HK1116326B - Method and system for using a mobile terminal as a location-based reminder - Google Patents
Method and system for using a mobile terminal as a location-based reminder Download PDFInfo
- Publication number
- HK1116326B HK1116326B HK08104613.1A HK08104613A HK1116326B HK 1116326 B HK1116326 B HK 1116326B HK 08104613 A HK08104613 A HK 08104613A HK 1116326 B HK1116326 B HK 1116326B
- Authority
- HK
- Hong Kong
- Prior art keywords
- mobile terminal
- reminder
- essid
- keyword
- user
- Prior art date
Links
Description
Technical Field
The present invention relates to wireless communications, and more particularly, to a method and system for using a mobile terminal for addressing reminders.
Background
Mobile communications have transformed the way people communicate, and cellular phones have been transformed from luxury items to an essential part of people's daily lives. The use of cell phones today is already dependent on the social environment and is not limited by location and technology. While voice connectivity has achieved the basic need for communications, mobile voice connectivity continues to penetrate the aspects of everyday life, and the use of the mobile internet has become the next step in the mobile communications revolution. The mobile internet will become a common resource for people to acquire information on a daily basis, and mobile access to such data will become easy and diversified. Third generation (3G) cellular networks are specifically designed to meet these future mobile internet needs. With the increasing popularity and use of these services, factors such as cost-effective optimization of network capacity and quality of service (QoS) will become more important to cellular network operators than today.
Other limitations and disadvantages of conventional and traditional approaches will become apparent through comparison with the system of the present invention.
Disclosure of Invention
A system and/or method for addressing reminders in a mobile terminal, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
According to an aspect of the invention, a method of providing addressing services in a mobile device is proposed, the method comprising:
receiving a wireless signal containing network identification information at a mobile terminal;
comparing a keyword corresponding to at least one record stored within the mobile terminal with at least a portion of the network identification information;
generating a notification in the mobile terminal if the keyword matches at least a portion of the network identification information.
Preferably, at least a portion of the at least one record is entered into the mobile terminal by a user.
Preferably, the method further comprises: generating at least a portion of the at least one record from the inbound message.
Preferably, the at least one record comprises a reminder field and a keyword field, the keyword field comprising at least one keyword.
Preferably, the reminder field comprises at least one of: audio messages, video messages, and text messages.
Preferably, if the reminder field includes at least one of the video message and the text message, the method further includes: and displaying the content of the reminding field.
Preferably, if the reminder field includes the audio message, the method further includes: and playing the content of the reminding field.
Preferably, the method further comprises: after a certain period of time, the notification is repeatedly generated.
Preferably, the network identification information includes a wireless network identification string.
Preferably, the radio network identification string includes an ESSID (Extended Service Set ID) according to IEEE802.1 x.
Preferably, the method further comprises: the ESSID is authenticated using one of SSL protocol and 802.1x/EAP-TTLS protocol.
Preferably, the ESSID that fails the verification is put in an untrusted list on the mobile terminal.
According to another aspect of the present invention, there is provided a system for providing addressing services in a mobile terminal, the system comprising:
a wireless interface in the mobile terminal for receiving wireless signals including network identification information;
a comparison circuit that compares a keyword corresponding to at least one record stored within the mobile terminal with at least a portion of the network identification information;
a notification circuit that generates a notification in the mobile terminal when the keyword matches at least a portion of the network identification information.
Preferably, at least a portion of the at least one record is entered into the mobile terminal by a user.
Preferably, at least a portion of the at least one record is generated from an inbound message.
Preferably, the at least one record comprises a reminder field and a keyword field, the keyword field comprising at least one keyword.
Preferably, the reminder field comprises at least one of: audio messages, video messages, and text messages.
Preferably, if the reminder field includes at least one of the video message and the text message, the mobile terminal displays the content of the reminder field.
Preferably, if the reminding field comprises the audio message, the mobile terminal plays the content of the reminding field.
Preferably, the notification circuit repeatedly generates the notification after a certain period of time has elapsed.
Preferably, the network identification information includes a wireless network identification string.
Preferably, the wireless network identification string includes an ESSID according to IEEE802.1 x.
Preferably, the mobile terminal authenticates the ESSID using one of SSL protocol and 802.1x/EAP-TTLS protocol.
Preferably, the ESSID that fails authentication is placed in an untrusted list on the mobile terminal.
Other advantages, objects, and novel features of the invention, as well as details of an illustrated embodiment thereof, will be more fully apparent from the following description and drawings.
Drawings
FIG. 1 is a schematic diagram of a cellular system using GPS for position location in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of a WiFi system in accordance with an embodiment of the present invention;
FIG. 3 is a block diagram of a mobile terminal for detecting ESSID associated with a WiFi LAN (local area network) in accordance with an embodiment of the present invention;
FIG. 4 is a flow chart of a method for using a mobile terminal for addressing reminders in accordance with an embodiment of the present invention;
FIG. 5 is a flowchart of method steps for determining whether to notify a user of an addressed reminder in accordance with an example of the present invention;
FIG. 6 is a flowchart illustrating steps for authentication using SSL according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating steps for authentication using the 802.1x/EAP-TTLS protocol in accordance with an embodiment of the present invention;
FIG. 8 is a flow diagram of a portion of the operations performed by the user interface in accordance with an embodiment of the present invention.
Detailed Description
The invention will be further explained with reference to the following figures and examples:
various embodiments of the present invention relate to a method and system for using a mobile terminal for addressing reminders. The method includes the mobile terminal receiving a wireless signal containing network identification information, such as a radio network identification string, such as an ESSID (extended service set identifier) of a WiFi access point under IEEE802.1 x. If the received wireless network identification string contains a Uniform Resource Locator (URL), it is verified. The authentication includes accessing the wireless network using an SSL connection. The authentication further includes using 802.1x/EAP-TTLS protocol if the radio network identifier is an ESSID. ESSIDs that fail authentication will be placed in the revocation list. The mobile terminal can compare a keyword corresponding to a record stored in the mobile terminal with the wireless network identification string. And if the keyword is matched with the wireless network identification string, generating a notice for reminding a user of the mobile terminal.
The user may have entered and stored the record into the mobile terminal. The record includes a keyword field and a reminder field. The keyword field contains at least one keyword. The user may generate keywords in the keyword field and/or generate a memo (memo) in the reminder field. The keywords and/or memos may also be generated from inbound messages sent to the mobile terminal. The memo may include an audio message, a video message, and/or a text message. After being notified, the user may choose to view and/or listen to the memo within the reminder field, or the user may choose to delay for a period of time. If delayed, the mobile terminal may re-notify the user within a certain time period.
Fig. 1 is a schematic diagram of a cellular system using GPS for position location in accordance with the present invention. Shown in fig. 1 is a mobile terminal 110, a transmitter 112, a plurality of GPS satellites 120, 122, … …, 124, and a database center 130. Mobile terminal 112 includes a database 110a in which information may be used to translate GPS information into, for example, an address and/or a store name. The transmitter 112 may be, for example, a base station. Modern cellular telephones comply with the E911 standard regulated by the federal communications commission (FTC). Thus, if the E911 function is activated, the mobile terminal 110 may send its location information to the E911 center when 911 is called through the base station 124. The location information includes longitude and latitude, and possibly altitude. Thus, an address may be provided to emergency response personnel by the location information. The emergency response personnel may then travel to the location where the E911 call was made to provide assistance.
The GPS system consists of a plurality of satellites, such as GPS satellites 120, 122, … …, 124, which orbit the earth at 55 degrees of inclination at approximately 10900 miles of altitude for a 12 hour period of orbit. The satellites are distributed around the earth so that at least four satellites are visible from any point on the earth. Thus, the user's location information may be determined from longitude, latitude, and altitude.
The use of GPS satellites 120,122, … …, 124 to determine the longitude and latitude of a location may also be useful to the user of mobile terminal 110. For example, the location information may be used for navigation and/or to notify the user when the user is near a certain location. However, in general, the data of the database needs to be able to map the longitude and latitude in a more friendly way, for example in the form of an address or a location on a map. Mobile terminal 110 may store such data in database 110 a. The data in database 110a may also be downloaded, for example, from an internet service provider or a third party internet site providing the data. Alternatively, the mobile terminal may access an external database. The database may be provided by, for example, a database center 130, where the database center 130 belongs to a company or third party that provides cellular telephone service.
Although the mobile terminal 110 in fig. 1 is described in connection with a cellular system, the mobile terminal 110 may be used in other wireless systems as well. For example, the mobile terminal 110 may be a WiFi and/or DVB-H enabled mobile terminal.
Fig. 2 is a schematic diagram of a WiFi system in accordance with an embodiment of the present invention. Fig. 2 shows an 802.11 network local area network (WiFi LAN) access point 200, a laptop computer 210, a PDA212, and a cellular handset 214. The WiFi LAN access point 200 enables various terminals configured with WiFi access to wirelessly access a WiFi network. For example, the mobile terminal 110, which may be a laptop 210, a PDA212, or a cellular handset 214, includes a WiFi interface that can communicatively connect to a LAN through a WiFi LAN access point 200.
To access the WiFi network, a terminal, such as the handset 214, may scan for ESSIDs of the WiFi lan located within the coverage area. A WiFi LAN access point, such as WiFi LAN access point 200, will broadcast its ESSID as the identification name of the 802.11 network. The ESSID may be a string of characters that describes a location. For example, a business providing LAN access may add its business name to the ESSID so that customers can identify the LAN they provide. The customer may then select the ESSID in which they are interested to enable a mobile terminal, such as cell phone 214, to access the LAN associated with the selected ESSID. Thus, a mobile terminal, such as mobile terminal 110, may be WiFi-enabled, capable of detecting and/or accessing a WiFi network. The mobile terminal 110 can then perform the addressed reminder function. Addressing reminders will be described later in connection with fig. 3-8.
Fig. 3 is a block diagram of a mobile terminal for detecting ESSIDs associated with a WiFi LAN in accordance with an embodiment of the present invention. As shown in fig. 3, there is a mobile terminal 300 and a plurality of WiFi access points 310, 312, 314, each of which is associated with, for example, a store. Each WiFi access point 310, 312, 314 broadcasts its ESSID. The mobile terminal 300 includes a WiFi interface 300a and a memory 300 b. The WiFi interface 300a may comprise suitable logic, circuitry, and/or code that may enable communication with WiFi devices such as WiFi access points 310, 312, 314. The memory 300b stores a reminder program 300c that is executed by the processor 300d to prompt the user when the reminder key matches a portion of the ESSID. The mobile terminal 300 further includes a keypad 300e and a display 300 f. The mobile terminal 300 may be, for example, a WiFi-enabled cell phone or PDA such as a smart phone, or a WiFi-enabled laptop, the mobile terminal 300 receiving ESSID from LAN access points within its range.
The mobile terminal 300 may receive ESSIDs associated with various access points installed in the store. The ESSID may have a name and/or location information of the corresponding store as part of the ESSID. To reduce power consumption, the WiFi interface 300a on the mobile terminal 300 may periodically wake up from a power save mode to detect beacon signals (beacon signals) and ESSIDs of nearby WiFi access points.
In one embodiment of the invention, the user may have entered a reminder into the mobile terminal 300 to buy something at the store associated with the WiFi access point 310. The entered keyword to serve as a reminder memo may be, for example, the name of the store associated with the WiFi access point 310. The keyword may be input through, for example, the keyboard 300 e. The reminder memo may be text, audio, and/or video for reminding the user of a certain task that needs to be completed at, for example, a store. Video includes any visual display such as a chart, a digital image, and/or a multi-frame video file. The default mode is to display the reminder key if no reminder memo is set. The reminder memo may be displayed through the display screen 300 f.
