Sign In to Follow Application
View All Documents & Correspondence

Method And System For Accessing Applications In Non Traceable Mode

Abstract: The embodiments herein provide a method and system for controlling operation of a multi-window in a split scheme. The method allows the users to selectively activate a non-traceable mode for at least one split window of the multi window. The non–traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with said at least one split window. The method includes automatically switching at least one split window of the multi window from a traceable mode to said non-traceable mode to shift an application to split window in the non-traceable module. FIG. 3

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 October 2014
Publication Number
18/2016
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
patent@ipmetrix.com
Parent Application
Patent Number
Legal Status
Grant Date
2021-12-24
Renewal Date

Applicants

Samsung India Electronics Pvt Ltd.
Logix Cyber Park Tower C 8th to 10th floor, Tower D, Ground to 10th floor, Plot No.C - 28-29, Sector -62, Noida-201301 (U.P), India

Inventors

1. Mohd Shariq
FC-4, Block-E, Shaheen Bagh, Jamia Nagar, Okhla, New Delhi-110025
2. Tasleem Arif
F60 , Stellar Park Apartment, Block C, Sector-62, Noida, [U.P.]

Specification

CLIAMS:We claim:
1. A method for controlling operations of a multi window in a split scheme, the method comprising:
selectively activating a non-traceable mode for at least one split window of said multi window, wherein said non-traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with said at least one split window.
2. The method of claim 1, wherein said multi window independently displays said at least one application in respective split windows.
3. The method of claim 1, wherein selectively activating said non-traceable mode for said at least one split window of said multi window comprises:
identifying a gesture performed by a user on said multi window; and
automatically switching, said at least one split window of said multi window, from a traceable mode to said non-traceable mode.
4. The method of claim 3, wherein at least one said application is automatically shifted to said at least one split window in said non-traceable mode based on said identified gesture.
5. The method of claim 1, wherein selectively activating said non-traceable mode for at least one said application running in said respective split window of said multi window comprises:
computing a privacy probability for at least one said application based on at least one parameter associated with at least one said application;
determining whether said privacy probability exceeds a privacy criteria; and
automatically switching from a traceable mode to said non-traceable mode for at least one said application running in said respective split window of said multi window in response to determining that said privacy probability exceeds said privacy criteria.
6. The method of claim 5, wherein said at least one parameter comprises at least one of user preference and historical use of said non-traceable mode for at least one said application.
7. The method of claim 1, wherein maintaining said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receiving a private credential to access said non-traceable mode;
determining a match between said received private credential and a predefined private credential; and
initiating said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
8. The method of claim 1, wherein maintaining said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receiving a private credential to access said non-traceable mode;
determining a match between said received private credential and a predefined private credential; and
resuming said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
9. An electronic device for controlling operations of a multi window in a split scheme, the electronic device comprising:
a multi window module configured to display a multi window comprising a plurality of split windows, wherein each said split window displays at least one application; and
a controller module configured to selectively activate a non-traceable mode for at least one split window of said multi window, wherein said non-traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with said at least one split window.
10. The electronic device of claim 9, wherein said multi window independently displays said at least one application in respective split windows.
11. The electronic device of claim 9, wherein selectively activate said non-traceable mode for said at least one split window of said multi window comprises:
identify a gesture performed by a user on said multi window; and
automatically switch, said at least one split window of said multi window, from a traceable mode to said non-traceable mode.
12. The electronic device of claim 11, wherein at least one said application is automatically shifted to said at least one split window in said non-traceable mode based on said identified gesture.
13. The electronic device of claim 9, wherein selectively activate said non-traceable mode for at least one said application running in said respective split window of said multi window comprises:
compute a privacy probability for at least one said application based on at least one parameter associated with at least one said application;
determine whether said privacy probability exceeds a privacy criteria; and
automatically switch from a traceable mode to said non-traceable mode for at least one said application running in said respective split window of said multi window in response to determining that said privacy probability exceeds said privacy criteria.
14. The electronic device of claim 13, wherein said at least one parameter comprises at least one of user preference and historical use of said non-traceable mode for at least one said application.
15. The electronic device of claim 9, wherein maintain said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receive a private credential to access said non-traceable mode;
determine a match between said received private credential and a predefined private credential; and
initiate said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
16. The electronic device of claim 9, wherein maintain said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receive a private credential to access said non-traceable mode;
determine a match between said received private credential and a predefined private credential; and
resume said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
17. A computer program product comprising a computer executable program code recorded on a computer readable non-transitory storage medium, wherein said computer executable program code when executed causing the actions:
selectively activating a non-traceable mode for at least one split window of said multi window, wherein said non-traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with said at least one split window.
18. The computer program product of claim 17, wherein said multi window independently displays said at least one application in respective split windows.
19. The computer program product of claim 17, wherein selectively activating said non-traceable mode for said at least one split window of said multi window comprises:
identifying a gesture performed by a user on said multi window; and
automatically switching, said at least one split window of said multi window, from a traceable mode to said non-traceable mode.
20. The computer program product of claim 19, wherein at least one said application is automatically shifted to said at least one split window in said non-traceable mode based on said identified gesture.
21. The computer program product of claim 17, wherein selectively activating said non-traceable mode for at least one said application running in said respective split window of said multi window comprises:
computing a privacy probability for at least one said application based on at least one parameter associated with at least one said application;
determining whether said privacy probability exceeds a privacy criteria; and
automatically switching from a traceable mode to said non-traceable mode for at least one said application running in said respective split window of said multi window in response to determining that said privacy probability exceeds said privacy criteria.
22. The computer program product of claim 21, wherein said at least one parameter comprises at least one of user preference and historical use of said non-traceable mode for at least one said application.
23. The computer program product of claim 17, wherein maintaining said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receiving a private credential to access said non-traceable mode;
determining a match between said received private credential and a predefined private credential; and
initiating said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
24. The computer program product of claim 17, wherein maintaining said private session to restrict storage of said activity data corresponding to said at least one application comprises:
receiving a private credential to access said non-traceable mode;
determining a match between said received private credential and a predefined private credential; and
