`US 20130082974Al
`
`c19) United States
`c12) Patent Application Publication
`Kerr et al.
`
`c10) Pub. No.: US 2013/0082974 Al
`Apr. 4, 2013
`(43) Pub. Date:
`
`(54) QUICK ACCESS USER INTERFACE
`
`(75)
`
`Inventors: Duncan Robert Kerr, San Francisco,
`CA (US); Nicholas V. King, San Jose,
`CA (US)
`
`(73) Assignee: APPLE INC., Cupertino, CA (US)
`
`(21) Appl. No.: 13/251,126
`
`(22) Filed:
`
`Sep.30,2011
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`G06F 3/045
`G06F 3/041
`
`(2006.01)
`(2006.01)
`
`(52) U.S. Cl.
`USPC ........................................... 345/174; 345/173
`
`(57)
`
`ABSTRACT
`
`Providing quick access to certain applications on a computing
`device is disclosed. A security wall is enforced with respect to
`applications on the computer, wherein enforcing the security
`wall includes preventing access to the applications until a
`security input is received. A predefined input is received
`through a home button on a touch-sensitive display of the
`computer. Access is provided to a particular application in
`response to receiving the predefined input, wherein providing
`access to the particular application includes allowing a user to
`access the particular application without receiving the secu(cid:173)
`rity input from the user.
`
`,.,
`
`166
`
`......
`
`100
`
`~ 174
`< _ n_ 180 r···+---1 c- 112
`/······-. ....,
`·+·(cid:141) v
`:(cid:141)
`j
`:
`>
`L. . .! ... .i
`l_ 160
`\ •..••••• /
`168
`102
`r· - ·-· - · -· - · - ·- · - ·-· - ._f ·,
`
`.......... Carrier '?'
`
`12:34 PM
`
`_ , ·
`
`106
`
`[~{ ~-'.~
`
`130
`
`00
`80
`
`Calculator
`
`~I(@ ~B
`~~ 73
`
`132
`
`134 136
`
`Weather
`140
`
`° I
`Maps
`142 144
`
`182
`
`184
`
`114
`
`104
`
`186
`
`188
`
`110
`
`·-·-·-·-·- ········ ·-·-·i-·-·
`
`I
`
`..-····\
`I
`.. ~ ...... ~:
`L_170
`
`\
`,J
`
`/
`t\
`·-••••. /
`
`, ~
`
`, 120
`
`118
`
`164
`
`Apple Ex. 1018
`Apple Inc. v. Firstface Co., Ltd.
`IPR2019-01011
`Page 00001
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 1 of 14
`
`US 2013/0082974 Al
`
`166
`
`100
`
`~
`~174
`( - n_ 180 r···•···1 , 1 n
`..... -······...,
`..
`·+·(cid:141) v
`_.i ~ : (cid:141)
`j ,
`..
`:
`:
`·•..........
`160
`~ ••••••••• :
`168
`102
`· _f ·,
`r · -
`· -
`· -
`· -
`· -
`· -
`· -
`· -
`· -
`........ C. Carrier 't9
`12:34 PM
`~ 182
`
`Text
`
`..
`: I :
`: I
`: 00
`I .J 80
`
`186
`
`188
`
`110
`
`~
`
`· -
`
`- - ·
`
`Photos
`132
`
`Camera
`134 136
`
`~
`
`73
`
`184
`
`Calculator
`
`Weather
`140
`
`Maps
`142 144
`
`~Cf}_J;t @
`
`146
`
`148
`
`Settings
`150 152
`
`112
`
`114
`
`104
`
`Media
`·-·-·-·-·-·-·-·-·-·~ -·-·
`..-······~
`.,. .. •·······-..J 120 L 118
`•
`"•-.... ---
`I
`:
`"'"'
`\,
`_,,
`"..
`<- 170
`••••••••
`
`I
`•
`
`I
`•
`
`190
`
`FIG. 1
`
`IPR2019-01011 Page 00002
`
`
`
`~-----·······························································································
`
`(cid:143)(cid:143)(cid:143)(cid:143)
`(cid:143)(cid:143)(cid:143)(cid:143)
`
`!1(cid:143) (cid:143)(cid:143)(cid:143)
`
`' - ' - - - - - -
`
`0
`
`1!
`
`100a
`
`Access
`Point
`
`Gateway
`
`J200
`
`Wide Area Network
`
`100b
`
`Navigation I
`
`Service
`
`I I Messaging
`
`Service
`
`Media
`Service
`
`Location-
`Based
`Service
`
`~ ( Map j Satel~ite I _List )_ j
`@
`
`230 __,
`
`240
`
`250
`
`255
`
`Other
`Service(s)
`
`~onrent
`blisher(s)
`
`IL 270
`
`260 _JI
`
`FIG. 2
`
`""O
`~ .....
`
`(')
`
`~ .....
`
`(')
`
`~ .....
`
`('D = ..... t "e -....
`.... 0 = ""O = O" -....
`.... 0 =
`t :-:
`J--
`N
`0 ....
`
`~
`
`('D
`('D
`
`rJJ =(cid:173)
`.....
`N
`0 ....
`....
`
`.i;...
`
`c
`rJJ
`N
`0 ....
`~ ---0
`
`0
`QO
`N
`1,0
`-....J
`.i;...
`
`> ....
`
`IPR2019-01011 Page 00003
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 3 of 14
`
`US 2013/0082974 Al
`
`L.•
`
`\
`
`..... ,
`\
`~
`}
`
`300
`
`,---------,
`:+:
`: (cid:141)
`·-+·(cid:141) :
`
`~ .. ---------~
`: . '
`( -,
`-----.
`.,-
`-----
`----
`:
`c
`:
`>
`-...... ~-=-~··_. -. -. -. -. ~----~-~-.: .[ ~o:
`t!I
`-- ·
`4:30
`
`........ C. Carrier ,ty
`
`306
`
`.. :
`' ' ' ' ' ' ' ' :
`
`.J
`
`Wednesday, April 20
`
`304
`
`slide to unlock
`
`.
`.
`.... --·---.••• ~ 320
`.
`.
`'
`.
`_, .
`I '
`...... ____ .
`'
`","'
`,--------,
`:
`:
`
`FIG. 3A
`
`IPR2019-01011 Page 00004
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 4 of 14
`
`US 2013/0082974 Al
`
`300
`
`L.1
`
`·····-
`
`--
`:•
`'
`~
`..
`
`~ .. - - -~
`: . :
`( -,
`' --- ' : '
`:·--------i
`..... ,
`, A
`\
`:
`:
`(
`)
`:(cid:141)
`·+·(cid:141):
`_. --~-=-~-~. _. _. _. _. _ -~=-~-~-:- 5. 302
`/
`w
`....,.._
`.,
`C Carrier '*
`A
`Enter Passcode
`
`- -
`
`..
`
`' ' .JD (cid:143)(cid:143)(cid:143)
`
`1
`
`4
`
`GHI
`
`7
`
`PQRS
`
`Emergency
`Call
`
`2
`
`ABC
`
`5
`
`JKL
`
`8
`
`TUV
`
`0
`
`3
`
`DEF
`
`6
`
`MNO
`
`9
`
`WXYZ
`
`Cancel
`
`L---·-·-·-·-·-·-·-·-·-·-·-
`.
`.
`..... ------••• ~ 320
`.
`.
`.
`'
`.
`.
`I '
`'
`""', .... ______ ,
`,--------,
`'
`'
`'
`'
`
`FIG. 3B
`
`IPR2019-01011 Page 00005
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 5 of 14
`
`US 2013/0082974 Al
`
`400
`
`/
`I
`I
`
`'
`
`\
`I
`
`0
`,...---,
`. -LJ - -~
`,----7
`- - - - I (cid:141) •+--- (cid:141)
`~
`I
`I
`I
`I
`I
`,I,
`L __ , __ J 402
`\
`/
`.... __ .....
`J
`11 -=::::]Carriers- - - {fil -- - - -- D ~
`
`(
`
`)
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`4:30
`
`Wednesday, April 20
`
`406
`
`I
`
`404
`\
`
`I
`
`FIG. 4A
`
`IPR2019-01011 Page 00006
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 6 of 14
`
`US 2013/0082974 Al
`
`400
`
`0
`. -L J - -~
`,----7
`~
`I
`I
`- - - I (cid:141) •+ (cid:157)(cid:141)
`I
`I
`I
`,I,
`L __ , __ J 402
`(ijj- -- - - -- D~
`
`{
`
`)
`
`}
`
`✓---,
`'
`\
`I
`
`/
`I
`I
`
`/
`\
`'--✓
`11 =:::]earners-
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`4:30
`
`Wednesday, April 20
`
`406
`
`410a
`410b
`'-
`'-
`r C±) 0" /
`
`~ /
`
`410c
`)
`
`'I
`
`410d
`)
`
`I
`
`r (cid:143) " I
`~®~ ,rn ,®~ ,l@J~
`
`- - - - - - - - - - - - - - - - -
`'
`'
`\
`I
`I
`/
`
`---
`/
`I
`I
`...... __ .,,,,.
