE
[00080] Figure 7 is a state diagram 700 that outlines various states of an exemplary mobile device according to certain modalities of the disclosed technology. In lock screen state 710, the mobile device is on a lock screen in a locked state. While in the 710 lock screen state, the mobile device can display multiple behaviors consistent with a lock screen, such as displaying a lock screen as shown in Figure 5A, displaying a blank screen or wallpaper, or turning off the mobile device display and / or other selected features or components (for example, if the mobile device is in a standby state or a low power state).
[00081] In transition 712, the input data is received requesting the activation of an application, for example, activation of an image capture application such as a digital camera or digital video application camera in a blocked state. Several input methods for creating a trigger that requests input data from an application, consistent with the goals of allowing quick access to a camera application while preventing accidental triggering of the camera or unnecessary power consumption, are available, including the following examples.
[00082] A first option, known as "Camera Button Compression and Retention", involves a mobile device user pressing and holding a dedicated hardware camera button connected to the mobile device while the mobile device is in a locked mode during a certain period of time (for example, for one second). The predetermined time is used to mitigate accidental camera launches when the device is, for example, in a user's handbag or pocket. examples, a proximity sensor can also be employed to mitigate accidental launch. In some instances, an image capture device (such as a camera) can be used to supplement, or be used instead of, a proximity sensor for determine if the objects are close to the mobile device.
[00083] When the end user presses and holds the camera button, a camera application (for example, an image capture application) is launched and a live viewfinder appears on the mobile device display screen. After the display is made available, the user can release the camera button, after which the locked display functionality is made available. For example, a user can then provide half compression on the camera button to autofocus the image displayed on the viewfinder, or provide full compression on the camera button to capture an image. In some instances, the mobile device may provide feedback through the vibration of the mobile device chassis or the vibration of a mobile device button, for example, through the vibration of the camera shutter button. By providing vibration feedback, a user who has intentionally pressed the camera shutter button receives tactile feedback that the locked camera app has launched and is ready to capture an image. For an unintended button compression, the mobile device user is thus alerted that the camera application has been launched inadvertently (for example, by the button inadvertently pressed while in a user's handbag or pocket) and thus , the user can act to reposition the mobile device to prevent such inadvertent activation or return of the mobile device to a waiting state.
[00084] A second option, known as "Camera Button Compression with Touch Based User Interface Confirmation", involves a mobile device user pressing the camera button while the mobile device is in a locked mode, after which the mobile device has an on-screen confirmation user interface that asks for confirmation that the user actually intends to use the camera. For example, after receiving a camera button compression, the mobile device displays a camera icon on the touchscreen from a mobile device, and the user touches the touchscreen on the camera icon (for example, touchscreen camera button 234) to confirm the user’s intention to use the camera app. After receiving a successful confirmation , an application (for example, an image capture application) is launched and a live viewfinder appears on the display screen of the mobile device. io can, for example, capture images or autofocus images on the viewfinder in a manner similar to Camera Button Compression and Retention.
[00085] A third option, known as "Key Combination Compression", involves a mobile device user pressing and holding a camera button and one or more other buttons (for example, a 220 power button) simultaneously for at least a predetermined duration (for example, one second). After a compression and retention of these two buttons is detected, the mobile device launches the camera application and the live viewfinder is displayed on the screen. camera (for example, an image capture application) is launched and a live viewfinder appears on the display screen of the mobile device. After the viewfinder is made available, the user can capture images or autofocus images on the viewfinder in a similar way as with Compression and Camera Button Retention.
[00086] As will be readily understood by one skilled in the art, the three options for creating input data discussed above have varied advantages and attributes that can be selected in order to achieve a desired user experience. For example, the "Camera Button Compression and Retention" option allows one-handed control of a mobile device, which advantageously allows a user to keep a free hand while using the camera. "Camera Button Compression with Touch Based User Interface Confirmation" provides additional security against accidentally firing the camera application, but it may be more difficult for some users to perform with a single hand. In addition, providing the confirmation user interface allows the mobile device to distract the user during a delay while the image capture application is launched, thus providing a more enjoyable user experience. The "Key Combination Compression" option also provides additional security against additional triggering of the camera application, but it may be more difficult for some users to perform with a single hand. In addition, this option involves designing decisions related to the placement of the two or more buttons on the mobile device.
[00087] Despite the input method used, after receiving a trigger that requests input data from an application, the mobile device enters state 720, the camera viewfinder mode is blocked. If the device is in a standby, rest, or other low power mode, the mobile device is also awakened from that state before the application is launched. It appears that the requirement for a compression of the camera button to wake the mobile device can create power supply or other design problems to be addressed in the projection of the physical chassis to the mobile device. In addition, during the launch of the requested application in a blocked state, other applicable device management restrictions or standards may continue to be honored by the device.
[00088] While in camera viewfinder mode in the locked state, the user is presented with only a subset of the full functionality of the image capture application. For example, the user can be presented with functions for capturing an image, switching between photo and video mode, zoom in / out options, or image capture, including adjusting the camera's autofocus mode, image white balance, flash on / off, image effect, or other functions suitable for non-private use. In some examples, functions that are not made available to the user may include functions for viewing previously captured images, uploading images, uploading images, or other functions less suitable for non-private use (for example, unauthorized use by unknown or untrusted user). In this way, the mobile device functions that could reveal sensitive private data are hidden from unknown or untrusted users, although it still allows quick capture using functions suitable for non-private use.
[00089] In some instances, the display functionality in a locked state can be simplified in such a way that more new guest users, who may not be familiar with a particular mobile device, are not distracted by more complex options, such as viewing and adjusting image histograms, shutter speed, photo sensor sensitivity (for example, ISO sensitivity), aperture, or image quality.
[00090] The device can also transition 716 back to the lock screen state 710 if, for example, the device does not receive input after a specific period of time, or the user presses a designated key (for example, the power).
[00091] In state 720 (locked camera viewfinder mode), if the input data is received by requesting image capture (transition 722), for example, by pressing a camera button attached to the mobile device (for example, example, camera button 224), then the mobile device captures one or more photo or video images, and enters state 730, for locked post-capture mode.
[00092] In state 730, the mobile device is in a locked camera post-capture mode, during which a confirmation image is displayed, and the user is presented with a subset of the full functionality of the image capture capabilities. For example, it can be presented to the user, it can be functions for enlarging / distancing the confirmation image, or viewing image properties such as the aperture or shutter speed used to capture the current image. Functions that are not available to the user may include functions to delete the captured image or other previously captured images, upload or upload captured images to the computing cloud, use the captured image as a home screen wallpaper, or other private functions. In some examples, the mobile device uses a "camera roll" metaphor (for example, it displays images on a strip similar to a traditional film camera), as discussed above in Figure 3B and attached text. The use of a camera roll allows a user to swipe the finger across a touchscreen and thereby move the image in the direction of the slide (or a drag or flip) and allows a user to be previously taken photos . In some examples, the confirmation image can be deleted for a predetermined period of time, after which the image is added to the camera roll with other images previously captured. In some examples, the most recent images and other images cannot be deleted in locked mode after being added to the camera roll. In some instances, the camera roll capability is disabled in locked mode, and if such input is received, the mobile device transitions 732 to the mobile device unlock user interface state 740.
[00093] After receiving input data to return to the display, or simply waiting for a predetermined period of time (for example, five seconds), the mobile device transits 726 to return to the 720 camera locked display status. However, if another entry is received (for example, by requesting one of the functions available to the user by pressing a button other than the camera button and / or the power button, or by attempting to use the camera roll, or the user explicitly requests the device to be unlocked), the mobile device transitions 732 to the mobile device unlock user interface state 740.
[00094] In state 740, the mobile device has an unlocking user interface for the user. For example, the user should be prompted to enter a PIN number using the touchscreen of a mobile device, press a key combination (such as "Unlock" and "*"), or provide fingerprint or voice recognition . If the mobile device is successfully unlocked, the state of the mobile device changes to state 750 or 760, depending on how state 730 was entered.
[00095] The user can also enter state 740 directly from the state of the 710 lock screen mobile device. For example, during the presentation of the lock screen, receive specific input (for example, receive a compression on a power button, receiving a compression on any key, or other predetermined input) causes the device to transition via transition 742 to state 740. In this case, if the mobile device does not successfully authenticate a user, the device follows transition 746 back to state 710, remaining in a locked mode at all times. If the mobile device successfully authenticates a user, then the state device changes to unlock mode, and the device transitions to the normal home screen of the mobile device in state 760.
[00096] If, instead, the user enters state 740 of locked camera post-capture mode (state 730), then the user is presented with a similar lock screen, and the mobile device attempts to authenticate a user with the use of similar methods as described above. If the mobile device cannot authenticate the user, or the user presses the power button, then the device transitions to state 710 and presents the mobile device's lock screen. In other examples, the device transits 734 back to state 730 (locked post-capture display mode). Alternatively, if the mobile device successfully authenticates the user, then the device does not transition to state 760, but instead transitions 736 to state 750 to enter the camera post-capture mode in the unlocked state. In this way, a user who enters the lock screen from a locked post-capture mode is placed in unlocked post-capture mode after authentication. This avoids the inconvenience of the user having to find their way back to the image capture application after authentication. In some examples, the user returns to the 770 display state in a state similar to that of the lock screen, with the camera roll in a similar state, similar approach options, etc.
[00097] In some examples, the mobile device also includes an interval period (for example, one minute) for one or more of the blocked states 710, 720, 730 and 740. If the mobile device does not detect user activity before the interval period expires, the device transitions back to the locked and / or resting state (or other low power state). However, in some instances, if the video recording is in progress, the camera does not enter the locked and / or rest states, but instead can continue recording beyond the expiration of the interval period.
[00098] In state 760, the user has transitioned from the mobile device unlock user interface state 740 and is presented with a top-level home screen for the device. That is, a user in state 760 can activate the mobile device applications, such as an image capture application, through the use of menus associated with the home screen, or by pressing the image capture button.
[00099] In state 770, the mobile device has placed a camera viewfinder in unlocked mode, for example, when moving 762 from state 760 or moving 776 from state 750. The mode of unlocked viewfinder in state 770 includes a larger set of functions . For example, the functions described above 720 as being inaccessible such as deleting images, uploading images, uploading images, and viewing previously stored images can now be accessed. Specific display functions that are potentially complex or confusing, such as adjusting camera settings, including ISO sensitivity, aperture, shutter speed, and the like, can additionally be made available to the user. Since a user who has unlocked the device is likely to be the owner of the mobile device, these additional features may have a lower risk of confusing or misleading the user. The device can return to the initial screen state 760 upon input supply or after an interval period has expired. The mobile device can also transition 766 back to the home screen in a similar way to transition 716.
[000100] In state 750, the mobile device is in an unlocked post-camera capture mode. At this time, additional functionality can be provided, such as additional functions for deleting images, uploading images, uploading images, and viewing previously stored images. After receiving user input to return to the display, or the expiration of an interval period, the mobile device returns to state 770. In addition, the device can transit 772 from state 770 in a similar way to transition 722, and also transit 776 similarly to state 726, as discussed above.
[000101] As will be understood by the person skilled in the art, the state diagram shown in Figure 7 is a representative modality, but alternative combinations, additions and deletions can be carried out within the scope and spirit of the invention. For example, some examples include using a proximity sensor in conjunction with other input data to perform state transitions, as discussed below in Figure 9 and attached text. Some examples do not include the transition 722 to a post-capture mode when in locked mode. In these examples, the device, instead, transits 716 back to the lock screen state 710. VIII. EXAMPLE DRIVING OF IMAGE CAPTURE APPLAITIVE IN BLOCKED MODE
[000102] Figure 8 is a flow chart 800 of another more detailed example method of receiving incoming data while a mobile device is in a locked state and activates an image capture application that can be used in the revealed technology modalities .
[000103] In process block 810, the input data is received to activate an image capture application during lock mode. Input data can come in many forms, including, for example, Camera Button Compression and Retention, Camera Button Compression with Touch Based User Interface Confirmation, or Key Combination Compression, as further discussed above. As the method advances to process block 820, tactile feedback, such as vibrating one or more camera buttons, or an actuator connected to a mobile device, can be provided by activating one or more actuators to vibrate a or more of the buttons or the entire chassis of the device. In some examples, and as further described above, the method may also use a proximity sensor to determine whether to provide such feedback, or whether to proceed to process block 820.
[000104] In process block 820, a camera viewfinder associated with the image capture application is displayed with a limited number of functions in locked mode.
[000105] In process block 830, the second input data is received to capture an image through, for example, a camera shutter button. After capturing an image, the method proceeds to process block 840.
[000106] In process block 840, a set of one or more post-capture controls is presented to the user to select a post-capture function. For example, the user can be introduced to the functions for enlarging / distancing the captured image, or viewing the image properties such as aperture or shutter speed that were used to capture the image. Functions that are not available to the user can include functions to delete the captured image or other previously captured images, upload or upload images to a server in a computing cloud, or use the captured image as a wallpaper for the phone.
[000107] In process block 850, the method evaluates whether a post-capture input selection is received before a predetermined time interval period (for example, five seconds) expires. If the interval period expires, the method advances to process block 855, where the mobile device is placed in a locked mode, which may include being placed in a low power state or another standby state. If a selection of post-capture input data is received before the interval period expires, the method advances to process block 860.
[000108] In process block 860, a check is performed to determine if the selected post-capture action is allowed while the device is in a locked mode. If so, the method proceeds to process block 870, where the selected action is performed, and then returns to display the camera viewfinder in process block 820. If post-capture action is not allowed, the method proceeds for process block 880.
[000109] In process block 880, an unlock screen is displayed to the user. The user then tries to unlock or authenticate the use of an interface provided by the unlock screen. If authentication is successful, then the device is placed in unlock mode, and the method proceeds to process block 890.
[000110] In process block 890, the selected action is performed, and the method advances to process block 895. The selected action can be performed, and the method can proceed to process block 895, without the need for input such as selections from a home screen or other mobile device menus. In process block 895, the device displays the camera display, but due to the fact that the mobile device is now in unlock mode, the display can show additional controls for functions that were only available in unlock mode. For example, functions not available on the locked display such as deleting images, uploading images, uploading images, and viewing previously stored images can now be accessed. IX. STATUS DIAGRAM FOR AN EXEMPLIFYING MOBILE DEVICE
[000111] Figure 9 is a state diagram 900 that outlines various states of an exemplary mobile device that incorporates a proximity sensor and / or a light sensor according to the disclosed technology. The use of a proximity sensor and / or light sensor attached to a mobile device can assist in determining whether an object is close to the device (for example, the mobile device is in a user's handbag or pocket). By avoiding triggering an image capture application, the risk of accidental capture can be mitigated. In state 910, a portable phone coupled to a proximity sensor and a camera is in a locked standby state, with its display off and the camera application off. If a full compression (as discussed above in Figure 2A and attached text) of the camera key is detected, the phone transits 912 to state 920, where one or more proximity sensors determine whether an object is in proximity to one or more of the sensors. If the proximity check fails 926 (for example, a nearby object is detected), the device transitions back to state 910, returning to the blocked standby state. If the proximity check is approved (for example, a nearby object is not detected), the device transits 922 to state 930, where a timer waits for a predetermined period of time (for example, a second). If the camera key is released during the time period, the device transits 932 back to state 910, and returns the device to a standby mode. If the camera key is not released during the time period, then the device launches a camera application and transitions to state 950. In some instances, tactile shapes or other forms of feedback are provided to the user. For example, as discussed above in relation to process blocks 810 and 820, tactile feedback is created by activating a piezoelectric actuator coupled to the camera shutter button or mobile device chassis to alert the user that the camera application was triggered, as well as to alert the user to a possibly inadvertent launch of a camera application.
[000112] In state 950, a camera application is triggered in the display mode. This includes connecting one or more displays attached to the device, and preparing the camera to capture an image. In some examples, images received by the camera are displayed live on the viewfinder. During state 950, the device waits until it receives half or full compression of the camera key. If half compression is detected, the device autofocuses the camera and returns 956 to state 950. If full compression of the camera key is detected, the device captures an image and advances 954 to a post-capture mode (not shown) before returning to state 950. If a compression and quick release of the power key is detected, the device's camera and viewfinder (s) are turned off, and the device transits 952 to state 910.
[000113] Other state transitions can be performed from state 910 with the use of the power key. For example, if a quick compression and release of the power key is detected, the device turns on the viewfinder and transitions 962 to state 960. In state 960, the camera viewfinder is on, but the device is locked and your camera is off . If a full compression of the camera key is detected, the device launches the camera and transits 968 to state 950. Alternatively, if a compression and quick release of the power key is detected, the display is turned off, and the device transits 964 to state 910, where the image capture module and / or image capture applications are placed in sleep mode.
[000114] In some examples, the camera application includes additional logic for handling key bounce situations in order to avoid prolonged or repeated use of the proximity sensor or camera unit. An example of such a bounce situation is when the camera button is held down accidentally for an extended period (for example, 30 seconds). Another example of such a bounce situation is when the camera button is accidentally pressed at regular intervals repeatedly. In some instances, the mobile device may provide tactile feedback, such as by actuating an actuator attached to one or more of the mobile device buttons or the mobile device chassis, in order to alert the user that the mobile device may launch the application inadvertently.
[000115] In some examples, the mobile device includes additional functionality to assist users in revealing locked camera features. For example, upon the first attempt to launch (for example, the first launch for a given mobile device example) of an image capture application in a locked state, the mobile device immediately places the unlock screen . Thus, after purchasing a new mobile device, the user must use an image capture application at least once before the application can be used in a locked state. As another example, if the device is not locked using a PIN or other identification authentication (for example, a touchscreen mobile device can be unlocked with a key combination compression, or when physically opening devices with a shellfish shape suit), then launching an image capture application will automatically "unlock" the phone. In some examples, where the mobile device is not locked with the use of a PIN or other personal identification, requesting the API unlock screen (for example, when the user slides his finger to enter the camera roll) will return immediately the user to the corresponding unlocked state, without showing an unlocking user interface. X. EXEMPLIFYING POWER SUPPLY FOR A MOBILE DEVICE
[000116] Figure 10 is a block diagram 1000 that illustrates two power supplies: a low power state power supply 1005, which powers the mobile device components when a mobile device is in a low power or active state. , and an active state power supply 1050, which powers the mobile device components when the device is in an active power state, but turns off the associated device components when the device is in a low power state. As shown, components powered in the low power state include a 1010 power button, a 1020 camera shutter button, and a 1030 wireless modem receiver. Thus, only a subset of mobile device components are powered and functional when the device is in the lower power state.
[000117] Additional components, including other 1060 keyboard buttons, a 1070 touchscreen display, a 1080 wireless modem transmitter, and 1090 volume buttons are powered by the active state power supply 1050, so the components can be turned off when the mobile device is in a standby state. XI. OTHER COMPUTATIONAL ENVIRONMENTS EXEMPLIFIED- RES
[000118] Figure 11 illustrates a generalized example of a suitable computational environment 1100 in which the described modalities, techniques and technologies can be implemented. For example, the 1100 computing environment can deploy a locked image capture application, an unlocked image capture application, and a proximity sensor verification application, as described above.
[000119] The computational environment 1100 is not intended to suggest any limitations to the scope of use or functionality of the technology, since the technology can be deployed in various general or special purpose computing environments. For example, the revealed technology can be deployed with other configurations of digital camera or computer system devices, including portable devices, multiprocessor systems, programmable microprocessor-based or consumer electronic devices, network PCs, minicomputers, computers central, and the like. The revealed technology can also be practiced in distributed computing environments where tasks are performed through remote processing devices that are connected through a communication network. In a distributed computing environment, modules or program instructions can be located on local and remote hard disk storage devices.
[000120] With reference to Figure 11, the computing environment 1100 includes at least one central processing unit 1110 and the hard disk 1120. In Figure 11, this most basic configuration 1130 is included in a dotted line. The central processing unit 1110 executes instructions executable on a computer and can be a real processor or a virtual one. In a multiple processing system, multiple processing units execute instructions executable on a computer in order to increase the processing power and, as such, multiple processors can be executed simultaneously. The 1120 hard drive can be a volatile hard drive (for example, registers, cache, RAM), a non-volatile hard drive (for example, ROM, EEPROM, flash hard drive, etc.), or some combination of the two. The 1120 hard drive stores the 1180 software that can, for example, deploy the technologies described in this document. A computing environment can have additional resources. For example, the 1100 computing environment includes 1140 storage, one or more 1150 input devices, one or more 1160 output devices, one or more 1170 communication connections, and one or more 1190 touch screens. connection (not shown) as a bus, a controller, or a network, interconnects the components of the 1100 computing environment. Typically, the operating system software (not shown) provides an operating environment for other software that runs in the 1100 computing environment, and coordinates activities of the components of the 1100 computing environment.
[000121] Storage 1140 can be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, CD-RWs, DVDs, or any other non-transitory storage medium that can be used to store information and that it can be accessed in the 1100 computing environment. The 1140 storage stores instructions for the 1180 software, which can deploy the technologies described in this document.
[000122] The 1150 input device (s) can be a touch sensitive input device, such as a touchscreen, keyboard, auxiliary keyboard, mouse, pen or trackball, a voice input device, a scanning device, proximity sensor, image capture device, or other device, that provides input to the 1100 computing environment. For audio, the 1150 input device (s) can be a sound card or similar device that accepts audio input in analog or digital form. The 1160 output device (s) can be a monitor, touchscreen, printer, speaker, CD recorder, or other device that provides output from the 1100 computing environment. The 1190 touchscreen can act as an input device (for example, by receiving touchscreen input) and as an output device (for example, through the display of an image capture application and authentication interfaces).
[000123] The communication link (s) 1170 allows communication through a means of communication (for example, a connection network) with another computing entity. The communication medium carries information such as computer executable instructions, compressed graphic information or other data in a modulated data signal.
[000124] Computer-readable media are any available media that can be accessed within a 1100 computing environment. By way of example, and not limitation, with the 1100 computing environment, computer-readable media includes 1120 hard disk and / or storage 1140. As should be readily understood, the term computer-readable storage media includes non-transitory storage media for data storage such as hard disk 1120 and storage 1140, and non-transmission media such as modulated data signals. XII. EXAMPLIFIED MOBILE DEVICE NETWORK ENVIRONMENTS
[000125] Figure 12 illustrates a generalized example of a suitable deployment environment 1200 for a mobile device 1205 connected to a computing cloud 1208. The mobile device 1205 includes several modules including computer-readable instructions stored in one or more readable storage media per computer 1210, including an input detection module 1230 for receiving input, a touch input module 1250 for receiving touchscreen input from one or more touchscreen displays 1252, and an output module 1240 to provide output to a touchscreen, a speaker and / or a piezoelectric transducer. The input detection module 1230 can be configured to receive input from one or more low power state buttons 1234 when the mobile device 1205 is in a low power or active power state, as well as receive input from one or more power buttons. active state 1232 when the mobile device is in an active power state. A communication module 1220 adapts to the mobile device 1205, so that it can communicate with service providers located in the computing cloud 1208 (for example, using an appropriate wireless and wired network and communication protocol).
[000126] The one or more computer readable storage media 1210 also includes a 1270 authentication module to authenticate a user using a lock screen user interface, a 1260 proximity detection module to detect objects in proximity one or more proximity sensors 1262, image capture module 1280, and one or more image capture applications 1282. The image capture module 1280 and / or one or more image capture applications 1282 are coupled to a image capture device (for example, 1284 camera). In some instances, the image capture module provides functionality such as a camera viewfinder that uses the 1252 touchscreen viewfinder, while the 1282 image capture applications provide functionality such as uploading or sending capture images to the computational cloud 1208. In some embodiments, all or a portion of the authentication module, image capture module, and / or image applications may be provided by a service provider at an alternate location 1290 in the computational cloud 1208.
[000127] Figure 13 illustrates another generalized example of a suitable deployment environment 1300 in which described modalities, techniques and technologies can be implemented.
[000128] In the example environment 1300, various types of services (for example, computing services) are provided by a 1310 computing cloud. For example, the 1310 computing cloud can comprise a collection of computing devices, which can be centrally located or distributed , which provides cloud-based services for various types of users and devices connected through a network such as the Internet. The 1300 deployment environment can be used in different ways to perform computing tasks. For example, some tasks (for example, processing user input and presenting a user interface) can be performed on local computing devices (for example, connected devices 1330, 1340, 1350), while other tasks (for example, storage of data to be used in subsequent processing) can be performed in the 1310 computational cloud.
[000129] In the example environment 1300, the computational cloud 1310 provides services for connected devices 1330, 1340 and 1350 with a variety of display capabilities. The connected device 1330 represents a device with a 1335 computer screen (for example, a medium-sized screen). For example, the connected 1330 device could be a personal computer such as a desktop, laptop, notebook, netbook, or similar computer. The connected device 1340 represents a device with a 1345 mobile device screen (for example, a small screen size). For example, the connected 1340 device could be a mobile phone, smart phone, personal digital assistant, tablet computer, and the like. The connected device 1350 represents a device with a large 1355 screen. For example, the connected device 1350 could be a television screen (for example, a smart television) or another device connected to a television (for example, a set-top console) box or game) or similar. One or more of the connected devices 1330, 1340 and 1350 may include touchscreen capabilities. Touch screens can accept input in different modes. For example, capacitive touch screens can detect touch input when an object (for example, a fingertip or pen) distorts or interrupts an electrical current that passes through the surface. As another example, touch screens can use optical sensors to detect touch sensitive input when optical sensor beams are broken. Physical contact with the screen surface is not necessary for the input to be detected by some touch screens. Devices without display capabilities can also be used in a 1300 example environment. For example, the 1310 computing cloud can provide services to one or more computers (for example, server computers) without monitors.
[000130] Services can be provided by computational cloud 1310 through service providers 1320, or through other online service providers (not shown). For example, cloud services can be customized for the screen size, display capability and / or touchscreen capability of a particular connected device (for example, 1330, 1340, 1350 connected devices).
[000131] In the example environment 1300, the computational cloud 1310 provides the technologies and solutions described in this document for the various connected devices 1330, 1340, 1350 using, at least in part, the 1320 service providers. 1320 service providers can provide a centralized solution for various cloud-based services. 1320 service providers can manage service subscriptions for users and / or devices (for example, for connected devices 1330, 1340, 1350 and / or their respective users).
[000132] The methods, apparatus and systems disclosed should not be construed as limiting in any way. Instead, the present disclosure is directed at all the innovative and non-obvious features and aspects of the countless modalities revealed, alone and in various combinations and subcombination between them. The methods, apparatus and systems revealed are not limited to any specific aspect or feature or combination thereof, nor to revealed modalities that require any one or more specific advantages to be present or problems to be solved. The techniques and solutions described in this application can be used in various combinations to provide an enhanced user experience with mobile devices, including mobile devices such as smart phones.
[000133] Any of the methods described in this document can be performed using one or more computer-readable means (for example, storage or other tangible means) that comprise (for example, have or store) instructions executable on a computer to perform (for example, make a computing device perform) such methods. The operation can be completely automatic, semi-automatic or involve manual intervention.
