CROSS-REFERENCE TO RELATED APPLICATIONThis application is a continuation of U.S. application Ser. No. 12/938,990, filed Nov. 3, 2010, the contents of which are entirely incorporated by reference herein.
FIELD OF THE TECHNOLOGYThe present disclosure relates generally to mobile communications devices. More specifically, enabling implementations relate to mobile communications devices having a lock mode that can be bypassed and incorporating a camera assembly. The technology provides means and methods whereby a camera assembly in a mobile communications device may be utilized under certain conditions without compromising security of the mobile communications device. The technology extends the functionality of device applications in a secure manner. In at least one implementation, the technology provides for the temporary utilization of one or more mobile communication device applications without the inputting of an otherwise required password. The technology can be customized dynamically on a per device basis.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 illustrates a communication system including a mobile communications device to which example implementations of the technology can be applied.
FIG. 2 illustrates a block diagram of a mobile communications device.
FIG. 3 illustrates the steps of an exemplary method within the technology.
FIG. 4 illustrates the steps of an exemplary method within the technology.
FIG. 5 illustrates a front view of a mobile communications device to which example implementations of the technology can be applied.
FIG. 6 illustrates a rear view of a mobile communications device to which example implementations of the technology can be applied.
FIG. 7 illustrates an implementation of a front view of a mobile communications device with a display displaying device options.
FIG. 8 illustrates a first alternative implementation of a mobile communications device display displaying alternative display options.
FIG. 9 illustrates a second alternative implementation of a mobile communications device display displaying alternative display options.
FIG. 10 illustrates a mobile communications device display displaying an exemplary notification within the technology.
DETAILED DESCRIPTIONReference will now be made in detail to implementations of the technology. Each example is provided by way of explanation of the technology only, not as a limitation of the technology. It will be apparent to those skilled in the art that various modifications and variations can be made in the present technology. For instance, features described as part of one implementation of the technology can be used on another implementation to yield a still further implementation. Thus, it is intended that the present technology cover such modifications and variations that come within the scope of the technology.
In order to facilitate an understanding of environments in which example implementations described herein can operate, reference is made toFIG. 1, which shows, in block diagram form, acommunication system100 in which implementations of the technology can be applied. Thecommunication system100 may comprise a number ofmobile communications devices103 that may be connected to the remainder ofsystem100 in any of several different ways. Accordingly, several instances ofmobile communications devices103 are depicted inFIG. 1 employing different example ways of connecting tosystem100.
These figures are exemplary only, and those persons skilled in the art will appreciate that additional elements and modifications may be necessary to make the communications device, e.g.,103 operable in particular network environments. While in the illustrated implementations, the communication devices, e.g.,103 may comprise smart phones, in other implementations, the communications devices may comprise personal digital assistants (PDA), tablet computers, laptop computers, desktop computers, servers, or other communications devices capable of sending and receiving electronic messages.
Mobile communications devices103 are connected to awireless network101 that may comprise one or more of a Wireless Wide Area Network (WWAN)102 and a Wireless Local Area Network (WLAN)104 or other suitable network arrangements. In some implementations, themobile communications devices103 are configured to communicate over both the WWAN102 and WLAN104, and to roam between these networks. In some implementations, thewireless network101 may comprise multiple WWANs102 andWLANs104.
The WWAN102 may be implemented as any suitable wireless access network technology. By way of example, but not limitation, the WWAN102 may be implemented as a wireless network that includes a number oftransceiver base stations108 where each of thebase stations108 provides wireless Radio Frequency (RF) coverage to a corresponding area or cell. The WWAN102 is typically operated by a mobile network service provider that provides subscription packages to users of themobile communications devices103. In some implementations, the WWAN102 conforms to one or more of the following wireless network types: Mobitex Radio Network, DataTAC, GSM (Global System for Mobile Communication), GPRS (General Packet Radio System), TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access), CDPD (Cellular Digital Packet Data), iDEN (integrated Digital Enhanced Network), EvDO (Evolution-Data Optimized) CDMA2000, EDGE (Enhanced Data rates for GSM Evolution), UMTS (Universal Mobile Telecommunication Systems), HSPDA (High-Speed Downlink Packet Access), IEEE 802.16e (also referred to as Worldwide Interoperability for Microwave Access or “WiMAX”), or various other networks. Although WWAN102 is described as a “Wide-Area” network, that term is intended herein also to incorporate wireless Metropolitan Area Networks (WMAN) and other similar technologies for providing coordinated service wirelessly over an area larger than that covered by typical WLANs.
