Systems and Methods for Continual Speech Recognition and Detection in Mobile Computing Devices

ABSTRACT

The present application describes systems, articles of manufacture, and methods for continuous speech recognition for mobile computing devices. One embodiment includes determining whether a mobile computing device is receiving operating power from an external power source or a battery power source, and activating a trigger word detection subroutine in response to determining that the mobile computing device is receiving power from the external power source. In some embodiments, the trigger word detection subroutine operates continually while the mobile computing device is receiving power from the external power source. The trigger word detection subroutine includes determining whether a plurality of spoken words received via a microphone includes one or more trigger words, and in response to determining that the plurality of spoken words includes at least one trigger word, launching an application corresponding to the at least one trigger word included in the plurality of spoken words.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims priority to U.S. Provisional ApplicationNo. 61/542,074, filed on Sep. 30, 2011, the contents of which areentirely incorporated herein by reference, as if fully set forth in thisapplication.

BACKGROUND

Typically, activating a voice command interface on a mobile computingdevice requires some physical activation of the voice command interfaceby a user. For example, to activate a voice command interface on amobile computing device, a user may be required to press or hold aphysical button or switch on the exterior of the mobile computingdevice, or the user may be required to activate a virtual button orswitch on a graphical user interface associated with the mobilecomputing device.

SUMMARY

Controlling a mobile computing device via voice commands is often usefulwhen a user cannot easily interact with the mobile computing devicephysically. For example, controlling a mobile computing device via voicecommands can be useful when the user is driving a car or when the mobilecomputing device is some distance from the user (e.g., across the roomor otherwise out of the user's immediate reach).

A voice command interface for controlling a mobile computing devicegenerally requires operating a microphone or other speech input deviceto receive speech from a user, and running speech recognition anddetection algorithms on the mobile computing device to detect andrecognize speech received via the microphone. However, continuallyoperating a microphone and continually running speech detection andrecognition applications on a mobile computing device may be undesirablein many situations because the power required to operate the microphoneand continually execute the detection and recognition applications canrapidly deplete the mobile computing device's battery.

The present application discloses systems and methods that allow a userto enjoy the advantages of controlling a mobile computing device viavoice commands without the limitations of having to either press or holda physical button or switch on the mobile computing device or manuallyactivate a virtual button or switch on a graphical user interface of themobile computing device as required with existing devices.

In operation, a mobile computing device according to some embodiments ofthe disclosed systems and methods is configured to (i) detect couplingto an external power source, and (ii) in response to the detecting,activate a speech recognition mode. Some embodiments include a powermonitoring routine for detecting coupling to an external power source.Likewise, in some embodiments, a mobile computing device operating in aspeech recognition mode may include a trigger word detection subroutine.The combination of detecting the coupling to the external power sourceand activating the speech recognition mode enables the disclosedembodiments to overcome the limitations of existing devices withnegligible impact on the mobile computing device's battery in mostsituations.

Some embodiments include determining whether the mobile computing deviceis receiving operating power either from an external power source orfrom a battery. If the mobile computing device is receiving power fromthe external power source, then the mobile computing device activates aspeech recognition mode. In some embodiments, the speech recognitionmode includes a trigger word detection subroutine. The external powersource may be a wall charger for the mobile computing device or adocking station for the mobile computing device, such as a desktop orcar-based docking station. Some embodiments may also include exitingfrom the speech recognition mode (and/or perhaps deactivating triggerword detection subroutine) when the mobile computing device is receivingoperating power from the battery.

In operation, the trigger word detection subroutine includes determiningwhether spoken words received via a microphone include at least onetrigger word of a set of one or more trigger words. In response todetermining that the spoken words include at least one trigger word, thetrigger word detection subroutine launches an application correspondingto the at least one trigger word included in the spoken words. In someembodiments, the trigger word detection subroutine operates continuallyas long as the mobile computing device continues to receive power fromthe external power source.

In some embodiments, the launched application corresponding to thedetected trigger word (or words) may be a voice command promptconfigured to receive a voice command from a user. When the voicecommand prompt is launched, a user may control the mobile computingdevice via one or more voice commands. The voice command after thetrigger word (or words) may include an action and an object of theaction. For example, the trigger word to launch the voice command promptapplication may be “Android,” and the voice command may include “call”(action) and “Jane Smith” (the object of the action). The voice commandcould include additional words as described herein.

In other embodiments, the launched application may be a particularcommunications application, multimedia application, or an applicationfor configuring settings of the mobile computing device. In theseembodiments, the trigger word could even be the name of the application.For example, the trigger word to launch the phone dialer may be “call.”In response to detecting the trigger word “call,” the mobile computingdevice may be configured to launch the phone dialer and then either (i)wait to receive the name of the desired called party or (ii) use thewords following the “call” trigger word as the name of the desiredcalled party. The phone dialer (or other launched application) could beconfigured to receive additional voice commands after it is launched.The types of commands may vary depending on the particular applicationas described herein.

