Resource management in a multi-operating environment

ABSTRACT

A method for providing user access to telephony operations in a multi operating environment having memory resources nearly depleted that include determining whether a predetermined first memory threshold of a computing environment has been reached and displaying a user interface corresponding to memory usage; and determining whether a predetermined second memory threshold, greater than the first, of the computing environment has been reached. Restricting computing functionality and allowing user access for telephony operations, corresponding to a mobile device, when the second memory threshold is reached is included as well. Also included is maintaining the computing restriction until the memory usage returns below the second memory threshold.

This is a nonprovisional application claiming the benefit of provisional application, 61/405,894, filed Oct. 22, 2010 under 35 U.S.C. 119(e), whose contents are incorporated by reference herein in their entirety.

FIELD OF THE INVENTION

The present invention relates generally to sharing resources in multi-operating environments. More specifically, the present invention relates to monitoring and managing shared memory resources within a multi-operating environment that includes a mobile communication device.

BACKGROUND

New operational challenges arise when creating multi-operational environment devices (e.g. hardware devices that can include mobile and computing environments on a single device) including: (i) using the memory resources as efficiently as possible in all modes of operation; (ii) maintaining mobile communication or telephony stability and critical functionality while also using the computing environment.

Communication device operating instability can be seen in a multi-operating environment where resources such as memory are shared across the operating environments. Hardware devices can be docked or tethered or exist as peripheral devices during communication or operation within their respective operating environment.

Emulation systems that allow one operating system to control the devices have been thought of as managing resources efficiently. However, other resources such as processor usage are not efficiently handled.

More importantly is controlling the multi-operating environment under critical conditions such as extremely depleted memory resources.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an exemplary perspective view of a mobile communication device;

FIG. 2 is a block diagram representing an exemplary multi-operating environment;

FIG. 3 is a bubble diagram identifying memory threshold decisions and functionality in an exemplary multi-operating environment;

FIG. 4A shows an exemplary webscreen for a memory manager in one state;

FIG. 4B shows an exemplary webscreen for a memory manager in another state;

FIG. 4C shows an exemplary webscreen for a memory manager in yet another state; and

FIG. 4D shows an exemplary webscreen for a memory manager in same state as in FIG. 4C along with an exemplary notification.

DETAILED DESCRIPTION

Many consumers have experienced instable computing environments and have grown accustomed to dealing with “bugs” in their operating systems. In stark contrast, mobile communication environments are expected to be more robust than typical computing environments, because of the important function of communication on a as needed basis, for example in emergency situations or to give a person's whereabouts to concerned persons. Therefore, there is a challenging opportunity when a mobile communication operating environment is combined with a computing environment on a single platform or kernel. The following discussion describes a way to ensure that devices with these combined capabilities (e.g., mobile tablets/mobile telephones and desktop/laptop computing) remain at least as reliable as the typical mobile telephone.

While the specification concludes with claims defining features of the invention that are regarded as novel and unobvious, it is believed that the invention is better understood from a consideration of the description in conjunction with the drawings. As required, detailed embodiments of the present invention are disclosed herein. However, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which can be embodied in various forms. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriately detailed structure. Further, the terms and phrases used herein are not intended to be limiting, but rather to provide an understandable description of the invention.

Referring to FIG. 1, an exemplary mobile communication device 100, such as a mobile telephone is provided. A front view of mobile communication device 100 is shown in FIG. 1. Mobile device 100 includes an integrated touch panel 102, wherein the integrated touch panel 102 comprises a capacitive touch sensor and an electrophoretic display (EPD). Additionally, physical operational buttons 104 may be included on the mobile communication device.