Another embodiment of the present invention may also allow a user to store a message, such as a text message, an audio message, and/or a video message, sent by a calling party as reminder content. For example, the mobile terminal 300 may receive a text message from, for example, a spouse of the user, and then may store the text message as a reminder memo, and may set a keyword for the reminder memo.
Other embodiments of the present invention may also allow a user to allow a particular caller to leave the reminder content and associated keywords directly within the user's mobile terminal without any involvement of the user. For example, the mobile terminal 300 may allow another party, such as the user's spouse, to leave the reminder content directly on the mobile terminal 300. Thus, the mobile terminal 300 may receive a text message from the user's spouse and save it as a reminder memo. The spouse may also send a second text message that is the key to the reminder memo just sent. Another embodiment of the present invention may receive a message that contains both a memo and a keyword. For example, the keyword may be the first word or a word ending at a particular characteristic (e.g., period).
The mobile terminal 300 may also have a sound and/or vibration notification that informs the user to view the reminder memo or to listen to the reminder memo. Various other forms of notification may also be used with the present invention, such as displaying a video and/or flashing lights on the mobile terminal 300. The mobile terminal 300 may also provide the option of periodic notification, which may be repeated periodically if the user does not display or play the reminder tickler. This may facilitate the user being able to take full care of the task currently at hand, such as driving a car, until it is in a safe environment to retrieve the reminder memo. When the user reads or listens to the reminder memo, the reminder memo will be deleted, or postponed, or modified.
If deferred, the keywords associated with the reminder memo will be compared again after the user leaves and re-enters the broadcast range of the WiFi access point associated with the store of interest. Thus, repeated reminding can be avoided when the reminding keyword is matched with the WiFi LAN ESSID of the shop where the user is located. Alternatively, the delay may allow the notification to be made again after a certain period of time, which may be default or selectable by the user. Specific notification details may be designed and/or implemented accordingly.
If not deferred, an embodiment of the present invention may also notify the user for a period of time and then enter a sleep period. And if the ESSID matched with the reminding keyword is still received after the dormancy period, the notification is carried out again. The duration of the notification and the period of dormancy may be default time periods and/or may be adjustable by the user.
Before notifying the user, the mobile terminal 300 attempts to verify the matching information within the ESSID. However, a WiFi access point disposed within a store may only broadcast an ESSID as a location/identity identifier. Thus, the mobile terminal user cannot access the network associated with the store for authentication. However, if the store allows a third party to access its network to authenticate its ESSID through IEEE802.1x Extensible Authentication Protocol (EAP), the WiFi access point may broadcast a message with "EAP: /"ESSID at the beginning.
Alternatively, the WiFi access point may broadcast a message such as "https: /"ESSID at the beginning to indicate that the store allows third parties to access its network, verifying its ESSID using the web server's security certificate. For example, a store may arrange a web server, DHCP server, and DNS server firewall behind a WiFi access point. The mobile terminal 300 attempts to establish a Secure Sockets Layer (SSL) connection to the web server. If the SSL connection can be successfully established, and if the identity identified by the security certificate matches the location/identity within the URL, the location/identity information is considered trusted. Thus, upon successful authentication by both of the above-described methods or other methods, the mobile terminal 300 will notify the user. But if the authentication fails, the ESSID is stored in an untrusted list. The untrusted list may be, for example, part of memory 300 b.
The mobile terminal 300 configured with the WiFi interface 300a may execute an alert program 300c, which may be stored in, for example, the memory 300 b. While the reminder 300c is being executed, the user can browse, find, create, move, or modify the reminder record and/or the WiFi configuration record. A reminder record may be entered into the mobile terminal 300 whenever the user has a work item associated with the location. The reminder record includes reminder keywords and reminder memos. There may be an option to indicate that the detected ESSID has been verified. The matters related to authentication will be given in connection with fig. 5-7.
The user may also store some WiFi configuration records to help detect if the user is in some particular place, such as a home or office using a WiFi LAN. For example, the WiFi configuration record may include a location key, such as "office," and the WiFi network configuration for that location. The mobile terminal 300 may attempt to access these LANs using the stored configuration. If the access is successful, the mobile terminal 300 may, for example, synchronize with a computer and transmit data.
