Creating notes on lock screen

ABSTRACT

Creating a note on a lock screen may be provided. In some examples, an application, such as a communication application, may detect an input to generate a note on a lock screen. The communication application may provide a note interface to capture the note. Next, the note may be captured on the note interface. In response, the note may be saved at a first storage location. The first storage location may be isolated by an operating system of the computing device to prevent an execution of a malicious code.

BACKGROUND

Mobile devices, such as cell phones and handheld game consoles, includetouch screens. Mobile devices accept an input by detecting movements,known as touch gestures, of objects in contact with the touch screen.Upon detection of a touch gesture the mobile device, or an applicationstored on the mobile device, may execute an action. Some mobile devicesmay include a lock screen to prevent unauthorized or unintentionalaccess to the mobile device. The lock screen may regulate access to themobile device by requiring performance of an action in order to receiveaccess to the mobile device. Once the device is unlocked, a user canexecute a functionality associated with the mobile device.

In examples, the user may wish to capture an idea quickly. To do so, theuser may create sticky notes and/or start a draft communication.However, if the user is unable to access the functionality of the mobiledevice, the user may be unable to record the idea.

SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This summary is not intended to exclusively identify keyfeatures or essential features of the claimed subject matter, nor is itintended as an aid in determining the scope of the claimed subjectmatter.

Embodiments are directed to creating a note on a lock screen. In someexamples, an application, such as a communication application, maydetect an input to generate a note on a lock screen. The communicationapplication may provide a note interface to capture the note. Next, thenote may be captured on the note interface. In response, the note may besaved at a first storage location. The first storage location may beisolated by an operating system of the computing device to prevent anexecution of a malicious code.

These and other features and advantages will be apparent from a readingof the following detailed description and a review of the associateddrawings. It is to be understood that both the foregoing generaldescription and the following detailed description are explanatory anddo restrict aspects as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a conceptual diagram illustrating an example computingenvironment for creating a note on a lock screen, according toembodiments;

FIG. 2 is a conceptual diagram illustrating an example lock screencapable of capturing a note, according to embodiments;

FIG. 3A is a display diagram illustrating a method to create a textualnote on an example note interface, according to embodiments;

FIG. 3B is a display diagram illustrating a method to create a graphicalnote on an example note interface, according to embodiments;

FIG. 4 is a display diagram illustrating a method to transmit a note ona lock screen, according to embodiments;

FIG. 5 is a simplified networked environment, where a system accordingto embodiments may be implemented;

FIG. 6 is a block diagram of an example computing device, which may beused for creating a note on a lock screen, according to embodiments; and

FIG. 7 is a logic flow diagram illustrating a process for creating anote on a lock screen, according to embodiments.

DETAILED DESCRIPTION

As briefly described above, creating a note on a lock screen may beprovided. In some examples, an application, such as a communicationapplication, may detect an input to generate a note on a lock screen.The communication application may provide, on a display device, a noteinterface to capture the note. The note may be captured on the noteinterface. The note may be saved at a first storage location. The firststorage location may be isolated by an operating system of the computingdevice to prevent an execution of a malicious code.

The communication application may present information associated withthe note. The information may include a deadline and an attachment. Theinformation may be distinguished with a textual scheme, a graphicalscheme, an audio scheme, an animation scheme, a coloring scheme, ahighlighting scheme, and/or a shading scheme, among other schemes. Thecommunication application may parse the note to detect defaultattributes of the note. The default attributes may include a sourceparticipant and a subject matter associated with the note, among others.The communication application may receive a transmission input detectedon the lock screen to transmit the note to a second storage location.The second storage location may include a communications folder of thesource participant, an email address associated with a targetparticipant, and/or an online calendar invite associated with the targetparticipant, among others. The note may be transmitted to the secondstorage location.

In the following detailed description, references are made to theaccompanying drawings that form a part hereof, and in which are shown byway of illustrations, specific embodiments, or examples. These aspectsmay be combined, other aspects may be utilized, and structural changesmay be made without departing from the spirit or scope of the presentdisclosure. The following detailed description is therefore not to betaken in a limiting sense, and the scope of the present invention isdefined by the appended claims and their equivalents.

While some embodiments will be described in the general context ofprogram modules that execute in conjunction with an application programthat runs on an operating system on a personal computer, those skilledin the art will recognize that aspects may also be implemented incombination with other program modules.

Generally, program modules include routines, programs, components, datastructures, and other types of structures that perform particular tasksor implement particular abstract data types. Moreover, those skilled inthe art will appreciate that embodiments may be practiced with othercomputer system configurations, including hand-held devices,multiprocessor systems, microprocessor-based or programmable consumerelectronics, minicomputers, mainframe computers, and comparablecomputing devices. Embodiments may also be practiced in distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules may be located inboth local and remote memory storage devices.

Some embodiments may be implemented as a computer-implemented process(method), a computing system, or as an article of manufacture, such as acomputer program product or computer readable media. The computerprogram product may be a computer storage medium readable by a computersystem and encoding a computer program that comprises instructions forcausing a computer or computing system to perform example process(es).The computer-readable storage medium is a computer-readable memorydevice. The computer-readable storage medium can for example beimplemented via one or more of a volatile computer memory, anon-volatile memory, a hard drive, a flash drive, a floppy disk, or acompact disk, and comparable hardware media.

Throughout this specification, the term “platform” may be a combinationof software and hardware components for creating a note on a lockscreen. Examples of platforms include, but are not limited to, a hostedservice executed over a plurality of servers, an application executed ona single computing device, and comparable systems. The term “server”generally refers to a computing device executing one or more softwareprograms typically in a networked environment. More detail on thesetechnologies and example operations is provided below.

A computing device, as used herein, refers to a device comprising atleast a memory and one or more processors that includes a server, adesktop computer, a laptop computer, a tablet computer, a smart phone, avehicle mount computer, or a wearable computer. A memory may be aremovable or non-removable component of a computing device configured tostore one or more instructions to be executed by one or more processors.A processor may be a component of a computing device coupled to a memoryand configured to execute programs in conjunction with instructionsstored by the memory. Actions or operations described herein may beexecuted on a single processor, on multiple processors (in a singlemachine or distributed over multiple machines), or on one or more coresof a multi-core processor. An operating system is a system configured tomanage hardware and software components of a computing device thatprovides common services and applications. An integrated module is acomponent of an application or service that is integrated within theapplication or service such that the application or service isconfigured to execute the component. A computer-readable memory deviceis a physical computer-readable storage medium implemented via one ormore of a volatile computer memory, a non-volatile memory, a hard drive,a flash drive, a floppy disk, or a compact disk, and comparable hardwaremedia that includes instructions thereon to automatically save contentto a location. A user experience—a visual display associated with anapplication or service through which a user interacts with theapplication or service. A user action refers to an interaction between auser and a user experience of an application or a user experienceprovided by a service that includes one of touch input, gesture input,voice command, eye tracking, gyroscopic input, pen input, mouse input,and keyboards input. An application programming interface (API) may be aset of routines, protocols, and tools for an application or service thatallow the application or service to interact or communicate with one ormore other applications and services managed by separate entities.

