[go: up one dir, main page]

HK1093112A - Remote control method and device controlled from communicating terminals - Google Patents

Remote control method and device controlled from communicating terminals Download PDF

Info

Publication number
HK1093112A
HK1093112A HK06113877.5A HK06113877A HK1093112A HK 1093112 A HK1093112 A HK 1093112A HK 06113877 A HK06113877 A HK 06113877A HK 1093112 A HK1093112 A HK 1093112A
Authority
HK
Hong Kong
Prior art keywords
computer system
remotely controlled
user
identifier
centralized
Prior art date
Application number
HK06113877.5A
Other languages
Chinese (zh)
Inventor
C.布加德
F.弗尼尔
J.维拉尔达奇
Original Assignee
C-则目科技联合股份公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by C-则目科技联合股份公司 filed Critical C-则目科技联合股份公司
Publication of HK1093112A publication Critical patent/HK1093112A/en

Links

Description

Remote control method and apparatus controlled from communication terminal
The present invention relates to a method and a management device for remote control of commands from a communication terminal, in particular to remote control of portals, doors or terminals.
Parking spaces reserved for handicapped persons are often preempted by unauthorized persons.
The present invention aims to remedy such inconvenience.
For this purpose, the invention proposes, according to a first aspect, a remote control method characterized in that it comprises: -a step of opening an initial communication session between the call terminal and the centralized computer system through an intermediary of the telecommunications network; -a step of transferring, through an intermediary of the telecommunication network, the user identifier of the calling terminal and the identifier of the computer system to be remotely controlled to the centralized computer system; -a step of checking said identifier by a centralized computer system; if the check is positive: -a step of transferring an authorization from the centralized computer system to the computer system to be remotely controlled; and-a step of executing instructions authorized by the computer system to be remotely controlled.
Due to these measures, the user can select a computer system to be remotely controlled, such as a moving endbar or a parking folding rail, without knowing the address of the computer system to be remotely controlled on the telecommunications network. For example, the disabled person selects an address to which he wants to drive, and the computer system reserves a parking spot for the disabled person closest to the address.
The manager of the parking space can now ensure that the space reserved by the disabled cannot be used by unauthorized persons.
According to a particular feature, the method as briefly described above comprises: a step of communicating between the computer system to be remotely controlled and the calling terminal, during which the computer system to be remotely controlled transmits its identifier to the calling terminal, as a preliminary step to the step of transmitting the identifier from the computer system to be remotely controlled through the intermediary of a telecommunication network.
Thanks to these measures, when the user is close to the computer system to be remotely controlled, he receives its identifier and transmits it to the centralized computer system in order to instruct the computer system to be remotely controlled.
According to a particular feature, the method as briefly described above comprises: the step of communicating in the case of an unauthorized use of the computer system to be remotely controlled, during which the computer system to be remotely controlled transmits some representative information of the unauthorized use.
As a result of these measures, an unauthorized user can be contacted to ask him to stop unauthorized use of the remote control computer, or if there is a monitoring service, the police can be notified of such unauthorized use.
According to a particular feature, the method as briefly described above comprises: a step of checking, by the centralized computer system, the availability of the computer system to be remotely controlled.
Due to these measures, the user can be informed of the availability of the computer system to be remotely controlled.
According to a particular feature, the method as briefly described above comprises: a step of confirming the instruction to the centralized computer system and/or to the calling terminal by the computer system to be remotely controlled.
Thanks to these measures, the user can be assured: he can benefit himself from the convenience provided by the remote control computer.
According to a particular feature, the method as briefly described above comprises: the method comprises the steps of selecting the time of activating the instruction by the computer system to be remotely controlled, and realizing the instruction by the computer system to be remotely controlled at the limited time.
Due to these measures, the user can schedule a time until the instruction is executed.
According to a particular feature, the method as briefly described above comprises: detecting the end of use by the remote control computer.
Due to these measures, the computer system to be remotely controlled becomes available again for new instructions.
According to a particular feature, the method as briefly described above comprises: a step of opening a communication session between the computer system to be remotely controlled and the centralized computer system once the computer system to be remotely controlled is available.
As a result of these measures, the computer system can be persistently notified of the availability of all computer systems to be remotely controlled, and the pricing can be based on the period of use of the computer systems to be remotely controlled.
According to a particular feature, the method as briefly described above comprises: a second communication step between the calling terminal, which may be different from the calling terminal that opened the first communication session, and the computer system to be remotely controlled, wherein the computer system to be remotely controlled implements the instructions in response to the second session.
Due to these measures, a disabled person who has reserved a parking space, for example, when he reaches the vicinity of the parking space, opens the foldable balustrade or lowers the movable end bar. A second communication step is then carried out before using the computer system to be remotely controlled.
Also due to these measures, for example, when a disabled person occupying a predetermined space leaves the parking space, he vacates the parking space by opening the foldable balustrade or lowering the movable end bar. Furthermore, even if the communication with the computer system to be remotely controlled is unidirectional, the computer system still knows when the computer system to be remotely controlled is available and not available. The second communication step is then carried out at the end of the use of the computer system to be remotely controlled.
According to a particular feature, the method as briefly described above comprises: a step of inquiry by a third party and a step of providing status data related to one or several computer systems to be remotely controlled.
Due to these measures, authorized users have authorized tickets or virtual payment tickets, and/or unauthorized use can be known to surveillance or police services.
According to a second aspect, the invention proposes a remote control device characterized in that it comprises: -means for opening an initial communication session between the call terminal and the centralized computer system through an intermediary of the telecommunications network; -means for transmitting the user identifier of the call terminal and the identifier of the computer system to be remotely controlled to the centralized computer system through an intermediary of the telecommunication network; -means for verifying said identifier by means of a centralized computer system; if the check is positive, the centralized computer system is adapted to communicate an authorization to the computer system to be remotely controlled; and-the computer system to be remotely controlled is adapted to execute each instruction authorized by the computer system to be remotely controlled.
Since the advantages, objects, and specific features of the apparatus are similar to those of the method briefly described above, they will not be repeated here.
Other advantages, objects, and features of the invention will become apparent from the description which follows and from the explanation, and is not limited to the accompanying drawings, in which: figure 1 schematically shows a terminal according to a particular execution mode of the device that is the subject of the invention; figure 2 shows a logic diagram of a first specific execution mode of the inventive method; figure 3 shows a logic diagram of a first specific execution mode of the method that is the subject of the invention; figure 4 shows a logic diagram of a first specific execution mode of the method that is the subject of the invention; and-figure 5 shows a logic diagram of a second specific execution mode of the method that is the subject of the invention.
Although in the following description the invention is described with reference to a foldable parking rail, the invention is not limited to this type of computer system to be remotely controlled, but rather extends to all types of systems capable of receiving remote control signals.
In fig. 1, a foldable parking rail 100 is seen, comprising: -a vehicle detector 105; -a battery 110; -a fixed part 115; a moving part 120 associated with the fixed part 115, an axis of rotation 125 of the moving part 120; modem 130, or any type of interface connected to a transmission network of known type; -an electronic card 135; -a motor 140; and-a reducer 145.
Fig. 1 also shows a first telecommunications network 150 connecting the foldable balustrade 100 to a computer system 155, a second telecommunications network 160 connecting the computer system 155 to a mobile user terminal 165 and a fixed user terminal 170, a third telecommunications network 180, and a terminal 185 for law enforcement.
Vehicle detectors are of known type. Which provides an indication of the presence of a vehicle on the foldable balustrade 100. For this purpose it uses, for example, an inductive loop whose magnetic field is influenced by the presence of a metal object in proximity to the detector 105.
The battery 110 is of a known type. It provides electrical power to all components of the foldable balustrade 100. In some variations the battery 110 may be replaced or supplemented by a power source from an electrical source or a solar ray collector.
The fixed member 115 and the moving member 120 are made of rigid materials and can withstand the pressure of a vehicle pressing over the foldable balustrade 100. The fixed part 115 is fixed to the ground by known means.
Moving part 120 is moved about rotational axis 125 by motor 140, with reducer 145 serving as a transition. Motor 140 and reducer 145 are of known type. They include a torque limiter 146 between reducer 145 and moving member 120 to prevent damage to motor 140 or reducer 145 if the collapsible barrier is stressed by the vehicle.
The modem 130 is of a known type. Which is capable of receiving signals from a first telecommunications network (not shown) and demodulating them in order to provide information to the electronic card 135. The modem 130 has a unique address on the first telecommunications network, i.e. two different foldable balustrades 100 do not have the same address on the first telecommunications network.
The electronic card 135 is able to manipulate the position of the motor 140 and thus the moving part 120 according to the signals it receives from the modem 130, as shown in fig. 2-5. Electronic card 135 is preferably built in proximity to the microprocessor. The electronic card 135 can detect a malfunction of one of the balustrade assemblies and detect that the balustrade is pressed.
The first telecommunications network 150 is for example a mobile telephone network of portable terminals or "pagers". The modem 130 then comprises an antenna and means for receiving mobile telephone signals, for example for short message transmission, well known in the acronym "SMS" (short message system). As a variant, the first telecommunications network is a landline telephone network.
Computer system 155 includes, for example, a server storing software implementing one of the logic diagrams shown in FIGS. 2-5; and at least one database comprising the location of foldable railing 100, the address of the foldable railing on the first communication network, and an identifier of a person authorized to make a reservation for one of the parking spaces equipped with foldable railing 100.
The second telecommunications network 160 is, for example, the same as the first telecommunications network or internet computer system. The mobile user terminal 165 is a mobile phone and the fixed user terminal 170 is a computer of a known type, for example called PC (personal computer), equipped with means for connection to the second telecommunication network 160, such as a modem and navigation software on the internet, or a communication terminal, such as a PDA (personal digital assistant).
The third telecommunication network 180 is for example the same as the first telecommunication network or the internet computer system. The law enforcement terminal 185 is a terminal accessible by maintenance or communication personnel. For example, the terminal 185 may be a communication portable terminal or a fixed central monitoring terminal.
In a variant, the remote control device comprises a display unit (not shown) capable of displaying data relating to the use of the data. For example, the displayed data relates to: -the device has been stressed or has access to authorized information; -a period of use of the device under consideration; -a payment made available to the considered device.
In fig. 2 it can be seen that in the first case where the user arrives near the device and reads its identifier on the device before calling the server, information is exchanged between the user of the call terminal, the server of the centralized computer system, and the remote control or computer system.
During step 200, the user calls the server, for example by dialing a number or indicating the telephone number of a telephone line connected to the server, or by indicating an identifier of the line (e.g., "remote control"). The telephone number may be a full or standard telephone number (10 digits in france) or an abbreviated number of 4, 5 or 6 digits.
Once the communication (first communication session) has been established during step 205, the user transmits to the server its identifier and the device identifier that he read on the device, which identifiers are all unique.
During step 210, the server verifies the user's identifier.
For example, the server compares the telephone number of the calling terminal with the telephone numbers of authorized users stored in the database. According to another example, the server compares the "SIM" card number of the calling terminal (when included, it is a cell phone, for example) with SIM card numbers stored in a database of authorized users. According to yet another example, the server asks the user for a password, such as an authorization number or card number (e.g., a disabled ID or social security number) giving authorization rights and compares the information provided by the user with the contents of the database.
When the check is negative, the server will suggest and invite the user to find another slot, and follow another procedure necessary to obtain authorization to use the device. When a positive is verified in step 215, the server sends a command to the device, for example a command to open the [ balustrade ] in the situation shown in fig. 1. During step 220, in the case of a device with individual access, the device performs the request, in this case opening [ railing ]. In the case of a device with shared access, such as reserving multiple parking spaces for a corporate employee or disabled person, the computer system to be remotely controlled provides the user with an identifier of the space to be occupied (e.g., "blue zone 4 level 423 space") by displaying, printing a ticket, by intermediary communication through a server, or by local area communication (e.g., through bluetooth wireless technology). And simultaneously, the computer system to be remotely controlled orders the equipment to open the access railing and open the indicating device.
Optionally, during step 225, the device returns an acknowledgement to the server. The server then stores the occupancy condition of the device during step 230 and returns an acknowledgement to the user whose terminal stored this acknowledgement during step 240 during step 235.
According to a first variant, when the user leaves the device, it automatically detects that it is available and notifies the server of the availability, in which the server stores and possibly determines the amount to be charged to the user.
According to a second variant, when the user leaves the device, it performs the above steps, wherein the server may determine the amount to charge the user.
According to various variants, if the device is stressed or fails, it sends information to the server to allow intervention by maintenance or monitoring personnel, or by the police.
At any time, an authorized third party, for example equipped with a specific communication terminal or whose access authorization has been verified as above (see step 210), may enter into communication with the server at step 250 and send a status request to it regarding one or several remote control devices or computer systems at step 255. In response, the server verifies the access authorizations and prepares the requested data in step 260 and sends them to the terminals of the relevant third parties in step 265.
For example, the data transmitted relates to: -the device has been stressed or has access to authorized information; -a period of use of the device under consideration; -a payment made available to the considered device.
The method that is the subject of the invention thus allows the generation of a virtual payment instrument that can be verified remotely.
In fig. 3, the exchange of information between the user of the call terminal, the server of the centralized computer system, and the remote control or computer system is shown in use in a second scenario where the user arrives in the vicinity of the device and obtains its identifier from the device before calling the server.
During step 300, a user enters local area communication (which may be individual or collective access) with a device, for example, according to the local area bluetooth communication standard. When a communication is established, the user's terminal asks the device for its identifier during step 305, and the device prepares its response during step 310 and returns the identifier during step 315.
It is to be appreciated that other information may be provided by the device to the user terminal during step 315, such as travel information, location of emergency services, useful addresses, and/or advertisements of local services or merchants.
During step 320, the user terminal stores the information received during step 315. The user then calls the server during step 325, for example by dialing a number or indicating the telephone number of the telephone line connected to the server, or by indicating the identifier of the line (e.g., "remote control"). The telephone number may be a full or standard telephone number (10 digits in france) or an abbreviated number of 4, 5 or 6 digits. Once the communication (first communication session) has been established, the user transmits its identifier, as well as the device identifier, to the server. During step 330, the server verifies the user's identifier.
For example, the server compares the telephone number of the calling terminal with the telephone numbers of authorized users stored in the database. According to another example, the server compares the "SIM" card number of the calling terminal (when included, it is a cell phone, for example) with SIM card numbers stored in a database of authorized users. According to yet another example, the server asks the user for a password, such as an authorization number or card number (e.g., a disabled ID or social security number) giving authorization rights, and compares the information provided by the user with the contents of the database.
When the check is negative, the server will suggest and invite the user to find another slot, and follow another procedure necessary to obtain authorization to use the device. When the check is positive at step 335, the server sends a command to the device, for example a command to open the [ balustrade ] in the situation shown in fig. 1. During step 340, in case the device has individual access, the device executes the requested command, in this case opening [ balustrade ]. In the case of a device with shared access, such as reserving multiple parking spaces for a company employee or handicapped, the computer system to be remotely controlled provides the user with an identifier of the space to be occupied (e.g., "blue zone 4 level 433 space") by displaying, printing a ticket, communicating through an intermediary of a server, or by local area communication (e.g., by wireless technology according to the bluetooth communication standard). At the same time the computer system to be remotely controlled requires opening of the balustrade giving access to the apparatus and opening of the indicating device.
Optionally, during step 345, the appliance returns an acknowledgement to the server. The server then stores the occupancy state of the device during step 350 and returns an acknowledgement to the user whose terminal stored this acknowledgement during step 360 during step 355.
According to a first variant, when the user leaves the device, it automatically detects that it is available and notifies the server of the availability, in which the server stores and possibly determines the amount to be charged to the user.
According to a second variant, when the user leaves the device, it performs the above steps, wherein the server may determine the amount to charge the user. According to a [ other ] variant, if the device is stressed or fails, it sends information to the server to allow maintenance, monitoring personnel, or police intervention.
At any time, an authorized third party, for example equipped with a specific communication terminal or whose access authorization has been verified as above (see step 330), may enter into communication with the server at step 365 and send a status request thereto regarding one or several remote control devices or computer systems at step 370. In response, the server verifies the access authorization and prepares the requested data in step 375 and sends it to the terminal of the relevant third party in step 380.
An authorized third party may also enter into communication with devices involved in, for example, local area wireless communication at step 365 and send a status request thereto at step 385. In response, the device verifies the access authorization, possibly with communication with the server, in step 390, prepares the requested data and sends them to the terminal of the third party in question in step 395.
In both cases, the data sent may specifically relate to: -the device has been stressed or has access to authorized information; -a period of use for each device under consideration; -a payment made available to the considered device.
The method that is the subject of the invention thus allows the generation of a virtual payment instrument that can be verified remotely.
Fig. 4 shows the successive steps performed in the case where a user has previously reserved a resource managed by a remote control device or a computer system through the intermediary of a computer network, such as the internet.
During step 400, the calling terminal initiates the opening of a first communication session through an intermediary of a second telecommunications network, for example, between the calling terminal of the fixed user terminal 170 and the centralized computer system 155. For example, the user manipulates the navigator to select a website dedicated to the application program on the internet, or to call a service called audio telephony by telephone.
Then, during step 405, the centralized computer system identifies the user of the call terminal. For example, the centralized computer system compares the telephone number of the calling terminal with the telephone numbers of authorized users in the database. According to another example, the centralized computer system compares the number of the "SIM" card of the calling terminal (if any, it is a cell phone, for example) with the SIM card numbers stored in the database of authorized users.
According to another example, the centralized computer system asks the user for a password, such as an authorization number or a card number (e.g., a disabled ID or social security number) that authorizes the [ user ], and compares the information provided by the user to the contents of the database.
Each foldable parking rail or device to be controlled is identified by a unique alphabetic code displayed on the device so that the user can read it without having to leave his vehicle and send it through his cell phone.
If the authorization check of step 405 is negative, then the centralized computer system makes such a notification to the user during step 445 and he gets the opportunity to register the service at step 450. For example, the registration service requires a social security number or a disabled person ID or a bank card. If the registration is not done accurately (e.g., because the user is not eligible for service, or because he refuses to present the required information), the process terminates during step 455.
If the authorization check of step 405 is positive, or if the registration made during step 450 has been accurately achieved, then during a selection step 410 the user of the call terminal selects a computer system to be remotely controlled, for example to reserve a parking space for a disabled person. For example, the user provides the address he wants to go to and the date he is going to, and the computer system lets him select a number of parking spaces available that day, from which the user selects one.
In the case where the user drives a geographically locatable terminal when approaching his target, either by locating the cell where the handset is located, or by positioning technology signalled by reference to a satellite or Galileo system called GPS ("global positioning system"), or by a positioning system installed in the vehicle, the central server provides the user with a reduced list of available tools close to the user's location, as well as their physical addresses (with reference to the street building number and/or the location on a map to show the user their geographical location and the location of the various routes).
During a confirmation step 415, the user confirms his choice made during step 410 and may pay for the service, i.e., the price of parking in the selected slot, for example, or may authorize payment by surcharging a telephone bill in the case of a season pass or a periodic payment.
During step 420, the computer system opens a second communication session with the selected computer system to be remoted through the intermediary of a second remote communication channel. For example, the computer system dials a unique address (e.g., a telephone number if a telephone network is involved) of the computer system to be remotely controlled on the second telecommunications network 160.
When the second communication session is opened, during step 425, the computer system sends a command to the computer system to be remotely controlled so that it is available to the user immediately or on a selected date.
During step 430, the computer system records in its memory: the computer system to be remotely controlled is no longer available immediately or on a selected date.
The logic diagram shown in fig. 4 may run in real time, for example, when a user has found an available parking spot, and if it is not reserved by other users, then open the foldable parking rail 100 with his cell phone.
When the user leaves the parking space, the user opens a new communication session with the computer system and selects a scheduled end, which also corresponds to the end of the user's billing period (if any), during step 435. The computer system then opens a communication session with the remote control computer once the vehicle detector 105 indicates that there are no more vehicles at the parking spot and causes the foldable parking rail 100 to close.
During step 440, the computer system records in its memory that the computer system to be remotely controlled is again available.
If the computer system to be remotely controlled detects that it is stressed or malfunctioning during step 465, the computer system to be remotely controlled sends a warning signal to the centralized computer system at step 470. The centralized computer system notifies maintenance, monitoring, or police services of the event that occurred during step 475.
During step 480, the service intervenes, repairs or removes the computer system to be remotely controlled, and during step 485, the computer system to be remotely controlled sends a status signal to the centralized computer system indicating that it is available or operational, respectively.
The queries made by the third party described with reference to figures 2 and 3 are not repeated here for the sake of brevity, but may be supplemented by the steps described with reference to figure 4.
Fig. 5 shows the successive steps performed in the case where a user has previously reserved a resource managed by a remote control device or a computer system through the intermediary of a computer network, such as the internet.
During step 500, the calling terminal initiates opening of a first communication session through the intermediary of at least one telecommunication channel between the calling terminal and the centralized computer system.
Then, during step 505, the centralized computer system identifies the user of the call terminal. If the authorization check performed during step 505 is negative, then steps (not shown) equivalent to steps 445-460 are performed.
If the authorization check of step 505 is positive, then the user of the calling computer system selects the date and time to activate it for subscription during step 510.
During step 515, the computer system queries the computer systems to be remotely controlled that are available at the selected date and time. During step 520, the user of the call terminal selects an available computer system to be remotely controlled.
During step 525, the user confirms the selection of the computer system to be remotely controlled, for example by paying for his reservation.
During step 530, the computer system opens a second communication session between the computer system and the selected computer system to be remoted through the intermediary of a second remote communication channel.
During step 535, the computer system sends a command to the computer system selected to be remotely controlled and provides it with a user identifier, such as a cell phone number or SIM card number.
During step 540, depending on the time selected by the user, the computer system stores the unavailability of the computer system to be remotely controlled for a predetermined period of time, such as half a day.
During step 545, the computer system to be remotely controlled confirms the reservation with the computer system, and during step 550, the computer system confirms the reservation with the call terminal.
When the user approaches the remote control system, during step 555 the user opens a third communication session between the call terminal, which may be different from the call terminal that opened the first communication session, and the computer system to be remotely controlled. In response, during step 560, the computer system to be remotely controlled identifies the user and executes a command, such as opening a railing of the reserved parking space.
Upon execution of the command, the computer system implements a first billing of a counter (table) assigned to the user and accounting for the services provided during step 560, and in case of a pricing depending on the length of [ parking space ] occupied time, this billing continues up to step 570.
During step 565, the computer system to be remotely controlled detects the end of its use, e.g., the parking space is free of any vehicles.
During step 570, the computer system to be remoted opens a fourth communication session between the computer system to be remoted and the computer system.
As a variant, when he leaves the parking space, during step 575 the user opens a fifth communication session with the computer system or computer systems to be remotely controlled, and during step 580 the computer system to be remotely controlled executes a command in response to this fourth session.
It may be noted that this fifth communication session may be performed by the user using a different call terminal than the call terminal that opened the first communication session.
The queries made by the third party described with reference to figures 2 and 3 are not repeated here for the sake of brevity, but may be supplemented by the steps described with reference to figure 5.
As a variant of the execution mode, when a user who has not made a predetermined slot arrives in the vicinity of the slot, he opens a communication session with a remote control system which identifies the user by consulting (on the basis of a telephone number or SI card number) with a database maintained by a computer system or an internal database. If the identification is positive (the user is authorized to park in a parking space entered into and attended by the remote control system), the remote control system responds to the user indicating how long it is available. If the user receives the indicated availability (if he exceeds the scheduled day for the slot he is penalized), he confirms his instruction. In response, the remote control system executes the command (e.g., opens the parking rail) and opens a communication session with the computer system to notify it that it is unavailable. When the space is available again (by detecting no vehicle), the remote control system opens a new communication session with the computer system to indicate that it is available.
In each of the execution modes described above, several types of users can be managed by the method and the remote control device that are the subject of the invention. For example, emergency services may be authorized to use each remote control at any time; if another disabled person [ parking ] space is available nearby, the doctor may be authorized to use it for no more than 30 minutes; and the disabled may be authorized to use it for up to two hours.
The present invention applies to all cases where an authorized user can access a resource after a command is executed by one of a plurality of computer systems to be remotely controlled. For example, the invention is applied to help various forms of mobile devices, elevators reserved for disabled persons in public places or other predetermined public facilities. More generally, the invention applies to providing access to public transportation facilities (by opening doors), houses, information centers, company fleets (remote control systems are vehicles that have been commanded by someone to open their doors).

Claims (11)

1. A remote control process, comprising: -a step of opening a first communication session between the call terminal and the centralized computer system through an intermediary of the telecommunication network; -a step of transferring, through an intermediary of the telecommunication network, the user identifier of the calling terminal and the identifier of the computer system to be remotely controlled to the centralized computer system; -a step of checking said identifier by a centralized computer system; if the check is positive: -a step of transferring an authorization from the centralized computer system to the computer system to be remotely controlled; and-a step of executing the authorized instructions by the computer system to be remotely controlled.
2. The process according to claim 1, characterized in that it comprises: a step of communicating between the computer system to be remotely controlled and the calling terminal, during which the computer system to be remotely controlled transmits its identifier to the calling terminal, as a preliminary step to the step of transmitting the identifier from the computer system to be remotely controlled through the intermediary of a telecommunication network.
3. Process according to any one of claims 1 or 2, characterized in that it comprises: the step of communicating in the case of an unauthorized use of the computer system to be remotely controlled, during which the computer system to be remotely controlled transmits some representative information of the unauthorized use.
4. A process according to any one of claims 1 to 3, characterized in that it comprises: a step of checking, by the centralized computer system, the availability of the computer system to be remotely controlled.
5. The process according to any of claims 1 to 4, characterized in that it comprises: a step of confirming the instruction to the centralized computer system and/or to the calling terminal by the computer system to be remotely controlled.
6. The process according to any of claims 1 to 5, characterized in that it comprises: the method comprises the steps of selecting the time of activating the instruction by the computer system to be remotely controlled, and realizing the instruction by the computer system to be remotely controlled at the limited time.
7. The process according to any of claims 1 to 6, characterized in that it comprises: detecting the end of use by the remote control computer.
8. The process of claim 7, characterized in that it comprises: a step of opening a communication session between the computer system to be remotely controlled and the centralized computer system once the computer system to be remotely controlled is available.
9. Process according to any one of claims 1 to 8, characterized in that it comprises: a second communication step between the calling terminal, which may be different from the calling terminal that opened the first communication session, and the computer system to be remotely controlled, wherein the computer system to be remotely controlled implements the instructions in response to the second session.
10. Process according to any one of claims 1 to 9, characterized in that it comprises: a step of inquiry by a third party (250, 255, 365, 370, 385) and a step of providing status data related to one or several computer systems (260, 265, 375, 380, 390, 395) to be remotely controlled.
11. A remote control device, characterized in that it comprises: -means for opening a first communication session between the call terminal and the centralized computer system through an intermediary of the telecommunications network; -means for transmitting the user identifier of the call terminal and the identifier of the computer system to be remotely controlled to the centralized computer system through an intermediary of the telecommunication network; -means for verifying said identifier by means of a centralized computer system; if the check is positive-the centralized computer system is able to communicate the authorization to the computer system to be remotely controlled; and-the computer system to be remotely controlled is able to execute each instruction authorized by the computer system to be remotely controlled.
HK06113877.5A 2003-06-13 2004-06-11 Remote control method and device controlled from communicating terminals HK1093112A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0307147 2003-06-13

Publications (1)

Publication Number Publication Date
HK1093112A true HK1093112A (en) 2007-02-23

Family

ID=

Similar Documents

Publication Publication Date Title
US10600127B1 (en) Assistance on the go
US10531253B1 (en) Roadside assistance
US9639843B1 (en) Assistance on the go
CN110853158B (en) Management method for solving problem of occupying charging parking space and charging parking lot non-inductive charging system
US10410148B1 (en) Roadside assistance
JP2003050914A (en) Insurance contract system, insurance contract control method, and portable terminal device therefor
WO2003091856A2 (en) System for vehicle assignment and pickup
CN104867194A (en) Intelligent parking space management and charging system and method
CN110047295B (en) Park vehicle scheduling system and method
CN1372729A (en) Hybrid method and system of the improved bidirectional GPS and cellular/PCS
CN110136474A (en) A kind of parking stall management method based on the identification of Parking Stall two dimensional code
CN1823353A (en) Remote control method and device controlled from communication terminal
JP2021534339A (en) Parking elevator control based on vehicle number
JP2017199214A (en) Parking space lending system, server device, server device control program, and server device control method
WO2016126421A1 (en) Assistance on the go
US20040203927A1 (en) Cellular telephone location service
JP2020202724A (en) Information processing system, vehicle, management device, management method, and program
CN108505471A (en) A kind of intelligent space lock and apply its parking stall shared system
WO2005008603A1 (en) A vehicle remote diagnostic system and method
CN107730744A (en) Fixed vehicle parking position leased method and device
HK1093112A (en) Remote control method and device controlled from communicating terminals
KR20030094823A (en) Manless parking control system using mobile communications network and method thereof
CN109903583A (en) A kind of parking stall sharing method and system
JP2018163536A (en) Parking room management server, entering/exiting management terminal and computer program
JP2012168810A (en) Car sharing management system