Lock screen graphical user interface

ABSTRACT

A device is configured to generate and present a lock screen graphical user interface while the device is in a locked state in which, for example, the device displays a lock screen to a user of the device. The device is further configured to detect a current activity of the user while the device is in its locked state. This detection may be based on context data generated by a sensor within the device. The device is further configured to select an activity icon from a set of activity icons based on the detected current activity of the user. The device then causes the selected activity icon to be displayed while the device is in its locked state. The selected and displayed activity icon is operable to cause display of a pop-up window that corresponds to the selected activity icon while the device is still in its locked state.

TECHNICAL FIELD

The subject matter disclosed herein generally relates to machines thatare configured to process data. Specifically, the present disclosureaddresses systems and methods to facilitate a lock screen graphical userinterface (GUI).

BACKGROUND

Many machines (e.g., devices) communicate visual information to theirusers via screens (e.g., light emitting display screens, projectorscreens, or heads-up displays). As an example of such a machine, adevice (e.g., a portable hand-held device) may include a touch-sensitivescreen (e.g., a touchscreen) that is configured to both display visualinformation and detect user input in the form of various touches (e.g.,taps, double taps, drags, pinches, and reverse pinches).

In some implementations, a device with a touch-sensitive screen isconfigured (e.g., programmed) to operate in a locked state or anunlocked state. In the locked state, the device may exclusively displayon its screen a “lock screen” that indicates the device is in the lockedstate and prevents access to any other GUI on the device. Furthermore,the device in the locked state may ignore all user inputs (e.g., toucheson the touch-sensitive screen) except a user input that represents acommand to exit the locked state and enter the unlocked state of thedevice (e.g., a tap or drag in a particular portion of thetouch-sensitive screen). In entering the unlocked state, the deviceceases displaying the lock screen and provides access to (e.g.,displays) one or more GUIs available on the device (e.g., for normaloperation of the device).

BRIEF DESCRIPTION OF THE DRAWINGS

Some embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings.

FIG. 1 is a network diagram illustrating a network environment suitablefor a device with a lock screen GUI, according to some exampleembodiments.

FIG. 2 is a block diagram illustrating components of the device with thelock screen GUI, according to some example embodiments.

FIGS. 3-8 are device diagrams illustrating a screen of the device andillustrating the lock screen GUI, according to some example embodiments.

FIGS. 9 and 10 are device diagrams illustrating the screen of the deviceand illustrating a home screen suitable for use with the lock screenGUI, according to some example embodiments.

FIG. 11 is a diagram illustrating a folder icon within the home screenof FIG. 10, according to some example embodiments.

FIG. 12 is a device diagram illustrating the screen of the deviceillustrating a home screen suitable for use with the lock screen GUI,according to some example embodiments.

FIG. 13 is a diagram illustrating a folder icon within the home screenof FIG. 12, according to some example embodiments.

FIGS. 14-17 are flowcharts illustrating operations of the device inperforming a method of providing the lock screen GUI, according to someexample embodiments.

FIG. 18 is a block diagram illustrating components of a machine,according to some example embodiments, able to read instructions from amachine-readable medium and perform any one or more of the methodologiesdiscussed herein.

DETAILED DESCRIPTION

Example methods and systems are directed to a lock screen GUI for adevice or other machine. Examples merely typify possible variations.Unless explicitly stated otherwise, components and functions areoptional and may be combined or subdivided, and operations may vary insequence or be combined or subdivided. In the following description, forpurposes of explanation, numerous specific details are set forth toprovide a thorough understanding of example embodiments. It will beevident to one skilled in the art, however, that the present subjectmatter may be practiced without these specific details.

A device may be configured (e.g., by software that is stored by thedevice and executable by one or more processors of the device) togenerate (e.g., create) a lock screen GUI and present (e.g., display)the lock screen GUI to a user of the device. The lock screen GUI may begenerated, presented, or both, while the device is in a locked state inwhich, for example, the screen of the device displays a lock screen thatprevents the user from accessing a set of one or more home screens. Eachof such home screens may include and display one or more applicationicons that are operable by the user (e.g., by a touch input, such as,tapping) to initiate executions of applications by the device.

In accordance with the example methods and systems described herein, thedevice is configured (e.g., programmed) by at least a detection module,an icon module, and an interaction module, each of which may include andconfigure one or more processors (e.g., computer processors or othermachine processors) to perform operations described herein for thatmodule. The detection module is configured to detect a current activityof the user (e.g., an expected, predicted, inferred, or most likelyactivity in which the user is presently engaged), while the device is inits locked state. This detection of the current activity of the user maybe based on context data generated by a set of one or more sensorswithin the device. By virtue of the detection module, the device is thusconfigured to detect the user's current activity.

The icon module is configured to select an activity icon from a set ofactivity icons available (e.g., stored) on the device. This selection isbased on the current activity of the user. The icon module is alsoconfigured to cause the selected activity icon to be displayed on thescreen of the device while the device is in the locked state. Theactivity icon is operable by the user to cause display of a pop-upwindow that corresponds to the selected activity icon (e.g., a pop upwindow for that activity icon), while the device is in the locked state.By virtue of the icon module, the device is thus configured to selectand display one or more of such activity icons based on the user'scurrent activity, which may have the effect of prompting the user toconfirm that the user is indeed engaging in that current activity. Insome example embodiments, there is no overlap between the activity iconsavailable for use in the lock screen GUI and the application iconsincluded in the one or more home screens of the device

The interaction module is configured to detect that the displayedactivity icon is operated (e.g., tapped) by the user, select a subset ofapplication icons from the home screens based on the operated activityicon, and generate and display the pop-up window that corresponds to theoperated activity icon, while the device is still in its locked state.The generated and displayed pop-up window displays the selected subsetof the application icons and enables operation of the subset ofapplication icons while the device is still in the locked state (e.g.,still displaying at least a portion of the lock screen that otherwisewould prevent the user from accessing any application icons included inthe set of home screens). By virtue of the interaction module, thedevice is thus configured to generate and display a user-operable subsetof application icons that have been selected based on the currentactivity of the user (e.g., as confirmed by the user). This enables theuser to access application icons that are relevant to the user's currentactivity, while the device is in the locked state and without navigatingthrough the set of home screens to locate these relevant applicationicons.

Accordingly, the lock screen GUI generated and displayed by the devicemay enable the user to quickly find and execute one or more of theapplications that correspond to the subset of application iconsdisplayed in the pop-up window, while the device is in the locked state.Hence, a device configured to generate and display this lock screen GUIis improved compared to similar devices that lack this lock screen GUI,for at least the reason that the lock screen GUI enables quick andconvenient access to applications relevant to the user's currentactivity, without troubling the user to unlock the device and accessthese applications via any home screens. Further details are describedbelow.

FIG. 1 is a network diagram illustrating a network environment suitablefor a device with a lock screen GUI, according to some exampleembodiments. The network environment 100 includes a server machine 110,a database 115, and a device 130, all communicatively coupled to eachother via a network 190. The server machine 110 may form all or part ofa cloud 118 (e.g., a geographically distributed set of multiple machinesconfigured to function as a single server), which may form all or partof a network-based system 105 (e.g., a cloud-based server systemconfigured to provide one or more services to the device 130). Theserver machine 110 and the device 130 may each be implemented in acomputer system, in whole or in part, as described below with respect toFIG. 18.

Also shown in FIG. 1 is a user 132 of the device 130. The user 132 maybe a human user (e.g., a human being), a machine user (e.g., a computerconfigured by a software program to interact with the device 130), orany suitable combination thereof (e.g., a human assisted by a machine ora machine supervised by a human). The user 132 is not part of thenetwork environment 100, but is associated with the device 130 and maybe a temporary or permanent operator of the device 130. For example, thedevice 130 may be a desktop computer, a vehicle computer, a tabletcomputer, a navigational device, a portable media device, a smartphone,or a wearable device (e.g., a smart watch or smart glasses) belonging tothe user 132.

Any of the machines, databases, or devices shown in FIG. 1 may beimplemented in a special-purpose computer that has been modified (e.g.,configured or programmed) by software (e.g., one or more softwaremodules) to perform one or more of the functions described herein forthat machine, database, or device. For example, a computer system ableto implement any one or more of the methodologies described herein isdiscussed below with respect to FIG. 18. As used herein, a “database” isa data storage resource and may store data structured as a text file, atable, a spreadsheet, a relational database (e.g., an object-relationaldatabase), a triple store, a hierarchical data store, or any suitablecombination thereof. Moreover, any two or more of the machines,databases, or devices illustrated in FIG. 1 may be combined into asingle machine, and the functions described herein for any singlemachine, database, or device may be subdivided among multiple machines,databases, or devices.

The network 190 may be any network that enables communication between oramong machines, databases, and devices (e.g., the server machine 110 andthe device 130). Accordingly, the network 190 may be a wired network, awireless network (e.g., a mobile or cellular network), or any suitablecombination thereof. The network 190 may include one or more portionsthat constitute a private network, a public network (e.g., theInternet), or any suitable combination thereof. Accordingly, the network190 may include one or more portions that incorporate a local areanetwork (LAN), a wide area network (WAN), the Internet, a mobiletelephone network (e.g., a cellular network), a wired telephone network(e.g., a plain old telephone system (POTS) network), a wireless datanetwork (e.g., WiFi network or WiMax network), or any suitablecombination thereof. Any one or more portions of the network 190 maycommunicate information via a transmission medium. As used herein,“transmission medium” refers to any intangible (e.g., transitory) mediumthat is capable of communicating (e.g., transmitting) instructions forexecution by a machine (e.g., by one or more processors of such amachine), and includes digital or analog communication signals or otherintangible media to facilitate communication of such software.