While example implementations are described using notes herein,embodiments are not limited to notes. Creating a note on a lock screenmay be implemented in other environments, such as instant messages, datasharing, application sharing, online conferencing, and similarcommunications, where note data may be exchanged.

The technical advantages of creating a note on a lock screen mayinclude, among others, increased efficiency of participant interactionswith a computing device. Processing and network bandwidth may bereduced, as the participant may capture the note, save the note to alock screen, and subsequently transmit the note to another destination.Further, by decreasing a number of actions performed on the computingdevice, memory and processor burden may be reduced.

Embodiments address a need that arises from very large scale ofoperations created by networked computing and cloud based services thatcannot be managed by humans. The actions/operations described herein arenot a mere use of a computer, but address results of a system that is adirect consequence of software used as a service such as communicationservices offered in conjunction with the notes.

FIG. 1 is a conceptual diagram illustrating an example computingenvironment for creating a note on a lock screen, according toembodiments.

As shown in a diagram 100, a computing device 106 may execute acommunication application 108. The computing device 106 may include adisplay device, such as a touch enabled display component, and amonitor, among others, to provide the communication application 108 to aparticipant 105. The computing device 106 may include a desktopcomputer, a laptop computer, a tablet, a smart phone, and a wearablecomputer, among other similar computing devices, for example.

In some examples, the communication application 108 may be executed on acommunication server 102. The communication server 102 may include a webserver or a document server, among others. The computing device 106 maycommunicate with the communication server 102 through a network 104. Thenetwork 104 may provide wired or wireless communications between nodes,such as the computing device 106 or the communication server 102.

In other examples, the communication application 108 may be provided bya third party service, web applications, and/or a datacenter, amongothers. Local access to the communication application 108 may beprovided by locally installed rich clients (a local version of thecommunication application 108) or generic applications, such as abrowser on the computing device 106. The communication application 108executed on the communication server 102 represents a visual way to viewa note created by the participant 105.

The communication application 108 may detect an input on a lock screenof the computing device 106, from the participant 105, to generate anote. The lock screen may identify the computing device 106 as being ina state between a sleep state and a fully functional state. In examples,the lock screen is a user interface element used by an operating systemof the computing device 106. The lock screen may be used to regulate anaccess to the computing device 106 by requiring the participant 105 toperform an action in order to receive the access. The action may includean input of a password, the input of a button combination, and/or theinput of a gesture, among other actions. The communication application108 may be allowed to operate in a restricted access state outside ofthe lock screen.

The communication application 108 may provide the note interface 110 tocapture the note. The communication application 108 may capture the noteon the note interface 110. The communication application 108 may savethe note at a first storage location. The first storage location may beisolated by the operating system to prevent an execution of a maliciouscode.

The communication application 108 may present the note employing a gridof columns reflecting the state of a given note (e.g., drafted today,edited today, drafted yesterday, edited yesterday, etc.) and rowsrepresenting aggregations of summary notes. The notes may be representedby graphical objects, textual objects, or a combination of the graphicalobjects and the textual objects on the grid. The communicationapplication 108 may implement various graphical, textual, coloring,shading, and similar schemes to emphasize different aspects of thenotes, which may include statuses of the notes, information associatedwith the notes, attributes extracted from the notes, and weighted valuesassociated with the extracted attributes, among others.

In some examples, the notes and the information, the attributes, andweighted values associated with the attributes of the notes may bepresented on the note interface 110 of the coping device 106.Furthermore, conventional and intrinsic communication fields may be usedfor automatic placement of the notes into appropriate columns on thenote interface 110.

While the example system in FIG. 1 has been described with specificcomponents including the computing device 106, the communicationapplication 108, and the communication server 102, embodiments are notlimited to these components or system configurations and can beimplemented with other system configuration employing fewer oradditional components.

FIG. 2 is a conceptual diagram illustrating an example lock screencapable of capturing a note, according to embodiments.

In a diagram 200, a computing device 202 may execute a communicationapplication 204. The computing device 202 may provide the communicationapplication 204 to a participant. The communication application 204 maydetect an input action 208 to generate a note on a lock screen 206. Thelock screen 206 may identify the computing device 202 as being in astate between a sleep state and a fully functional state. Thecommunication application 204 may work around the lock screen 206without defeating access restrictions to the computing device 202.

In examples, the lock screen 206 is a user interface element used by anoperating system of the computing device 202. The lock screen 206 may beused to regulate an access to the computing device 202 by requiring theparticipant to perform an action in order to receive the access. Thecommunication application 204 may be allowed to operate in a restrictedaccess state outside of the lock screen 206.

In response to the detection of the input action 208, the communicationapplication 204 may detect another input action on the lock screen 206.The other input action may include a password entered on the lock screen206. In an alternative embodiment, the communication application 204 mayreceive a notification from the operating system that the attempt tounlock the lock screen 206 was successful. In response, thecommunication application 204 may unlock the lock screen 206. Once thecomputing device 202 is unlocked, the communication application 204 mayautomate further processing steps to save the note. The communicationapplication 204 may also sync the note to a server associated with thecomputing device 202 to enable other applications to access and/ormodify the note.

In other examples, in response to the detection of the input action 208,the communication application 204 may detect the other input action onthe lock screen 206. The other input action may include a passwordentered on the lock screen 206. In other examples, the communicationapplication 204 may receive another notification from the operatingsystem that the attempt to unlock the lock screen 206 was unsuccessful.The other notification may include an alert to inform the participantthat the lock screen 206 was not successfully unlocked. The alert mayinclude an audio alert, a visual alert, a tactile alert, and a textualalert, among others.

FIG. 3A is a display diagram illustrating a method to create a textualnote on an example note interface, according to embodiments.

In a diagram 300A, a computing device 302 may execute a communicationapplication. The communication application may include a renderingengine and a note modification engine, among other engines and/ormodules. The communication application may detect an input action togenerate a note on the lock screen. The input action may include a pressand hold action, a swipe action, a keyboard entry combination, ahovering action by a mouse input, a press and hold action and a hoveringaction by a pen input, a tap action, an accelerometer sensor basedinput, an orientation sensor based input, an optically captured gesture,and/or a time based input, among others.

In response to the detection of the input action, in some alternativeexamples, the communication application may detect another input actionon the lock screen. The other input action may include a passwordentered on the lock screen. The communication application may receive anotification from an operating system of the computing device 302 thatthe attempt to unlock the lock screen was successful. In response, thecommunication application may unlock the lock screen. The communicationapplication may provide a note interface 304 to capture the note.

The communication application may detect an insertion action 306executed on the note interface 304. In response to the detection of theinsertion action 306, the communication application may display akeyboard 310 to facilitate a capture of the note. The keyboard 310 maybe displayed in a location in proximity to the note interface 304. Inexamples, the location of the keyboard 310 may include above the noteinterface 304, below the note interface 304, to a left side of the noteinterface 304, and to a right side of the note interface 304.

Additionally, in response to the detection of the insertion action 306,the communication application may detect an entry 312 of characters onthe keyboard 310. The communication application may save the enteredcharacters in the note in response to a detection of an action 314executed on the keyboard 310 to indicate a completion of the note. Inresponse to capturing the note on the note interface 304, thecommunication application may save the note at a first storage location.The first storage location may be isolated by the operating system toprevent an execution of a malicious code.

In other examples, in response to the detection of the insertion action306, the communication application may display an audio element (notshown). The audio element may include operations to prompt theparticipant to input audio files into the note. In response to receivinga confirmation input to save the note, the communication application maysave the note at the first storage location.

In other examples, in response to the detection of the insertion action306, the communication application may display an audio element (notshown). The audio element may include operations to prompt theparticipant to input audio files into the note. The communicationapplication may transcribe the audio files into textual files using adictation algorithm, dictation software, and/or additional algorithmsand software. In response to receiving a confirmation input to save thenote, the communication application may save the note (e.g., the textualfiles) the first storage location.

In other examples, in response to the detection of the insertion action306, the communication application ray display a graphical element (notshown). The graphical element may include operations to prompt theparticipant to input graphical files into the note. In response toreceiving a confirmation input to save the note, the communicationapplication may save the note (e.g., the graphical files) at the firststorage location.

Additionally, in response to saving the note at the first storagelocation, the communication application may prompt the participant toenrich the note. Example inputs to enrich the note may include, amongothers, attaching a graphical file to the note, adding a reminder to thenote, tagging a person in the note, and adding a hashtag to the note,among others.

FIG. 3B is a display diagram illustrating a method to create a graphicalnote on an example note interface, according to embodiments.

In a diagram 300B, a computing device 302 may execute a communicationapplication. The computing device 302 may provide the communicationapplication to a participant. The communication application may detectan input action to generate a note on the lock screen. In response tothe detection of the input action, the communication application maydetect another input action on the lock screen. The other input actionmay include a password entered on the lock screen. In an alternativeembodiment, the communication application may receive a notificationfrom an operating system of the computing device 302 that the attempt tounlock the lock screen was successful. In response, the communicationapplication may unlock the lock screen. The communication applicationmay provide a note interface 304 to capture the note.

The communication application may display a screen 306 on the noteinterface 304 to capture the note. In other examples, the screen 306 maybe located in a proximity to the note interface 304. The communicationapplication may detect an input action 312 executed on a capture button310 on the note interface 304.

In response to the detection of the input action 312, the communicationapplication may utilize a camera of the computing device 302 to capturea graphical image, audio, and/or a video of objects present in thescreen 306. The communication application may save the graphical image,the audio, and/or the video as a note at a first storage location. Thefirst storage location may be isolated by the operating system toprevent an execution of a malicious code. In other examples, the notemay include stereoscopic displays, simulations, and sensory information.The note may further may include a virtual reality and/or an augmentedreality of the graphical image, the audio, and/or the video.

FIG. 4 is a display diagram illustrating a method to transmit a note ona lock screen, according to embodiments.

In a diagram 400, a computing device 402 may execute a communicationapplication 404. The communication application 404 may include arendering engine and a note modification engine, among other modules.The computing device 402 may provide the communication application 404to a participant. The communication application 404 may detect an inputaction to generate a note 408 on a lock screen 406. In response to thedetection of the input action, the communication application 404 maydetect another input action on the lock screen 406. The other inputaction may include a password entered on the lock screen 406. Thecommunication application 404 may, in some examples, receive anotification from an operating system of the computing device 402 thatthe attempt to unlock the lock screen 406 was successful. In response,the communication application 404 may unlock the lock screen 406. Then,the communication application 404 may provide a note interface tocapture the note 408. Once the computing device 402 is unlocked, thecommunication application 404 may automate further processing steps tosave the note 408. The communication application 404 may also sync thenote 408 to a server associated with the computing device 402 to enableother applications to access and/or modify the note 408.

The communication application 404 may display a screen 306 on the noteinterface 304 to capture the note. The communication application 404 maycapture the note 408 on the note interface and may save the note 408 ata first storage location. The first storage location may be isolated bythe operating system to prevent an execution of a malicious code.

In examples, the communication application 404 may present informationassociated with the note 408. The information may include a deadlineand/or an attachment, among other information. A task may be createdbased on the deadline, for example. The task may include a “remind toreview a day before the deadline,” “remind to review an hour before thedeadline,” or “remind to review ten minutes before the deadline,” amongother examples. The communication application 404 may detect an inputexecuted on the note 408 to silence the task, mark the task as complete,and/or edit the deadline associated with the task. The communicationapplication 404 may distinguish the information with a textual scheme, agraphical scheme, an audio scheme, an animation scheme, a coloringscheme, a highlighting scheme, and/or a shading scheme, among others.

In a system according to embodiments, application functionality mayremain enabled such that the participant may access and control the note408, the information, attributes extracted from the note 408, and thetasks associated with the note 408. In examples, the communicationapplication 404 may include controls 410 (graphical and/or textualcontrol elements) to allow the participant to perform actions on aselected note. The actions may include editing and copying the note 408,the information, the attributes, and the tasks. As updates andmodifications are made to the note 408, the information, the attributes,and the tasks, the updates may be transmitted to a communication datastore.

In other examples, the communication application 404 may parse the note408 to detect default attributes of the note 408. The default attributesmay include a source participant and/or a subject matter associated withthe note 408, among others. The communication application 404 mayreceive a transmission input 412 detected on the lock screen 406 totransmit the note 408 to a second storage location. The transmissioninput 412, in some examples, may be detected on the controls 410. Thesecond storage location may include a communications folder of thesource participant, an email address associated with a targetparticipant, and/or an online calendar invite associated with the targetparticipant, among others. In other examples, the second storagelocation may include a destination for a group (e.g. the sourceparticipant, the target participant, and another participant). The note408 may be transmitted to the second storage location.

In another example, the communication application 404 may parse the note408 to detect social networking attributes of the note 408. The socialnetworking attributes may include groups participated in by the sourceparticipant and/or organizations supported by the source participant,among others. The communication application 404 ma receive thetransmission input 412 detected on lock screen to transmit the note 408to the second storage location. The second storage location may includea social networking site associated with the source participant, forexample. The note 408 may be transmitted to the second storage location.

In a further example, the communication application 404 may parse thenote 408 to detect professional networking attributes of the note 408.The professional networking attributes may include a job title, aneducation, and/or work-related experience associated with the sourceparticipant, among others. The communication application 404 may receivethe transmission input 412 detected on the lock screen to transmit thenote 408 to the second storage location. The second storage location mayinclude a professional networking site associated with the sourceparticipant, for example. The note 408 may be transmitted to the secondstorage location.

In some examples, the parsed default attributes, the parsed socialnetworking attributes, and the parsed professional networking attributesassociated with the note 408 may be listed in a first status columnhierarchically distinguished from the sub-attributes in the same column.The first status column, the second status column, and the third statuscolumn may be determined based on a selection by the participant ofpredefined categories or by a participant definition for the categories.An automatic mapping may be performed to translate the attribute fieldsto the status columns.

In other examples, the mapping of the attributes from attribute fieldsto the columns in the note interface may occur through a predefined orparticipant-specific filter. The predefined or participant-specificfilter may include rules. A rule may indicate, “place attributes with adeadline this month in the first column.” An algorithm facilitating thetransformation may evaluate each attribute to determine the column theattribute fits in based on the filter (rule or combination of rules). Inresponse to the evaluation of the attributes, the communicationapplication 404 may move the attributes to the respective column.

The fields and values associated with the attributes may be displayedvisually on the note interface. In some examples, the attributes may bedisplayed using graphical objects and/or textual identification. Acoloring scheme or shading scheme may be employed to further identifythe sub-attributes. Some or all of the displayed elements on the noteinterface may be actionable. For example, the communication application404 may provide links to the controls 410 associated with settingparameters and/or modifying parameters of the attributes. In someexamples, the links may be associated with modifying view settings ofthe note 408 and/or the attributes on the note interface.

In other examples, the communication application 404 may parse the note408 to detect the professional networking attributes and the socialnetworking attributes of the note 408. The communication application 404may assign a first weighted value to the professional networkingattributes and may assign a second weighted value to the socialnetworking attributes. The communication application 404 may perform acomparison between the first weighted value and the second weightedvalue.

For example, the communication application 404 may assign a weightedvalue of one a source participant attribute associated with the note408, a weighted value of two to a subject matter attribute associatedwith the note 408, a weighted value of three to a priority attributeassociated with the note 408, a weighted value of four to a deadlineattribute associated with the note 408, a weighted value of live to ajob title attribute associated with the note 408, and a weighted valueof six to an organizational attribute supported by the sourceparticipant. In examples, the first weighted value may include thesource participant attribute and the job title attribute, totaling aweighted value of six. In another example, the second weighted value mayinclude the source participant attribute, the priority attribute, andthe organizational attribute supported by the source participanttotaling a weighted value of ten. In this example, the second weightedvalue is larger than the first weighted value, making the secondweighted value more significant than the first weighted value.

In an example, the communication application 404 may determine the firstweighted value as being larger than the second weighted value. Thecommunication application 404 may receive the transmission input 412detected on the lock screen to transmit the note 408 to the secondstorage location. The second storage location may include theprofessional networking site associated with the source participant. Thenote 408 may be transmitted to the second storage location.

In another example, the communication application 404 may determine thefirst weighted value as being less than the second weighted value. Thecommunication application 404 may receive the transmission input 412detected on the lock screen to transmit the note 408 to the secondstorage location. The second storage location may include the socialnetworking site associated with the source participant. The note 408 maybe transmitted to the second storage location.

In a further example, the communication application 404 may determinethe first weighted value as being equal to the second weighted value.The communication application 404 may receive the transmission input 412detected on the lock screen to transmit the note 408 to the secondstorage location. The second storage location may include the socialnetworking site associated with the source participant. The note 408 maybe transmitted to the second storage location. The communicationapplication 404 may receive another transmission input detected on thelock screen to transmit the note to a third storage location. The thirdstorage location may include the professional networking site associatedwith the source participant. The note 408 may also be transmitted to thethird storage location.

In another example, the communication application 404 may parse the note408 to detect the default attributes, the professional networkingattributes, and the social networking attributes of the note 408. Thecommunication application 404 may determine the first weighted valueassociated with the default attributes, the second weighted valueassociated with the professional networking attributes, and a thirdweighted value associated with the social networking attributes. Thecommunication application 404 may also order the default attributes, theprofessional networking attributes, and the social networking attributesbased on the first weighted value, the second weighted value, and thethird weighted value. The ordering may include an ascending order or adescending order, among others.

In a further example, the communication application 404 may detect acustomization input of the first weighted value, the second weightedvalue, and/or the third weighted value. Execution of the customizationinput may disorder the ordering of the first weighted value the secondweighted value, and the third weighted value. The communicationapplication 404 may re-order the default attributes, the professionalnetworking attributes, and the social networking attributes based on thecustomization input. In other examples, the first weighted value and thesecond weighted value may be modified in response to receivingparticipant-defined criteria. For example, the modification may edit theweighted value of the source participant attribute based on anidentification of the source participant. For example, the modificationmay edit the weighted value of one to a weighted value of four for thesource participant identified as a boss, whereas the weighted value ofone for the source participant identified as a co-worker may bemaintained.

