U.S. patent application number 15/430324 was filed with the patent office on 2017-06-01 for selectively deleting items that are not of interest to a user.
The applicant listed for this patent is MICROSOFT TECHNOLOGY LICENSING, LLC. Invention is credited to Jennifer C. Trahan, Andrew Zeigler.
Application Number | 20170154121 15/430324 |
Document ID | / |
Family ID | 40624912 |
Filed Date | 2017-06-01 |
United States Patent
Application |
20170154121 |
Kind Code |
A1 |
Zeigler; Andrew ; et
al. |
June 1, 2017 |
SELECTIVELY DELETING ITEMS THAT ARE NOT OF INTEREST TO A USER
Abstract
Various embodiments enable a user to use their browser to
selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest. In one or more embodiments, items that appear on a
user-specified list, such as a favorites or a bookmarked list, are
not deleted when a delete operation is performed relative to items
to which a user browses. In at least some embodiments, a user
interface is provided and enables a user to select classes of items
that are to be retained when delete operations are performed.
Inventors: |
Zeigler; Andrew; (Seattle,
WA) ; Trahan; Jennifer C.; (Kirkland, WA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
MICROSOFT TECHNOLOGY LICENSING, LLC |
Redmond |
WA |
US |
|
|
Family ID: |
40624912 |
Appl. No.: |
15/430324 |
Filed: |
February 10, 2017 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11936940 |
Nov 8, 2007 |
9594844 |
|
|
15430324 |
|
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
G06F 16/957 20190101;
G06F 3/0484 20130101; G06F 16/955 20190101; G06F 3/0482 20130101;
G06F 16/9574 20190101 |
International
Class: |
G06F 17/30 20060101
G06F017/30; G06F 3/0482 20060101 G06F003/0482; G06F 3/0484 20060101
G06F003/0484 |
Claims
1. A system comprising: one or more processors; one or more
computer-readable storage media embodying software instructions
which, when executed, implement a method comprising: detecting a
plurality of items corresponding to content that is browsed to with
a browser by the system; identifying a first set of one or more of
the plurality of items to be retained even when a delete operation
is triggered for at least a second set of one or more of the
plurality of items, the first set of the one or more of the
plurality of items to be retained being based on an implied
interest of the one or more items absent additional user actions
with the first set of the one or more of the plurality of items;
detecting input for deleting the second set of one or more
plurality of items; and selectively deleting the second set of the
one or more plurality of items without deleting the first set of
the one or more plurality of times based at least in part on
determining the implied interest in the one or more items.
2. The system of claim 1, wherein the first set of the one or more
plurality of items include cookies in a cookie store.
3. The system of claim 2, wherein the second set of the one or more
plurality of items include additional cookies in the cookie
store.
4. The system of claim 1, wherein the first and second set of the
one or more plurality of items include browsing history items.
5. The system of claim 1, wherein the implied interest is based on
a browsing history in which the browser is used to browse to
content associated with the first set of one or more of the
plurality of items.
6. The system of claim 1, wherein the browser is configured to
periodically delete a class of items that includes the second set
of one or more of the plurality of items.
7. The system of claim 1, wherein the browser is configured to
automatically delete a class of items that includes the second set
of one or more of the plurality of items.
8. A method implemented by a computing system having one or more
processors and one or more computer-readable storage media
embodying software instructions which, when executed by the one or
more processors, implement the method, the method comprising:
detecting a plurality of items corresponding to content that is
browsed to with a browser by the system; identifying a first set of
one or more of the plurality of items to be retained even when a
delete operation is triggered for at least a second set of one or
more of the plurality of items, the first set of the one or more of
the plurality of items to be retained being based on an implied
interest of the one or more items absent additional user actions
with the first set of the one or more of the plurality of items;
detecting input for deleting the second set of one or more
plurality of items; and selectively deleting the second set of the
one or more plurality of items without deleting the first set of
the one or more plurality of times based at least in part on
determining the implied interest in the one or more items.
9. The method of claim 8, wherein the first set of the one or more
plurality of items include cookies in a cookie store.
10. The method of claim 8, wherein the second set of the one or
more plurality of items include additional cookies in the cookie
store.
11. The method of claim 8, wherein the first and second set of the
one or more plurality of items include browsing history items.
12. The method of claim 8, wherein the implied interest is based on
a browsing history in which the browser is used to browse to
content associated with the first set of one or more of the
plurality of items.