FIG. 2 is a block diagram illustrating components of the device 130,according to some example embodiments. The device 130 is shown asincluding a detection module 210, an icon module 220, an interactionmodule 230, a home screen module 240, one or more applications 250(e.g., software programs, mobile apps, or other executableapplications), one or more sensors 260, an operating system 270, and ascreen 290 (e.g., a touch-sensitive screen), all configured tocommunicate with each other (e.g., via a bus, shared memory, or aswitch).

As shown in FIG. 2, the detection module 210, the icon module 220, theinteraction module 230, and the home screen module 240 may form all orpart of an app 200 (e.g., a mobile app) that is stored (e.g., installed)on the device 130. Furthermore, one or more processors 299 (e.g.,digital processors) may be included (e.g., temporarily or permanently)in the app 200, the detection module 210, the icon module 220, theinteraction module 230, the home screen module 240, the applications250, the operating system 270, or any suitable combination thereof.

The screen 290 may be or include a touch-sensitive screen (e.g., atouchscreen or other touch-detecting display component). The sensors 260may be or include any type of data generating input component configuredto detect information about the device 130 and its surroundingenvironment. Examples of such input components are discussed below withrespect to FIG. 18.

Any one or more of the modules described herein may be implemented usinghardware alone (e.g., one or more processors 299) or a combination ofhardware and software. For example, any module described herein mayphysically include an arrangement of one or more processors 299 (e.g., asubset of or among the one or more processors of the machine) configuredto perform the operations described herein for that module. As anotherexample, any module described herein may include software, hardware, orboth, that configure an arrangement of one or more processors 299 (e.g.,among the one or more processors of the machine) to perform theoperations described herein for that module. Accordingly, differentmodules described herein may include and configure differentarrangements of such processors 299 or a single arrangement of suchprocessors 299 at different points in time. Moreover, any two or moremodules described herein may be combined into a single module, and thefunctions described herein for a single module may be subdivided amongmultiple modules. Furthermore, according to various example embodiments,modules described herein as being implemented within a single machine,database, or device may be distributed across multiple machines,databases, or devices.

FIGS. 3-8 are device diagrams illustrating a screen of the device 130and illustrating the appearance and usage of the lock screen GUI,according to some example embodiments. In FIG. 3, the device 130 isdepicted in the example form of a smart phone or tablet computer showingcontents of the screen 290. As shown in FIG. 3, the device 130 is in itslocked state, and consequently the screen 290 displays a lock screen300. As noted above, display of the lock screen 300 prevents the user132 from accessing a set of one or more home screens in whichapplication icons are displayed and operable to initiate executions ofcorresponding applications by the device 130. In the example illustratedin FIG. 3, the lock screen 300 includes an unlock icon 310, which may beoperable (e.g., by tapping) to unlock the device 130 (e.g., cause thedevice 130 to exit its locked state and enter its unlocked state). Thelock screen 300 may be stored by the device 130 and presented by thedevice 130 (e.g., according to the operating system 270), whenever thedevice 130 is in its locked state.

In some example embodiments, the lock screen 300 further includes one ormore special access icons 320, 321, 322, and 323. Each of these specialaccess icons 320-323 may respectively provide access (e.g., despite thelock screen 300 preventing access to the home screens) to a function ofthe device 130, including an application executable by the device 130.For example, the special access icon 320 may be operable to unlock thedevice 130 and execute an application that corresponds to the specialaccess icon 320. As another example, the special access icon 321 may beoperable to unlock the device 130 and invoke a feature of the operatingsystem 270 (e.g., set local time, connect to the network 190, or turn ona flashlight feature). According to various example embodiments, aspecial access icon (e.g., special access icon 320 or 321), itscorresponding application, or both may be selected (e.g., by the iconmodule 220 or the operating system 270) based on historical usage datastored by the device 130 (e.g., a log of most frequently launchedapplications) or may be predetermined (e.g., hard-coded) by theoperating system 270.

As shown in FIG. 4, the device 130 may additionally display one or moreactivity icons 410, 411, 412, and 413 on the lock screen 300, while thedevice 130 is still in its locked state. The activity icons 410-413 maybe displayed in response to detection of the current activity (e.g.,driving to work) of the user 132 by the detection module 210. Each ofthe displayed activity icons 410-413 may visually indicate andcorrespond to a different activity (e.g., activities frequentlyperformed by the user 132). For example, the activity icon 410 mayvisually indicate and correspond to the user 132 driving to work; theactivity icon 411 may visually indicate and correspond to the user 132attending a meeting; the activity icon 412 may visually indicate andcorrespond to the user 132 exercising at a gym; and the activity icon413 may visually indicate and correspond to the user 132 dining at arestaurant.

The activity icon 410 may be displayed prominently (e.g., topmost amongthe activity icons 410-413) based on the activity icon 410 correspondingto the detected current activity of the user 132. The other activityicons 411-413 may be included for display along with the activity icon410, for example, based on historical usage data (e.g., frequency ofusage), data gathered by one or more of the sensors 260, or both. Insome example embodiments, the detection module 210 detects the currentactivity of the user 132 by determining a set (e.g., top four or topfive) of activities likely to be engaged in by the user 132 and treatsthe most likely activity as the current activity, such that the activityicon 410 corresponds to the most likely activity and the activity icons411-413 correspond to other likely activities in which the user 132could be presently engaged.

In the example illustrated in FIG. 4, the current activity has beendetected, and the icon module 220 has selected the activity icons410-413 from a larger set of activity icons available (e.g., stored) onthe device 130 (e.g., within icon module 220 or another portion of theapp 200). In addition, the icon module 220 has caused the selectedactivity icons 410-413 to be displayed on the screen 290 while thedevice 130 is in the locked state and displaying at least part of thelock screen 300.

In the example embodiment depicted in FIG. 4, the activity icons 410-413are superimposed over the lock screen 300 (e.g., without modifying thelock screen 300). However, in alternative example embodiments, the iconmodule 220 integrates the activity icons 410-413 into the lock screen300 (e.g., by modifying the lock screen 300 itself). According tovarious example embodiments, display of the activity icons 410-413prompts (e.g., requests, instructs, or suggests) the user 132 to confirmwhich of the activity icons 410-413 matches or is closest to the actualactivity in which the user 132 is presently performing.

As shown in FIG. 5, the device 130 may additionally display a pop-upwindow 510 on the lock screen 300 (e.g., contemporaneously with theactivity icons 410-413), while the device 130 is still in its lockedstate. The pop-up window 510 may be displayed in response to operationof one of the displayed activity icons (e.g., activity icon 410). Forexample, the user 132 may operate activity icon 410 by tapping on theactivity icon 410, which may have the effect of confirming that thecurrent activity (e.g., driving to work) visually indicated by theactivity icon 410 is indeed the activity in which the user 132 ispresently engaged.

The pop-up window 510 may visually indicate which activity icon (e.g.,activity icon 410) corresponds to the pop-up window 510. FIG. 5illustrates this correspondence relationship by depicting the pop-upwindow 510 as a callout or speech bubble extending from the activityicon 410. As a result, the pop-up window 510 may visually indicate andcorrespond to the detected current activity of the user 132 (e.g.,driving to work, as confirmed by the user 132). Similarly, if the user132 had operated a different activity icon (e.g., activity icon 411), adifferent pop-up window would be displayed, and that pop-up window wouldvisually indicate and correspond to a different activity (e.g.,attending a meeting, as confirmed by the user 132).

FIGS. 6-8 depict various contents of the pop-up window 510, according tovarious example embodiments. As shown in FIG. 6, the pop-up window 510may include one or more application icons 610, 611, and 612, as well asa street map 620, all of which may be displayed (e.g., superimposed overthe lock screen 300) while the device 130 is still in its locked state.In the example illustrated in FIG. 6, the application icons 610, 611,and 612 have been selected by the interaction module 230 from a largerset of application icons available (e.g., stored) on the device 130(e.g., in one or more home screens, which may be predetermined by theoperating system 270 of the device 130, by the applications 250, or anysuitable combination thereof). Each of the displayed application icons610-612 visually indicates and corresponds to a different applicationstored (e.g., installed) on the device 130 (e.g., among the applications250). Thus, application icons (e.g., application icon 610) are distinctfrom activity icons (e.g., activity icon 410) in that application iconsvisually indicate and correspond to executable applications whileactivity icons visually indicate and correspond to user activities. Theselection of these application icons 610-612 may be based on theactivity that corresponds to the operated activity icon 410 (e.g., thedetected current activity of the user 132).

When displayed in one or more home screens, these application icons610-612 are each operable to cause the device 130 to execute acorresponding application while the device 130 is in its unlocked state.However, when displayed in the pop-up window 510, these applicationicons 610-612 are each operable to cause the device 130 to exit thelocked state, enter the unlocked state, and execute the correspondingapplication.

The street map 620 may be or include a geographical map of locationsnear (e.g., centered on) the geographical location of the device 130(e.g., as determined by a geolocation component within the device 130).The street map 620 may further include one or more marks (e.g., markers,pins, or highlights) that have been determined by the interaction module230 to be relevant for the detected current activity of the user 132.Accordingly, supposing that the current activity is driving to work(e.g., as confirmed by the user 132 by tapping on the correspondingactivity icon 410), the street map 620 may display highlights or othermarks that indicate a route that the user 132 frequently travels to work(e.g., as determined by the interaction module 230 based on historicalusage data stored on the device 130).

FIG. 7 shows the pop-up window 510 including a sub-window 720 of content(e.g., a card or other graphical elements suitable for displayingcontent), instead of the street map 620. FIG. 8 shows the pop-up window510 containing both the street map 620 and the sub-window 720 ofcontent. The interaction module 230 may generate and display thesub-window 720 by invoking execution of one or more applications stored(e.g., installed) on the device 130 with one or more inputs determinedbased on the detected current activity of the user 132.

For example, supposing that the detected current activity is driving towork, the sub-window 720 may include one or more reminders of tasks thatthe user 132 has scheduled for performance at work (e.g., retrieved froma calendar application of the user 132, with “work” as an input, such asa filter parameter). As another example, supposing that the detectedcurrent activity is attending a meeting, and the meeting is scheduled toend shortly (e.g., as indicated by the calendar application of the user132), the sub-window 720 may include one or more restaurant reviews(e.g., retrieved from a third-party website or from the server machine110). These restaurant reviews may be obtained based on various inputsdetermined from the detected current activity (e.g., attending themeeting), such as information about other attendees of the meeting(e.g., retrieved from a calendar application, a contacts database, orboth), the location of the device 130 (e.g., as determined by ageolocation component of the device 130), historical usage data storedon the device 130, a user preference corresponding to the user 132, orany suitable combination thereof.

As shown in FIG. 8, the lock screen GUI may be configured to enable theuser 132 (e.g., represented in FIG. 8 by a finger) to use the output ofone application (e.g., first application) as an input to anotherapplication (e.g., a second application). In the example embodimentillustrated in FIG. 8, the interaction module 230 has generated anddisplayed the sub-window 720 of content by executing a first applicationthat corresponds to the application icon 610. As noted above, executionof this first application may be based on one or more inputs determined(e.g., by the interaction module 230) based on the detected currentactivity of the user 132. Thus, the sub-window 720 contains contentobtained (e.g., retrieved, generated, or otherwise accessed) based onthe detected current activity. By dragging the sub-window 720 towards(e.g., to) another application icon (e.g., application icon 612, asillustrated in FIG. 8 by a curved arrow), the user 132 can invoke asecond application that corresponds to the application icon 612. In thisinvocation, however, the interaction module 230 may determine one ormore inputs based on the content of the sub-window 720. Accordingly,content obtained from the first application may be used as input to thesecond application.

As an illustrative example, suppose the detected current activity of theuser 132 is driving home from work, and the interaction module 230 hasgenerated the sub-window 720 to include a reminder of a task scheduledto be performed after arriving home (e.g., obtained from a taskapplication, which may be visually indicated by and correspond to theapplication icon 610). As shown in FIG. 8, the street map 620 may alsobe displayed in the pop-up window 510 and, for example, indicate a routethrough traffic to guide the user 132 home from work. Further supposethat the task whose reminder appears in the sub-window 720 is “getdinner for family” and that the application icon 612 visually indicatesand corresponds to a restaurant review application stored on the device130.

Continuing this illustrative example, if the user 132 drags thesub-window 720 to the application icon 612, the interaction module 230causes the restaurant review application to be invoked (e.g., executed)with the location of the user's 132 home and the keywords “dinner” and“family” as input. As a result, the device 130 exits its locked state,enters its unlocked state, and executes the restaurant reviewapplication with input data determined (e.g., by the interaction module230) based on the contents of the sub-window 720. As previously noted,the contents of the sub-window 720 were previously obtained (e.g., bythe interaction module 230) based on output of a different application(e.g., the task application that corresponds to the application icon610). This may have the effect of providing the user 132 with a quickand convenient way (e.g., by a single drag gesture) to unlock the device130 and begin using the restaurant review application in a contextuallyrelevant manner.

FIGS. 9 and 10 are device diagrams illustrating the screen 290 of thedevice 130 and illustrating a home screen 900 suitable for use with thelock screen GUI, according to some example embodiments. As noted above,the lock screen 300 prevents the user 132 from accessing the home screen900 while the device 130 is in its locked state. However, while thedevice 130 is in its unlocked state, the home screen 900 may bedisplayed on the screen 290 to enable the user 132 to access one or moreof the application icons 610, 611, and 612, which are previouslydiscussed above with respect to FIGS. 6-8, as well as additionalapplication icons 910, 911, 912, 913, 914, 915, 916, 917, and 918. Aspreviously mentioned, each of the application icons 610-612 and 910-918may respectively correspond to a different application that is stored(e.g., installed) and executable on the device 130. Operation of any ofthese application icons 610-612 and 910-918 (e.g., by tapping) mayinvoke or otherwise begin execution of the corresponding application onthe device 130 (e.g., by one or more of the processors 299 of the device130). In various example embodiments, the home screen 900 is generatedby the operating system 270 of the device 130 (e.g., as a default layoutof the application icons 610-612 and 910-918).

As shown in FIG. 10, some example embodiments of the home screen 900 aremodifiable by the home screen module 240 (e.g., within the app 200). Inparticular, the home screen module 240 may select or otherwise determinea subset of the application icons 610-612 and 910-918 into a group(e.g., folder) of icons, and this group may be represented in the homescreen 900 by a folder icon 1010. For example, the home screen module240 may determine that at least the application icons 610, 910, 911, and912 are included in a group of icons (e.g., based on their respectivelycorresponding applications having similar frequencies of usage duringthe detected current activity of the user 132), and the home screenmodule 240 may generate and display the folder icon 1010 (e.g., tocollectively represent at least the application icons 610, 910, 911, and912 included in the group) or otherwise cause the folder icon 1010 to bedisplayed on the home screen 900 (e.g., by modifying the home screen900).

FIG. 11 is a diagram illustrating the folder icon 1010 being displayedwithin the home screen 900, according to some example embodiments. Thefolder icon 1010 is generated by the home screen module 240 based on theapplication icons (e.g., at least application icons 610, 910, 911, and912) that were determined to be members of the group represented by thefolder icon 1010. For example, the home screen module 240 may determinethat a group of twelve application icons is to be represented by thefolder icon 1010 (e.g., based on their corresponding applications beingfrequently used during the detected current activity) and that the fourmost often invoked applications correspond to the application icons 610,910, 911, and 912. Based on this determination, the home screen module240 may generate and display the folder icon 1010 as including theapplication icons 610, 910, 911, and 912, or smaller sized versionsthereof. Accordingly, FIG. 11 shows the application icons 610, 910, 911,and 912 as being contained within the folder icon 1010.

Within the folder icon 1010, each of the application icons 610, 910,911, and 912 may be individually operated by the user 132. For example,to invoke the application that corresponds to the application icon 610(e.g., a task application), the user 132 can tap on the upper leftregion of the folder icon 1010 (e.g., within the borders of theapplication icon 610, as it appears within the folder icon 1010).Likewise, to invoke the application that corresponds to the applicationicon 910 (e.g., a messaging application), the user 132 can tap on theupper right region of the folder icon 1010 (e.g., within the borders ofthe application icon 910, as it appears within the folder icon 1010).Similarly, the application that corresponds to the application icon 911may be invoked by tapping on the lower left region of the folder icon1010 (e.g., within the borders of the application icon 911, as itappears within the folder icon 1010), and the application thatcorresponds to the application icon 912 may be invoked by operating thelower right reach of the folder icon and 10 (e.g., within the borders ofthe application icon 912, as it appears within the folder icon 1010).Thus, although the application icons 610, 910, 911, and 912 have beengrouped by the home screen module 240 into the folder icon 1010, each ofthe application icons 610, 910, 911, and 912 remain individuallyaccessible and operable from the home screen 900, for example, comparedto troubling the user 132 to open, view, or otherwise access the group(e.g., folder) of application icons represented by the folder icon 1010before operating one of those application icons.

As shown in FIG. 11, the folder icon 1010 may also include a folder viewicon 1110, which may be centrally located within the folder icon 1010.According to various example embodiments, the folder view icon 1110 maybe visible (e.g., colored in contrast to the background of the foldericon 1010) or nonvisible (e.g., colored the same as the background ofthe folder icon 1010). The folder view icon 1110 is operable (e.g., viatapping) by the user 132 to open, view, or otherwise access the group oficons represented by the folder icon 1010 (e.g., in their entirety).Accordingly, while viewing the home screen 900, the user 132 can choosewhether to directly invoke an application represented by one of theincluded application icons 610, 910, 911, and 912, as well as whether toaccess the full group of activity icons to which the application icons610, 910, 911, and 912 belong.

FIG. 12 is a device diagram illustrating the screen 290 of the device130 illustrating the home screen 900, according to some exampleembodiments. In the example embodiments depicted in FIG. 12, the folderview icon 1110 is external to the folder icon 1010, and both the folderview icon 1110 and the folder icon 1010 are shown in the home screen900. In such situations, the home screen module 240 may generate thefolder view icon 1110 (e.g., as a visible icon distinguishable from thebackground of the home screen 900) and the folder icon 1010 as all orpart of a combination (e.g., a matched pair) of icons.

As described above, the folder view icon 1110 is operable (e.g., viatapping) by the user 132 to open, view, or otherwise access the group oficons represented by the folder icon 1010. As also described above, thefolder icon 1010 may enable individual access to, and operation of, theapplication icons 610, 910, 911, and 912 (e.g., directly from the homescreen 900, without opening, viewing, or otherwise accessing the groupof icons represented by the folder icon 1010). However, in the exampleembodiments depicted in FIG. 12, the folder icon 1010 may omit thefolder view icon 1110, and the four application icons 610, 910, 911, and912 may constitute the full contents of the folder icon 1010. This isillustrated in FIG. 13.

FIG. 13 is a diagram illustrating the folder icon 1010 within the homescreen 900, according to the example embodiments discussed above withrespect to FIG. 12. Since the folder view icon 1110 appears external tothe folder icon 1010 in the home screen 900, as shown in FIG. 12, theapplication icons 610, 910, 911, 912, or smaller sized versions thereof,may occupy the folder icon 1010 as shown in FIG. 13. As noted above,within the folder icon 1010, each of the application icons 610, 910,911, and 912 may be individually operated by the user 132 to invoke(e.g., execute) the corresponding application on the device 130.

FIGS. 14-17 are flowcharts illustrating operations of the device 130 inperforming a method 1400 of providing the lock screen GUI, according tosome example embodiments. Operations in the method 1400 may be performedby the device 130 (e.g., in executing the app 200), using modulesdescribed above with respect to FIG. 2. As shown in FIG. 14, the method1400 includes operations 1410, 1420, 1430, 1440, 1450, 1460, and 1470.

In operation 1410, the detection module 210 detects the current activityof the user 132, while the device 130 is in its locked state. As notedabove, this may be performed by determining an expected, predicted,inferred, or most likely activity in which the user 132 is currentlyengaged, and this detection may be fully or partially based on contextdata generated by the sensors 260 within the device 130. In some exampleembodiments, the detection is further based on historical usage datastored by the device 130 (e.g., a log of activity data, such as a recordof most frequently invoked applications). In certain exampleembodiments, the detection is further based on a preference of the user132 (e.g., stored in a user-created or automatically created userprofile that corresponds to the user 132). In some example embodiments,the detection module 210 may be referred to as an activity module (e.g.,configured to detect the current activity of the user 132).

In operation 1420, the icon module 220 selects one or more activityicons (e.g., activity icon 410) for display in the lock screen GUI,based on the current activity detected in operation 1410. For example,the activity icons 410-413 may be selected from a larger set of activityicons available on the device 130 (e.g., stored in the icon module 220or elsewhere in the app 200). Accordingly, this may have the effect ofautomatically (e.g., by machine) and dynamically (e.g., in real time)identifying, selecting, choosing, specifying, or otherwise determiningone or more activity icons (e.g., activity icons 410-413) based on(e.g., in response to) the current activity of the user 132 (e.g., asdetected in operation 1410).

In operation 1430, the icon module 220 causes the selected one or moreactivity icons (e.g., activity icons 410-413) to be displayed on thescreen 290 of the device 130, while the device 130 is in its lockedstate. As noted above with respect to FIG. 4, the selected and displayedactivity icons 410-413 may be superimposed over the lock screen 300 orintegrated into the lock screen 300.

In operation 1440, the interaction module 230 detects that an activityicon (e.g., activity icon 410) displayed in operation 1430 has beenoperated (e.g., by tapping or by some other selection process availableto the user 132). For example, the activity icon 410 may be tapped bythe user 132, and the interaction module 230 may detect this tap asoperation of the activity icon 410. As noted above, this detection isperformed while the device 130 is still in its locked state.

In operation 1450, the interaction module 230 selects a subset of theapplication icons that are available on the device 130 (e.g., stored inthe operating system 270, in the applications 250, or any suitablecombination thereof). As noted above with respect to FIG. 6, theapplication icons 610-612 may be selected by the interaction module 230for inclusion in the subset. In addition, the selection of theseapplication icons 610-612 may be based on the current activity detectedin operation 1410 and may occur while the device 130 is still in itslocked state. In various example embodiments, the selection of thesubset is performed automatically (e.g., by machine) and dynamically(e.g., in real-time) based on the current activity of the user 132(e.g., as detected in operation 1410).

In operation 1460, the interaction module 230 generates the pop-upwindow 510 (e.g., to have an appearance as discussed above with respectto FIGS. 6-8). According to various example embodiments, performance ofoperation 1460 includes determining and accessing (e.g., creating,retrieving, or otherwise obtaining) contents of the pop-up window 510.For example, generation of the pop-up window 510 may includeincorporating the application icons 610-612 that were selected inoperation 1450 into the generated pop-up window 510. In various exampleembodiments, operation 1460 is performed automatically (e.g., bymachine) and dynamically (e.g., in real-time).

In operation 1470, the interaction module 230 causes the generatedpop-up window 510 to be displayed on the screen 290 of the device 130,while the device 130 is still in its locked state. As noted above, thepop-up window 510 may be displayed contemporaneously (e.g.,simultaneously) with the activity icons previously displayed inoperation 1430, and the pop-up window 510 may include the applicationicons 610-612 that were selected in operation 1450. Accordingly, thisdisplaying of the pop-up window 510 results in displaying the selectedsubset of application icons (e.g., application icons 610-612) andenabling operation of these application icons while the device 130 isstill in its locked state.

As shown in FIG. 15, the method 1400 may include one or more ofoperations 1510, 1511, 1512, 1520, 1560, 1561, 1562, 1570, and 1571,according to various example embodiments. One or more of operations1510, 1511, and 1512 may be performed as part (e.g., a precursor task, asubroutine, or a portion) of operation 1410, in which the detectionmodule 210 detects the current activity of the user 132 while the device130 is in its locked state.

In operation 1510, the detection module 210 detects a transition to thecurrent activity from a previous activity in which the user 132 wasengaged. This may be performed by detecting a relatively rapid change inthe context data generated by the sensors 260 within the device 130(e.g., sudden increase or decrease in movement, ambient noise,recognized voices, temperature, or any suitable combination thereof).This may have the effect of allowing the detection module 210 to performoperation 1510 at or near the beginning of the current activity of theuser 132 (e.g., at or near the outset of a recently started currentactivity).

In operation 1511, the detection module 210 accesses application usagedata that indicates executions of applications by the device 130,terminations of applications on the device 130, or any suitablecombination thereof. This application usage data may be stored by thedevice 130 (e.g., in the operating system 270, in the applications 250,or any suitable combination thereof), and the application usage dataaccordingly may be accessed from the device 130. In some exampleembodiments, the application usage data is stored by the server machine110 or the database 115 and accordingly accessed therefrom. In exampleembodiments that include operation 1511, the detecting of the currentactivity in operation 1410 is based on the application usage dataaccessed in operation 1511.

In operation 1512, the detection module 210 accesses applicationinstallation data that indicates installations of applications on thedevice 130, removals of applications from the device 130, or anysuitable combination thereof. This application installation data may bestored by the device 130 (e.g., in the operating system 270, in theapplications 250, or any suitable combination thereof), and theapplication installation data accordingly may be accessed from thedevice 130. In some example embodiments, the application installationdata is stored by the server machine 110 or the database 115 andaccordingly accessed therefrom. In example embodiments that includeoperation 1512, the detecting of the current activity in operation 1410is based on the application installation data accessed in operation1512.

In operation 1520, the detection module 210 detects a voice command(e.g., spoken by the user 132) while the device 130 is in its lockedstate. In example embodiments that include operation 1520, the causingof the activity icons (e.g., activity icons 410-413) selected inoperation 1420 to be displayed in operation 1430 is responsive to thevoice command detected in operation 1520. For example, the voice commandmay be or include the phrase “Help me” or the phrase “I need help withthis,” and the icon module 220 may perform one or both of operations1420 and 1430 in response to the voice command.

Operation 1560 may be performed as part of operation 1460, in which theinteraction module 230 generates the pop-up window 510 (e.g., includingsome or all of its contents), while the device 130 is in its lockedstate. In operation 1560, the interaction module 230 generates thestreet map 620 (e.g., to have an appearance as discussed above withrespect to FIGS. 6-8). As noted above, the generation of the street map620 may be based on the current activity detected in operation 1410.

One or more of operations 1561 and 1562 may be performed as part ofoperation 1560. In operation 1561, the interaction module 230 determinesa zoom level of the street map 620 (e.g., a simulated altitude or aratio of geographical distance to pixel distance). The determination maybe based on the current activity detected in operation 1410.

In operation 1562, the interaction module 230 determines a travel routefrom a start location to an end location (e.g., a path that follows oneor more streets or other routes usable for travel between the start andend locations) indicated on the street map 620. The travel route may bedetermined based on the current activity detected in operation 1410. Inaddition, the travel route may be visually marked (e.g., highlighted) inthe street map 620 (e.g., using one or more highlights, such as colors,levels of brightness, line weights, or blinking graphical elements).

One or both of operations 1570 and 1571 may be performed as part ofoperation 1470, in which the interaction module 230 displays the pop-upwindow 510 while the device 130 is in its locked state. In operation1570, the street map 620 generated in operation 1560 is incorporatedinto the pop-up window 510 (e.g., as shown in FIGS. 6 and 8) anddisplayed as part of the pop-up window 510. The incorporation of thestreet map 620, the display of the street map 620, or both, may be basedon the current activity detected in operation 1410.