`...\
`420_/ \,
`
`/
`
`FIG. 4B
`
`IPR2019-01011 Page 00007
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 7 of 14
`
`US 2013/0082974 Al
`
`500
`
`-LJ - -~
`,----7
`~
`I
`I
`I
`I
`I
`,I,
`
`/
`I
`I
`
`'
`
`\
`I
`
`0
`,,---,
`- - - - I (cid:141) •+--- (cid:141)
`L __ , __ J 502
`\
`)
`11 ~:mer~-~-----IJ lo I
`
`(
`
`)
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`[>
`
`506
`
`510a 510b
`
`510c 510d
`
`L __ +(h&i{~~--~
`
`\
`
`0
`
`/
`
`\ / \ /
`
`/
`
`\
`
`I - , - , ~...__, .J-~ v
`/
`rl -;::' I
`.... :J
`\\\I
`'\--'
`l /_0_,1y,j'l
`'...__
`...__ )f-_:::,, ____ ""{_ __ J
`I - - - - -
`- - - - - I
`...... __ .,,,,.
`...\
`I
`520_/ ',
`/
`
`I
`J
`/
`
`FIG. 5A
`
`IPR2019-01011 Page 00008
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 8 of 14
`
`US 2013/0082974 Al
`
`500
`
`/
`I
`I
`
`'
`
`\
`I
`
`(
`
`)
`
`,, ..... --,
`0
`. -LJ - -~
`,----7
`- - - - I (cid:141) •+--- (cid:141)
`~
`I
`I
`I
`I
`I
`,I,
`L __ , __ J 502
`\
`)
`l 1 ~:mer~-8§ _____ 1} lo
`
`I
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`[>
`
`506
`
`510b
`
`510c
`
`510a
`
`510d
`
`(cid:143)
`00 rn @
`00
`l@J
`L:= ______________ ~
`..... --
`...... __ .,,,,.
`520_/ \,
`
`/
`
`/
`I
`I
`...\
`
`'
`
`'
`\
`I
`I
`/
`
`FIG. 5B
`
`IPR2019-01011 Page 00009
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 9 of 14
`
`US 2013/0082974 Al
`
`600
`
`/
`I
`I
`
`'
`
`\
`I
`
`{
`
`)
`
`0
`,,---,
`,_u - -~
`,----7
`- - - - I (cid:141) •+--- (cid:141)
`~
`I
`I
`I *
`I
`I
`L __ , __ J 602
`\
`/
`____ .....
`j
`11.=:::]Carriers --~------ D~
`4:30
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`Wednesday, April 20
`
`606
`
`I
`I
`
`/'
`
`'
`
`604
`\
`: c::)
`slide to unlock
`µ=--=~ ~~-----7 r------, ~--==a,-,,
`
`I
`I
`
`FIG. 6A
`
`IPR2019-01011 Page 00010
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 10 of 14
`
`US 2013/0082974 Al
`
`600
`
`,,,...--,
`0
`- -LJ - -~
`,----7
`~
`I
`I
`- - - - I (cid:141) •+ (cid:157)(cid:141)
`I
`I
`\
`/
`L __ , __ J 602
`)
`____ ,...
`11.=::]Carriers --{fil-- - - -- D~
`4:30
`
`I
`I
`I
`
`'\
`\
`I
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`{
`
`)
`
`I
`
`,I,
`
`Wednesday, April 20
`
`606
`
`610b
`
`610b
`
`604
`
`610a
`
`610d
`
`FIG. 6B
`
`IPR2019-01011 Page 00011
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 11 of 14
`
`US 2013/0082974 Al
`
`600
`
`. -LJ - -~
`,----7
`~
`I
`I
`I
`I
`I
`,I,
`
`,, ..... --,
`\
`/
`
`/
`I
`I
`
`'
`
`\
`I
`
`0
`- - - I (cid:141) •+--- (cid:141)
`L __ , __ J 602
`
`)
`
`(
`
`11 ~~:mars -(fil----6~
`4:30
`
`I
`I
`I
`I
`I
`J
`
`7
`I
`I
`I
`I
`I
`J
`
`Wednesday, April 20
`
`606
`
`610a
`
`610b
`
`610c
`
`630a
`
`I
`I
`--\
`
`630b / ..... --,, 630c
`...... __ .,,,,.