13. The method of claim 8, wherein the browser is configured to
periodically delete a class of items that includes the second set
of one or more of the plurality of items.
14. The method of claim 8, wherein the browser is configured to
automatically delete a class of items that includes the second set
of one or more of the plurality of items.
15. A computer program product comprising one or more
computer-readable storage media embodying software instructions
which are executable by one or more processors of a computing
system to implement a method that includes the computing system
performing the following: the computing system detecting a
plurality of items corresponding to content that is browsed to with
a browser by the system; the computing system identifying a first
set of one or more of the plurality of items to be retained even
when a delete operation is triggered for at least a second set of
one or more of the plurality of items, the first set of the one or
more of the plurality of items to be retained being based on an
implied interest of the one or more items absent additional user
actions with the first set of the one or more of the plurality of
items; the computing system detecting input for deleting the second
set of one or more plurality of items; and the computing system
selectively deleting the second set of the one or more plurality of
items without deleting the first set of the one or more plurality
of times based at least in part on determining the implied interest
in the one or more items.
16. The computer program product of claim 15, wherein the first and
second sets of the one or more plurality of items include cookies
in a cookie store.
17. The computer program product of claim 15, wherein the first and
second set of the one or more plurality of items include browsing
history items.
18. The computer program product of claim 15, wherein the implied
interest is based on a browsing history in which the browser is
used to browse to content associated with the first set of one or
more of the plurality of items.
19. The computer program product of claim 15, wherein the browser
is configured to periodically delete a class of items that includes
the second set of one or more of the plurality of items.
20. The computer program product of claim 15, wherein the browser
is configured to automatically delete a class of items that
includes the second set of one or more of the plurality of items.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation of U.S. patent
application Ser. No. 11/936,940 filed on Nov. 8, 2007, entitled
"SELECTIVELY DELETING ITEMS THAT ARE NOT OF INTEREST TO A USER,"
which issued as U.S. patent Ser. No. ______ on ______, and which
application is expressly incorporated herein by reference in its
entirety.
BACKGROUND
[0002] When a user browses on the Web, their Web browser typically
writes data to a cache or history file that describes aspects of a
user's browsing activities. For example, a user's history file can
include a list of websites to which a user has browsed, as well as
cookies associated with those websites and other data. Often times,
and typically for privacy and/or performance reasons, a user will
opt to delete these files using a feature, e.g. "Delete Browsing
History", that is provided by their Web browser. The delete feature
offered by most if not all browsers tends to be indiscriminate in
what it deletes. Specifically, such features typically delete all
of a user's collected data when such feature is selected by the
user.
BRIEF SUMMARY
[0003] This Summary is provided to introduce a selection of
concepts in a simplified form that are further described below in
the Detailed Description. This Summary is not intended to identify
key features or essential features of the claimed subject matter,
nor is it intended to be used to limit the scope of the claimed
subject matter.
[0004] Various embodiments enable a user to use their browser to
selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest.
[0005] In one or more embodiments, items that appear on a
user-specified list, such as a favorites or a bookmarked list, are
not deleted when a delete operation is performed relative to items
to which a user browses.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] The same numbers are used throughout the drawings to
reference like features.
[0007] FIG. 1 illustrates an operating environment in which various
principles described herein can be employed in accordance with one
or more embodiments.
[0008] FIG. 2 illustrates a flow diagram that describes steps in a
method in accordance with one or more embodiments.
[0009] FIG. 3 illustrates an example Web browser in accordance with
one or more embodiments.
[0010] FIG. 4 illustrates a flow diagram that describes steps in a
method in accordance with one or more embodiments.
[0011] FIG. 5 illustrates an example user interface in accordance
with one or more embodiments.
[0012] FIG. 6 illustrates an example system that can be used to
implement one or more embodiments.
DETAILED DESCRIPTION
Overview
[0013] Various embodiments enable a user to use their browser to
selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest.
[0014] In one or more embodiments, items that appear on a
user-specified list, such as a favorites or a bookmarked list, are
not deleted when a delete operation is performed relative to items
to which a user browses. In at least some embodiments, a user
interface is provided and enables a user to select classes of items
that are to be retained when delete operations are performed.
[0015] In the discussion above and below, the notion of an "item"
is used to describe information that may be of interest to a user.
Items can include, by way of example and not limitation, URLs,
cookies, and/or any other information that can be collected and
saved which describe, or are in some way associated with a user's
browsing activities.
[0016] In the discussion that follows, a section entitled
"Operating Environment" is provided and describes one environment
in which one or more embodiments can be employed. Following this, a
section entitled "Items in Which a User Has an Implied Interest" is
provided and describes various items in which a user can have an
implied interest. Next, a section entitled "Retaining Items in
Which a User Has an Implied Interest" is provided and describes an
example embodiment in which items can be selectively retained in
view of a delete operation. Following this, a section entitled
"Selectively Deleting Items in a User's Browsing History" is
provided and describes an embodiment in which items in a user's
browsing history can be selectively deleted. Next, a section
entitled "Example User Interface" is provided and describes an
example user interface in accordance with one or more embodiments.
Finally, a section entitled "Example System" is provided and
describes an example system in which one or more embodiments can be
implemented.
Operating Environment
[0017] FIG. 1 illustrates an operating environment in accordance
with one or more embodiments, generally at 100. Environment 100
includes a computing device 102 having one or more processors 104,
one or more computer-readable media 106 and one or more
applications 108 that reside on the computer-readable media and
which are executable by the processor(s). The computer-readable
media can include, by way of example and not limitation, all forms
of volatile and non-volatile memory and/or storage media that are
typically associated with a computing device. Such media can
include ROM, RAM, flash memory, hard disk, removable media and the
like. One specific example of a computing device is shown and
described below in FIG. 6.
[0018] In addition, computing device 102 includes a software
application in the form of a Web browser 110. Any suitable Web
browser can be used examples of which are available from the
assignee of this document and others. In at least some embodiments,
Web browser 110 is configured to enable a user to use their browser
to selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest. Further, in at least some embodiments, the Web browser
enables a user to define a user-specified list. Items that appear
on a user-specified list, such as a favorites or a bookmarked list,
are not deleted when a delete operation is performed relative to
items to which a user browses. In at least some embodiments, a user
interface is provided and enables a user to select classes of items
that are to be retained when delete operations are performed. To
this end, Web browser 110 includes or otherwise provides a user
with access to an associated delete module 110a and a user
interface module 110b. Logic implemented by the delete module is
described in more detail below. In addition, an example user
interface provided by user interface module 110b is shown and
described below in connection with FIG. 5. It is to be appreciated
and understood that the functionality provided by the delete module
and/or the user interface module associated with the Web browser
can be provided as a native part of a Web browser, a Web browser
extension or "plug-in", or as code modules that are separate from
but work in association with the Web browser.
[0019] In addition, environment 100 includes a network 112, such as
the Internet, and one or more Web sites 114 from and to which
content can be received and sent.
[0020] Computing device 102 can be embodied as any suitable
computing device such as, by way of example and not limitation, a
desktop computer, a portable computer, a handheld computer such as
a personal digital assistants (PDA), cell phone, and the like.
Items in Which a User Has an Implied Interest
[0021] Various embodiments enable a user to use their browser to
selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest.
[0022] In one or more embodiments, a Web browser can imply a user's
interest in a particular item based upon some action that a user
has taken with respect to the particular item. A user's implied
interest can be ascertained based on any suitable action that a
user can take. For example, if a user has most recently browsed to
an item, then the item may be of particular interest to the user.
Alternately or additionally, if a user frequently browses to
particular items on the Web, these items may be of particular
interest to a user. Alternately or additionally, if a user has
proactively added a particular item to their favorites list or has
otherwise bookmarked a particular item, this item is of particular
interest to a user.
[0023] In these as well as other instances, when a user conducts a
delete operation, such as selecting to delete a group of items to
which a user has browsed, the Web browser can take steps to ensure
that those items in which there is an implied user interest are not
deleted.
Retaining Items in Which a User Has an Implied Interest
[0024] FIG. 2 is a flow diagram that describes steps in a method in
accordance with one or more embodiments. The method can be
implemented in connection with any suitable hardware, software,
firmware or combination thereof In at least some embodiments,
aspects of the method can be implemented by an application, such as
a suitably configured Web browser such as the one illustrated and
described in FIG. 1.
[0025] Step 200 receives input to conduct a delete operation. This
step can be performed in any suitable way. For example, in at least
some embodiments, a user can indicate via a suitably-configured
user interface that they wish to delete a class of items.
Alternately or additionally, a user's Web browser may be configured
to automatically, periodically, delete items or classes of items.
