Unintentional touch rejection
First Claim
1. A method comprising:
- receiving, by a computer, a first touch on a touch-sensitive device of the computer, the first touch having a first width and a first length;
determining, by the computer, a first reliability value of the first touch based at least partly on the first width and the first length, the first reliability value indicating a first probability that the first touch is intentional;
receiving, by the computer, a second touch on the touch-sensitive device after receiving the first touch, the second touch having a second width and a second length;
determining, by the computer, a second reliability value of the second touch based at least partly on the second width and the second length, the second reliability value indicating a second probability that the second touch is intentional;
determining, by the computer, that the first touch and the second touch are each a portion of a third touch based at least partly on changes to the first reliability value and the second reliability value over time, the third touch having a third width greater than a combination of the first width and the second width and a third length greater than a combination of the first length and the second length; and
rejecting, by the computer, the third touch based at least partly on the third width and the third length.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for rejecting an unintentional palm touch is disclosed. In at least some embodiments, a touch is detected by a touch-sensitive surface associated with a display. Characteristics of the touch may be used to generate a set of parameters related to the touch. In an embodiment, firmware is used to determine a reliability value for the touch. The reliability value and the location of the touch is provided to a software module. The software module uses the reliability value and an activity context to determine a confidence level of the touch. In an embodiment, the confidence level may include an evaluation of changes in the reliability value over time. If the confidence level for the touch is too low, it may be rejected.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computer, a first touch on a touch-sensitive device of the computer, the first touch having a first width and a first length; determining, by the computer, a first reliability value of the first touch based at least partly on the first width and the first length, the first reliability value indicating a first probability that the first touch is intentional; receiving, by the computer, a second touch on the touch-sensitive device after receiving the first touch, the second touch having a second width and a second length; determining, by the computer, a second reliability value of the second touch based at least partly on the second width and the second length, the second reliability value indicating a second probability that the second touch is intentional; determining, by the computer, that the first touch and the second touch are each a portion of a third touch based at least partly on changes to the first reliability value and the second reliability value over time, the third touch having a third width greater than a combination of the first width and the second width and a third length greater than a combination of the first length and the second length; and rejecting, by the computer, the third touch based at least partly on the third width and the third length. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more computer-readable storage media including computer-executable instructions that, when executed by a processor, perform operations comprising:
-
detecting a touch by a touch-sensitive device of a computer; receiving, by the computer, reliability data associated with the touch, the reliability data indicating a location of the touch on the touch-sensitive device; determining, by the computer, a location context of the touch, the location context indicating a location of one or more windows on the touch-sensitive device and a use of each of the one or more windows; determining a state of a software application of the computer; determining a confidence level of the touch based at least partly on the location touch, the location context of the touch, and the state of the software application; and communicating the touch to the software application when the confidence level of the touch meets a predetermined level. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a touch-sensitive device; a processing unit; memory coupled to the processing unit, the memory storing; firmware configured to determine a number of reliability values of a touch on the touch-sensitive device; a software module configured to; determine a first confidence level of the touch based at least partly on a first reliability value of the touch; determine a second confidence level of the touch based at least partly on a second reliability value of the touch, the second confidence level having a lower value than the first confidence level; and delaying a determination regarding whether to reject the touch based on a decrease in the confidence level of the touch from the first confidence level to the second confidence level. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification