throbber
United States Patent
`US 9,575,776 B2
`(10) Patent No.:
`(12)
`De Andrade Cajahybaetal.
`(45) Date of Patent:
`Feb. 21, 2017
`
`
`US009575776B2
`
`(54) SYSTEM FOR ORGANIZING AND GUIDING
`A USER IN THE EXPERIENCE OF
`BROWSING DIFFERENT APPLICATIONS
`BASED ON CONTEXTS
`
`(75)
`
`(52) U.S. Cl.
`CPC wee G06F 9/44505 (2013.01); GO6F 8/43
`(2013.01); GO6F 9/4443 (2013.01); GO6F
`17/30528 (2013.01); HO4L 29/08072
`(2013.01); GO6F 15/7875 (2013.01)
`(58) Field of Classification Search
`CPC ceeseeccssesscssseecessecessseessssneesesnesesnneeeens GOGN 5/04
`USPC veesseseeeseeee 370/310, 352; 709/224-225, 217
`See application file for complete search history.
`
`(56)
`
`:
`References Cited
`U.S. PATENT DOCUMENTS
`
`Inventors: Tiago Silveira De Andrade Cajahyba,
`Salvador-BA (BR); Alexandre Bader
`Krafzik, Campinas, SP (BR); Eduardo
`ManuelDe Freitas Jorge, Salvador-BA
`(BR); Alberto Almeida De Azevedo
`Filho, Lauro de Freitas-Bahia (BR);
`Fernando Campos Martins,
`Salvador-BA (BR), Ana Lucia Lage
`Pereira, Salvador-BA (BR); Talmai
`Brandao De Oliveira, Cincinnati, OH
`(US); Hernane Borges De Barros
`Pereira, Salvador-BA (BR); Fabiola De
`Lima Moreira, Salvador-BA (BR)
`(73) Assignee: SAMSUNG ELECTRONICA DA
`AMAZONIA LTDA., Campinas-Sao
`Paulo (BR)
`a WO—WO 2011150388 Al * 12/2011
`
`(*) Notice:
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 326 days.
`
`9/2010 Swartz
`7,792,795 Bl
`7,813,822 BL* 10/2010 Hoffberg «0... 700/94
`8,554,631 BL* 10/2013 Barton ...-.-n B06
`2004/0172460 Al
`9/2004. Marel
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`Primary Examiner — Aftab N. Khan
`(74) Attorney, Agent, or Firm — Staas & Halsey LLP
`
`(21) Appl. No.: 12/981,643
`(22)
`Filed:
`Dec. 30, 2010
`
`(65)
`
`(51)
`
`Prior Publication Data
`US 2012/0173700 Al
`Jul.
`5. 2012
`~
`
`Int. CL
`GO6F 15/16
`G06F 9/445
`G06F 17/30
`GO6F 9/45
`HO4L 29/08
`GO6F 9/44
`GO6F 15/78
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`ABSTRACT
`(57)
`The present invention provides a system that enhances the
`experience of using a portable device such as mobile phones,
`smart phones, Personal Digital Assistants PDA ete. To
`improve the user experience in the use of a portable device,
`techniques are used for “context characterization, 1.e., from
`a range of conditions possible to detect by the system, such
`as time (date/time), current location, motion, etc., as well as
`the historical use of the device, a certain grouping of actions
`and settings, called “context” are selected automatically or
`manually, modifying and setting from that moment the way
`of user interacts with the device.
`
`23 Claims, 7 Drawing Sheets
`
`
`tnudied MocuigpeFant
`
`
`
`Set
`
`APPLE 1013
`
`APPLE 1013
`
`1
`
`

`

`US 9,575,776 B2
`
`Page 2
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2005/0015608 Al*
`2005/0049001 Al*
`2008/0005679 Al
`2008/0081605 AL*
`2008/0092043 Al*
`
`1/2005 Peterson we 713/193
`3/2005 Lazaridis oe. 455/552.1
`1/2008 Rimas-Ribikauskas
`4/2008 Cole wee 455/424
`4/2008 Trethewey ............ GO6F 1/1626
`715/705
`
`8/2008 Thattil
`2008/0201350 Al
`2008/0249969 AL* 10/2008 Tsui oo H02J 7/0055
`706/46
`1/2009 Guday ...... A61B 5/0002
`340/573.1
`2009/0150545 Al*
`6/2009 Flores et al. wn. 709/224
`2009/0203352 Al*
`455/406
`8/2009 Fordonetal.
`
`2010/0011388 A1*
`.......
`wee 725/9
`1/2010 Bull et al.
`2010/0325238 Al* 12/2010 Khedouri et al.
`. 709/217
`
`5/2011 Rammnani G06Q 30/02
`2011/0113084 Al*
`709/201
`11/2011 Rathod oo. 705/14.49
`1/2012 Eder.....
`. GO6F 19/3437
`
`703/13
`2012/0303561 Al* 11/2012 Sathish .....0..0.... GO6F 17/30873
`706/14
`7/2015 Muppidi ......... HO4L 41/28
`726/23
`
`2009/0002178 Al*
`
`2011/0276396 A1*
`2012/0010867 Al*
`
`2015/0200958 AL*
`
`* cited by examiner
`
`2
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 1 of 7
`
`US 9,575,776 B2
`
`
`
`
`
`
`rtenseneene,
` Danaeaeee
`
`Deere
`
`
`Sentiaiet
`
`Seinennino
`bHetigesce
`
`CAAA,
`
`”hete
`ninnnncustannee
`penne
`
`FIGURE 2
`
`3
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 2 of 7
`
`US 9,575,776 B2
`
`Aitettcattettetteltattettatt Atleticotetasattettttattettettattlatattett=
`
`stleattettettet
`
`Ovi, blueiooth, aos, battery anc preferences}
`
`POLERPOEEREDPEEREDOE
`
`Taneneneonononennanon
`
`
`
` Magister access to iheresources and components
`
`PORERPREEEDDODIDEDIDS,
`
`and occurred evenia
` SBE
`
`
`
`
`iniighe gimiply and undiad programing
`inerimce: seein
`3
` sseteatstnbtaeeattateeanenaataaaaaannaa saeteatetnbtaeeaetabteeeatateeeataeaaaaaaea
`
`
`
`FIGURE3
`
`4
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 3 of 7
`
`US 9,575,776 B2
`
`
`
`FIGURE 5
`
`5
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 4 of 7
`
`US 9,575,776 B2
`
`
`Sx
`
`Rethasers
`

`
`6
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 5 of 7
`
`US 9,575,776 B2
`
`Hhimaedon
`
`
`
`FIGURE 7
`
`7
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 6 of 7
`
`US 9,575,776 B2
`
`
`
`FIGURE&
`
`8
`
`

`

`U.S. Patent
`
`Feb. 21, 2017
`
`Sheet 7 of 7
`
`US 9,575,776 B2
`
`
`
`foot date froma tee obsaerwers
`
`ee:
`
`
`
`Lahey
`
`
` its SAR
`
`aireedy taken's
`
`
`
` hare ie eeneneneanes
`
`
`
`
`neeenemeed
`
`She
`
`
`
`FIGURE 9
`
`9
`
`

`

`1
`SYSTEM FOR ORGANIZING AND GUIDING
`A USER IN THE EXPERIENCE OF
`BROWSING DIFFERENT APPLICATIONS
`BASED ON CONTEXTS
`
`TECHNICAL FIELD
`
`The present invention relates to the field of human inter-
`action with mobile devices, more specifically concerns a
`system to organize and guide a user experiencein navigating
`between different applications based on context.
`
`BACKGROUND OF THE INVENTION
`
`The document U.S. 2008/0201350 (Context-Based Infor-
`mation Retrieval), published on Aug. 21, 2008, proposes a
`system and method for searching contextual information.
`The term “context” in accordance with the teachings of said
`document U.S. 2008/0201350 does not follow the same
`definition of the patent described here because it represents
`a combination of meta-data (or tokens) with other existing
`data. The object of said system is the medicalfield, particu-
`larly through diagnostics using images. In this field, the
`devices responsible for obtaining the images produce a huge
`amount of data that includes the function performed and the
`day on which the action occurred, errors, important and/or
`critical parameters, numerical results from sensors or a
`combination thereof. The document U.S. 2008/0201350
`therefore offers an advanced search technique upon these
`data to optimize and simplify the detection of failures in
`maintenance of machines, using the “context” of the meta-
`data.
`
`SUMMARY OF THE INVENTION
`
`The present invention provides a system that enhances the
`experienceof using a portable device such as mobile phones,
`smartphones, Personal Digital Assistants PDA etc.
`
`The document U.S. 2004/0172460 (Context Filter), pub-
`lished on Sep. 2, 2004, also proposes the assignment of
`assumedthe context, a set of metadata (tags) are assigned to
`meta-data to pre-existing data. In particular, the document
`all events generated by the portable device.
`US. 2004/0172460 describes methods for quickly searching
`This portable device allows a context is defined by user
`to find the data through the metadata. The document US.
`where settings and behaviors are attributed to events and
`2004/0172460, however, after the detection of context,
`metadata (tags). Settings can also occur automatically. Thus,
`specifies only a “pointer”to the context in a database.In that
`the portable device demonstrates different executions based
`document U.S. 2004/0172460, the end result includesalist
`40
`on contexts specifically assigned by the user or automati-
`of concepts commonto the context identified.
`cally identified by an artificial intelligence engine.
`The document U.S. 2008/0005679 (Context Specific User
`This portable device captures data automatically from the
`Interface), published on Jan. 3, 2008, proposes techniques
`environment in which it is in operation, the data capture can
`that modify the operation of a device based on the context
`be done through different sensors and applications on that
`in which it is inserted. Examples of contextual attributes
`device, as well as the events generated by actions that the
`include the physical location of the device, an accessory
`user runs the device over the day.
`connected to the device, someattribute related to connecting
`This portable device also includes a web server that
`to a data network, any attribute linked to the behavior
`allows configuration of the same from an external browser.
`identified of use of the user, the execution state of other
`This component allows you to organize information from
`applications and/or the state of the user. Based on these
`the device following the directives given by the user in the
`contextual attributes,
`the software undergoes changes in
`webservice. It is also allowed to access and extractall data
`order to adapt to the current context, with all configuration
`from that device, using this same server. Thus, the user has
`done through the contextualattributes of a remote computer,
`the option to access the data through a computer, modify and
`not forcing the user to make changes on the device itself.
`synchronize data with a PC and/or a remote web server,
`The document U.S. Pat. No. 7,792,795, published on Sep.
`providing a more comfortable alternative to the user.
`7, 2010, presents a centralizing and pooling of resources,
`This portable device can also optionally communicate
`serving as a facilitator of access to data from other appli-
`with a remote server on the web, securely, to synchronize the
`cations. Additionally,
`the term context
`in U.S. Pat. No.
`information on profiles and preferences, settings and data in
`7,792,795 refers only to data such as name, address, attri-
`a unique accountof the user. This communication will allow
`butes of a person, a user’s preferences, device data (e.g. GPS
`the updating of configuration information, preferences and
`location), and so on. However, there is no reference to the
`user data on the remote Web server if the user updates
`control of hardware components.
`content on his portable device, as well as, it allows users to
`download ready contexts available in remote web server and
`shared by other users.
`The present invention also allows restoring and backup
`information contained in said portable device such as
`images, videos, contacts, audio, programs, contexts of use,
`10
`
`US 9,575,776 B2
`
`2
`To improve the user experience in the use of a portable
`device, techniques are used for “context characterization,
`ie., from a range of conditions possible to detect by the
`system, such as time (date/time), current location, motion,
`etc., as well as the historical use of the device, a certain
`grouping of actions and settings, called “context” are
`selected automatically or manually, modifying and setting
`from that momentthe wayof user interacts with the device.
`For the purposes of the present
`invention, context
`is
`defined as a specific group of actions andsettings that, once
`selected, defines the mode of user interacts with the device.
`It is important to note that these characterization tech-
`niques are dynamic, i.e., they are subject to change and/or
`upgrades either through artificial
`intelligence techniques
`present in the device, butalso by the user,the latter attending
`primarily to the fine adjustments, according to the preferred
`embodimentof the invention.
`
`10
`
`15
`
`The present invention also providesa flexible architecture
`and modular software which includes a well-defined set of
`
`20
`
`methods for integrating the concept of context with a system
`comprising:
`(1)
`access manager and centralizing to
`resources, acquisition module and automatic information
`processing by the portable device (Artificial Intelligence),
`module for associating metadata (tags) (Tagging Module),
`Mobile Web Server, information manager through which the
`web interface (extended manager), data Backup & Restore
`module and observer of event sources (Observers).
`The present invention provides solutions to usability and
`graphical user interface that organize and guide the user
`experience in navigating between different applications on
`clear and well defined contexts. Once identified and
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`10
`
`

`

`US 9,575,776 B2
`
`3
`maps, and tags. In a particular way, this backup/restore is
`done using the information manager through web interface
`(extended manager).
`The waythe architecture developedis one ofthe different
`aspects of the present invention. Instead there are several
`different applications that work individually with a usability
`feature, having a centralized and scalable environment
`capable of adding new features and let them all communi-
`cate and interact. Thus, features such as backup andrestore,
`extended device managementvia the web, context manage-
`ment, among others, are really only snapshots of a whole
`which are provided by the architecture.
`
`BRIEF DESCRIPTION OF FIGURES
`
`The objects and advantages of the present invention will
`becomeapparent from the following detailed description of
`an exemplary embodiment of the invention and attached
`drawings by way of non-limiting example, in which:
`FIG.1 illustrates a model in which the portable system
`can be implemented.
`FIG. 2 shows the components of the architecture pre-
`sented.
`FIG. 3 shows the flow of operation of the Core.
`FIG.4 details the actions taken by the observers of events.
`FIG. 5 shows the flow of operation of the Mobile Web
`Server.
`
`FIG. 6 shows the flow of operation of the Backup.
`FIG. 7 showsthe flow of operation of the Restore method.
`FIG. 8 showsthe flow of operation of the tagging system.
`FIG. 9 showsthe stages ofartificial intelligence.
`
`DESCRIPTION OF PREFERRED
`EMBODIMENTS OF THE INVENTION
`
`The hardware needed to bring the system of the present
`invention is a portable device, and its main features are
`illustrated in FIG. 1. The CPU 110 (Central Processing Unit)
`is responsible for executing the necessary instructions for
`the management of all sensors and device features, and
`evaluates events and take actions based on defined rules. For
`example,
`the camera 111 captures images and gyro or
`accelerometer 112 can set the orientation of the device and
`
`the type of movement. The storage medium 113 serves to
`store information and data, including location, sequence of
`events, among others. The hardware also consists of infor-
`mation input devices 114 and 115 audio components.
`Through some connectivity component 116 can communi-
`cate with the application and the services provided of
`synchronization and sharing of contexts. The display means
`117 is required for viewing by the user of the change of
`context.
`
`The architecture of the present invention, represented in
`FIG. 2, comprises the following main components: Core,
`Artificial Intelligence, Tagging System, Mobile Web Server,
`Extended Manager, context Creator, Observers and Backup
`& Restore. Each will be described below.
`Core
`
`The Core is the central component of the architecture. It
`is what makes the interface between the components and
`features of portable devices, such as databases and sensors.
`The Core was developed with the main objective of isolating
`the remaining portions (tagging system, mobile webserver,
`extended manager, context creator, observers and backup &
`restore) from accessing these resources, thus ensuring that
`new addedfeatures to the devices can be used by those who
`share the architecture.
`
`4
`Another feature of the Core is to ensure that any changes
`to the application programming interface (Programinmg
`Application Interface—API) of resources of the device do
`not impact the applications that access architecture. This
`reduces the work of preparing the applications for each API
`version.
`The Core uses a service based policy, all components or
`applications that communicate with it, do it through the
`consumption of one of the many services provided by the
`same.
`
`FIG. 3 showsthe flow of operation of the Core, as detailed
`below:
`
`(310) The core is initially raised by the operating system;
`(311) Core checks all components and features in your
`device. Next,
`it requires access to them in order to
`manage them;
`(312) Core accesses a database that it uses to manage the
`metadata (tags) and resource use log of the device (e.g.
`applications, camera device). At this time,it initializes
`the database;
`(313) Core System starts the observation of resource use
`of the device. All actions and events generated in the
`portable device can be observed. When an observable
`event is triggered, the Core performs the record in the
`database. Observers are started via concurrent threads
`that continuously monitor the features and components
`identified;
`(314) With the observation system active, the Core starts
`the binding metadata (tags) system. When an event
`eligible to receive a tag is triggered (e.g. capture of
`photo), the observer notifies the Core to make sure that
`there is one or more active tags. The system has a
`standardtag, but allowsthe creation of a new one by the
`user. The context of the system can also provide new
`tags and these will be used to link information whileit
`is active. The user can select as many tags as you wish
`to make the link information automatically when a
`resource is used.
`
`(315) In order to simplify the developmentand integration
`of applications with the features and components of the
`system,it is started the unified and simplified program-
`minginterface service, which runs a remote interface to
`allow centralized access to managed resources;
`(316) The service is available for access.
`Observers
`
`Observers are responsible for the sources of device events
`such as clock, accelerometer, gyroscope, camera, ring tones
`or use the applications installed on the portable device and
`others that may also exist. Observers analyze the actions
`taken by users and inform the Core so that it performs the
`required actions (e.g. adding a tag to a photo, registering the
`application use in a log).
`The architecture allows the observation of any feature of
`the device, however, you can individually choose which
`events are monitored, avoiding thus unnecessary consump-
`tion of resources of the device.
`
`FIG. 4 shows the flow of operation of the observers, as
`detailed below:
`(410) The observation process is started;
`(411) First the list is loaded with all the resources that can
`be observed. However, it is possible that it does not
`exist in a particular device, so it is necessary to verify
`its existence (412); if there is (418), the system search
`the next on the list (running again 411); otherwise, it
`starts to monitor the resources registered (419);
`(413) If the resource exists, access to the same is
`requested;
`
`10
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`11
`
`11
`
`

