[go: up one dir, main page]

WO2014198320A1 - Remote control of settings in wireless devices - Google Patents

Remote control of settings in wireless devices Download PDF

Info

Publication number
WO2014198320A1
WO2014198320A1 PCT/EP2013/062267 EP2013062267W WO2014198320A1 WO 2014198320 A1 WO2014198320 A1 WO 2014198320A1 EP 2013062267 W EP2013062267 W EP 2013062267W WO 2014198320 A1 WO2014198320 A1 WO 2014198320A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless device
server
rules
settings
objects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2013/062267
Other languages
French (fr)
Inventor
Jesper LINDSTÉN
Christian Bondesson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GOBY GROUP HB
Original Assignee
GOBY GROUP HB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GOBY GROUP HB filed Critical GOBY GROUP HB
Priority to PCT/EP2013/062267 priority Critical patent/WO2014198320A1/en
Publication of WO2014198320A1 publication Critical patent/WO2014198320A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/4872Non-interactive information services
    • H04M3/4878Advertisement messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability

Definitions

  • the disclosure relates to remotely controlling the settings in wireless devices using a server. According to a particular embodiment, it relates to controlling wireless devices to use a particular sound sequence as a notification signal, e.g. when the user of the wireless devices receives e.g. a phone call.
  • the disclosure further relates to a method in a wireless device of enabling a server to control the settings of the wireless device, as well as to a wireless device, a computer program and to a server.
  • Another known channel is web-based communication or marketing.
  • web-based marketing it is only possible to reach a user through the screen of a computer or a smart phone.
  • This disclosure relates to controlling the settings of wireless devices using a server. According to a particular aspect the disclosure it relates to a method of remotely configuring notification signals in a wireless device and controlling that the notification signals are used during a predefined time.
  • the invention evolved gradually after carefully studying how e.g. advertisers communicate commercial messages to their existing and potential customers.
  • the invention provides a new and trendy way to reach the audience, by combining the convenience of the internet with an old and well-proven way to market businesses, e.g. where the user has an active and central role in the process to spread a message to their surroundings.
  • a method in a server of controlling the settings of wireless devices, comprising, providing a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period, receiving authorisation information from the wireless device, verifying, based on the authorisation information, that the wireless device is trusted and receiving from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects during the predefined time period.
  • the server trusts the application, it is then possible to control and trace the settings of a wireless device.
  • the effect is that the operator of the server may distribute e.g. media signals and control the use of the media signals in wireless devices in an efficient manner and thereby reach many users.
  • the method further comprises receiving an objects initialisation from the wireless device, which informs the server that the wireless device starts to execute one of the provided objects.
  • the wireless device comprises a software application
  • the step of verifying that the wireless device is trusted comprises verifying that the software application is trusted.
  • the method further comprises registrating the wireless device in the server.
  • the method further comprises sending a media file corresponding to one of the provided objects to the wireless device; wherein the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
  • the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
  • the server may not only reach the devices to which it is connected, but it may also reach users being in some kind of contact with the devices to which it is connected. Hence, the server reaches a captive audience, which may not control e.g. turn off, the wireless device playing or displaying the media file.
  • the captive audience is e.g. people around a user playing a commercial jingle as a notification signal.
  • a computer program comprising computer readable code which, when run on a server, causes the server to perform the method as described above.
  • server being configured to perform the method.
  • the method comprises retrieving from a server, a list of objects; each object comprising a set of rules defining settings of the wireless device during a predefined time period, initialising, the execution of one selected object, which is selected from the retrieved list of objects, sending authorisation information to the server, configuring properties of wireless device according to rules of the selected object, monitoring that the properties of wireless device are configured according to rules of the selected object during a predefined time; and only if the rules of the selected object have been fulfilled, sending a confirmation to the server that that the rules of the object have been fulfilled.
  • the wireless device comprises a software application and the step of sending authorisation information to the server comprises using authentication information comprised in the software application.
  • the method further comprises, downloading the software application in the wireless device and the software application is configured to enable a server to control of the use of an audio signal within the wireless device.
  • the method further comprises, sending a registration request to the server.
  • the method further comprises, requesting an object list from the server.
  • the method further comprises, receiving a media file and the step of configuring properties of wireless device comprises configuring the use of the media file.
  • the method further comprises, receiving a credit from the server.
  • the step of initialising the execution of one of the retrieved objects in the wireless device comprises detection of a user object.
  • the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
  • the media file is an audio signal
  • the rules comprise that the media file shall be used as a notification signal.
  • a computer program comprising computer readable code which, when run on a wireless device, causes the wireless device to perform the method as claimed above
  • it relates to wireless device, being configured to execute the method.
  • Figure 1 illustrates a system for implementing the method for controlling settings according to the invention.
  • Figure 2 is a flow chart illustrating a method performed by a server according to an exemplary embodiment of the present disclosure.
  • Figure 3 is a flow chart illustrating a method performed by a wireless device according to an exemplary embodiment of the present disclosure.