In further examples, the first weighted value, the second weightedvalue, and the third weighted value may be determined by using one ormore algorithms (e.g. a weighted majority algorithm, an algorithmimplementing a nearest neighbor method, a label dependent featureweighing algorithm, a randomized weighted majority algorithm, a learningalgorithm, etc.). The learning algorithm may analyze a history ofassigned weighted values during a first time period to determine thefirst weighted value, the second weighted value, and the third weightedvalue during a second time period.

In some examples, the communication application 404 may perform acomparison between the first weighted value, the second weighted value,and the third weighted value. The communication application 404 may, forexample, determine the first weighted value as being larger than thesecond weighted value. The communication application 404 may receive thetransmission input 412 to transmit the note 408 to a second storagelocation associated with the first weighted value. The second storagelocation may include a communications folder of the source participant,an email address associated with the target participant, and/or anonline calendar invite associated with the target participant, amongothers. The note 408 may be transmitted to the second storage location.

The example scenarios and schemas in FIG. 1 through FIG. 4 are shownwith specific components, data types, and configurations. Embodimentsare not limited to systems according to these example configurations.Creating a note on a lock screen may be implemented configurationsemploying fewer or additional components in applications and userinterfaces. Furthermore, the example schema and components shown in FIG.1 through FIG. 4 and their subcomponents may be implemented in a similarmanner with other values using the principles described herein.

FIG. 5 is a simplified networked environment, where a system accordingto embodiments may be implemented.

As shown a diagram 500, notes may be captured on a note interface of acomputing device. The computing device may execute a communicationapplication. In examples, a communication service may be implemented viasoftware executed over the servers 514. The platform may communicatewith client applications on individual computing devices such as a smartphone 513, a mobile computer 512, or desktop computer 511 (‘clientdevices’) through network(s) 510. The servers 514 may include one ormore communication servers 516, where at least one of the one or morecommunication servers 516 may be configured to execute one or moreapplications (i.e. the communication application) associated with acommunication service.

In other examples, the communication service may be provided by a thirdparty service or may include a web application. The communicationservice may store data associated with note data in a data store 519directly or through a database server 518. Client applications executedon client devices 511-513 may be enabled to receive the note data andrender the note interface displaying information associated withcaptured notes.

Client applications executed on any of the client devices 511-513 mayfacilitate communications via application(s) executed by the one or morecommunication servers 516, or on an individual communication server. Anapplication, such as the communication application, may detect an inputto generate a note on the lock screen. The communication application mayprovide a note interface to capture the note. Once the note is capturedon the note interface, the communication application may save the noteat a first storage location. The first storage location may be isolatedby an operating system of the computing device to prevent an executionof a malicious code. The communication application may store the notedata associated with the notes in the data store 519 directly or throughdatabase server 518.

The network(s) 510 may comprise any topology of servers, clients,Internet service providers, and communication media. A system accordingto embodiments may have a static or dynamic topology. The network(s) 510may include secure networks such as an enterprise network, an unsecurenetwork such as a wireless open network, or the Internet. The network(s)510 may also coordinate communication over other networks such as PublicSwitched Telephone Network (PSTN) or cellular networks. Furthermore, thenetwork(s) 510 may include short range wireless networks such asBluetooth or similar ones. The network(s) 510 provide communicationbetween the nodes described herein. By way of example, and notlimitation, the network(s) 510 may include wireless media such asacoustic, RF, infrared and other wireless media.

A textual scheme, a graphical scheme, an audio scheme, an animationscheme, a coloring scheme, a highlighting scheme, and/or a shadingscheme may be employed to further enhance participant interactionbetween information associated with the notes and the note interface.

Many other configurations of computing devices, applications, datasources, and data distribution systems may be employed for creating anote on a lock screen. Furthermore, the networked environments discussedin FIG. 5 are for illustration purposes only. Embodiments are notlimited to the example applications, modules, or processes.

FIG. 6 is a block diagram of an example computing device, which may beused for creating a note on a lock screen, according to embodiments.

For example, a computing device 600 may be used as a server, desktopcomputer, portable computer, smart phone, special purpose computer, orsimilar device. In an example basic configuration 602, the computingdevice 600 may include one or more processors 604 and a system memory606. A memory bus 608 may be used for communication between theprocessor 604 and the system memory 606. The example basic configuration602 may be illustrated in FIG. 6 by those components within the innerdashed line.

Depending on the desired configuration, the processor 604 may be of anytype, including but not limited to a microprocessor (μP), amicrocontroller (μC), a digital signal processor (DSP), or anycombination thereof. The processor 604 may include one more levels ofcaching, such as a level cache memory 612, one or more processor cores614, and registers 616. The one or more processor cores 614 may (each)include an arithmetic logic unit (ALU), a floating point unit (FPU), adigital signal processing core (DSP Core), or any combination thereof.An example memory controller 618 may also be used with the processor604, or in some implementations, the example memory controller 618 maybe an internal part of the processor 604.

Depending on the desired configuration, the system memory 606 may be ofany type including but not limited to volatile memory (such as RAM),non-volatile memory (such as ROM, flash memory, etc.), or anycombination thereof. The system memory 606 may include an operatingsystem 620, a communication application 622, and a program data 624. Thecommunication application 622 may include a rendering engine 626 and anote modification engine 627. The rendering engine 626 may detect aninput to generate a note on the lock screen and may provide a noteinterface to capture the note. The rendering engine 626 may also presentinformation associated with the note. The information may include adeadline and/or an attachment, among other examples. The renderingengine 626 may distinguish the information with a textual scheme, agraphical scheme, an audio scheme, an animation scheme, a coloringscheme, a highlighting scheme, and/or a shading scheme, among otherschemes. The note modification engine 627 may capture the note on thenote interface and may save the note at a first storage location. Thefirst storage location may be isolated by an operating system of thecomputing device to prevent an execution of a malicious code. The notemodification engine 627 may parse the note to detect default attributesof the note. The default attributes may include a source participant anda subject matter associated with the note, among others. The notemodification engine 627 may receive a transmission input detected on thelock screen to transmit the note to a second storage location. Thesecond storage location may include a communications folder of thesource participant, an email address associated with a targetparticipant, and an online calendar invite associated with the targetparticipant, among others. In response to receiving the transmissioninput, the note modification engine 627 may transmit the note to thesecond storage location.

Components of the communication application 622 (such as the noteinterface) may also be displayed on the display device associated withthe computing device 600. An example of the display device may include ahardware screen that may be communicatively coupled to the computingdevice 600. The display device may include a touch based device thatdetects gestures such as a touch action. The display device may alsoprovide feedback in response to detected gestures (or any other form ofinput) by transforming a note interface of the communication application622, displayed by the touch based device. The program data 624 may alsoinclude, among other data, note data and information related to thenotes, or the like, as described herein.

The computing device 600 may have additional features or functionality,and additional interfaces to facilitate communications between theexample basic configuration 602 and any desired devices and interfaces.For example, a bus/interface controller 630 may be used to facilitatecommunications between the example basic configuration 602 and one ormore data storage devices 632 via a storage interface bus 634. The datastorage devices 632 may be one or more removable storage devices 636,one or more non-removable storage devices 638, or a combination thereof.Examples of the removable storage and the non-removable storage devicesmay include magnetic disk devices, such as flexible disk drives andhard-disk drives (HDD), optical disk drives such as compact disk (CD)drives or digital versatile disk (DVD) drives, solid state drives (SSD),and tape drives, to name a few. Example computer storage media mayinclude volatile and nonvolatile, removable, and non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules, orother data.

The system memory 606, the removable storage devices 636 and thenon-removable storage devices 638 are examples of computer storagemedia. Computer storage media includes, but is not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVDs), solid state drives, or other optical storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other medium which may be used to storethe desired information and which may be accessed by the computingdevice 600. Any such computer storage media may be part of the computingdevice 600.

The computing device 600 may also include an interface bus 640 forfacilitating communication from various interface devices (for example,one or more output devices 642, one or more peripheral interfaces 644,and one or more communication devices 646) to the example basicconfiguration 602 via the bus/interface controller 630. Some of the oneor more output devices 642 include a graphics processing unit 648 and anaudio processing unit 650, which may be configured to communicate tovarious external devices such as a display or speakers via one or moreA/V ports 652. The one or more peripheral interfaces 644 may include aserial interface controller 654 or a parallel interface controller 656,which may be configured to communicate with external devices such asinput devices (for example, keyboard, mouse, pen, voice input device,touch input device, etc.) or other peripheral devices (for example,printer, scanner, etc.) via one or more I/O ports 658. An examplecommunication device 666 includes a network controller 660, which may bearranged to facilitate communications with one or more other computingdevices 662 over a network communication link via one or morecommunication ports 664. The one or more other computing devices 662 mayinclude servers, computing devices, and comparable devices.

The network communication link may be one example of a communicationmedia. Communication media may typically be embodied by computerreadable instructions, data structures, program modules, or other datain a modulated data signal, such as a carrier wave or other transportmechanism, and may include any information delivery media. A “modulateddata signal” may be a signal that has one or more of its characteristicsset or changed in such a manner as to encode information in the signal.By way of example, and not limitation, communication media may includewired media such as a wired network or direct-wired connection, andwireless media such as acoustic, radio frequency (RF), microwave,infrared (IR) and other wireless media. The term computer readable mediaas used herein may include both storage media and communication media.

The computing device 600 may be implemented, as a part of a generalpurpose or specialized server, mainframe, or similar computer, whichincludes any of the above functions. The computing device 600 may alsobe implemented as a personal computer including both laptop computer andnon-laptop computer configurations.

Example embodiments may also include methods for creating a note on alock screen. These methods can be implemented in any number of ways,including the structures described herein. One such way may be bymachine operations, of devices of the type described in the presentdisclosure. Another optional way may be for one or more of theindividual operations of the methods to be performed in conjunction withone or more human operators performing some of the operations whileother operations may be performed by machines. These human operatorsneed not be collocated with each other, but each can be only with amachine that performs a portion of the program. In other embodiments,the human interaction can be automated such as by pre-selected criteriathat may be machine automated.

FIG. 7 is a logic flow diagram illustrating a process for creating anote on a lock screen, according to embodiments.

A process 700 may be implemented on a computing device, such as thecomputing device 600, or with another system. As described, aparticipant may be allowed to interact with a communication applicationthrough an input device or a touch enabled display component of thecomputing device 600. The computing device 600 may provide a noteinterface of the communication application to the participant.

The process 700 begins with operation 710, where the communicationapplication may detect an input to generate a note on the lock screen.The input may include a press and hold action, a press and hold actioncombined with a swipe action, the swipe action, a keyboard entrycombination, a hovering action by a mouse input, a press and hold actionand a hovering action by a pen input, a tap action, an accelerometersensor based input, an orientation sensor based input, an opticallycaptured gesture, and/or a time based input, among other examples.

At operation 720, the communication application may provide a noteinterface to capture the note. At operation 730, the communicationapplication may capture the note on the note interface. Thecommunication application may present information associated with thenote. The information may include a deadline and/or an attachment, amongother examples. The communication application may also distinguish theinformation with a textual scheme, a graphical scheme, an audio scheme,an animation scheme, a coloring scheme, a highlighting scheme, and/or ashading scheme, among other examples. The communication application maydetect a modification input executed on the note interface to modify theinformation associated with the note. The information may be modifiedbased on the modification input.

At operation 740, the communication application may save the note at afirst storage location. The first storage location may be isolated by anoperating system of the computing device to prevent an execution of amalicious code. In some examples, the communication application mayparse the note to detect default attributes of the note. The defaultattributes may include a source participant and a subject matterassociated with the note, among others. The communication applicationmay receive a transmission input detected on the lock screen to transmitthe note to a second storage location. The second storage location mayinclude a communications folder of the source participant, an emailaddress associated with a target participant, and/or an online calendarinvite associated with the target participant, among others. The notemay be transmitted to the second storage location.

The operations included in process 700 are for illustration purposes.Creating a note on a lock screen may be implemented by similar processeswith fewer or additional steps, as well as in different order ofoperations using the principles described herein. The operationsdescribed herein may be executed by one or more processors operated onone or more computing devices, one or more processor cores, specializedprocessing devices, and/or general purpose processors, among otherexamples.

According to some embodiments, a means for creating a note on a lockscreen is described, which may include a means for detecting an input togenerate a note on the lock screen, a means for providing a noteinterface to capture the note, a means for capturing the note on thenote interface, and a means for saving the note at a first storagelocation. The first storage location may be isolated by an operatingsystem of the computing device to prevent an execution of a maliciouscode.