[000134] With the described and illustrated principles of our innovations in the detailed description and attached drawings, it will be recognized that the numerous modalities can be modified in the layout and details without departing from such principles. For example, any technologies described in this document for capturing still photographs can also be adapted to capture video. It should be understood that the programs, processes or methods described in this document are not related to or limited to any particular type of computing environment, unless otherwise indicated. Various types of general purpose or specialized computing environments can be used with or to perform operations according to the techniques described in this document. The elements of the modalities shown in software can be implemented in hardware and vice versa.
[000135] In view of the many possible modalities to which the principles of the disclosed invention can be applied, it should be recognized that the illustrated modalities are only preferred examples of the invention and should not be taken as limiting the scope of the invention. In particular, the scope of the invention is defined by the appended claims. Therefore, it is claimed as the present invention everything that is included in the scope of these claims and their equivalents.
权利要求:
Claims (12)
[0001]
1. Method of operating a mobile device that has a plurality of authentication states, including a locked state and an unlocked state, the method performed on a computer-readable storage device characterized by the fact that it comprises the steps of: triggering a application on the mobile device in the locked state, where: at least one or more of the following functions are available in the locked state: capture an image, provide an image capture settings menu, or switch between a video capture mode and a frozen image capture mode, and at least one or more of the following application functions are available to a user while the mobile device is in the unlocked state but are unavailable to the mobile device user while the mobile device is in the locked state: delete a image, upload an image, or upload an image to a remote server; based on the receipt of input data requesting one of the unavailable functions, present an operable user interface to change the state of the mobile device to the unlocked state; receiving input data using the user interface; based on incoming data received, change the state of the mobile device to the unlocked state; and after changing the state of the mobile device to the unlocked state, provide the requested application on the mobile device, unless a proximity sensor detects an object in the vicinity of the mobile device, where at least one of the previously unavailable functions is made available to the user of the mobile device.
[0002]
2. Computer-readable or memory storage device, according to claim 1, characterized by the fact that the method still comprises: capturing an image; and determining, after capture, the state of the mobile device (100), wherein: if the state of the mobile device (100) is the unlocked state, transmit the image to a remote location of the mobile device (100); and if the state of the mobile device (100) is the blocked state, do not transmit the image to a remote location of the mobile device (100).
[0003]
3. Computer-readable or memory-readable storage device, according to claim 1, characterized by the fact that the method still comprises the step of waking the mobile device from a waiting state based on the receipt of the input data requesting to activate the application.
[0004]
4. Computer-readable or memory storage device according to claim 3, characterized by the fact that the input data is received as a result of the compression of an image capture button (224) for a predefined duration.
[0005]
5. Computer-readable or memory storage device according to claim 3, characterized by the fact that the input data is received as a result of both the compression of an image capture button (224) and the receipt of data. second input data after detecting the compression of an image capture button (224).
[0006]
6. Computer-readable or memory-readable storage device according to claim 3, characterized by the fact that the input data is received as a result of the compression of an image capture button (224) at the same time with another button coupled to the mobile device (100).
[0007]
7. Computer-readable or memory-readable storage device, according to claim 1, characterized by the fact that the step of activating the application still comprises evaluating a previously stored user setting allowing the application to be activated when the mobile device is in the state caught.
[0008]
8. Computer readable storage device or memory, according to claim 1, characterized by the fact that it still comprises the step of providing feedback related to touch when activating the application.
[0009]
9. Computer-readable or memory storage device according to claim 1, characterized by the fact that the method further comprises evaluating both a proximity sensor (142) and a light sensor coupled to the mobile device (100), and where the delivery of the application occurs unless the assessment determines an object close to the mobile device (100).
[0010]
10. Apparatus, which comprises: an image capture device; one or more input sources coupled to the image capture device, the input sources comprising an operable image capture button to initiate image capture with the image capture device; a proximity sensor (142); one or more processors (110); and one or more computer-readable means that have a method characterized by the fact that they understand: receiving input data from the input source, waking the device from sleep or standby mode, in response to the input data, indicating the action of the button image capture, lock and unlock the device using authentication, capture an image using the image capture device and then present a plurality of functions to process the image, in which: if the device is unlocked, the image capture application allows access to the set of functions, and if the device is locked, the image capture application allows access to one or more, but not the entire set of functions, in which the image capture application performs the step of unlocking the device when an inaccessible function is requested when the device is locked, proximity verification steps to assess the status of the proximity sensor, where the viewing step Proximity identification comprises: checking the status of the proximity sensor after the input module receives the input data, preventing the triggering of the image capture module if the evaluated status indicates that an object is close to the device, and allowing the activation of the image capture module if the verified status indicates that an object is not close to the device.
[0011]
11. Apparatus according to claim 10, characterized by the fact that the input source is coupled to a camera button, the camera button being coupled to a low-power power source.
[0012]
12. Apparatus according to claim 10, characterized by the fact that it still comprises a touch screen (132) coupled to the device, in which the proximity sensor (142) is the touch screen (132).
类似技术:
公开号 | 公开日 | 专利标题
BR112013000658B1|2021-03-02|operating method of a mobile device, computer-readable means and device
US10599300B2|2020-03-24|Entry points to image-related applications in a mobile device
RU2629434C2|2017-08-29|Method and device for reserved data copying and electronic device
US20170094159A1|2017-03-30|Method for initiating photographic image capture using eyegaze technology
JP6008660B2|2016-10-19|Information processing apparatus and information processing method
同族专利:
公开号 | 公开日
CL2013000041A1|2013-05-03|
MX2013000363A|2013-10-28|
CA2979854A1|2012-01-12|
AU2011274572A1|2013-01-31|
JP6533174B2|2019-06-19|
BR112013000658A2|2016-05-31|
KR101921458B1|2018-11-22|
KR20180088511A|2018-08-03|
AU2011274572B2|2014-09-04|
JP6463426B2|2019-02-06|
EP2591439A4|2017-12-06|
HK1167191A1|2012-11-23|
HK1257127A1|2019-10-11|
KR20170138571A|2017-12-15|
JP2017216741A|2017-12-07|
KR20130093071A|2013-08-21|
US9521247B2|2016-12-13|
IL224050A|2017-07-31|
US20150050916A1|2015-02-19|
JP2016178647A|2016-10-06|
RU2589366C2|2016-07-10|
CN104978139A|2015-10-14|
US8811948B2|2014-08-19|
JP2013534121A|2013-08-29|
US20120009896A1|2012-01-12|
KR101886014B1|2018-08-06|
KR101806426B1|2018-01-18|
RU2013100171A|2014-07-20|
US10686932B2|2020-06-16|
EP2591439B1|2020-11-11|
EP2591439A2|2013-05-15|
CN104978139B|2018-06-08|
EP3349136B1|2021-06-02|
US20170070606A1|2017-03-09|
CN102402380B|2015-06-17|
CA2979854C|2019-02-12|