The WWAN102 may further comprise awireless network gateway110 that connects themobile communications devices103 totransport facilities112, and through thetransport facilities112 to awireless connector system120. Transport facilities may include one or more private networks or lines, the Internet, a virtual private network, or any other suitable network. Thewireless connector system120 may be operated, for example, by an organization or enterprise such as a corporation, university, or governmental department, which allows access to anetwork124 such as an internal or enterprise network (e.g., an intranet), and its resources, or thewireless connector system120 may be operated by a mobile network provider. In some implementations, thenetwork124 may be realized using the Internet rather than, or in addition to, an internal or enterprise network.
Thewireless network gateway110 provides an interface between thewireless connector system120 and the WWAN102, which facilitates communication between themobile communications devices103 and other devices (not shown) connected, directly or indirectly, to the WWAN102. Accordingly, communications sent via themobile communications devices103 are transported via the WWAN102 and thewireless network gateway110 throughtransport facilities112 to thewireless connector system120. Communications sent from thewireless connector system120 are received by thewireless network gateway110 and transported via the WWAN102 to themobile communications devices103.
The WLAN104 comprises a wireless network that, in some implementations, conforms to IEEE 802.11x standards (sometimes referred to as Wi-Fi TM) such as, for example, the IEEE 802.11a, 802.11b and/or 802.11g standard. Other communication protocols may be used for the WLAN104 in other implementations such as, for example, IEEE 802.11n, IEEE 802.16e (also referred to as Worldwide Interoperability for Microwave Access or “WiMAX”), or IEEE 802.20 (also referred to as Mobile Wireless Broadband Access). TheWLAN104 includes one or more wireless RF Access Points (AP)114 (one of which is shown inFIG. 1) that collectively provide a WLAN coverage area.
The WLAN104 may be a personal network of the user, an enterprise network, or a hotspot offered by an internet service provider (ISP), a mobile network provider, or a property owner in a public or semi-public area, for example. Theaccess points114 are connected to an access point (AP)interface116 that may connect to thewireless connector system120 directly, (for example, if theaccess point114 is part of an enterprise WLAN104 in which thewireless connector system120 resides), or indirectly, as indicated by the dashed line inFIG. 1, via thetransport facilities112 if theaccess point114 is a personal Wi-Fi network or Wi-Fi hotspot (in which case a mechanism for securely connecting to thewireless connector system120, such as a virtual private network (VPN), may be used). TheAP interface116 provides translation and routing services between theaccess points114 and thewireless connector system120 to facilitate communication, directly or indirectly, with thewireless connector system120.
Thewireless connector system120 may be implemented as one or more servers, and is typically located behind afirewall113. Thewireless connector system120 manages communications, including email, Hypertext Transfer Protocol (HTTP), and HTTP Secure (HTTPS) communications to and from a set of managedmobile communications devices103. Thewireless connector system120 also provides administrative control and management capabilities over users andmobile communications devices103 that might connect to thewireless connector system120.
Thewireless connector system120 allows themobile communications devices103 to access thenetwork124 and connected resources and services such as a messaging server132 (for example, a Microsoft Exchange Server®, IBM Lotus Domino®, or Novell GroupWise™ email server), acontent server134 for providing content such as Internet content or content from an organization's internal servers,application servers136 for implementing server-based applications such as instant messaging (IM) applications tomobile communications devices103, and intranet file services.
Thewireless connector system120 typically provides a secure exchange of data (e.g., email messages, personal information manager (PIM) data, and IM data) with themobile communications devices103. In some implementations, communications between thewireless connector system120 and themobile communications devices103 are encrypted. In some implementations, communications are encrypted using a symmetric encryption key implemented using Advanced Encryption Standard (AES) or Triple Data Encryption Standard (Triple DES) encryption. Private encryption keys are generated in a secure, two-way authenticated environment and are used for both encryption and decryption of data. In some implementations, the private encryption key is stored only in the user's mailbox on themessaging server132 and on themobile communications device103, and can typically be regenerated by the user onmobile communications devices103. Data sent to themobile communications devices103 is encrypted by thewireless connector system120 using the private encryption key retrieved from the user's mailbox. The encrypted data, when received on themobile communications devices103, is decrypted using the private encryption key stored in memory. Similarly, data sent to thewireless connector system120 from themobile communications devices103 is encrypted using the private encryption key stored in the memory of themobile communications device103. The encrypted data, when received on thewireless connector system120, is decrypted using the private encryption key retrieved from the user's mailbox.
Thewireless network gateway110 is adapted to send data packets received from themobile communications device103 over theWWAN102 to thewireless connector system120. Thewireless connector system120 then sends the data packets to the appropriate connection point such as themessaging server132 orcontent servers134 orapplication server136. Conversely, thewireless connector system120 sends data packets received, for example, from themessaging server132 orcontent servers134 orapplication servers136 to thewireless network gateway110 that then transmit the data packets to the destinationmobile communications device103. The AP interfaces116 of theWLAN104 provide similar sending functions between themobile communications device103, thewireless connector system120 and network connection point such as themessaging server132,content server134 andapplication server136.
Thenetwork124 may comprise a private local area network, metropolitan area network, wide area network, the public Internet or combinations thereof and may include virtual networks constructed using any of these, alone, or in combination. Amobile communications device103 may alternatively connect to thewireless connector system120 using acomputer117, such as desktop or notebook computer, via thenetwork124. Alink106 may be provided for exchanging information between themobile communications device103 and acomputer117 connected to thewireless connector system120. Thelink106 may comprise one or both of a physical interface and short-range wireless communication interface. The physical interface may comprise one or combinations of an Ethernet connection, Universal Serial Bus (USB) connection, Firewire™ (also known as an IEEE 1394 interface) connection, or other serial data connection, via respective ports or interfaces of themobile communications device103 andcomputer117. The short-range wireless communication interface may be a personal area network (PAN) interface. A Personal Area Network is a wireless point-to-point connection meaning no physical cables are used to connect the two end points. The short-range wireless communication interface may comprise one or a combination of an infrared (IR) connection such as an Infrared Data Association (IrDA) connection, a short-range radio frequency (RF) connection such as one specified by IEEE 802.15.1 or the BLUETOOTH special interest group, or IEEE 802.15.3a, also referred to as UltraWideband (UWB), or other PAN connection.
It will be appreciated that the above-described communication system is provided for the purpose of illustration only, and that the above-described communication system comprises one possible communication network configuration of a multitude of possible configurations for use with themobile communications devices103. Suitable variations of the communication system will be understood to a person of skill in the art and are intended to fall within the scope of the present disclosure.
As will be appreciated fromFIG. 5, an exemplary mobile communications device500 (as an example of103) comprises adisplay222 located above akeyboard232 constituting a user input means that is suitable for accommodating textual input to thedevice500. In some implementations, thekeyboard232 can be part of a touch screen display522. Thefront face570 of thedevice500 has anavigation row580. As shown, thedevice500 is of uni-body construction, also known as a “candy-bar” design.
Thedevice500 may include an auxiliary input that acts as acursor navigation tool527 and that may be also exteriorly located upon thefront face570 of thedevice500. The front face location of acursor navigation tool527 allows the tool to be thumb-actuable, e.g., like the keys of thekeyboard232. Some implementations of the technology provide thenavigation tool527 in the form of a trackball (not shown) that may be utilized to instruct two-dimensional screen cursor movement in substantially any direction, as well as act as an actuator when the trackball is depressed like a button. Other implementations can provide the navigation tool in the form of a trackpad, a touchpad, a pointing stick, joystick, graphics tablet, or combinations thereof. The placement of thenavigation tool527 can be above thekeyboard232 and below thedisplay222; here, it may avoid interference during keyboarding and does not block the operator's view of thedisplay222 during use.
Thedevice500 may be configured to send and receive messages. Thedevice500 includes abody571 that can, in some implementations, be configured to be held in one hand by an operator of thedevice500 during text entry. Adisplay222 is included that is located on afront face570 of thebody571 and upon which information is displayed to the operator, e.g., during text entry. Thedevice500 may also be configured to send and receive voice communications such as mobile telephone calls. Thedevice500 also can include acamera221 to allow thedevice500 to take electronic photographs that can be referred to as photos or pictures or image data. Thedevice500 can include anaudio recorder223 that can be incorporated into amicrophone236 or can be separated from amicrophone236. Further, thedevice500 can be configured to operate a web browser.
Thedevice500 may further contain a sensor, e.g., proximity sensor, behind a cover mounted in an aperture defined inbody571. In devices where substantially all thefront face570 of the device is a touch screen, a portion of the touch screen can constitute the cover.
Referring toFIG. 2, a block diagram of a communications device, such as500 and103, in accordance with an exemplary implementation is illustrated. As shown, thedevice500 includes aprocessor238 that controls the operation of thecommunications device500. Acommunication subsystem211 performs communication transmission and reception with thewireless network219. Themicroprocessor238 further can be communicatively coupled with an auxiliary input/output (I/O)subsystem228. In at least one implementation, theprocessor238 can be communicatively coupled to a serial port (for example, a Universal Serial Bus port)230 that can allow for communication with other devices or systems via theserial port230. Adisplay222 can be communicatively coupled toprocessor238 to allow for display of information to an operator of thecommunications device500. When thecommunications device500 is equipped with akeyboard232, the keyboard can also be communicatively coupled with theprocessor238. Thecommunications device500 can include aspeaker234, amicrophone236, random access memory (RAM)226, andflash memory224, all of which may be communicatively coupled to theprocessor238. Other similar components may be provided on thecommunications device500 as well and optionally communicatively coupled to theprocessor238.Other communication subsystems240 andother device subsystems242 are generally indicated as being functionally connected with theprocessor238 as well. An example of acommunication subsystem240 is a short range communication system such as BLUETOOTH® communication module or a WI-FI® communication module (a communication module in compliance with IEEE 802.11b) and associated circuits and components. Examples ofother device subsystem242 include a sensor and implementations of the present technology.
Additionally, theprocessor238 is able to perform operating system functions and enables execution of programs on thecommunications device500. In some implementations not all of the above components are included in thecommunications device500. For example, in at least one implementation, thekeyboard232 is not provided as a separate component and is instead integrated with a touch screen as described below.
The auxiliary I/O subsystem228 can take the form of a variety of different navigation tools (multi-directional or single-directional) such as atrackball navigation tool521, as illustrated in the exemplary implementation shown inFIG. 5, or a thumbwheel, a navigation pad, a joystick, touch-sensitive interface, or other I/O interface. These navigation tools may be located on the front surface of thecommunications device500 or may be located on any exterior surface of thecommunications device500. Other auxiliary I/O subsystems may include external display devices and externally connected keyboards (not shown). While the above examples have been provided in relation to the auxiliary I/O subsystem228, other subsystems capable of providing input or receiving output from thecommunications device500 are considered within the scope of this disclosure. Additionally, other keys may be placed along the side of thecommunications device500 to function as escape keys, volume control keys, scrolling keys, power switches, or user programmable keys, and may likewise be programmed accordingly.
Thekeyboard232 can include a plurality of keys that can be of a physical nature such as actuable buttons, or the actuable buttons can be of a software nature, typically constituted by representations of physical keys on a display222 (referred to herein as “virtual keys”). It is also contemplated that the user input can be provided as a combination of the two types of keys. Each key of the plurality of keys is associated with at least one action that can be the input of a character, a command or a function. In this context, “characters” are contemplated to exemplarily include alphabetic letters, language symbols, numbers, punctuation, insignias, icons, pictures, and even a blank space.
In the case of virtual keys, the indicia for the respective keys are shown on thedisplay222, which in one implementation is enabled by touching thedisplay222, for example, with a stylus, finger, finger tip, finger nail, or other pointer, to generate the character or activate the indicated command or function. Some examples ofdisplays222 capable of detecting a touch include resistive, capacitive, projected capacitive, infrared and surface acoustic wave (SAW) touch screens.
Physical and virtual keys can be combined in many different ways as appreciated by those skilled in the art. In one implementation, physical and virtual keys are combined such that the plurality of enabled keys for a particular program or feature of thecommunications device500 is shown on thedisplay222 in the same configuration as the physical keys. Using this configuration, the operator can select the appropriate physical key corresponding to what is shown on thedisplay222. Thus, the desired character, command or function is obtained by depressing the physical key corresponding to the character, command or function displayed at a corresponding position on thedisplay222, rather than touching thedisplay222.
Furthermore, thecommunications device500 is equipped with components to enable operation of various programs, as shown inFIG. 2. In an exemplary implementation, theflash memory224 is enabled to provide a storage location for theoperating system257,device programs258, and data. Theoperating system257 is generally configured to manageother programs258 that are also stored inmemory224 and executable on theprocessor238. Theoperating system257 honors requests for services made byprograms258 through predefined program interfaces. More specifically, theoperating system257 typically determines the order in whichmultiple programs258 are executed on theprocessor238 and the execution time allotted for eachprogram258, manages the sharing ofmemory224 amongmultiple programs258, handles input and output to and fromother device subsystems242, and so on. In addition, operators typically can interact directly with theoperating system257 through a user interface usually including thekeyboard232 anddisplay222. While in an exemplary implementation theoperating system257 is stored inflash memory224, theoperating system257 in other implementations is stored in read-only memory (ROM) or similar storage element (not shown). As those skilled in the art will appreciate, theoperating system257,device program258, or parts thereof, may be loaded inRAM226 or other volatile memory.
In some implementations, theflash memory224 may containprograms258 for execution on thedevice500, including—but not limited to—anaddress book252, a personal information manager (PIM)254, and adevice state250. Furthermore,programs258, such as social software, andother information256 including data can be segregated upon storage in theflash memory224 of thedevice500.
When thecommunications device500 is enabled for two-way communication within the wireless communication network219 (e.g.,108), it can send and receive signals from a mobile communication service. Examples of communication systems enabled for two-way communication include, but are not limited to, the General Packet Radio Service (GPRS) network, the Universal Mobile Telecommunication Service (UMTS) network, the Enhanced Data for Global Evolution (EDGE) network, the Code Division Multiple Access (CDMA) network, High-Speed Packet Access (HSPA) networks, Universal Mobile Telecommunication Service Time Division Duplexing (UMTS-T9), Ultra Mobile Broadband (UMB) networks, Worldwide Interoperability for Microwave Access (WiMAX), and other networks that can be used for data and voice, or just data or voice. For the systems listed above, thecommunications device500 may use a unique identifier to enable thecommunications device500 to transmit and receive signals from thecommunication network219. Other systems may not use such identifying information. GPRS, UMTS, and EDGE use a Subscriber Identity Module (SIM) in order to allow communication with thecommunication network219. Likewise, most CDMA systems use a Removable User Identity Module (RUIM) in order to communicate with the CDMA network. The RUIM and SIM card can be used in multipledifferent communications devices500. Acommunications device500 can be configured to operate some features without a SIM/RUIM card, but a communications device will not necessarily be able to communicate with thenetwork219. A SIM/RUIM interface244 located within thecommunications device500 allows for removal or insertion of a SIM/RUIM card (not shown). The SIM/RUIM card features memory and holdskey configurations251, andother information253 such as identification and subscriber related information. With a properly enabledcommunications device500, two-way communication between thecommunications device500 andcommunication network219 is possible.
If thecommunications device500 is enabled as described above or thecommunication network219 does not use such enablement, the two-way communication enabledcommunications device500 is able to both transmit and receive information from thecommunication network219. The transfer of communication can be from thecommunications device500 or to thecommunications device500. In order to communicate with thecommunication network219, thedevice500 can be equipped with an integral orinternal antenna218 for transmitting signals to thecommunication network219. Likewise thedevice500 can be equipped with anotherantenna216 for receiving communication from thecommunication network219. These antennae (216,218) in another exemplary implementation are combined into a single antenna (not shown). As one skilled in the art would appreciate, the antenna or antennae (216,218) in another implementation can be externally mounted on thecommunications device500.
When equipped for two-way communication, thecommunications device500 features acommunication subsystem211. As is understood in the art, acommunication subsystem211 is modified so that a communication subsystem can support the operational needs of acommunications device500. Thesubsystem211 includes atransmitter214 andreceiver212 including the associated antenna or antennae (216,218) as described above, local oscillators (LOs)213, and a processing module that in the presently described exemplary implementation is a digital signal processor (DSP)220.
It is contemplated that communication by thecommunications device500 with thewireless network219 can be any type of communication that both thewireless network219 andcommunications device500 are enabled to transmit, receive and process. In general, these can be classified as voice or data, or both voice and data. Voice communication generally refers to communication in which signals for audible sounds are transmitted by thecommunications device500 through thecommunication network219. Data generally refers to all other types of communication that thecommunications device500 is capable of performing within the constraints of thewireless network219.
Example device programs that can depend on such data include email, contacts and calendars. For each such program, synchronization with home-based versions of the program can be desirable for either or both of the long term utility of device programs and the short term utility of device programs. As an example, emails are often time-sensitive, so substantially real time (or near-real time) synchronization may be desired. Contacts, on the other hand, can be usually updated less frequently without inconvenience. Therefore, the utility of thecommunications device500 is enhanced when connectable within a communication system, and when connectable on a wireless basis in anetwork219 in which voice, text messaging, and other data transfer are accommodated.Device500 can include programs such as a web browser, a file browser, and client programs for interacting with server programs. Devices, e.g.,103,500, for use in the technology can be characterized by an identification number assigned to the device. Such identification numbers cannot be changed and are locked to each device.
Implementations of the technology can be realized as including programming on a mobile communications device, e.g.,103. In some implementations, programming for the technology is on themobile communications device103, while data used by themobile communications device103 is on thewireless connector system120 or a network server such ascontent server134,messaging server132, orapplication server136. In some implementations, programming for the technology can be realized on a remote server. Allocation of functionality among architectural elements can be a function of several factors including latency, processing resource availability and efficient usage, storage availability and efficient usage, and revenue opportunities.
In at least one implementation of the technology, in order to protect against unauthorized use, a mobile communications device can be locked such that a password or text must be entered via akeyboard232 before device applications are enabled. A lockeddevice500 can be described as being in a locked mode. Situations can arise however, where it may be advantageous for certain device applications to be enabled even when a mobile communications device is in a locked mode. One example is the situation in which a user desires to use thecamera221 of thedevice500 without having to enter a password. A situation in which a user desires to use thecamera221 of thedevice500 without entering a password could occur, for example, when, during the time it would take to enter a password, the opportunity to take a photograph of a subject might pass. For example, a user who otherwise had not planned to take a photograph might observe a subject and desire to take a photograph quickly.
In some implementations of the technology, a mobile communications device comprises a locked function usage accumulator. The locked function usage accumulator comprises a current value and a predetermined limit. As examples, the predetermined limit may correspond to a number of photographs or a number of images. In this example, the locked function usage accumulator keeps track of the number of acquired images or stored images as the current value and the number of acquired images or stored images is compared to the predetermined limit. The current value can be compared to predetermined limit. If the current value is less than the predetermined limit, then the locked function, such as acquisition of image data or taking a photograph, can be performed using the camera.
In some implementations of the technology, the locked function usage accumulator comprises a current value and a predetermined limit. The predetermined limit may correspond to an amount of image data acquired or an amount of image data stored. In these implementations the locked function usage accumulator keeps track of the amount of image data acquired by thedevice500 or the amount of image data stored by thedevice500 as the current value, and the amount of image data acquired or the amount of image data stored is compared to the predetermined limit. If the current value is less than the predetermined limit, then the locked function, in this example, acquisition of image data or taking a photograph, can be performed using thecamera221.
FIG. 3 illustrates the steps in a method within this technology that can implement the example described in the preceding paragraph. Amobile communications device500 is configured to maintain a lockedfunction accumulator302. The mobile communications device receives input to perform a lockedfunction304. As examples, the input to perform a locked function may be the depression of a certain button on thedevice500, for example a camera button, or the touching of a certain area on atouch screen display222. The current value of the locked function usage accumulator is compared to the predetermined limit. If the current value of the locked function usage accumulator is less than the predetermined limit the locked function, for example the taking of a photograph, is performed.
Themobile communications device500 within this technology can increment the current value when a locked function occurs or is performed by thedevice500. Thus, for example, adevice500 can allow five photographs to be acquired while thedevice500 is in a locked mode. The predetermined limit will therefore be understood to be five photographs or images. The current value is initially set to zero. Each time an image is acquired, the current value of the locked function usage accumulator is incremented by one. Each time thedevice500 receives an input to perform a locked function, the current value (number of photographs taken), is compared to the predetermined limit of five photographs. Thus, when five photographs have been taken, the current value and the predetermined limit are equal. Thus, thedevice500 will not perform the locked function because the current value comprised by the locked function usage accumulator is not less than the predetermined limit.
FIG. 4 illustrates the steps in a method within this technology that can implement the example described in the preceding paragraph. Amobile communications device500 is configured to maintain a lockedfunction accumulator302. The mobile communications device receives input to perform a lockedfunction304. The input to perform a locked function can be e.g., the depression of a certain button on thedevice500, for example a camera button, or the touching of a certain area on atouch screen display222. The current value of the locked function usage accumulator is compared to thepredetermined limit306. If the current value of the locked function usage accumulator is less than the predetermined limit the locked function, for example the taking of a photograph, is performed308. In the method shown inFIG. 4, when a locked function, such as the acquisition of image data, is performed, the current value comprised by the locked function usage accumulator is incremented410.
Within this technology, a predetermined limit can be a number of stored or acquired images, as described above, or a predetermined limit can be an amount of image data acquired or an amount of image data stored. A predetermined limit can be a percentage of available memory allocated for image data. A predetermined limit can also be a number of sound or audio recordings acquired or a number or sound or audio recordings stored. Acquired sound or audio recordings can be stored locally on thedevice500 or externally to thedevice500, on anapplication server136 or on acomputer117, for example. A predetermined limit can further be an amount of sound or audio data. All examples listed in this description are non-limiting and do not exclude the implementation of the technology using other data types.
FIG. 5 illustrates a front view of amobile communications device500 in an unlocked mode. Thedevice500 may be configured to receive a signal to acquire image data via acamera222 upon selection or depression of predefined keys in the keyboard532, upon selection or depression of one of the keys or buttons in anavigation row580 or upon actuation or depression of acursor navigation tool527. Thedevice500 comprises amicrophone236 that can be configured to cooperate with anaudio recorder223 to acquire sound data.
FIG. 6 illustrates a back view of amobile communications device500 comprising aflash605 andside buttons601. A mobile communications device can be configured so as to receive a signal, to acquire image data, or take a photograph, upon the depression or the selection of one or more of theside buttons601.
FIG. 7 illustrates a lockedmobile communications device500 within this technology. Thedevice500 inFIG. 7 can be said to be in a locked mode. Thedisplay222 of thedevice500 shows a device locked menu. The device lockedmenu701 comprises three selectable options: unlock, emergency call, and cancel. If unlock is selected, thedisplay222 will display an input screen to accept entry of a predetermined password. If emergency call is selected, thedisplay222 will display an input screen to accept allow confirmation that an emergency call is to be placed. If an emergency call is confirmed as desired, an emergency call will be placed according to preconfigured settings and programming of thedevice500. As described above, amobile communications device500 can be configured to receive input to perform a lockedfunction304, such as taking a photograph. A mobile communications device can be configured so as to receive a signal, to acquire image data, or take a photograph, upon the depression or the selection of one or more of theside buttons601. The lockeddevice500 may be configured to receive a signal to acquire image data via acamera222 upon selection or depression of predefined keys in the keyboard532, upon selection or depression of one of the keys or buttons in anavigation row580 or upon actuation or depression of acursor navigation tool527.
FIG. 8 illustrates an exemplary implementation of adisplay222 portion of amobile communications device500 that is in a locked mode. In the implementation illustrated inFIG. 8, alock menu701 is displayed on thedisplay222. The device lockedmenu701 comprises four selectable options: unlock, camera, emergency call, and cancel. Selection of the camera option can comprise the inputting of a request to acquire image data or take a photograph.
FIG. 9 illustrates an exemplary implementation of adisplay222 portion of amobile communications device500 that is in a locked mode. Thedisplay222 provides an unlock control menu listing two options: device and camera. If device is selected, a list of selectable locked functions within this technology can be presented. Alternatively, and depending on the manner in which themobile communications device500 is configured according to the technology, if device is selected, the performance of a predefined locked function, such as acquisition of sound data via amicrophone236 or anaudio recorder223 or amicrophone236 and anaudio recorder223 can be implemented according to the technology.
FIG. 10 illustrates anexemplary display222 of amobile communications device500 that displays an example of a lockedfunction usage message1001. Thedevice500 can be configured within this technology to present a message to an authorized user that a locked function has been used or enabled. In the implementation shown inFIG. 10, thedisplay222 presents information regarding where data acquired during a locked mode of thedevice500, has been stored.
Thedevice500 can further be configured to display the amount of locked device usage remaining. For example thedisplay222 can be configured to present the number of photographs which may still be acquired while in the locked mode. Thedisplay222 can be configured to display the amount of time remaining in which a locked function may be performed.
Within the technology, amobile communications device500 can be configured to limit the amount of time in which one or more locked functions can be performed. This can be implemented by maintaining a time calculator for determining the amount of time that has elapsed after a specified event. An example of a specified event within this technology is a specified performance of locked function. An example of a specified performance of a locked function is a first performance of a locked function. An example of first performance of a locked function within the technology could be the first time image data is acquired since the last time thedevice500 was unlocked via a password.
In further implementations of the technology, amobile communications device500 can be configured to maintain a locked usage accumulator and time calculator for determining an amount of lapsed time such that usage of one or more locked functions can be limited to both a predetermined limit of usage and a predetermined amount of time.
To limit usage of one or more locked functions according to both amount of locked device usage and an amount of time, whether the limit is acquisition of a predetermined number of photo images, a predetermined amount of image data acquired or stored, a predetermined number of sound recordings, or a predetermined amount of sound data acquired or stored, or some other limit, amobile communications device500 can be configured to maintain a locked function usage accumulator, while also maintain in a time calculator. The locked function usage accumulator can comprise a current value and a predetermined limit. Adevice500 can be configured to receive input to perform a locked function, such as the depression of a predetermined button or selection of a predetermined menu option, compare the accumulator current value to the predetermined limit and perform the locked function when the accumulator is less than the predetermined limit. As described above, amobile communications device500 can be further configured to increment the accumulator current value upon performing the locked function and to maintain a time calculator for determining an amount of elapsed time. Thedevice500 can be further configured to lock themobile communications device500 after a predetermined amount of time has elapsed since a specified event.
Within the technology, amobile communications device500 can be configured or programmed send an email notification via anetwork124 to an authorized user's email address notifying him or her that a locked function, such as the acquisition of image data via adevice camera221, has occurred. In a further implementation of the technology, adevice500 may be configured to display amessage1001 on thedevice display221 regarding the performance of one or more locked functions. An example of the presentation of such a message is depicted inFIG. 10.
The technology can take the forms of hardware, or both hardware and software elements. In some implementations, the technology is implemented in software, which includes but is not limited to firmware, resident software, microcode, a Field Programmable Gate Array (FPGA) or Application-Specific Integrated Circuit (ASIC), etc. In particular, for real-time or near real-time use, an FPGA or ASIC implementation is desirable.
Furthermore, the present technology can take the form of a computer program product comprising program modules accessible from computer-usable or computer-readable medium storing program code for use by or in connection with one or more computers, processors, or instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, ordevice500. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device500) or a propagation medium (though propagation mediums as signal carriers per se are not included in the definition of physical computer-readable medium). Examples of a physical computer-readable medium include a semiconductor or solid state memory, removable memory connected via USB, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W), DVD, and Blu Ray™. Both processors and program code for implementing each as aspect of the technology can be centralized or distributed (or a combination thereof).
Furthermore, the present technology can take the form of a computer program product comprising program modules accessible from computer-usable or computer-readable medium storing program code for use by or in connection with one or more computers, processors, or instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, ordevice500. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device500) or a propagation medium (though propagation mediums as signal carriers per se are not included in the definition of physical computer-readable medium). Examples of a physical computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD. Both processors and program code for implementing each as aspect of the technology can be centralized or distributed (or a combination thereof).
A data processing system suitable for storing a computer program product of the present technology and for executing the program code of the computer program product will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories that provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters can also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem, WiFi, and Ethernet cards are just a few of the currently available types of network adapters. Such systems can be centralized or distributed, e.g., in peer-to-peer and client/server configurations. In some implementations, the data processing system is implemented using one or both of FPGAs and ASICs.