According to some embodiments, computing devices for creating a note ona lock screen are described. An example computing device may include adisplay device, a memory, and processors coupled to the memory and thedisplay device. The processors may execute a communication applicationin conjunction with instructions stored in the memory. The communicationapplication may include a rendering engine and a note modificationengine. The rendering engine may be configured to detect an input togenerate a note on the lock screen and provide, on the display device, anote interface to capture the note. The note modification engine may beconfigured to capture the note on the note interface and save the noteat a first storage location. The first storage location may be isolatedby an operating system of the computing device to prevent an executionof a malicious code.

According to additional embodiments, the rendering engine may be furtherconfigured to present information associated with the note anddistinguish the information with a textual scheme, a graphical scheme,an audio scheme, an animation scheme, a coloring scheme, a highlightingscheme, and/or a shading scheme. The information may include a deadlineand/or an attachment. In additional examples, the rendering engine maybe further configured to detect a modification input executed on thenote interface to modify the information associated with the note andprovide the modification input to the note modification engine to promptthe note modification engine to modify the information based on themodification input.

According to some embodiments, the note modification engine may befurther configured to parse the note to detect default attributes of thenote, receive a transmission input detected on the lock screen totransmit the note to a second storage location, and transmit the note tothe second storage location. The default attributes may include a sourceparticipant and/or a subject matter associated with the note, amongothers. The second storage location may include a communications folderof the source participant, an email address associated with a targetparticipant, and/or an online calendar invite associated with the targetparticipant, among others.

According to additional embodiments, the note modification engine may befurther configured to parse the note to detect social networkingattributes of the note, receive a transmission input detected on thedisplay device to transmit the note to a second storage location, andtransmit the note to the second storage location. The social networkingattributes may include groups participated in by a source participantand/or organizations supported by the source participant. The secondstorage location may include a social networking site associated withthe source participant.

According to some embodiments, the note modification engine may befurther configured to parse the note to detect professional networkingattributes of the note, receive a transmission input detected on thedisplay device to transmit the note to a second storage location, andtransmit the note to the second storage location. The professionalnetworking attributes may include a job title, an education, and/orwork-related experience associated with a source participant, amongothers. The second storage location may include, for example, aprofessional networking site associated with the source participant.

According to other examples, the note modification engine may be furtherconfigured to parse the note to detect professional networkingattributes and social networking attributes of the note, assign a firstweighted value to the professional networking attributes, assign asecond weighted value to the social networking attributes, and perform acomparison between the first weighted value and the second weightedvalue.

In some examples, the note modification engine may be further configuredto determine the first weighted value as being larger than the secondweighted value. In response, the note modification engine may receive atransmission input detected on the display device to transmit the noteto a second storage location. The note may be transmitted to the secondstorage location. The second storage location may include, for example,a professional networking site associated with a source participant.

In other examples, the note modification engine may be furtherconfigured to determine the first weighted value as being less than thesecond weighted value. In response, the note modification engine mayreceive a transmission input detected on the display device to transmitthe note to a second storage location. The note may be transmitted tothe second storage location. The second storage location may include,for example, a social networking site associated with a sourceparticipant.

According to additional examples, the note modification engine may befurther configured to determine the first weighted value as being equalto the second weighted value. In response, the note modification enginemay receive a transmission input detected on the display device totransmit the note to a second storage location. The note may betransmitted to the second storage location. The note modification enginemay receive another transmission input detected on the display device totransmit the note to a third storage location. In response, the notemodification engine may transmit the note to the third storage location.The second storage location may include, for example, a socialnetworking site associated with a source participant. The third storagelocation may include, for example, a professional networking siteassociated with the source participant.

According to some embodiments, methods executed on a computing devicefor creating a note on a lock screen may be provided. An example methodmay include process steps, such as, detecting an input to generate anote on the lock screen, providing a note interface to capture the note,capturing the note on the note interface, and saving the note at a firststorage location. The first storage location may be isolated by anoperating system of the computing device to prevent an execution of amalicious code.

According to other embodiments, the method may further include steps forparsing the note to detect default attributes, professional networkingattributes, and social networking attributes of the note and determininga first weighted value associated with the default attributes, a secondweighted value associated with the professional networking attributes,and a third weighted value associated with the social networkingattributes.

According to some embodiments, the method may further include additionalsteps for ordering the default attributes, the professional networkingattributes, and the social networking attributes based on the firstweighted value, the second weighted value, and the third weighted value.The ordering may include an ascending order or a descending order. Themethod may further include additional steps for detecting acustomization input of the first weighted value, the second weightedvalue, and/or the third weighted value, and re-ordering the defaultattributes, the professional networking attributes, and/or the socialnetworking attributes based on the customization input.

According to other examples, the method may further include additionalsteps for performing a comparison between the first weighted value, thesecond weighted value, and the third weighted value. In response to thecomparison, the method may further include additional steps fordetermining the first weighted value as being larger than the secondweighted value. In response, the note may be transmitted to a secondstorage location associated with the first weighted value. The secondstorage location may include a communications folder of the sourceparticipant, an email address associated with a target participant,and/or an online calendar invite associated with the target participant.In examples, the input may include a press and hold action, a press andhold action combined with a swipe action, the swipe action, a keyboardentry combination, a hovering action by a mouse input, a press and holdaction and a hovering action by a pen input, a tap action, anaccelerometer sensor based input, an orientation sensor based input, anoptically captured gesture, and/or a time based input, among others.

According to some examples, computer-readable memory devices withinstructions stored thereon for creating a note on a lock screen may beprovided. An example computer-readable memory device with instructionsstored thereon for creating a note on a lock screen may includedetecting an input to generate a note on the lock screen, providing anote interface to capture the note, capturing the note on the noteinterface, and saving the note at a first storage location. The firststorage location may be isolated by an operating system of the computingdevice to prevent an execution of a malicious code.

The above specification, examples and data provide a completedescription of the manufacture and use of the composition of theembodiments. Although the subject matter has been described in languagespecific to structural features and/or methodological acts, it is to beunderstood that the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing the claims and embodiments.

What is claimed is:
 1. A computing device for creating a note on a lockscreen, the computing device comprising: a display device; a memory; andone or more processors coupled to the memory and the display device, theone or more processors executing a communication application inconjunction with instructions stored in the memory, wherein thecommunication application includes: a rendering engine configured to:detect an input to generate a note on the lock screen; and provide, onthe display device, a note interface to capture the note; and a notemodification engine configured to: capture the note on the noteinterface; and save the note at a first storage location, wherein thefirst storage location is isolated by an operating system of thecomputing device to prevent an execution of a malicious code.
 2. Thecomputing device of claim 1, wherein the rendering engine is furtherconfigured to: present information associated with the note, wherein theinformation includes one or more of a deadline and an attachment; anddistinguish the information with one or more of a textual scheme, agraphical scheme, an audio scheme, an animation scheme, a coloringscheme, a highlighting scheme, and a shading scheme.
 3. The computingdevice of claim 2, wherein the rendering engine is further configuredto: detect a modification input executed on the note interface to modifythe information associated with the note; and provide the modificationinput to the note modification engine to prompt the note modificationengine to modify the information based on the modification input.
 4. Thecomputing device of claim 1, wherein the note modification engine isfurther configured to: parse the note to detect one or more defaultattributes of the note, wherein the one or more default attributesinclude a source participant and a subject matter associated with thenote; receive a transmission input detected on the lock screen totransmit the note to a second storage location, wherein the secondstorage location includes one or more of a communications folder of thesource participant, an email address associated with a targetparticipant, and an online calendar invite associated with the targetparticipant; and transmit the note to the second storage location. 5.The computing device of claim 1, wherein the note modification engine isfurther configured to: parse the note to detect one or more socialnetworking attributes of the note, wherein the one or more socialnetworking attributes include one or more of groups participated in by asource participant and organizations supported by the sourceparticipant; receive a transmission input detected on the display deviceto transmit the note to a second storage location, wherein the secondstorage location includes a social networking site associated with thesource participant; and transmit the note to the second storagelocation.
 6. The computing device of claim 1, wherein the notemodification engine is further configured to: parse the note to detectone or more professional networking attributes of the note, wherein theone or more professional networking attributes include one or more of ajob title, an education, and work-related experience associated with asource participant; receive a transmission input detected on the displaydevice to transmit the note to a second storage location, wherein thesecond storage location includes a professional networking siteassociated with the source participant; and transmit the note to thesecond storage location.
 7. The computing device of claim 1, wherein thenote modification engine is further configured to: parse the note todetect one or more professional networking attributes and one or moresocial networking attributes of the note; assign a first weighted valueto the one or more professional networking attributes; assign a secondweighted value to the one or more social networking attributes; andperform a comparison between the first weighted value and the secondweighted value.
 8. The computing device of claim 7, wherein the notemodification engine is further configured to: determine the firstweighted value as being larger than the second weighted value; receive atransmission input detected on the display device to transmit the noteto a second storage location, wherein the second storage locationincludes a professional networking site associated with a sourceparticipant; and transmit the note to the second storage location. 9.The computing device of claim 7, wherein the note modification engine isfurther configured to: determine the first weighted value as being lessthan the second weighted value; receive a transmission input detected onthe display device to transmit the note to a second storage location,wherein the second storage location includes a social networking siteassociated with a source participant; and transmit the note to thesecond storage location.
 10. The computing device of claim 7, whereinthe note modification engine is further configured to: determine thefirst weighted value as being equal to the second weighted value;receive a transmission input detected on the display device to transmitthe note to a second storage location, wherein the second storagelocation includes a social networking site associated with a sourceparticipant; transmit the note to the second storage location; receiveanother transmission input detected on the display device to transmitthe note to a third storage location, wherein the third storage locationincludes a professional networking site associated with the sourceparticipant; and transmit the note to the third storage location.
 11. Amethod executed on a computing device for creating a note on a lockscreen, the method comprising: detecting an input to generate a note onthe lock screen; providing a note interface to capture the note;capturing the note on the note interface; and saving the note at a firststorage location, wherein the first storage location is isolated by anoperating system of the computing device to prevent an execution of amalicious code.
 12. The method of claim 11, further comprising: parsingthe note to detect one or more default attributes, one or moreprofessional networking attributes, and one or more social networkingattributes of the note; and determining a first weighted valueassociated with the one or snore default attributes, a second weightedvalue associated with the one or more professional networkingattributes, and a third weighted value associated with the one or moresocial networking attributes.
 13. The method of claim 12, furthercomprising: ordering the one or more default attributes, the one or moreprofessional networking attributes, and the one or more socialnetworking attributes based on the first weighted value, the secondweighted value, and the third weighted value, wherein the orderingincludes one or more of an ascending order and a descending order. 14.The method of claim 13, further comprising: detecting a customizationinput of one or more of the first weighted value, the second weightedvalue, and the third weighted value; and re-ordering the one or moredefault attributes, the one or more professional networking attributes,and the one or more social networking attributes based on thecustomization input.
 15. The method of claim 12, further comprising:performing a comparison between the first weighted value, the secondweighted value, and the third weighted value.
 16. The method of claim15, further comprising: in response to the comparison, determining thefirst weighted value as being larger than the second weighted value; andtransmitting note to a second storage location associated with the firstweighted value, wherein the second storage location includes one or moreof a communications folder of the source participant, an email addressassociated with a target participant, and an online calendar inviteassociated with the target participant.
 17. The method of claim 11,wherein the input includes one or more of a press and hold action, apress and hold action combined with a swipe action, the swipe action, akeyboard entry combination, a hovering action by a mouse input, a pressand hold action and a hovering action by a pen input, a tap action, anaccelerometer sensor based input, an orientation sensor based input, anoptically captured gesture, and a time based input.
 18. Acomputer-readable memory device with instructions stored thereon forcreating a note on a lock screen, the instructions comprising: detectingan input to generate a note on the lock screen; providing a noteinterface to capture the note; capturing the note on the note interface;and saving the note at a first storage location, wherein the firststorage location is isolated by an operating system of the computingdevice to prevent an execution of a malicious code.
 19. Thecomputer-readable memory device of claim 18, wherein the instructionsfurther comprise: parsing the note to detect one or more defaultattributes, one or more professional networking attributes, and one ormore social networking attributes of the note determining a firstweighted value associated with the one or more default attributes, asecond weighted, value associated with the one or more professionalnetworking attributes, and a third weighted value associated with the,one or more social networking attributes; and ordering the one or moredefault attributes, the one or more professional networking attributes,and the one or more social networking attributes based on the firstweighted value, the second weighted value, and the third weighted value,wherein the ordering includes one or more of an ascending order and adescending order.
 20. The computer-readable memory device of claim 19,wherein the instructions further comprise: detecting a customizationinput of one or more of the first weighted value, the second weightedvalue, and the third weighted value; and re-ordering the one or moredefault attributes, the one or more professional networking attributes,and the one or more social networking attributes based on thecustomization input.