CN102402380A|2012-04-04|
EP3349136A1|2018-07-18|
JP5922655B2|2016-05-24|
WO2012006480A2|2012-01-12|
CA2804603C|2018-09-25|
ZA201300143B|2014-06-25|
WO2012006480A3|2012-04-05|
CA2804603A1|2012-01-12|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

IL119498A|1996-10-27|2003-02-12|Advanced Recognition Tech|Application launching system|
US6222909B1|1997-11-14|2001-04-24|Lucent Technologies Inc.|Audio note taking system and method for communication devices|
JP3788018B2|1998-03-18|2006-06-21|コニカミノルタフォトイメージング株式会社|Image handling system for electronic imaging device|
JP3649908B2|1998-06-11|2005-05-18|株式会社ケンウッド|Dial lock release method in mobile communication terminal|
US6727830B2|1999-01-05|2004-04-27|Microsoft Corporation|Time based hardware button for application launch|
JP2001069235A|1999-08-26|2001-03-16|Seiko Epson Corp|Portable terminal and its control method|
US6492979B1|1999-09-07|2002-12-10|Elo Touchsystems, Inc.|Dual sensor touchscreen utilizing projective-capacitive and force touch sensors|
JP2001238124A|2000-02-24|2001-08-31|Olympus Optical Co Ltd|Electronic camera|
US6662026B1|2000-09-28|2003-12-09|International Business Machines Corporation|Apparatus and method for detecting and handling accidental dialing on a mobile communications device|
JP3671832B2|2000-10-31|2005-07-13|日本電気株式会社|Mobile phone terminal|
JP3900854B2|2001-05-17|2007-04-04|セイコーエプソン株式会社|Electronic device and power control method thereof|
US20020173345A1|2001-05-17|2002-11-21|Swerup Jan Ingemar|Method and system for phone note taking|
US6985137B2|2001-08-13|2006-01-10|Nokia Mobile Phones Ltd.|Method for preventing unintended touch pad input due to accidental touching|
JP4436583B2|2001-12-19|2010-03-24|富士フイルム株式会社|Digital camera|
US7095442B2|2002-01-31|2006-08-22|Hewlett-Packard Development Company, L.P.|Method and apparatus for capturing an image|
WO2003075585A1|2002-03-04|2003-09-12|Nokia Corporation|Method for intermediate unlocking of a keypad on a mobile electronic device|
JP2003295987A|2002-04-03|2003-10-17|Canon Electronics Inc|Electronic equipment, operation mode control method, program and storage medium|
AU2003233982A1|2002-04-23|2003-11-10|Sony Ericsson Mobile Communications Ab|Pointing device enabling means, input device and portable device incorporating same|
JP2004135177A|2002-10-11|2004-04-30|Sharp Corp|Cellular phone|
JP4053444B2|2003-03-07|2008-02-27|シャープ株式会社|Portable multifunctional electronic equipment|
KR20040093330A|2003-04-29|2004-11-05|주식회사 팬택|Method for button lock according to function in wireless terminal|
JP2005006135A|2003-06-13|2005-01-06|Sanyo Electric Co Ltd|Image photographing device and method for saving power of the device|
JP2005065232A|2003-07-25|2005-03-10|Victor Co Of Japan Ltd|Stream data recording and reproducing method|
JP4284701B2|2003-07-28|2009-06-24|カシオ計算機株式会社|Composite device, power supply control method, and power supply control program|
JP2005057654A|2003-08-07|2005-03-03|Sharp Corp|Portable information terminal|
JP2005151052A|2003-11-13|2005-06-09|Mitsubishi Electric Corp|Camera-attached portable telephone set|
JP2005191991A|2003-12-26|2005-07-14|Hitachi Ltd|Information processor|
JP4245151B2|2004-02-26|2009-03-25|埼玉日本電気株式会社|Mobile phone with use restriction function and method of restricting use of the machine|
US8479122B2|2004-07-30|2013-07-02|Apple Inc.|Gestures for touch sensitive input devices|
US8381135B2|2004-07-30|2013-02-19|Apple Inc.|Proximity detector in handheld device|
US7714265B2|2005-09-30|2010-05-11|Apple Inc.|Integrated proximity sensor and light sensor|
US7603105B2|2004-11-12|2009-10-13|Research In Motion Limited|Method of making phone calls from a locked out handheld electronic device and a handheld electronic device incorporating the same|
US7847789B2|2004-11-23|2010-12-07|Microsoft Corporation|Reducing accidental touch-sensitive device activation|
JP2006166012A|2004-12-07|2006-06-22|Casio Comput Co Ltd|Imaging apparatus, and control method and program for imaging apparatus|
US7433711B2|2004-12-27|2008-10-07|Nokia Corporation|Mobile communications terminal and method therefor|
US7933583B2|2005-04-27|2011-04-26|Nokia Corporation|Method and apparatus for digital image processing of an image from an image sensor|
KR100713494B1|2005-06-20|2007-04-30|삼성전자주식회사|Method for authenticating user using camera module and mobile communication terminal therefor|
US20070016958A1|2005-07-12|2007-01-18|International Business Machines Corporation|Allowing any computer users access to use only a selection of the available applications|
JP4471898B2|2005-07-22|2010-06-02|シャープ株式会社|Portable information terminal device|
US9182837B2|2005-11-28|2015-11-10|Synaptics Incorporated|Methods and systems for implementing modal changes in a device in response to proximity and force indications|
US7657849B2|2005-12-23|2010-02-02|Apple Inc.|Unlocking a device by performing gestures on an unlock image|
US20070234235A1|2006-03-31|2007-10-04|Research In Motion Limited|Activities/applications menu for a mobile communication device|
US20070300140A1|2006-05-15|2007-12-27|Nokia Corporation|Electronic device having a plurality of modes of operation|
US7643895B2|2006-05-22|2010-01-05|Apple Inc.|Portable media device with workout support|
US8564544B2|2006-09-06|2013-10-22|Apple Inc.|Touch screen device, method, and graphical user interface for customizing display of content category icons|
US20080119217A1|2006-11-16|2008-05-22|Sony Ericsson Mobile Communications Ab|Portable communication having accidental key press filtering|
US9049302B2|2007-01-07|2015-06-02|Apple Inc.|Portable multifunction device, method, and graphical user interface for managing communications received while in a locked state|
US8082523B2|2007-01-07|2011-12-20|Apple Inc.|Portable electronic device with graphical user interface supporting application switching|
JP4781296B2|2007-02-20|2011-09-28|キヤノン株式会社|IMAGING DEVICE, ITS CONTROL METHOD, PROGRAM, AND STORAGE MEDIUM|
US20080196945A1|2007-02-21|2008-08-21|Jason Konstas|Preventing unintentional activation of a sensor element of a sensing device|
US20080254767A1|2007-04-10|2008-10-16|Sharp Laboratories Of America, Inc.|System and method for limiting access to features in a mobile telecommunications device|
US8666366B2|2007-06-22|2014-03-04|Apple Inc.|Device activation and access|
US8127254B2|2007-06-29|2012-02-28|Nokia Corporation|Unlocking a touch screen device|
US9477395B2|2007-09-04|2016-10-25|Apple Inc.|Audio file interface|
EP2203865A2|2007-09-24|2010-07-07|Apple Inc.|Embedded authentication systems in an electronic device|
US8701210B2|2007-10-02|2014-04-15|Computime, Ltd.|Adjustable feature access for a controlled environmental system|
US8904479B1|2008-03-28|2014-12-02|Google Inc.|Pattern-based mobile device unlocking|
US20090262078A1|2008-04-21|2009-10-22|David Pizzi|Cellular phone with special sensor functions|
CN101594446A|2008-05-30|2009-12-02|索尼株式会社|Network camera management system and network camera management method|
KR101453908B1|2008-06-24|2014-10-21|엘지전자 주식회사|Mobile terminal and operation control method thereof|
KR101517967B1|2008-07-07|2015-05-06|엘지전자 주식회사|Controlling a Mobile Terminal|
KR101404692B1|2008-08-13|2014-06-27|엘지전자 주식회사|Mobile terminal and operation control method thereof|
US8341557B2|2008-09-05|2012-12-25|Apple Inc.|Portable touch screen device, method, and graphical user interface for providing workout support|
US20100079380A1|2008-09-30|2010-04-01|Nokia Corporation|Intelligent input device lock|
WO2010040670A2|2008-10-06|2010-04-15|Tat The Astonishing Tribe Ab|Method for application launch and system function invocation|
KR101555511B1|2008-10-09|2015-09-25|삼성전자주식회사|Method and apparatus for unlock of portable terminal using Piezoelectric Sensor|
KR101568128B1|2008-11-14|2015-11-12|삼성전자주식회사|Method for operating user interface based on motion sensor and mobile terminal using the same|
US8584031B2|2008-11-19|2013-11-12|Apple Inc.|Portable touch screen device, method, and graphical user interface for using emoji characters|
US20100130263A1|2008-11-21|2010-05-27|Edward Zhang|System and method for dual power source management|
KR101528262B1|2008-11-26|2015-06-11|삼성전자 주식회사|A Method of Unlocking a Locking Mode of Portable Terminal and an Apparatus having the same|
US9197738B2|2008-12-04|2015-11-24|Microsoft Technology Licensing, Llc|Providing selected data through a locked display|
KR101532294B1|2008-12-18|2015-07-01|삼성전자주식회사|Apparatus and method for tagging image|
US8331992B2|2008-12-19|2012-12-11|Verizon Patent And Licensing Inc.|Interactive locked state mobile communication device|
KR101565768B1|2008-12-23|2015-11-06|삼성전자주식회사|Apparatus and method for unlocking a locking mode of portable terminal|
