US-20260127014-A1 - MANAGEMENT OF UNINTENTIONAL INPUT ON A COMPUTING DEVICE
Abstract
According to at least one implementation, a method includes identifying a request for a summary of an action caused by an input received from a user, and identifying the action based on a proximity in time of the action to the request. The method further includes generating the summary, the summary including a descriptor for the action, and providing the summary as a response to the request.
Inventors
- Raymond Wensley Smith
Assignees
- GOOGLE LLC
Dates
- Publication Date
- 20260507
- Application Date
- 20241104
Claims (20)
- 1 . A method comprising: identifying a request for a summary of an action caused by an input received from a user; identifying the action based on a recency of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request.
- 2 . The method of claim 1 , wherein the summary further includes a second descriptor for the input that caused the action.
- 3 . The method of claim 1 , wherein providing the summary includes: causing display of the summary or an audio output of the summary.
- 4 . The method of claim 1 further comprising: providing an option as part of the response that, when selected, is configured to perform an operation to undo the action.
- 5 . The method of claim 1 , wherein the input is a first input, and the method further comprises: providing an option as part of the response that, when selected, is configured to perform an operation to prevent a second input from causing the action, the second input being of a same type as the first input.
- 6 . The method of claim 1 , wherein the input comprises a first input and wherein the method further comprises: identifying a first location of the first input on a display; identifying at least one second location of at least one additional input on the display associated with at least one additional action; and determining a distance of the first location from the at least one second location; wherein identifying the action is further based on the distance.
- 7 . The method of claim 1 , wherein the request comprises a first request, and wherein the method further comprises: identifying a second request for a second summary of a second action caused by a second input received from the user; identifying the second action based on a second proximity in time of the second action to the first request; generating the second summary, the second summary including at least a second descriptor for the second action; and providing the second summary as a second response to the second request.
- 8 . The method of claim 1 , wherein the action comprises a first action, and wherein the method further comprises: identifying the first action and at least one additional action; determining a workflow associated with the at least one additional action; and determining a relationship of the first action to the workflow; wherein identifying the action is further based on the relationship.
- 9 . A computer-readable storage medium having program instructions stored thereon that, when executed by at least one processor, direct the at least one processor to perform a method, the method comprising: identifying a request for a summary of an action caused by an input received from a user; identifying the action based on a proximity in time of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request.
- 10 . The computer-readable storage medium of claim 9 , wherein the summary further includes a second descriptor for the input that caused the action.
- 11 . The computer-readable storage medium of claim 9 , wherein providing the summary includes: causing display of the summary or an audio output of the summary.
- 12 . The computer-readable storage medium of claim 9 , wherein the method further comprises: providing an option as part of the response that, when selected, is configured to perform an operation to undo the action.
- 13 . The computer-readable storage medium of claim 9 , wherein the input is a first input, and wherein the method further comprises: providing an option as part of the response that, when selected, is configured to perform an operation to prevent a second input from causing the action, the second input being of a same type as the first input.
- 14 . The computer-readable storage medium of claim 9 , wherein the input comprises a first input and wherein the method further comprises: identifying a first location of the first input on a display; identifying at least one second location of at least one additional input on the display associated with at least one additional action; and determining a distance of the first location from the at least one second location; wherein identifying the action is further based on the distance.
- 15 . The computer-readable storage medium of claim 9 , wherein the request comprises a first request, and wherein the method further comprises: identifying a second request for a second summary of a second action caused by a second input received from the user; identifying the second action based on a second proximity in time of the second action to the first request; generating the second summary, the second summary including at least a second descriptor for the second action; and providing the second summary as a second response to the second request.
- 16 . The computer-readable storage medium of claim 9 , wherein the action comprises a first action, and wherein the method further comprises: identifying the first action and at least one additional action; determining a workflow associated with the at least one additional action; and determining a relationship of the first action to the workflow; wherein identifying the action is further based on the relationship.
- 17 . A computing apparatus comprising: computer-readable storage media; at least one processor operatively coupled to the computer-readable storage media; and program instructions stored on the computer-readable storage media that, when executed by the at least one processor, direct the computing apparatus to perform a method, the method comprising: identifying a request for a summary of an action caused by a set of one or more inputs received from a user; identifying the action based on a proximity in time of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request.
- 18 . The computing apparatus of claim 17 , wherein the method further comprises: providing an option as part of the response that, when selected, is configured to perform an operation to undo the action.
- 19 . The computing apparatus of claim 17 , wherein the set of one or more inputs comprises a first input, and the method further comprises: providing an option as part of the response that, when selected, is configured to perform an operation to prevent a second input from causing the action, the second input being of a same type as the first input.
- 20 . The computing apparatus of claim 19 , wherein the method further comprises: identifying a third input; determining that the third input satisfies at least one similarity criterion to the first input; and in response to determining that the third input satisfies the at least one similarity criterion, blocking a second action associated with the third input.
Description
BACKGROUND In modern computing devices, a user can frequently initiate actions that are unintended but still recognized by the device. These can include accidental keystrokes, touchpad or touchscreen presses or other gestures, mouse clicks, or voice commands that are mistakenly triggered. Unintentional inputs can occur due to user errors, such as accidentally brushing against a touch-sensitive surface or due to software or hardware glitches that misinterpret the user's actions. SUMMARY This disclosure relates to systems and methods for providing users with options for responding to unintentional input. In at least one implementation, a computing device can be configured to monitor user inputs and corresponding actions from the inputs. User inputs may include touchpad or touchscreen presses, gestures, mouse clicks, voice commands, or other inputs. The actions can consist of retrieving and displaying data, generating notifications, performing calculations, updating records or settings, or other actions associated with an application or operating system of the device. In response to a user request for a summary associated with a recent input, the device can be configured to identify an action and at least one input that caused the action. The device can then be configured to give the user a descriptor of the action. The descriptor may include a pop-up visual indicator, an audio summary of the action, or another descriptor. In some examples, the device can further be configured to provide the user with a descriptor of the at least one action that caused the action. In some examples, the device can also be configured to provide options associated with the action, including maintaining the action, undoing the action, preventing the same input from causing the action in the future, or some other action. The user can use the descriptor information to select at least one option from the provided options. In some aspects, the techniques described herein relate to a method including: identifying a request for a summary of an action caused by an input received from a user; identifying the action based on a recency of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request. In some aspects, the techniques described herein relate to a computer-readable storage medium having program instructions stored thereon that, when executed by at least one processor, direct the at least one processor to perform a method, the method including: identifying a request for a summary of an action caused by an input received from a user; identifying the action based on a proximity in time of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request. In some aspects, the techniques described herein relate to a computing apparatus including: computer-readable storage media; at least one processor operatively coupled to the computer-readable storage media; and program instructions stored on the computer-readable storage media that, when executed by the at least one processor, direct the computing apparatus to perform a method, the method including: identifying a request for a summary of an action caused by an input received from a user; identifying the action based on a proximity in time of the action to the request; generating the summary, the summary including a descriptor for the action; and providing the summary as a response to the request. The accompanying drawings and the description below outline the details of one or more implementations. Other features will be apparent from the description, drawings, and claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates a computing environment to manage unintentional input on a computing device according to an implementation. FIG. 2 illustrates a method of operating a computing device to manage unintentional input according to an implementation. FIG. 3 illustrates an operational scenario of receiving a user request to identify descriptor information associated with unintentional input according to an implementation. FIG. 4 illustrates an example data structure to associate user input to corresponding actions according to an implementation. FIG. 5 illustrates an operational scenario of receiving a user request to identify descriptor information associated with unintentional input according to an implementation. FIG. 6 illustrates an operational scenario of undoing an action based on a user preference according to an implementation. FIG. 7 illustrates an operational scenario of updating user input preferences to limit an action based on user input according to an implementation. FIG. 8 illustrates a computing system to manage unintentional input according to an implementation. DETAILED DESCRIPTION Computing devices receive input through various interfaces and sensors. Examples of input devices