In operation 1571, the interaction module 230 causes at least part ofthe lock screen 300 to be obscured by the operable subset of applicationicons (e.g., application icons 410-413) selected in operation 1450,while the device 130 is in its locked state. For example, theinteraction module 230 may superimpose the application icons 410-413(e.g., as selected in operation 1450) over a portion of the lock screen300 (e.g., as shown in FIGS. 4-8). In alternative example embodiments,the interaction module 230 modifies the lock screen 300 itself (e.g., byinserting or otherwise incorporating the application icons 410-413 intothe lock screen 300), in which case nothing is superimposed on themodified lock screen 300 (e.g., the modified lock screen 300 is notobscured).

As shown in FIG. 16, the method 1400 may include one or more ofoperations 1660, 1661, 1662, 1663, 1670, 1680, 1690, and 1691. Operation1660 may be performed as part (e.g., a precursor task, a subroutine, ora portion) of operation 1460, in which the interaction module 230generates the pop-up window 510 (e.g., including some or all of itscontents), while the device 130 is in its locked state. In operation1660, the interaction module 230 generates the sub-window 720 of content(e.g., to have an appearance as discussed above with respect to FIGS. 7and 8). As noted above, the generation of the sub-window 720 of contentmay be based on the current activity detected in operation 1410. Forexample, the interaction module 230 may retrieve content from the servermachine 110 based on the current activity that was detected in operation1410. This retrieval may further be based on a current location of thedevice 130 (e.g., as detected by one or more of the sensors 260 in thedevice 130), and this retrieval may be performed while the device 130 isstill in its locked state. Accordingly, the interaction module 230 mayincorporate the retrieved content (e.g., obtained based on the currentactivity and the current location) into the sub-window 720 of content.

One or more of operations 1661, 1662, and 1663 may be performed as partof operation 1660. In operation 1661, the interaction module 230determines an input parameter usable as input into an application thatcorresponds to the application icon 610 (e.g., a task application)selected for inclusion in the pop-up window 510. The determination ofthe input parameter may be based on the current activity detected inoperation 1410. For example, suppose the current activity is drivinghome from work, and further suppose that the interaction module 230 hasalready selected the application icon 610, which may correspond to atask application, for inclusion in the pop-up window 510. In such asituation, the interaction module 230 may perform operation 1661 bydetermining that the input parameter is the location of the home towhich the user 132 is driving.

In operation 1662, the input parameter determined in operation 1661 isprovided by the interaction module 230 to the task application thatcorresponds to the application icon 610 in order to retrieve orotherwise obtain one or more reminders of tasks that are scheduled to beperformed after arriving home. For example, the interaction module 230may invoke (e.g., execute) the task application based on the inputparameter (e.g., the location of the home of the user 132). This mayalso have the effect of causing the device 130 to execute the taskapplication while the device 130 is still in its locked state.

In operation 1663, one or more outputs of the task application (e.g., afirst application) executed in operation 1662 (e.g., with the inputparameter determined in operation 1661) are incorporated by theinteraction module 230 into the sub-window 720 of content. Accordingly,continuing the previous example, the obtained one or more reminders oftasks scheduled to be performed after arriving home may thus be includedin the sub-window 720 of content and hence displayed in the pop-upwindow 510 when operation 1470 is performed.

Operation 1670 may be performed as part of operation 1470, in which theinteraction module 230 displays the pop-up window 510, while the device130 is in its locked state. In operation 1670, the sub-window 720generated in operation 1660 is incorporated into the pop-up window 510(e.g., as shown in FIGS. 7 and 8) and displayed as part of the pop-upwindow 510. The incorporation of the sub-window 720, the display of thesub-window 720, or both, may be based on the current activity detectedin operation 1410.

As noted above, one or more outputs of a first application (e.g., thetask application) may be submitted by the user 132 as input to a secondapplication (e.g., a restaurant review application) within the lockedscreen GUI. For example, as discussed above with respect to FIG. 8,suppose that the sub-window 720 includes a reminder for the user 132 to“get dinner for family” after arriving home and that the applicationicon 612 visually indicates and corresponds to a restaurant reviewapplication stored on the device 130. In such a situation, the user 132can drag the sub-window 720 to the application icon 612 displayed on thescreen 290 of the device 130, and the interaction module 230 will causeanother application (e.g., a restaurant review application) to beinvoked with the location of the user's 132 home and the keywords“dinner” and “family” as input.

In operation 1680, the interaction module 230 detects this drag input bywhich the sub-window 720 is moved toward (e.g., to) the application icon612, while the device 130 is in its locked state. Continuing the aboveexample, the application icon 612 may correspond to a restaurant reviewapplication that the user 132 wishes to invoke using input from thesub-window 720 (e.g., the location of the home of the user 132, thekeyword “dinner” from the displayed reminder, and the keyword “family”from the displayed reminder). As shown in FIG. 16, the interactionmodule 230 may then perform one or both of operation 1690 and 1691, inany order.

In operation 1690, the interaction module 230 causes the device 130 toexit its locked state and enter its unlocked state. As noted above, inthe unlocked state, the lock screen 300 is not displayed on the screen290 of the device 130. Operation 1690 may be performed in response tothe detecting of the drag input in operation 1680. This may have theeffect of allowing operation 1691 to be performed with the device 130unlocked (e.g., operating in a normal non-locked mode).

In operation 1691, the interaction module 230 causes the device 130 toinvoke (e.g., execute) the restaurant review application (e.g., a secondapplication) that corresponds to the application icon 612 toward (e.g.,to) which the user 132 dragged the sub-window 720. As noted above, therestaurant review application may be invoked with one or more inputparameters obtained from (e.g., included in) the sub-window 720, such asthe location of the home of the user 132, the keyword “dinner” from thedisplayed reminder, and the keyword “family” from the displayedreminder. Operation 1691 may be performed in response to the detectingof the drag input in operation 1680.

As shown in FIG. 17, the method of 1400 may include one or more ofoperations 1780, 1790, and 1791. In operation 1780, the interactionmodule 230 detects that an application icon (e.g., application icon 611)displayed in the pop-up window 510 is operated by the user 132 (e.g., bya tap), while the device 130 is in its locked state. For example, theinteraction module 230 may detect operation of the application icon 611,which may correspond to a messaging application. As shown in FIG. 17,the interaction module 230 may then perform one or both of operations1790 and 1791, in any order.

In operation 1790, the interaction module 230 causes the device 130 toexit its locked state and enter its unlocked state. As discussed above,in the unlocked state, the lock screen 300 is not displayed on thescreen 290 of the device 130. Operation 1790 may be performed inresponse to the detecting of the operation of the application icon 611in operation 1780. This may have the effect of allowing operation 1791to be performed with the device 130 unlocked (e.g., operating in anormal non-locked mode).

In operation 1791, the interaction module 230 causes the device 130 toinvoke (e.g., execute) the messaging application (e.g., a thirdapplication) that corresponds to the application icon 611. Operation1791 may be performed in response to the detecting of the operation ofthe application icon 611 in operation 1780.

In some example embodiments, operation 1520 replaces operation 1780.That is, in such example embodiments, performance of operation 1791(e.g., invoking the messaging application that corresponds to theapplication icon 611) is triggered by the detecting of the voice commandin operation 1520, instead of being triggered by the detecting that theapplication icon 611 has been operated (e.g., tapped) in operation 1780.For example, the voice command detected in operation 1520 may be orinclude the phrase “launch messaging app,” and this interaction module230 may perform operation 1791 by invoking the messaging application inresponse to detection of this voice command.

According to various example embodiments, one or more of themethodologies described herein may facilitate providing a lock screenGUI, including generating and displaying various graphical elements ofthe lock screen GUI (e.g., as shown and described with respect to FIGS.4-8) on the screen 290 of the device 130. Thus, one or more of themethodologies described herein may facilitate quick and convenientaccess to, and invocation of, one or more applications relevant to thecurrent activity of the user 132, while the device 130 is in a lockedstate (e.g., without unlocking the device 130). Moreover, one or more ofthe methodologies described herein may facilitate access to, andinvocation of, one or more applications from the home screen 900 (e.g.,via the folder icon and 1010, as shown and described with respect toFIGS. 9-13). Hence, one or more of the methodologies described hereinmay facilitate faster, simpler, more relevant, more convenient, and moresatisfying usage of the device 130 compared to devices that lack themodules described herein or otherwise are unable to perform themethodologies described herein.

When these effects are considered in aggregate, one or more of themethodologies described herein may obviate a need for certain efforts orresources that otherwise would be involved in providing a lock screenGUI or facilitating the faster, simpler, more relevant, more convenient,and more satisfying usage of the device 130. Efforts expended by a userin accessing and invoking applications on the device 130 may be reducedby use of (e.g., reliance upon) a machine (e.g., device 130) thatimplements one or more of the methodologies described herein. Computingresources used by one or more machines, databases, or devices (e.g.,within the network environment 100) may similarly be reduced (e.g.,compared to machines, databases, or devices that lack one or more themethodologies described herein). Examples of such computing resourcesinclude processor cycles, network traffic, memory usage, data storagecapacity, power consumption, and cooling capacity.

FIG. 18 is a block diagram illustrating components of a machine 1800,according to some example embodiments, able to read instructions 1824from a machine-readable medium 1822 (e.g., a non-transitorymachine-readable medium, a machine-readable storage medium, acomputer-readable storage medium, or any suitable combination thereof)and perform any one or more of the methodologies discussed herein, inwhole or in part. Specifically, FIG. 18 shows the machine 1800 in theexample form of a computer system (e.g., a computer) within which theinstructions 1824 (e.g., software, a program, an application, an applet,an app, or other executable code) for causing the machine 1800 toperform any one or more of the methodologies discussed herein may beexecuted, in whole or in part.

In alternative embodiments, the machine 1800 operates as a standalonedevice or may be communicatively coupled (e.g., networked) to othermachines. In a networked deployment, the machine 1800 may operate in thecapacity of a server machine or a client machine in a server-clientnetwork environment, or as a peer machine in a distributed (e.g.,peer-to-peer) network environment. The machine 1800 may be a servercomputer, a client computer, a personal computer (PC), a tabletcomputer, a laptop computer, a netbook, a cellular telephone, asmartphone, a set-top box (STB), a personal digital assistant (PDA), aweb appliance, a network router, a network switch, a network bridge, orany machine capable of executing the instructions 1824, sequentially orotherwise, that specify actions to be taken by that machine. Further,while only a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute the instructions 1824 to perform all or part of any oneor more of the methodologies discussed herein.

The machine 1800 includes a processor 1802 (e.g., a central processingunit (CPU), a graphics processing unit (GPU), a digital signal processor(DSP), an application specific integrated circuit (ASIC), aradio-frequency integrated circuit (RFIC), or any suitable combinationthereof), a main memory 1804, and a static memory 1806, which areconfigured to communicate with each other via a bus 1808. The processor1802 may contain solid-state digital microcircuits (e.g., electronic,optical, or both) that are configurable, temporarily or permanently, bysome or all of the instructions 1824 such that the processor 1802 isconfigurable to perform any one or more of the methodologies describedherein, in whole or in part. For example, a set of one or moremicrocircuits of the processor 1802 may be configurable to execute oneor more modules (e.g., software modules) described herein. In someexample embodiments, the processor 1802 is a multicore CPU (e.g., adual-core CPU, a quad-core CPU, or a 128-core CPU) within which each ofmultiple cores is a separate processor that is able to perform any oneor more of the methodologies discussed herein, in whole or in part.Although the beneficial effects described herein may be provided by themachine 1800 with at least the processor 1802, these same effects may beprovided by a different kind of machine that contains no processors(e.g., a purely mechanical system, a purely hydraulic system, or ahybrid mechanical-hydraulic system), if such a processor-less machine isconfigured to perform one or more of the methodologies described herein.

The machine 1800 may further include a graphics display 1810 (e.g., aplasma display panel (PDP), a light emitting diode (LED) display, aliquid crystal display (LCD), a projector, a cathode ray tube (CRT), orany other display capable of displaying graphics or video). The graphicsdisplay 1810 may form all or part of the screen 290. The machine 1800may also include an alphanumeric input device 1812 (e.g., a keyboard orkeypad), a cursor control device 1814 (e.g., a mouse, a touchpad, atrackball, a joystick, a motion sensor, an eye tracking device, or otherpointing instrument), a storage unit 1816, an audio generation device1818 (e.g., a sound card, an amplifier, a speaker, a headphone jack, orany suitable combination thereof), and a network interface device 1820.

The storage unit 1816 includes the machine-readable medium 1822 (e.g., atangible and non-transitory machine-readable storage medium) on whichare stored the instructions 1824 embodying any one or more of themethodologies or functions described herein. The instructions 1824 mayalso reside, completely or at least partially, within the main memory1804, within the processor 1802 (e.g., within the processor's cachememory), or both, before or during execution thereof by the machine1800. Accordingly, the main memory 1804 and the processor 1802 may beconsidered machine-readable media (e.g., tangible and non-transitorymachine-readable media). The instructions 1824 may be transmitted orreceived over the network 190 via the network interface device 1820. Forexample, the network interface device 1820 may communicate theinstructions 1824 using any one or more transfer protocols (e.g.,hypertext transfer protocol (HTTP)).

In some example embodiments, the machine 1800 may be a portablecomputing device, such as a smart phone or tablet computer, and have oneor more additional input components 1830 (e.g., sensors or gauges).Examples of such input components 1830 include an image input component(e.g., one or more cameras), an audio input component (e.g., amicrophone), a direction input component (e.g., a compass), a locationinput component (e.g., a global positioning system (GPS) receiver), anorientation component (e.g., a gyroscope), a motion detection component(e.g., one or more accelerometers), an altitude detection component(e.g., an altimeter), and a gas detection component (e.g., a gassensor). Inputs harvested by any one or more of these input componentsmay be accessible and available for use by any of the modules describedherein.

As used herein, the term “memory” refers to a machine-readable mediumable to store data temporarily or permanently and may be taken toinclude, but not be limited to, random-access memory (RAM), read-onlymemory (ROM), buffer memory, flash memory, and cache memory. While themachine-readable medium 1822 is shown in an example embodiment to be asingle medium, the term “machine-readable medium” should be taken toinclude a single medium or multiple media (e.g., a centralized ordistributed database, or associated caches and servers) able to storeinstructions. The term “machine-readable medium” shall also be taken toinclude any medium, or combination of multiple media, that is capable ofstoring the instructions 1824 for execution by the machine 1800, suchthat the instructions 1824, when executed by one or more processors ofthe machine 1800 (e.g., processor 1802), cause the machine 1800 toperform any one or more of the methodologies described herein, in wholeor in part. Accordingly, a “machine-readable medium” refers to a singlestorage apparatus or device, as well as cloud-based storage systems orstorage networks that include multiple storage apparatus or devices. Theterm “machine-readable medium” shall accordingly be taken to include,but not be limited to, one or more tangible and non-transitory datarepositories (e.g., data volumes) in the example form of a solid-statememory chip, an optical disc, a magnetic disc, or any suitablecombination thereof. A “non-transitory” machine-readable medium, as usedherein, specifically does not include propagating signals per se. Insome example embodiments, the instructions 1824 for execution by themachine 1800 may be communicated by a carrier medium. Examples of such acarrier medium include a storage medium (e.g., a non-transitorymachine-readable storage medium, such as a solid-state memory, beingphysically moved from one place to another place) and a transient medium(e.g., a propagating signal that communicates the instructions 1824).

Certain embodiments are described herein as including logic or a numberof components, modules, or mechanisms. Modules may constitute softwaremodules (e.g., code stored or otherwise embodied on a machine-readablemedium or in a transmission medium), hardware modules, or any suitablecombination thereof. A “hardware module” is a tangible (e.g.,non-transitory) unit capable of performing certain operations and may beconfigured or arranged in a certain physical manner. In various exampleembodiments, one or more computer systems (e.g., a standalone computersystem, a client computer system, or a server computer system) or one ormore hardware modules of a computer system (e.g., a processor or a groupof processors) may be configured by software (e.g., an application orapplication portion) as a hardware module that operates to performcertain operations as described herein.

In some embodiments, a hardware module may be implemented mechanically,electronically, or any suitable combination thereof. For example, ahardware module may include dedicated circuitry or logic that ispermanently configured to perform certain operations. For example, ahardware module may be a special-purpose processor, such as a fieldprogrammable gate array (FPGA) or an ASIC. A hardware module may alsoinclude programmable logic or circuitry that is temporarily configuredby software to perform certain operations. For example, a hardwaremodule may include software encompassed within a CPU or otherprogrammable processor. It will be appreciated that the decision toimplement a hardware module mechanically, in dedicated and permanentlyconfigured circuitry, or in temporarily configured circuitry (e.g.,configured by software) may be driven by cost and time considerations.

Accordingly, the phrase “hardware module” should be understood toencompass a tangible entity, and such a tangible entity may bephysically constructed, permanently configured (e.g., hardwired), ortemporarily configured (e.g., programmed) to operate in a certain manneror to perform certain operations described herein. As used herein,“hardware-implemented module” refers to a hardware module. Consideringembodiments in which hardware modules are temporarily configured (e.g.,programmed), each of the hardware modules need not be configured orinstantiated at any one instance in time. For example, where a hardwaremodule comprises a CPU configured by software to become aspecial-purpose processor, the CPU may be configured as respectivelydifferent special-purpose processors (e.g., each included in a differenthardware module) at different times. Software (e.g., a software module)may accordingly configure one or more processors, for example, toconstitute a particular hardware module at one instance of time and toconstitute a different hardware module at a different instance of time.

Hardware modules can provide information to, and receive informationfrom, other hardware modules. Accordingly, the described hardwaremodules may be regarded as being communicatively coupled. Where multiplehardware modules exist contemporaneously, communications may be achievedthrough signal transmission (e.g., over appropriate circuits and buses)between or among two or more of the hardware modules. In embodiments inwhich multiple hardware modules are configured or instantiated atdifferent times, communications between such hardware modules may beachieved, for example, through the storage and retrieval of informationin memory structures to which the multiple hardware modules have access.For example, one hardware module may perform an operation and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware module may then, at a latertime, access the memory device to retrieve and process the storedoutput. Hardware modules may also initiate communications with input oroutput devices, and can operate on a resource (e.g., a collection ofinformation).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions describedherein. Accordingly, the operations described herein may be at leastpartially processor-implemented, since a processor is an example ofhardware. For example, at least some operations of any method may beperformed by one or more processor-implemented modules. As used herein,“processor-implemented module” refers to a hardware module in which thehardware includes one or more processors. Moreover, the one or moreprocessors may also operate to support performance of the relevantoperations in a “cloud computing” environment or as a “software as aservice” (SaaS). For example, at least some of the operations may beperformed by a group of computers (as examples of machines includingprocessors), with these operations being accessible via a network (e.g.,the Internet) and via one or more appropriate interfaces (e.g., anapplication program interface (API)).

Throughout this specification, plural instances may implementcomponents, operations, or structures described as a single instance.Although individual operations of one or more methods are illustratedand described as separate operations, one or more of the individualoperations may be performed concurrently, and nothing requires that theoperations be performed in the order illustrated. Structures andfunctionality presented as separate components in example configurationsmay be implemented as a combined structure or component. Similarly,structures and functionality presented as a single component may beimplemented as separate components. These and other variations,modifications, additions, and improvements fall within the scope of thesubject matter herein.

The performance of certain operations may be distributed among the oneor more processors, whether residing only within a single machine ordeployed across a number of machines. In some example embodiments, theone or more processors or hardware modules (e.g., processor-implementedmodules) may be located in a single geographic location (e.g., within ahome environment, an office environment, or a server farm). In otherexample embodiments, the one or more processors or hardware modules maybe distributed across a number of geographic locations.

Some portions of the subject matter discussed herein may be presented interms of algorithms or symbolic representations of operations on datastored as bits or binary digital signals within a machine memory (e.g.,a computer memory). Such algorithms or symbolic representations areexamples of techniques used by those of ordinary skill in the dataprocessing arts to convey the substance of their work to others skilledin the art. As used herein, an “algorithm” is a self-consistent sequenceof operations or similar processing leading to a desired result. In thiscontext, algorithms and operations involve physical manipulation ofphysical quantities. Typically, but not necessarily, such quantities maytake the form of electrical, magnetic, or optical signals capable ofbeing stored, accessed, transferred, combined, compared, or otherwisemanipulated by a machine. It is convenient at times, principally forreasons of common usage, to refer to such signals using words such as“data,” “content,” “bits,” “values,” “elements,” “symbols,”“characters,” “terms,” “numbers,” “numerals,” or the like. These words,however, are merely convenient labels and are to be associated withappropriate physical quantities.

Unless specifically stated otherwise, discussions herein using wordssuch as “processing,” “computing,” “calculating,” “determining,”“presenting,” “displaying,” or the like may refer to actions orprocesses of a machine (e.g., a computer) that manipulates or transformsdata represented as physical (e.g., electronic, magnetic, or optical)quantities within one or more memories (e.g., volatile memory,non-volatile memory, or any suitable combination thereof), registers, orother machine components that receive, store, transmit, or displayinformation. Furthermore, unless specifically stated otherwise, theterms “a” or “an” are herein used, as is common in patent documents, toinclude one or more than one instance. Finally, as used herein, theconjunction “or” refers to a non-exclusive “or,” unless specificallystated otherwise.

The following enumerated embodiments describe various exampleembodiments of methods, machine-readable media, and systems (e.g.,apparatus) discussed herein.

A first embodiment provides a method comprising:

by a detection module comprising one or more processors of a device,detecting a current activity in which a user of the device is engagedwhile the device is in a locked state, the locked state causing a screenof the device to display a lock screen that prevents the user fromaccessing a set of home screens in which application icons are displayedand operable to initiate executions of applications by the device, thedetecting of the current activity being based on context data generatedby a set of sensors within the device;by an icon module comprising one or more processors of the device,selecting an activity icon from a set of activity icons based on thecurrent activity of the user and causing the selected activity icon tobe displayed on the screen while the device is in the locked state, theactivity icon being operable to cause display of a pop-up window thatcorresponds to the activity icon while the device is in the lockedstate; andby an interaction module comprising one or more processors of thedevice:detecting that the displayed activity icon is operated by the user;selecting a subset of the application icons from the set of home screensbased on the activity icon operated by the user; andresponsive to operation of the activity icon, generating and displayingthe pop-up window that corresponds to the activity icon while the deviceis in the locked state, the pop-up window displaying the selected subsetof the application icons and enabling operation of the selected subsetof application icons while the device is in the locked state.

A second embodiment provides a method according to the first embodiment,wherein:

the displaying of the pop-up window causes at least part of the lockscreen to be obscured by the selected subset of the application iconswhile the device is in the locked state.

A third embodiment provides a method according to the first or secondembodiment, wherein:

the generating and displaying of the pop-up window includes generatingand displaying a street map within the pop-up window based on thecurrent activity of the user while the device is in the locked state.

A fourth embodiment provides a method according to the third embodiment,wherein:

the generating of the street map includes determining a zoom level ofthe street map based on the current activity of the user.

A fifth embodiment provides a method according to the third or fourthembodiments, wherein:

the generating of the street map includes determining a travel routefrom a start location to an end location based on the current activityof the user and highlighting the travel route in the street map.

A sixth embodiment provides a method according to any of the firstthrough fifth embodiments, wherein:

the generating and displaying of the pop-up window includes generatingand displaying a sub-window of content within the pop-up window based onthe current activity of the user while the device is in the lockedstate.

A seventh embodiment provides a method according to the sixthembodiment, wherein:

the generating of the sub-window of content includes:retrieving content from a server machine based on the current activityof the user and based on a current location of the device while thedevice is in the locked state; andincorporating the retrieved content into the sub-window of content.

An eighth embodiment provides a method according to the sixth or seventhembodiments, wherein:

the generating of the sub-window of content includes:determining an input parameter based on the current activity of theuser;causing the device to execute an application based on the inputparameter while the device is in the locked state; andincorporating an output of the application executed based on the inputparameter into the sub-window of content.

A ninth embodiment provides a method according to the eighth embodiment,wherein:

the application executed based on the input parameter is a firstapplication; and the method further comprises:detecting a drag input by which the sub-window of content is movedtoward an application icon among the subset of application iconsdisplayed in the pop-up window while the device is in the locked state,the application icon corresponding to a second application; andcausing the device to execute the second application based on the outputof the first application incorporated into the sub-window content.

A tenth embodiment provides a method according to the ninth embodiment,further comprising:

responsive to the detecting of the drag input by which the sub-windowcontent is moved toward the application icon, causing the device to exitthe locked state and enter an unlocked state in which the lock screen isnot displayed on the screen of the device.

An eleventh embodiment provides a method according to the first througheighth embodiments, further comprising:

detecting that an application icon among the subset of the applicationicons displayed in the pop-up window is operated by the user while thedevice is in the locked state; andresponsive to the application icon being operated while the device is inthe locked state, causing the device to execute an application thatcorresponds to the operated application icon.

A twelfth embodiment provides a method according to the eleventhembodiment, further comprising:

responsive to the application icon being operated while the device is inthe locked state, causing the device to exit the locked state and enteran unlocked state in which the lock screen is not displayed on thescreen of the device.

A thirteenth embodiment provides a method according to any of the firstthrough twelfth embodiments, further comprising:

detecting a voice command spoken by the user while the device is in thelocked state; and whereinthe causing of the selected activity icon to be displayed on the screenwhile the device is in the locked state is responsive to the voicecommand.

A fourteenth embodiment provides a method according to the thirteenthembodiment, wherein:

the selecting of the activity icon from the set of activity icons basedon the current activity of the user is further based on the voicecommand detected while the device is in the locked state.

A fifteenth embodiment provides a method according to any of the firstthrough fourteenth embodiments, wherein:

the detecting of the current activity is based on the context datagenerated by the set of sensors within the device, a preference of theuser, and a log of activity data stored by the device.

A sixteenth embodiment provides a method according to any of the firstthrough fifteenth embodiments, wherein:

the detecting of the current activity includes detecting a transition tothe current activity from a previous activity in which the user of thedevice was engaged.

A seventeenth embodiment provides a method according to any of the firstthrough sixteenth embodiments, wherein:

the detecting of the current activity is further based on at least oneof application usage data stored by the device or applicationinstallation data stored by the device, the application usage dataindicating at least one of executions of applications by the device orterminations of applications on the device, the application installationdata indicating at least one of installations of applications on thedevice or removals of applications from the device.

An eighteenth embodiment provides a machine-readable medium (e.g., anon-transitory machine-readable storage medium) comprising instructionsthat, when executed by one or more processors of a machine, cause themachine to perform operations comprising:

by a detection module comprising one or more processors of the machine(e.g., a device), detecting a current activity in which a user of themachine is engaged while the machine is in a locked state, the lockedstate causing a screen of the machine to display a lock screen thatprevents the user from accessing a set of home screens in whichapplication icons are displayed and operable to initiate executions ofapplications by the machine, the detecting of the current activity beingbased on context data generated by a set of sensors within the machine;by a detection module comprising one or more processors of the machine,selecting an activity icon from a set of activity icons based on thecurrent activity of the user and causing the selected activity icon tobe displayed on the screen while the machine is in the locked state, theactivity icon being operable to cause display of a pop-up window thatcorresponds to the activity icon while the machine is in the lockedstate; andby an interaction module comprising one or more processors of themachine:detecting that the displayed activity icon is operated by the user;selecting a subset of the application icons from the set of home screensbased on the activity icon operated by the user; andresponsive to operation of the activity icon, generating and displayingthe pop-up window that corresponds to the activity icon while themachine is in the locked state, the pop-up window displaying theselected subset of the application icons and enabling operation of theselected subset of application icons while the machine is in the lockedstate.

A nineteenth embodiment provides a machine-readable medium according tothe eighteenth embodiment, wherein:

the displaying of the pop-up window causes at least part of the lockscreen to be obscured by the selected subset of the application iconswhile the machine is in the locked state.

A twentieth embodiment provides a system comprising:

processors;a detection module comprising one or more of the processors andconfigured to detect a current activity in which a user of a device isengaged while the device is in a locked state, the locked state causinga screen of the device to display a lock screen that prevents the userfrom accessing a set of home screens in which application icons aredisplayed and operable to initiate executions of applications by thedevice, the detecting of the current activity being based on contextdata generated by a set of sensors within the device;an icon module comprising one or more of the processors and configuredto select an activity icon from a set of activity icons based on thecurrent activity of the user and causing the selected activity icon tobe displayed on the screen while the device is in the locked state, theactivity icon being operable to cause display of a pop-up window thatcorresponds to the activity icon while the device is in the lockedstate; andan interaction module comprising one or more of the processors andconfigured to:detect that the displayed activity icon is operated by the user;select a subset of the application icons from the set of home screensbased on the activity icon operated by the user; andresponsive to operation of the activity icon, generate and display thepop-up window that corresponds to the activity icon while the device isin the locked state, the pop-up window displaying the selected subset ofthe application icons and enabling operation of the selected subset ofapplication icons while the device is in the locked state.

A twenty-first embodiment provides a system according to the twentiethembodiment, wherein:

the interaction module, in being configured to display the pop-upwindow, is further configured to cause at least part of the lock screento be obscured by the selected subset of the application icons while thedevice is in the locked state.

A twenty-second embodiment provides a carrier medium carryingmachine-readable instructions for controlling a machine to carry out themethod of any one of the previously described embodiments.

What is claimed is:
 1. A method comprising: by a detection modulecomprising one or more processors of a device, detecting a currentactivity in which a user of the device is engaged while the device is ina locked state, the locked state causing a screen of the device todisplay a lock screen that prevents the user from accessing a set ofhome screens in which application icons are displayed and operable toinitiate executions of applications by the device, the detecting of thecurrent activity being based on context data generated by a set ofsensors within the device; by an icon module comprising one or moreprocessors of the device, selecting an activity icon from a set ofactivity icons based on the current activity of the user and causing theselected activity icon to be displayed on the screen while the device isin the locked state, the activity icon being operable to cause displayof a pop-up window that corresponds to the activity icon while thedevice is in the locked state; and by an interaction module comprisingone or more processors of the device: detecting that the displayedactivity icon is operated by the user; selecting a subset of theapplication icons from the set of home screens based on the activityicon operated by the user; and responsive to operation of the activityicon, generating and displaying the pop-up window that corresponds tothe activity icon while the device is in the locked state, the pop-upwindow displaying the selected subset of the application icons andenabling operation of the selected subset of application icons while thedevice is in the locked state.
 2. The method of claim 1, wherein: thedisplaying of the pop-up window causes at least part of the lock screento be obscured by the selected subset of the application icons while thedevice is in the locked state.
 3. The method of claim 1, wherein: thegenerating and displaying of the pop-up window includes generating anddisplaying a street map within the pop-up window based on the currentactivity of the user while the device is in the locked state.
 4. Themethod of claim 3, wherein: the generating of the street map includesdetermining a zoom level of the street map based on the current activityof the user.
 5. The method of claim 3, wherein: the generating of thestreet map includes determining a travel route from a start location toan end location based on the current activity of the user andhighlighting the travel route in the street map.
 6. The method of claim1, wherein: the generating and displaying of the pop-up window includesgenerating and displaying a sub-window of content within the pop-upwindow based on the current activity of the user while the device is inthe locked state.
 7. The method of claim 6, wherein: the generating ofthe sub-window of content includes: retrieving content from a servermachine based on the current activity of the user and based on a currentlocation of the device while the device is in the locked state; andincorporating the retrieved content into the sub-window of content. 8.The method of claim 6, wherein: the generating of the sub-window ofcontent includes: determining an input parameter based on the currentactivity of the user; causing the device to execute an application basedon the input parameter while the device is in the locked state; andincorporating an output of the application executed based on the inputparameter into the sub-window of content.
 9. The method of claim 8,wherein: the application executed based on the input parameter is afirst application; and the method further comprises: detecting a draginput by which the sub-window of content is moved toward an applicationicon among the subset of application icons displayed in the pop-upwindow while the device is in the locked state, the application iconcorresponding to a second application; and causing the device to executethe second application based on the output of the first applicationincorporated into the sub-window content.
 10. The method of claim 9,further comprising: responsive to the detecting of the drag input bywhich the sub-window content is moved toward the application icon,causing the device to exit the locked state and enter an unlocked statein which the lock screen is not displayed on the screen of the device.11. The method of claim 1, further comprising: detecting that anapplication icon among the subset of the application icons displayed inthe pop-up window is operated by the user while the device is in thelocked state; and responsive to the application icon being operatedwhile the device is in the locked state, causing the device to executean application that corresponds to the operated application icon. 12.The method of claim 11, further comprising: responsive to theapplication icon being operated while the device is in the locked state,causing the device to exit the locked state and enter an unlocked statein which the lock screen is not displayed on the screen of the device.13. The method of claim 1, further comprising: detecting a voice commandspoken by the user while the device is in the locked state; and whereinthe causing of the selected activity icon to be displayed on the screenwhile the device is in the locked state is responsive to the voicecommand.
 14. The method of claim 13, wherein: the selecting of theactivity icon from the set of activity icons based on the currentactivity of the user is further based on the voice command detectedwhile the device is in the locked state.
 15. The method of claim 1,wherein: the detecting of the current activity is based on the contextdata generated by the set of sensors within the device, a preference ofthe user, and a log of activity data stored by the device.
 16. Themethod of claim 1, wherein: the detecting of the current activityincludes detecting a transition to the current activity from a previousactivity in which the user of the device was engaged.
 17. The method ofclaim 1, wherein: the detecting of the current activity is further basedon at least one of application usage data stored by the device orapplication installation data stored by the device, the applicationusage data indicating at least one of executions of applications by thedevice or terminations of applications on the device, the applicationinstallation data indicating at least one of installations ofapplications on the device or removals of applications from the device.18. A non-transitory machine-readable storage medium comprisinginstructions that, when executed by one or more processors of a machine,cause the machine to perform operations comprising: by a detectionmodule comprising one or more processors of the machine, detecting acurrent activity in which a user of the machine is engaged while themachine is in a locked state, the locked state causing a screen of themachine to display a lock screen that prevents the user from accessing aset of home screens in which application icons are displayed andoperable to initiate executions of applications by the machine, thedetecting of the current activity being based on context data generatedby a set of sensors within the machine; by a detection module comprisingone or more processors of the machine, selecting an activity icon from aset of activity icons based on the current activity of the user andcausing the selected activity icon to be displayed on the screen whilethe machine is in the locked state, the activity icon being operable tocause display of a pop-up window that corresponds to the activity iconwhile the machine is in the locked state; and by an interaction modulecomprising one or more processors of the machine: detecting that thedisplayed activity icon is operated by the user; selecting a subset ofthe application icons from the set of home screens based on the activityicon operated by the user; and responsive to operation of the activityicon, generating and displaying the pop-up window that corresponds tothe activity icon while the machine is in the locked state, the pop-upwindow displaying the selected subset of the application icons andenabling operation of the selected subset of application icons while themachine is in the locked state.
 19. The non-transitory machine-readablestorage medium of claim 18, wherein: the displaying of the pop-up windowcauses at least part of the lock screen to be obscured by the selectedsubset of the application icons while the machine is in the lockedstate.
 20. A system comprising: processors; a detection modulecomprising one or more of the processors and configured to detect acurrent activity in which a user of a device is engaged while the deviceis in a locked state, the locked state causing a screen of the device todisplay a lock screen that prevents the user from accessing a set ofhome screens in which application icons are displayed and operable toinitiate executions of applications by the device, the detecting of thecurrent activity being based on context data generated by a set ofsensors within the device; an icon module comprising one or more of theprocessors and configured to select an activity icon from a set ofactivity icons based on the current activity of the user and causing theselected activity icon to be displayed on the screen while the device isin the locked state, the activity icon being operable to cause displayof a pop-up window that corresponds to the activity icon while thedevice is in the locked state; and an interaction module comprising oneor more of the processors and configured to: detect that the displayedactivity icon is operated by the user; select a subset of theapplication icons from the set of home screens based on the activityicon operated by the user; and responsive to operation of the activityicon, generate and display the pop-up window that corresponds to theactivity icon while the device is in the locked state, the pop-up windowdisplaying the selected subset of the application icons and enablingoperation of the selected subset of application icons while the deviceis in the locked state.
 21. The system of claim 20, wherein: theinteraction module, in being configured to display the pop-up window, isfurther configured to cause at least part of the lock screen to beobscured by the selected subset of the application icons while thedevice is in the locked state.