`620_/ \,
`
`\
`I
`I
`
`/
`
`630d
`
`FIG. 6C
`
`IPR2019-01011 Page 00012
`
`
`
`L.•
`
`------
`
`,,-
`:
`:
`\
`'
`
`,---------,
`..... ,
`c
`:(cid:141) -+·(cid:141):
`>
`\
`~
`,: - - - :w ,
`...
`'
`'
`,
`
`........ C. Carrier '*
`
`706
`
`- (cid:127)
`
`~ .. - - -~
`--- : . :
`( -,
`- . ·---~-=-~· - . - . - . - . - . ~----~-~-~ .[ ~o:
`t!I
`4:30
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 12 of 14
`
`US 2013/0082974 Al
`
`700
`
`..
`
`' ' ' ' ' ' ' ' ' ' ' ' .J
`
`Wednesday, April 20
`
`00
`80
`
`710a
`
`710b
`
`---, ' '
`
`(~)
`
`.
`-------(cid:173)
`.
`.
`.
`.
`.
`,
`,
`,
`.
`,
`.
`'
`'
`I
`'
`,
`,
`,_
`,•
`'•----··
`,--------,
`'
`'
`'
`'
`
`FIG. 7
`
`710c
`
`710d
`
`720
`
`IPR2019-01011 Page 00013
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 13 of 14
`
`US 2013/0082974 Al
`
`800
`
`~
`
`Enforcing a security wall with respect to
`applications on a computer, wherein
`8 02
`enforcing the security wall includes _/
`preventing access to the applications until
`a security input is received
`
`1 •
`
`Receiving a predefined input through a
`home button on a touch-sensitive display
`of the computer
`
`80
`4
`_/
`
`1 •
`
`Providing access to a particular
`06
`8
`application in response to receiving the
`predefined input by allowing a user to _/
`access the particular application without
`receiving the security input from the user
`
`FIG. 8
`
`IPR2019-01011 Page 00014
`
`
`
`Patent Application Publication
`
`Apr. 4, 2013 Sheet 14 of 14
`
`US 2013/0082974 Al
`
`Operating System Instructions
`Communication Instructions
`GUI Instructions
`Sensor Processing Instructions
`Phone Instructions
`Electronic Messaging Instructions
`Web Browsing Instructions
`Media Processing Instructions
`GPS/Navigation Instructions
`Camera Instructions
`Other Software Instructions
`Security Instructions
`
`952
`954
`956
`958
`960
`962
`964
`966
`968
`970
`972
`974
`
`Memory
`
`Memory Interface
`
`902
`
`Processor( s)
`
`950
`
`906
`
`904
`
`Peripherals
`Interface
`
`J900
`
`.
`v
`·-----------------------------. , 918
`.------..'. Positioning System i
`. ____________________________ .,
`
`'
`
`'
`
`916
`
`910
`
`912
`
`914
`
`920
`
`922
`
`928
`
`930
`
`Other Sensor(s)
`
`Motion Sensor
`
`Light Sensor
`
`Proximity Sensor
`
`Camera
`Subsystem
`
`Wireless
`Communication
`Subsystem(s)
`
`926
`
`942
`
`1/0 Subsystem
`
`944
`
`940
`
`Touch-Screen Controller
`
`Other Input Controller(s)
`
`Touch Screen
`
`Other Input/ Control
`Devices
`
`948
`
`946
`
`FIG. 9
`
`IPR2019-01011 Page 00015
`
`
`
`US 2013/0082974 Al
`
`Apr. 4, 2013
`
`1
`
`QUICK ACCESS USER INTERFACE
`
`TECHNICAL FIELD
`
`[0001] This disclosure relates generally to providing quick
`access to applications on a computing device.
`
`BACKGROUND
`
`[0002] Computing devices often implement security mea(cid:173)
`sures to prevent unwanted or accidental access to applica(cid:173)
`tions, features, or information provided by the computing
`devices. Computing devices frequently store sensitive infor(cid:173)
`mation that a user may not want other users to view. Users
`may also generally want to restrict access to their computing
`devices by other users as a matter of personal preference.
`Example security measures implemented on computing
`devices to prevent unwanted access include enforcing a secu(cid:173)
`rity wall to prevent access to applications on the computing
`device unless a particular security input is received. Typically,
`a security code, password, or particular sequence of other
`inputs is required as a security input to access applications on
`a computing device when a security wall is implemented on
`the device.
`[0003] Although enforcement of the security wall restricts
`unwanted access to applications on a computing device, the
`security wall also prevents the owner of the computing device
`from easily accessing applications on the computing device.
`In some instances, the user attempting to access the comput(cid:173)
`ing device is the owner of the computing device or an autho(cid:173)
`rized user. Further, some applications on the computing
`device may be associated with private information while
`other applications have little or no private aspect.
`
`SUMMARY
`
`[0004]
`In a first general aspect, a method for providing
`quick access to applications on a computing device is dis(cid:173)
`closed. A security wall is enforced with respect to applica(cid:173)
`tions on the computer, wherein enforcing the security wall
`includes preventing access to the applications until a security
`input is received. A predefined input is received through a
`home button on a touch-sensitive display of the computer.
`Access is provided to a particular application in response to
`receiving the predefined input, wherein providing access to
`the particular application includes allowing a user to access
`the particular application without receiving the security input
`from the user.
`[0005]
`Implementations can include any or all of the fol(cid:173)
`lowing features. The home button includes a portion of the
`touch-sensitive display having both touch-sensitive and pres(cid:173)
`sure-sensitive properties. The method further comprises
`receiving a second instance of the predefined input through
`the home button and providing access to a second application
`concurrently with providing access to the particular applica(cid:173)
`tion, wherein providing access to the second application
`includes allowing a user to access the second application
`without receiving the security input from the user. The pre(cid:173)
`defined input includes a first upward motion of a user in
`contact with the home button and a second upward motion of
`the user in contact with the home button within a particular
`amount of time. Providing access to the particular application
`includes generating for display a visual object representing
`the particular application on the touch-sensitive display,
`wherein the visual object is displayed concurrently with a
`second visual object for bypassing the security wall. Provid-
`
`ing access to the particular application includes allowing the
`user to access a first portion of the particular application while
`the security wall is enforced with respect to a remaining
`portion of the particular application.
`[0006] The particular application includes at least one of a
`camera application, a remote controller for multimedia player
`application, a calculator application, a media player applica(cid:173)
`tion, or a voice control application. The method further com(cid:173)
`prises receiving a second predefined input through the home
`button and presenting a login page for traversing the security
`wall. Enforcing the security wall occurs after the computer
`has concluded a full boot sequence. The method further com(cid:173)
`prises automatically waking the computer from a sleep mode
`in response to receiving the predefined input.
`[0007]
`In a second general aspect, a computer program
`product is tangibly embodied in a computer-readable storage
`medium and includes instructions that, when executed,
`enforce a security wall with respect to applications on the
`computer, wherein enforcing the security wall includes pre(cid:173)
`venting access to the applications until a security input is
`received. A predefined input is received through a home but(cid:173)
`ton on the computer having multi-touch sensitivity. Access is
`provided to a particular application in response to receiving
`the predefined input, wherein providing access to the particu(cid:173)
`lar application includes allowing a user to access the particu(cid:173)
`lar application without receiving the security input from the
`user.
`[0008]
`Implementations can include any or all of the fol(cid:173)
`lowing features. The home button includes a region of a touch
`screen of the computer having multi-touch sensitivity, the
`region of the touch screen separate from a touch-sensitive
`display of the computer. Providing access to the particular
`application includes generating for display a visual object
`representing the particular application on the touch-sensitive
`display and hiding a second visual object for bypassing the
`security wall. Providing access to the particular application
`includes allowing the user to access a first portion of the
`particular application while the security wall is enforced with
`respect to a remaining portion of the particular application.
`The particular application includes at least one of a camera
`application, a remote controller for multimedia player appli(cid:173)
`cation, a calculator application, a media player application, or
`a voice control application. The operations further include
`automatically waking the computer from a sleep mode in
`response to receiving the predefined input.
`[0009] The details of one or more implementations of the
`subject matter described in this specification are set forth in
`the accompanying drawings and the description below. Other
`features, aspects, and advantages of the subject matter will
`become apparent from the description, the drawings, and the
`claims.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0010] FIG. 1 is a block diagram of an example mobile
`device.
`[0011] FIG. 2 is a block diagram of an example network
`operating environment for the mobile device of FIG. 1.
`[0012] FIGS. 3A-3B are block diagrams of an example
`implementation of the mobile device ofFIG.1 with a security
`wall in standby mode.
`[0013] FIGS. 4A-4B are block diagrams of an example
`implementation of the mobile device of FIG. 1 in a quick
`access mode.
`
`IPR2019-01011 Page 00016
`
`
`
`US 2013/0082974 Al
`
`Apr. 4, 2013
`
`2
`
`[0014] FIGS. 5A-5B are block diagrams of an example
`implementation of the mobile device of FIG. 1 in a quick
`access mode.
`[0015] FIGS. 6A-6C are block diagrams of an example
`implementation of the mobile device of FIG. 1 in a quick
`access mode.
`[0016] FIG. 7 is a block diagram of an example implemen(cid:173)
`tation of the mobile device of FIG. 1 in a quick access mode.
`[0017] FIG. 8 is a flow diagram illustrating an example
`process for providing quick access to applications on a com(cid:173)
`puting device.
`[0018] FIG. 9 is a block diagram of exemplary hardware
`architecture for implementing the user interfaces and pro(cid:173)
`cesses described in reference to FIGS. 1-8.
`[0019] Like reference numbers and designations in the
`various drawings indicate like elements.
`
`DETAILED DESCRIPTION
`
`[0020] A computing device can implement a security wall
`to prohibit unwanted users from accessing functionality pro(cid:173)
`vided by the computing device. Instead of applying the secu(cid:173)
`rity wall to all functionality of the computing device, the
`computing device can allow user access to functionality when
`a specific input is received at the computing device. Accord(cid:173)
`ingly, a security input that is normally required to bypass the
`security wall is not required for access to certain applications
`on the computing device. The applications that do not require
`the usual security input may be grouped and presented in a
`cluster of visual objects in response to a specific input from a
`user.
`[0021] FIG. 1 is a block diagram of an example mobile
`device 100. The mobile device 100 can be, for example, a
`handheld computer, a personal digital assistant, a cellular
`telephone, a network appliance, a camera, a smart phone, an
`enhanced general packet radio service (EGPRS) mobile
`phone, a network base station, a media player, a navigation
`device, an email device, a game console, or other electronic
`device or a combination of any two or more of these data
`processing devices or other data processing devices.
`Although the description below refers generally to mobile
`device 100, any computing device, including a personal com(cid:173)
`puter, laptop, or tablet, may be used in accordance with the
`features described in the present disclosure.
`
`Mobile Device Overview
`
`In some implementations, the mobile device 100
`[0022]
`includes a touch-sensitive display 102. The touch-sensitive
`display 102 can implement liquid crystal display (LCD) tech(cid:173)
`nology, light emitting polymer display (LPD) technology, or
`some other display technology. The touch-sensitive display
`102 can be sensitive to haptic and/or tactile contact with a
`user.
`[0023]
`In some implementations, the touch-sensitive dis(cid:173)
`play 102 can comprise a multi-touch-sensitive display 102. A
`multi-touch-sensitive display 102 can, for example, process
`multiple simultaneous touch points, including processing
`data related to the pressure, degree and/or position of each
`touch point. Such processing facilitates gestures and interac(cid:173)
`tions with multiple fingers, chording, and other interactions.
`Other touch-sensitive display technologies can also be used,
`e.g., a display in which contact is made using a stylus or other
`pointing device. An example of a multi-touch-sensitive dis(cid:173)
`play technology is described in U.S. Pat. Nos. 6,323,846;
`
`6,570,557; 6,677,932; and U.S. Patent Publication No. 2002/
`0015024Al, each of which is incorporated by reference
`herein in its entirety.
`[0024]
`In some implementations, the mobile device 100
`can display one or more graphical user interfaces on the
`touch-sensitive display 102 for providing the user access to
`various system objects and for conveying information to the
`user. In some implementations, the graphical user interface
`can include one or more display objects 104, 106. Each of the
`display objects 104, 106 can be a graphic representation of a
`system object. Some examples of system objects include
`device functions, applications, windows, files, alerts, events,
`or other identifiable system objects.
`
`Example Mobile Device Functionality
`
`In some implementations, the mobile device 100
`[0025]
`can implement multiple device functionalities, such as a tele(cid:173)
`phony device, as indicated by a phone object 110; an e-mail
`device, as indicated by the e-mail object 112; a network data
`communication device, as indicated by the Web object 114; a
`Wi-Fi base station device (not shown); and a media process(cid:173)
`ing device, as indicated by the media player object 116. In
`some implementations, particular device objects 104, e.g., the
`phone object 110, the e-mail object 112, the Web object 114,
`and the media player object 116, can be displayed in a menu
`bar 118. In some implementations, each of the device func(cid:173)
`tionalities can be accessed from a top-level graphical user
`interface, such as the graphical user interface illustrated in
`FIG. 1. The objects 110, 112, 114 and 116 represent visual
`indicators of applications on the mobile device 100. Touching
`one of the objects 110, 112, 114 or 116 can, for example,
`invoke the corresponding functionality.
`[0026]
`In some implementations, the mobile device 100
`can implement network distribution functionality. For
`example, the functionality can enable the user to take the
`mobile device 100 and its associated network while traveling.
`In particular, the mobile device 100 can extend Internet
`access (e.g., via Wi-Fi) to other wireless devices in the vicin(cid:173)
`ity. For example, mobile device 100 can be configured as a
`base station for one or more devices. As such, mobile device
`100 can grant or deny network access to other wireless
`devices.
`[0027]
`In some implementations, upon invocation of par(cid:173)
`ticular device functionality, the graphical user interface of the
`mobile device 100 changes, or is augmented or replaced with
`another user interface or user interface elements, to facilitate
`user access to particular functions associated with the corre(cid:173)
`sponding device functionality. For example, in response to a
`user touching the phone object 110, the graphical user inter(cid:173)
`face of the touch-sensitive display 102 may present display
`objects related to various phone functions; likewise, touching
`of the email object 112 may cause the graphical user interface
`to present display objects related to various email functions;
`touching the Web object 114 may cause the graphical user
`interface to present display objects related to various Web(cid:173)
`surfing functions; and touching the media player object 116
`may cause the graphical user interface to present display
`objects related to various media processing functions.
`[0028]
`In some implementations, the top-level graphical
`user interface environment or state of FIG. 1 can be restored
`by pressing a home button 120 located near the bottom of the
`mobile device 100. The home button 120 may be a hardware
`tactile button that can be depressed physically such that the
`home button 120 undergoes motion without moving the sur-
`
`IPR2019-01011 Page 00017
`
`
`
`US 2013/0082974 Al
`
`Apr. 4, 2013
`
`3
`
`rounding region or touch-sensitive display 102. In some
`implementations, the home button 120 may include multi(cid:173)
`touch capabilities similar to the multi-touch-sensitive display
`102. Alternatively, the home button 120 may be a "virtual"
`button that is built into a screen of the mobile device 100, such
`as immediately below the touch-sensitive display 102. Fur(cid:173)
`ther, in some implementations, the touch-sensitive display
`102 may extend to the bottom of the mobile device 100 to
`encompass the home button 120 so that a specific region of the
`touch-sensitive display 102 comprises the home button 120.
`A user's contact with the specific region may trigger various
`responses in the mobile device 100 depending on the motion
`or amount of pressure of the contact. A home button 120 with
`multi-touch capabilities may process multiple simultaneous
`touch points, including processing data related to the pres(cid:173)
`sure, degree and/or position of each touch point. Such pro(cid:173)
`cessing may facilitate gestures and interactions with multiple
`fingers, chording, and other interactions or touch-sensitive
`display technologies. In some instances, the region of the
`touch-sensitive display 102 comprising the virtual home but(cid:173)
`ton 120 may provide a certain level of feedback or resistance
`to simulate a physical tactile button. The virtual home button
`120 may not be visible, but in certain implementations, a
`visual indicator may highlight the region comprising the
`home button 120, such as a lighted area of the touch-sensitive
`display 102 within the vicinity of the home button 120. In
`some implementations, each corresponding device function(cid:173)
`ality may have corresponding "home" display objects dis(cid:173)
`played on the touch-sensitive display 102, and the graphical
`user interface environment ofFIG.1 can be restored by press(cid:173)
`ing the "home" display object.
`[0029]
`In some implementations, the top-level graphical
`user interface can include additional display objects 106, such
`as a short messaging service (SMS) object 130, a calendar
`object 132, a photos object 134, a camera object 136, a cal(cid:173)
`culator object 138, a stocks object 140, a weather object 142,
`a maps object 144, a notes object 146, a clock object 148, an
`address book object 150, and a settings object 152. Touching
`the SMS display object 130 can, for example, invoke an SMS
`messaging environment and supporting functionality. Like(cid:173)
`wise, each selection of a display object 132, 134, 136, 138,
`140, 142, 144, 146, 148, 150 and 152 can invoke a corre(cid:173)
`sponding object environment and functionality.