  • Figure 4 illustrates the sequence of messages exchanged between a wireless device and a server when performing the method for controlling settings.
  • Figure 5 illustrates a server according to an exemplary embodiment of the present disclosure.
  • Figure 6 illustrates a wireless device according to an exemplary embodiment of the present disclosure.
  • the invention is based on the idea of letting a server remotely control the settings of wireless devices during a predefined time and to verify that the settings stay in a certain way, by monitoring and confirming the settings using a trusted relation between the server and the wireless devices.
  • the object of one aspect of the invention is to configure a setting e.g. a ringtone in the wireless device and monitor that this setting (ringtone) is not changed by the user or another application during the agreed upon time.
  • a setting e.g. a ringtone
  • the rules may typically comprise that the device's sound settings are set to a certain level as a part of the agreement, i.e. reasonably loud volume and not in quiet (vibrate only) mode, and monitor these setting as well.
  • DRM digital rights management
  • DRM digital rights management
  • the invention may be seen as a complement to DRM, because it provides for a method of controlling and monitoring the settings of wireless devices after sale.
  • the invention may be used in combination with DRM, wherein the controlled settings may comprise DRM protected content.
  • Embodiments of the present disclosure relate, in general, to the field of controlling the settings of wireless devices for commercial purposes. However, it must be understood that the same principle is applicable in other contexts where it is desired to remotely control the settings of wireless devices.
  • Figure 1 illustrates a system where the invention may be executed.
  • Figure 1 discloses a server 10 and a number of wireless devices 20 communicating with the server over a wireless communication network (not shown), such as a cellular telecommunication network.
  • the server is typically connected to the internet and accessible via e.g. http requests.
  • the wireless devices are e.g. mobile phones carried by different users.
  • wireless device In this application the term wireless device is generally used.
  • a wireless device, or user equipment, UE which is the term used in the 3GPP specifications, referred to in this application could be any wireless device capable of communicating with a wireless network. Examples of such devices are of course mobile phones, Smartphones, laptops, tablets etc.
  • a notification signal is a signal used to inform the recipient about the occurrence of a notification such as incoming call, incoming SMS or email.
  • the wireless device may use different notification signals for different events.
  • the wireless device may also use several different notification signals for the same event.
  • the audio signal notifying the user about an incoming voice call is generally referred to as ring signal.
  • a user may configure different ring signals for different callers.
  • the method performed in a server, of controlling the settings of wireless devices starts by a registration SI of a wireless device in the server. This is typically performed when a new user has downloaded a software application for enabling remote control of the settings of the wireless devices in his or her wireless device.
  • the registration typically involved entering customer details such as name and address and a password.
  • the registration may also involve authorisation. This implies proving that the wireless device is authorised or trusted to monitor and confirm the actions of the wireless device.
  • the authorisation is typically an authentication.
  • Authentication may involve the server sending a code to the wireless device in a challenge to enter an encrypted response.
  • the response includes an encrypted code, which is generated using an encryption key or shared secret, included in the software application.
  • the server knows that the software application is trusted e.g. it is the software application provided by the owner of the server.
  • the server provides S2 a list of objects to a wireless device. This may be done of request from the wireless device.
  • the provision may also be server initiated.
  • the list may only comprise one object.
  • the objects are offers e.g. to set a specific media file as ringtone for a predefined period of time in exchange for a discount or credit.
  • the rules state that a specific audio file shall be played a certain number of times, as described in the last section.
  • the objects may as well be any other rules.
  • an operator may wish to control the settings of wireless devices.
  • the use may be to restrict the use of WiFi or to change the wallpaper setting.
  • an organisation may want to check that employees have sound turned on (or off) the notification signal or signals on their devices.
  • Each object in the list comprises a set of rules, defining the settings of the wireless device during a predefined time period.
  • Settings here refer to the configuration of the wireless device.
  • Settings refer to internal parameters within the wireless device that controls the behaviour of the wireless device in different situations.
  • Settings are system parameters that may be changed by application software. Some settings may be changed via a user interface. Examples of settings are notification signal, media volume, notification signal volume, network settings, back ground etc.
  • the rules define how one or several settings are to be configured during the time period.
  • the time period may be fixed or it may be different for each offer. The time period is e.g. one week.
  • the server receives S3 an objects initialisation from the wireless device, which informs the server that the wireless device starts to execute one of the provided objects.
  • the server sets a counter. The counter may be used when evaluating the time period in step S7.
  • the server receives S4 authorisation information from the wireless device.
  • the invention typically implies that there is some kind of authorisation between the wireless device and the server.
  • the server wants to verify that the software application is the one delivered by the manufacturer of the server, so that the confirmation message, described below in step S7 is trusted. Without a trusted part in the wireless device, the control will not be complete. Hence, some kind of authorisation is required.
  • the authorisation may be done only at registration, as described above.
  • the authentication may also be done when the server receives the object initialisation, i.e. when the server knows that an object is being executed.
  • authorisation may be done when the server receives the confirmation, as will be described below. A combination of these is also possible.
  • the server verifies S5, based on the authorisation information, that the wireless device is trusted.
  • the wireless device comprises a software application
  • the step of verifying S5 that the wireless device is trusted comprises verifying that the software application is trusted.
  • the server and a software application are delivered by the same company. Because there is a trusted relation between those, the server can trust the information from the wireless device.
  • the server sends S6 a media file corresponding to one of the provided objects to the wireless device.
  • the rules relate to configuring the settings of the wireless device using a media file.
  • the object may then comprise a link to a media file.
  • the wireless device initiates such an object, it will also request the media file form the server or from another server.
  • the set of rules then comprise that a media file shall be used in the wireless device according to a predefined rule.
  • the media file is an audio signal.
  • the rule may say that the audio file shall be configured as a ring or notification signal.
  • the settings may define the use of a particular file as a notification signal and that the notification signal volume is above a predefined level.
  • rules may also define the use of a particular image as a back ground image or that the Wifi capability is switched off.
  • the wireless device is then receiving, S7, from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects.
  • the wireless device confirms that the rules have been fulfilled during the predefined time period.
  • the server can control the settings of the wireless device. If the server has got a server initialisation it may compare the present time with a time stamp of the initialisation, in order to confirm that the time has really elapsed.
  • the rules may comprise that a certain action shall be performed for a certain amount of time. Then, the confirmation may be sent directly when this condition is fulfilled, even if the time period has not expired.
  • the method further comprises sending S8 a credit to the wireless device in response to the confirmation. This implies that that the server considers the rules fulfilled.
  • the credit is e.g. a discount code that is valid for goods or services provided by the advertiser.
  • the invention further relates to a computer program, comprising computer readable code which, when run on a server, causes the server to perform the method as described above.
  • step 4 the method performed in a wireless device of enabling a server to control the settings within the wireless device.
  • the method is typically using a software application in the wireless device.
  • the software application is configured to enable a server to control of the use of an audio signal within the wireless device.
  • step Sll in the wireless device.
  • the application may also be downloaded form a different source e.g. from FTP server and installed manually. After download and installation, which is both provided by application store, the application has to be started by the user.
  • the software may also be downloaded in the device at manufacturing or entered in the wireless device in any other way.
  • the user sends S12 a registration request to the server, after downloading the application.
  • Registration implies exchange of user data as described in relation to the method in the server above. In principle the method could be implemented without user registration. However, collecting user data is often desired.
  • the application then requests, S13, an object list from the server. This is typically performed automatically each time the user starts the application.
  • the wireless retrieves S20 from a server, a list of objects.
  • Each object comprises a set of rules defining settings of the wireless device during a predefined time period, as described in relation to the server above.
  • the objects are typically presented to the user e.g. on the screen. In principle it would be possible to skip this step and have one or several fixed options in the wireless device.
  • the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule. Examples of media files are audio files or images.
  • the media file is an audio signal, and the set of rules comprise that the media file shall be used as a notification signal.
  • the wireless device initialises S30, the execution of one selected object, which is selected from the retrieved list of objects.
  • the step of initialising, S30, the execution of one of the retrieved objects in the wireless device comprises detection of a user object.
  • the object is e.g. selected by the user pointing to an icon on the screen.
  • the object may also be selected by another application in the wireless device or by any other means.
  • the method also involves sending, S40, authorisation information to the server.
  • authorisation information may be exchanged anytime during the method, as explained above.
  • the server may verify that the wireless device is trusted.
  • the wireless device comprises a software application and the step of sending, S40, authorisation information to the server comprises using authentication information comprised in the software application.
  • the step of configuring, S50, properties of wireless device comprises configuring the use of the media file within the wireless device.
  • the rules specify that an audio file shall be used as a ring or notification signal or that an image shall be used as a background.
  • the method further comprises receiving, S41, a media file.
  • the media file may be received from the server 10 controlling the settings in the wireless device or from another server.
  • the address to the other server may be provided by the server 10 controlling the settings.
  • the address provided may be an IP address.
  • the method further comprises configuring, S50, properties of wireless device according to rules of the selected object. This may e.g. be done by settings in a platform of the wireless device. Settings may typically be set by application programming interfaces. For example in android the ring signal is defined by a uniform resource identifier, URI.
  • the wireless device then monitors S60, S61 that the properties of wireless device are configured according to rules of the selected object during a predefined time. This is typically done by reading the configured setting or settings to verify that it has not been changed with a certain frequency until the predefined time has elapsed.
  • One way to monitor that the predefined time has elapsed is to start a process when an option is initialised, S30. The process may continuously monitor one or several settings of the wireless device.
  • the process typically has a counter that counts time.
  • the counter may be interrupted when the process is stopped. If the process is stopped, the process stores the elapsed time. This implies that it is difficult to manipulate, or at least prolong the elapsed time, because erasing the elapsed time will restart the counter.