`

`US 9,575,776 B2
`
`5
`(414) Having permission to access, it is performed the
`registration in the operating system so that it informsit
`about the events that occur on it;
`(415) The resource is monitored and the system searches
`for a new feature in the list (418), if any, the process
`starts (411), otherwise the system will monitor only the
`resources that were recorded (419);
`(416) After registering the resource monitoring (415), as
`soonasit is used (or accessed), the Observer reports on
`the event to the Core (417) andreturnsto its monitoring
`activity (415).
`Mobile Web Server
`
`Mobile Web Server provides an environment where appli-
`cations created using web technologies are able to be
`arranged in the portable device (e.g. servlet). Just as a web
`server on a personal computer, it allows multiple applica-
`tions to be installed and used simultaneously by multiple
`users. These applications in turn can be accessed through
`any device that has a web browser connectedto the portable
`device via cable or data network.
`
`Besides being responsible for allowing the use of web
`applications, the server is still responsible for access and
`security of information carried. For this, it deploys policies
`limiting access to applications and secure traffic informa-
`tion.
`
`FIG. 5 shows the flow of operation of the Mobile Web
`Server, as follows:
`(510) Mobile Web Serveris started;
`(511) Mobile Web Server requests to open connection to
`the Core. Whenit is established, it receives from the
`Core its communication interface;
`(512) Mobile Web Server starts web applications and
`transfers to them the connection interface with the
`Core;
`(513) Mobile Web Server analyzes which are the possible
`ways to access other equipment applications (e.g. Wi-
`Fi, USB cable, 3G).
`(514) Mobile Web Server becomes available for use;
`Extended Manager
`The extended Manager is a web application hosted in
`webserver of the portable device that allows to manage
`information and resources of the device through a web
`browser. Its purpose is to promote a new form of user
`interaction and make the experience of using the portable
`device more pleasant.
`From the above extended manager, it is possible to:
`display Information from the device (such as battery and
`signal level, available space on the memory card and on
`the device);
`Effect settings (like changing volume, wallpaper and
`ringtone, enable or disable Wi-Fi and Bluetooth);
`Manage contact
`information, messages, calls,
`images,
`videos and music;
`Create or activate contexts already installed, besides per-
`forming actions native to device such as making a call
`and send a message;
`Create new pages for managing other resources.
`Because the architecture has a tagging system, applica-
`tion, through its access to the Core, is capable offiltering
`using this feature, in addition to presenting information on
`a map indicating where they were created or added to the
`portable device (e.g. capturing of a photo or adding a
`contact).
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`By using the backup API, the extended manager has an
`interface for performing backup andrestore.
`Context Creator
`
`A context is defined by the user in which settings and
`behaviors are attributed to events and metadata (tags). Thus,
`the portable device showsdifferent executions based on the
`context identified or assigned by the user. Thus, value is
`added to existing information to automatically associate all
`relevant events and actions in the portable device to meta-
`data (tags).
`The Context creator is the component that allows you to
`manage the contexts. You can perform from the process of
`creating andinstalling to the context activation and configu-
`ration. This component can be accessed through an appli-
`cation on the portable device, the computer accessing the
`service from the context creator by the browser on the
`portable device or through a widget application.
`The contexts typically represent situations such as gym,
`school, car, work or home, but it can represent a specific
`situation such as a lecture, a movie or an event. According
`to the preferred embodimentofthe invention, there are two
`types of contexts: the generic, which is created by users
`through the Creator and Premium context, that are contexts
`more advanced and usually take the form of applications.
`Each context can represent a range of behaviors, content
`and applications that are commonly usedin these situations.
`Thus, allowing a configuration and faster access to user
`needs in each of these moments.
`Behaviors are actions that the context will run on the
`portable device while being activated and canbesettings of
`the device as changing the state of Wi-Fi, Bluetooth, Wall-
`paper and volumeor linking Tags to information generated
`by the portable device.
`The content
`is information that will be linked to the
`context, such as photos, videos, music, documents, events
`and contacts. This capability to bind context information is
`importantfor the exchanging information between users. An
`example of this functionality is a context of a lecture, which
`could be linked to the day that the lecture will take place
`along with a presentation, photos and texts used in the
`lecture.
`The context also allows grouping application, which
`represents a faster access to these applications when using a
`context. Another important advantage ofthis function is that
`the exchange between users, you can also share applications
`that are used in this context. The application file is not
`shared, but the address where the set of information/appli-
`cations is stored, which allows the user that does have it, to
`downloadit.
`
`Activation of contexts can be done manually or automati-
`cally. The user can choose to activate a context when you
`need it or make your schedule for it to be activated in
`specific situations, such as in reaching an area at a specific
`time or date,
`in connecting to a specific network or in
`activating a specific accessory to the device.
`After the creation of contexts,it is possible to export them
`to share with other users. The file generated in the export
`process containsall the content present in context, as behav-
`iors, content and applications.
`In the process of installing of a context, all their infor-
`mation is reported to the user such as name and description,
`behavior, content and applications. When youinstall it, it is
`available for activation by the user.
`Backup and Restore Module
`One of the important features of the architecture of the
`present invention is a backup and restore system. Commonly
`such tools need an external software to be installed on your
`
`12
`
`12
`
`

