WO2016043715A1 - Device cover - Google Patents
Device cover Download PDFInfo
- Publication number
- WO2016043715A1 WO2016043715A1 PCT/US2014/055795 US2014055795W WO2016043715A1 WO 2016043715 A1 WO2016043715 A1 WO 2016043715A1 US 2014055795 W US2014055795 W US 2014055795W WO 2016043715 A1 WO2016043715 A1 WO 2016043715A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computing device
- mobile computing
- cover
- detectable component
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/7246—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions by connection of exchangeable housing parts
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1626—Constructional details or arrangements for portable computers with a single-body enclosure integrating a flat display, e.g. Personal Digital Assistants [PDAs]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2200/00—Indexing scheme relating to G06F1/04 - G06F1/32
- G06F2200/16—Indexing scheme relating to G06F1/16 - G06F1/18
- G06F2200/163—Indexing scheme relating to constructional details of the computer
- G06F2200/1633—Protecting arrangement for the entire housing of the computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/18—Telephone sets specially adapted for use in ships, mines, or other places exposed to adverse environment
- H04M1/185—Improving the shock resistance of the housing, e.g. by increasing the rigidity
Definitions
- Mobile computing devices such as tablets and smartphones are ubiquitous in today's environment. Such devices provide users with instant access to a plethora of information regardless of their location. Moreover, such devices enable users to communicate in a prompt and user-friendly manner with other computing devices via various communication approaches (e.g., talk, text, and/or email).
- various communication approaches e.g., talk, text, and/or email.
- protection can be seen in various forms, including screen protectors and device covers.
- these protection mechanisms may enhance the life of a mobile computing device by protecting the mobile computing device's housing and/or display screen. Without such protection, the mobile computing device may be damaged or even rendered non-functional in the event of a drop or liquid spill.
- FIG. 1 depicts an example system comprising a mobile computing device and a mobile computing device cover in an open position in accordance with an implementation
- FIG. 2 depicts an example mobile computing device cover in a closed position in accordance with an implementation
- FIG. 3 depicts an example mobile computing device cover in a closed position in accordance with another implementation
- FIG. 4(a) - 4(c) depict example mobile computing device covers with stationary detectable components in different locations in accordance with an implementation
- FIG.5 depicts an example association fable comprising associations between detected locations and functions in accordance with an implementation
- FIG. 6 depicts an example mobile computing device in accordance with an implementation
- Fig 7 depicts an example process flow diagram for system operation in accordance with an implementation. NOTATION AND NOMENCLATURE
- the term "detectable component” is intended to mean a component that may be detected, and in particular, the location and/or state of at least a portion of the detectable component is discernabie by another component/module.
- the detectable component may comprise at least one magnet, RFID tag, NFC tag, switch, rotatable dial, push button, and/or any another component where at least a portion of the component's state/location is detectable.
- the term "detector” is intended to mean a component that is able to detect the state and/or location of the detectable component.
- the detector may be a magnetometer such as a Hall effect sensor.
- the detector may be a component that detects the current state of a switch, dial or button.
- the detector may be integrated with a module within a mobile computing device (e.g., integrated with a processing device), while in other implementations the detector is a discrete component (e.g., a discrete magnetometer). Moreover, the detector may detect the exact location, approximate location, and/or distance of the detectable component from the detector, depending on the implementation.
- protection mechanisms are used on mobile computing devices to protect the device from damage and thereby enhance the life of the product.
- An example protective mechanism is a mobile computing device cover. These covers come in various forms factors, including covers that protect the rear portion of the mobile computing device, covers that protect the front portion of the mobile computing device, and covers that protect the front and rear portion of the mobile computing device. Regardless of the form factor, the cover typically provides a single function - protect the mobile computing device from damage. While this function is important, it is limited. Therefore, aspects of the present disclosure enhance the cover functionality by integrating technology into the cover to trigger various functions on the associated mobile computing device.
- aspects of the present disclosure provide a "smart" cover that enables a user to rapidly trigger functionality on the mobile computing device via manipulation of movable components integrated in the cover
- aspects of the present disclosure provide a "smart” cover that enables a manufacturer to rapidly trigger functionality on the mobile computing device by integrating stationary components in different locations in the cover. Such functionality may be triggered prior to or in response to a portion of the cover being opened/closed.
- a system comprises a mobile computing device (e.g., a smartphone or tablet) and a mobile computing device cover (e.g., a "clam shell" cover).
- the mobile computing device cover includes a rear cover portion to receive and hold the mobile computing device and a front cover portion coupled to the rear cover portion.
- the cover includes a stationary/movable detectable component (e.g., a slider switch, rotating switch, and/or magnet.)
- the mobile computing device utilizes an integrated detector (e.g., at least one magnetometer such as a Hail effect sensor) to detect the location/state of at least a portion of the movable/stationary detectable component within the cover.
- the mobile computing device further includes an initiation module to cause the mobile computing device to conduct a pre-determined function based on the detected location/state of the detectable component within the mobile computing device cover.
- the function may include actions such as launching at least one application on the mobile computing device (e.g., launching an email application), changing a power state of the mobile computing device (e.g., changing from low to normal power state), changing a communication setting of the mobile computing device (e.g., turning ON/OFF WiFi or Bluetooth communication), changing a notification setting of the mobile computing device (e.g., placing the computing device in silent, vibrate, and/or audible mode), inputting login credentials on the mobile device (e.g., inputting username, password, and/or PIN information to an application and/or the mobile device), and/or initiating communication with another computing device (e.g., speed dialing a contact), in some implementations, this action occurs in response to the front cover transitioning from the closed position to an open position relative to the mobile computing device (or vice versa).
- the mobile computing device may launch an email application if the detectable component is in a first position when the user opens the cover, and further launch a text message application if the detectable component is in a second position when the user opens the cover.
- this may enable a user to promptly launch an application (e.g., the text message or email application) when the cover is opened instead of the user having to navigate through various screens and select the particular application to conduct the same functionality.
- a user may associate various applications for "quick launch" with various locations of a movable detectable component (e.g., a slide switch). As such, the user may manipulate the location of the detectable component on the cover to cause different applications to quick launch.
- a movable detectable component e.g., a slide switch
- a user may quick launch an email application when the cover is opened by placing the detectable component in a first position
- the user may quick launch a phone dialing application when the cover is opened by placing the detectable component in a second position
- the user may quick launch a text messaging application when the cover is opened by placing the detectable component in a third position
- the user may quick launch a gaming application when the cover is opened by placing the detectable component in a fourth position
- the user may speed dial a contact when the cover is opened by placing the dateable component in a fifth position, and so forth.
- a manufacturer may associate different functions with different locations of a stationary detectable component (e.g., an integrated magnet). As such, the manufacturer may produce different covers with different locations for the detectable component to trigger different functions. For example, a manufacturer may integrate a stationary magnet in a first location of a first cover (e.g., upper right corner) to trigger a retail point of sale application to launch when the cover is opened (i.e., a retail- focused cover). The manufacturer may integrate a stationary magnet in a second location of a second cover (e.g., lower right corner) to trigger an educational application to launch when the cover is opened (i.e., an education-focused cover). Hence, the retailer may utilize different covers to trigger different "quick-launch" or other functionality on mobile computing devices.
- FIG. 1 this figure depicts an example system 100 comprising a mobile computing device 1 10 and a mobile computing device cover 120 in an open position in accordance with one implementation. It should be understood that the figure depicts one example implementation, and various components may be added, removed, or modified in accordance with various other implementations without departing from the scope of the present disclosure.
- the mobile computing device 1 10 may be, for example, a tablet computer, smartphone, digital reader, gaming device, calculator, retail point of sale device, or another computing device configured to be easily transportable and protectable via a cover.
- the mobile device cover 120 may be, for example, a cover to protect the front and rear portions of the mobile computing device 1 10 (e.g., in a "book” or “clamshell” configuration), a cover to protect the front portion of the mobile computing device 1 10, or a cover to protect the rear portion of the mobile computing device 1 10.
- the cover 120 may be integrated with or discrete from the mobile computing device. 1 10.
- the mobile computing device cover 120 comprises a front cover portion 130 and rear cover portion 140.
- the cover 120 comprises a detectable component 150.
- the detectable component 150 is a component that may be detected, and in particular, the location and/or state of at least a portion of the detectable component 150 is discernable by another component/module.
- the detectable component 150 may comprise at least one magnet, RFID tag, NFC tag, switch, rotatable dial, and/or push button within the cover 120.
- the detectable component 150 is stationary within the cover 120.
- the detectable component 150 may be a stationary magnet, RFID tag, and/or NFC within the cover 120.
- the manufacturer may position the detectable component 150 in different positions in different covers 120 based on the desired functionality to be conducted at the mobile computing device 1 10. For example, the manufacturer may position the detectable component 150 in an upper left portion of the front cover portion 130 in a cover 120 intended for the healthcare industry, where opening the front cover portion 130 may trigger a healthcare application to open on the mobile computing device 1 10.
- the manufacturer may position the detectable component 150 in an upper right portion of the front cover portion 130 for a cover 120 intended for the education industry, where opening the front cover portion 130 may trigger one or multiple educational applications to open on the mobile computing device 1 10. Still further, the manufacturer may position the detectable component 150 in a lower left portion of the front cover portion 130 for a cover 120 intended for the retail industry, where opening the front cover portion 130 may trigger a retail point of sale application to open on the mobile computing device 1 10.
- the detectable component 150 is movable to at least two positions on the cover 120.
- the detectable component 150 may be a slide switch with a portion slidable to multiple positions. Each position may trigger different functionality. For example, when a switch portion is in a first location nothing may be happen, when the switch portion is in a second location a first application may launch, when the switch portion is in a third position a second application may launch, and so forth.
- the detectable component 150 is not limited to sliding switches and/or rotating dials, and any other movable component where the state/location may be detected is included.
- the detectable component 150 may be a series of depressable buttons where different functions are triggered based on the collective state of the various buttons.
- this device 1 10 comprises at least a detector 160 and initiation module 170.
- the detector 160 detects the locations and/or state of the above-discussed detectable component 150 within the cover 120.
- the detector 160 may detect the location of a stationary magnet within the cover (e.g., detect the magnet is located in top right or bottom right location).
- the detector 180 may detect the current location of a portion of the slider switch (e.g., position 1 , position 2, position 3, etc.).
- the detector 160 may detect the current orientation of a portion of the rotating dial (e.g., 0°, 90°, 180°, 270°, etc.). Still further, in the case where the detectable component 150 is a plurality of depressable buttons, the detector 160 may detect the current state the buttons (e.g., 0 depressed, 1 depressed, 2 depressed, etc.). Depending on the implementation, the detector 160 may comprise a magnetometer such as a Hall effect sensor, a RFID reader, a NFC reader, an ASIC, a processing device, a circuit, or any other component configured to detect the location/state of the detectable component 150.
- a magnetometer such as a Hall effect sensor, a RFID reader, a NFC reader, an ASIC, a processing device, a circuit, or any other component configured to detect the location/state of the detectable component 150.
- the initiation module 170 is communicatively coupled to the detector 160.
- the initiation module 170 determines the detected location/state of the detectable component 150 based on information received from the detector 160 (e.g., magnetic field proximity detection by a Hall effect sensor).
- the initiation module 170 then causes the mobile computing device 1 10 to conduct functionality based on the detected location/state of the detectable component 150.
- the initiation module 170 may cause the mobile computing device 1 10 to launch an application (e.g., launch a search engine), change power states (e.g., power down/up and/or transition between power states), change communication settings (e.g., enable/disable Bluetooth communication), input login credentials (e.g., input username, password, and/or PIN information to an application and/or the mobile device), and/or initiate a communication session (e.g., connect to a VPN or to a wearable computing device).
- an application e.g., launch a search engine
- change power states e.g., power down/up and/or transition between power states
- change communication settings e.g., enable/disable Bluetooth communication
- input login credentials e.g., input username, password, and/or PIN information to an application and/or the mobile device
- initiate a communication session e.g., connect to a VPN or to a wearable computing device.
- one function is triggered, while in other implementations, multiple
- the particular functions may be default functions programmed by a manufacturer, in other implementations, the functions may be user programmable.
- the user may download an application which allows the user to specify functions to be conducted for different detected states/locations.
- the user may further specify whether the function is to be conducted in response to the cover being opened, in response to the cover being closed, and/or in response to a detected location/state change of the detectable component 150.
- the function may be immediately conducted on the computing device to reduce latency.
- the mobile computing device 1 10 may immediately launch an application in response to a detected location/state change of the detectable component 150.
- the application may run in the background and/or the mobile computing device 1 10 may return to a low power state until the front cover portion 130 is opened.
- the initiation module 170 comprises a computer-readable medium and a processing device to execute instructions stored on the computer readable medium to cause the mobile computing device 1 10 to conduct functions described herein.
- the initiation module comprises a functionally equivalent circuit (e.g., an ASIC) to cause the mobile computing device 1 10 to conduct functions described herein.
- the initiation module 170 causes the mobile computing device 1 10 to conduct functions based on the detected state/location of the detectable component 150, as discussed above.
- FIG. 2 depicts an example cover 120 in a closed position in accordance with an implementation.
- the cover 120 includes a rear cover portion 140 to receive and hold a mobile computing device 1 10. Additionally, the cover 120 includes a front cover portion 130 coupled to the rear cover portion 140 to cover at least a portion of the mobile computing device 1 10 when the front cover portion 130 is in a closed position relative to the mobile computing device 1 10. Still further, the cover 120 includes a detectable component 150 integrated in the cover 120, wherein at least a portion of the detectable component is movable from at least a first position 210 with respect to the mobile computing device cover to a second position 220 with respect to the mobile computing device cover 120.
- the detectable component 150 comprises a sliding switch where different functionality is triggered on the mobile computing device 1 10 based on whether the movable portion of the sliding switch is detected to be in the first position 210, second position 220, third position 230, fourth position 240, or fifth position 250.
- FIG. 3 depicts an example cover 120 in a closed position in accordance with another implementation, in particular, the front portion of the cover 130 includes a rotating dial 150, where different functionality is triggered on the mobile computing device 1 10 based on whether the rotating dial is detected to be in the first position 310, second position 320, third position 330, or fourth position 340.
- FIGs. 4(a), 4(b), and 4(c) depict example covers 120 with stationary detectable components 150 in different locations in accordance with an implementation.
- a manufacturer may produce multiple covers 120 with stationary detectable components 150 (e.g., magnets) located in different locations to trigger different functionality.
- the detected location of the stationary detectable component 150 in the lower right portion of the front cover portion 130 may trigger a first function (e.g., launching an educational application).
- the detected location of the stationary detectable component 150 in the middle right portion of the front cover portion 130 may trigger a second function (e.g., launching a retail point of sale application).
- the detected location of the stationary detectable component 150 in the upper right portion of the front cover portion 130 may trigger a third function (e.g., launching a financial application).
- a manufacturer may market different covers 120 to different vertical markets (e.g., healthcare market, educational market, and financial market) to address their different needs.
- this figure depicts an example association table 500 comprising associations between defected locations and functions in accordance with an implementation.
- the table 500 may be based on a manufacturer's default settings or set by a user based on current preferences.
- the mobile computing device may have an application thereon that provides the ability to associate locations/states with various functions.
- the table 500 comprises various detectable component locations in column 1 and associated functions in column 2. While only locations are shown, in some implementations, detectable states may be utilized. For example, in a depressable button implementation, depressing one button may trigger one function, depressing two buttons may trigger another function, and so forth.
- multiple functions may be associated with a location/state.
- detected location 2 may launch Pandora ⁇ and connect the mobile computing device to a portable speaker in a parallel or sequential manner.
- an option may be provided to determine when the function should occur. For example, one option may trigger the function prior to opening the front cover portion, another option may trigger the function in response to opening the front cover portion, and yet another option may trigger the function in response to closing the front cover portion.
- the mobile computing device 1 10 comprises a detector 160 and initiation module 170 coupled via a communication bus 610.
- the initiation module 170 comprises a processing device 620 and a non-transitory machine readable medium 630.
- the processing device 620 is to retrieve and execute instructions stored on the machine-readable medium 630.
- the processing device 620 may be a central processing unit (CPU), graphics processing unit (GPU), system-on-chip (SoC), or another processing device to execute instructions.
- the processing device 620 may fetch, decode, and execute instructions stored on the machine readable storage medium 630 to implement the functionalities described above and below.
- the machine readable storage medium 630 may correspond to any typical storage device that stores machine-readable instructions, such as programming code, software, firmware, or the like.
- the machine readable medium 630 may include one or more of a non-volatile memory, a volatile memory, and/or a storage device.
- non-volatile memory include, but are not limited to, electronically erasable programmable read only memory (EEPROM) and flash memory.
- volatile memory include, but are not limited to, static random access memory (SRAM) and dynamic random access memory (DRAM).
- SRAM static random access memory
- DRAM dynamic random access memory
- storage devices include, but are not limited to, hard disk drives, compact disc read/write drives, digital versatile disc drives, optical read/write devices, and flash memory devices.
- the machine readable medium 630 comprises initiation instructions 640 and an association table 500.
- the initiation instructions 640 when executed by the processing device 640, cause the mobile computing device to conduct the various functions discussed herein. For example, in one implementation, the instructions cause the mobile computing device to perform a function specified in the association table 500 based on the detected information provided by the detector 160.
- the initiation instructions 640 may cause the mobile computing device to launch at least one application, change a power state, change a communication setting, change a notification setting, input login credentials, and/or initiate communication with another device.
- FIG. 7 depicts an example process flow diagram 700 for system 100 operation in accordance with an implementation.
- the processes depicted in Fig. 7 represent generalized illustrations, and that other processes may be added or existing processes may be removed, modified, or rearranged without departing from the scope and spirit of the present disclosure, in addition, it should be understood that at least some of the processes depicted in Fig. 7 may represent instructions stored on a machine-readable storage medium that, when executed, cause a mobile computing device to respond, to perform actions, to change states, and/or to make decisions. Alternatively, at least some of the processes may be conducted by a functionally-equivalent circuit.