In some embodiments, the trigger word detection routine may be launchedin response to coupling the device to the external power source and notin response to any other type of input (e.g., touch input, manual buttonpress, etc.). In these embodiments, the speech recognition mode and/ortrigger word detection routine may be activated automatically only whenthe mobile computing device is receiving power from an external powersource. In some embodiments, the speech recognition mode may beactivated only when the mobile computing device is receiving operatingpower from an external power source, and the speech recognition mode mayalways be deactivated when the mobile computing device is receivingoperating power from a battery.

Other embodiments may include receiving a manual input from a user toactivate (or deactivate) the trigger word detection subroutineregardless of whether the mobile computing device is receiving operatingpower from the external power source or the battery. In theseembodiments, the mobile computing device may still activate a triggerword detection subroutine even though the mobile computing device may bereceiving operating power from the battery. When the trigger worddetection subroutine is manually activated by the user (e.g., touchinput, manual button press, etc.), the trigger word detection subroutinemay still operate continually while the mobile computing device isreceiving power from the battery.

In some embodiments, the features and functions of the disclosed methodsmay be integrated with the operating system of the mobile computingdevice. In other embodiments, the features and functions of thedisclosed embodiments may be components of an application that isinstalled and executed by the mobile computing device, such anapplication downloaded from an online application store.

Any of the methods described herein may be implemented in the form ofinstructions stored on a non-transitory, tangible computer readablemedia. When executed by a mobile computing device, the instructions maycause the mobile computing device to perform one or more functions ofthe disclosed method. Further examples may also include articles ofmanufacture including tangible, non-transitory computer-readable mediathat have computer-readable instructions encoded thereon. Theinstructions may comprise instructions to perform one or more functionsof the methods described herein.

The computer readable media may include non-transitory computer readablemedia, such as computer-readable media that stores data for shortperiods of time like register memory, processor cache, and Random AccessMemory (RAM). The computer readable media may also includenon-transitory media, such as secondary or persistent long term storage,like read only memory (ROM), optical or magnetic disks, or compact-discread only memory (CD-ROM), for example. The computer readable media mayalso be any other volatile or non-volatile storage system. In someembodiments, the computer readable media may be considered a computerreadable storage media, for example, or a tangible storage media.

In addition, some aspects of the disclosed methods may be performed bycircuitry configured to perform logical functions in any of theprocesses or methods described herein. In still further examples, manytypes of devices may be used or configured to perform logical functionsin any of the processes or methods described herein. In yet furtherexamples, many types of devices (and/or components or sub-components ofthe devices) may be used or configured as means for performing functionsof any of the methods described herein (or any portions of the methodsdescribed herein).

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 shows an example of a simplified block diagram of a mobilecomputing device according to some embodiments.

FIG. 2A shows an example algorithm for a power detection routineaccording to some embodiments.

FIG. 2B shows an example algorithm of a trigger word detectionsubroutine according to some embodiments.

FIGS. 3A-3C show examples of a mobile computing device 300 launchingapplications in response to detecting trigger words according to someembodiments.

FIG. 4 shows an example method according to some embodiments.

FIG. 5 shows an example method according to some embodiments.

DETAILED DESCRIPTION

The following detailed description includes references to theaccompanying figures. In the figures, similar symbols typically identifysimilar components, unless context dictates otherwise. The exampleembodiments outlined in the detailed description, figures, and claimsare not meant to be limiting. Other embodiments may be utilized, andother changes may be made, without departing from the scope of thesubject matter presented herein. It will be readily understood that theaspects of the present disclosure, as generally described herein, andillustrated in the figures, can be arranged, substituted, combined,separated, and designed in a wide variety of different configurations,all of which are contemplated herein.

FIG. 1 shows an example of a simplified block diagram of a mobilecomputing device 100 according to some embodiments. In some embodiments,the mobile computing device 100 may be a mobile telephone, cellulartelephone, smartphone or similar mobile communications device now knownor later developed that may be controlled via voice commands. In otherembodiments, the mobile computing device 100 may be a laptop computer,tablet computer, or other type of mobile computing device now known orlater developed that may be controlled via voice commands.

The mobile computing device 100 includes a plurality of components, suchas one or more processors 101, data storage 102, power managementsub-system 103, user input/output interfaces 104, communicationsinterfaces 105, and sensors 106. The individual components are connectedvia one or more data busses 115 or similar communications connectionsthat are configured to enable the individual components to send andreceive data to and from other components of the mobile computing device100. The individual components are also connected to the powermanagement sub-system 103 via a power distribution bus 116 or similarconnection that is configured to provide operating power to theindividual components of the mobile computing device 100.

The one or more processors 101 may include any type of general purposeprocessor (e.g., processors from Intel, Advanced Micro Devices (AMD),etc.) or any type of special purpose processors (e.g., applicationspecific integrated circuits (ASICs), digital signal processors (DSP),Coder/Decoders (CODECs), etc.) now known or later developed.

The data storage 102 is configured to store data as well ascomputer-readable program instructions 108. The data storage 102 mayinclude any of the types of data storage described herein, includingshort term volatile memory (e.g., RAM) for storing data and/or programcode or instructions during execution of the program code orinstructions and/or longer-term non-volatile memory (e.g., ROM) forstoring data and/or program code or instructions. In some embodiments,the data storage may be implemented as solid state and/or flash memoryor other similar types of small form factor storage media.

The power management sub-system 103 includes a battery power interface112, an external power interface 113, and a power source selector 114.The battery power interface 112 is configured to receive operating powerfrom a battery source, such as an internal battery, a removable batterythat is electrically coupled to the mobile computing device 100, or anyother sort of battery or similar type of portable power supply now knownor later developed. The battery that supplies operating power for themobile computing device 100 via the battery interface 112 may berechargeable or non-rechargeable.

The external power interface 113 is configured to receive power from anexternal power source for the mobile computing device 100. Examples ofexternal power sources include electrical wall outlets, desktop dockingstations, car docking stations or power cables, alarm clocks orentertainment systems with docking stations, or any other type ofconnection or device that is configured to provide the mobile computingdevice 100 with operating power so that the mobile computing device 100does not need to rely on operating power from a battery via the batteryinterface 112.

In some embodiments, the power source selector 114 may be configured toselectively provide operating power from one of the battery interface112 or the external power interface 113. In embodiments withrechargeable batteries, when an external power source is connected viathe external power interface 113, the power source selector 114 may beconfigured to both (i) provide operating power to the mobile computingdevice 100 from the external power supply via the external powerinterface 113 and (ii) charge the battery with power from the externalpower supply by providing an electrical connection from the externalpower interface 113 to the battery interface 112.

The user input/output interfaces 104 include a plurality of input andoutput components, such as sound input/output components 107, displayinput/output components 108, and an optional keyboard 109. The soundcomponents 107 may include a microphone or other similar type of sounddetection device now known or later developed that is configured todetect and receive sound waves. The sound components 107 may alsoinclude one or more speakers or similar sound generation devices nowknown or later developed that are configured to generate sound waves.

The display input/output components 108 may include a Liquid CrystalDisplay (LCD), plasma display, or similar type of display device nowknown or later developed that is configured to display a graphical userinterface and/or other information to a user. In some embodiments, thedisplay 108 may include a touch-screen interface or othertouch-sensitive components to enable a user to enter commands or otherinformation (or otherwise interact with) the mobile computing device100. In some embodiments, the display 108 may be configured to generateand display a virtual keyboard for data entry by a user. In otherembodiments, the mobile computing device 100 may optionally include aphysical keyboard 109. However, a keyboard (virtual or physical) is notrequired in all embodiments. Some embodiments may also include one ormore external switches or buttons (not shown) to turn the mobilecomputing device 100 on or off, to wake the device from a sleep state,to control volume or other similar functions.

The communications interfaces 105 may include one or more wirelesscommunications interfaces 110 and one or more wired interfaces 111. Thewireless interfaces 110 may include any type of wireless communicationsinterface configured to transmit and receive data according to any of anumber of different wireless communications protocols, such asBluetooth, IEEE 802.11 (IEEE 802.11 may refer to IEEE 802.11-2007, IEEE802.11n-2009, or any other IEEE 802.11 revision) or other Wi-Fi variant,Code-Division Multiple Access (CDMA), Global System for MobileCommunications (GSM), 3rd Generation (3G), 4th Generation (4G), 3rdGeneration Partnership Project-Long Term Evolution (3GPP-LTE), WorldwideInteroperability for Microwave Access (WiMAX), Zigbee, General PacketRadio Service (GPRS), Evolution-Data Optimized (EV-DO), High-SpeedDownlink Packet Access (HSDPA), or any other type of wirelesscommunications protocol now known or later developed. The wiredinterfaces 111 may include any type of wired communications interface(e.g., electrical, optical, etc.) configured to transmit and receivedata according to any of a number of different communications protocols,such as Universal Serial Bus (USB), Ethernet, IEEE 1394, Firewire,Thunderbolt, or any other type of serial or parallel data communicationsprotocol now known or later developed. The wired interfaces 110 andwireless interfaces 111 may be configured to communicate with othercomputing or communications devices via networks, e.g. the Internet,and/or communicate with peripheral devices, such as disk drives,external monitors, mouse or trackball/pad devices, and externalkeyboards etc., via Bluetooth, USB, or similar connections. In someexamples, mobile computing device 100 may use wired interfaces 110and/or wireless interfaces 111 to communicate with a server thatperforms speech recognition on behalf of mobile computing device 100.

In some embodiments, the wired communications interface 111 may also beconfigured to provide operating power via the external power interface113 as shown by power connection 117 from the wired interface 111 to theexternal power interface 113. For example, USB is one type of wiredcommunications interface that can be configured to provide bothcommunications and power.

Some embodiments of the mobile computing device 100 may also include oneor more sensors 106. The sensors 106 may include any one or more camerasor other image sensors, accelerometers, Global Positioning System (GPS)sensors, temperature sensors, or any other type of sensor known now orlater developed that may be desirable to integrate with the mobilecomputing device 100.

As described briefly above, a mobile computing device configuredaccording to the disclosed embodiments may enable a user to enjoy theadvantages of controlling the mobile computing device via voice commandswithout the limitation of having to either press or hold a physicalbutton or switch on the mobile computing device or manually activate avirtual button or switch on a graphical user interface of the mobilecomputing device. In one embodiment, the above-described advantages maybe achieved via a combination of a power detection routine and a triggerword detection subroutine that are executed by the mobile computingdevice 100.

FIG. 2A shows an example algorithm for a power detection routine 201according to some embodiments, and FIG. 2B shows an example algorithmfor a trigger word detection subroutine 210 according to someembodiments. The description of the algorithms of FIGS. 2A and 2Bincludes references to the example mobile computing device 100 and itscorresponding components shown and described herein with reference inFIG. 1. In some embodiments, the power detection routine 201 and/or thetrigger word detection subroutine 210 may be components of the operatingsystem of the mobile computing device 100. In other embodiments, thepower detection routine 201 and/or the trigger word detection subroutine210 may be components of an application or widget installed on themobile computing device 100, such as an application or widget downloadedfrom an online application store.

In some embodiments, the power detection routine 201 may be configuredto operate continually (or at least substantially continually) on themobile computing device 100. Some embodiments may also allow a user toactivate and deactivate the power detection routine 201. In someembodiments, the power detection routine 201 may be selectivelyactivated or deactivated by a user.

In the embodiment of FIGS. 2A and 2B, the trigger word detectionsubroutine 210 is a “subroutine” of the power detection routine 201 inthat the trigger word detection subroutine 210 is activated by the powerdetection routine 201 under certain conditions, as described herein.However, the trigger word detection capability need not be implementedas a subroutine of a power detection routine in all embodiments.

The power detection routine starts at block 202. At block 203, the powerdetection routine 201 determines whether operating power for the mobilecomputing device 100 is being received from either (1) an external powersource via the external power interface 113 or (2) a battery powersource via the battery interface 112. In some embodiments, thedetermination may be made by the power source selector 114. In otherembodiments, the determination may be made by one or more processors 101configured to monitor any of the battery interface 112, the externalpower interface 113, and/or the power source selector 114. If anexternal power source is not detected (i.e., the mobile computing device100 is receiving operating power from a battery source), then the powerdetection routine 201 ends at block 207. After ending at block 207,power detection routine 201 re-starts at block 202, either immediately(or after a brief waiting period) so that power detection routine 201operates continually (or at least substantially continually).

However, if at block 203, the power detection routine 201 determinesthat the mobile computing device 100 is receiving operating power froman external power source via the external power interface 113, then thepower detection routine 201 advances to block 204. At block 204, thepower detection routine 201 activates the trigger word detectionsubroutine 210. Once it is activated by the power detection routine 201at block 204, the trigger word detection subroutine 210 may beconfigured to execute continually (or at least substantiallycontinually) until it is deactivated.

After activating the trigger word detection subroutine 210 at block 204,the power detection routine advances to block 205. At block 205, thepower detection routine 201 determines whether the communications device100 is receiving operating power from an external power source via theexternal power interface 113. In some embodiments, the determination maybe made by the power source selector 114. In other embodiments, thedetermination may be made by one or more processors 101 configured tomonitor any of the battery interface 112, the external power interface113, and/or the power source selector 114.

If the mobile computing device 100 is receiving its operating power froman external power source, then the power detection routine 201 returnsto block 205. But if the power detection routine 201 determines that themobile computing device 100 is no longer receiving its operating powerfrom an external power source (i.e., the external power source has beendisconnected from the external power interface 113 and/or the mobilecomputing device 100 has switched to battery power), then the powerdetection algorithm 201 advances to block 206. At block 206, the powerdetection routine 201 deactivates the trigger word detection subroutine210. The power detection routine 201 then ends at block 207. Afterending at block 207, power detection routine 201 re-starts at block 202,either immediately (or after a brief waiting period) so that powerdetection routine 201 operates continually (or at least substantiallycontinually).