US8355698B2|2009-03-30|2013-01-15|Microsoft Corporation|Unlock screen|
US8539382B2|2009-04-03|2013-09-17|Palm, Inc.|Preventing unintentional activation and/or input in an electronic device|
KR101537706B1|2009-04-16|2015-07-20|엘지전자 주식회사|Mobile terminal and control method thereof|
CN101551727B|2009-05-07|2013-03-27|宇龙计算机通信科技有限公司|Mobile communication terminal and touch-screen input control method and system|
KR101564222B1|2009-05-26|2015-11-06|삼성전자주식회사|Apparatus and method for unlocking a locking mode of portable terminal|
US20100306705A1|2009-05-27|2010-12-02|Sony Ericsson Mobile Communications Ab|Lockscreen display|
CN101699835A|2009-09-16|2010-04-28|中兴通讯股份有限公司|Method for realizing safe use of mobile phone through safe lock and corresponding device|
US8244231B2|2009-09-30|2012-08-14|Research In Motion Limited|Method and apparatus for disambiguating an emergency call attempt during password entry for unlocking a mobile communication device|
US9338274B2|2009-10-02|2016-05-10|Blackberry Limited|Method of interacting with electronic devices in a locked state and handheld electronic device configured to permit interaction when in a locked state|
US9092129B2|2010-03-17|2015-07-28|Logitech Europe S.A.|System and method for capturing hand annotations|
TWI431486B|2010-05-03|2014-03-21|Prime View Int Co Ltd|Electronic reading apparatus and the note recording method thereof|
US20110283241A1|2010-05-14|2011-11-17|Google Inc.|Touch Gesture Actions From A Device's Lock Screen|
US8811948B2|2010-07-09|2014-08-19|Microsoft Corporation|Above-lock camera access|
US20120019704A1|2010-07-26|2012-01-26|Levey Charles I|Automatic digital camera photography mode selection|
KR101160681B1|2011-10-19|2012-06-28|배경덕|Method, mobile communication terminal and computer-readable recording medium for operating specific function when activaing of mobile communication terminal|
US20130283199A1|2012-04-24|2013-10-24|Microsoft Corporation|Access to an Application Directly from a Lock Screen|
US9009630B2|2012-06-05|2015-04-14|Microsoft Corporation|Above-lock notes|
US9665178B2|2012-08-01|2017-05-30|Blackberry Limited|Selective inbox access in homescreen mode on a mobile electronic device|
US9152321B2|2013-05-03|2015-10-06|Barnes & Noble College Booksellers, Llc|Touch sensitive UI technique for duplicating content|US7657849B2|2005-12-23|2010-02-02|Apple Inc.|Unlocking a device by performing gestures on an unlock image|
EP2203865A2|2007-09-24|2010-07-07|Apple Inc.|Embedded authentication systems in an electronic device|
CN101587398A|2008-05-23|2009-11-25|鸿富锦精密工业(深圳)有限公司|Password protection method|
KR101517967B1|2008-07-07|2015-05-06|엘지전자 주식회사|Controlling a Mobile Terminal|
KR100911032B1|2009-04-01|2009-08-05|애니쿼터스|The apparatus and method of cellular phone control with nfc chip and rf reader|
KR101673925B1|2010-05-26|2016-11-09|삼성전자주식회사|Portable Device having the touch lock status and Operation system thereof|
US8811948B2|2010-07-09|2014-08-19|Microsoft Corporation|Above-lock camera access|
US8528072B2|2010-07-23|2013-09-03|Apple Inc.|Method, apparatus and system for access mode control of a device|
TWI441072B|2010-09-21|2014-06-11|Altek Corp|Touch screen unlock method and electric device with camera function thereof|
JP5815932B2|2010-10-27|2015-11-17|京セラ株式会社|Electronics|
US8660531B2|2010-11-03|2014-02-25|Blackberry Limited|Access to locked functions|
US8754860B2|2010-11-05|2014-06-17|Apple Inc.|Device, method, and graphical user interface for manipulating soft keyboards|
US8587547B2|2010-11-05|2013-11-19|Apple Inc.|Device, method, and graphical user interface for manipulating soft keyboards|
KR101808625B1|2010-11-23|2018-01-18|엘지전자 주식회사|Content control apparatus and method thereof|
TWI546700B|2011-01-13|2016-08-21|宏達國際電子股份有限公司|Portable electronic device, and control method and computer program product of the same|
GB201101135D0|2011-01-21|2011-03-09|Inq Entpr Ltd|Electronic device and method with efficient data capture|
US9092132B2|2011-01-24|2015-07-28|Apple Inc.|Device, method, and graphical user interface with a dynamic gesture disambiguation threshold|
US9104288B2|2011-03-08|2015-08-11|Nokia Technologies Oy|Method and apparatus for providing quick access to media functions from a locked screen|
US9189606B2|2011-03-21|2015-11-17|Microsoft Technology Licensing, Llc|Information privacy system and method|
US9229489B2|2011-05-03|2016-01-05|Facebook, Inc.|Adjusting mobile device state based on user intentions and/or identity|
US10222974B2|2011-05-03|2019-03-05|Nokia Technologies Oy|Method and apparatus for providing quick access to device functionality|
US10078755B2|2011-05-27|2018-09-18|Apple Inc.|Private and public applications|
US8638385B2|2011-06-05|2014-01-28|Apple Inc.|Device, method, and graphical user interface for accessing an application in a locked device|
US20130055169A1|2011-08-25|2013-02-28|Samsung Electronics Co. Ltd.|Apparatus and method for unlocking a touch screen device|
US9596084B2|2011-09-09|2017-03-14|Facebook, Inc.|Initializing camera subsystem for face detection based on sensor inputs|
EP2570908A1|2011-09-15|2013-03-20|HTC Corporation|Portable electronic apparatus and operation method thereof and computer readable media|
US20130081133A1|2011-09-23|2013-03-28|Barnesandnoble.Com Llc|System and method for unlocking an electronic device|
US8887081B2|2011-09-24|2014-11-11|VIZIO Inc.|Touch display unlock mechanism|
US8723824B2|2011-09-27|2014-05-13|Apple Inc.|Electronic devices with sidewall displays|
US9002322B2|2011-09-29|2015-04-07|Apple Inc.|Authentication with secondary approver|
US8768249B2|2011-09-29|2014-07-01|Qualcomm Innovation Center, Inc.|Mobile communication-device-controlled operations|
US8769624B2|2011-09-29|2014-07-01|Apple Inc.|Access control utilizing indirect authentication|
US8868039B2|2011-10-12|2014-10-21|Digimarc Corporation|Context-related arrangements|
KR101160681B1|2011-10-19|2012-06-28|배경덕|Method, mobile communication terminal and computer-readable recording medium for operating specific function when activaing of mobile communication terminal|
KR20130046482A|2011-10-28|2013-05-08|삼성전자주식회사|Controlling method for basic screen and portable device supporting the same|
JP5869316B2|2011-11-25|2016-02-24|京セラ株式会社|Portable electronic devices|
US9710982B2|2011-12-23|2017-07-18|Microsoft Technology Licensing, Llc|Hub key service|
US8874162B2|2011-12-23|2014-10-28|Microsoft Corporation|Mobile device safe driving|
JP5762944B2|2011-12-28|2015-08-12|京セラ株式会社|Apparatus, method, and program|
US9372978B2|2012-01-20|2016-06-21|Apple Inc.|Device, method, and graphical user interface for accessing an application in a locked device|
KR101497762B1|2012-02-01|2015-03-05|서울시립대학교 산학협력단|Unlocking method, and terminal and recording medium for the same method|
US9967466B2|2012-02-24|2018-05-08|Htc Corporation|Electronic device and image processing method thereof|
TWI469040B|2012-03-01|2015-01-11|Quanta Comp Inc|Electronic device and locking/unlocking screen method|
US10331286B2|2012-03-02|2019-06-25|NEC Corporatian|Information processing device, processing method, and non-transitory recording medium|
JP5284504B1|2012-03-02|2013-09-11|株式会社東芝|Electronic device, control method of electronic device, control program, and recording medium|
US20130229367A1|2012-03-04|2013-09-05|Michael W. Pinch|Dynamic Patterns for Mobile Device Authentication|
US20130238747A1|2012-03-06|2013-09-12|Apple Inc.|Image beaming for a media editing application|
US9131192B2|2012-03-06|2015-09-08|Apple Inc.|Unified slider control for modifying multiple image properties|
US9202433B2|2012-03-06|2015-12-01|Apple Inc.|Multi operation slider|
US9041727B2|2012-03-06|2015-05-26|Apple Inc.|User interface tools for selectively applying effects to image|
TWI545495B|2012-03-07|2016-08-11|群邁通訊股份有限公司|System and method for operating touch screens|
CN103309479B|2012-03-07|2018-01-30|深圳富泰宏精密工业有限公司|Touch screen operating and method|
JP2013219608A|2012-04-10|2013-10-24|Canon Inc|Information processing apparatus, control method for information processing apparatus, and program|
TWI456487B|2012-04-26|2014-10-11|Acer Inc|Mobile device and gesture determination method|
KR101483776B1|2012-05-07|2015-01-26|이문상|Method and apparatus of lock screen|
US8949974B2|2012-05-11|2015-02-03|Tyfone, Inc.|Mobile device with password protected desktop screen|
US9448813B2|2012-05-24|2016-09-20|Microsoft Technology Licensing, Llc|Entry points to image-related applications in a mobile device|
US10171727B1|2012-05-29|2019-01-01|Promanthan Brains Llc, Series Click Only|Resetting single-control apparatus|
US9313304B1|2012-05-29|2016-04-12|Oliver Markus Haynold|Single-control image-taking apparatus|
US9009630B2|2012-06-05|2015-04-14|Microsoft Corporation|Above-lock notes|