Step 202 ascertains whether a user has an implied interest in an
item. A user can have an implied interest in a particular item for
any number of reasons examples of which are provided above. If, at
202, a user does not have an implied interest in a particular item,
step 204 deletes the item. If, on the other hand, a user has an
implied interest in a particular item, step 206 retains the item.
By retaining the item, the item can remain available for use by the
user's Web browser. Such can include, by way of example and not
limitation, retaining the item in an appropriate store (whether
local or remote) such that the item is available for use by the Web
browser.
[0026] Accordingly, in this manner, a user can selectively delete
items that are not of interest to them and retain items that are of
interest to them.
[0027] Having described the notion of an implied interest and how
that implied interest can be used, consider now a specific example
embodiment in which items can be selectively deleted from a user's
browsing history.
Selectively Deleting Items in a User's Browsing History
[0028] FIG. 3 illustrates a system in accordance with one or more
embodiments. In this example, a Web browser 110 includes or
otherwise makes use of an associated delete module 110a and a user
interface module 110b. The delete module is utilized by the Web
browser to selectively delete items as described above and below.
The user interface module is used to provide a mechanism by which a
user can indicate their preference to selectively delete various
items as described above and below.
[0029] In this example, a user's browsing history can be manifest
by items that are stored in one or more different stores including,
by way of example and not limitation, a browsing history store 300,
a cookie store 302, and/or a temporary Internet files store 304.
Although these stores are illustrated as separate stores, such
stores can reside in the form of one logical store that stores
associated items.
[0030] Further, the delete module 110a maintains or otherwise has
access to a so-called allow list 306 which maintains a list of
items in which a user has an implied interest. A user can have an
implied interest in items such as those items to which a user has
most recently browsed, has most frequently browsed, and/or has
otherwise indicated as being important to the user. A user can
indicate an item's importance by, for example, adding the item to a
user-specified list, such as a favorites list or a bookmarked list.
Other lists can, of course, be used to reflect a user's
interest.
[0031] When a user wishes to delete a class of items, the user can
effect a delete operation by way of invoking a user interface
provided by user interface module 110b. An example of one user
interface that can be used is provided just below. When a delete
operation is invoked, whether through a specific user action or
otherwise, a class of items subject to the delete operation can be
compared to a list of items appearing on the allow list 306. If an
item appears on the allow list 306, then the item is not deleted
during the delete operation. If, on the other hand, the item does
not appear on the allow list 306, the item is deleted. So, for
example, a user's browsing history may include a number of URLs to
which a user has browsed. When the user opts to delete their
browsing history, URLs appearing on the allow list 306 are not
deleted. Alternately or additionally, when a user opts to delete
their cookies, cookies appearing on allow list 306 are not deleted.
Similarly, if a user opts to delete their temporary Internet files,
temporary Internet files that appear on the allow list 306 are not
deleted.
[0032] In this way, items that are of interest to a user, whether
implied through a particular user action or proactively specified
by the user are retained for future use by the Web browser.
[0033] FIG. 4 is a flow diagram that describes steps in a method in
accordance with one or more embodiments. The method can be
implemented in connection with any suitable hardware, software,
firmware or combination thereof. In at least some embodiments,
aspects of the method can be implemented by an application, such as
a suitably configured Web browser.
[0034] Step 400 receives input to conduct a delete operation on a
user's browsing history. This step can be performed in any suitable
way. For example, the user can, through a suitably-configured user
interface, indicate that a delete operation is to be performed
relative to their browsing history. Step 402 compares items in the
user's browsing history to items that appear on an allow list.
Examples of items that appear on an allow list and how such items
can come to reside on the allow list are given above. The
comparison that is performed at step 402 can be performed in any
suitable way. For example, one comparison can compare portions of
an URL's domain or an entire domain. Specifically, a top-level
domain and one or more sub-domains can be used in the comparison.
For example, in the URL "mail.Yahoo.com", the top-level domain
"com" in combination with the sub-domain "Yahoo" can be used as a
basis for the comparison. Other comparisons can, of course, be used
without departing from the spirit and scope of the claimed subject
matter.
[0035] If, at step 404, an item does not appear on the allow list,
step 406 deletes the item. If, on the other hand, the item does
appear on the allow list, step 408 retains the item.
[0036] Having described various embodiments in which items can be
selectively deleted, consider now an example user interface that
can be utilized to implement one or more of the above-described
embodiments.
Example User Interface
[0037] FIG. 5 illustrates an example user interface in accordance
with one or more embodiments generally at 500. User interface 500
can be provided in any suitable way. In at least some embodiments,
user interface 500 is provided via a user interface module such as
that described above in FIG. 1.
[0038] In the illustrative example, user interface 500 comprises a
"Delete Browsing History" window that provides a number of
different classes of items that can be deleted by a user. For
example, in this specific instance, classes of items that can be
deleted include, by way of example and not limitation, temporary
Internet files, cookies, history, form data, and passwords. In this
example, a user interface instrumentality 502 is provided to enable
a user to selectively define items that are not to be deleted when
a delete operation is conducted. In this particular example, a user
can opt to keep data from their favorite websites by simply
checking the check box. Accordingly, when a user opts to delete
their browsing history, if the check box of instrumentality 502 has
been checked, those items appearing in an associated allow list are
not deleted. In this instance, the items appearing in the
associated allow list would include those items that appear as a
user's favorite websites.
[0039] Having described an example user interface that can be used
to selectively delete various items, consider now an example system
that can be utilized to implement one or more of the
above-described embodiments.
Example System
[0040] FIG. 6 illustrates an example computing device 600 that can
implement the various embodiments described above. Computing device
600 can be, for example, computing device 102 of FIG. 1 or any
other suitable computing device.
[0041] Computing device 600 includes one or more processors or
processing units 602, one or more memory and/or storage components
604, one or more input/output (I/O) devices 606, and a bus 608 that
allows the various components and devices to communicate with one
another. Bus 608 represents one or more of any of several types of
bus structures, including a memory bus or memory controller, a
peripheral bus, an accelerated graphics port, and a processor or
local bus using any of a variety of bus architectures. Bus 608 can
include wired and/or wireless buses.
[0042] Memory/storage component 604 represents one or more computer
storage media. Component 604 can include volatile media (such as
random access memory (RAM)) and/or nonvolatile media (such as read
only memory (ROM), Flash memory, optical disks, magnetic disks, and
so forth). Component 604 can include fixed media (e.g., RAM, ROM, a
fixed hard drive, etc.) as well as removable media (e.g., a Flash
memory drive, a removable hard drive, an optical disk, and so
forth).
[0043] One or more input/output devices 606 allow a user to enter
commands and information to computing device 600, and also allow
information to be presented to the user and/or other components or
devices. Examples of input devices include a keyboard, a cursor
control device (e.g., a mouse), a microphone, a scanner, and so
forth. Examples of output devices include a display device (e.g., a
monitor or projector), speakers, a printer, a network card, and so
forth.
[0044] Various techniques may be described herein in the general
context of software or program modules. Generally, software
includes routines, programs, objects, components, data structures,
and so forth that perform particular tasks or implement particular
abstract data types. An implementation of these modules and
techniques may be stored on or transmitted across some form of
computer readable media. Computer readable media can be any
available medium or media that can be accessed by a computing
device. By way of example, and not limitation, computer readable
media may comprise "computer storage media".
[0045] "Computer storage media" include volatile and non-volatile,
removable and non-removable media implemented in any method or
technology for storage of information such as computer readable
instructions, data structures, program modules, or other data.
Computer storage media include, but are not limited to, RAM, ROM,
EEPROM, flash memory or other memory technology, CD-ROM, digital
versatile disks (DVD) or other optical storage, magnetic cassettes,
magnetic tape, magnetic disk storage or other magnetic storage
devices, or any other medium which can be used to store the desired
information and which can be accessed by a computer.
Conclusion
[0046] Various embodiments enable a user to use their browser to
selectively delete items that are not of interest to them. In at
least some embodiments, a user's interest in a particular item is
implied by some action a user has taken with respect to the
particular item. Responsive to this implied interest, various
delete operations that can be performed relative to the items are
performed so as to exclude items in which a user has some implied
interest.
[0047] In one or more embodiments, items that appear on a
user-specified list, such as a favorites or a bookmarked list, are
not deleted when a delete operation is performed relative to items
to which a user browses. In at least some embodiments, a user
interface is provided and enables a user to select classes of items
that are to be retained when delete operations are performed.
[0048] Although the subject matter has been described in language
specific to structural features and/or methodological acts, it is
to be understood that the subject matter defined in the appended
claims is not necessarily limited to the specific features or acts
described above. Rather, the specific features and acts described
above are disclosed as example forms of implementing the
claims.
* * * * *