FIG. 2B shows an example algorithm of a trigger word detectionsubroutine 210. As described with respect to FIG. 2A, once the powerdetection routine 201 activates the trigger word detection subroutine210 at block 204, the trigger word detection subroutine 210 isconfigured to execute continually (or at least substantiallycontinually) until it is deactivated. The trigger word detectionsubroutine 210 may be deactivated by the power detection routine 201 atblock 206 as described above. In some embodiments, the trigger worddetection subroutine 210 may be selectively activated and/or deactivatedby a user.

The trigger word detection subroutine 210 starts at block 212. At block213, the trigger word detection subroutine receives a sound sample. Thesound sample may be received via the sound input 107 of the mobilecomputing device 100. In some embodiments, the sound input 107 mayinclude a microphone or other type of sound input or detection device.Some embodiments may include a sound detector that triggers theactivation of a microphone. Once activated, the microphone captures asound sample. In other embodiments, a microphone may be configured tocontinually (or at least substantially continually) capture soundsamples once the trigger word detection subroutine 210 has beenactivated.

At block 214, the trigger word detection subroutine 210 determineswhether the sound sample received at block 213 includes speech.Determining whether the sound sample includes speech can be accomplishedby any of a number of speech detection algorithms now know or laterdeveloped. In some embodiments, the speech detection algorithm may beexecuted by the one or more processors 101. In other embodiments, thespeech detection algorithm may be executed by one or more components ofthe sound input 107.

If the sound sample does not include speech, then the trigger worddetection subroutine 210 ends at block 217 and, thereafter, re-starts atblock 212 (either immediately or after a brief waiting period) toreceive an additional sound sample at block 213. However, if the soundsample includes speech, then the trigger word detection subroutine 210advances to block 215.

At block 215, the speech from the sound sample is analyzed to determinewhether the speech includes at least one of a set of one or more triggerwords. Trigger words are described in more detail with respect to FIGS.3A-3C. The sound sample may be analyzed with any of a number of sound orvoice recognition algorithms now known or later developed. For example,speech recognition may be performed on the spoken input to obtain text,and the text may be analyzed to determine whether the text includes oneor more trigger words. The speech recognition may be performed by themobile computing device 100, by a server with which mobile computingdevice 100 communicates, or by a combination thereof.

If the speech does not includes at least one trigger word, then thetrigger word detection subroutine ends at block 217 and, thereafter,re-starts at block 212 (either immediately or after a brief waitingperiod) to receive an additional sound sample at block 213. However, ifthe received speech includes at least one trigger word, then the triggerword detection subroutine advances to block 216. At block 216, thetrigger word detection subroutine 210 launches an applicationcorresponding to the at least one trigger word determined at block 215.After launching the application at block 216, the trigger word detectionsubroutine 210 ends at block 217. After ending at block 217, the triggerword detection subroutine 210 re-starts at block 212 (either immediatelyor after a brief waiting period) to receive a new sound sample at block213.

As described above, the trigger word detection subroutine 210 continuesin this manner continually (or at least substantially continually) untilthe trigger word detection subroutine 210 is deactivated by either thepower detection routine 201 or a user.

FIGS. 3A-3B show examples of a mobile computing device 300 launchingapplications in response to detecting trigger words according to someembodiments. The mobile computing device 300 may be similar to themobile computing device 100 shown and described with respect to FIG. 1.Similarly, the mobile computing device 300 may be configured to executethe power detection routine 201 and/or the trigger word detectionsubroutine 210 shown and described with respect to FIGS. 2A-2B.

In FIGS. 3A-3B, the mobile computing device 300 is receiving operatingpower from an external power source connected to the mobile computingdevice 300 via cable 301. Power icon 302 on the display 303 of themobile computing device 300 indicates that the mobile computing device300 is receiving power from an external power source. Because the mobilecomputing device 300 is receiving operating power from an external powersource, the power detection routine 201 (FIG. 2A) will have activatedthe trigger word detection subroutine 210 (FIG. 2B). As describedherein, once activated, the trigger word detection subroutine 210 isconfigured to operate continually (or at least substantiallycontinually) until it is deactivated by either the power detectionroutine 201 or a user.

While activated, the trigger word detection subroutine 210 is receivingsound samples via the microphone 304 of the mobile computing device 300.When the mobile computing device 300 determines that a sound samplereceived via its microphone 304 includes at least one trigger word of aset of one or more trigger words, the mobile computing device 300 isconfigured to launch an application corresponding to the at least onedetermined trigger word.

In some embodiments, the mobile computing device 300 may be configuredto detect a single trigger word. For example, the trigger word may be“Android” (or perhaps some other user-defined trigger word or group ofwords). In operation, when the mobile computing device 300 detects thetrigger word (or group of words), the mobile computing device may launcha voice command prompt. FIG. 3A shows an example of the mobile computingdevice 300 launching a voice command prompt 305 in response to detectinga trigger word corresponding to the voice command prompt 305.

After the voice command prompt 305 has been launched, a user can thenissue a spoken command string to the mobile computing device 300. Forexample, the spoken command string may be “Call . . . Jane Smith . . .Office.” Here, the command includes an action (“call”), an object of theaction (“Jane Smith”), and a parameter (“Office”). In response toreceiving the spoken command string, the mobile computing device 300 may(i) launch an application corresponding to the action (and possibly oneor more parameters associated with the action), and (ii) execute theapplication based on the object of the action (and possibly one or moreparameters associated with the object of the action). FIG. 3B shows themobile computing device 300 launching a phone application 306 andcalling “Jane Smith” at her office number in response to the spokencommand string received via the voice command prompt 305 (FIG. 3A).

In other embodiments, the mobile computing device 300 may be configuredto launch other types of applications in response to particular spokencommand strings received via the voice command prompt 305. In oneexample, the mobile computing device 300 may be configured to activateor deactivate a particular application, feature, or service. Forexample, the mobile computing device 300 may be configured to silence ordeactivate its ringer in response to the command string such as“Configuration Ringer Silent.” In another example, the mobile computingdevice 300 may be configured to launch a multimedia player and play aparticular song or video in response to a spoken command string receivedvia the voice command prompt 305. For example, the spoken command string“Play Song All You Need Is Love” may cause the mobile computing device300 to launch a multimedia player and play the song “All You Need IsLove” by The Beatles.

As described above, the spoken command string may include one or moreparameters associated with either an action or an object to ameliorateor otherwise minimize ambiguity. In the example shown in the FIG. 3B,the “call” was the action, “Jane Smith” was the object, and “Office” wasthe parameter associated with object “Jane Smith.” The parameter“Office” specifies which of Jane Smith's numbers to call (i.e., home,office, mobile, etc.).

In the foregoing example, the trigger word was “Android” and the commandstring was “Call Jane Smith Office.” In some embodiments, the user mayneed to pause slightly after the trigger word before speaking a commandstring to allow time for the mobile computing device 300 to launch thevoice command prompt 305. Similarly, the user may need to pause slightlyafter speaking the “action” for the voice command prompt to allow timefor the mobile computing device 300 to launch the applicationcorresponding to the action, e.g., the phone application in thisexample.

However, in other embodiments, the mobile computing device 300 may beconfigured to cache a brief history of spoken words, e.g., up to about5-30 seconds of spoken words or perhaps a configurable number of words,e.g., up to 10-20 spoken words, depending on the configuration. Inembodiments that cache a brief history of spoken words, the computingdevice 300 may be configured to analyze the words in the cache toidentify actions, objects, and parameters that may follow a trigger word(or words). One advantage of caching a brief history of spoken words isthat a user may not need to pause long (or at all) after a trigger wordor after an “action” to wait for the mobile computing device 300 tolaunch the voice command prompt in response to the trigger word or tolaunch an application in response to the “action” received via the voicecommand prompt.

In some embodiments, the mobile computing device 300 may be configuredto detect multiple trigger words (or groups of words, i.e., a triggerphrase), where individual trigger words (or phrases) correspond todifferent applications or actions to take in a particular application.In the previous example, a single trigger word (or perhaps triggerphrase), such as “Android” for example, caused the mobile computingdevice 300 to launch a voice command prompt 305 (FIG. 3A). Once thevoice command prompt 305 was launched, the mobile computing device 300could receive spoken command strings to launch other applications (i.e.,a phone application as shown in FIG. 3B). But in embodiments where themobile computing device 300 is configured to detect multiple triggerwords (or sets of trigger words or phrases), the mobile computing device300 may be able to launch applications and process commands faster thanembodiments that may rely on a single trigger word to first open a voicecommand prompt 305 before receiving spoken command strings to launchapplications.

In some embodiments, the set of trigger words may include a specifictrigger word (or words) for a voice command prompt, a specific triggerword (or words) for a phone application, a specific trigger word (orwords) for a text messaging application, a specific trigger word (orwords) for an email application, and a specific trigger word (or words)for a multimedia player application, etc. In operation, the mobilecomputing device 300 could have many different trigger words or phrasescorresponding to many different applications and/or functions. In someembodiments, a user may be able to configure or customize particulartrigger words of phrases and associate those customize trigger words orphrases with particular applications or other computing, communications,or entertainment tasks. For example, a user may configure a triggerphrase “Favorite Song” to cause the mobile computing device to launch amultimedia player and play the song “All You Need Is Love” by TheBeatles.

Although FIG. 3B was described above with respect to launching atelephone application in response to a spoken command string receivedvia a voice command prompt, FIG. 3B can also correspond to an example ofthe mobile computing device 300 launching a telephone application inresponse to detecting a trigger word corresponding to the telephoneapplication. For example, the trigger word corresponding to the phoneapplication may be “call.” When the mobile computing device 300 detectsthe trigger word “call,” the mobile computing device may launch thephone application and then listen for further instructions, such as thenumber or person to call.

FIG. 3C shows an example of the mobile computing device 300 launching anemail application 307 in response to detecting a trigger wordcorresponding to the email application 307. In this example, the triggerword corresponding to the email application 307 may be “mail,” and upondetecting the “mail” trigger word, the mobile computing device 300 maylaunch the email application 307 and then listen for furtherinstructions, such as the recipient, subject, and body of the emailmessage.

FIG. 4 shows an example method 400 according to some embodiments. Themethod 400 begins at block 401, where a mobile computing devicedetermines whether it is receiving operating power from one of (i) anexternal power source or (ii) one or more batteries configured to powerthe mobile computing device. The mobile computing device may be similarto any of the mobile computing devices described elsewhere herein. Inthis example, the mobile device includes a trigger word detectionsubroutine that is activatable by a user input and automatically inresponse to determining that the mobile computing device is receivingexternal power.

At block 402, the mobile computing device activates the trigger worddetection subroutine in response to determining that it is receivingpower from the external power source. The trigger word detectionsubroutine is shown in blocks 402 a-402 d, which are described in moredetail below. In some embodiments, the mobile computing device mayadditionally or alternatively activate the trigger word detectionsubroutine in response to receiving an input from a user to activate thetrigger word detection subroutine even when the mobile computing deviceis receiving power from the one or more batteries.

At block 403, the mobile computing device deactivates the trigger worddetection subroutine in response to determining that it is receivingoperating power from the one or more batteries. In some embodiments, themobile computing device may additionally or alternatively deactivate thetrigger word detection subroutine in response to receiving an input froma user to deactivate the trigger word detection subroutine even when themobile computing device is receiving power from an external powersource.

The trigger word detection subroutine is shown in blocks 402 a-402 d. Inoperation, once activated, the trigger word detection subroutine may beconfigured to execute continually (or at least substantiallycontinually) until it is deactivated either at step 403 or by a user.

The trigger word detection subroutine begins at block 402 a where themobile computing device receives spoken input via a microphone. At block402 b, the mobile computing device obtains text corresponding to thespoken input, based on speech recognition performed on the spoken input.The speech recognition could be performed by the mobile computingdevice. Alternatively, the speech recognition could be performed, inwhole or in part, by one or more devices external to the mobilecomputing device. For example, the mobile computing device may transmitthe spoken input to a server, the server may perform speech recognitionon the spoken input to determine a corresponding text, and the mobilecomputing device may obtain the text from the server.

At block 402 c, the mobile computing device analyzes the text todetermine whether the text includes at least one of a set of one or morepredefined trigger words. At block 402 d, in response to determiningthat the text includes at least one of the set of one or more predefinedtrigger words, the mobile computing device launches an applicationcorresponding to the at least one trigger word included in the text.

In some embodiments, the application corresponding to the at least onetrigger word may be a voice command prompt application configured toreceive a voice command from a user. The voice command may comprise oneor more of (i) an action, (ii) an object of the action, and (iii) one ormore parameters associated with the action or the object. The voicecommand prompt and the voice commands received via the voice commandprompt may be similar to the voice command prompts and voice commandsdescribed elsewhere herein.

In further embodiments, the application corresponding to the at leastone trigger word may be any of a voice command prompt, a communicationsapplication, a multimedia application, or an application for configuringsettings of the mobile computing device.

In some embodiments, a speech recognition mode of a mobile computingdevice can be activated by coupling the mobile computing device to anexternal power source. FIG. 5 shows an example method 500 according tosuch embodiments. The method 500 begins at block 501, when a mobilecomputing device detects coupling of the mobile computing device to anexternal power source. In response to the detected coupling, the mobilecomputing device activates a speech recognition mode, at block 502.Blocks 502-505 describe an example of how the speech recognition modemay operate after being activated.

At block 503, the mobile computing device receives spoken input via amicrophone. At block 504, the mobile computing device determines whetherthe spoken input includes one or more trigger words. This can involvespeech recognition performed by the mobile computing device and/or by aserver, as described above. In response to determining that the spokeninput includes at least one trigger word, the mobile computing devicelaunches an application corresponding to the at least one trigger word,at block 505.

While various aspects and embodiments have been disclosed herein, otheraspects and embodiments will be apparent to those skilled in the art.The various aspects and embodiments disclosed herein are for purposes ofillustration only and are not intended to be limiting, with the truescope and spirit being indicated by the following claims.

1-20. (canceled)
 21. A method comprising: receiving a first input at acomputing device; and in response to the first input, the computingdevice taking a trigger word detection action, wherein the trigger worddetection action includes: receiving spoken input via a microphone ofthe computing device, determining whether the spoken input includes oneor more trigger words associated with a voice command prompt action, andin response to determining that the spoken input includes the one ormore trigger words associated with the voice command prompt action,taking the voice command prompt action which includes: receiving, viathe microphone, additional spoken input that causes the computing deviceto take one or more other actions, and displaying a voice command promptusing the computing device at least until the computing device has begunto take the one or more other actions.
 22. The method of claim 21,further comprising: taking the trigger word detection action continuallyuntil it is deactivated.
 23. The method of claim 21, further comprising:receiving a second input at the computing device; and after receivingthe second input, deactivating the trigger word detection action. 24.The method of claim 21, wherein the one or more other actions include atleast one of a communications action, a multimedia action, and an actionfor configuring settings of the computing device.
 25. The method ofclaim 21, wherein the computing device receives power from a batterypower source.
 26. The method of claim 21, wherein the computing devicereceives power from an external power source.
 27. The method of claim21, wherein the one or more trigger words comprise one or moreuser-customized trigger words.
 28. The method of claim 21, wherein theadditional spoken input comprises a corresponding action, and whereinthe method further comprises: in response to receiving the additionalspoken input, taking the corresponding action on the computing device.29. The method of claim 28, wherein the additional spoken input furtherincludes one or more parameters, and wherein taking the correspondingaction comprises taking the corresponding action based on the one ormore parameters.
 30. The method of claim 28, wherein the additionalspoken input comprises an object of the corresponding action, andwherein taking the corresponding action comprises taking thecorresponding action based on the object of the corresponding action.31. A computing device comprising: a sound detector; a display; a powerselector configured to selectively power the computing device from oneof either an external power source or one or more batteries; and one ormore processors configured for: receiving a first input at the computingdevice; and in response to the first input, taking a trigger worddetection action, wherein the trigger word detection action includes:receiving spoken input via the sound detector, determining whether thespoken input includes one or more trigger words associated with a voicecommand prompt action, and in response to determining that the spokeninput includes the one or more trigger words associated with the voicecommand prompt action, taking the voice command prompt action whichincludes: receiving, via the sound detector, additional spoken inputthat causes the computing device to take one or more other actions, anddisplaying a voice command prompt using the computing device at leastuntil the computing device has begun to take the one or more otheractions.
 32. The computing device of claim 31, further comprising: auser interface configured at least to receive the first input.
 33. Thecomputing device of claim 31, wherein taking the one or more otheractions comprises launching one or more applications, and wherein theone or more applications include at least one of: a communicationsapplication, a multimedia application, and an application forconfiguring settings of the computing device.
 34. The computing deviceof claim 31, wherein the additional spoken input comprises acorresponding action, and wherein the one or more processors are furtherconfigured to: in response to receiving the additional spoken input,taking the corresponding action.
 35. The computing device of claim 34,wherein the additional spoken input further includes one or moreparameters associated with the corresponding action, and wherein takingthe corresponding action comprises taking the corresponding action basedon the one or more parameters.
 36. The computing device of claim 31,wherein the trigger words comprise one or more user-customized triggerwords.
 37. A non-transitory computer readable medium having storedtherein executable instructions that, when executed by a computingdevice having at least one processor, causes the computing device toperform functions comprising: receiving a first input; and in responseto the first input, taking a trigger word detection action, wherein thetrigger word detection action includes: receiving spoken input via amicrophone, determining whether the spoken input includes one or moretrigger words associated with a voice command prompt action, and inresponse to determining that the spoken input includes the one or moretrigger words associated with the voice command prompt action, takingthe voice command prompt action which includes: receiving, via themicrophone, additional spoken input that causes the computing device totake one or more other actions, and displaying a voice command promptusing the computing device at least until the computing device has begunto take the one or more other actions.
 38. The non-transitory computerreadable medium of claim 37, wherein the functions further comprise:taking the trigger word detection action continually until it isdeactivated.
 39. The non-transitory computer readable medium of claim37, wherein the functions further comprise: receiving a second input;and after receiving the second input, deactivating the trigger worddetection action.
 40. The non-transitory computer readable medium ofclaim 37, wherein the additional spoken input comprises a correspondingaction, and wherein the functions further comprise: in response toreceiving the additional spoken input, taking the corresponding actionon the computing device.