Referring to FIG. 2, a block diagram is shown of an exemplary multi-operating environment 200 in communication with a solitary Linux kernel 205. The multi-operating environment can include a Linux distribution system, a Linux-based operating system or a non-Linux-based operating system. Device hardware 210, such as mobile telephones, mobile tablets, mobile communication devices, is also in communication with the Linux kernel 205. The multi-operating environment 200 includes a first middleware operating environment 220 and a second middleware operating environment 240 in communication with a single Linux kernel 205. By example, the second middleware operating system environment 240 is a standard Linux distribution (i.e., a computing operating environment) and the first middleware operating system environment 220 is an embedded operating environment intended for use in mobile devices, such as an Android™ operating system. (Open handsetlliance, www.openhandsetalliance.com)

In one embodiment, a Linux distribution operating system 200 is in communication with the Linux kernel 205, which is in communication with the device hardware 210. The device hardware 210 can be a memory storage device (not shown) coupled to a processor (not shown) which stores computer executable instructions which are configured to perform various functions and operations, as described herein.

An exemplary operating system 200 includes Ubuntu® (Canonical Ltd., www.ubuntu.com) for the Linux-based middleware operating environment 240. It is specifically intended that multiple middleware operating system environments co-exist independent of the other(s). Exemplary environments that can be included in multi-operating environment 200 include Android™, Ubuntu® (Canonical Ltd., www.ubuntu.com), standard Linux-based environments, Symbian (Symbian Foundation Ltd., www.symbian.com), and Windows-based environments. In an alternative embodiment, it is envisioned that greater than two operating environments are configured to independently co-exist on the same core kernel 205. However, kernel 205 may be partioned as well.

Referring to FIG. 3, a bubble diagram 300 is shown that identifies memory threshold decisions and functionality in an exemplary multi-operating environment. Memory threshold is determined by realizing the amount of memory necessary to retain stability and functionality for a mobile communication device to operate reliably as though it was operating in a conventional stand-alone real time communication operating environment. Specifically, variable “x” is designated as low memory threshold and variable “y’ is designated as critical memory threshold. Variable “mem” is designated as the computing environment memory that is currently being used. At initialization or start, the memory usage of the computing environment, such as Linux-based middleware operating environment 240 in FIG. 2 is below a low threshold and thus is considered to be within normal operating range at bubble 310 (i.e., mem<x). However, the usage of several applications at once can lead to increased memory usage that will approach bubble 320 (i.e., x>mem<y). When the memory usage crosses the low memory threshold associated with bubble 320 a warning on a graphical user interface for the computing environment (not shown) is displayed for the user. However, full computing functionality within the computing environment is still possible and accessible by the user.

As the user continues to draw upon memory resources by using additional applications and web browsers or web pages, for example, the memory usage will track towards critical at bubble 330 (i.e., mem>y). At this juncture, a warning on the graphical user interface for the computing environment is displayed and computing functionality is disabled while at the same time there remains limited telephony operational functionality within the mobile communicating operating environment (e.g., Android™ as a first middleware operating system environment 220 in FIG. 2). The limited telephony operational functionality can include text, inbound calls, outbound calls, notifications, and images.

The disabling of computing functionality in the computing environment can include restricting full web browser access or alternatively restricting partial web browser access by enabling selection of certain web pages to close. Moreover, the disabling of computing functionality will nevertheless allow the user to close windows or applications until at least the memory usage is once again below the low memory threshold (x). This exception to the disabled computing functionality can be accomplished by using a pop-up window, for example, that allows the user to exit applications and web browser tabs in order to free memory (i.e., gain additional unused memory), and also keep critical telephony functions.

With regard to what the user sees in the computing environment as computing functionality is disabled, one or more selectable icons are disabled or in the alternative an entire webpage can be “grayed-out”. That is the webpage will have no functionality for the user when it is grayed out.

Referring to FIG. 4A, an exemplary webscreen 400 is shown in normal state that includes a memory manager 410 under operation by a controller (not shown). Memory usage for the mobile communicating operating environment is displayed as entry 420. A selectable button or icon 425 is associated with the task manager for the mobile communicating operating environment. Other webscreens or windows that are currently open in webscreen 400 are entries 430. The entries 430 can include social networking webpages, web browsers, photo gallery websites, video replay websites, sporting websites, and email entities, for example. Selectable buttons or icons 425 enable a user to close these open webscreens or windows 435 that are displayed as entries 430. Selectable widgets 437 can also include social networking webpages, web browsers, photo gallery websites, video replay websites, sporting websites, and email entities, for example; along with telephony functions as well.