`[0030] Additional and/or different display objects can also
`be displayed in the graphical user interface of FIG. 1. For
`example, if the device 100 is functioning as a base station for
`other devices, one or more "connection" objects may appear
`in the graphical user interface to indicate the connection. In
`some implementations, the display objects 106 can be con(cid:173)
`figured by a user, e.g., a user may specify which display
`objects 106 are displayed, and/or may download additional
`applications or other software that provides other functional(cid:173)
`ities and corresponding display objects.
`[0031]
`In some implementations, the mobile device 100
`can include one or more input/output (I/0) devices and/or
`sensor devices. For example, a speaker 160 and a microphone
`162 can be included to facilitate voice-enabled functional(cid:173)
`ities, such as phone and voice mail functions. In some imple(cid:173)
`mentations, a loud speaker 164 can be included to facilitate
`hands-free voice functionalities, such as speaker phone func(cid:173)
`tions. An audio jack 166 can also be included for use of
`headphones and/or a microphone.
`[0032]
`In some implementations, a proximity sensor 168
`can be included to facilitate the detection of the user position-
`
`ing the mobile device 100 proximate to the user's ear and, in
`response, to disengage the touch-sensitive display 102 to
`prevent accidental function invocations. In some implemen(cid:173)
`tations, the touch-sensitive display 102 can be turned off to
`conserve additional power when the mobile device 100 is
`proximate to the user's ear.
`[0033] Other sensors can also be used. For example, in
`some implementations, an ambient light sensor 170 can be
`utilized to facilitate adjusting the brightness of the touch(cid:173)
`sensitive display 102. In some implementations, an acceler(cid:173)
`ometer 172 can be utilized to detect movement of the mobile
`device 100, as indicated by the directional arrow 17 4. Accord(cid:173)
`ingly, display objects and/or media can be presented accord(cid:173)
`ing to a detected orientation, e.g., portrait or landscape. In
`some implementations, the mobile device 100 may include
`circuitry and sensors for supporting a location determining
`capability, such as that provided by the global positioning
`system (GPS) orotherpositioning system ( e.g., systems using
`Wi-Fi access points, television signals, cellular grids, Uni(cid:173)
`form Resource Locators (URLs )). In some implementations,
`a positioning system ( e.g., a GPS receiver) can be integrated
`into the mobile device 100 or provided as a separate device
`that can be coupled to the mobile device 100 through an
`interface ( e.g., port device 190) to provide access to location(cid:173)
`based services.
`[0034] The mobile device 100 can also include a camera
`lens and sensor 180. In some implementations, the camera
`lens and sensor 180 can be located on the back surface of the
`mobile device 100. The camera can capture still images and/
`or video.
`[0035] The mobile device 100 can also include one or more
`wireless communication subsystems, such as a 802.1 lb/g
`communication device 186, and/or a Bluetooth™ communi(cid:173)
`cation device 188. Other communication protocols can also
`be supported, including other 802.x communication proto(cid:173)
`cols (e.g., WiMax, Wi-Fi), code division multiple access
`(CDMA), global system for mobile communications (GSM),
`Enhanced Data GSM Environment (EDGE), 3G ( e.g., EV(cid:173)
`DO, UMTS, HSDPA), etc.
`In some implementations, a port device 190, e.g., a
`[0036]
`Universal Serial Bus (USB) port, or a docking port, or some
`other wired port connection, can be included. The port device
`190 can, for example, be utilized to establish a wired connec(cid:173)
`tion to other computing devices, such as other communica(cid:173)
`tion devices 100, a personal computer, a printer, or other
`processing devices capable of receiving and/or transmitting
`data. In some implementations, the port device 190 allows the
`mobile device 100 to synchronize with a host device using
`one or more protocols.
`
`Network Operating Environment
`
`[0037] FIG. 2 is a block diagram of an example network
`operating environment 200 for the mobile device 100 of FIG.
`1. The mobile device 100 of FIG. 1 can, for example, com(cid:173)
`municate over one or more wired and/or wireless networks
`210 in data communication. For example, a wireless network
`212, e.g., a cellular network, can communicate with a wide
`area network (WAN) 214, such as the Internet, by use of a
`gateway 216. Likewise, an access point 218, such as an 802.
`1 lg wireless access point, can provide communication access
`to the wide area network 214. In some implementations, both
`voice and data communications can be established over the
`wireless network 212 and the access point 218. For example,
`the mobile device 100a can place and receive phone calls
`
`IPR2019-01011 Page 00018
`
`
`
`US 2013/0082974 Al
`
`Apr. 4, 2013
`
`4
`
`( e.g., using VoIP protocols), send and receive email messages
`(e.g., u