`

`US 9,575,776 B2
`
`7
`computer. Another commonfeature is that these tools are
`only able to backup and restore all
`information without
`allowing the user to individually select what he wants.
`The system provided by the architecture described herein
`is available in the portable device and can be accessed
`through the extended Managerand doesnot require the user
`to perform any manualinstallation. It also allowsall infor-
`mation likely to participate in a backup or recover can be
`chosen individually by the user.
`Backupto the portable deviceis an activity that consumes
`battery, RAM memory and storage space. The proposed
`backup method uses a mechanism that checks the form that
`the user is using to access the backupfeature. If it is by a web
`interface and the machinethat is accessing has the necessary
`requirements,
`the system installs the backup application
`automatically in the user’s machine, otherwise it uses the
`resources of the portable device itself.
`FIG. 6 shows the flow of operation of the backup, as
`follows:
`
`(610) The user decides to backup information;
`(611) The user selects all the information he wants to
`make backup (e.g. pictures, videos, contacts, audio,
`programs, contexts of use, maps, tags). This selection
`can be done individually, for example, choosing each
`contact individually, or total;
`(612) The system checks whetherthe device is connected
`to a computer. If so, check if the machine that
`is
`accessing it meets the minimum requirements for the
`backup system can work from there (614). If not, the
`whole procedure will use the resources of portable
`device (613) itself;
`(615) If the machine meets the minimum requirements,
`the system will check if it
`is already installed. If
`installed, the backup system will use the resources of
`the machinethat is accessing (616);
`(617) If the software is not installed, a license agreement
`appears. This term explains how the procedure works
`and what the software will do. If the user accepts the
`term,
`the software is automatically installed on the
`machine (618) and the system will use its resources
`(616), otherwise the system will use the resources of
`the portable device (613);
`(619) The backup processis finished;
`The main differences of this approach are:
`1) All that is required for the backup is on the portable
`device. This does not oblige the user to be in possession of
`an installation CD so that he can make his backup;
`2) If the machine you are accessing the system (it is
`possible to access it through the device itself) does not have
`the ability to perform the necessary procedures, the entire
`responsibility of the process is transferred to the device;
`3) If the machine that is accessing the system has the
`capacity to perform the necessary procedures, all responsi-
`bility will be transferred to the same. The great advantageis
`that it will consume much less resources and processing
`power.
`The generated file has been thought in order to be inde-
`pendent of the operating system on which it was created.
`Thus, it is possible to generate a backup on an operating
`system and import it into another. The restore method is
`similar to backup. If you run a restore, the system informs
`the user that exists within the file and the user can choose
`whatinformation they want to restore. The system takes care
`to prevent duplication of data.
`
`8
`FIG. 7 showsthe flow of operation of the Restore method,
`as detailed below:
`
`(710) The user decides to restore information;
`(711) The user selects the backup file from which to
`retrieve;
`(712) The system informs the information which exist in
`the file (e.g. photos, contacts, videos);
`(713) The user selects what they wantto restore. You can
`select individual or import all the information;
`(714) The system checks whether the information to be
`imported already exist on the portable device. If not,
`the import is made (617);
`(715) When a conflict occurs, the system informsall the