- the process 700 may begin at block 710, where the user manipulates the location/state of at least a portion of a detectable element located on a mobile computing device cover.
- a detector integrated in a mobile computing device detects the change in location/state of at least the portion of the detectable element and provides information to the initiation module.
- the user opens the front cover portion of the mobile computing device cover.
- the initiation module checks an association table and causes the mobile computing device to conduct a function based on the information provided by the detector and the information within the association table.
- aspects of the foregoing describe a "smart" cover that enables a user to rapidly trigger functionality on a mobile computing device via manipulation of a movable and detectable component integrated in a mobile computing device cover.
- aspects of the present disclosure provide a "smart" cover that enables a manufacturer to rapidly trigger functionality on the mobile computing device by integrating stationary and detectable components in different locations on a cover.
- the described approach may enable a user to promptly launch an application (e.g., the text message or email application) when the cover is opened instead of the user having to navigate through various screens and select the particular application.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Set Structure (AREA)
- Telephone Function (AREA)
Abstract
In one example, a mobile computing device cover is provided. The mobile computing device cover includes a detectable component integrated in the mobile computing device cover, where at least a portion of the detectable component is movable from at least a first position with respect to the mobile computing device cover to a second position with respect to the mobile device cover.
Description
DEVICE COVER
BACKGROUND
[0001] Mobile computing devices such as tablets and smartphones are ubiquitous in today's environment. Such devices provide users with instant access to a plethora of information regardless of their location. Moreover, such devices enable users to communicate in a prompt and user-friendly manner with other computing devices via various communication approaches (e.g., talk, text, and/or email).
[0002] Given the importance of mobile computing devices in day-to-day life, users tend to add protection to their device. Such protection can be seen in various forms, including screen protectors and device covers. Among other things, these protection mechanisms may enhance the life of a mobile computing device by protecting the mobile computing device's housing and/or display screen. Without such protection, the mobile computing device may be damaged or even rendered non-functional in the event of a drop or liquid spill.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] Examples are described in the following detailed description and in reference to the drawings, in which:
[0004] Fig. 1 depicts an example system comprising a mobile computing device and a mobile computing device cover in an open position in accordance with an implementation;
[0005] Fig. 2 depicts an example mobile computing device cover in a closed position in accordance with an implementation;
[0006] Fig. 3 depicts an example mobile computing device cover in a closed position in accordance with another implementation;
[0007] Fig. 4(a) - 4(c) depict example mobile computing device covers with stationary detectable components in different locations in accordance with an implementation;
[0008] Fig.5 depicts an example association fable comprising associations between detected locations and functions in accordance with an implementation;
[0009] Fig. 6 depicts an example mobile computing device in accordance with an implementation; and
[00010] Fig 7 depicts an example process flow diagram for system operation in accordance with an implementation.
NOTATION AND NOMENCLATURE
[00011] Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, technology companies may refer to components by different names. This document does not intend to distinguish between components that differ in name but not function, in the following discussion and in the claims, the terms "including" and "comprising" are used in an open- ended fashion, and thus should be interpreted to mean "including, but not limited to... ." Also, the term "couple" or "couples" is intended to mean either an indirect or direct connection unless specified otherwise. Thus, if a first device couples to a second device, that connection may be through a direct electrical or mechanical connection, or through an indirect electrical or mechanical connection via other devices and connections. Additionally, the term "detectable component" is intended to mean a component that may be detected, and in particular, the location and/or state of at least a portion of the detectable component is discernabie by another component/module. For example, the detectable component may comprise at least one magnet, RFID tag, NFC tag, switch, rotatable dial, push button, and/or any another component where at least a portion of the component's state/location is detectable. Also, the term "detector" is intended to mean a component that is able to detect the state and/or location of the detectable component. For example, the detector may be a magnetometer such as a Hall effect sensor. Alternatively, the detector may be a component that detects the current state of a switch, dial or button. In some implementations, the detector may be integrated with a module within a mobile computing device (e.g., integrated with a processing device), while in other implementations the detector is a discrete component (e.g., a discrete magnetometer). Moreover, the detector may detect the exact location, approximate location, and/or distance of the detectable component from the detector, depending on the implementation.
DETAILED DESCRIPTION
[00012] As mentioned above, protection mechanisms are used on mobile computing devices to protect the device from damage and thereby enhance the life of the product. An example protective mechanism is a mobile computing device cover. These covers come in various forms factors, including covers that protect the rear portion of the mobile computing device, covers that protect the front portion of the mobile computing device, and covers that protect the front and rear portion of the mobile computing device. Regardless of the form factor, the cover typically provides a single function - protect the mobile computing device from damage. While this function is important, it is limited.
Therefore, aspects of the present disclosure enhance the cover functionality by integrating technology into the cover to trigger various functions on the associated mobile computing device. More particularly, and as discussed below with reference to various examples and figures, aspects of the present disclosure provide a "smart" cover that enables a user to rapidly trigger functionality on the mobile computing device via manipulation of movable components integrated in the cover, in addition, aspects of the present disclosure provide a "smart" cover that enables a manufacturer to rapidly trigger functionality on the mobile computing device by integrating stationary components in different locations in the cover. Such functionality may be triggered prior to or in response to a portion of the cover being opened/closed.
[00013] For instance, in one example implementation, a system comprises a mobile computing device (e.g., a smartphone or tablet) and a mobile computing device cover (e.g., a "clam shell" cover). The mobile computing device cover includes a rear cover portion to receive and hold the mobile computing device and a front cover portion coupled to the rear cover portion. In addition, the cover includes a stationary/movable detectable component (e.g., a slider switch, rotating switch, and/or magnet.) The mobile computing device utilizes an integrated detector (e.g., at least one magnetometer such as a Hail effect sensor) to detect the location/state of at least a portion of the movable/stationary detectable component within the cover. The mobile computing device further includes an initiation module to cause the mobile computing device to conduct a pre-determined function based on the detected location/state of the detectable component within the mobile computing device cover. The function may include actions such as launching at least one application on the mobile computing device (e.g., launching an email application), changing a power state of the mobile computing device (e.g., changing from low to normal power state), changing a communication setting of the mobile computing device (e.g., turning ON/OFF WiFi or Bluetooth communication), changing a notification setting of the mobile computing device (e.g., placing the computing device in silent, vibrate, and/or audible mode), inputting login credentials on the mobile device (e.g., inputting username, password, and/or PIN information to an application and/or the mobile device), and/or initiating communication with another computing device (e.g., speed dialing a contact), in some implementations, this action occurs in response to the front cover transitioning from the closed position to an open position relative to the mobile computing device (or vice versa). Thus, for example, the mobile computing device may launch an email application if the detectable component is in a first position when the user opens the cover, and further launch a text message application if the detectable component is in a
second position when the user opens the cover. Among other things, this may enable a user to promptly launch an application (e.g., the text message or email application) when the cover is opened instead of the user having to navigate through various screens and select the particular application to conduct the same functionality.
[00014] In some examples, a user may associate various applications for "quick launch" with various locations of a movable detectable component (e.g., a slide switch). As such, the user may manipulate the location of the detectable component on the cover to cause different applications to quick launch. For example, a user may quick launch an email application when the cover is opened by placing the detectable component in a first position, the user may quick launch a phone dialing application when the cover is opened by placing the detectable component in a second position, the user may quick launch a text messaging application when the cover is opened by placing the detectable component in a third position, the user may quick launch a gaming application when the cover is opened by placing the detectable component in a fourth position, the user may speed dial a contact when the cover is opened by placing the dateable component in a fifth position, and so forth.
[00015] In other examples, a manufacturer may associate different functions with different locations of a stationary detectable component (e.g., an integrated magnet). As such, the manufacturer may produce different covers with different locations for the detectable component to trigger different functions. For example, a manufacturer may integrate a stationary magnet in a first location of a first cover (e.g., upper right corner) to trigger a retail point of sale application to launch when the cover is opened (i.e., a retail- focused cover). The manufacturer may integrate a stationary magnet in a second location of a second cover (e.g., lower right corner) to trigger an educational application to launch when the cover is opened (i.e., an education-focused cover). Hence, the retailer may utilize different covers to trigger different "quick-launch" or other functionality on mobile computing devices. These and various other examples are discussed further below with reference to various figures.
[00018] Looking now at Fig. 1 , this figure depicts an example system 100 comprising a mobile computing device 1 10 and a mobile computing device cover 120 in an open position in accordance with one implementation. It should be understood that the figure depicts one example implementation, and various components may be added, removed, or modified in accordance with various other implementations without departing from the scope of the present disclosure.
[00017] The mobile computing device 1 10 may be, for example, a tablet computer, smartphone, digital reader, gaming device, calculator, retail point of sale device, or another computing device configured to be easily transportable and protectable via a cover. The mobile device cover 120 may be, for example, a cover to protect the front and rear portions of the mobile computing device 1 10 (e.g., in a "book" or "clamshell" configuration), a cover to protect the front portion of the mobile computing device 1 10, or a cover to protect the rear portion of the mobile computing device 1 10. Depending on the implementation, the cover 120 may be integrated with or discrete from the mobile computing device. 1 10.
[00018] The mobile computing device cover 120 comprises a front cover portion 130 and rear cover portion 140. In addition, the cover 120 comprises a detectable component 150. The detectable component 150 is a component that may be detected, and in particular, the location and/or state of at least a portion of the detectable component 150 is discernable by another component/module. For example, the detectable component 150 may comprise at least one magnet, RFID tag, NFC tag, switch, rotatable dial, and/or push button within the cover 120.
[00019] In some implementations, the detectable component 150 is stationary within the cover 120. For example, the detectable component 150 may be a stationary magnet, RFID tag, and/or NFC within the cover 120. In this case, the manufacturer may position the detectable component 150 in different positions in different covers 120 based on the desired functionality to be conducted at the mobile computing device 1 10. For example, the manufacturer may position the detectable component 150 in an upper left portion of the front cover portion 130 in a cover 120 intended for the healthcare industry, where opening the front cover portion 130 may trigger a healthcare application to open on the mobile computing device 1 10. Alternatively, the manufacturer may position the detectable component 150 in an upper right portion of the front cover portion 130 for a cover 120 intended for the education industry, where opening the front cover portion 130 may trigger one or multiple educational applications to open on the mobile computing device 1 10. Still further, the manufacturer may position the detectable component 150 in a lower left portion of the front cover portion 130 for a cover 120 intended for the retail industry, where opening the front cover portion 130 may trigger a retail point of sale application to open on the mobile computing device 1 10.
[00020] In other implementations, at least a portion of the detectable component 150 is movable to at least two positions on the cover 120. For example, the detectable component 150 may be a slide switch with a portion slidable to multiple positions. Each position may trigger different functionality. For example, when a switch portion is in a first
location nothing may be happen, when the switch portion is in a second location a first application may launch, when the switch portion is in a third position a second application may launch, and so forth. In other examples, the detectable component 150 comprises a rotating dial where different functionality is conducted based on the current location of the dial (e.g., 0° = no function, 90° = function 1 , 180° = function 2, and 270° = function 3). It should be understood that the detectable component 150 is not limited to sliding switches and/or rotating dials, and any other movable component where the state/location may be detected is included. For instance, the detectable component 150 may be a series of depressable buttons where different functions are triggered based on the collective state of the various buttons.
[00021] Turning now to the mobile computing device 1 10, this device 1 10 comprises at least a detector 160 and initiation module 170. The detector 160 detects the locations and/or state of the above-discussed detectable component 150 within the cover 120. For example, in the situation where the detectable component 150 is a stationary magnet, the detector 160 may detect the location of a stationary magnet within the cover (e.g., detect the magnet is located in top right or bottom right location). In the situation where the detectable component 150 is a slider switch, the detector 180 may detect the current location of a portion of the slider switch (e.g., position 1 , position 2, position 3, etc.). In the situation where the detectable component 150 is a rotating dial, the detector 160 may detect the current orientation of a portion of the rotating dial (e.g., 0°, 90°, 180°, 270°, etc.). Still further, in the case where the detectable component 150 is a plurality of depressable buttons, the detector 160 may detect the current state the buttons (e.g., 0 depressed, 1 depressed, 2 depressed, etc.). Depending on the implementation, the detector 160 may comprise a magnetometer such as a Hall effect sensor, a RFID reader, a NFC reader, an ASIC, a processing device, a circuit, or any other component configured to detect the location/state of the detectable component 150.
[00022] The initiation module 170 is communicatively coupled to the detector 160. The initiation module 170 determines the detected location/state of the detectable component 150 based on information received from the detector 160 (e.g., magnetic field proximity detection by a Hall effect sensor). The initiation module 170 then causes the mobile computing device 1 10 to conduct functionality based on the detected location/state of the detectable component 150. For example, the initiation module 170 may cause the mobile computing device 1 10 to launch an application (e.g., launch a search engine), change power states (e.g., power down/up and/or transition between power states), change communication settings (e.g., enable/disable Bluetooth communication), input
login credentials (e.g., input username, password, and/or PIN information to an application and/or the mobile device), and/or initiate a communication session (e.g., connect to a VPN or to a wearable computing device). In some implementations, one function is triggered, while in other implementations, multiple functions are triggered in a simultaneous or sequential manner. For example, the triggered function may be for the mobile computing device 1 10 to launch an Internet radio service (e.g., Pandora®) and connect to a portable speaker to play the received audio content.
[00023] In some implementations, the particular functions may be default functions programmed by a manufacturer, in other implementations, the functions may be user programmable. For example, the user may download an application which allows the user to specify functions to be conducted for different detected states/locations. The user may further specify whether the function is to be conducted in response to the cover being opened, in response to the cover being closed, and/or in response to a detected location/state change of the detectable component 150. in the last case, the function may be immediately conducted on the computing device to reduce latency. For example, the mobile computing device 1 10 may immediately launch an application in response to a detected location/state change of the detectable component 150. In some implementations, the application may run in the background and/or the mobile computing device 1 10 may return to a low power state until the front cover portion 130 is opened.
[00024] In various implementations, the initiation module 170 comprises a computer-readable medium and a processing device to execute instructions stored on the computer readable medium to cause the mobile computing device 1 10 to conduct functions described herein. In other implementations, the initiation module comprises a functionally equivalent circuit (e.g., an ASIC) to cause the mobile computing device 1 10 to conduct functions described herein. Regardless of the implementation, the initiation module 170 causes the mobile computing device 1 10 to conduct functions based on the detected state/location of the detectable component 150, as discussed above.
[00025] Turning now to Fig. 2, this figure depicts an example cover 120 in a closed position in accordance with an implementation. The cover 120 includes a rear cover portion 140 to receive and hold a mobile computing device 1 10. Additionally, the cover 120 includes a front cover portion 130 coupled to the rear cover portion 140 to cover at least a portion of the mobile computing device 1 10 when the front cover portion 130 is in a closed position relative to the mobile computing device 1 10. Still further, the cover 120 includes a detectable component 150 integrated in the cover 120, wherein at least a portion of the detectable component is movable from at least a first position 210 with
respect to the mobile computing device cover to a second position 220 with respect to the mobile computing device cover 120. More particularly, the detectable component 150 comprises a sliding switch where different functionality is triggered on the mobile computing device 1 10 based on whether the movable portion of the sliding switch is detected to be in the first position 210, second position 220, third position 230, fourth position 240, or fifth position 250.
[00028] Looking at Fig. 3, this figure depicts an example cover 120 in a closed position in accordance with another implementation, in particular, the front portion of the cover 130 includes a rotating dial 150, where different functionality is triggered on the mobile computing device 1 10 based on whether the rotating dial is detected to be in the first position 310, second position 320, third position 330, or fourth position 340.
[00027] Turning to Figs. 4(a), 4(b), and 4(c), these figures depict example covers 120 with stationary detectable components 150 in different locations in accordance with an implementation. In particular, and as discussed above, a manufacturer may produce multiple covers 120 with stationary detectable components 150 (e.g., magnets) located in different locations to trigger different functionality. For example and referring to Fig. 4(a), the detected location of the stationary detectable component 150 in the lower right portion of the front cover portion 130 may trigger a first function (e.g., launching an educational application). Referring to Fig. 4(b), the detected location of the stationary detectable component 150 in the middle right portion of the front cover portion 130 may trigger a second function (e.g., launching a retail point of sale application). Referring to Fig. 4(c), the detected location of the stationary detectable component 150 in the upper right portion of the front cover portion 130 may trigger a third function (e.g., launching a financial application). Hence, a manufacturer may market different covers 120 to different vertical markets (e.g., healthcare market, educational market, and financial market) to address their different needs.
[00028] With respect to Fig. 5, this figure depicts an example association table 500 comprising associations between defected locations and functions in accordance with an implementation. As mentioned above, the table 500 may be based on a manufacturer's default settings or set by a user based on current preferences. When set by the user, the mobile computing device may have an application thereon that provides the ability to associate locations/states with various functions. As shown, the table 500 comprises various detectable component locations in column 1 and associated functions in column 2. While only locations are shown, in some implementations, detectable states may be utilized. For example, in a depressable button implementation, depressing one button may
trigger one function, depressing two buttons may trigger another function, and so forth. Moreover, in some implementations, multiple functions may be associated with a location/state. Thus, detected location 2 may launch Pandora© and connect the mobile computing device to a portable speaker in a parallel or sequential manner. Furthermore, an option may be provided to determine when the function should occur. For example, one option may trigger the function prior to opening the front cover portion, another option may trigger the function in response to opening the front cover portion, and yet another option may trigger the function in response to closing the front cover portion.
[00029] Looking now at Fig. 6, this figure depicts an example mobile computing device 1 10 in accordance with an implementation. The mobile computing device 1 10 comprises a detector 160 and initiation module 170 coupled via a communication bus 610. The initiation module 170 comprises a processing device 620 and a non-transitory machine readable medium 630. The processing device 620 is to retrieve and execute instructions stored on the machine-readable medium 630. Depending on the implementation, the processing device 620 may be a central processing unit (CPU), graphics processing unit (GPU), system-on-chip (SoC), or another processing device to execute instructions. Put another way, the processing device 620 may fetch, decode, and execute instructions stored on the machine readable storage medium 630 to implement the functionalities described above and below.
[00030] The machine readable storage medium 630 may correspond to any typical storage device that stores machine-readable instructions, such as programming code, software, firmware, or the like. For example, the machine readable medium 630 may include one or more of a non-volatile memory, a volatile memory, and/or a storage device. Examples of non-volatile memory include, but are not limited to, electronically erasable programmable read only memory (EEPROM) and flash memory. Examples of volatile memory include, but are not limited to, static random access memory (SRAM) and dynamic random access memory (DRAM). Examples of storage devices include, but are not limited to, hard disk drives, compact disc read/write drives, digital versatile disc drives, optical read/write devices, and flash memory devices. The machine readable medium 630 comprises initiation instructions 640 and an association table 500. The initiation instructions 640, when executed by the processing device 640, cause the mobile computing device to conduct the various functions discussed herein. For example, in one implementation, the instructions cause the mobile computing device to perform a function specified in the association table 500 based on the detected information provided by the detector 160. For example, the initiation instructions 640 may cause the mobile computing
device to launch at least one application, change a power state, change a communication setting, change a notification setting, input login credentials, and/or initiate communication with another device.
[00031] Turning now to Fig. 7, this figure depicts an example process flow diagram 700 for system 100 operation in accordance with an implementation. It should be should be readily apparent that the processes depicted in Fig. 7 represent generalized illustrations, and that other processes may be added or existing processes may be removed, modified, or rearranged without departing from the scope and spirit of the present disclosure, in addition, it should be understood that at least some of the processes depicted in Fig. 7 may represent instructions stored on a machine-readable storage medium that, when executed, cause a mobile computing device to respond, to perform actions, to change states, and/or to make decisions. Alternatively, at least some of the processes may be conducted by a functionally-equivalent circuit.
[00032] The process 700 may begin at block 710, where the user manipulates the location/state of at least a portion of a detectable element located on a mobile computing device cover. At block 720, a detector integrated in a mobile computing device detects the change in location/state of at least the portion of the detectable element and provides information to the initiation module. At block 730, the user opens the front cover portion of the mobile computing device cover. In response to this detected opening, at block 740, the initiation module checks an association table and causes the mobile computing device to conduct a function based on the information provided by the detector and the information within the association table.
[00033] Aspects of the foregoing describe a "smart" cover that enables a user to rapidly trigger functionality on a mobile computing device via manipulation of a movable and detectable component integrated in a mobile computing device cover. Moreover, aspects of the present disclosure provide a "smart" cover that enables a manufacturer to rapidly trigger functionality on the mobile computing device by integrating stationary and detectable components in different locations on a cover. Regardless of the implementation, the described approach may enable a user to promptly launch an application (e.g., the text message or email application) when the cover is opened instead of the user having to navigate through various screens and select the particular application. While the present disclosure has been shown and described with reference to the foregoing examples, it should be understood that other forms, details, and implementations may be made without departing from the spirit and scope of the disclosure that is defined in the following claims.
Claims
1. A system, comprising:
a mobile computing device cover including a rear cover portion, a front cover portion coupled to the rear cover portion, and a detectable component, wherein the rear cover portion is to receive and hold a mobile computing device, and the front cover portion is to cover at least a portion of the mobile computing device when the front cover is in a closed position relative to the mobile computing device; and
the mobile computing device including an initiation module and at least one detector, wherein the at least one detector is to detect the Iocation of at least a portion of the detectable component within the mobile computing device cover, and wherein the initiation module is to cause the mobile computing device to conduct a function based on the detected Iocation of the at least portion of the detectable component within the mobile computing device cover.
2. The system of claim 1 , wherein the function comprises launching at least one application on the mobile computing device.
3. The system of claim 1 , wherein the function comprises at least one of: launching at least one application on the mobile computing device, changing a power state of the mobile computing device, changing a communication setting of the mobile computing device, changing a notification setting of the mobile computing device, inputting login credentials on the mobile device, and initiating communication with another computing device.
4. The system of claim 1 , wherein the function comprises launching at least one application on the mobile computing device in response to the front cover transitioning from the closed position to an open position relative to the mobile computing device.
5. The system of claim 1 , wherein the function comprises launching at least one application on the mobile computing device prior to the front cover transitioning from the dosed position to an open position relative to the mobile computing device.
6. The system of claim 1 , wherein the at least portion of the detectable component is movable from at least a first position with respect to the mobile computing device cover to a second position with respect to the mobile device cover.
7. The system of claim 1 , wherein the initiation module is to cause the mobile computing device to conduct the function based on the detected location of the at least portion of the detectable component within the mobile computing device based on preprogrammed associations between detected locations and functions.
8. The system of claim 1 , wherein the at least portion of the detectable component is stationary within the mobile computing device cover.
9. A mobile computing device cover, comprising:
a rear cover portion to receive and hold a mobile computing device;
a front cover portion coupled to the rear cover portion to cover at least a portion of the mobile computing device when the front cover is in a closed position relative to the mobile computing device; and
a detectable component integrated in the mobile computing device cover, wherein at least a portion of the detectable component is movable from at least a first position with respect to the mobile computing device cover to a second position with respect to the mobile device cover.
10. The mobile computing device cover of claim 9, further comprising an initiation module to detect whether the at least portion of the detectable component is in the first position or second position and communicate the determined position to the mobile computing device.
1 1 . The mobile computing device cover of claim 9, wherein the location of the at least portion of the detectable component is determinable by the mobile computing device without the mobile computing device cover communicating with the mobile computing device.