resuming said private session to restrict storage of said activity data corresponding to said at least one application in response to determining said match.
Dated: 24th Day of September, 2014 Signature
Arun Kishore Narasani Patent Agent
,TagSPECI:FIELD OF INVENTION
[001] The embodiments herein generally relate to privacy of data, and more particularly to a method and system forcontrolling the privacy of data in a multi window environmentof an electronic device.
BACKGROUND
[002] With increasing development of digital technologies, various electronic devicescapable of processing communication and personal information,has increased exponentially. The electronic device may include various application performing functions, such as the ability to process an audio call, an image call, to process the transmission and reception of a message such as a Short Message Service (SMS), a Multimedia Message Service (MMS), an e-mail, an electronic note, photography, a broadcasting play, a video play, a music play, information from Internet, a messenger, a Social Networking Service (SNS), and the like.
[003] To provide privacy of data, some of the applications offer a private mode, in which communication sessions are private and the data cached during the use of the application does not get stored locally. For example, web browsers may provide aprivate mode, which on user enabling, protects the privacy of the data by not storing data such as browsing history, images, videos and text. Similarly, the applications related to instant messaging may allow users to enable or disable the storage of data in the communication sessions. Further, some application may allow users to enable the privacy mode based on pre-configuration. For example, in a phone application, the user can configure a private mode while communicating with a specific person, and there will be no call log information in the storage for the specified person.
[004] Although successful in providing privacy to the user, the user may need to manually go through a number of steps to enable and disable the privacy mode. The user may need to maintain separate profile mode for private activities. Additionally, most of such applications are application dependent. Thus, there is a need for a robust method and system which allow users to enable and disable the privacy mode in a simple manner.
OBJECT OF INVENTION
[005] The principal object of the embodiments herein is to provide a method and system for controlling the privacy of data in a multi window environment of an electronic device.
[006] Another object of the invention is to provide a method and system for automatically switching, a split window of multi-window, from a traceable mode to a non-traceable mode and vice versa based on a gesture performed by the user.
[007] Yet another object of the embodiments herein is to provide a method and system for computing a privacy probability for each application used by a user for launching the application in either the split window with traceable mode or the split window with non-traceable mode based on the computed privacy probability.
[008] Yet another object of the embodiments herein is to provide a method and system for restricting local or remote storage of activities data of an application associated with at least one split window in non-traceable mode.
SUMMARY
[009] Accordingly the embodiments herein provide a method for controlling operations of a multi window in a split scheme. The method includes selectively activating a non-traceable mode for at least one split window of the multi window. The non- traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with the at least one split window. Further, the method of selectively activating the non-traceable mode in at least one split window of the multi window includes identifying a gesture performed by a user on the multi windowandautomatically switching the at least one split window of the multi window, from a traceable mode to the non-traceable mode. An application running the traceable mode is automatically shifted to the at least one split window in the non-traceable mode based on the identified gesture.
[0010] Accordingly the embodiments herein provide an electronic device for controlling operations of a multi window in a split scheme. The electronic device includes a multi window module configured to display a multi window comprising a plurality of split windows and each split window displays at least one application. The electronic device includes a controller module configured to selectively activate a non-traceable mode for at least one split window of the multi window. The non- traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with the at least one split window. Further, the controller module can be configured to identify a gesture performed by a user on the multi window and automatically switch, the at least one split window of the multi window, from a traceable mode to the non-traceable mode to selectively activate the non-traceable window thein the at least one split window. An application running the traceable mode is automatically shifted to the at least one split window in the non-traceable mode based on the identified gesture.
[0011] A computer program product comprising a computer executable program code recorded on a computer readable non-transitory storage medium, wherein the computer executable program code when executed causing the actions of selectively activating a non-traceable mode for at least one split window in a multi window. The non-traceable mode maintains a private session to restrict storage of activity data corresponding to at least one application associated with the at least one split window of the multi window.The computer executable program code when executed causes the product toidentify a gesture performed by a user on the multi window and automatically switch, the at least one split window of the multi window, from a traceable mode to the non-traceable mode to selectively activate the non-traceable window thein the at least one split window. An application running the traceable mode is automatically shifted to the at least one split window in the non-traceable mode based on the identified gesture.
[0012] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF FIGURES
[0013] This invention is illustrated in the accompanying drawings, throughout which like reference letters indicate corresponding parts in the various figures. The embodiments herein will be better understood from the following description with reference to the drawings, in which:
[0014] FIG. 1 is a block diagram illustrating an electronic device for controlling operations of a multi window, according to embodiments described herein;
[0015] FIGS. 2A, 2B, and2C illustrates an examplemulti window environment, according to embodiments described herein;
[0016] FIG. 3 is a flowchart illustrating a method for controlling operations of a multi window in a split scheme, according to embodiments described herein;
[0017] FIG. 4 is a flowchart illustrating a method for automatically shifting an application between a traceable mode window and a non-traceable mode window, according to embodiments described herein;
[0018] FIG. 5 is a flowchart illustrating a method for selectively activating the non-traceable mode for an application running in the respective split window of the multi window, according to embodiments described herein;
[0019] FIGS.6A, 6B, 6C, 6D, and 6E show example illustrations of a multi-window screen environment, in which a user switches a chat application between a non- traceable mode window and a traceable mode window, according to embodiments as described herein;
[0020] FIGS.7A, 7B, 7C, 7D, 7E, and 7F show example illustrations of a multi-window screen environment, in which a non- traceable mode window is protected by a user credential, according to embodiments as described herein;
[0021] FIGS. 8A, 8B, 8C, and 8D show example illustrations of the multi-window screen environment, in which a user launches a messaging application in a non-traceable mode window, according to embodiments described herein;
[0022] FIGS. 9A, 9B, and 9C show example illustrations of a multi-window screen environment, in which a user launches a map application in a non- traceable mode window, according to embodiments described herein;
[0023] FIGS. 10A and 10B show example illustrations of the multi-window screen environment, in which a privacy alert is displayed on a screen, when the user launches a video player application in a non-traceable mode window, according to embodiments described herein;
[0024] FIGS. 11A, 11B, 11C, and 11D shows example illustrations of a multi-window screen environment, in which the user launches a video application in a non- traceable mode window, according to embodiments as described herein;
[0025] FIGS. 12A, 12B, 12C, 12D, 12E, and 12F shows example illustrations of a multi-window screen environment, in which a user launches a music player application in a non- traceable mode window, according to embodiments as described herein; and
[0026] FIG. 13 depicts a computing environment implementing the method and systemfor controlling operations of a multi window in asplit scheme, according to embodiment as described herein.

DETAILED DESCRIPTION OF INVENTION
[0027] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to form new embodiments. The term “or” as used herein, refers to a non-exclusive or, unless otherwise indicated. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein can be practiced and to further enable those skilled in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0028] The embodiments herein achieve a system and method for controlling operations of a multi window in a split scheme.Based on an identified user gesture, the method includes activating the non-traceable mode for the at least one split window of the multi window. In the non-traceable mode, the application running in the split window of the multi-window, in which the non-traceable mode is activated,maintains a private session to restrict storage of activity data. The method allows the user to switch between the non-traceable modes to a traceable mode using gestures.
[0029] The method and system described herein is simple and robust for controlling operations of a multi window in a split scheme. Unlike conventional systems, the proposed system and method allows the user of the electronic device to selectively activate a non-traceable mode for at least one application running in respective split window of the multi window through a simple gesture. For example, to activate the non-traceable mode for an application, the user may just need to drag the application to a multi-window in which no-trace mode has been activated.
[0030] Throughout the description the terms “multi-window” and “multi-window environment” are used interchangeably. The term multi window refers to a screensplit into at least two window in a split scheme to provide a multi-window and allows a user to efficiently use a plurality of applications through the multi-window on one screen and an apparatus thereof. Each split windowindependently and simultaneously displaysat least one application. The multi- window allows a controller module to control at least two different applications operating in two different split windows independently. Each window maintains a separate session to control and manage the associated activity data.
[0031] Throughout the description the terms non-traceable mode and non-traceable mode window are used interchangeably. The non-traceable mode window refers to a split- window in the multi window environment, in which the non-traceable mode is active.
[0032] Throughout the description the terms traceable mode and traceable mode window are used interchangeably. The traceable mode window refers to a split- window in the multi window environment, in which the traceable mode is active.
[0033] Referring now to the drawings, and more particularly to FIGS. 1 through 13, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments.
[0034] FIG. 1 is a block diagram illustrating an electronic device 100 for controlling operations of a multi window, according to embodiments described herein. In an embodiment, the electronic device 100 described herein can be for example, but arenot limited to, a cell phone, a personal digital assistant, a mobile personal computer, a laptop, a tablet, a phablet, a desktop computer, a communicator, or equivalent thereof. In an embodiment, the electronic device 100 can be configured to include a multi window module 102, a display module 104, a controller module 106, a gesture module 108, and a storage module 110.
[0035] The multi-window module 102 can be configured to display and run applications simultaneously in a split window scheme of the multi-window environment. In an embodiment, the multi-window module can be configured to display a tray (or an application launcher) for efficiently and intuitively executing applications according to the multi window environment. The tray comprises a screen region in which, for instance, icons representing respective applications may be displayed and selected. The tray may comprise a pop-up object displayed upon the screen. The tray may be moved within the screen.
[0036] The display module 104 can be configured to display a screen corresponding to themulti window environment, and may display an execution screen with respect to a plurality of applications through a multi-window, which is split into regions.The display module 104 can display an execution screen with respect to various functions (or applications) executed in the electronic device 100 through one or more windows. The execution screen may therefore display data relating to the multiple applications. In particular, the display module 104 can provide at least two split screen windowsaccording to the split scheme to form the multi-window. That is, the display module 104 may display a screen corresponding to the multi-window environment, and may display an execution screen with respect to a plurality of applications through the multi-window, which is split regions. In this case, the display module 104 can be configured to simultaneously display a screen of one window and a screen of another window in parallel. The display module 104 can be configured to display a separator for separating respective windows, that is, split regions. Further, the display module 104 can be configured to receive a user input and transfer the received user input to the controller module 106.
[0037] The controller module 106 can be configured to control the operations of all the applications being executed in the multi window environment. In an embodiment, the controller module 106 can be configured to selectively activate a non–traceable mode for at least one split window of the multi window based on a user input. In an embodiment, a gesture module 108 can be configured to obtain a gestureinput from the user for selectively activating the non-traceable modefor one or more split windows. Based on the input gesture corresponding to activating the non-traceable mode for the window, the controller module 106 can be configured to automatically shift at least one application from a window in a traceable mode to the window in the non-traceable mode. The application, on shifting to the non-traceable window, maintains a private session to restrict local or remote storage of activity data.
[0038] In an embodiment, a split window from the multi-window can be pre-defined as a non-traceable window through a gesture. For example, by a long press on the split window, or by going to settings and making the split window non-traceable, or by clicking on one of the buttons on the menu bar of a divider line, or the like.
[0039] In an embodiment, based on the gesture module 108, the controller module 106 can be configured to automatically shift an application being executed in the non-traceable window to the traceable window and vice versa.
[0040] In an embodiment, based on a privacy probability associated with each application, the controller module 106 can be configured to automatically activate the non-traceable modefor an application based on a privacy probability associated with the application. Details of the privacy probability and activation of the non-traceable modefor the application are explained in detail in conjunction with FIG. 5.
[0041] Further, the storage module 110 can be configured to store any data corresponding to the application being executed. Examples of data corresponding to applications being storedcan include, but is not limited to,email messages, SMS messages, VOIP recordings, chat transcripts, audio and/or video chat recordings, user preferences (e.g., browser settings), temporary internet files, browser cookies, browser auto-fill information, user notes, user annotations, and the like.
[0042] The FIG. 1 illustrates a limited overview of the modules of the electronic device 100 but, it is to be understood that other embodiments are not limited thereto. The labels or names of the modules are used only for the illustrative purpose and does not limit the scope of the invention. Further, in real-time the function of the one or more modules can be combined or separately executed by the same or other modules without departing from the scope of the invention. Further, the electronic device 100 can include various other modules along with other hardware or software components, communicating locally or remotely to control operation of the multi window environment. For example, the component can be, but not limited to, a process running in the controller or processor, an object, an executable process, a thread of execution, a program, or a computer. By way of illustration, both an application running on an electronic device and the electronic device itself can be a component.
[0043] FIGS. 2A, 2B, and 2C illustrates an example multi window environment, according to embodiments described herein;
The FIG.2A illustrates a screen of an electronic device 100, in which two applications are being executed in each split window of the multi-window screen environment. An application 1 is running in a traceable mode. An application 2 is running in a non-traceable mode (indicated by dotted lines). Different indicators can be configured to differentiate the split window operating in the traceable mode and the split window operating in non-traceable mode. Examples of indicators can include background color, a non-traceable indicator icon, and any design which can be used to differentiate the split window in traceable and non-traceable mode.
[0044] In an embodiment, only one split window can be enabled to operate in a non-traceable mode. The other split windows can be enabled to operate ina traceable mode.The user can switch any number of applications operatingin the split windows with traceable mode to the split window enabled with the non-traceable mode to protect the privacy of the application activities and data.
[0045] The FIG.2B illustrates the screen of an electronic device 100, in which three applications are being executed in each split window of the multi window environment. The first application and the second application are running a split window in which the non-traceable mode has been activated. A third application is running in a split window, in which the third application is running in the traceable mode.
[0046] The FIG. 2C illustrates the screen of an electronic device 100, in which four applications are being executed in each split window of the multi window environment. The first application and the third application are running a split window in which the traceable mode has been activated. The second application and a fourth application are running in a non-traceable mode in split windows of the multi window environment.
[0047] In an embodiment, the multi window environment allows the users to maintain the privacy while using applications by activating a non-traceable mode for an application in the split window of the multi-window. The non-traceable mode initiates a private session to restrict the storage of the activity data corresponding to the application.Further details regarding the selective activation of the non-traceable mode window, and the traceable mode window for each application is explained in conjunction with the FIGS. 4, 5 and 6.
[0048] FIG. 3 is a flowchart illustrating a method300 for controlling operations of a multi window in a split scheme, according to embodiments described herein.The various steps of the method 300 are summarized into individual blocks where some of the steps are performed by the electronic device 100, the user of the electronic device 100, and a combination thereof. The method 300 and other description described herein provide a basis for a control program, which can be implemented using a microcontroller, microprocessor, or any computer readable storage medium.
[0049] In an embodiment, at step302, the method 300 includes the user launching an application in the multi window environment using a multi-window application in the electronic device 100. Based on the application selected by the user, the method300 allows the controller module 106 to launch the selected application.In an embodiment, the gesture module 108 can be configured to receive a user input to launch an application.
[0050] At step 304, the method 300 includes determining whetherthe application is launched in the non-traceable mode window.The proposed system and method provides the flexibility to the user to launch the applications in the electronic device 100 in either a traceable mode window or a non-traceablemode window. Based on the window selected by the user, the non-traceable mode is selectively activated for the application being launched by the user.
[0051] In an embodiment, the privacy mode for each split window in themulti window environment can be pre-configured. Consider an example, when the screen of the display is split into two windows in themulti window environment. Atop window can be configured to be the multi-window in which the traceable mode has been enabled and a bottom window in which the non-traceable mode. The user can launch the application in any of the windows.
[0052] At step 306, the method 300 includes launching the application in the traceablemode window. A public session is initiated in the traceable mode window to store activity data corresponding to the application launched. In the public session all the data related to various activities inthe application gets stored in the storage module 110.In an embodiment, this data can be stored as temporary data in temporary folder of the storage module 110 or a specific folder can be assigned to store the data related to various activities associated with the application.Unlike conventional systems, which require the user to manually hide or remove data stored by the application, the proposed method and system allows the user to enable privacy in application data by using the non-traceable mode window in the multi window environment.
[0053] At step 308, the method 300includes determining whether the non-traceable mode window is protected, when the user launches the application in the non-traceable mode window in the multi-window. The protection of the split window with the non-traceable mode may allow the user of the electronic device 100 to restrict other users from using the applications of the electronic device 100 in the split-window in which the non-traceable mode is activated.
[0054] At step 310, the method 300 includes receiving a private credential to access the non-traceable mode. Examples of the private credential can include, but is not limited to, a password, a passcode, and a passphrase. The user may be requested to enter the private credential to access the application in the non-traceable modewindow. The method 300 allows the controller module 106 to receive the private credential entered on a user interface of the electronic device 100.
[0055] At step 312, the method 300 includes determining a match between the received private credential and a predefined private credential stored in the electronic device 100.If the match is unsuccessful, the application selected by the user is launched in the traceable mode window. The public session is initiated in the traceable mode window to store activity data corresponding to the application launched.
[0056] At step 314, the method 300 includes launching the application in the non-traceable modewindow, wherein the non-traceable mode window has been selectively activated by the user. In the non-traceable mode, theprivate session is initiated to restrict the storage of the activity data corresponding to the application.The data related to various activities performed by the application is not stored in the storage module 110. For example, data related to history of activities, and logs is not stored for the application launched in the non-traceable mode window. This allows the user to maintain the private session with respect to the application. For example, if the user is discussing his bank and credit related information with another user via an instant messaging application, the proposed method and system allows the user to open the instant messaging application in the non-traceable mode window to ensure complete privacy of the data.
[0057] The various actions, acts, blocks, steps, and the like in the method 300 may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some actions, acts, blocks, steps, and the like may be omitted, added, modified, skipped, and the like without departing from the scope of the invention.
[0058] FIG. 4 is a flowchart illustrating a method 400 for automatically shifting an application between the traceable mode window and the non-traceablemode window, according to embodiments described herein. The various steps of the method 400 are summarized into individual blocks where some of the steps are performed by the electronic device 100, the user of the electronic device 100, and a combination thereof. The method 400 and other description described herein provide a basis for a control program, which can be implemented using a microcontroller, microprocessor, and any computer readable storage medium.
[0059] Unlike conventional systems and method, where the user needs to enable or disable the privacy setting for an application, the proposed system and method allows the user to automaticallyshift an application between the traceable mode window and the non-traceablemode window through simple gestures.
[0060] In an embodiment, at step 402, the method 400 includes auser launched application running in a traceable mode in the multi window environment.
[0061] At step 404, the method 400 includes receiving and identifying a gesture performed by the user in the multi-window screen environment of the electronic device 100. Based on a gesture received from the user, the method 400 allows the controller module 106 to automatically shift an application between the traceable mode window and the non-traceable mode window. The gesture module 108 can be configured to identify the user performed gesture on the multi-window screen environment of the electronic device 100.
[0062] At step 406, the method 400 includes determining whether the gesture is related to shifting the application from the traceablemode window and the non-traceable mode window. The method 400 allows the controller module 106 to determine if the gesture is related to shifting the application from the traceable mode window and tothe non-traceable mode window.
[0063] At step 408, the method 400 includes performing an operation based on the identified gesture, when the gesture is not related to shifting the application from the traceable mode window and the non-traceable mode window.The method 400 allows the controller module 106 to perform the operation requested by the user via the gesture.
[0064] The steps 410, 412, and 414 of the method 400 are similar to the steps 308, 310, and 312 of the method 300 and are related to authenticating the user for accessing the non-traceable mode window in the multi–window screen environment.
[0065] At step 416, if the match between the user entered private credential and the pre-defined private credentialis unsuccessful, the application is resumed in the traceable mode window of the multi-window screen environment.
[0066] At step 418, if the match between the user entered private credential and the pre-defined private credential is successful, the application is automaticallyshifted to the split window in the non-traceable mode. The user can shift the application from the traceable mode window to the non-traceable mode window and vice versa as per his requirement. For example, while discussing a personal health issue with a caregiver over a messaging application, the user can shift the application between the traceablemode window and the non-traceable mode window as per his requirement. If the user does not wish to keep a record of certain sensitive data during the communication session he can switch to the non-traceable mode window and shift back to the traceable mode window.
[0067] The use of the multi window environment along with split window scheme providing the traceable mode window and non-traceable mode window allows the users to use applications in both non-traceable mode and traceable mode simultaneously. Further, the proposed system and method allows the user to shift the applications between the traceable mode window and non-traceable mode window as per requirement.
[0068] In another embodiment, the method 400 can be used to resume the application from the non-traceable mode window. Based on the identified gestures and the matching credential, the method 400 allows the application to resume from the non-traceable mode window. The private session to restrict storage of the activity data of the application is also resumed.
[0069] The various actions, acts, blocks, steps, and the like in the method 400 may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some actions, acts, blocks, steps, and the like may be omitted, added, modified, skipped, and the like without departing from the scope of the invention.
[0070] FIG. 5 is a flowchart illustrating a method 500 for selectively activating the non-traceable mode for an application running in the respective split window of the multi window, according to embodiments described herein. The various steps of the method 500 are summarized into individual blocks where some of the steps are performed by the electronic device 100, the user of the electronic device 100, and a combination thereof. The method 500 and other description described herein provide a basis for a control program, which can be implemented using a microcontroller, microprocessor, and any computer readable storage medium.
[0071] In an embodiment, at step 502, the method 500 includes the user launching an application in the multi window environment using a multi-window application in the electronic device 100. Based on the application selected by the user, the controller module 106 can be configured to launch the selected application.
[0072] At step 504, the method 500 includes computing a privacy probability for the application launched by the user based on at least one parameter associated with the application. In an embodiment, the parameter may be one of user preference and historical use of the non-traceable mode window for the application. The method 500 allows the controller module 106 to compute the privacy probability associated with each application associated with the user. Examples of the parameters used for computing the privacy probability of an application, can include, but is not limited to, number of shifting of the applications from the traceable mode window to non-traceable mode window, the number of times the application is launched in the traceable mode window, the number of times the application is launched in the non-traceable mode window, sensitivity of data associated with the application and the frequency of use of the application.
[0073] At step 506, the method 500 includes determining whether the computed privacy probability is greater than a privacy threshold. The privacy threshold can be per-configured for each application based on the parameters used for computing the privacy probability.
[0074] At step 508, the method 500 includes launching the application in the traceablemode window, when it is determined that the privacy probability of the application is less than the privacy threshold associated with the application. A public session is initiated in the traceablemode window to store the activity data corresponding to the application launched.
[0075] At step 510, the method 500 includes receiving a confirmation from the user to launch the application in the non-traceable mode window, when it is determined that the privacy probability of the application is greater than the privacy threshold associated with the application. The method 500 allows the controller module 106 to request a confirmation from the user to launch the application in the non–traceable mode window.
[0076] At step 512, the method 500 includes determining whether the user confirmation to launch the application in the non-traceable mode window is received.
[0077] At step 514, the method 500 includes launching the application in the non-traceable mode by initiating a private session to restrict storage of activity data corresponding to the application launched.
[0078] In another embodiment, the method 500 allows the controller module 106 to automaticallyswitch the application to the split window in the non-traceable mode. After a confirmation from the user, the application gets shifted to the non-traceable mode window. The computation of the privacy probability for each application used by the user provides a system and method in which the user can be reminded to switch the application to a non-traceable mode window if the application is launched in the traceable mode window. The method 500 allows the controller module 106 to remind the user through a pop up message to use the non-traceable mode window for the application. For example, when a banking application is launched in the traceable mode window, the controller module 106 can request the user to confirm the switching of the banking application to the non-traceable mode window.
[0079] In an embodiment, the controller module 106 can be configured to memorize or store the user preferences and the other parameters and prompt the use to launch the application in the split window preferred for the user.
[0080] The various actions, acts, blocks, steps, and the like in the method 500 may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some actions, acts, blocks, steps, and the like may be omitted, added, modified, skipped, and the like without departing from the scope of the invention.
[0081] FIGS.6A, 6B, 6C, 6D, and 6E show example illustrations of a multi-window screen environment, in which a user switches a chat application between a non- traceable mode window and a traceable mode window, according to embodiments as described herein. In the FIG.6A, the non-traceable mode window is not protected by a private credential.The illustration in the FIG.6Ashows the chat application running in the top traceable mode window, and a music player application running in the bottom non-traceable mode. The illustration in the FIG.6Bshows a gesture performed by the user on the multi-window screen environment to shift the chat application from the top traceable mode window to the bottom non-traceable mode window. The illustration in the FIG.6Cshows the chatapplication shifted to the bottom non-traceable mode window. Once, the chat application is moved to the bottom non-traceable mode window, the conversations in the chat application become private and no history is maintained for the conversations occurring in the bottom non-traceable mode window. The illustration in the FIG.6D shows that the chat application has been shifted back to the top traceable mode window once the user finishes the private conversations.The illustration in the FIG.6Edisplays a chat history of the chat application from which the user can verify that there is no record of conversations occurring in the bottom non-traceable mode window.
[0082] FIGS.7A, 7B, 7C, 7D, 7E, and 7F show example illustrations of a multi-window screen environment, in which a non- traceable mode window is protected by a user credential, according to embodiments as described herein. The illustration in the FIG. 7A shows a multi window application. From the tray of the multi- window applications the user can select an application to be launched.The illustration in the FIG. 7Bshows that the user has initiated a music player application from the tray in a traceable mode. The illustrations in the FIGS. 7C and 7Dshow that the user is trying to open a dialer application in the bottom non-traceable mode of the multi window. The tray of the multi window application can be configured to display a password window, when the user tries to launch the application in the bottom non-traceable mode of the multi window.The user needs to enter the correct private credential to launch the dialer application in the bottom non-traceable mode of the multi window. The illustration in the FIG. 7Dshows the dialer application launched in the bottom non-traceable mode of the multi window. The illustration in the FIG. 7Eshows a call being initiatedto an online shopping call center. The illustration in the FIG. 7Fshows the call logs, when the dialer application is launched in the bottom non-traceable mode window. It can be seen from the call log that no history of the call with theonline shopping call centeris presentin the call logs.
[0083] FIGS.8A, 8B, 8C, and 8Dshow example illustrations of the multi-window screen environment, in which a user launches a messaging application in anon-traceable mode window,according to embodiments described herein. In the FIG.8A, the non-traceable mode window is not protected by a private credential. The illustration in the FIG. 8Ashows the messaging application running in the bottom non-traceable mode window and a mapsapplication running in the top traceable mode. The illustration in the FIG. 8B shows a message being composed by the user in the messaging applicationin the bottom non-traceable mode window. The illustration in the FIG. 8Cshows an incoming message received in the messaging application in the bottom non-traceable mode window.The illustration in the FIG. 8Ddisplays a history of the messaging application, from which the user can verify that there is no record of composed message (shown in the FIG. 8B) and the received message (shown in the FIG. 8C), when the messaging application is launched in the bottom non-traceable mode window.
[0084] FIGS.9A, 9B, and 9C show example illustrations of a multi-window screen environment, in which a user launches a maps application in a non- traceable mode window, according to embodiments described herein. In the FIG.9A, the non-traceable mode window is not protected by a private credential. The illustration in the FIG.9Ashows the maps application running in the bottom non-traceable mode window and a video application running in the top traceable mode window. The illustration in the FIG.9Bshows a route for a destination (shown as Radisson Blue Hotel) being searched by the user in the maps application in the bottom non-traceable mode window. The illustration in the FIG.9Cdisplays a history of the maps application, when the maps application is launched in the bottom non-traceable mode window. From the history of the maps application displayed in the bottom non-traceable mode window, the user can verify that there is no record of the destination searched (shown in the FIG.9B) by the user, as the maps application is launched in the bottom non-traceable mode window.
[0085] FIGS.10A and 10B show example illustrations of the multi-window screen environment, in which a privacyalert is displayed on a screen, when the user launchesa video player application, according to embodiments described herein.The illustration in the FIG. 10Ashows the main menu in a conventional application launcher environment of a smartphone and the selection of the video player application (shown as App. 9). The illustration in the FIG. 10Billustrates the privacy alert message requesting the user to confirm the use of privacy mode for the video player application.If the user clicks on yes, the video player application canbe launched in the non-traceable mode multi-window. In an embodiment, the top traceable mode window may be populated with a default application, such as Maps, Music player, Messaging, recently opened application, or the like.
[0086] FIGS.11A, 11B, 11C, and 11D shows example illustrations of a multi-window screen environment, in which the user launches a videoplayer application in a non-traceable mode window, according to embodiments as described herein. In the FIG.11, the non-traceable mode window is not protected by a private credential. The illustration inthe FIG. 11Ashows the videoplayer application running in the bottom non-traceable mode window. The illustration in the FIG. 11B shows avideoC being viewed by the user in the video application in the bottom non-traceable mode window. The illustration in the FIG. 11C displays a history of the video player application when the video player application is launched in the bottom non-traceable mode. The user can verify that there is no record of thevideo C viewed (shown inthe illustration the FIG. 11B)by the user, as the videoC was viewed when the video player application waslaunched in the bottom non-traceable mode window.
[0087] The illustration in the FIG. 11Ddisplays a history of the video player application when the video player application is launched in the top-traceable mode window. The user can verify that there is a record of the video C, as the videoC was viewed by the user in the toptraceable mode window.
[0088] FIGS.12A, 12B, 12C, 12D, 12E, and 12F shows example illustrations of a multi-window screen environment, in which a user launches a music player application in a non- traceable mode window, according to embodiments as described herein. In the FIG.12A, the non-traceable mode window is not protected by a private credential. The illustration in the FIG. 12Ashows the main menu in a conventional application launcher environment of a smartphone and the selection of the music player application (Application 11). The illustration in the FIG.12Billustrates the privacy alert message requesting the user to confirm the use of privacy mode for the music player application. If the user clicks on yes, the music player application may be launched in the non-traceable mode window.
[0089] The illustration in the FIG.12Cshows the music player application launched in the bottom non-traceable mode of the multi window. The illustration in the FIG. 12Dshows a song called ”Immigrant Song” being played in the music player application in the bottom non-traceable mode of the multi window.
[0090] The illustration in the FIG. 12Edisplays a history of the recently played songs in the music player application when the music player application is launched in the bottom non-traceable mode window. The user can verify that there is no record of the ”Immigrant Song” in the recently played songs history, as the song was played in the music player when the music player application was in the bottom non-traceable mode window (as shown in the FIG. 12D).
[0091] The illustration in the FIG. 12Fdisplaysa history of recently played songs in the music player application when the music player application is launched in the top traceable mode window. The user can verify that there is a record of the immigrant song, as the song was played in the music player when the music player application was in the top traceable mode window.
[0092] Although the illustrations describes the traceable and non-traceable modes with respect to the top and bottom windows but, it is to be understood that the other embodiments are not limited thereto. Further, in real time, any window of the multi windows can be designated as traceable mode window and non-traceable mode window. Furthermore, in some embodiments, designation of the traceable mode window and non-traceable mode can be predefined or dynamically defined based on one more inputs received from the user without departing form the scope of the invention.
[0093] FIG. 13depicts a computing environment implementing the method and system for controlling operations of a multi window in a split scheme, according to embodiment as disclosed herein. As depicted, the computing environment 1302 comprises at least one processing unit 1304that is equipped with a control unit 1306and an Arithmetic Logic Unit (ALU) 1308, a memory 1310, a storage unit 1312, a clock chip 1314, plurality of networking devices 1316, and a plurality Input output (I/O) devices 1318. The processing unit 1304 is responsible for processing the instructions of the algorithm. The processing unit 1304 receives commands from the control unit 1306 in order to perform its processing. Further, any logical and arithmetic operations involved in the execution of the instructions are computed with the help of the ALU 1308.
[001] The overall computing environment 1302 can be composed of multiple homogeneous or heterogeneous cores, multiple CPUs of different kinds, special media and other accelerators. The processing unit 1304 is responsible for processing the instructions of the algorithm. The processing unit 1304 receives commands from the control unit 1306 in order to perform its processing. Further, any logical and arithmetic operations involved in the execution of the instructions are computed with the help of the ALU 1308. Further, the plurality of process units may be located on a single chip or over multiple chips.
[002] The algorithm comprising of instructions and codes required for the implementation are stored in either the memory unit 1310 or the storage 1312 or both. At the time of execution, instructions may be fetched from the corresponding memory 1310 or storage 1312, and executed by the processing unit 1304. The processing unit 1304 synchronizes the operations and executes the instructions based on the timing signals generated by the clock chip 1314. The embodiments described herein can be implemented through at least one software program running on at least one hardware device and performing network management functions to control the elements. The elements shown in the FIG. 1 include various units, blocks, modules, or steps described in relation with methods, processes, algorithms, or systems of the embodiment described, which can be implemented using any general purpose processor and any combination of programming language, application, and embedded processor.
[003] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.

Documents

Application Documents

# Name Date
1 3033-DEL-2014-PROOF OF ALTERATION [17-01-2024(online)].pdf 2024-01-17
1 SEL_IP_14_07_75_Form 2.pdf 2014-10-28
2 3033-DEL-2014-RELEVANT DOCUMENTS [24-08-2022(online)].pdf 2022-08-24
2 SEL_IP_14_07_75_Drawings.pdf 2014-10-28
3 Form 5.pdf 2014-10-28
3 3033-DEL-2014-IntimationOfGrant24-12-2021.pdf 2021-12-24
4 Form 3.pdf 2014-10-28
4 3033-DEL-2014-PatentCertificate24-12-2021.pdf 2021-12-24
5 3033-DEL-2014-FER_SER_REPLY [13-05-2020(online)].pdf 2020-05-13
6 3033-DEL-2014-PETITION UNDER RULE 137 [13-05-2020(online)].pdf 2020-05-13
6 3033-del-2014-Form-1-(16-01-2015).pdf 2015-01-16
7 3033-DEL-2014-Proof of Right (MANDATORY) [29-11-2019(online)].pdf 2019-11-29
7 3033-del-2014-Correspondence Others-(16-01-2015).pdf 2015-01-16
8 REQUEST FOR CERTIFIED COPY [26-10-2015(online)].pdf 2015-10-26
8 3033-DEL-2014-FER.pdf 2019-11-27
9 3033-DEL-2014-8(i)-Substitution-Change Of Applicant - Form 6 [11-10-2019(online)].pdf 2019-10-11
9 3033-DEL-2014-PA [11-10-2019(online)].pdf 2019-10-11
10 3033-DEL-2014-ASSIGNMENT DOCUMENTS [11-10-2019(online)].pdf 2019-10-11
11 3033-DEL-2014-8(i)-Substitution-Change Of Applicant - Form 6 [11-10-2019(online)].pdf 2019-10-11
11 3033-DEL-2014-PA [11-10-2019(online)].pdf 2019-10-11
12 3033-DEL-2014-FER.pdf 2019-11-27
12 REQUEST FOR CERTIFIED COPY [26-10-2015(online)].pdf 2015-10-26
13 3033-del-2014-Correspondence Others-(16-01-2015).pdf 2015-01-16
13 3033-DEL-2014-Proof of Right (MANDATORY) [29-11-2019(online)].pdf 2019-11-29
14 3033-del-2014-Form-1-(16-01-2015).pdf 2015-01-16
14 3033-DEL-2014-PETITION UNDER RULE 137 [13-05-2020(online)].pdf 2020-05-13
15 3033-DEL-2014-FER_SER_REPLY [13-05-2020(online)].pdf 2020-05-13
16 3033-DEL-2014-PatentCertificate24-12-2021.pdf 2021-12-24
16 Form 3.pdf 2014-10-28
17 3033-DEL-2014-IntimationOfGrant24-12-2021.pdf 2021-12-24
17 Form 5.pdf 2014-10-28
18 3033-DEL-2014-RELEVANT DOCUMENTS [24-08-2022(online)].pdf 2022-08-24
18 SEL_IP_14_07_75_Drawings.pdf 2014-10-28
19 SEL_IP_14_07_75_Form 2.pdf 2014-10-28
19 3033-DEL-2014-PROOF OF ALTERATION [17-01-2024(online)].pdf 2024-01-17

Search Strategy

1 SearchStrategy_07-11-2019.pdf

ERegister / Renewals

3rd: 28 Jan 2022

From 24/10/2016 - To 24/10/2017

4th: 28 Jan 2022

From 24/10/2017 - To 24/10/2018

5th: 28 Jan 2022

From 24/10/2018 - To 24/10/2019

6th: 28 Jan 2022

From 24/10/2019 - To 24/10/2020

7th: 28 Jan 2022

From 24/10/2020 - To 24/10/2021

8th: 28 Jan 2022

From 24/10/2021 - To 24/10/2022

9th: 15 Sep 2022

From 24/10/2022 - To 24/10/2023

10th: 23 Oct 2023

From 24/10/2023 - To 24/10/2024

11th: 21 Oct 2024

From 24/10/2024 - To 24/10/2025

12th: 12 Sep 2025

From 24/10/2025 - To 24/10/2026