In one example scenario, the mobile terminal 300 has a reminder for the store associated with the access point 310. The ESSID associated with access point 312 and access point 314 may be received as the mobile terminal moves. For each new ESSID received, the mobile terminal 300 may check to determine if any alert keyword in the stored alert record matches any portion of that ESSID. In this case, the alert key will not have any match with the ESSIDs of access points 312 and 314. As the user carrying mobile terminal 300 moves, e.g., to the left, the mobile terminal may be within range of access points 310, 312, and 314 and thus be able to receive ESSIDs associated with these access points. Thus, the mobile terminal 300 determines whether the alert key matches any portion of the ESSID of the access point 310. If there is a match, the mobile terminal 310 will display and/or play the reminder to the user. The user may read, view and/or hear the alert message. The user may then delete the message and perform the task that needs to be performed.
Although the embodiment of the present invention using an IEEE802.1x (wifi) -compliant mobile terminal is described above in connection with fig. 3, the present invention is not limited thereto. Various embodiments of the present invention may use other wireless standards such as bluetooth, HomeRF, HiperLAN, and OpenAir.
Fig. 4 is a flow chart of a method for using a mobile terminal for addressing reminders in accordance with an embodiment of the present invention. Steps 400 to 416 are shown in fig. 4. Step 400 is an idle state. For example, the reminder 300c is in an idle state when there is no reminder record or configuration record. In the idle state, power to the WiFi interface 300a may be reduced or cut off. In step 402, when the user inputs data as a reminder record, a reminder memo is stored in the memory 300 b. The next step may be step 406. In step 404, the reminder key is stored in the memory 300 b. In step 406, the WiFi interface 300a is powered up to an active state. An alert 300c is executed via the WiFi interface 300a to determine if an access point is transmitting an ESSID. If an ESSID is not detected, the next step will be step 416. Otherwise, the next step is step 407. In step 407, the reminder determines whether the detected ESSID is on the revocation list or the untrusted list. The revocation list is stored, for example, in the memory 300b, and includes ESSIDs that have failed authentication. If the ESSID is present in the revocation list, the next step is to perform step 416. Otherwise, the next step executes step 408.
In step 408, the reminder 300c performs a number of steps to determine if any reminder keywords are found in the detected ESSID. If so, the next step would be step 410. Otherwise, the next step would be step 416. In step 410, the reminder 300c determines whether to notify the user of the mobile terminal. For example, if a reminder key is found in the ESSID, the user will be notified. Alternatively, even if a reminder key is found in the ESSID, the user will not be notified if the reminder key fails to be authenticated. Verification will be described in connection with fig. 5-7.
In step 412, if the user is notified, the reminder record associated with the notification is deleted by the user. If the user deletes the reminder record, the next step will be step 414. Otherwise, if the user is not notified, or if the user defers the notification, the next step 416 is performed. In step 414, the reminder 300c performs a number of steps to determine if there are any additional keywords. If so, the next step 416 is performed. If not, the execution returns to step 400, and the idle state is entered. In step 416, the reminder 300c performs a number of steps to put the WiFi interface 300a into a sleep state. This may reduce power consumption within the mobile terminal 300. After a period of time has elapsed (which may be default or selected by the user), the reminder 300c executes to step 406. For example, during the sleep period of step 416, the reminder 300c is placed in a background mode, or the environment is switched to another application. After a sleep period, for example, a hardware interrupt will cause the reminder 300c to return to the foreground mode, or the environment switches to the reminder 300 c.
The steps described in connection with fig. 4 are merely exemplary steps of one embodiment of the present invention. Various other embodiments of the invention may use different process flows.
FIG. 5 is a flowchart illustrating method steps for determining whether to notify a user of an addressed reminder in accordance with the present invention. Shown in fig. 5 is step 410, which further includes steps 450 through 456. The previous step to step 450 may be step 408, in which the reminder 300c determines whether the ESSID is a URL type ESSID. For example, the URL type ESSID includes a string "http: /"," https: /", or" eap: /"as part of its ESSID. If so, the next step is to perform step 452. If not, the next step is to execute step 456. In step 452, the reminder 300c determines whether to verify the URL type ESSID. If so, the next step is to execute step 454, and if not, the next step is to execute step 456.
In step 454, the reminder 300c connects to the server associated with the ESSID via the WiFi interface 300 a. The reminder 300c can attempt to verify the ESSID. If the ESSID is verified, the next step is to execute step 456. If not, the next step is to execute step 412 in FIG. 4. In step 456, the reminder program 300c directs the mobile terminal 300 to generate a notification or reminder. For example, the mobile terminal may generate a notification or alert by playing a sound, flashing an indicator light and/or LED, and/or vibrating the mobile terminal. The next step is to perform step 412 in fig. 4.
Fig. 6 is a flow chart of method steps for authentication using SSL in accordance with an embodiment of the present invention. As shown in fig. 6, steps 600 to 616 are included for verifying the ESSID using SSL. In step 600, the WiFi interface 300a within the mobile terminal 300 receives an IP address from an access point using DHCP. When using the SSL protocol, link layer authentication/encryption will be turned off. In step 602, the mobile terminal 300 sends a DNS request to the access point associated with the ESSID to resolve the IP address of the web server specified in the URL. In step 604, the mobile terminal 300 may attempt to establish an SSL connection with the web server using the IP address in step 602. If the SSL connection to the web server is successfully established, step 606, the next step is to execute step 608. If the setup is not successful, the next step is to execute step 610.
In step 608, the mobile terminal 300 attempts to verify that the identity within the ESSID is the same as the identity certified in the security certificate. If so, the verification is successful, and the next step is to execute step 456 in FIG. 5. If not, the next step is to execute step 610. in step 610, the authentication may fail because the connection to the web server is not possible, or the authentication of the ESSID fails while the connection to the web server is established. Therefore, the mobile terminal 300 will ignore the ESSID and place the ESSID for the access point in a revocation list or an untrusted list. The failure list is the ESSID list of failed access points. For example, the access point is invalid when a connection cannot be established therewith, or the ESSID cannot be authenticated despite the connection being established. Any entry into the invalid list may be removed from the list by the user, or after a certain period of time has elapsed. The length of time that the ESSID remains in the revocation list may be a default time, or a time set by the user. The next step is to perform step 412 in fig. 4.
FIG. 7 is a flow chart of method steps for authentication using the 802.1x/EAP-TTLS protocol in accordance with an embodiment of the invention. Steps 700 to 708 are included as shown in fig. 7 for authenticating the ESSID using the 802.1x/EAP-TTLS protocol. The previous step of step 700 is step 450 in which the WiFi interface 300a of the mobile terminal 300 attempts to establish a TLS connection to the authentication server via the access point using the 802.1x/EAP-TTLS protocol, thereby initiating link layer authentication. If the TLS connection is established in step 702, the next step is to execute step 704. If not, the next step is to execute step 708.
In step 704, the mobile terminal 300 will terminate the client-to-server authenticated reminder. In step 706, the mobile terminal 300 checks whether the ESSID contains the identity indicated in the security certificate. If the verification is successful, the next step is to execute step 456 in FIG. 5. If the TLS is not established or the ESSID does not include the specified identity, the authentication fails, and step 708 is executed.
In step 708, the authentication failure may occur because a connection to the web server cannot be established, or the authentication of the ESSID fails although the connection is established. Thus, the mobile terminal 300 will ignore this ESSID and place the ESSID corresponding to the access point in, for example, a revocation list or an untrusted list. The failure list does not include the ESSID list of failed access points. For example, the access point is invalid when a connection cannot be established therewith, or the ESSID cannot be authenticated despite the connection being established. Any entry into the invalid list may be removed from the list by the user, or after a certain period of time has elapsed. The length of time that the ESSID remains in the revocation list may be a default time, or a time set by the user. The next step is to perform step 412 in fig. 4.
FIG. 8 is a flow chart of steps of a portion of a user interface in accordance with an embodiment of the present invention. Steps 800 to 810 are included as shown in fig. 8, namely a notification or reminder period. In step 800, a notification or reminder is generated. For example, the mobile terminal 300 may play sound, display video or text, may also generate vibrations, and/or lights and/or LEDs may illuminate or flash. If the user is informed of the notification or reminder in step 802, the user can confirm the notification or reminder by, for example, activating a key on the keyboard 300e or activating a soft key displayed on the display 300f, and then proceed to step 804. Alternatively, the user may defer the notification for a period of time. In this case, step 806 will be performed next.
In step 804, if the reminding memo includes an audio portion, the mobile terminal 300 plays the audio portion. If the reminder memo includes a video portion, the mobile terminal 300 displays the video portion. Step 412 is next performed.
In step 806, if the user has postponed the reminder, then step 412 is performed next. Otherwise, the next step is step 808. If the notification period expires, step 808, for example if the notification has occurred for a predetermined period of time without being acknowledged or deferred, the next step is to proceed to step 810. Otherwise, step 412 is performed next.
In step 810, no notification occurs after a predetermined period of time, and therefore no notification occurs during this period. After the predetermined period of time has elapsed, the next step is step 812. In step 812, if the mobile terminal 300 continues to receive the ESSID matching the keyword, the process returns to step 800 to generate a notification. Otherwise, no ESSID matches the key and step 412 is executed.
Although several embodiments of the present invention are described above in connection with a particular algorithm, the present invention is not so limited. Other embodiments of the invention may use other algorithms for addressing reminders and user interfaces. The algorithms used may be associative in design and/or implementation.
While various embodiments and/or aspects of the functionality of the present invention are described in connection with the reminder 300c, the invention is not so limited. The functions of the present invention may be implemented by hardware, software, or a combination of both.
According to an embodiment of the present invention, the system of the present invention includes a wireless interface, such as the WiFi interface 300a, in the mobile terminal for receiving a wireless signal containing wireless network identification information, such as a wireless network identification string, for example, the ESSID of a WiFi access point according to IEEE802.1 x. And if the received ESSID contains the URL, performing verification. Authentication involves accessing the wireless network using an SSL connection, or using the 802.1x/EAP-TTLS protocol. ESSIDs that fail authentication will be placed, for example, in a revocation list.
A matching circuit, such as the processor 300d and/or code, may compare the keyword stored within the mobile terminal with the received string of wireless network identification words. The notification circuitry, such as the processor 300d and/or code, may generate a notification in the mobile terminal after the wireless network identification string finds the keyword. After generating the notification, if the user selects to play and/or view the reminder, the mobile terminal may display a video or text reminder field and/or play audio reminder content. If the user delays listening to and/or viewing the reminder message because the user is driving, the notification is generated again after a period of time has elapsed.
The mobile terminal user may enter all or a portion of a record that includes a keyword field and a reminder field. The keyword field includes at least one keyword that can be input by a user. The reminder field includes video, audio, and/or textual reminder content, which may be input by the user. Alternatively, the contents of the keyword field and/or the reminder field may be generated from the inbound message.
Another embodiment of the present invention provides a machine-readable storage, having stored thereon, a computer program having at least one code section for execution by a machine to cause the machine to perform the above-described method for using a mobile terminal as an addressed alert.
The present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The method is implemented in a computer system using a processor and a memory unit.
The present invention can also be implemented by a computer program product, which comprises all the features enabling the implementation of the methods of the invention and which, when loaded in a computer system, is able to carry out these methods. The computer program in this document refers to: any expression, in any programming language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to other languages, codes or symbols; b) reproduced in a different format.