12. A mobile computing device, comprising:
at least one detector to determine the location of at least a portion of a detectable component within a mobile computing device cover; and
an initiation moduie to cause the mobile computing device to conduct a function based on the detected location of the at least portion of the detectable component within the mobile computing device cover,
wherein the function comprises at least one of launching at least one application on the mobile computing device, changing a power state of the mobile computing device, changing a communication setting of the mobile computing device, changing a notification setting of the mobile computing device, inputting login credentials on the mobile device, and initiating communication with another computing device,
13. The mobile computing device of claim 12, wherein the initiation module is to cause the mobile computing device to conduct the function based on pre-programmed associations between detected locations and functions.
14. The mobile computing device of claim 12, wherein the initiation module is to cause the mobile computing device to conduct the function in response to a front cover of the mobile computing device cover transitioning from a closed position to an open position relative to the mobile computing device.
15. The mobile computing device of claim 12, wherein the initiation module is to cause the mobile computing device to conduct the function prior to a front cover of the mobile computing device cover transitioning from a closed position to an open position relative to the mobile computing device.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2014/055795 WO2016043715A1 (en) | 2014-09-16 | 2014-09-16 | Device cover |
| TW104127142A TWI579681B (en) | 2014-09-16 | 2015-08-20 | Device cover |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2014/055795 WO2016043715A1 (en) | 2014-09-16 | 2014-09-16 | Device cover |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016043715A1 true WO2016043715A1 (en) | 2016-03-24 |
Family
ID=55533606
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2014/055795 Ceased WO2016043715A1 (en) | 2014-09-16 | 2014-09-16 | Device cover |
Country Status (2)
| Country | Link |
|---|---|
| TW (1) | TWI579681B (en) |
| WO (1) | WO2016043715A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017170566A1 (en) * | 2016-03-28 | 2017-10-05 | 株式会社タイヨー | Portable information terminal cover and portable information terminal program |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080096620A1 (en) * | 2006-10-20 | 2008-04-24 | Lee Min-Soo | Mobile terminal and case for mobile terminal |
| US20100048268A1 (en) * | 2008-08-20 | 2010-02-25 | O'neill Patrick | Mobile device accessories and methods of attachment to mobile devices |
| US20120077548A1 (en) * | 2010-09-27 | 2012-03-29 | Lynne Goldberg | Mobile Phone Case |
| KR101245922B1 (en) * | 2011-01-20 | 2013-03-20 | 김덕승 | Case of portable terminal for autoplaying program and method for autoplaying program without touching lcd using thereof |
| KR20140096893A (en) * | 2013-01-29 | 2014-08-06 | 엘지전자 주식회사 | Mobile terminal and cover for the same |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100048265A1 (en) * | 2008-08-21 | 2010-02-25 | Chi-Ming Chiang | Antenna mounting arrangement for cell phone with a metal casing |
| US9035872B2 (en) * | 2012-06-08 | 2015-05-19 | Apple Inc. | Detection system and method between accessory and electronic device |
| CN203524031U (en) * | 2013-09-22 | 2014-04-09 | 东莞宇龙通信科技有限公司 | A protective cover for a mobile terminal |
-
2014
- 2014-09-16 WO PCT/US2014/055795 patent/WO2016043715A1/en not_active Ceased
-
2015
- 2015-08-20 TW TW104127142A patent/TWI579681B/en not_active IP Right Cessation
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080096620A1 (en) * | 2006-10-20 | 2008-04-24 | Lee Min-Soo | Mobile terminal and case for mobile terminal |
| US20100048268A1 (en) * | 2008-08-20 | 2010-02-25 | O'neill Patrick | Mobile device accessories and methods of attachment to mobile devices |
| US20120077548A1 (en) * | 2010-09-27 | 2012-03-29 | Lynne Goldberg | Mobile Phone Case |
| KR101245922B1 (en) * | 2011-01-20 | 2013-03-20 | 김덕승 | Case of portable terminal for autoplaying program and method for autoplaying program without touching lcd using thereof |
| KR20140096893A (en) * | 2013-01-29 | 2014-08-06 | 엘지전자 주식회사 | Mobile terminal and cover for the same |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017170566A1 (en) * | 2016-03-28 | 2017-10-05 | 株式会社タイヨー | Portable information terminal cover and portable information terminal program |
Also Published As
| Publication number | Publication date |
|---|---|
| TWI579681B (en) | 2017-04-21 |
| TW201612681A (en) | 2016-04-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9524091B2 (en) | Device, method, and storage medium storing program | |
| US9619139B2 (en) | Device, method, and storage medium storing program | |
| US9874994B2 (en) | Device, method and program for icon and/or folder management | |
| US9495025B2 (en) | Device, method and storage medium storing program for controlling screen orientation | |
| US9423952B2 (en) | Device, method, and storage medium storing program | |
| US9268481B2 (en) | User arrangement of objects on home screen of mobile device, method and storage medium thereof | |
| US9563347B2 (en) | Device, method, and storage medium storing program | |
| US10069771B2 (en) | Digital device and method of controlling therefor | |
| US9342235B2 (en) | Device, method, and storage medium storing program | |
| JP5805588B2 (en) | Electronic device, control method, and control program | |
| JP6483452B2 (en) | Electronic device, control method, and control program | |
| JP2013093699A (en) | Portable terminal, lock control program, and lock control method | |
| US9542019B2 (en) | Device, method, and storage medium storing program for displaying overlapped screens while performing multitasking function | |
| KR102307215B1 (en) | Data processing methods and electronic devices | |
| CN105117101B (en) | The display methods and device of application program | |
| JP5801673B2 (en) | Electronic apparatus, method, and program | |
| US20140253441A1 (en) | Method and Device for Executing an Operation on a Mobile Device | |
| EP3001293A1 (en) | Method and device for rights management | |
| JP2019087035A (en) | Electronic apparatus, program, and control method | |
| WO2016043715A1 (en) | Device cover | |
| JP6401843B2 (en) | Electronic device, control method and program | |
| JP6080401B2 (en) | apparatus | |
| JP6186488B1 (en) | Electronic device, control method and program | |
| CN105760796A (en) | Application security processing method and device | |
| CN106534482A (en) | Method and device for managing application programs of mobile terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14901962 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 14901962 Country of ref document: EP Kind code of ref document: A1 |