Notification of access control request and explanation indicative of the access control request on a communication device

ABSTRACT

A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.15/018,334, filed Feb. 8, 2016, which is a continuation of U.S.application Ser. No. 13/689,429, filed Nov. 29, 2012, and issued as U.S.Pat. No. 9,257,020 on Feb. 9, 2016, which is a continuation of U.S.application Ser. No. 12/040,401, filed Feb. 29, 2008, and issued as U.S.Pat. No. 8,335,500 on Dec. 18, 2012, all of which are entirelyincorporated by reference herein.

FIELD

This disclosure, in a broad sense, is directed toward an electronicdevice that has communication capabilities. The present disclosurefurther relates to providing a notification of an access control requestand an explanation of the access control request on a display screen ofa communication device.

BACKGROUND

With the proliferation of communication systems, compatible handheldcommunication devices are becoming more prevalent, as well as advanced.Examples of communication devices include both handheld communicationdevices as well as larger devices such as laptop computers, desktopcomputers and the like. These devices are capable of sending andreceiving a variety of different messages including but not limited toshort message service (SMS), multimedia message service (MMS), emails,voice messages, and the like. In addition, the communication devices mayrun various applications that may attempt to access device resources. Insome cases, the applications may have been developed or supplied bythird-party vendors rather than the communication device manufacturer.

BRIEF DESCRIPTION OF THE DRAWINGS

Exemplary methods and arrangements conducted and configured according tothe advantageous solutions presented herein are depicted in theaccompanying drawings wherein:

FIG. 1 illustrates an exemplary communication device according tovarious embodiments of the present disclosure;

FIG. 2 illustrates another exemplary communication device according tovarious embodiments of the present disclosure;

FIG. 3 is an illustrative embodiment of a notification providing anexplanation of an access control request;

FIG. 4 is another illustrative embodiment of a notification providing anexplanation of an access control request;

FIG. 5 is yet another illustrative embodiment of a notificationproviding an explanation of an access control request;

FIG. 6 is still another illustrative embodiment of a notificationproviding an explanation of an access control request;

FIG. 7 is an illustrative embodiment of an access control request and anexplanation of the access control request;

FIG. 8 is yet another illustrative embodiment of an access controlrequest and an explanation of the access control request;

FIG. 9 is a block diagram representing an exemplary wireless handheldcommunication device interacting in a communication network; and

FIG. 10 illustrates an exemplary flow chart of a method according to thepresent disclosure.

DETAILED DESCRIPTION

An exemplary communication device 300 is shown in FIG. 1, and thedevice's cooperation in a wireless network 319 is exemplified in theblock diagram of FIG. 9. These figures are exemplary only, and thosepersons skilled in the art will appreciate the additional elements andmodifications necessary to make the communication device 300 work inparticular network environments. While in the illustrated embodiment,the communication device 300 comprises a handheld communication device,and in this particular example, a smart phone, in other embodiments, thecommunication device 300 may comprise a handheld wireless communicationdevice, a personal digital assistant (PDA), laptop computer, desktopcomputer, a server, or other communication device.

As shown in the block diagram of FIG. 9, the communication device 300includes a microprocessor 338 that controls the operation of thecommunication device 300. A communication subsystem 311 performs allcommunication transmission and reception with the wireless network 319.Additionally, in at least one embodiment, the microprocessor 338 can beconnected to a serial port (for example, a Universal Serial Bus port)330 which can allow for communication with other devices or systems viathe serial port 300. A display 322 can be connected to microprocessor338 to allow for displaying of information to an operator of the device.When the communication device 300 is equipped with a keyboard 332, thekeyboard can also be connected with the microprocessor 338. Thecommunication device 300 can include a speaker 334, a microphone 336,random access memory (RAM) 326, and flash memory 324 all of which may beconnected to the microprocessor 338.

A location positioning device 341 can be functionally connected with themicroprocessor 338. The location positioning device 341 can comprise aglobal position system (GPS) device. The GPS device can be a module or aspecially designed microprocessor that is capable of receiving signalsfrom GPS satellites and determining current location. The signalstransmitted by the GPS satellites can be information relating to time.The GPS module or microprocessor processes this information to obtain acurrent position. In another embodiment, the location positioning devicecomprises a device that makes use of wireless carrier signals todetermine location.

Other similar components may be provided on the device as well andoptionally connected to the microprocessor 338. Other communicationsubsystems 340 and other communication device subsystems 342 aregenerally indicated as being functionally connected with themicroprocessor 338 as well. An example of a communication subsystem 340is that of a short range communication system such as BLUETOOTH®communication module or a WI-FT® communication module (a communicationmodule in compliance with IEEE 802.11b) and associated circuits andcomponents. Additionally, the microprocessor 338 is able to performoperating system functions and enables execution of programs on thecommunication device 300. In some embodiments, not all of the abovecomponents may be included in the communication device 300. For example,in at least one embodiment the keyboard 332 is not provided as aseparate component and is instead integrated with a touchscreen asdescribed below.

The auxiliary I/O subsystem 328 can take the form of a variety ofdifferent navigation tools (multi-directional or single-directional)such as a trackball navigation tool 321 as illustrated in the exemplaryembodiment shown in FIG. 1, or a thumbwheel, a navigation pad, ajoystick, touch-sensitive interface, or other I/O interface. Thesenavigation tools may be located on the front face 370 of thecommunication device 300 or may be located on any exterior surface ofthe communication device 300. Other auxiliary I/O subsystems can includeexternal display devices and externally connected keyboards (not shown).While the above examples have been provided in relation to the auxiliaryI/O subsystem 328, other subsystems capable of providing input orreceiving output from the communication device 300 are considered withinthe scope of this disclosure. Additionally, other keys may be placedalong the side of the communication device 300 to function as escapekeys, volume control keys, scrolling keys, power switches, or userprogrammable keys, and may likewise be programmed accordingly.

Keys, typically of a push-button or push-pad nature, perform well asdata entry devices but present problems to the operator when they mustalso be used to effect navigational control over a screen-cursor. Inorder to solve this problem, the present communication device 300 mayinclude an auxiliary input that acts as a cursor navigation tool 327 andwhich is also exteriorly located upon the front face 370 of thecommunication device 300. Its front face location allows the tool to beeasily thumb-actuable like the keys of the keyboard 332. An embodimentprovides the navigation tool 327 in the form of a trackball 321, whichcan be utilized to instruct two-dimensional screen cursor movement insubstantially any direction as well as act as an actuator when thetrackball 321 is depressed like a button. The placement of thenavigation tool 327 may be above the keyboard 332 and below the displayscreen 322; here, it can avoid interference during keyboarding and doesnot block the operator's view of the display screen 322 during use. (SeeFIG. 1).

As illustrated in FIG. 1, the communication device 300 may be configuredto send and receive messages. The communication device 300 includes abody 371. A display 322 which is located on the front face 370 of thebody 371 and upon which information is displayed to the operator duringtext entry. The communication device 300 may also be configured to sendand receive voice communications such as mobile telephone calls.

Furthermore, the communication device 300 is equipped with components toenable operation of various programs, as shown in FIG. 9. In anexemplary embodiment, the flash memory 324 is enabled to provide astorage location for the operating system 357, device programs 358, anddata. The operating system 357 is generally configured to manage otherprograms 358 that are also stored in memory 324 and executable on theprocessor 338. The operating system 357 honors requests for servicesmade by programs 358 through predefined program 358 interfaces. Morespecifically, the operating system 357 typically determines the order inwhich multiple programs 358 are executed on the processor 338 and theexecution time allotted for each program 358, manages the sharing ofmemory 324 among multiple programs 358, handles input and output to andfrom other device subsystems 342, and so on. In addition, operators cantypically interact directly with the operating system 357 through a userinterface usually including the keyboard 332 and display screen 322.While in an exemplary embodiment the operating system 357 is stored inflash memory 324, the operating system 357 in other embodiments isstored in read-only memory (ROM) or similar storage element (not shown).As those skilled in the art will appreciate, the operating system 357,device program 358 or parts thereof may be loaded in RAM 326 or othervolatile memory.

In one exemplary embodiment, the flash memory 324 contains programs 358for execution on the communication device 300 including an address book352, a personal information manager (PIM) 354, and the device state 350.Furthermore, programs 358 and other information 356 including data canbe segregated upon storage in the flash memory 324 of the communicationdevice 300.

When the communication device 300 is enabled for two-way communicationwithin the wireless communication network 319, it can send and receivesignals from a mobile communication service. Examples of communicationsystems enabled for two-way communication include, but are not limitedto, the General Packet Radio Service (GPRS) network, the UniversalMobile Telecommunication Service (UMTS) network, the Enhanced Data forGlobal Evolution (EDGE) network, the Code Division Multiple Access(CDMA) network, Evolution Data Only (EV-DO), High-Speed Packet Access(HSPA) networks, Universal Mobile Telecommunication Service TimeDivision Duplexing (UMTS-TDD), Ultra Mobile Broadband (UMB) networks,Worldwide Interoperability for Microwave Access (WiMAX), and othernetworks that can be used for data and voice, or just data or voice. Forthe systems listed above, the communication device 300 may require aunique identifier to enable the communication device 300 to transmit andreceive signals from the communication network 319. Other systems maynot require such identifying information. GPRS and EDGE use a SubscriberIdentity Module (SIM) in order to allow communication with thecommunication network 319. Likewise, most CDMA systems use a RemovableIdentity Module (RUIM) in order to communicate with the CDMA network.Similarly, UMTS uses a Universal Subscriber Identity Module (USIM) inorder to allow communication with the UMTS network. The SIM/RUIM/USIMcard can be used in multiple different communication devices 300. Thecommunication device 300 may be able to operate some features without aSIM/RUIM/USIM card, but it will not be able to communicate with thenetwork 319. A SIM/RUIM/USIM interface 344 located within thecommunication device 300 allows for removal or insertion of aSIM/RUIM/USIM card (not shown). The SIM/RUIM/USIM card features memoryand holds key configurations 351, and other information 353 such asidentification and subscriber related information. With a properlyenabled communication device 300, two-way communication between thecommunication device 300 and communication network 319 is possible.

If the communication device 300 is enabled as described above or thecommunication network 319 does not require such enablement, the two-waycommunication enabled communication device 300 is able to both transmitand receive information from the communication network 319. The transferof communication can be from the communication device 300 or to thecommunication device 300. In order to communicate with the communicationnetwork 319, the communication device 300 in the presently describedexemplary embodiment is equipped with an integral or internal antenna318 for transmitting signals to the communication network 319. Likewisethe communication device 300 in the presently described exemplaryembodiment is equipped with another antenna 316 for receivingcommunication from the communication network 319. These antennae (316,318) in another exemplary embodiment are combined into a single antenna(not shown). As one skilled in the art would appreciate, the antenna orantennae (316, 318) in another embodiment are externally mounted on thecommunication device 300.

When equipped for two-way communication, the communication device 300features a communication subsystem 311. As is understood in the art,this communication subsystem 311 is modified so that it can support theoperational needs of the communication device 300. The subsystem 311includes a transmitter 314 and receiver 312 including the associatedantenna or antennae (316, 318) as described above, local oscillators(LOs) 313, and a processing module 320 which in the presently describedexemplary embodiment is a digital signal processor (DSP) 320.

It is contemplated that communication by the communication device 300with the wireless network 319 can be any type of communication that boththe wireless network 319 and communication device 300 are enabled totransmit, receive and process. In general, these can be classified asvoice and data. Voice communication generally refers to communication inwhich signals for audible sounds are transmitted by the communicationdevice 300 through the communication network 319. Data generally refersto all other types of communication that the communication device 300 iscapable of performing within the constraints of the wireless network319.