US10354004B2|2012-06-07|2019-07-16|Apple Inc.|Intelligent presentation of documents|
US9715327B2|2012-06-07|2017-07-25|Tandem Diabetes Care, Inc.|Preventing inadvertent changes in ambulatory medical devices|
US8862104B2|2012-06-29|2014-10-14|Intel Corporation|System and method for gesture-based management|
US20140004828A1|2012-06-29|2014-01-02|Apple Inc.|Biometric Receipt|
US9715584B2|2012-06-29|2017-07-25|Apple Inc.|Biometric receipt|
CN102799376A|2012-07-11|2012-11-28|广东欧珀移动通信有限公司|Shortcut function setup method for touch equipment|
US8819850B2|2012-07-25|2014-08-26|At&T Mobility Ii Llc|Management of application access|
WO2014030876A1|2012-08-24|2014-02-27|Samsung Electronics Co., Ltd.|Method and apparatus for determining item based on interaction environment|
US9230076B2|2012-08-30|2016-01-05|Microsoft Technology Licensing, Llc|Mobile device child share|
KR102245648B1|2012-09-10|2021-04-29|에이매스, 아이엔씨.|Multi-dimensional data capture of an environment using plural devices|
KR101992189B1|2012-09-19|2019-06-24|엘지전자 주식회사|Mobile terminal and method for controlling thereof|
JP6071372B2|2012-09-21|2017-02-01|キヤノン株式会社|Electronic device and control method of electronic device|
US20140085245A1|2012-09-21|2014-03-27|Amazon Technologies, Inc.|Display integrated camera array|
CN102929525B|2012-09-24|2016-03-30|惠州Tcl移动通信有限公司|Unlocking screen unit and screen unlock method thereof and mobile communication equipment|
US20140099994A1|2012-10-04|2014-04-10|Nvidia Corporation|Electronic camera embodying a proximity sensor|
US8954736B2|2012-10-04|2015-02-10|Google Inc.|Limiting the functionality of a software program based on a security model|
US9942753B2|2012-10-22|2018-04-10|Pervasive Group, Inc.|Method and system for monitoring and restricting use of mobile devices|
KR101978688B1|2012-10-22|2019-05-15|삼성전자주식회사|Electronic device with microphone device and method for operating the same|
US10412550B2|2012-10-29|2019-09-10|T-Mobile Usa, Inc.|Remote driving of mobile device diagnostic applications|
US10313905B2|2012-10-29|2019-06-04|T-Mobile Usa, Inc.|Contextual quality of user experience analysis using equipment dynamics|
US10237144B2|2012-10-29|2019-03-19|T-Mobile Usa, Inc.|Quality of user experience analysis|
US10952091B2|2012-10-29|2021-03-16|T-Mobile Usa, Inc.|Quality of user experience analysis|
US9538409B2|2012-10-29|2017-01-03|T-Mobile Usa, Inc.|Quality of user experience analysis|
US20140148218A1|2012-11-29|2014-05-29|Htc Corporation|Handheld electronic apparatus and method thereof|
CN103870090A|2012-12-10|2014-06-18|腾讯科技(深圳)有限公司|Shooting start device and method of internal camera of portable data processing device|
KR102003377B1|2012-12-13|2019-07-24|삼성전자주식회사|Apparatas and method for driving a camera module of sleep mode in an electronic device|
EP2933988A4|2012-12-14|2016-07-13|Nec Corp|Information terminal device, information terminal control method, and program|
US8973104B2|2012-12-31|2015-03-03|Google Technology Holdings LLC|Method and system for providing limited usage of an electronic device|
CN104937603B|2013-01-10|2018-09-25|日本电气株式会社|terminal, unlocking method and program|
CN103970260B|2013-01-31|2017-06-06|华为技术有限公司|A kind of non-contact gesture control method and electric terminal equipment|
US9292045B2|2013-02-15|2016-03-22|Apple Inc.|Apparatus and method for automatically activating a camera application based on detecting an intent to capture a photograph or a video|
US20160011990A1|2013-02-28|2016-01-14|Safend Ltd.|System and Method for Conflict-Free Cloud Storage Encryption|
KR102056128B1|2013-02-28|2019-12-17|삼성전자 주식회사|Portable apparatus and method for taking a photograph by using widget|
US9225677B2|2013-03-15|2015-12-29|Facebook, Inc.|Systems and methods for displaying a digest of messages or notifications without launching applications associated with the messages or notifications|
KR20140115761A|2013-03-22|2014-10-01|삼성전자주식회사|Controlling Method of Screen lock and Electronic Device supporting the same|
US10114536B2|2013-03-29|2018-10-30|Microsoft Technology Licensing, Llc|Systems and methods for performing actions for users from a locked device|
CN104104784A|2013-04-10|2014-10-15|中兴通讯股份有限公司|Method and system for automatic screen locking of terminal|
WO2014176746A1|2013-04-28|2014-11-06|Tencent TechnologyCompany Limited|Method and system for automatically capturing an object using a mobile terminal|
US10271265B2|2013-05-08|2019-04-23|Cellcontrol, Inc.|Detecting mobile devices within a vehicle based on cellular data detected within the vehicle|
US10268530B2|2013-05-08|2019-04-23|Cellcontrol, Inc.|Managing functions on an iOS-based mobile device using ANCS notifications|
US10477454B2|2013-05-08|2019-11-12|Cellcontrol, Inc.|Managing iOS-based mobile communication devices by creative use of CallKit API protocols|
US10805861B2|2013-05-08|2020-10-13|Cellcontrol, Inc.|Context-aware mobile device management|
KR102052971B1|2013-05-14|2020-01-08|엘지전자 주식회사|Apparatus and Method for portable device with a fingerprint scanner|
US10168882B2|2013-06-09|2019-01-01|Apple Inc.|Device, method, and graphical user interface for switching between camerainterfaces|
US9585006B2|2013-06-26|2017-02-28|Cellco Partnership|Express mobile device access provisioning methods, systems, and apparatus|
CN103399704A|2013-07-12|2013-11-20|华为终端有限公司|Terminal equipment and locking and unlocking method thereof|
KR101560448B1|2013-07-24|2015-10-16|한국과학기술원|Method for invoking application in Screen Lock environment|
KR101444091B1|2013-08-06|2014-09-26|엘지전자 주식회사|Mobile terminal and control method for the mobile terminal|
KR20150018256A|2013-08-09|2015-02-23|엘지전자 주식회사|Mobile device and method for controlling the same|
US9898642B2|2013-09-09|2018-02-20|Apple Inc.|Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs|
US20160227285A1|2013-09-16|2016-08-04|Thomson Licensing|Browsing videos by searching multiple user comments and overlaying those into the content|
KR102162955B1|2013-10-31|2020-10-08|삼성전자 주식회사|Method for performing authentication using biometrics information and portable electronic device supporting the same|
KR102114386B1|2013-11-21|2020-05-22|현대모비스 주식회사|Mirrorless System for Vehicle|
CN106991305A|2013-11-22|2017-07-28|华为终端有限公司|The processing method and processing device of message|
FR3015721A1|2013-12-19|2015-06-26|Christophe Deshayes|INDEPENDENT T2I MEDIA WITH RECORDING, AUDIO RECOVERY AND BLUETOOTH MP3 FILES RETURN. INTELLIGENT DISPLAY BY LED OR DISPLAY AND CONNECTION TO THE INTERNET BY MODEM SIGFOX|
ES2707325T3|2013-12-25|2019-04-03|Huawei Device Dongguan Co Ltd|Mobile terminal and procedure to start an image taking with a mobile terminal|
US9495527B2|2013-12-30|2016-11-15|Samsung Electronics Co., Ltd.|Function-level lock for mobile device security|
TWI518439B|2014-01-02|2016-01-21|原相科技股份有限公司|Camera device|
US20150193032A1|2014-01-07|2015-07-09|Htc Corporation|Method for controlling electronic apparatus and electronic apparatus applying the method|
KR102191869B1|2014-02-17|2020-12-16|엘지전자 주식회사|Portable and method for controlling the same|
US9509822B2|2014-02-17|2016-11-29|Seungman KIM|Electronic apparatus and method of selectively applying security in mobile device|
ES2874155T3|2014-03-12|2021-11-04|Huawei Device Co Ltd|Screen lock and mobile terminal method|
WO2015137788A1|2014-03-14|2015-09-17|Samsung Electronics Co., Ltd.|Electronic apparatus for providing health status information, method of controlling the same, and computer-readable storage medium|
CN103927224B|2014-03-28|2016-06-29|小米科技有限责任公司|Bead performs method and apparatus|
US9942464B2|2014-05-27|2018-04-10|Thomson Licensing|Methods and systems for media capture and seamless display of sequential images using a touch sensitive device|
US9483763B2|2014-05-29|2016-11-01|Apple Inc.|User interface for payments|
US10223540B2|2014-05-30|2019-03-05|Apple Inc.|Methods and system for implementing a secure lock screen|
US9747558B2|2014-06-04|2017-08-29|W-Zup Communication Oy|Method and system for using and inspecting e-tickets on a user terminal|
US9538062B2|2014-06-04|2017-01-03|Grandios Technologies, Llc|Camera management system|
US20150379915A1|2014-06-27|2015-12-31|LenovoCo., Ltd.|Method for processing information and electronic device|
EP3182692A4|2014-08-12|2018-03-21|Sony Corporation|Information processing device, program, and information processing method|
US20160085980A1|2014-09-22|2016-03-24|Canon Kabushiki Kaisha|Information processing apparatus, imaging device, data management method and control program of photographed image|
US9454235B2|2014-12-26|2016-09-27|Seungman KIM|Electronic apparatus having a sensing unit to input a user command and a method thereof|
CN105808109A|2014-12-29|2016-07-27|阿里巴巴集团控股有限公司|Application program starting method and device|