Referring to FIG. 4B, memory manager 410 illustrates an exemplary low memory threshold condition as low memory notification 412. Low memory notification 412 remains on webscreen 400 until the low memory warning condition ceases. A “More Info” button or icon 413 can open a memory manager application that is in the warning mode.

Referring to FIG. 4C, memory manager 410 illustrates an exemplary critical memory threshold condition (i.e., where memory usage is nearly or substantially depleted). Webscreen 400 is “grayed out”, thus only allowing a user to close memory draining entries 432 within the computing operating environment via buttons or icons 425. In addition, memory manager 410 restricts usage of the mouse or pointer and the keyboard for entering text. Thus, memory manager 410 prevents the user from doing anything other than closing open windows or applications in the computing environment. The only exception to this user restriction is when there is an urgent notification like an incoming call, alarm, or message, for example or when webscreen 400 is locked.

Referring to FIG. 4D, memory manager 410 illustrates an exemplary critical memory threshold condition 412 (i.e., where memory usage is nearly or substantially depleted) and an urgent mobile communication notification window 440 (e.g., an incoming call, text, or image) within the mobile communication operating environment. During this juncture the computing functionality is severely or substantially limited; for example, automatic or manual selection for access or usage of memory draining web browser or specific tabs, select web pages, or windows within the memory draining web browser. However, the user may use either a mouse or keyboard to answer the phone call that is displayed in mobile communication notification window 440. Thereafter, once the call ends, memory manager 410 will further restrict computing functionality until the memory usage returns to below the critical memory threshold (y) as shown in FIG. 3.

Notably, the memory resources of the mobile communication device, i.e., mobile telephone or mobile tablet can also be tracked via a graphical user interface as shown in FIGS. 4A-4D. The user can select a button or icon to display the ongoing memory usage associated primarily with the mobile communication device.

This invention makes a mobile phone that is functioning in a multi-operating environment more stable and more reliable by preventing the user from opening additional windows or starting new applications when memory resources are critically low. This in turn, will help in making sure that the multi-operating environment doesn't crash or fail due to the lack of memory and the invention will also help in preventing missed calls that could inevitably arise in the event of system crash.

The present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can be realized in a centralized fashion in one processing system or in a distributed fashion where different elements are spread across several interconnected processing systems. Any kind of processing system or other apparatus, such as a controller, can be adapted for carrying out the methods described herein. A combination of hardware and software within a processing system can include an application that when loaded and executed controls the processing system such that it carries out the methods described herein. The present invention also can be embedded in an application product, which comprises all the features enabling implementation of the methods described herein, and which when loaded in a processing system is able to carry out these methods.

The terms “computer program,” “software,” “application,” variants and/or combinations thereof, in the present context, mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form. For example, an application can include, but is not limited to, a subroutine, a function, a procedure, an object method, on object implementation, an executable application, an applet, a servlet, a source code, an object code, a shared library/dynamic load library and/or other sequence of instructions designed for execution on a processing system.

The terms“a” and“an” as used herein, are defined as one or more than one. The term “plurality” as used herein, is defined as two as or more than two. The term “another” as used herein, is defined as at least a second or more. The terms “including” and/or “having” as used herein, are defined as comprising (i.e., open language).

It is specifically intended that the present invention not be limited to the embodiments and illustrations contained herein, but include modified forms of those embodiments including portions of the embodiments and combinations of elements of different embodiments as come within the scope of the following claims. 