Example device programs that can depend on such data include email,contacts and calendars. For each such program synchronization withhome-based versions on the programs can be desirable for either or bothof their long term and short term utility. As an example, emails areoften time sensitive, so substantially real time synchronization may bedesired. Contacts, on the other hand, can be usually updated lessfrequently without inconvenience. Therefore, the utility of thecommunication device 300 is enhanced when connectable within acommunication system, and when connectable on a wireless basis in anetwork 319 in which voice, text messaging, and other data transfer areaccommodated.

While the above description generally describes the systems andcomponents associated with a handheld communication device, thecommunication device 300 could be another communication device such as aPDA, a laptop computer, desktop computer, a server, or othercommunication device. In those embodiments, different components of theabove system might be omitted in order provide the desired communicationdevice 300. Additionally, other components not described above may berequired to allow the communication device 300 to function in a desiredfashion. The above description provides only general components andadditional components may be required to enable the system to function.These systems and components would be appreciated by those of ordinaryskill in the art.

While communication devices 300 continue to include additional commentsor controllable functions and features, programmers or third partyproviders may wish to use these additional features on the communicationdevices 300. While these additional features can be of benefit to theoperator, these additional functions and features maybe accessed withoutthe consent of the operator. Operators might also be concerned withincreased usage fees, reduced handheld wireless communication deviceperformance, and other similar issues when the program adjusts ormodifies device settings. In order to protect operators, devicemanufacturers may disable the ability of an executing program to accessthis information without informing the operator. It may also bedesirable to improve the user interface associated with thecommunication devices so that operators can be informed about accesscontrol requests from an executing program. As described below,operators can be informed of details concerning how the requestingprogram will make use of the setting that is contained in the accesscontrol request. This assists in the situation where it would beotherwise confusing to the operator of the device as to how therequesting program will use the access control request or what portionof the access control request will be changed. An additional advantageis that later installed third party programs can present detailedmessages to the operator when setting changes are being proposed, ratherthan relying on a more general manufacturer notification. In this way,the third party program can provide a more detailed and customizedexplanation concerning the access control request. This tailoredexplanation of the access request allows the executing program that ismaking the request to provide a context for the request, a reason forthe request, or other information that aids the operator in making thedetermination whether or not to grant the access control request.

The examples presented herein below provide illustrations of how anotification program can be programmed to provide an explanation of anaccess control request based upon descriptive data received on thedisplay screen 322. In at least one embodiment, the descriptive data isreceived from an executing program on the communication device 300. Theillustrative examples are examples only and other arrangements andcharacterizations of the notifications can be possible. Also, theillustrated examples discuss the flow of data from an executing programand other arrangements may be implemented as well.

In one example illustrated in FIGS. 1-3, a Maps program is provided onthe communication device 300. As illustrated in FIG. 1, a map,illustrating the western part of the United States, is provided on thedisplay screen 322. While the Maps program can be used without locationinformation, many operators or software providers may desire to includelocation information as part of the Maps program. When locationinformation is included as part of the Maps program, the currentlocation or current position along a proposed route can be displayed onthe screen. In some instances, the location positioning device on thecommunication device 300 may be disabled until it is enabled by theoperator. Additionally, the location positioning device may beselectively disabled to conserve battery life, limit the ability ofothers to track movement of the communication device 300, or for otherreasons.

If the Maps program makes an access control request to enable thelocation positioning device, a notification 110, such as the oneillustrated in FIG. 2, can be displayed indicating the access controlrequest. In FIG. 2, the notification 110 indicates which program ismaking the access control request (illustrated by the denotation “Theprogram Maps”). While the indication of the program making the accesscontrol request is optional, the name of the program can assist theoperator in making the determination to grant or deny the access controlrequest.

In the embodiment illustrated in FIG. 2, a notification 110 is presentedon the display screen 322 of the communication device. The notification110 is indicative of an access control request from a Maps program. Thenotification 110 can provide an explanation 111 of the access controlrequest based on received data descriptive of the access controlrequest. At a first level, the notification illustrated in FIG. 2includes an explanation 111 that the program Maps is attempting tochange device settings. The setting of the device that is requested tobe changed can be described as a proposed setting change. The proposedsetting that the Maps program is requesting permission to change cancomprise a hardware setting change. In another embodiment, the proposedsetting change can comprise a program setting change. In the illustratedexample, the notification 110 comprises an explanation 111 that thedevice settings will be modified.