  • the software application monitors the settings and counts the time simultaneously.
  • the user may stop the application, even uninstall it, but it doesn't matter since the time cannot be incremented if the monitoring process is not running and the verification will not be sent to the server unless the monitoring process are allowed to run the full predefined time. Also since the time increment is based on elapsed time since boot, the user cannot affect the time counting by changing the device's time setting.
  • Some settings are broadcasted by the system, e.g. "muting" in android.
  • the process does not need to monitor the settings, but the wireless device may instead listen to such a broadcast message.
  • the process counts the time, when the settings are set in accordance with the rules of the selected option. If the wireless device detects that the settings change it may either interrupt the method and then the user needs to restart the method. The time count will stop and the user needs to restart the method at which time the time count will resume.
  • the mobile-application includes means to detect when the user changes the settings to divert from the set of rules. For example the user changes the volume of the ring (or notification) signals or inserts the smart phone to silent, vibration or plug in headset / headphones. Then, if the mobile application detects a change of volume that violates the set of rules, it pauses the current process of monitoring i.e. the measurement of time, of the smart phone's setting of the ring (or notification) signals. The monitoring will be resumed when the settings changes as to fulfil the rules.
  • the set of rules For example the user changes the volume of the ring (or notification) signals or inserts the smart phone to silent, vibration or plug in headset / headphones. Then, if the mobile application detects a change of volume that violates the set of rules, it pauses the current process of monitoring i.e. the measurement of time, of the smart phone's setting of the ring (or notification) signals. The monitoring will be resumed when the settings changes as to fulfil the rules.
  • the wireless device sends, S70, a confirmation to the server that that the rules of an object have been fulfilled.
  • the wireless device may of course as an alternative send a message stating that the rules have not been fulfilled.
  • it further comprises receiving, S80, a credit from the server, as explained above.
  • This example is mainly directed to controlling the ring signal in mobile phones 20 from a remote server 10.
  • the aspects described in this example may be implemented in other contexts as well.
  • the steps performed in the server are shown at the left in the figure, and the steps in the wireless device are shown at the left.
  • the user sends and receives messages created, via the mobile application via a communication network to the server unit by utilizing the wireless device.
  • the method is typically started when the user of the wireless device 20 downloads a software application, which is e.g. provided on a public server, and installs it on the wireless device, step Sll.
  • the application When the application is started for the first time the user registers S12 him/her-self as a user and the information is uploaded SI to the server e.g. through a HTTP request.
  • a list of offers here referred to as objects, are downloaded to the wireless device S20.
  • the downloading of the list of offers is typically done on request S13 of the wireless device, for example each time the software application is started.
  • the server 10 When the server 10 gets the request for the list, the server provides S2 the list of objects or offers to the wireless device.
  • Each offer or object comprises a set of rules defining settings of the wireless device during a predefined time. The settings are e.g. the use of a particular sound sequence as a ringtone for a predefined time.
  • the user now has the opportunity to choose or by any other user interaction or other interaction select S100 one of the offers or objects. If so, the application initializes execution of the object.
  • the wireless device contacts the server 20 to inform the server that the wireless device has accepted a particular offer and starts executing the object.
  • the server 10 receives the initialization S3 and registers that the user has initiated the offer and sends S4 an authorization request, e.g. comprising an authorization key to the wireless device.
  • the wireless device sends S40 authorization information to the server and the server verifies S5 the authorization information.
  • the application then initiates S41 the downloading S6 of an associated audio file from the server 10 to the wireless device 20 and appropriate settings S50 are configured according to rules of the offer or object.
  • the audio file is set as the default ringtone and volume settings are set so that the ringtone can be heard when the device rings.
  • the wireless device then monitors S60 that the rules are fulfilled during a predetermined time S70.
  • the application again contacts the server. If the server can verify S7 that according to its system time at least the minimum time has passed since the offer initialization S30 a confirmation is sent to the server 10.
  • a code is passed S8 on to the device as a voucher for the offer. When the user presents this code, a discount may be accepted at the place of business where it originated.
  • the application may be downloaded and installed by the user. It may therefore be available on one or more popular online application markets such as App Store and/or Android Market. As an alternative it may be downloaded in the wireless device at manufacturing.
  • the application is trusted by the server, e.g. by the use of a shared secret.
  • the software application should provide a user interface for the user to start an offer.
  • the application should be able to download audio files from a dedicated server. The download can be initiated by the application and managed through the HTTP or FTP protocol. These audio files should preferably be in a format that is readable by the device and will be used as ringtones on the device once they are downloaded.
  • the application should provide information about the different offers. In order to make this dynamically and be able to continuously provide new offerings, this information should be fetched by the application from the server.
  • the ringtone associated with that offer is downloaded and saved on the device.
  • the application sets the system default ringtone to that file. It then sets the desired ring volume and makes sure that the phone is in normal i.e. not quite mode.
  • the application starts monitoring theses settings until the end of the offer time. If the settings are changed during this time, the application can either pause or terminate the offer. If the application provides a pause objects there should be functionality for restarting the offer by the user.
  • a token is provided by the phone to be displayed by the user at the place of business where the offer originated.
  • the original ringtone is reset and the downloaded file is deleted.
  • ring and notification signals e.g. advertising jingles / commercial recordings in smart phones and monitoring of agreements between a user of a smart phone and an advertising company on setting the ring and notification signal for a fixed period.
  • the present disclosure provides for a targeted and general marketing opportunity for companies to effectively communicate with the public in order to e.g. market their products or services.
  • the solution is based on opening up a previously wholly unused channel for reaching specific audiences, by letting a server control the settings like notification signal or screen saver of a number of wireless devices.
  • a server control the settings like notification signal or screen saver of a number of wireless devices.
  • the server may include means for the user smart phones transmit a list of the advertising companies also including their unique offering.
  • the wireless device may include means for using the smart phone's location features and determine the phone's geographical position.
  • the server may then include means for using the information on the smart phone's geographical position filter out relevant promotions.
  • the server unit is adapted to, at request of the software application, transmit ring and notification signals (advertising jingles / commercial recordings) to the user's smart phone for over an agreed period being stored there and played when the user receives a phone call or take receive SMS or MMS messages.
  • the server and mobile application further comprises means for inputting additional data such as user name, user ID, user and customer size preferences customer billing preferences, selection algorithm to the home database.
  • the server may be implemented by common gateway interface scripts e.g. php and a database running on a web server.
  • the server comprises a controller (CTL) or a processor 102 that may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc., capable of executing computer program code.
  • the computer program may be stored in a memory 104.
  • the memory 104 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM.
  • the memory 104 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory.
  • the server 100 further comprises a communication interface (i/f) 101 arranged for communication with the wireless devices.
  • the communication interface 101 is typically a standard Ethernet interface for connection of the server to the internet.
  • the server or the computer program typically comprises a provider 1041 configured to provide a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period, a receiver 1042 configured to receive authorisation information from the wireless device, a verifier 1043 configured to verify, based on the authorisation information, that the wireless device is trusted and a receiver 1044 configured to receive from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects during the predefined time period.
  • a provider 1041 configured to provide a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period
  • a receiver 1042 configured to receive authorisation information from the wireless device
  • a verifier 1043 configured to verify, based on the authorisation information, that the wireless device is trusted
  • a receiver 1044 configured to receive from the wireless device a confirmation
  • the server also comprises a web interface for administration of rules lists, e.g. by advertisers who adds offers with associated ringtones and discounts.
  • FIG 6 a schematic diagram illustrating some modules of an exemplary embodiment of the wireless device 20 will be described.
  • a wireless device referred to in this application could be any user equipment capable of communicating with a mobile communication network. Examples of such devices are of course mobile phones, smartphones, laptops and Machine to Machine, M2M, devices etc.
  • the wireless device 20 comprises a controller or a processor 21 that may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc., capable of executing computer program code.
  • the computer program may be stored in a memory (MEM) 23.
  • the memory 23 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM.
  • the memory 23 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory.
  • the wireless device 20 further comprises a network communication unit or a communication interface (i/f) 22 arranged for wireless communication with other devices or nodes.
  • the wireless device can communicate with the server 10 over the communication interface typically using a base station or other access point to connect to the internet.
  • the method comprises, that the wireless device retrieves, using a retriever, from a server, a list of objects; each object comprising a set of rules defining settings of the wireless device during a predefined time period, initialises, using an initialiser, the execution of one selected object, which is selected from the retrieved list of objects, sends, using the communication interface 22, authorisation information to the server, configures, using a configurer, properties of wireless device according to rules of the selected object, monitors, using a monitor, that the properties of wireless device are configured according to rules of the selected object during a predefined time; and only if the rules of the selected object have been fulfilled, sends, using the communication interface 22, a confirmation to the server that that the rules of the object have been fulfilled.
  • the wireless device is further configured to execute all aspects of the method in a wireless device as described above.
  • the wireless device or smart phone may further comprise means for displaying a list on a display device, means for enabling the user to select varying discounts making enterprises, and means for the application to the server unit transmit information on the chosen company.
  • the user may still pause the option or offer as described above.
  • the step of configuring the settings implies performing an action e.g. streaming a certain jingle at certain intervals.
  • the function would only be activated while the user is in motion.
  • the device's accelerometer could be used to indicate movement and turn the functionallity on and off.
  • the device's positioning system may be used to check if the device is in one of those areas, and if so change the randomizing algorithms to make sure that the device is more likely to start streaming.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure relates to remotely controlling the settings in wireless devices using a server. According to one aspect of the disclosure, it provides for a method in a server, of controlling the settings of wireless devices, comprising, providing a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period, receiving authorisation information from the wireless device, verifying, based on the authorisation information, that the wireless device is trusted and receiving from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects during the predefined time period. The disclosure further relates to a method in a wireless device of enabling a server to control the settings of the wireless device, as well as to a wireless device, a computer program and to a server.

Description

Remote control of settings in wireless devices TECHNICAL FIELD
The disclosure relates to remotely controlling the settings in wireless devices using a server. According to a particular embodiment, it relates to controlling wireless devices to use a particular sound sequence as a notification signal, e.g. when the user of the wireless devices receives e.g. a phone call. The disclosure further relates to a method in a wireless device of enabling a server to control the settings of the wireless device, as well as to a wireless device, a computer program and to a server.
BACKGROUND
Today, communication and advertising and in particular electronic advertising are important parts of many companies marketing plans. The goal is often to reach as many users as possible, as frequently as possible, to a low cost. Often it is desirable to expose media such as an image or a sound associated with a particular brand as frequently as possible.
A common way of reaching many people is using public such as radio or TV. However, sending commercials in public media is generally expensive. Furthermore, it is not always possible to reach all targets. For example it may be desired to reach customers in a certain area or a certain social context.
Another known channel is web-based communication or marketing. However, with existing web-based marketing it is only possible to reach a user through the screen of a computer or a smart phone.
Hence, marketing today is often targeting one person or user. Hence communication goes from one communicating unit to a target user, which requires that the user is more or less active, by e.g. reading a newspaper, surfing the internet or turning on the television. In these situations the user may often ignore the message by simply turning of the source.
Hence, there is a growing need for new and less expensive ways of communicating with users. SUMMARY OF THE INVENTION
This disclosure relates to controlling the settings of wireless devices using a server. According to a particular aspect the disclosure it relates to a method of remotely configuring notification signals in a wireless device and controlling that the notification signals are used during a predefined time.
The invention evolved gradually after carefully studying how e.g. advertisers communicate commercial messages to their existing and potential customers. The invention provides a new and trendy way to reach the audience, by combining the convenience of the internet with an old and well-proven way to market businesses, e.g. where the user has an active and central role in the process to spread a message to their surroundings.
According to one aspect of the disclosure, it provides for a method in a server, of controlling the settings of wireless devices, comprising, providing a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period, receiving authorisation information from the wireless device, verifying, based on the authorisation information, that the wireless device is trusted and receiving from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects during the predefined time period. Because the server trusts the application, it is then possible to control and trace the settings of a wireless device. The effect is that the operator of the server may distribute e.g. media signals and control the use of the media signals in wireless devices in an efficient manner and thereby reach many users.
One advantage of this aspect is that a software application may be added to a wireless device at any time after manufacturing. It may also be removed, when an option is completed. According to one aspect, the method further comprises receiving an objects initialisation from the wireless device, which informs the server that the wireless device starts to execute one of the provided objects.
According to one aspect, the wireless device comprises a software application, and the step of verifying that the wireless device is trusted, comprises verifying that the software application is trusted. Hence, by using a software application and a server having a trusted relation, the solution is easy to distribute to several wireless devices. The only action required is that the software application is downloaded in the wireless device.
According to one aspect, the method further comprises registrating the wireless device in the server.
According to one aspect, the method further comprises sending a media file corresponding to one of the provided objects to the wireless device; wherein the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule. This aspect provides the possibility to e.g. remotely configure the notification signal e.g. a commercial, of a mobile phone and monitor that the ring signal is used as agreed. Then, the person who is the target group in question makes the big job to convey the advertiser's specific offer on to people in the vicinity. By not doing anything! According to one aspect, the method further comprises sending a credit to the wireless device in response to the confirmation. According to one aspect, the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule. This way of controlling the use of a media file in a remote device creates an opportunity to communicate a message or media file in a clustered manner. The server may not only reach the devices to which it is connected, but it may also reach users being in some kind of contact with the devices to which it is connected. Hence, the server reaches a captive audience, which may not control e.g. turn off, the wireless device playing or displaying the media file. The captive audience is e.g. people around a user playing a commercial jingle as a notification signal.
According to another aspect of the invention it relates to a computer program, comprising computer readable code which, when run on a server, causes the server to perform the method as described above.
According to another aspect of the invention it relates to server being configured to perform the method.
According to another aspect of the invention it relates to a method in a wireless device of enabling a server to control the settings of the wireless device. The method comprises retrieving from a server, a list of objects; each object comprising a set of rules defining settings of the wireless device during a predefined time period, initialising, the execution of one selected object, which is selected from the retrieved list of objects, sending authorisation information to the server, configuring properties of wireless device according to rules of the selected object, monitoring that the properties of wireless device are configured according to rules of the selected object during a predefined time; and only if the rules of the selected object have been fulfilled, sending a confirmation to the server that that the rules of the object have been fulfilled.
According to one aspect, the wireless device comprises a software application and the step of sending authorisation information to the server comprises using authentication information comprised in the software application. According to one aspect, the method further comprises, downloading the software application in the wireless device and the software application is configured to enable a server to control of the use of an audio signal within the wireless device.