US9734787B2|2014-12-31|2017-08-15|Htc Corporation|Method for operating mobile electronic device, mobile electronic device, and computer readable medium using the same|
KR20160088081A|2015-01-15|2016-07-25|삼성전자주식회사|Haptic interface of image photographing device and method for controlling image photogrqphing device thereof|
USD805102S1|2015-01-27|2017-12-12|Twitter, Inc.|Media sharing device with graphical user interface|
EP3250996B1|2015-01-30|2019-09-18|Doro AB|Proximity-based accidental lock screen command prevention for mobile communication terminal|
US10291847B2|2015-02-26|2019-05-14|Htc Corporation|Portable device and manipulation method|
US9374521B1|2015-02-27|2016-06-21|Google Inc.|Systems and methods for capturing images from a lock screen|
JP6497549B2|2015-03-05|2019-04-10|カシオ計算機株式会社|Electronic device, touch operation control method, and program|
KR20160120458A|2015-04-08|2016-10-18|엘지전자 주식회사|Mobile terminal and method for controlling the same|
US20160353406A1|2015-05-26|2016-12-01|Trumpit, Inc.|Media information sharing between networked mobile devices|
US9722656B2|2015-06-22|2017-08-01|Super 6 LLC|Mobile device videography system|
US10387704B2|2015-06-29|2019-08-20|Qualcomm Incorporated|Method and apparatus for enabling the touchscreen display of a mobile device|
US9583142B1|2015-07-10|2017-02-28|Musically Inc.|Social media platform for creating and sharing videos|
USD801348S1|2015-07-27|2017-10-31|Musical.Ly, Inc|Display screen with a graphical user interface for a sound added video making and sharing app|
USD801347S1|2015-07-27|2017-10-31|Musical.Ly, Inc|Display screen with a graphical user interface for a sound added video making and sharing app|
USD788137S1|2015-07-27|2017-05-30|Musical.Ly, Inc|Display screen with animated graphical user interface|
CN105630348A|2015-07-31|2016-06-01|宇龙计算机通信科技有限公司|Control method and device based on fingerprint information|
KR20170019789A|2015-08-12|2017-02-22|삼성전자주식회사|Deveice and method for executing application|
AU2015224396A1|2015-09-08|2017-03-23|Canon Kabushiki Kaisha|Camera-driven work flow synchronisation|
WO2017051312A1|2015-09-21|2017-03-30|Discovery Limited|A method of enabling a lock button of a mobile device with an ios operating system to be used by a user to effect an action|
US20170094159A1|2015-09-24|2017-03-30|The Eye Tribe|Method for initiating photographic image capture using eyegaze technology|
WO2017049593A1|2015-09-25|2017-03-30|Intel Corporation|Access control system|
JP6062519B1|2015-09-28|2017-01-18|京セラ株式会社|Electronic device and method of operating electronic device|
US10715997B2|2015-10-08|2020-07-14|Huawei Technologies Co., Ltd.|Method for protecting private information and terminal device|
JP6700708B2|2015-10-09|2020-05-27|キヤノン株式会社|Electronic device, control method thereof, program, and storage medium|
US10447723B2|2015-12-11|2019-10-15|Microsoft Technology Licensing, Llc|Creating notes on lock screen|
JP6727840B2|2016-02-19|2020-07-22|ソニーモバイルコミュニケーションズ株式会社|Imaging device, imaging control method, and computer program|
EP3208733B1|2016-02-19|2020-07-01|Sony Corporation|Terminal device, method, and program|
CN105847243B|2016-03-18|2021-02-26|北京小米移动软件有限公司|Method and device for accessing intelligent camera|
KR101788039B1|2016-04-12|2017-10-19|오스템임플란트 주식회사|Apparatus and method for taking a picture of object using top and bottom button|
CN107317909A|2016-04-26|2017-11-03|富泰华工业(深圳)有限公司|Prevent the system and method for mobile phone misoperation|
JP2016149808A|2016-05-11|2016-08-18|富士通株式会社|Electronic apparatus and display control program|
DK179186B1|2016-05-19|2018-01-15|Apple Inc|REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION|
CN107423592A|2016-05-24|2017-12-01|富泰华工业(深圳)有限公司|Unlocking system and method|
CN106095053B|2016-05-31|2019-06-11|深圳市万普拉斯科技有限公司|False-touch prevention Rouser and method and intelligent terminal|
CN109154764B|2016-06-10|2020-11-17|富士胶片株式会社|Setting device and camera|
KR20180005543A|2016-07-06|2018-01-16|삼성전자주식회사|The Electronic Device including the Dual Camera and Method for controlling the Dual Camera|
CN113794821A|2016-07-29|2021-12-14|麦克赛尔株式会社|Image pickup apparatus|
CN106250025A|2016-08-04|2016-12-21|北京奇虎科技有限公司|The method of camera, device and mobile terminal is called under screen lock state|
KR20180023197A|2016-08-25|2018-03-07|엘지전자 주식회사|Terminal and method for controlling the same|
KR20180027966A|2016-09-07|2018-03-15|삼성전자주식회사|Electronic apparatus and operating method thereof|
CA2970088C|2016-09-30|2022-02-08|The Toronto-Dominion Bank|Device lock bypass on selectable alert|
DE112016007363T5|2016-10-20|2019-07-11|Symbol Technologies, Llc|Mobile device with edge activation|
JP6764326B2|2016-11-30|2020-09-30|マクセル株式会社|Imaging device|
US10247970B2|2016-12-20|2019-04-02|Microsoft Technology Licensing, Llc|Measuring strain on display device|
US10244161B2|2017-01-13|2019-03-26|Microsoft Technology Licensing, Llc|Capturing and viewing private photos and videos|
US10437979B2|2017-02-04|2019-10-08|International Business Machines Corporation|Enhancing security of a mobile device based on location or proximity to another device|
US10437978B2|2017-02-04|2019-10-08|International Business Machines Corporation|Enhancing security of a mobile device based on location or proximity to another device|
US10352789B2|2017-02-09|2019-07-16|Microsoft Technology Licensing, Llc|Measuring strain on display device|
CN108509119A|2017-02-28|2018-09-07|三星电子株式会社|Operating method and its electronic equipment of support for the electronic equipment that function executes|
JP2018191209A|2017-05-10|2018-11-29|オリンパス株式会社|Information recording device, information recording system, and information recording device control method|
CN107451464B|2017-06-27|2020-04-03|北京金山安全软件有限公司|Prompt message output method and device|
CN110291525A|2017-07-06|2019-09-27|惠普发展公司,有限责任合伙企业|The operation of camera is controlled based on power state transition|
US11178272B2|2017-08-14|2021-11-16|Cellcontrol, Inc.|Systems, methods, and devices for enforcing do not disturb functionality on mobile devices|
CN107491677A|2017-08-15|2017-12-19|北京小米移动软件有限公司|Fingerprint recognition processing method, device, equipment and storage medium|
KR102344104B1|2017-08-22|2021-12-28|삼성전자주식회사|The Electronic Device Controlling the Effect for Displaying of the Image and Method for Displaying the Image|
US20190073347A1|2017-09-01|2019-03-07|Google Inc.|Lockscreen note-taking|
KR102301599B1|2017-09-09|2021-09-10|애플 인크.|Implementation of biometric authentication|
KR20200136504A|2017-09-09|2020-12-07|애플 인크.|Implementation of biometric authentication|
US10853490B2|2017-10-26|2020-12-01|Futurewei Technologies, Inc.|Method and apparatus for managing hardware resource access in an electronic device|
RU2680255C1|2018-03-22|2019-02-19|Хуавей ДивайсКо., Лтд.|Mobile terminal and method of launching the shooting on the mobile terminal|
CN110415387A|2018-04-27|2019-11-05|开利公司|Posture metering-in control system including the mobile device being arranged in the receiving member carried by user|
US11170085B2|2018-06-03|2021-11-09|Apple Inc.|Implementation of biometric authentication|
US10860096B2|2018-09-28|2020-12-08|Apple Inc.|Device control using gaze information|
US11100349B2|2018-09-28|2021-08-24|Apple Inc.|Audio assisted enrollment|
US10810293B2|2018-10-16|2020-10-20|Motorola Solutions, Inc.|Method and apparatus for dynamically adjusting biometric user authentication for accessing a communication device|
US11222063B2|2019-04-03|2022-01-11|Microsoft Technology Licensing, Llc|Dynamic query adjustment based on data protection configurations|
WO2021166264A1|2020-02-21|2021-08-26|ソニーグループ株式会社|Program, information processing method, and electronic device|
法律状态:
2017-07-25| B25A| Requested transfer of rights approved|Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US) |
2018-03-27| B15K| Others concerning applications: alteration of classification|Ipc: H04M 1/725 (2006.01), G06F 1/16 (2006.01), G06F 1/ |
2018-05-15| B15K| Others concerning applications: alteration of classification|Ipc: G06F 1/16 (2006.01), G06F 1/32 (2006.01), G06F 3/0 |
2018-12-26| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2020-10-20| B06A| Patent application procedure suspended [chapter 6.1 patent gazette]|
2020-12-29| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-03-02| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 08/07/2011, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US36314210P| true| 2010-07-09|2010-07-09|
US61/363,142|2010-07-09|
US12/940,913|2010-11-05|
US12/940,913|US8811948B2|2010-07-09|2010-11-05|Above-lock camera access|
PCT/US2011/043273|WO2012006480A2|2010-07-09|2011-07-08|Above-lock camera access|
[返回顶部]