Additionally, the notification 110 is provided with a selectable item130 (such as selectable text or dialog boxes) which allows a selectionto have additional details displayed. In this example, a furtherexplanation is displayed in response to selecting the selectable item130 labeled “Vendor Details.” Additionally, the notification 110 caninclude dialog boxes 132 which are used to grant the access controlrequest and deny the access control request. As illustrated, two dialogboxes 132 are provided—one dialog box labeled “Allow” 136 grants theaccess control request and another dialog box labeled “Deny” 138 doesnot grant the requested access control request. A third dialog boxlabeled “Do not ask again” 134 allows the operator to make a selectionthat will allow the selected access control request to continue to grantor deny the access control request.

A further explanation of the access control request may be provided uponreceipt of, e.g., selection of the selectable text 130 or via a provideddialog box (not shown). When the selectable text 130 is selected, anotification 110 indicative of an explanation 111 of the access controlrequest based upon the received descriptive data is presented on thedisplay screen 322, as illustrated in FIG. 3. The received descriptivedata provides details concerning the proposed setting change of theaccess control request. In this example, the proposed setting change isto enable a GPS receiver. When the explanation 111 is displayed, itprovides information that the Maps program is attempting to enable a GPSreceiver located on the communication device 300. Additionally, theexplanation 111 also provides information that the GPS will be enabledto allow the Maps program to show location of the communication device300 on the map. While the illustrated example concerns a GPS receiver,other location positioning devices may be enabled instead of or inaddition to the GPS receiver depending upon the access control requestand the equipment supplied on the communication device 300. While thisand the following illustrative examples include particular words andphrases, it can be appreciated that other phrases or sentencesindicating similar or equivalent information are considered within thescope of this disclosure.

After the notification 110 illustrated in FIG. 3 is displayed, thedisplay may return to the previous notification 110 in which the accesscontrol request can be granted or denied. Once the explanation 111 ofthe access control request has been presented, an additional instructioncan present the previous notification 110, illustrated in FIG. 2, whichincludes two dialog boxes 132 with the option to grant or deny theaccess control request of a proposed setting change. In another example,the notification 110 displaying the explanation 111 of the accesscontrol request based on the received descriptive data can be providedwith a dialog box or another selectable item allowing the access controlrequest to be accepted or denied (not shown). Alternatively, theexplanation 111 can be temporarily provided on the display screen or thedevice 300 can be provided with an escape key so that the display screenreturns to the original notification 110 which includes accept or denyselections. Other arrangements can be provided within the scope of thisdisclosure.

Other examples of access control requests along with correspondingnotifications comprising explanations of the access control requests arepresented below. In one example, an access control request for a timezone adjustment is made. In one embodiment, a notification 110 such asthe one shown in FIG. 2 may be provided. If the device 300 receives arequest for additional details as described above, the explanation 111of the access control request describes that the time zone will beadjusted if the access control request is granted, as illustrated inFIG. 4. The notification 110 includes an explanation 111 that the timezone will be adjusted. The time zone adjustment may be requested by anexecuting program such as a game, calendar program, organizer, or otherprogram. Additionally, the explanation 111 may include an additionalreason that the program wishes to adjust the time zone (not shown). Forexample, if the program is a calendar program it may wish to adjust thetime zone when the communication device 300 has received informationregarding the time zone in which the communication device 300 islocated. In another embodiment, a screen shot acquisition access controlrequest can be made. The notification 110 can further include anexplanation 111 that the access control request will adjust the displaysettings to increase a timeout function so that a video may be displayedwithout the display screen entering a power save mode.

In another example, an access control request for enabling a BLUETOOTH®device is made by an executing program. As illustrated in FIG. 5, anotification 110 comprising the explanation 111 of the access controlrequest describes enabling a BLUETOOTH® device is displayed on thedisplay screen 322. In this example, the access control request can befor enabling a BLUETOOTH® receiver and transmitter. Additionally, theexplanation 111 may provide information that BLUETOOTH® is enabled sothat a multi-player game can be held or that it is going to search forcommunication devices 300 within close proximity to start a multiplayergame. Alternatively, only the BLUETOOTH® receiver or transmitter may beenabled and the notification 110 displays a message relating to therespective enablement of the receiver or transmitter. The enablement ofthe BLUETOOTH® receiver and transmitter can be in response to an accesscontrol request from a Game. In this example, the BLUETOOTH® receiverand transmitter can be used to allow the communication device 300 totransmit data in a head-to-head game with another communication devicein close proximity. Other programs that use the BLUETOOTH® receiver andtransmitter are also considered within the scope of this disclosure.

In another embodiment, an access control request for accessing anaddress book is made by an executing program. As illustrated in FIG. 6,a notification 110 comprising the explanation 111 of the access controlrequest describes accessing an address book on the communication device300. For example, a Game might request access to the address bookinformation. If a general notice is only provided to the operator, theoperator might not know whether to grant or deny the access controlrequest. When the notification program displays a notification 110comprising an explanation 111 of the access control request based on thereceived descriptive data, the operator is better able to determinewhether to grant or deny the access control request. For example, anoperator might want to prevent a game from accessing the address book,but allow a data directory program access to the address book. Asillustrated in the example, the explanation 111 indicates that theprogram Game would like to access the address book on the communicationdevice 300 in order to send a request to “friends” or contacts listed inthe address book to join the Game.

Additionally, an access control request for a change in the volume ofthe communication device 300 can be made. The access control request fora change in volume can be made by an executing program such as Game.Furthermore, an access control request for acquiring a screen shot canbe made. This access control request can be made by a device managementprogram that can be used to assist administrators in device management.In response to these requests, a notification 110 can be displayed withan explanation 111 of the access control request based on the receiveddescriptive data related to the above mentioned access control requests.The explanations 111 would describe the adjustment of the volume of thecommunication device 300 and the acquisition of a screen shotrespectively.

The level of detail in the explanation 111 provided in the notification110 can vary depending on the group in which the requested settingchange is located. For example, the communication device 300 may beequipped with certain settings that are grouped together under oneclassification such as “device settings.” Those settings under “devicesettings” can include volume control, date adjustment, time adjustment,ringer options, power settings, and other similar settings. When thenotification 110 is provided, the explanation 111 in one embodimentprovides information regarding which one of the settings that are withinthe group is subject to the access control request. In a furtherembodiment, a more detailed explanation 111 provides the reason why thesetting is being changed, for example to allow the program Game toaccess the volume control setting to set the volume to a maximum level.This more detailed explanation 111 explains that both the volume settingis to be changed and that its level is to be set to a maximum value. Inother embodiments, the setting that is to be changed is a standalonesetting, for instance BLUETOOTH® can be such a setting. In thisinstance, the operator is provided with an explanation 111 that includesthe reason that the BLUETOOTH® setting is to be changed.

Other groupings of settings are also possible. Additionally, dependingon the manufacturer settings that are grouped in some cases may also beindividually provided. One example of a group of settings is theme datain which various settings relating to themes are grouped. Anothergrouping could be a connections setting which can control both localconnections, wireless connections, and the like. Additionally, theconnections could also control settings that are related to accessingthe Internet, Intranet, USB connections, WI-FI® and the like. In anotherembodiment, the connections can be grouped according to whether theconnection settings are for local, external, or internal networks. Whilein some instances the address book is provided in a separate setting, inothers it is grouped with other “device settings.” The address book alsomight be grouped within a personal information management (PIM) groupthat includes settings relating to addresses, calendars and othersettings to help the operator to organize items.

In the above described embodiments, the explanation 111 of the accesscontrol request based on the received descriptive data has beenpresented in response to a request for additional information. In otherexamples, as described below, the explanation 111 of the access controlrequest based on the received descriptive data can be provided on asingle notification. While the above examples have presented a fewillustrations, additional illustrations are provided below. While theillustrations are provided in relation to a single notification and twonotifications, the examples of the explanations can be provided on asingle or two notifications.

Additionally, the communication device 300 can be provided with a Game.In one embodiment as illustrated in FIG. 7, Game requests enabling alocation positioning device, such as a GPS device, and a correspondingnotification 110 is shown on the display screen 322. The currentposition could be used to improve the user experience. For example, Gamecould provide a list of other members of Game who are engaged in playingGame on their communication devices 300 within a predetermined distancefrom the communication device 300. Alternatively, local stores andrestaurants could award prizes to operators who achieve preset scores orwin head-to-head competitions that are located within a predetermineddistance. In this embodiment, an explanation 111 of the access controlrequest based on the received descriptive data is displayed. Thereceived descriptive data explains that the Game is attempting to enablea location positioning device. In one embodiment as illustrated in FIG.8, the notification 110 includes an explanation 111 that a prize will beawarded based upon a determined location if permission is granted forthe access control request to enable the location positioning device.Additionally, the dialog boxes 132 may be provided, enabling allowanceor denial of the access control request, as described above in relationto FIG. 2 above.

While the above embodiments have been described in relation to variousprograms, this disclosure is not limited to those programs. Otherprograms that make access control requests are included within the scopeof this disclosure. In order to help the operator determine whichprogram is making the access control request, the notification caninclude an indication as to which executing program is making the accesscontrol request.

In another exemplary embodiment, a method 200 for displayingnotifications on a display screen 322 of a communication device 300 ispresented. The method 200 includes receiving data indicative of anaccess control request which can be from an executing program (block202). In at least one embodiment, the method 200 receives datadescriptive of the access control request (block 204). The descriptionof the access control request further clarifies the nature of the accesscontrol request as described above. For example, the access controlrequest can be for adjusting volume, enabling a GPS device, accessingthe address book, adjusting the time zone, acquiring a screen shot,enabling a BLUETOOTH receiver, enabling a BLUETOOTH transmitter, amongothers. In other embodiments, the receipt of data descriptive of theaccess control request can be in response to a request for additionalinformation as will be explained below, or can be provided at the sametime or in close proximity to the access control request. The method 200further displays a notification of the access control request on thedisplay screen of the communication device 300 (block 206). In at leastone embodiment, an option to display an explanation of the accesscontrol request based upon the received descriptive data is provided(block 208). If the descriptive data regarding the access controlrequest has not yet been received from the executing program, a requestis made for the descriptive data. If the request for an explanation ofthe access control request is selected, a notification to that effect ispresented on the display screen (block 210). The notification 110includes information concerning the specifics about the access controlrequest to provide information about the setting that the access controlrequest seeks to change. The setting can be a device hardware setting asdescribed above. Additionally, the setting can be a device programchange. In at least one embodiment, both a device hardware and deviceprogram change can be made. If the operator does not request additionalinformation, this notification is skipped. A determination is madewhether the access control request is granted or not (block 212). If theaccess control request is granted, then the activation of the devicesetting in the access control request is allowed (block 214). If theaccess control request is denied, then the access control request is notimplemented (block 216).

The communication device 300 as described above can include a displayscreen upon which information is displayed. The communication device 300can also include a speaker through which audible information can bebroadcast. While the notifications described herein focus on informationthat is displayed on the display screen 322, the information andnotification could likewise be provided audibly. Likewise, theinstruction to communication device 300 could be provided throughaudible commands and the like. Additionally, information could beprovided through vibrations or other motion of the device. Furthermore,information could be input into the communication device 300 via motionof the communication device 300 or external input device.

In one embodiment, the display screen 322 is provided within thecommunication device 300. In another embodiment, the display screen 322is provided as a separate component, which can be connected to thecommunication device 300. A microprocessor 338 that is configured toexecute at least one notification program that displays a notification110 descriptive of an access control request on the display screen 322can also be included. The at least one notification program can beprogrammed to receive data indicative of the access control request andto receive data descriptive of the access control request. The at leastone notification program can further be programmed to display anotification on the display screen 322 indicative of the access controlrequest and comprising an explanation of the access control requestbased on the received descriptive data.

In at least one embodiment, at least the data descriptive of the accesscontrol request is generated by, and received from an executing programon the communication device 300. In other embodiments, as describedabove, the access control request and data descriptive of the accesscontrol request are generated by and received from an executing programon the communication device 300. The executing program can be anyprogram that is capable of running on the communication device 300, suchas those described above. The transmission of the data descriptive ofthe access control request can be made at the same time as the accesscontrol request, at a different time than the access control request, orupon request of the data descriptive of the access control request.

In at least one embodiment, the access control request is a proposedsetting change. In one example, the proposed setting change comprises ahardware setting change. In another example, the proposed setting changecomprises a program setting change. In addition to the access controlrequest, the explanation of the access control request can describe theproposed setting change. In one example, the explanation 111 describesthat the proposed setting change is a hardware setting change. Inanother example, the explanation 111 describes that the proposed settingchange is a program setting change. The explanation 111 can includedetails about the specific setting that is to be changed by the accesscontrol request. A few examples have been provided above.

As described above, the explanation 111 of the access control requestcan describe enabling of a location positioning device if the accesscontrol request is granted. In another example, the explanation 111 ofthe access control request describes obtaining a current location from alocation positioning device if the access control request is granted.The location positioning device in one embodiment comprises a globalpositioning system device. In another embodiment the explanation 111further describes that if the location positioning device is enabled, aprize will be awarded based upon the obtained current location.

In another example, the access control request is for a time zoneadjustment and the explanation 111 of the access control requestdescribes that the time zone will be adjusted if the access controlrequest is granted.

A notification can describe an executing program from which the datadescriptive of the access control request is received, therebyindicating which program is making the access control request.Additionally, the notification program can display the explanation 111of the access control request in response to selection of a displayedselectable item on the display screen 322. Additionally, a dialog box132 can be provided to grant the access control request.

In another embodiment, a computer-readable medium having a computerprogram for controlling a computing device to provide informationpertaining to an access control request received at a communicationdevice is presented. The computer program can cause the communicationdevice to receive data indicative of an access control request.Additionally the computer program can cause a computer to receive datadescriptive of the access control request. Furthermore, the computerprogram can cause the computer to display a notification on a displayscreen 322 indicative of the access control request and comprising anexplanation of the access control request based on the receivedescriptive data.

In yet another embodiment, the communication device 300 is a handheldwireless communication device configured to receive messages isdisclosed. The handheld wireless communication device comprises a body371 housing a display screen upon which information is displayed. Thehandheld wireless communication device can also comprise amicroprocessor 338 configured to execute at least one notificationprogram that displays a notification descriptive of an access controlrequest on the display screen 322. The at least one notification programcan be further programmed to receive data indicative of an accesscontrol request and display a dialog box 132 for additional detailsconcerning the access control request and an explanation 111 of whichexecuting program is making the access control request. Additionally,the at least one notification program can be further programmed toreceive data descriptive of the access control request upon selection ofthe dialog box 132 and to display an additional notification comprisingan explanation 111 of the access control request based on the receiveddescriptive data, wherein the explanation provides additional detailsconcerning the use of a proposed setting change of the access controlrequest.

Exemplary embodiments have been described hereinabove regarding bothcommunication devices 300, as well as the communication networks 319within which they can operate. Again, it should be appreciated that thefocus of the present disclosure is providing a notification indicativeof an access control request and an explanation of the access controlrequest on a display screen 322. Various modifications to and departuresfrom the disclosed embodiments will occur to those having skill in theart. The subject matter that is intended to be within the spirit of thisdisclosure is set forth in the following claims.

1. A method at a communication device, the method comprising: receivingan access control request for changing a setting on the communicationdevice, comprising receiving descriptive data, the descriptive datacomprising an indication of an intended use of the setting by at leastone application executable on the communication device; outputting atleast one notification descriptive of the access control request;receiving at least one user input; and as a result of receiving the atleast one user input, changing the setting in accordance with the accesscontrol request, the at least one notification including an explanationof the access control request based on the descriptive data, theexplanation describing at least the intended use.