According to one aspect, the method further comprises, sending a registration request to the server.
According to one aspect, the method further comprises, requesting an object list from the server. According to one aspect, the method further comprises, receiving a media file and the step of configuring properties of wireless device comprises configuring the use of the media file. According to one aspect, the method further comprises, receiving a credit from the server.
According to one aspect, the step of initialising the execution of one of the retrieved objects in the wireless device comprises detection of a user object.
According to one aspect, the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
According to one aspect, the media file is an audio signal, and the rules comprise that the media file shall be used as a notification signal.
According to another aspect of the invention it relates to a computer program, comprising computer readable code which, when run on a wireless device, causes the wireless device to perform the method as claimed above
According to another aspect of the invention it relates to wireless device, being configured to execute the method.
With the above description in mind, the object of the present disclosure is to overcome at least some of the disadvantages of known technology as previously described. Other objects and advantages of the invention will become apparent to those skilled in the art who studies the attached technical description and the drawing figures where present.
This may in return be utilized for the user to access various unique discounts. BRIEF DESCRIPTION OF THE DRAWINGS
The present technique will be more readily understood through the study of the following detailed description of the embodiments/aspects together with the accompanying drawings, of which:
Figure 1 illustrates a system for implementing the method for controlling settings according to the invention.
Figure 2 is a flow chart illustrating a method performed by a server according to an exemplary embodiment of the present disclosure. Figure 3 is a flow chart illustrating a method performed by a wireless device according to an exemplary embodiment of the present disclosure.
Figure 4 illustrates the sequence of messages exchanged between a wireless device and a server when performing the method for controlling settings. Figure 5 illustrates a server according to an exemplary embodiment of the present disclosure.
Figure 6 illustrates a wireless device according to an exemplary embodiment of the present disclosure.
It should be added that the following description of the embodiments is for illustration purposes only and should not be interpreted as limiting the disclosure exclusively to these embodiments/aspects. DETAILED DESCRIPTION
The general object or idea of embodiments of the present disclosure is to address at least one or some of the disadvantages with the prior art solutions described above as well as below. The various steps described below in connection with the figures should be primarily understood in a logical sense, while each step may involve the communication of one or more specific messages depending on the implementation and protocols used.
The invention is based on the idea of letting a server remotely control the settings of wireless devices during a predefined time and to verify that the settings stay in a certain way, by monitoring and confirming the settings using a trusted relation between the server and the wireless devices.
The object of one aspect of the invention is to configure a setting e.g. a ringtone in the wireless device and monitor that this setting (ringtone) is not changed by the user or another application during the agreed upon time. When the setting is the use of a notification signal (ringtone) the rules may typically comprise that the device's sound settings are set to a certain level as a part of the agreement, i.e. reasonably loud volume and not in quiet (vibrate only) mode, and monitor these setting as well.
There are prior art solutions for locking settings of wireless devices for an unlimited amount of time. For example a mobile phone may be locked to a particular operator and network settings may be locked in accordance with operator wishes. However, the settings are then often fixed and may not be changed by the user himself. Furthermore, if the user manages to change the settings the operator will not be aware of it.
Another known technique is DRM, digital rights management. DRM is a class of technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals with the intent to control the use of digital content and devices after sale. The invention may be seen as a complement to DRM, because it provides for a method of controlling and monitoring the settings of wireless devices after sale. In principle the invention may be used in combination with DRM, wherein the controlled settings may comprise DRM protected content. Embodiments of the present disclosure relate, in general, to the field of controlling the settings of wireless devices for commercial purposes. However, it must be understood that the same principle is applicable in other contexts where it is desired to remotely control the settings of wireless devices.
Figure 1 illustrates a system where the invention may be executed. Figure 1 discloses a server 10 and a number of wireless devices 20 communicating with the server over a wireless communication network (not shown), such as a cellular telecommunication network. The server is typically connected to the internet and accessible via e.g. http requests. The wireless devices are e.g. mobile phones carried by different users.
In this application the term wireless device is generally used. A wireless device, or user equipment, UE, which is the term used in the 3GPP specifications, referred to in this application could be any wireless device capable of communicating with a wireless network. Examples of such devices are of course mobile phones, Smartphones, laptops, tablets etc.
A notification signal is a signal used to inform the recipient about the occurrence of a notification such as incoming call, incoming SMS or email. The wireless device may use different notification signals for different events. The wireless device may also use several different notification signals for the same event. The audio signal notifying the user about an incoming voice call is generally referred to as ring signal. A user may configure different ring signals for different callers.
In figure 2 the method performed in a server, of controlling the settings of wireless devices, is disclosed. According to one aspect of the invention, the method starts by a registration SI of a wireless device in the server. This is typically performed when a new user has downloaded a software application for enabling remote control of the settings of the wireless devices in his or her wireless device. The registration typically involved entering customer details such as name and address and a password.