1. A method for providing user access to telephony operations in a multi operating environment having memory resources nearly depleted, comprising the steps of: determining whether a predetermined first memory threshold of a computing environment has been reached and displaying a user interface corresponding to memory usage; determining whether a predetermined second memory threshold, greater than the first, of the computing environment has been reached; restricting computing functionality and allowing user access for telephony operations, corresponding to a mobile device, when the second memory threshold is reached; and maintaining the computing restriction until the memory usage returns below the second memory threshold.
 2. The method according to claim 1, wherein the multi operating environment includes a mobile device environment and the computing environment.
 3. The method according to claim 2, wherein the second memory threshold is a critical memory threshold and causes a warning about memory usage while impacting computing functionality in the computing environment in order to retain telephony operations in the mobile device environment.
 4. The method according to claim 1, wherein the first memory threshold is a low memory threshold and causes a warning about memory usage without impacting computing functionality.
 5. The method according to claim 3, wherein the computing functionality is impacted by restricting full web browser access.
 6. The method according to claim 3, wherein the computing functionality is impacted by restricting partial web browser access corresponding to select web pages.
 7. The method according to claim 1, wherein the telephony operations of the mobile device are selected from the group consisting of: text, inbound calls, outbound calls, notifications, and images.
 8. The method according to claim 3, wherein the warning about memory usage also restricts one or more selectable icons on the user interface.
 9. The method according to claim 6, wherein the select web pages are tabbed web pages.
 10. A mobile device multi-environment system, comprising: at least two co-existing independent middleware operating environments that share memory resources and a single operating system kernel; one or more memory threshold levels; a graphical user interface for each of the co-existing independent middleware operating environments; and a controller for monitoring and managing memory resources for the at least two co-existing independent middleware operating environments in order to retain telephony operations for a mobile device as the shared memory resources become depleted.
 11. The mobile device according to claim 10, wherein the at least two co-existing independent middleware operating environments further comprise a mobile device operating environment and a computing operating environment.
 12. The mobile device according to claim 10, wherein the single operating system kernel is Linux-based.
 13. The mobile device according to claim 11 further comprising limiting computing functionality in the computing environment.
 14. The mobile device according to claim 13, wherein the computing functionality is limited by restricting full web browser access.
 15. The mobile device according to claim 13, wherein the computing functionality is limited by restricting partial web browser access corresponding to select web pages.
 16. A web-based multi-environment system, comprising: at least one mobile telephone operating environment; at least one computing operating environment that is independent of the at least one mobile telephone environment; a single Linux-based operating system kernel that is shared by the at least one computing environment and the at least one mobile telephone operating environment; a graphical user interface for the mobile telephone operating environment; a graphical user interface for the computing operating environment; and a controller for monitoring and managing memory resources for the at least two co-existing independent middleware operating environments in order to retain telephony operations for a mobile device as the shared memory resources become depleted.
 17. The web-based multi-environment system according to claim 16 further comprising limiting computing functionality in the computing operating environment.
 18. The web-based multi-environment system according to claim 17, wherein the computing functionality is limited by restricting full web browser access.
 19. The web-based multi-environment system according to claim 17, wherein the computing functionality is limited by restricting partial web browser access corresponding to select web pages.
 20. A computer processor coupled to a computer memory having computer executable instructions configured to simultaneously run a standard Linux distribution operating system environment and an Android operating system environment on a single kernel and further comprising computer executable instructions configured to cause a warning about memory usage while impacting computing functionality in the standard Linux distribution operating system environment in order to retain telephony operations in the Android operating system environment.
 21. A method for monitoring memory usage in a multi-operating environment and retaining stability and functionality of one operating environment while using another operating environment, comprising the steps of: determining whether a predetermined first memory threshold of a computing environment has been reached and displaying a user interface corresponding to memory usage; determining whether a predetermined second memory threshold, greater than the first, of the computing environment has been reached; restricting computing functionality and allowing user access for telephony operations, corresponding to a mobile device, when the second memory threshold is reached; and maintaining the computing restriction until the memory usage returns below the second memory threshold. 