`information you have already registered and there are
`prompts the user for permission to rewrite (716). If the
`user accepts,
`the information is overwritten (717),
`otherwise the system ignores (718);
`(719) The restore process is finished;
`Tagging Module
`The architecture allowsessential information (e.g. photos,
`videos, contacts, music, messages, calls) of the portable
`device to be associated with a metadata (tag). The advantage
`of adding a tag to informationis the ability to recover more
`quickly. FIG. 8 shows the flow of operation of the tagging
`system as explained below:
`(810) The Tagging moduleis started;
`(811) When an action is taken, the observer is notified;
`(812) The observer notifies the tagging module and
`checks if it exists tag (s) active;
`(813) Ifthere is one or moreactive tags, the system makes
`the link with the resource (814). For example, if a
`picture is taken and there is a tag “birthday” of the
`system will link it to the photo. Data such as date, time,
`latitude and longitude are also added to the binding,
`thus allowing the user to locate on a map where the
`photo wastaken; If there are active tags, the system
`does not perform any action;
`(815) The Tagging module expects the new service;
`Mechanism of Artificial Intelligence
`The architecture of the present invention has a module
`that allows suggesting to the user events or situations that
`maybe useful to him. To give the portable device the ability
`to collect environmental data at regular intervals of time, a
`mechanism for Artificial Intelligence (IEA) is embedded in
`the device.
`
`10
`
`15
`
`25
`
`30
`
`40
`
`The input data will be obtained by capturing the sound
`when taking a picture, the current time, the device ID and
`signal strength, GPS receiver, compass, light sensor and on
`any input sensor and information online oroffline or device
`available.
`
`50
`
`The record of the actions taken by the user of the device
`will also be interpreted as input data for the mechanism of
`Artificial Intelligence (IEA).
`After a preset amountof data that were acquired, the IEA
`will process it and the core will have one or more actions.
`Each time a process is done,
`the device will update
`knowledge of EIA andthe results makes the decisions of the
`next iteration more accurate andlinked to the user’s actions.
`This process becomes more accurate for each new inter-
`action with the device has with the environmentand the user,
`learning from each interaction how to act better and more
`efficiently. Over time, the device will be able to predict
`almost the next interaction the user will run and will be
`
`promptly prepared forit.
`By analyzing the volume, ringtone, color settings, wall-
`paper, a rhythm of walking, external sounds, etc the IEA can,
`for example, identify the moodofthe user.
`
`13
`
`13
`
`

`

`US 9,575,776 B2
`
`9
`Suggestions that the IEA could make the user for a better
`experience whenusing the portable device are for example:
`Go to a specific context;
`Changethe wallpaperor screensaver(the IEA can identify
`the default screen saver and wallpaper through color
`depth and chromium information to suggest new con-
`tent that may match the user’s preferences or mood);
`Changethe order of the contact list according to location
`and other standards;
`Start an application;
`Present a personalassistant who will perform tasks within
`the software environmentof the device;
`Contact or notify a specific person, distribution list, or
`emergency service by email or SMS or MMS.
`Set up an application for change in mood or music
`preferences;
`If the IEA considers that the device is at risk of being
`stolen (by sounds and patterns of accelerometer),
`it may
`allow the password prompt to unlock the phone. If the
`situation in which the device detects that it is being stolen
`becomes commonandthe userhas to unlockit regularly, the
`JEA will store it and the device will prevent the lock on these
`situati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket