WO2014144908A1 - Tablette électronique - Google Patents

Tablette électronique Download PDF

Info

Publication number
WO2014144908A1
WO2014144908A1 PCT/US2014/029508 US2014029508W WO2014144908A1 WO 2014144908 A1 WO2014144908 A1 WO 2014144908A1 US 2014029508 W US2014029508 W US 2014029508W WO 2014144908 A1 WO2014144908 A1 WO 2014144908A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
instructions
access
tablet computer
operating environment
Prior art date
Application number
PCT/US2014/029508
Other languages
English (en)
Inventor
Robb Fujioka
Original Assignee
Fuhu Holdings, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/841,461 external-priority patent/US20130254660A1/en
Application filed by Fuhu Holdings, Inc. filed Critical Fuhu Holdings, Inc.
Priority to CA2907274A priority Critical patent/CA2907274A1/fr
Priority to JP2016503117A priority patent/JP2016517598A/ja
Priority to KR1020157029482A priority patent/KR20150132461A/ko
Priority to EP14764143.5A priority patent/EP2972835A4/fr
Priority to CN201480023591.2A priority patent/CN105339895A/zh
Publication of WO2014144908A1 publication Critical patent/WO2014144908A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • G09B5/06Electrically-operated educational appliances with both visual and audible presentation of the material to be studied
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B19/00Teaching not covered by other main groups of this subclass
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
    • G09B7/04Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student characterised by modifying the teaching programme in response to a wrong answer, e.g. repeating the question, supplying a further explanation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to the field of computers and, more particularly, to user environments and access controls for operating systems and applications.
  • an operating system OS
  • one or more application programs may run.
  • the OS usually boots up to its own user interface (UI) or a customized UI that resides on top of the operating system.
  • UI user interface
  • a single UI can be problematic for at least the following reasons:
  • Privacy personal information about a user may be disclosed to another user
  • Content Management content cannot be filtered or restricted based on a user profile.
  • Disadvantages of configurations requiring a reboot to switch between OSs include, without limitation, the time and inconvenience required to reboot when switching from one OS to the other OS.
  • Disadvantages of configurations involving different OSs running simultaneously include, without limitation, incompatibility of applications and/or content across the OSs.
  • Disadvantages of configurations involving accessing an OS on a remote virtual machine include, without limitation, the requirement of Internet and/or network access.
  • a user environment for a tablet computer that overcomes the problems associated with a single UI while providing multiple users with customizable, manageable, user-appropriate user environments and access to applications, content, and device settings.
  • user environments to encourage desired behaviors by incenting users to perform activities of educational or other constructive benefit as prerequisites to receiving access to other activities of interest to the user, such as consuming entertainment content like games, music, and/or videos.
  • a tablet computer is provided with an OS Overlay system, an Integrated Adaptive Learning System, highly granular, customizable, and remotely accessible Parental Controls, a Curated Application Store, Multiple Profile Management capabilities, and Kid-safe Browsing capabilities.
  • a tablet computer may comprise in some embodiments a touch screen display, one or more processors, a storage media, a wireless data communication interface, an operating system comprising an application framework layer and an application layer, and an overlay system stored in the storage media and configured to be executed by the one or more processors.
  • An overlay system may comprise, in some embodiments, instructions for controlling substantially all access to application programs in the application layer of the operating system, instructions for providing a first user interface, instructions for providing a second operating environment associated with a second user interface, instructions for requiring input of an authentication code to access the first user interface from the second operating environment, and instructions for accepting in the first user interface a configuration of an access control configured to permit or deny a request for access in the second operating environment to one or more of a system setting, an application program, a data, and a hardware resource, wherein the data comprises one or more of an internet resource, a text file, an image file, an audio file, a video file, and an electronic book.
  • the overlay system may be configured to be executed by the one or more processors in the application framework layer of the operating system.
  • the overlay system may comprise instructions for executing a hypervisor configured to provide an operating platform comprising the first user interface, the second operating environment, and an application space providing access to the application layer.
  • the overlay system may also, optionally, include instructions for providing a first operating environment associated with the first user interface.
  • the overlay system may be configured to default to the second operating environment responsive to one or more events such as a boot up of the tablet computer, an activation of the tablet computer from a dormant state, an activation of the tablet computer from a locked state, and an inactivity of the tablet computer for a predetermined period of time.
  • the overlay system may further comprise instructions for providing an e-commerce interface configured to communicate with a remote content source using the wireless data communication interface, and instructions for mediating acquisition and installation on the tablet computer of a content from the remote content source.
  • an access control may comprise instructions for intercepting user input in the second operating environment, instructions for determining whether a request for access in the second operating environment is permitted under an operative configuration of the access control, and instructions for granting the request for access in the second operating environment only if the request for access in the second operating environment is permitted under the operative configuration of the access control.
  • an access control may comprise instructions for requiring a confirmation of compliance with one or more conditions specified in the first user interface before permitting the request for access in the second operating environment, wherein the one or more conditions specified in the first user interface comprises one or more of an event external to the tablet computer and an event in the second operating environment.
  • the overlay system may further comprise instructions for tracking a user activity in the second operating environment, instructions for generating a report regarding the user activity in the second operating environment, and instructions for displaying in the first user interface the report regarding the user activity in the second operating environment.
  • the overlay system may further comprise instructions for accepting a configuration of the access control from a different computer using the wireless data communication interface, and instructions for communicating the report regarding the user activity in the second operating environment to a different computer using the wireless data communication interface.
  • the tablet computer may further comprise an adaptive learning system comprising instructions for executing at least one direct instructional component comprising at least one of a definition of a desired skill, a skill acquisition exercise, and a configuration and evaluation interface, instructions for executing at least one indirect instructional component comprising one or more reinforcements designed to encourage one or more behaviors associated with acquisition or reinforcement of the desired skill, and instructions for executing at least one technological enabler to support at least one of the direct instructional component and the indirect instructional component.
  • an adaptive learning system comprising instructions for executing at least one direct instructional component comprising at least one of a definition of a desired skill, a skill acquisition exercise, and a configuration and evaluation interface, instructions for executing at least one indirect instructional component comprising one or more reinforcements designed to encourage one or more behaviors associated with acquisition or reinforcement of the desired skill, and instructions for executing at least one technological enabler to support at least one of the direct instructional component and the indirect instructional component.
  • the at least one indirect instructional component of the adaptive learning system is associated with a configuration of the access control requiring a confirmation of compliance with one or more conditions specified in the first user interface before a request for access in the second operating environment is permitted, wherein the one or more conditions specified in the first user interface comprises one or more of an event external to the tablet computer, an event in the second operating environment, and a performance of a skill acquisition exercise.
  • the adaptive learning system may further comprise a dynamic learning path comprising instructions for analyzing a data captured regarding a performance of the skill acquisition exercise, instructions for determining an assessment regarding the performance of the skill acquisition exercise based on one or more predetermined criteria, and instructions for personalizing a subsequent instance of a skill acquisition exercise automatically based on the assessment.
  • the one or more predetermined criteria may comprise one or more of a user proficiency in the desired skill and a user learning style.
  • the adaptive learning system may further comprise instructions for awarding to a user of the second operating environment a virtual award responsive to performance of the one or more behaviors associated with acquisition or reinforcement of the desired skill, wherein the virtual award comprises one or more of a virtual credit and a badge, and instructions for mediating an exchange of the virtual award for one or more of a status, a usage time allotment, and an authorization to access a content.
  • the adaptive learning system may further comprise instructions for awarding to a user of the second operating environment a supplemental virtual award responsive to performance of a desired award behavior, wherein the desired award behavior comprises one or more of maintaining some or all of the virtual award for a predetermined period of time and conforming with predetermined goals regarding allocation of virtual awards.
  • the at least one technological enabler of the adaptive learning system may comprise at least one of instructions for capturing an input data from an input source, the input source comprising one or more of the touch screen display and an alternate input source operable to capture and transmit input data for processing by the one or more processors, wherein the alternate input source comprises one or more of a keyboard, a touch sensitive pad, a mouse, a track ball, a pen device, a joystick, a game controller, a motion detecting device, a microphone, and a camera; instructions for capturing an offline use data reflecting use of the tablet computer in an offline mode; and instructions for using the wireless data communication interface to automatically transmit the offline use data reflecting use of the tablet computer in an offline mode to a different computer when the tablet computer is in an online mode.
  • FIG. 1 is a diagram illustrating a core architecture of the OS Overlay system, according to some embodiments.
  • FIG. 2 is a flow diagram illustrating a process for entering an operational mode, according to some embodiments.
  • FIG. 3 is a diagram illustrating a graphical user interface for an operational mode, according to some embodiments.
  • FIG. 4 is a diagram illustrating a child-safe and learning ecosystem, according to some embodiments.
  • FIG. 5 is a diagram illustrating the components of the Fundamental Adaptive Learning System (FALS), according to some embodiments.
  • FALS Fundamental Adaptive Learning System
  • FIG. 6A - 6C are diagrams illustrating aspects of the programmatic learning path of the FALS , according to some embodiments.
  • FIG. 7A - 7C are diagrams illustrating aspects of the architecture and components of the FALS, according to some embodiments.
  • FIG. 8 is a diagi'am illustrating aspects of the parental control system, according to some embodiments.
  • FIG. 9 is a diagram illustrating examples of user interfaces for prompting the input of a password, according to some embodiments.
  • FIG. 10 is a diagram illustrating a user interface for accessing a parental dashboard, according to some embodiments.
  • FIG. 11 is a diagram illustrating a user interface for managing notifications, messages, and alerts for a child's profile, according to some embodiments.
  • FIG. 12 is a diagram illustrating a user interface for alerting the user of a blocked link-out, according to some embodiments.
  • FIG. 13 is a diagram illustrating an example of a user interface for providing parental guidance, ratings and warnings, according to some embodiments.
  • FIG. 14 is a diagram illustrating an example of an user interface for informing a parent of particular warnings for apps, according to some embodiments.
  • FIG. 15 is a diagram illustrating an example of a user interface for tracking and controlling time and usage, according to some embodiments.
  • FIG. 16 is diagram illustrating the selection user interface for parental controls to select a particular device, according to some embodiments.
  • FIG. 17 is a diagram illustrating a user interface for managing to access to applications, according to some embodiments.
  • FIG. 18 is a diagram illustrating a user interface for placing content onto a "white list" of approved content, according to some embodiments.
  • FIG. 19 is a diagram illustrating a user interface for acquiring and downloading content, according to some embodiments.
  • FIG. 20 for personalized content for a particular kid user account, according to some embodiments.
  • FIG. 21 is a diagram illustrating a user interface where the profile details are inputted by the parental control system, according to some embodiments.
  • FIG. 22 is a diagram illustrating a user interface which includes a view for management and acquisition of virtual currency, according to some embodiments.
  • FIG. 23 is a diagram illustrating a user interface for accessing controls to multiple kid user profiles and/or accounts registered with the parental control system, according to some embodiments.
  • FIG. 24 is a diagram illustrating a user interfaces for a chore list system, according to some embodiments.
  • FIG. 25 is a diagram illustrating a user interface for reviewing and tracking rewards and incentives as relating to progress in educational content, according to some embodiments.
  • FIG. 26 is a diagram illustrating a user interface for spending or redeeming virtual cmTency or other credit or reward for obtaining digital content or real items, according to some embodiments.
  • FIG. 27 is a diagram illustrating the components and steps for curating apps for a user profile, according to some embodiments.
  • FIG. 28 is a diagram illustrating a user interface for home pages for the Curated Apps Store, according to some embodiments.
  • FIG. 29 is a diagram illustrating a user interface for home pages for the Curated Apps Store in another view, according to some embodiments.
  • FIG. 30 is a diagram illustrating a user interface for the Curated App Store interface, according to some embodiments.
  • FIG. 31 is a diagram illustrating a user interface for presentation of available apps, according to some embodiments.
  • FIG. 32 is a diagram illustrating two views of a Curated App Store, according to some embodiments.
  • FIG. 33 is a block diagram illustrating a computer system upon which some embodiments of the invention may be implemented, according to some embodiments.
  • FIG. 34 is an example illustrating a view of a visual aspect of an interface for displaying information, according to some embodiments.
  • a computer's operating system is provided with at least two different user interfaces (UIs), whereby each UI may be customized based on a specific user type or profile.
  • user interface types or profiles may include one or more interfaces or profiles for children ("Kid Mode") and one or more interfaces or profiles for parents ("Parent Mode").
  • Exemplary embodiments described herein refer to Parent/Parent Mode and Kid/Kid Mode to represent examples of different user types and user interfaces.
  • such descriptions are solely for illustrative purposes and shall not limit the scope of the invention, and such embodiments may be useful in any multi-user environment that may benefit from user profile-based customization of UI and access to applications and content.
  • each type of UI is different in visual appearance and in work flow.
  • Embodiments may be implemented with any OS, including mobile OSs, such as Android, iOS, bada, BlackBerry OS, S40, and Windows Phone, as well as desktop or laptop OSs, such as Windows and Mac OS.
  • mobile OSs such as Android, iOS, bada, BlackBerry OS, S40, and Windows Phone
  • desktop or laptop OSs such as Windows and Mac OS.
  • Android OS for mobile devices.
  • Kid Mode a user is provided with a "kid-friendly" environment permitting access to curated (e.g., previously identified as appropriate for an age or gender group) apps and games specifically made for kids; to browse Web content specific to their age and gender; to earn virtual currency by performing activities on the tablet; to spend virtual currency in an app store for kids; and to improve their educational skills through core- curriculum, state-standardized lessons.
  • curated e.g., previously identified as appropriate for an age or gender group
  • a user is provided with the default OS environment that allows them to have unrestricted access to all applications and content; to access the tablet's settings; to configure access controls for other users (e.g., Kid Mode); and to have unrestricted access to content acquisition facilities such as an online app store, music store of video store; and to make purchases with one-click.
  • OS environment that allows them to have unrestricted access to all applications and content; to access the tablet's settings; to configure access controls for other users (e.g., Kid Mode); and to have unrestricted access to content acquisition facilities such as an online app store, music store of video store; and to make purchases with one-click.
  • a parent or supervisory user, can monitor their child's time and usage of content in Kid Mode by viewing reports and analytics.
  • a parent can allow or restrict their child's access in Kid Mode to certain apps, games or types of content via a series of on/off switches or other indications of whether access is enabled.
  • monitoring and configuration capabilities may be implemented via an online Parental Dashboard that is accessible via the Internet.
  • An advantage of combining a single OS with multiple different UIs is that one environment can control or be a supervisor of the other environment. Another advantage is that each user of the tablet can have his or her own UI and user experience.
  • the architecture of the OS Overlay is vastly different from other solutions.
  • the core architecture is as shown in FIG. 1.
  • the OS Overlay is built on an existing OS Core, with OS Overlay system manager libraries added to the Application Framework level 101 of the existing OS Core, and additional applications included in the Application level 103 of the existing OS Core.
  • native and third party OS Overlay applications 105 are included in the OS Core's Applications layer alongside native and third party Android applications 107.
  • OS Overlay system manager libraries 109 are included alongside Android system manager libraries 111 ,
  • the OS Overlay architecture enables a single OS to provide multiple switchable and customizable UIs supported and managed by a Mode Manager, In exemplary embodiments for use in a family group, switchable UI modes allow kids to use the tablet device in a protected Kid Mode environment, while allowing parents to manage Kid Mode's access to apps, content, and settings with the Parental Control Manager in Parent Mode and/or an online Parental Dashboard. Parents can also enjoy unrestricted access to the full capability of the OS in Parent Mode.
  • the OS Overlay architecture also allows an embedded parental control that helps safeguard what kids can access within a safe environment, as well as providing a monitoring mechanism within the OS level to provide access, usage, and time spent on apps by the kid with the device.
  • the OS Overlay system includes the following features and elements:
  • Mode Manager provides advantages over tablets shared by kids and parents using the same interface without a separate controlled environment for kids. Typically in such cases, controls are available but are applied indiscriminately in what may be referred to as a "locked down" mode, or the controls are turned off, resulting in an uncontrolled environment in which any user can access content and change system settings regardless of whether such activities are appropriate for a given user. Mode Manager provides for switchable user interface modes, including Parent Mode and Kid Mode.
  • Parent Control Manager provides the ability to manage and limit access for applications, content, and other settings in Kid Mode.
  • Child Monitoring Manager offers access, usage, and time tracking for all activities in Kid Mode.
  • the Child Monitoring Manager is linked with an online Parental Dashboard service accessible via the Internet to provide real time web based reports.
  • the Child Monitoring Manager further provides monitoring of results of the use of contents, tests, performance assessments, and other user interaction with content.
  • the monitored results can also be uploaded to a remote facility such as a server where more extensive performance analysis can be conducted.
  • Application Manager provides the ability to manage and limit access for applications via Add Apps interface based on individual user profiles. This allows authorized sets of applications to be made available in the Kid Mode.
  • the authorized sets of applications available in Kid Mode may be curated by a service provider or by a parent or other authority figure so that they are identified to be appropriate for an age or gender group or other subgroup of users.
  • Content Manager filters content based on user profile parameters, such as age, gender, and interests. It limits access to provide a safe environment in Kid Mode.
  • Content Manager may use content with pre-defined categorization in metadata tags that are related to user profile parameters.
  • Content Manager may limit content access to a user profile by comparing the content's metadata with a user profile's parameters, and only providing content with metadata that meets user profile parameters.
  • Content Manager provides customizable settings that may be modified by parents for providing each user profile personalized access to the content.
  • an exemplary embodiment of the OS Overlay includes OS Overlay System Apps, Third Party Preloaded Apps, Native Android Apps, and Third Party Apps.
  • An exemplary OS Overlay system applications environment includes a full line-up of custom applications that creates a tablet eco-system environment. This enables one central user account for application access as well as purchases made within applications ("in-app" purchases).
  • An exemplary OS Overlay applications environment includes:
  • a. Content Service including curated apps selected for kids for free or paid acquisition.
  • Exemplary embodiments of the OS Overlay include Preloaded Custom Third Party Apps, which may include one or more custom third party apps that are pre-selected to provide and/or complement experiences deemed important for children, such as learn, create, watch, read, and play. Certain third party apps are tightly integrated with the OS Overlay system environment, including linking to the OS Overlay system's App Zone electronic retail store application, for example, to facilitate upgrade of a free third party app to a paid version.
  • Preloaded Custom Third Party Apps may include one or more of the following:
  • the OS Overlay offers a protected environment that provides distinctive benefits over other approaches, including without limitation the following advantages:
  • the OS Overlay provides a fully integrated eco-system for all applications and features. It also allows all compatible applications to request authorizations (e.g., by entry of a Parent password within Kid Mode or by configuration of controls in the Parental Dashboard) in the safety and security of the eco-system.
  • Mode Manager is embedded in the OS Overlay System to provide multi-user interface support for kids and parents. Kid Mode and Parent Mode can be switched back and forth using the usage flow shown in FIG. 2.
  • device ranning the mobile operating system with the OS Overlay System is booted up.
  • the system determines if the default is set to Kid Mode.
  • Kid Mode is entered if the default is set to Kid Mode.
  • default is not set to Kid Mode, Parent mode is entered.
  • to enter from Kid Mode to Parent Mode the system determines if a parent password is provided. If a parental password is provided, the system switches from Kid Mode to Parent Mode.
  • the Kid Mode icon is selected, and returning to step 205, Kid Mode is entered.
  • Parent Mode is the default user interface for the core OS.
  • Parent Mode provides features including, but not limited to, a generic UI, open access to any application and content, open access to all device settings, full privileges to perform one-click purchases, and full control to perform system updates, among others.
  • Kid Mode provides an embedded solution to the unprotected and unrestricted access problem for any tablet. As part of the OS Overlay System, it allows a profile -based safe environment for kids as soon as the tablet is powered on. Kid Mode includes parent-controlled time, use, and access restrictions for applications. An example of such restrictions include restricting access to pre-defined kid friendly content and apps, time restrictions to restrict usage without direct parental monitoring, and parental monitoring of device usage through the Child Monitoring Manager.
  • content consumption is managed in Kid Mode, including by manual and remote approaches,
  • a cloud-based service maintains and provides a content listing based on individual kid user's profile.
  • the content consumption manager provides a personalized and customized content consumption model.
  • an integrated OS Overlay system with preloaded applications and content including specially selected games, apps, music, and videos that are appropriate for kids provides instant usability of the device regardless of available of internet access for content downloads.
  • Preloaded applications and content may correspond with content categories, including the categories of learn, create, watch, read and play to help maximize a user's enjoyment of the tablet.
  • preloaded apps, and available apps for downloading from the eco-system's content provision interfaces including App Zone and Treasure Box interfaces, are curated, or specially selected and verified as kid-friendly apps or games.
  • virtual currency in Kid Mode, can be earned by completing activities on the tablet, including but not limited to activities such as: getting a perfect score on a math lesson; for completing a chore.
  • Virtual currency can be directly acquired by distribution by a parent. Virtual currency can be deducted for not completing an activity.
  • the balance of virtual currency for a user profile may be stored locally and synchronized to the cloud-based profile of the eco-system for remote management. Virtual currency distribution not only provides an incentive and rewards a child for doing good things, but also disciplines them as well.
  • an educational app is preloaded as part of the OS Overlay system and it can be accessed within Kid Mode. This offers a comprehensive learning solution bases on standard curriculum. It introduces serious learning as part of the overall user experience.
  • the educational app is also linked with a cloud-based educational platform service, which tracks progress and performance of each child and offers analysis of suggested improvement area per subject.
  • the Kid Mode user interface includes a simple and intuitive user interface for kids.
  • Kid Mode interface For typically infrequently accessed functions, Kid Mode interface includes a popup access bar 303, as shown in FIG. 3, to provide simple setting access as well as Parent Mode access link. This reduces clutter within the viewable interface and preserves the general kid friendly theme.
  • Kid Mode presents multiple ways for kids to customize their screen by allowing drag & drop of apps to user's desired locations as well as grouping multiple apps in app folders 305. This promotes personalization and creativity. Kid Mode also enables certain apps to be locked in their corresponding positions.
  • Profile based Customization Wallpaper, App button style, and App Shortcut organization can be customized based on different children's profiles.
  • Parent Mode contains totally separate settings that allow for differentiation of the overall look and feel between UI modes.
  • a multi-mode system provides curated child-safe content. Access is provided only to content that is predetermined by a parent or service provider to be appropriate for a given age or gender group or other subgroup. Multi-mode configurations may also filter content within the application, which provides a safer content access environment for kids.
  • Content includes preloaded music for kids; preloaded music video for kids; preloaded e- books for kids; music store for kids; cartoon and video for kids; web content for kids; online video for kids; online crafts for kids.
  • FIG. 4 is a diagram showing aspects of a child-safe, learning, and rewards ecosystem 400, according to some embodiments of the invention.
  • the ecosystem provides a bounded environment of child-safe systems and content.
  • the ecosystem comprises a server 402, a mobile device 404, communicatively connected by a network, such as the internet.
  • Mobile device 404 includes a parent operating environment 406, such as the parent mode and user interface running on an application layer framework of a mobile operating system, as described above, management processes 408, such as the mode manager, content manager, and parental controls manager as described above, and a kid operating environment 410, such as the kid mode and user interface as described above, whose access to apps and resources 412 are managed by the parent operating environment 406 and management process 408.
  • Kid operating environment 410 also includes access to the user interfaces used by adaptive learning system, further described below.
  • FIG. 4 further shows aspects of server 402, providing online services and support to one or more mobile devices, including mobile device 404.
  • server 402 includes the engines and other online services of the adaptive learning system 414, further described below.
  • Server 402 maintains user accounts, including parent account 416 and kid account 418.
  • Parent account 416 includes account information such as profile parameters, apps purchased, reward credits purchased, authentication credentials, identities of ecosystem mobile devices owned, and kid accounts associated with parent account 416.
  • Kid account 418 includes account information such as profile parameters (e.g., photo, age, gender, educational level, educational subjects, usage data, desired behaviors), data collected and acquired from the adaptive learning system, and any rewards credits distributed to kid account 418 from rewards credits in the parent account 416.
  • profile parameters e.g., photo, age, gender, educational level, educational subjects, usage data, desired behaviors
  • Server 402 hosts a curated content store system 420 that provides content for purchase for users of the ecosystem. Details of the curated content store system are further described below.
  • the curated content store system 420 includes curated rewards store 422, which accepts credits as tender for purchasing curated content.
  • credits accepted by rewards store 422 are tendered through the Kid Mode interface from the mobile device 404 for purchase of curated apps by a child user using reward credits earned by the child through satisfying certain conditions, such as by completing learning paths in the adaptive learning system, or by completing tasks from a chore list.
  • Server 402 includes a web server 424 for serving web sites and web pages of the ecosystem.
  • Web sites served include a parental dashboard interface 426 from which a supervisory user may access parent account 416 to manage kid account 418, including monitoring usage data for kid account 418, reviewing and generating analytics, insight and recommendation reports from adaptive learning system 414, purchasing new credits for distributing to kid account 418, and managing the chore list and rewards system.
  • Parent account 416 may be associated with several mobile devices, and each kid account may be associated with any or all of such devices. Each parental account 416 thus provides a common child-safe, learning and rewards ecosystem from which features and resources can be customized for each kid account 418 and the kid user interface associated with kid account 418.
  • FIG. 5 shows a diagram of the components of the Fundamental Adaptive Learning System (FALS), according to aspects of some embodiments of the invention.
  • FALS includes direct instructional components, indirect instructional components, and technological enablers.
  • Direct instructional components organize, provide and monitor the skill acquisition activity, and are at the center of the FALS utility, which is to ensure the acquisition or reinforcement of the skill set.
  • Direct instructional components comprise courseware definition and personalization 502 for presenting instructional material to users, skills acquisition methods 504 for providing interaction with the user to teach the coursework, and insights and recommendations dashboard 506 for evaluating the assessment and tracking for providing the next stage in an advancement path and other recommendations.
  • Direct instructional components result in the acquisition or reinforcement of a fundamental skill set.
  • indirect instructional components are part of the infrastructure of FALS in support of the direct instructional components.
  • Indirect instructional components enable FALS to most effectively achieve acquisition and reinforcement of the fundamental skill set.
  • Indirect instructional components are reinforcements, or features that indirectly contribute to the acquisition of the skill by having an effect on user motivation and behaviors, such as: practice frequency and quantity; repetition of practice; ambition to improve proficiency; competition to improve proficiency, symbolical rewards for achievements (progress and proficiency); and tangible or virtual rewards for achievements. Reinforcements are widely recognized in behavioral science and organizational literature as necessary to achieve and sustain a change in behavior that leads to an improvement in performance. As such, while indirect, they are critical to the achievement of the purpose of the FALS.
  • Indirect instructional components include content store 508, touch device ecosystem and apps 510, game-like UI and mechanics 512, and virtual currency and rewards system 514.
  • Technological enablers are part of the technological infrastructure developed to support the direct and the indirect instructional components.
  • Technological enablers are software solutions and services required to operate the instructional components in a way that maximizes their utility value to the user and to the supervising user.
  • Technological enablers include offline/online capabilities 516, data capture & acquisition 518, supervising user environment 520, synchronization 522, and privacy compliance system 524.
  • the offline operation of the FALS, with the capability to sustain data capture and acquisition while in offline mode, and the added capability to automatically synchronize the dataset with the cloud-services, enable the user to sustain practice when an Internet connection is not available, while obtaining the same benefits as having an available Internet connection.
  • the Fundamental Adaptive Learning System provides a personalized learning program to each user based on his or her level of proficiency in each of the fundamental skill sets required in the curriculum. It allows supervising users to gain insights into progress and proficiency in the fundamental skill set acquisition.
  • it provides supplemental learning courseware that aligns to the compulsory skill sets required by the Core Curriculum State Standards and a working environment in which users can acquire or reinforce these skill sets autonomously through learning, practice, repetition, assessment, instant feedback, incentives and gratifications.
  • FALS is organized around skill sets, hereinafter referred to as "fundamentals,” each of which is a specific skill set that must be acquired by the end of a grade level in a given subject to advance to the next grade level in the given subject.
  • the FALS aligns to the Core Curriculum State Standards to determine what are the compulsory skillets and reflects in its structure and progression path how each Fundamental is taught and acquired in the classroom.
  • the FALS then provides a personalized courseware to each user based on his or her level of proficiency in each of the fundamental skill set required in the curriculum.
  • the FALS may be implemented on mobile devices with a touch screen input interface.
  • Each fundamental skill set benefits from its own set of user interfaces and look and feel, is optimized for touch-based user interactions, and is specifically designed to teach or reinforce the acquisition of the skill set.
  • the overall application user interface is a game-like interface designed to maximize practice and repeat visits.
  • a unique visual identity system to identify lessons belonging to a given fundamental and a visual learning path along which the user journeys, it incorporates gaming mechanics, visual, audio, kinesthetic and motor cues and interactions that reinforce engagement with the FALS, and drive repeat practice and repeat visits to the FALS.
  • the FALS operates in offline mode on the touch mobile device - i.e. in the absence of a connection to the internet and to cloud services - with access to all of the core features required for skill set acquisition, to automatically capture user information and user behaviors (the "dataset") while offline and automatically synchronize this dataset with cloud applications and services when the device comes online.
  • the FALS captures the user behaviors and interactions with a mobile device with a touch screen input interface. Specifically, the FALS captures information relating to the educational goals, including practice attempts that do not necessarily lead to a proficiency assessment or to the completion of an instructional item. In addition, the FALS captures user events and interactions with the software and allows to optimize the performance of the system overall, both from an educational standpoint and from an application standpoint.
  • the Fundamental Adaptive Learning System includes: a courseware definition and personalization system; applications and cloud-services integrated to a mobile computing device; a game-like user interface and dynamics, skill set acquisition methods integrated to a touch mobile computing device; an online analytics-based insight and recommendation solution; and a virtual-currency based reward system redeemable for virtual and tangible goods; a content store for FALS courseware and third-party applications and materials; and eco-system for seamless integration third-party applications with FALS platform, applications and accessories.
  • the Fundamental Adaptive Learning (FAL) System includes a Courseware Definition and Personalization System (CDPS).
  • CDPS includes: reference curriculum structured along fundamental compulsory skill sets; a programmatic learning path for each of the fundamental skill set; and an Adaptive Learning Algorithm that personalizes the learning path for each user and dynamically adjusts it based on the user individual performance and the proficiency level of the user in the skill set.
  • the FAL System is unique in that it creates and dynamically adjusts an optimal learning path within a pre-defined courseware that leads to the mastery of fundamental skill sets aligned to a standard curriculum, such as the Common Core State Standards curriculum. Such dynamic updating and personalization to each user's level of comfort ensures motivation and continuous progress.
  • the reference curriculum of the FAL system is aligned to Common Core State Standards.
  • the primary element of the curriculum is the "fundamental" skill set.
  • a fundamental skill set is a compulsory skill that the user must have acquired by the end of a school grade, and conditions the ability to progress through grade levels.
  • a game-like user interface ensures a high level of engagement, which translates into an increase in number of lessons practiced, repeat practicing of the same lesson, an increase in the number of hours spent practicing, and an improvement in proficiency scores and mastery of fundamental sldll sets.
  • the gaming mechanics operate as incentives and reinforcements of practicing behaviors, and specifically drives users to achieve higher levels of proficiency.
  • the main user interface is designed to provide a number of visual cues and menus that make the skill set acquisition an appealing and enjoyable interaction, while inspiring the user to progress on the learning path.
  • Navigational elements within the user interface turns practice into a discovery process by organizing subject matters into specific areas of the user interface that are immediately recognizable after first time use; representing individual fundamental skill sets by a character and a theme that carry across grade levels; providing for lessons in a given fundamental a unique identity system and color-coding that extend beyond the presence of the character; using specific characters throughout the interface to provide specific features, such as tutorials, instructions, or hints; visually organizing lessons along a path on which the user journeys; disclosing content progressively to the user, as milestones are met and unlock new instructional items or additional lessons; visually representing completion levels and scores on the learning path; offering additional "unlocks" of previously locked content and discoveries, such as quests, upon completion of a given fundamental; performing educational activities that are not directly integrated to the user learning path, such as supplemental optional activities like quests, for fun, for rewards and badge
  • Game-like elements include illustrated backgrounds with animations; background music and sound effects accompanying interactions and outcomes; audio and video tutorials and instructions; quiz animations and sound effects.
  • Game mechanics include progressive unlocks of additional content; discovery of new territories with additional capabilities; instant feedback mechanisms with audio reinforcements; visual and audio reinforcements for each achievement or reward obtained; leader board to compare versus friends or general user population; badge awarded for achievement with collection value and bragging rights; hints, cues and in-game advantages that can be purchased against virtual currency; and access to third-party rewards and in-app purchases for content extension.
  • the system offers the option to use either the main user interface or an alternative user interface that provides a more traditional navigation path and content discovery model.
  • the teacher can assign fundamental skill sets - or subsets - to different users, either individual lesson plans or by proficiency levels. The user can then access the specific content in an individual "shelf in the user environment, and practice the lesson.
  • Additional curriculum configuration tools are also available to align the supplemental material to the class syllabus, and can also be used for non-traditional curricular activities as well as reinforcing learning behaviors. Specific assessment tools are also available.
  • the FAL system defines programmatic learning paths for each of the fundamental skill sets. Completion of a learning path demonstrates proficiency in the fundamental skill set.
  • some embodiments provide "programmable" learning paths and/or fundamental skill sets so that course content and/or teaching techniques can easily be changed to adapt to a real-world school curriculum or syllabus. Among other benefits, this permits customization of the FAL system to align with different course content and/or teaching techniques that may be used with a given individual or educational institution.
  • FIGS. 6A - 6C are diagrams illustrating aspects of the programmatic learning path of the FALS, according to aspects of some embodiments.
  • FIG. 6A is a diagram that presents learning paths for attaining and demonstrating proficiency in Topic 1 602, Topic 2 604, Topic 3 606 and Topic 4 608, according to aspects of embodiments of the invention.
  • the Topic 1 path shown in bold, and comprising lessons 611, 612, 613, 614 showcases the learning path for proficiency of Topic 1.
  • To demonstrate proficiency of Topic 1 the user is required to complete the path between "LI" and "Topic 1 Proficient".
  • Topic 1 Proficient requires the completion of lessons 611, 612, 613, 614 as indicated by the solid arrow lines.
  • the user may follow an alternative path, indicated by the dashed arrow line. As shown, a user may skip 612 and 613 to directly proceed to 614 after 611.
  • lesson 611 is a shared milestone lesson that begins the paths necessary to attain Topic 1 proficient 602, Topic 2 proficient 604, Topic 3 proficient 606, and Topic 4 proficient 608.
  • lessons 611, 618 and 619 are studied and progressed through to reach Topic 2 proficient 604.
  • FIG. 6B illustrates a diagram of one example a stage of navigating a learning path towards "Topic 1 Proficient" 602 when lessons 613 and 614 are locked, according to aspects of the invention.
  • Unlocking lessons is the control method for sequencing of lesson completion. Initially, the user only has the first lesson 61 1 in the sequence available in a path. If the user completes the available lesson with a satisfactory score, the next lesson 612 in the sequence is unlocked. In the stage as shown in FIG. 6B, the user has 61 1 and 612 available. The lessons 613 and 614 are locked. The user cannot attempt 613 or 614. When 612 is completed then 613 will unlock and become available.
  • the path progression toward proficiency in a topic is dynamic. In some instances, completing lessons at the minimum completion score will continue linearly through the lesson, as shown in FIG. 6B. Completing a lesson at a top tier score may allow a user to unlock some or all lessons up to the next milestone lesson, thereby skipping some lessons along the path.
  • the user may be sent "backwards" along the path to the lower-level lesson. Attempting this lower- level lesson reinforces the user's ability to pass the failed lesson. In particular, as shown in FIG.
  • the user has completed lesson 61 1 and continues to lesson 612.
  • the user completes lesson 612 at a high score tier, thus can "skip" to lesson 614.
  • the user fails at lesson 614 and is moved “backwards” to lesson 613.
  • the user passes lesson 613 and moves again to lesson 614.
  • the user passes lesson 614 and completes the lesson path to attain "Topic 1 Proficient" 602 status.
  • the Adaptive Learning Algorithm operates at the fundamental level. It determines user proficiency in fundamental skill sets and provides recommendations that are designed to provide guidance to the supervising user on actions to improve the user's proficiency and mastery in a grade, subject, or fundamental skill.
  • the recommendations and output of the ALA include additional courseware, textbooks, supplemental learning applications, and other products and services. Additionally, ALA may recommend revisiting previous skill sets, introduce related skill sets, or additional content for the currently targeted skill set.
  • the Assessment Engine includes at least two assessment processes which are included in the ALA.
  • the initial assessment is a diagnostic tool used by the supervising user to assess the user's understanding and proficiency in a given fundamental skill set.
  • the completion of an Initial Assessment provides the data to generate recommendations for the placement of the user on at specific milestone lesson.
  • the ALA further includes a continuous assessment process of the user's progress and proficiency levels along the Learning Path. As the user attempts additional lessons, the Assessment Engine in a continuous assessment process creates or modifies recommendations, updates the dynamic lesson path, feedbacks metrics and detailed analytics-based insights, and improves and refines future assessments.
  • FIG. 7A is a diagram that illustrates the architecture of the Fundamental Adaptive Learning system according to aspects of embodiments of the invention, which comprises 3 main components, a User environment 701, a Supervising user environment 703, and a Cloud environment 705.
  • the supervising user environment 703 and the user environment 701 are native to the mobile computing device and are primarily used for displaying and managing content.
  • all the analysis, storage, and computing are provided by cloud services, although embodiments may conduct the analysis, storage and computing in any combination of local or distributed manner without departing from the spirit of the invention.
  • the integration of the User environment 701 and the Supervising user environment 703 with the OS Overlay in a Dual- or Multi-UI configuration allows the Adaptive Learning System to manage handshakes and handovers between each user environment.
  • the Adaptive Learning System is guided by the supervising user when it comes to selecting the fundamental skill set to work on, but the user can autonomously complete the assessment.
  • the assessment result and recommended courseware are submitted for approval to the supervising user, who can decide to approve or to reject if the assessment was not conclusive. Once the recommendation is approved, the user can autonomously progress through the learning program without supervision
  • the hosting of the essential assets and engine in the cloud allow deploying the Fundamental Adaptive Learning System across a wide range of devices. Some embodiments provide for implementation on a device with a touch-screen input interface. This cross-device approach expands the use-case scenarios and facilitates practice.
  • the user environment 701 is responsible for rendering lesson data. It receives lesson data from the cloud 705 and displays questions to the user in the user environment 701. It interacts with the user through the input methods provided by the mobile computing device. By extending the input types of the question to the capabilities of the mobile computing device, it allows the user to have an interactive and engaging experience as they practice lessons. Questions are displayed one at a time, each waiting for an answer from the user. At the end of a practice the results are submitted to cloud for storage and analysis.
  • the fundamental skill sets include core learning materials aligned on State Standards
  • the user interface provides a rich and highly interactive experience.
  • users can visualize their progress and stay actively engaged in learning. Users can see what milestones they have reached and what needs to be unlocked in order for them to master a fundamental skill set.
  • the supervising user environment provides tools for the supervising user to guide and monitor progress through the mastery of fundamental skill sets.
  • the supervising user can initiate assessments, which is used by the Adaptive Learning system to recommend a learning path tailored to the user proficiency level as demonstrated by the assessment.
  • assessments which is used by the Adaptive Learning system to recommend a learning path tailored to the user proficiency level as demonstrated by the assessment.
  • questions are asked to the user until the cloud-based assessment engine can recommend courseware based on the user's performance.
  • the recommendation is provided to the supervising user and, if approved, the courseware will be added to the user's learning path.
  • a store is also available to the supervising user for purchasing additional courseware. This allows for one-click purchase of new courseware to be added to a user's courseware list.
  • the Cloud Services Environment 705 comprises an Assessment engine 707, an Insight & Recommendation engine 709 and a data repository 711 for courseware and other data and content.
  • the Assessment engine 707 is designed to assess the user's proficiency in the fundamental skill set and establish the Learning path to achieve a skill set.
  • the Insight & Recommendation engine 707 is responsible for saving and analyzing lesson data that a user has taken. In some embodiments, it is an network-based solution that provides a highly customizable interface with instant insight into the user's performance and proficiency. Insight-based recommendations are provided to the supervising user to help personalize a user's courseware.
  • a cloud-based repository storage system 71 1 is primarily responsible for serving lesson data and assets. Downloadable courseware packages, built for portable offline access, can be imported into the user environment. Lesson data is inputted into the repository with an input tool that allows a data entry user to visually create a problem via web interface. This allows for a controlled and standardized look and feel of lesson data and input types.
  • the primary user interface of mobile computing devices is the touch interface, which allows for intuitive and natural user interactions and instructions. Recognizing this expansion, for some embodiments of the invention, the Fundamental Adaptive Learning System has been specifically designed to take full advantage of the touch interface.
  • the user interface of the lessons is designed for touch input, providing assets that are "clickable” and selectable by touch. Drag and drop input actions are broadly used. Menu bars are expandable/retractable to allow for comfort. More importantly, certain skill sets require the use of touch and cannot be replicated on a non-touch device. Further described below are non- traditional input methods and firmware level integration with a Mobile Computing device interface. [0214] Not all skill sets can be acquired through traditional curricular activities.
  • motor skills include hand-writing, which can be practiced by use of stylus input devices that can be held by a user. Using the touch-screen input interface, hand-writing can be evaluated against a standard letter, which can be introduced in the interface along with guide lines for a child to use when copying the letter.
  • phonetic skills include recording a voice input, and evaluating the input against a stored answer (e.g., a waveform for the sound) to determine if the correct word, morpheme or phoneme was said.
  • the Fundamental Adaptive Learning System addresses both of these challenges with specific and unique methods not found in traditional online learning environments. These methods are built upon firmware-level integration with the mobile computing device interface in order to enable kinesthetic and audio activities as well as customization of the user interface to the particular set of activities; and integration with the OS Overlay and with native applications integrated across the Dual UI system that supports the acquisition of non-traditional curricular skills.
  • the mix of user interfaces required, the layouts and visual cues in the lessons, the sequence in which they are introduced and the reinforcement and assessment of mastery are inspired by classroom teaching and follow teachers' recommendations on how to achieve skill set acquisition.
  • the FALS also allows addressing non-traditional curricular activities, including research and outdoor collection of items, as well as reinforcing learning behaviors that are conducive to mastery of the Fundamental skill set, such as assiduousness of the child to a task, having a clean workspace, all of which can be assigned a score by evaluated by a supervisor, and received by the system as input from the supervisor.
  • the Fundamental Adaptive Learning system incorporates skill- building activities and a range of input/output methods that support the acquisition of motor skills and phonetic skills.
  • the input/output methods call on single and multi-touch gestures, finger-based and stylus-based input, audio-recording and audio-playback, visual and audio displays for hints and guidance.
  • the interface-layer integration with these I/O interfaces directly reinforces the acquisition of the required motor skill or phonetic skill.
  • input regarding handwriting may be captured via a pen-like device that enables users to practice handwriting exercises in an environment similar to a conventional pen and paper experience that also provides for the capture of data regarding pen markings and for the transfer of such data to a computer for assessment and provision of feedback to the user via the tablet computer screen.
  • the pen device may include one or more optical cameras or other sensors to capture data regarding the markings made with the pen as well as data regarding the user's grip on the pen.
  • Handwriting exercises may be provided on printed writing surfaces that include physical representations of handwriting exercises available within the FALS.
  • One or more cameras may be mounted at the top of or along the length of the pen to record an image of the user's grip and the paper surrounding the area being marked, which the system uses to contextualize the user's markings in a digital representation of the physical writing surface.
  • an optical sensor may be mounted at or near the writing tip of the pen to capture data regarding movement of the tip over the paper similar to the manner of operation of known optical mouse input devices.
  • the FALS receives user input from the pen-like device, assesses conformity with corresponding instructional standards, and provides feedback, including instruction and remedial exercises as appropriate, via the screen of the tablet computer.
  • the measurement of the user proficiency cannot be achieved in an automated way through the collection of an input through the user interface.
  • the supervising user can supplement the learning model by observing synchronously or asynchronously the user's outcome, and validating or invalidating the response.
  • two type of activities cannot be performed solely in the computerized environment, and require managed interactions between the offline performance of the activity and its tracking and validation through the computing device.
  • activities include activities that require users to go offline to perform tasks such as research, item collection, and writing a report; and the adoption of behaviors that reinforce or condition the acquisition and retention of knowledge, called here "learning behaviors.”
  • the Fundamental Adaptive Learning system provides an interface and handshake system between the user environment and the supervising user environment that enables actions for monitoring performance, including agreeing or "contracting" on a task and a goal, either pre-defined in the user interface or personalized by the supervising user; associating a frequency of measurement and duration to that contract or to the achievement of the goal; associating a reward to the achievement of the goal, in the form of a virtual currency redeemable for virtual or tangible goods, as further described below; and validating the achievement and releasing the reward.
  • achievements obtained are included in the Learning Path for the activities that are compulsory fundamental skill sets, and are reported through the Insights & Recommendation solution together with the rewards obtained.
  • the insight and recommendation engine 709 is an online monitoring and reporting interface that ties into the cloud-service infrastructure. It provides supervising users with functional capabilities that allow to generate detailed insights into the end user proficiency, to detect problem areas and to recommend intervention or to adapt the learning path.
  • the monitoring interface can be accessed through the user device or through any other device connected to the internet.
  • the insight and recommendation engine 709 includes features such as real-time monitoring of progress and performance against standards, data-mining analysis at 4 to 5 levels of granularity, direct access to summary indicators of performance, tracking of achievements and rewards, tracking of practice time and usage, and recommendation of instructional items, additional practice or courseware based on the needs of the user, as further described below.
  • the insight and recommendation engine 709 provides real-time monitoring of progress and performance against standards.
  • the monitoring includes collecting in real-time user level data from the native application and stored in the cloud, compiling the data according to standardized key performance indicators and automatically updating the monitoring interface.
  • user performance can be compared to personalized standards defined by the supervising user or to peer-group performance benchmarks.
  • the insight and recommendation engine 709 also provides data-mining analysis at, for example, 4 to 5 levels of granularity.
  • FIG. 7B provides an exemplary view of an interface provided in web-based browser interface 713, according to aspects of some embodiments.
  • data-mining analysis is provided at a coarse level of granularity for whole subjects, such as math, reading and writing, and can be drilled down at finer levels of granularity.
  • Key performance indicators, such as scores earned 715, degree of completion of the courseware 717, and time spent 719 can be provided at the subject level of granularity for each subject 721, 723, and 725.
  • key performance indicators are provided for each fundamental skill set within the subject, for topics within a fundamental skill set, for lessons within a topic, and for questions within a lesson.
  • the supervising user can customize several parameters to analyze the key performance indicators for other hierarchies of information, including analysis by different periods of reference, including by day, week, month, year, or a custom period, or analysis by main difficulty areas and proficiency levels in each area. Different methods of customized reporting are available to the supervising user, such as by dynamic dashboard update or by selection-based updates. Such levels of analysis allow a supervising user to investigate the details behind an average score at a high level of granularity to identify trouble spots to target with tailored learning activities.
  • the insight and recommendation engine 709 further provides direct access to summary indicators of performance. In order to streamline the data-analysis process, summary indicators are readily available at first glance, at the overview reporting level. Further detailed drill downs are also available for each data point, as per granularity levels defined above. [0228]
  • the insight and recommendation engine 709 further provides tracking of achievements and rewards, including a searchable repository of past achievements, awards received, certificates obtained, and rewards gathered in addition to performance indicators.
  • the insight and recommendation engine 709 further provides tracking of practice time and usage. In addition to performance and proficiency-based monitoring, supervising users can correlate user level results to time spent and to practice lessons attempted.
  • the insight and recommendation engine 709 further provides recommendation of additional practice or courseware.
  • additional courseware is recommended to a user. For example, if the proficiency level is below acceptable standards (at default settings or supervising-user settings), additional practice is recommended until mastery is achieved. In the adaptive learning approach, this may lead to the practice of lower difficulty lessons until the lesson under consideration can be mastered. If the proficiency level is at or above acceptable standards (at default settings or supervising-user settings), the lesson under consideration is considered mastered. Additional practice is recommended in the same topic or in the same fundamental skill set until the higher level in the hierarchy is mastered. In the adaptive learning approach, this may lead to the practice of higher difficulty lessons until the Topic or Fundamental skill set under consideration is mastered.
  • the capabilities offered by the insight and recommendation engine 709 reinforce the acquisition of the fundamental skill sets. They allow for early detection of problem areas, intervention through coaching or provision of tutorials, adaptation of the learning path, and reinforcement of achievements. They provide capabilities to adapt the schedule of the learning path to align with classroom learning and to adapt to the schedule of the user.
  • the insights and recommendation engine 709 is accessed by an insights and recommendations solution in a web-based browser interface 713.
  • a web-based browser interface 713 for the recommendation and insights solution allows for flexible access either from the mobile computer device with the OS overlay system and adaptive learning system, or one any device with a web browser running thereon.
  • a Virtual- currency based Reward System redeemable for virtual and tangible goods
  • the virtual-currency based reward system provides incentives to the user to sustain practice and motivates achievements.
  • the virtual currency can be earned through achieving high levels of proficiency in each lesson, topic and fundamental skill set. After each lesson, the user receives an instant feedback on his performance and is informed of the number of coins earned.
  • An account indicator is available in the user environment and displays the number of coins earned to date.
  • virtual currency is used as part of a financial learning process to teach money management, how to save, how to use, how to choose, and other financial skills.
  • Financial education course work may be included as part of the FAL system or may be configured by parents according to personal guidelines.
  • the virtual coins can be redeemed for real rewards in the user environment.
  • the user can visit the Treasure Box store and redeem the coins for a range of rewards.
  • Rewards are organized by categories and by virtual coins value, and range from virtual goods - such as games, applications, music, ebooks, video content... - to real goods - such as toys, games, outdoor equipment, consumer electronics and consumer electronics accessories. Users can also identify wished items and work towards the specific number of coins required for these items.
  • the virtual coins used in the rewards system are purchased through the parental controls in the parental environment, and can also be used in chore list, further described below, towards educational or non-educational goals.
  • Supervising users can for instance add "bonus" coins to the achievement of specific fundamental skill set mastery goals, and help ensure that the user focuses on priority learning objectives. From another point of view, supervising users can reward sustained practice or superior performance by awarding additional coins in chore list towards the redemption of a specific item identified as a wish by the user.
  • a content store within the FALS allows additions, extension and updates to existing instructional items.
  • the content store further opens the FALS to providing third-party content, such as applications, textbooks, work-books, books and multimedia content such as video. This extends the subjects offered and the languages offered to make the FALS increasingly relevant to a greater number of children, including users for whom English is a second language.
  • the Content Store environment provides the features of browsing and search by grade, subject, fundamental skill set; courseware update and extension, with preview capabilities; recommendation of instructional items, from the FALS cuiriculum or from third-parties; in-app purchases and acquisition of third-party applications; and localization for other geographies, including navigation, content and payment.
  • in-app purchasing functionality allows third party applications to use a central user account to make a purchase through a payment gateway included as part of the tablet's eco-system.
  • the transaction may require a password for preventing unauthorized purchases.
  • FALS as a platform, leverages eco-system applications to enable some of the functions described above, such as a child-safe store where virtual coins can be redeemed for rewards, and a planning and goal-setting application that organizes commitments between the user and the supervising users.
  • the FALS also enables, through authorization and configuration systems, monitoring and controlling behaviors with third-party-provided instructional applications that are not directly part of the FALS, such as third-party games and applications.
  • the FALS enables third-party applications and accessories to be seamlessly integrated into some of the FALS functions, such as the recommendations, supervisor monitoring, and the reward and redemption system. These enablers allow to provide control, data capture, monitoring and incentives towards the educational purpose of FALS.
  • the FALS platform supports a wide range of content types and formats, including paper, digital books, interactive textbooks and workbooks, audio and video material as well as applications.
  • the FALS platform is an environment for education third-party developers, content owners, and accessory makers to create applications integrated into the Adaptive Learning System.
  • the Platform allows third-parties to integrate into and to have controlled access to user data, functions, and other features of the Adaptive Learning System including, user authentication and authorization, adaptive learning path, achievements and rewards system, virtual currency for "in-app" rewards and purchases, tracking and analytics, cloud storage and integration across devices and websites, application discovery and distribution through store environment.
  • End user benefits include in particular the extension of the courseware accessible to a varied range of subjects as well as additional teaching methods and multiple languages.
  • the Platform has a software development kit, tools, documentation, and a developer web portal to assist with development, integration and management of third-party applications.
  • the software development kit (SDK) consists of component libraries, example applications, and documentation for developers of application for the platform.
  • the component libraries standardize the methods for accessing to the integration points of the platform.
  • the component libraries are available for use in Android-based application and web-based application (HTML/Javascript).
  • the Platform includes a developer web portal, where developers request accounts, submit applications and content for review and approval, manage application permissions, and access application reports.
  • the developer web portal is also where developer access documentation, libraries, examples, and support tools.
  • the platform allows integration of a third-party application into the Adaptive Learning System's user authentication and authorization scheme.
  • This integration provides consistent workflow and user experience to initiate user "sign in” and permission requests.
  • OpenID and Oauth 2.0 standards for authentication and authorization are used.
  • Authentication is exposed to third-party applications using a provided component library. This library simplifies the initiation and UI for authentication requests.
  • Authorization is similarly simplified for third-party application.
  • the third-party application uses a provided component library to request a specific list of permissions.
  • the component library will render a standard UI to prompt the user to allow or reject the request. The result is then passed back to the application.
  • the benefits of integration of user authentication/authorization include the ability for end users to quickly start using third-party applications and services without going through lengthy sign up processes; the retention of control by the end user over the data that applications can access; and the elimination of the need for sign-up/sign-in flows in the third-party application, thereby saving developers' efforts.
  • the platform further allows integration of third-party applications or content "lessons" into the Adaptive Learning Path by the user of categorization and metadata tags. Lessons are elements of an application or content library that is typically consumed in one sitting. For example, in a game, a lesson would be a level of the game. In a book, a lesson would be a chapter of the book. The Adaptive Learning Path will use this lesson data to create learning paths that can be personalized for the end-user.
  • the platform also allows integration of the Adaptive Learning Path' s achievements and rewards features into the third-party applications and content. End users will be able to mark achievements and receive rewards by badges, leader boards, and challenges that are standardized within the platform.
  • the integration allows end-users to have sense of progression and accomplishment that transcends a single application, and developers benefit from the stronger and deeper engagement that an end-user experience within the Adaptive Learning System.
  • Other rewards schemes of the Adaptive Learning System that are available to the third-party applications and content providers include access to the virtual currency system.
  • the virtual currency/credits that are purchased by a parent and distributed to a user to as an incentive for usage and to monetize rewards and achievements are redeemable through the Kid Mode redemption interface to acquire third-party applications, and can also be distributed through achievements on a third-party application.
  • Virtual currency can also be used to upgrade a third-party application from a trial or free version.
  • the platform further allows integration with the tracking and analytics features of the Adaptive Learning System with third-party applications.
  • third-party applications submit results, actions and experiences to the platform.
  • the data is processed into usable information for integration into recommendations in the store, reports for end-user, and analytics for the developer in the developer web portal.
  • end-users receive reports on learning activity from third-party applications, and status, progress and recommendations for new lessons and activities based on both FALS and third-party applications.
  • Integration of the eco-system's cloud storage enables third-party applications to store state and data in the cloud. Progress, scores, and other user state data will be available and synchronized on every device to the cloud storage system to provide end-users with seamless integration across multiple devices.
  • the integration provides reliable and secure storage at the eco-system for persistent user data, eliminating the need for a third-party application developer to provide separate data storage for end-users.
  • the Application Discovery and Distribution System is used to publish and integrate third-party applications and content into the content store environment. Developers use the developer web portal to submit application and content for approval. The approval process ensures the level of quality and API usage is up to standard. Once approved, applications and content are available for end-users to purchase and download.
  • FIG. 7C illustrates a diagram showing some exemplary embodiments of a system for capture and acquisition of tracking data.
  • the FALS data tracking technology allows capturing user information and behaviors in terms of interactions with the mobile device. All of the captured data is stored and can be used either for direct educational purposes, such as informing the Adaptive Learning Algorithm, or for indirect educational purposes, such as improving the user interaction to acquire or reinforce a specific skill set. While not all of the captured data is used up front, it is stored for historical purposes and provides a dataset that can be mined to keep enriching and evolving the FALS.
  • tracking data is generated 727 and submitted 729 as statements.
  • Each statement expresses a single action, event, or other state.
  • Statements are in the form of actor-verb-object. Actor is the end-user performing the verb. The object is the target of the verb. Statements also translate to human-readable sentences. Statements further comprise a statement identification (I.D.) for detecting duplicate statements; a timestamp of the statement; an actor; a verb; and an object.
  • I.D. statement identification
  • Statements also have common properties that are dependent on the verb/object being tracked, including data representing the result of the statement. For example, for a statement comprising actor-verb-object of "user answers question,” the result would include if user correctly answered questions, the duration it took to answer the question, and the answer the user submitted.
  • Common properties for statements further includes information that describes the context of the statement. For example, if statement is part of larger set of statements, the context would include reference to the larger set. Another use of context is to describe the device or location of the statement.
  • Tracking statements are designed to be flexible. New statements are easily created. Optional context and additional data properties allow tracking of user behavior across multiple types of devices and environments. This includes submitted statements based on input mechanism (touch, stylus, keyboard), device screen size, physical location, and other device and demographic information,
  • the raw tracking data is stored in a high-performance, high-availability data store 731. From there, the raw tracking data is processed and transformed into usable data by parsing 733 the statement into statement types 735.
  • the usable data such as report data 737 submitted to the report service, primarily results in reports for the end-user, and the parents, supervisors, or educators of the end-user of FALS.
  • the usable data is also used to synchronize state on the client device and the backend services. Achievements, rewards, and other gaming mechanics data 739 are submitted through the tracking API 741 to the reward service. The usable data is also used in internal processes to understand and analyze user behavior, engagement rates, benchmarking of the effectiveness of adaptive learning, and other usage metrics and statistics.
  • Other data 743 may include free-form structured data that does not fall into any known statement types.
  • Data 743 is stored in backend service 745 for future use.
  • Free-form structured data may be generated by a new client application configured to track certain data that is not known to the tracking API 741.
  • the tracking API 741 may be updated such that the free-form data 743 becomes usable data, for example, a new statement type is defined for such data, and the data 743 may then be incorporated into reports.
  • This accommodation of other data 743 allows for new client apps to be developed separately from the development of the tracking API 741 , and allows for future use of the acquired data.
  • the FALS operates and delivers direct instructional capabilities in offline mode, namely, in the absence of an internet connection.
  • This capability enables use-cases for the FALS that far extend existing solutions.
  • the FALS system can capture user interactions and inputs, without limitation as to place and time. For example, any partial attempt or practice runs are captured in the system, and can be mined for additional insights into the level of proficiency and the learning path.
  • the online synchronization enables consistent and detailed reports on user activity.
  • the user can be mobile, and can use the FALS in settings that do not provide Internet connections.
  • the user can be working in groups outside of the classroom or of the school environment, "in the field," and pursue practice or capture insights on the go.
  • the FALS can be configured with assignments and syllabus by one supervising user and handed over for the user's benefit in a different time, location or learning context. The ability to achieve this level of personalization while making the supervision asynchronous is very distinct from the online solution model, which typically requires the supervising user to be present during the session.
  • the backend service is designed to receive data asynchronously. Clients submit statements in bulk whenever an Internet connection is available.
  • the backend service is lightweight and flexible to allow quick and reliable submission of tracking data.
  • the educational service can operate without Internet connection.
  • Settings and data are synchronized periodically from the backend service to the educational service clients. This effectively enables a "push" service whereby the service can sent updates to the client for update courseware and curriculum data.
  • Parental controls have been utilized in digital television services, computers, browsers, video games, mobile phones and software. Parental controls have been implemented in various forms, including: 1) content filters - which limit access to content; 2) usage controls, which place time limits or forbid certain types of usage; 3) usage management tools, which allow enforcement of behaviors; and 4) monitoring tools, which can track activity. Parental controls are typically for the management of movies, music, pictures and web pages, or other traditionally defined content. However, on a tablet computer these functions are very different because a tablet computer further includes a touch-input interface, third-party applications, in-app purchases, social networking integration and interfaces, and social gaming features.
  • parental controls include a content acquisition white list that allows children to choose by character picture rather than by text description or name for children who cannot read yet.
  • the parental controls interface are implemented in a touch screen input environment rather than input by a mouse and cursor.
  • Parental controls are embedded across multiple children profiles and across different user interfaces or devices that are registered or set up under the parental control system, in some embodiments one for parents and another for children.
  • a tablet presents a unique environment for implementing parental controls because it introduces multiple user interfaces and software environments for the operating system, system overlays, browser and third party applications, including social networking, social gaming features and in-app purchases.
  • parental controls are also implemented for third party applications running on the OS Overlay System. While content filtering as a methodology for implementing parental controls may not be effective in third party applications that can bypass such controls, parental controls implemented in the OS Overlay System are effective for controlling usage of third-party applications. For example, on a web browser, parental controls may filter and block access to web addresses or web pages that may otherwise allow a user to gain access to the native OS system of the device. Requests for web resources in the browser are captured and allowed to be processed only if they meet predetermined parameters corresponding to the user environment, such as parameters determining permissible content, web pages and/or domains, in-app purchases, and the like. Requests for resources that are not permitted in the corresponding user environment are disregarded. This approach advantageously prevents display of third-party ads and link outs to unapproved web pages and/or domains.
  • password entry may be required to authorize access to certain processes and actions in the OS Overlay system while in Kid Mode.
  • the password may be the same password set for entry into Parent Mode. Granting of access by entry of the password does not require leaving the Kid Mode UI or leaving the current navigation state.
  • the interface for prompting entry of the password includes a prompt to the child user to ask a parent for access or permission, rather than a direct instruction to enter a password. In a tablet environment across dedicated user interface for children content limitations are less important than secondary approvals like buy or not buy.
  • parental controls include the use of virtual currency to reward positive behavior as monitored by the device.
  • An example of an interface for rewarding and using virtual currency includes a redemption center for content, apps, games, apps and real games, which may be themed as a treasure chest motif.
  • parental controls provide usage controls within third-party apps, in-app purchases and social networking linking and advertising. While a third-party application may be approved and/or appropriate for a given user, it may include functionality for in-app purchases, advertising, social networking links that are not approved and/or appropriate for the user.
  • the OS Overlay and native driver implementation facilitates disabling this type of linking by intercepting all linking web requests and only allowing authorized linking to approved web pages and/or domains.
  • parental controls are implemented and/or enforced within a browser, such as browsers for the Android mobile OS.
  • FIG. 8 is a diagram illustrating parental control system 800, according to aspects of embodiments of the invention.
  • Parental control system 800 may be accessible as a interface on a tablet device, as a web-browser-based interface, or as a personal computer application running on a personal computer operating system. Changes to the management parameters or settings may be propagated to the applicable devices.
  • Parental control system 800 includes security/protection features 801, monitoring and tracking features 803, content management features 805, profile management features 807, and rewards and incentives features 809.
  • Security/protection features 801 include features which manage the security of (he system's environment and of your child's privacy.
  • security/protection features 801 include a persistent management tool for prompting of password entry, and granting access to a restricted action, interface, application, or area when the password is authenticated.
  • FIG. 9 illustrates an example of interfaces 902 and 904, and prompts 906 and 908 employed for instructing a user to seek parental passwords.
  • FIG. 10 to 25 include user interfaces used to access some features of the parental control system 800.
  • the interfaces may be implemented in a variety of formats, including in mobile device apps, in a windowed computing application, in a browser-based environment, or other user interface format or combination of the above.
  • FIG. 10 illustrates an example of an interface 1000 for managing a friend list as part of security/protection features 801.
  • the friend-list management feature allows management of whom each child can connect with by adding, deleting or blocking friend requests, such as friend request 1002 and 1004. From the parent account, a supervising parent can control which other ecosystem user establishes a friend connection with a kid account.
  • FIG. 11 illustrates an example of an interface 1100 for managing notifications, messages, and alerts for a child's profile.
  • the parental control system 800 provides the interface within the parent account from the server of the child-safe ecosystem.
  • the interface delivers and manages alerts and notifications, such as messages 1102, that are accessible to a parent account about the each child's activities, messages and progress in the ecosystem.
  • the interface also allows control over when and how to receive notifications regarding the child's account.
  • FIG. 12 illustrates an example of an interface 1200 alerting the user of a blocked link-out, blocked by the OS Overlay System and Parental Control System 800.
  • the parental control system also systematically blocks third party ads, in-app purchases and link outs to unapproved web sites on third-party apps without requiring any changes to the third-party app as provided by the third-party app developer.
  • the OS Overlay System captures substantially all user input, including user input in third-party apps, determines whether each user request is for a permitted resource as determined in a user profile, and only allows processing of user requests that are determined to be for resources that are permissible under the corresponding user profile.
  • the OS Overlay System limits the content accessible in a web browser by permitting the browser to access and render content only from predetermined web pages and/or domains, thus preventing display of third party ads from different domains, in-app purchases, and link outs to unapproved web sites.
  • FIG. 13 illustrates an example of an interface 1300 for providing parental guidance, ratings and warnings on ads, social networks, web link-outs and age suitability for apps, websites and third party content.
  • FIG. 14 illustrates an interface 1400 for informing a parent of particular warnings for apps.
  • Monitoring and tracking features 803 for activities performed online and on the device are included in parental control system 800, with further reference to FIG. 8, according to aspects of embodiments of the invention. Tracking and monitoring features 803 include monitoring messages, which includes: reviewing and approving messages sent to and from each child's account, which may be performed from the interface as shown in FIG. 11; monitoring whom each child can connect with by approving or rejecting friend requests, which may be performed from the interface as shown in FIG.
  • the time management and usage interface 1500 includes usage indications, such as for date last played 1502, time spent 1504, for a particular- kid profile on a particular device. Immediate activity-specific feedback, and content and activity recommendations may be introduced to the parent through one of the views (not shown) within the time management and usage interface 1500. This information can provide parents with insight as to how well their child is performing or not performing.
  • Content management features 805 for content management for websites, videos, music, pictures and apps is included in the parental control system 800, with further reference to FIG. 8.
  • Content management features 805 includes management and control of multiple devices, management of applications, management of content white list, and management of categorization and rating of third party applications for kid-friendliness, management of personalized content lists for each kid user account in the ecosystem.
  • FIG. 16 is a diagram illustrating the selection interface 1600 for parental controls to select a particular device out of a group of devices registered under the same parental control system for management. Such a centralized system and interface allows parental control over the content available across multiple devices registered within the system (i.e., computer 1602, tablet 1604, television box 1606).
  • FIG. 17 is a diagram illustrating an interface for managing to access to applications according to aspects of embodiments of the invention. As shown, the interface 1700 is for managing applications for a particular device that was previously selected from interface 1600 as shown in FIG. 16. The interface 1700 allows a parent to manually add and remove apps that each child can see, hear, play, and experience. This feature allows users to separately control what content is displayed on both child mode and parent mode. In both modes, there is a separate browser made available. In child mode there is a kid-safe browser where kids can safely explore specific content online and in parent mode the browser is a full-featured browser with no restrictions.
  • FIG. 18 is a diagram illustrating an interface 1800 for placing content onto a "white list" of approved content, organized as shown on interface 1800 by category-based icons, curated and pre-selected manually, that are age appropriate and aligned to a kid's interests.
  • white listing content provides the parents complete control of what they want their child to view and explore.
  • FIG. 19 is a diagram illustrating an interface 1900 for acquiring and downloading content according to aspects of embodiments of the invention, which includes filtering options 1902 for listings of third-party applications and content by suitability for age, gender, character, brand and interests.
  • FIG. 20 is a diagram illustrating an interface 2000 with a view of the parental controls for personalized content for a particular kid user account
  • interface 2000 is an area where parents can search and create customized white lists of websites, videos, games and crafts.
  • websites 2002 and 2004 have been added to a white list.
  • the white list is managed by a server of the child-safe ecosystem, and is controlled via a web interface.
  • the white lists are made available via a network connection to any mobile device in the child-safe ecosystem for permitting access to the white-listed items by the devices associated with the particular kid user account.
  • Each white listed item may be assigned an icon, which is shown in a kid mode interface on the mobile device for selection.
  • white lists are arranged and customized for each separate child's user account.
  • the customized white list allows a parent to broaden mobile device system's access to content that is available on the Internet, but may not be part of the curated apps available in the child- safe ecosystem. This feature further allows parents to control all content specifically to a particular child.
  • profile management features 807 is included in the parental control system 800.
  • Profile management features 807 include management of one or more specific kid user account created or registered under the parental control system 800. More particularly, profile management features 807 include automatically curating experiences across content and applications to create an automated experience for each child's profile based on age, gender and other preferences associated with the profile.
  • FIG. 21 is a diagram illustrating an example of an interface 2100 where the profile details are inputted by the parental control system.
  • Other profile management features 807 include virtual currency management, and management of multiple child user accounts and profiles registered with the particular parental control system.
  • FIG. 22 is a diagram illustrating interface 2200 which includes a view for management and acquisition of virtual currency.
  • virtual currency is earned in return for completing certain activities or tasks, including completing lessons from the Adaptive Learning System described above, or by recording completion of tasks, such as chores on a chore list, in an interface. Chore lists are described in further detail below.
  • the interface 2200 as shown in FIG. 22 allows the allocation, and management of a kids' currency that can be earned and spent within the child-safe ecosystem.
  • the management and allocation of coins is based on each child's activity and performance.
  • a method for rewarding activity includes purchasing virtual currency with real currency; distributing virtual currency to user accounts based on the recordation of the completion of certain tasks, objectives, or activities in the child-safe ecosystem, and providing content and apps to a child's user account to fulfill orders paid for by the virtual currency.
  • the parental control system 800 has full control over the virtual currency purchased with real currency, and may distribute the currency manually to a child's user account, or it may be automatically distributed based on a predetermined distribution scheme as related to certain achievements and accomplishments.
  • the predetermined distribution scheme for automatic distribution can also be managed and overridden by a parent account.
  • Interface 2200 shows balance 2202 of virtual currency available for distribution, and an area 2204 for inputting a distribution amount for distributing to a kid's user account.
  • FIG. 23 is an diagram illustrating an interface 2300 for accessing controls to multiple kid user profiles and/or accounts registered with the parental control system 800.
  • the parental control system 800 provides the ability to control, monitor and personalize multiple kid accounts on any device.
  • FIG. 24 to 26 are diagrams of interfaces for accessing and managing rewards and incentives in the child-safe ecosystem, including the chore list system, the adaptive learning system, and the treasure box virtual currency store system.
  • FIG. 24 is a diagram illustrates chore list interfaces 2400 for the chore list system.
  • the chore list system helps kids learn about responsibility, accountability, and trust by assigning and tracking activities, or chores, to kids through the chore list interfaces. Parents can choose which chore priorities the child has by day and by week, and track and reward them in the chore list interfaces 2400.
  • FIG. 25 is a diagram that illustrates interface 2500 for reviewing and tracking rewards and incentives as relating to progress in educational content.
  • the interface 2500 displays reports as associated with a selected kid user profile, including reports for performance by topic, performance by lesson, progress across assignments, problem sets, lessons and topics, proficiency assessments, and summaries of mastered skills, skills in progress, deficiencies, trouble spots, or difficulties.
  • Interface 2500 includes views for particular children, including reports of performance as associated with a particular kid user profile.
  • Interface 2500 also provides detailed metrics and insights into a child user's proficiency by grade, subject, topic and lesson.
  • 26 is a diagram that illustrates interface 2600 for spending or redeeming virtual currency or other credit or reward for obtaining digital content or real items, such as games, apps, music, videos, or tangible goods or accessories.
  • the virtual currency is managed and distributed by the parental control system, and can be purchased with real funds. Virtual currency can also be credited to a parent account through a promotional or subscription program.
  • a treasure chest or treasure box theme is employed for presenting interface 2600.
  • FIG. 34 is an exemplary interface for displaying messages to a user regarding parental controls or other information.
  • information regarding parental controls such as time controls and access controls
  • information regarding parental controls is displayed on the touch screen of the tablet computer using a child-friendly, animated character, an example of which is shown in FIG. 34.
  • the use of the animated character provides an illusion that the tablet computer is a character capable of speaking to the user.
  • the animated character is not limited to displaying information regarding parental controls but, instead, may be used in connection with the display of any information to a user.
  • animations of the character may: explain that a time limit is approaching or has been reached; explain that a requested content requires parental authorization; suggest a break from use of the tablet computer for exercise or other activities; remind a user of a condition required to be satisfied under an operative configuration of a parental control in order for the user to receive a requested access; or provide instruction and/or feedback in the FALS described herein.
  • Animations may optionally be scripted as if the computer itself is imposing parental controls or other limitations on use of the tablet computer and/or access to content, relieving parents or other supervisors of the time, inconvenience, and interpersonal conflict associated with enforcing controls directly.
  • the child-safe ecosystem for a tablet computer includes an interface for access to purchasing curated apps from a Curated App Store.
  • the Curated App Store is implemented as a device application run on the OS Overlay System of the mobile device. Depending on which UI is being used, a different application with a different interface may be used to connect with the Curated App Store.
  • the Curated App Store contains curated apps, grouped by age, gender and interest. In some embodiments, each app is selected individually certified and tested prior to its being listed in the Curated App Store. Alternatively some apps are assessed automatically based on parameter values for parameters such as age, gender, and interest assigned by the third-party app publisher. Each app may be given a content rating.
  • App Store purchases within the Kid Mode UI are limited to being transacted in virtual currency or credit, while purchases within the Parent Mode UI are transacted with real funds, virtual currency, or other credit.
  • curated apps in the Curated App Store are subjected to filtering steps before being included in the store
  • An app is first submitted by a developer, for example via a dedicated website that receives all apps for approval.
  • the apps are reviewed, rated and approved prior to being included in the store for purchase.
  • the ratings and approval are associated with demographic parameters such as age, gender, and/or interest.
  • the demographic parameters for an app are compared against the user's profile to determine suitability of the app for a particular profile.
  • the apps are made available to a particular kid's account based on a combination of kid profile and general ratings. The benefit of having a curated app store ensures that apps are suitable to a given user type.
  • Content ratings for apps which may be determined by the app publisher, by a system manager, or by a parent user, are used to assist in the curating of apps.
  • Content ratings may include categorical content descriptions categories such as "social media” or “mature content,” or may be rated against a maturity scale.
  • Content ratings may provide (1) a visual reminder of the app and (2) a level of censorship based on a user's profile. Certain ratings may cause the app to be not included in the store because, for example, the content rating would leave no profile that remains suitable for the app.
  • Content ratings may be given to the app by a third-party content ratings provider, which may be retrieved and stored in the device ecosystem database, which are used with the user profile to filter Curated App Store contents based on user profile.
  • FIG. 27 is diagram illustrating the process 2700 for curating apps for a user profile.
  • Third-party content ratings 2702 are sent via a wide-area network, such as the internet, to a device ecosystem database 2704, such as one managed by Fuhu, Inc., for its tablet devices.
  • the app with the content rating is sent to the device, where the content ratings for the apps are compared against user profile 2706.
  • a determination is made by the device as to whether a particular app is suitable for the profile. If so, the app will appear as available in the Curated App Store interface, such as the interface represented by the views shown in FIGS. 28 to 32, further described below.
  • a Curated App Store further provides the advantage of a smaller inventory, which may present promotional opportunities for app developers that may be not be possible with an applications store with a larger inventory. App developers that may otherwise get buried in other app "superstores" can be featured on large app banners or as highlighted app throughout the entire app store. Unlike app superstores that typically charge developers for these types of promotional opportunities, a curated app store may give developers exposure that only a "boutique" app store with a smaller inventory can offer.
  • FIGS. 28 to 29 are diagrams illustrating views 2800 and 2900 from the Curated App Store as provided in parent mode, according to aspects of embodiments of the invention.
  • FIG. 28 and 29 illustrate home pages for the Curated App Store app.
  • FIG. 28 shows a featured app banner at the top of the interface 2800, below which is a zone 2802 for showing a grouping of apps, such as new apps.
  • Zone 2802 is a horizontally scrollable zone independent of the other portions of the interface.
  • Interface 2800 further includes zone 2804 for showing app categories, and zone 2806 for showing another grouping of apps, such as app essentials.
  • Zone 2808 includes icons that link to other areas of the Curated App Store.
  • FIG. 29 illustrates a different view or interface 2900 for the Curated App Store.
  • Interface 2900 includes a banner 2902 featuring a horizontally scrollable and selectable banner of cover art illustrations for apps, zone 2904 for selecting categories, zone 2906 for sselling a grouping of apps, such as featured apps, and zone 2908 for accessing other Curated App Store features, such as account settings, downloaded apps, purchasing virtual coins or credit, redeem virtual coins or credit, support, and terms of service.
  • FIG. 30 illustrates one example of the Curated App Store interface 3000 as it appears in the Kid Mode operating environment when logged in under a particular kid user profile.
  • Curated App Store interface 3000 for Kid Mode operation has a simple, easy to use interface for children to browse for their interested apps by scrolling to different screens of apps. It is a secure system that requires password input and a prompt to seek a parent or guardian to enter the password for every purchase to eliminates unauthorized purchases from children.
  • the payment gateway is based from the parent user account, and allows the supervisor of the parent environment to receive an email notifying him or her about purchases.
  • FIG. 31 illustrates another simple, horizontally scrollable interface 3100 for presentation of available apps when the device is operated in Kid Mode.
  • the Curated App Store interface for Kid Mode filters a subset of all apps available to the supervisor for purchase.
  • the curated apps contain no in-app advertisements or any social network integration. Apps purchased from the Curated App Store may be made automatically available to a user in Kid Mode, or it may be further restricted based on the user's profile.
  • FIG. 32 shows two views 3200 and 3202 of a Curated App Rewards Store restricted to purchases with virtual currency or credit.
  • the Curated App Rewards Store does not require password entry before every purchase.
  • corresponding virtual currency can be obtained by purchase with real funds through the parent account's payment gateway. Once purchased, the currency can be disbursed by completing learning activities, or be rewarded to children upon progression or completion of tasks on the Chore List.
  • Offerings in the Curated App Rewards Store may include some if not all the apps that would be available for purchase in the Curated App Store to this particular user profile.
  • the Curated App Rewards Store provides simple categorization of games, apps, and music.
  • user profile is an account linked with a specific individual user of the electronic device. It associates the specific settings and preferences of an individual with a unique identifier, and offers the individual an option to require a password to log into the profile. This allows individuals to personalize their User Interface while providing them with privacy and security measures.
  • the device ecosystem gives the option to create multiple user profiles to manage content on a tablet computer. Firstly, this allows parents of multiple children to keep each child's experience separate from the other child, which is important in early years or when the age gap is large. Secondly, parents may tailor the experience to each user profile, based on factors such as age, gender, interests, preferences. Thirdly, parents can monitor the activities of each profile thanks to the built-in parental controls, including frequency of use, preferences, location usage, system requirements, system functionality, availability of peripherals, and connectivity.
  • the Kid-Safe Browser is a web browser that runs on portable, touch-based computing devices.
  • the Kid-Safe Browser checks all requests and compares them against white list of parent- approved URLs. If the request URL does not exist in the white list, the Kid-Safe Browser will prevent the request from completing.
  • Other features of a Kid-Safe Browser includes an easier UI for use by young children, parental controls, security features, content blocking and filtering.
  • running on touch-based device requires a simplified browser UI.
  • Text entry can be a challenge, especially for younger kids.
  • the Kid-Safe browser shows the white listed URLs as graphical icons. By using graphics instead of text, younger kids can quickly and easily identify their favorite websites.
  • Kid-Safe Bowser Security features of the Kid-Safe Bowser include parental URL management interface of the white list of URLs, with restricted access by password entry.
  • the parental URL management interface allows adding, modifying, and updating of the white list. Downloads, popups, and other unsafe activities are blocked. Any change to the Kid-Safe Browser settings requires the parent to successfully enter their password. kids are prevented from following links to external sites from any advertisement, marketing and promotional links that are not on the white list. The kid is prevented from entering any URL in the Kid-Safe Browser's address bar. In addition, by default, access to web search engines is blocked.
  • FIG. 33 is a block diagram that illustrates a computer system 3300 upon which some embodiments of the invention may be implemented.
  • Computer system 3300 includes a bus 3302 or other communication mechanism for communicating information, and a processor 3304 coupled with bus 3302 for processing information.
  • Computer system 3300 also includes a main memory 3306, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 3302 for storing information and instructions to be executed by processor 3304.
  • Main memory 3306 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 3304.
  • Computer system 3300 further includes a read only memory (ROM) 3308 or other static storage device coupled to bus 3302 for storing static information and instructions for processor 3304.
  • ROM read only memory
  • a storage device 3310 such as a magnetic disk, optical disk, or a flash memory device, is provided and coupled to bus 3302 for storing information and instructions.
  • Computer system 3300 may be coupled via bus 3302 to a display 3312, such as a cathode ray tube (CRT) or liquid crystal display (LCD), for displaying information to a computer user.
  • a display 3312 such as a cathode ray tube (CRT) or liquid crystal display (LCD)
  • An input device 3314 is coupled to bus 3302 for communicating information and command selections to processor 3304.
  • cursor control 3316 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 3304 and for controlling cursor movement on display 3312.
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • input device 3314 is integrated into display 3312, such as a touch screen display for communication command selection to processor 3304.
  • display 3312 such as a touch screen display for communication command selection to processor 3304.
  • Another type of input device includes a video camera, a depth camera, or a 3D camera.
  • Another type of input device includes a voice command input device, such as a microphone operatively coupled to speech interpretation module for communication command selection to processor 3304.
  • Some embodiments are related to the use of computer system 3300 for implementing the techniques described herein. According to some embodiments, those techniques are performed by computer system 3300 in response to processor 3304 executing one or more sequences of one or more instructions contained in main memory 3306. Such instructions may be read into main memory 3306 from another machine-readable medium, such as storage device 3310. Execution of the sequences of instructions contained in main memory 3306 causes processor 3304 to perform the process steps described herein. In alternative embodiments, hardwired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. In further embodiments, multiple computer systems 3300 are operatively coupled to implement the embodiments in a distributed system.
  • machine-readable medium refers to any medium that participates in providing data that causes a machine to operate in a specific fashion.
  • various machine-readable media are involved, for example, in providing instructions to processor 3304 for execution.
  • Such a medium may take many forms, including but not limited to storage media and transmission media.
  • Storage media includes both non-volatile media and volatile media.
  • Non-volatile media includes, for example, optical disks, magnetic disks, or flash memory devices, such as storage device 3310.
  • Volatile media includes dynamic memory, such as main memory 3306.
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 3302.
  • Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.
  • Machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, flash memory device, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 3304 for execution.
  • the instructions may initially be earned on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a data transmission line using a modem.
  • a modem local to computer system 3300 can receive the data on the data transmission line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 3302.
  • Bus 3302 carries the data to main memory 3306, from which processor 3304 retrieves and executes the instructions.
  • the instructions received by main memory 3306 may optionally be stored on storage device 3310 either before or after execution by processor 3304.
  • Computer system 3300 also includes a communication interface 3318 coupled to bus 3302.
  • Communication interface 3318 provides a two-way data communication coupling to a network link 3320 that is connected to a local network 3322.
  • communication interface 3318 may be an integrated services digital network (ISDN) card or other internet connection device, or a modem to provide a data communication connection to a corresponding type of data transmission line.
  • ISDN integrated services digital network
  • communication interface 3318 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless network links may also be implemented.
  • communication interface 3318 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 3320 typically provides data communication through one or more networks to other data devices.
  • network link 3320 may provide a connection through local network 3322 to a host computer 3324 or to data equipment operated by an Internet Service Provider (ISP) 3326.
  • ISP 3326 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the Internet 3328.
  • Local network 3322 and Internet 3328 both use electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 3320 and through communication interface 3318, which carry the digital data to and from computer system 3300, are exemplary forms of carrier waves transporting the information.
  • Computer system 3300 can send messages and receive data, including program code, through the network(s), network link 3320 and communication interface 3318.
  • a server 3330 might transmit a requested code for an application program through Internet 3328, ISP 3326, local network 3322 and communication interface 3318.
  • the received code may be executed by processor 3304 as it is received, and/or stored in storage device 3310, or other non-volatile storage for later execution. In this manner, computer system 3300 may obtain application code in the form of a carrier wave.

Abstract

La présente invention concerne une tablette électronique comprenant un système d'exploitation, comprenant une couche de structure d'application et une couche d'application, et un système de réseau applicatif. Le système de réseau applicatif accède aux programmes d'application et délivre une première interface utilisateur et un second environnement d'exploitation associé à une seconde interface utilisateur. De manière optionnelle, le système de réseau applicatif fournit un premier environnement d'exploitation associé à la première interface utilisateur. Le système de réseau applicatif comprend un contrôle d'accès configuré pour autoriser ou refuser une demande d'accès à des ressources et/ou données dans le second environnement d'exploitation. De manière optionnelle, le système de réseau applicatif est exécuté dans la couche de structure d'application et peut comprendre un hyperviseur fournissant une plate-forme d'exploitation comprenant la première interface utilisateur, le second environnement d'exploitation, et un espace d'application donnant accès à la couche d'application.
PCT/US2014/029508 2013-03-15 2014-03-14 Tablette électronique WO2014144908A1 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CA2907274A CA2907274A1 (fr) 2013-03-15 2014-03-14 Tablette electronique
JP2016503117A JP2016517598A (ja) 2013-03-15 2014-03-14 タブレットコンピュータ
KR1020157029482A KR20150132461A (ko) 2013-03-15 2014-03-14 태블릿 컴퓨터
EP14764143.5A EP2972835A4 (fr) 2013-03-15 2014-03-14 Tablette électronique
CN201480023591.2A CN105339895A (zh) 2013-03-15 2014-03-14 平板计算机

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/841,461 2013-03-15
US13/841,461 US20130254660A1 (en) 2008-03-13 2013-03-15 Tablet computer

Publications (1)

Publication Number Publication Date
WO2014144908A1 true WO2014144908A1 (fr) 2014-09-18

Family

ID=51537832

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/029508 WO2014144908A1 (fr) 2013-03-15 2014-03-14 Tablette électronique

Country Status (6)

Country Link
EP (1) EP2972835A4 (fr)
JP (1) JP2016517598A (fr)
KR (1) KR20150132461A (fr)
CN (1) CN105339895A (fr)
CA (1) CA2907274A1 (fr)
WO (1) WO2014144908A1 (fr)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683336A (zh) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 一种基于安全域的安卓隐私数据保护方法及系统
WO2016203473A1 (fr) * 2015-06-18 2016-12-22 Googale (2009) Ltd Système informatisé amélioré facilitant une communication électronique sécurisée entre et avec des enfants
US10198963B2 (en) 2015-06-18 2019-02-05 Googale (2009) Ltd. Secure computerized system, method and computer program product for children and/or pre-literate/illiterate users
CN110348206A (zh) * 2019-07-11 2019-10-18 网易(杭州)网络有限公司 应用于安卓安装包apk的保护方法、介质、装置和计算设备
US10726118B2 (en) 2015-06-18 2020-07-28 Googale (2009) Ltd. Secured computerized system for children and/or pre-literate/illiterate users
US10789642B2 (en) 2014-05-30 2020-09-29 Apple Inc. Family accounts for an online content storage sharing service
WO2020198238A1 (fr) * 2019-03-24 2020-10-01 Apple Inc. Interfaces utilisateur pour application de navigation multimédia
US10853029B2 (en) 2015-06-18 2020-12-01 Googale (2009) Ltd. Computerized system including rules for a rendering system accessible to non-literate users via a touch screen
US10872024B2 (en) 2018-05-08 2020-12-22 Apple Inc. User interfaces for controlling or presenting device usage on an electronic device
WO2021096957A1 (fr) * 2019-11-11 2021-05-20 Apple Inc. Interfaces utilisateurs pour des listes de lecture soumises à curation à base de période de temps
US11057682B2 (en) 2019-03-24 2021-07-06 Apple Inc. User interfaces including selectable representations of content items
US11070889B2 (en) 2012-12-10 2021-07-20 Apple Inc. Channel bar user interface
US11188624B2 (en) 2015-02-06 2021-11-30 Apple Inc. Setting and terminating restricted mode operation on electronic devices
US11194546B2 (en) 2012-12-31 2021-12-07 Apple Inc. Multi-user TV user interface
US11245967B2 (en) 2012-12-13 2022-02-08 Apple Inc. TV side bar user interface
US11290762B2 (en) 2012-11-27 2022-03-29 Apple Inc. Agnostic media delivery system
US11297392B2 (en) 2012-12-18 2022-04-05 Apple Inc. Devices and method for providing remote control hints on a display
US11363137B2 (en) 2019-06-01 2022-06-14 Apple Inc. User interfaces for managing contacts on another electronic device
US11461397B2 (en) 2014-06-24 2022-10-04 Apple Inc. Column interface for navigating in a user interface
US11467726B2 (en) 2019-03-24 2022-10-11 Apple Inc. User interfaces for viewing and accessing content on an electronic device
US11520858B2 (en) 2016-06-12 2022-12-06 Apple Inc. Device-level authorization for viewing content
US11520467B2 (en) 2014-06-24 2022-12-06 Apple Inc. Input device and user interface interactions
US11543938B2 (en) 2016-06-12 2023-01-03 Apple Inc. Identifying applications on which content is available
US11582517B2 (en) 2018-06-03 2023-02-14 Apple Inc. Setup procedures for an electronic device
US11609678B2 (en) 2016-10-26 2023-03-21 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device
US11683565B2 (en) 2019-03-24 2023-06-20 Apple Inc. User interfaces for interacting with channels that provide content that plays in a media browsing application
US11720229B2 (en) 2020-12-07 2023-08-08 Apple Inc. User interfaces for browsing and presenting content
US11797606B2 (en) 2019-05-31 2023-10-24 Apple Inc. User interfaces for a podcast browsing and playback application
US11843838B2 (en) 2020-03-24 2023-12-12 Apple Inc. User interfaces for accessing episodes of a content series
US11863837B2 (en) 2019-05-31 2024-01-02 Apple Inc. Notification of augmented reality content on an electronic device
US11899895B2 (en) 2020-06-21 2024-02-13 Apple Inc. User interfaces for setting up an electronic device
US11934640B2 (en) 2021-01-29 2024-03-19 Apple Inc. User interfaces for record labels

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10708664B2 (en) 2016-06-21 2020-07-07 Rovi Guides, Inc. Methods and systems for recommending to a first user media assets for inclusion in a playlist for a second user based on the second user's viewing activity
CN107146127A (zh) * 2017-03-22 2017-09-08 重庆允升科技有限公司 一种工业品精准推荐方法及系统
CN106980481B (zh) * 2017-03-28 2020-02-04 北京奇虎科技有限公司 一种图像显示方法及设备
EP3486857A1 (fr) * 2017-11-15 2019-05-22 Tata Consultancy Services Limited Procédé et système d'agrégation d'une pluralité de technologies d'apprentissage comportant une couche de commerce électronique
CN110471581A (zh) * 2018-05-08 2019-11-19 苹果公司 用于控制或呈现电子设备上的设备使用的用户界面
CN112970733B (zh) * 2021-02-09 2022-10-25 广东电网有限责任公司广州供电局 输电线路多棱镜驱鸟装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070089111A1 (en) * 2004-12-17 2007-04-19 Robinson Scott H Virtual environment manager
US20100318990A1 (en) * 2009-06-12 2010-12-16 International Business Machines Corporation Method and apparatus for scalable monitoring of virtual machine environments
US20120013547A1 (en) * 2010-07-19 2012-01-19 Michael Tsirkin Mechanism for Touch Screen Emulation for a Virtual Machine
US20120122066A1 (en) * 2010-11-15 2012-05-17 Age Of Learning, Inc. Online immersive and interactive educational system
US20120284412A1 (en) * 2011-05-05 2012-11-08 Saidi Armine Networking device, system and method for the creation of portable proximity communication networks

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU4068100A (en) * 1999-04-06 2000-10-23 Microsoft Corporation Method and system for controlling execution of computer programs
US6678824B1 (en) * 1999-11-02 2004-01-13 Agere Systems Inc. Application usage time limiter
US8251704B2 (en) * 2007-04-12 2012-08-28 Microsoft Corporation Instrumentation and schematization of learning application programs in a computerized learning environment
US20120143681A1 (en) * 2010-12-02 2012-06-07 Microsoft Corporation Room-based computing environments
US20120157049A1 (en) * 2010-12-17 2012-06-21 Nichola Eliovits Creating a restricted zone within an operating system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070089111A1 (en) * 2004-12-17 2007-04-19 Robinson Scott H Virtual environment manager
US20100318990A1 (en) * 2009-06-12 2010-12-16 International Business Machines Corporation Method and apparatus for scalable monitoring of virtual machine environments
US20120013547A1 (en) * 2010-07-19 2012-01-19 Michael Tsirkin Mechanism for Touch Screen Emulation for a Virtual Machine
US20120122066A1 (en) * 2010-11-15 2012-05-17 Age Of Learning, Inc. Online immersive and interactive educational system
US20120284412A1 (en) * 2011-05-05 2012-11-08 Saidi Armine Networking device, system and method for the creation of portable proximity communication networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2972835A4 *

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11290762B2 (en) 2012-11-27 2022-03-29 Apple Inc. Agnostic media delivery system
US11070889B2 (en) 2012-12-10 2021-07-20 Apple Inc. Channel bar user interface
US11317161B2 (en) 2012-12-13 2022-04-26 Apple Inc. TV side bar user interface
US11245967B2 (en) 2012-12-13 2022-02-08 Apple Inc. TV side bar user interface
US11297392B2 (en) 2012-12-18 2022-04-05 Apple Inc. Devices and method for providing remote control hints on a display
US11194546B2 (en) 2012-12-31 2021-12-07 Apple Inc. Multi-user TV user interface
US11822858B2 (en) 2012-12-31 2023-11-21 Apple Inc. Multi-user TV user interface
US10789642B2 (en) 2014-05-30 2020-09-29 Apple Inc. Family accounts for an online content storage sharing service
US11941688B2 (en) 2014-05-30 2024-03-26 Apple Inc. Family accounts for an online content storage sharing service
US11520467B2 (en) 2014-06-24 2022-12-06 Apple Inc. Input device and user interface interactions
US11461397B2 (en) 2014-06-24 2022-10-04 Apple Inc. Column interface for navigating in a user interface
US11727093B2 (en) 2015-02-06 2023-08-15 Apple Inc. Setting and terminating restricted mode operation on electronic devices
US11188624B2 (en) 2015-02-06 2021-11-30 Apple Inc. Setting and terminating restricted mode operation on electronic devices
CN104683336A (zh) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 一种基于安全域的安卓隐私数据保护方法及系统
CN104683336B (zh) * 2015-02-12 2018-11-13 中国科学院信息工程研究所 一种基于安全域的安卓隐私数据保护方法及系统
US10853029B2 (en) 2015-06-18 2020-12-01 Googale (2009) Ltd. Computerized system including rules for a rendering system accessible to non-literate users via a touch screen
US10726118B2 (en) 2015-06-18 2020-07-28 Googale (2009) Ltd. Secured computerized system for children and/or pre-literate/illiterate users
US10198963B2 (en) 2015-06-18 2019-02-05 Googale (2009) Ltd. Secure computerized system, method and computer program product for children and/or pre-literate/illiterate users
US9871798B2 (en) 2015-06-18 2018-01-16 Googale (2009) Ltd. Computerized system facilitating secured electronic communication between and with children
WO2016203473A1 (fr) * 2015-06-18 2016-12-22 Googale (2009) Ltd Système informatisé amélioré facilitant une communication électronique sécurisée entre et avec des enfants
US11520858B2 (en) 2016-06-12 2022-12-06 Apple Inc. Device-level authorization for viewing content
US11543938B2 (en) 2016-06-12 2023-01-03 Apple Inc. Identifying applications on which content is available
US11966560B2 (en) 2016-10-26 2024-04-23 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device
US11609678B2 (en) 2016-10-26 2023-03-21 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device
US10872024B2 (en) 2018-05-08 2020-12-22 Apple Inc. User interfaces for controlling or presenting device usage on an electronic device
US11582517B2 (en) 2018-06-03 2023-02-14 Apple Inc. Setup procedures for an electronic device
US11962836B2 (en) 2019-03-24 2024-04-16 Apple Inc. User interfaces for a media browsing application
US11445263B2 (en) 2019-03-24 2022-09-13 Apple Inc. User interfaces including selectable representations of content items
US11683565B2 (en) 2019-03-24 2023-06-20 Apple Inc. User interfaces for interacting with channels that provide content that plays in a media browsing application
US11467726B2 (en) 2019-03-24 2022-10-11 Apple Inc. User interfaces for viewing and accessing content on an electronic device
WO2020198238A1 (fr) * 2019-03-24 2020-10-01 Apple Inc. Interfaces utilisateur pour application de navigation multimédia
US11750888B2 (en) 2019-03-24 2023-09-05 Apple Inc. User interfaces including selectable representations of content items
US11057682B2 (en) 2019-03-24 2021-07-06 Apple Inc. User interfaces including selectable representations of content items
US11863837B2 (en) 2019-05-31 2024-01-02 Apple Inc. Notification of augmented reality content on an electronic device
US11797606B2 (en) 2019-05-31 2023-10-24 Apple Inc. User interfaces for a podcast browsing and playback application
US11363137B2 (en) 2019-06-01 2022-06-14 Apple Inc. User interfaces for managing contacts on another electronic device
CN110348206A (zh) * 2019-07-11 2019-10-18 网易(杭州)网络有限公司 应用于安卓安装包apk的保护方法、介质、装置和计算设备
WO2021096957A1 (fr) * 2019-11-11 2021-05-20 Apple Inc. Interfaces utilisateurs pour des listes de lecture soumises à curation à base de période de temps
US11843838B2 (en) 2020-03-24 2023-12-12 Apple Inc. User interfaces for accessing episodes of a content series
US11899895B2 (en) 2020-06-21 2024-02-13 Apple Inc. User interfaces for setting up an electronic device
US11720229B2 (en) 2020-12-07 2023-08-08 Apple Inc. User interfaces for browsing and presenting content
US11934640B2 (en) 2021-01-29 2024-03-19 Apple Inc. User interfaces for record labels

Also Published As

Publication number Publication date
KR20150132461A (ko) 2015-11-25
EP2972835A4 (fr) 2017-01-18
EP2972835A1 (fr) 2016-01-20
JP2016517598A (ja) 2016-06-16
CN105339895A (zh) 2016-02-17
CA2907274A1 (fr) 2014-09-18

Similar Documents

Publication Publication Date Title
US10460085B2 (en) Tablet computer
US20130254660A1 (en) Tablet computer
EP2972835A1 (fr) Tablette électronique
Yáñez Gómez et al. Heuristic evaluation on mobile interfaces: A new checklist
Deitel et al. Android for programmers: an app-driven approach
CN103493085A (zh) 电子书扩展系统和方法
Yazid et al. User experience design (UXD) of mobile application: An implementation of a case study
KR102248960B1 (ko) 인공지능 학습 플랫폼을 이용한 비즈니스 방법 및 시스템
US20190318644A1 (en) End to end educational system and method
Lowry et al. Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
Kloss Android apps with app inventor: The fast and easy way to build android apps
Semertzidis Mobile application development to enhance higher education lectures
CA2818341A1 (fr) Ordinateur tablette
Deitel iPhone for programmers
Redmond FundNest-A mobile application with open banking solutions to assist financial management
Mishra User interface design: for existing system monitoring application
Waghmare Augmenting Customer Experience with SharePoint Online: Building Portals and Practices to Improve Usability
Lindegren Designing for user awareness and usability: An evaluation of authorization dialogs on a mobile device
Varga An Experiential comparative analysis of two remote usability testing methods
Tapola Using Low-Tech Prototype to Study Children’s Preferences for UI Components
Papakostas et al. Artificial Intelligence-Enhanced PARSAT AR Software: Architecture and Implementation
Dakić Balance of Features in Mobile Development
Kumar et al. BAWIQ Android Application
Mejtoft Proceedings of the 11th Student Conference in Human–Information-Thing: Interaction Technology 2015
Gleeson et al. What Do They Do All Day? What Code Actually Is and How It Gets Written

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201480023591.2

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14764143

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016503117

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2907274

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2014764143

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20157029482

Country of ref document: KR

Kind code of ref document: A