While the invention has been described with reference to several embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
Claims (10)
1. A method for providing addressing services in a mobile device, the method comprising:
receiving a wireless signal containing network identification information at a mobile terminal;
comparing a keyword corresponding to at least one record stored within the mobile terminal with at least a portion of the network identification information; the network identification information comprises ESSID according to IEEE802.1x, and the ESSID is verified by using one of SSL protocol and 802.1x/EAP-TTLS protocol and is put into an untrusted list on the mobile terminal;
generating a notification in the mobile terminal if the keyword matches at least a portion of the network identification information, wherein the notification further comprises allowing a particular caller to leave reminder content and associated keywords directly within the mobile terminal.
2. The method of claim 1, wherein at least a portion of the at least one record is entered into the mobile terminal by a user.
3. The method of claim 1, further comprising: generating at least a portion of the at least one record from the inbound message.
4. The method of claim 1, wherein the at least one record comprises a reminder field and a keyword field, and wherein the keyword field comprises at least one keyword.
5. The method of claim 4, wherein the reminder field comprises at least one of: audio messages, video messages, and text messages.
6. The method of claim 5, wherein if the reminder field comprises at least one of the video message and the text message, the method further comprises: and displaying the content of the reminding field.
7. A system for providing addressing services in a mobile terminal, the system comprising:
a wireless interface in the mobile terminal for receiving wireless signals containing network identification information;
a comparison circuit that compares a keyword corresponding to at least one record stored within the mobile terminal with at least a portion of the network identification information; the network identification information comprises ESSID according to IEEE802.1x, and the ESSID is verified by using one of SSL protocol and 802.1x/EAP-TTLS protocol and is put into an untrusted list on the mobile terminal;
notification circuitry that generates a notification in the mobile terminal when the keyword matches at least a portion of the network identification information, including allowing a particular caller to leave reminder content and associated keywords directly within the mobile terminal.
8. The system according to claim 7, wherein at least a portion of the at least one record is entered into the mobile terminal by a user.
9. The system of claim 7, wherein at least a portion of the at least one record is generated from an inbound message.
10. The system of claim 7, wherein the at least one record comprises a reminder field and a keyword field, the keyword field comprising at least one keyword.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/437,381 US8126438B2 (en) | 2006-05-19 | 2006-05-19 | Method and system for using a mobile terminal as a location-based reminder |
| US11/437,381 | 2006-05-19 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1116326A1 HK1116326A1 (en) | 2008-12-19 |
| HK1116326B true HK1116326B (en) | 2011-11-18 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8126438B2 (en) | Method and system for using a mobile terminal as a location-based reminder | |
| US8737619B2 (en) | Method of triggering location based events in a user equipment | |
| US10477374B2 (en) | Utilization of SMS and/or cellular broadcast to receive multimedia alerts | |
| CN110278550B (en) | Portable device, portable apparatus, and computer-readable medium | |
| RU2301506C2 (en) | Method and system for selecting data elements for service requests | |
| US9065927B2 (en) | Method and system for providing context based multimedia intercom services | |
| US20030117316A1 (en) | Systems and methods for locating and tracking a wireless device | |
| US8804680B2 (en) | System and method for managing wireless connections and radio resources | |
| CN107071775B (en) | Mobile terminal and method and device for redirecting access to base station | |
| US20130252636A1 (en) | Hot Spot Detection | |
| US8171172B2 (en) | Method, system and apparatus for selective application access and synchronization | |
| CN112040057B (en) | Device control method, device, electronic device, control system and storage medium | |
| US8805421B2 (en) | Method and system for sending ring setting reminders to mobile devices within a predetermined area | |
| US9369857B2 (en) | Emergency alert system channel assignment | |
| WO2019201651A1 (en) | Peer to peer communication system | |
| HK1116326B (en) | Method and system for using a mobile terminal as a location-based reminder | |
| EP2654328B1 (en) | Remote Request during On-Going Call | |
| KR20040051416A (en) | System and Method for Providing Police Inquiry Service by Using Wireless Internet | |
| HK40014814A (en) | Portable device, portable apparatus and computer readable medium | |
| JP2007019922A (en) | Information server, information terminal, setting notification system, setting notifying method, and program |