The registration may also involve authorisation. This implies proving that the wireless device is authorised or trusted to monitor and confirm the actions of the wireless device. The authorisation is typically an authentication. Authentication may involve the server sending a code to the wireless device in a challenge to enter an encrypted response. The response includes an encrypted code, which is generated using an encryption key or shared secret, included in the software application. By verifying the encrypted response, the server knows that the software application is trusted e.g. it is the software application provided by the owner of the server. In the next step the server provides S2 a list of objects to a wireless device. This may be done of request from the wireless device. The provision may also be server initiated. The list may only comprise one object. According to one aspect of the invention the objects are offers e.g. to set a specific media file as ringtone for a predefined period of time in exchange for a discount or credit. According to another aspect the rules state that a specific audio file shall be played a certain number of times, as described in the last section.
However, it must be anticipated that the objects may as well be any other rules. As an example an operator may wish to control the settings of wireless devices. For example the use may be to restrict the use of WiFi or to change the wallpaper setting. According to another aspect, an organisation may want to check that employees have sound turned on (or off) the notification signal or signals on their devices.
Each object in the list comprises a set of rules, defining the settings of the wireless device during a predefined time period. Settings here refer to the configuration of the wireless device. Settings refer to internal parameters within the wireless device that controls the behaviour of the wireless device in different situations. Settings are system parameters that may be changed by application software. Some settings may be changed via a user interface. Examples of settings are notification signal, media volume, notification signal volume, network settings, back ground etc. The rules define how one or several settings are to be configured during the time period. The time period may be fixed or it may be different for each offer. The time period is e.g. one week. According to one aspect of the invention, the server then receives S3 an objects initialisation from the wireless device, which informs the server that the wireless device starts to execute one of the provided objects. When receiving the objects initialisation, the server sets a counter. The counter may be used when evaluating the time period in step S7.
The server receives S4 authorisation information from the wireless device. The invention typically implies that there is some kind of authorisation between the wireless device and the server. According to one aspect, the server wants to verify that the software application is the one delivered by the manufacturer of the server, so that the confirmation message, described below in step S7 is trusted. Without a trusted part in the wireless device, the control will not be complete. Hence, some kind of authorisation is required. The authorisation may be done only at registration, as described above. The authentication may also be done when the server receives the object initialisation, i.e. when the server knows that an object is being executed. As an alternative, authorisation may be done when the server receives the confirmation, as will be described below. A combination of these is also possible. Then, the server verifies S5, based on the authorisation information, that the wireless device is trusted. Hence, after authorisation the server can trust a confirmation from the wireless device that the set of rules have been executed, because it has been monitored by a trusted wireless device. According to one aspect, the wireless device comprises a software application, and the step of verifying S5 that the wireless device is trusted, comprises verifying that the software application is trusted. Typically the server and a software application are delivered by the same company. Because there is a trusted relation between those, the server can trust the information from the wireless device.
According to one aspect of the invention, the server sends S6 a media file corresponding to one of the provided objects to the wireless device. Typically the rules relate to configuring the settings of the wireless device using a media file. The object may then comprise a link to a media file. When the wireless device initiates such an object, it will also request the media file form the server or from another server.
The set of rules then comprise that a media file shall be used in the wireless device according to a predefined rule. For example the media file is an audio signal. The rule may say that the audio file shall be configured as a ring or notification signal. Hence, the settings may define the use of a particular file as a notification signal and that the notification signal volume is above a predefined level. Other examples of rules are that rules may also define the use of a particular image as a back ground image or that the Wifi capability is switched off.
The wireless device is then receiving, S7, from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects. According to one aspect, the wireless device confirms that the rules have been fulfilled during the predefined time period. Hence, by sending an object with a set of rules and getting a confirmation from a trusted application, the server can control the settings of the wireless device. If the server has got a server initialisation it may compare the present time with a time stamp of the initialisation, in order to confirm that the time has really elapsed.
According to one aspect the rules may comprise that a certain action shall be performed for a certain amount of time. Then, the confirmation may be sent directly when this condition is fulfilled, even if the time period has not expired. According to one aspect the method further comprises sending S8 a credit to the wireless device in response to the confirmation. This implies that that the server considers the rules fulfilled. The credit is e.g. a discount code that is valid for goods or services provided by the advertiser. According to one aspect the invention further relates to a computer program, comprising computer readable code which, when run on a server, causes the server to perform the method as described above.
In figure 4 the method performed in a wireless device of enabling a server to control the settings within the wireless device is disclosed. The method is typically using a software application in the wireless device. The software application is configured to enable a server to control of the use of an audio signal within the wireless device. As described above, before the method is executed in the wireless device the software application is typically downloaded, step Sll, in the wireless device. Typically this step implies that the user opens the application store and selects the application. The application may also be downloaded form a different source e.g. from FTP server and installed manually. After download and installation, which is both provided by application store, the application has to be started by the user.
However, the software may also be downloaded in the device at manufacturing or entered in the wireless device in any other way. According to one aspect of the invention, the user sends S12 a registration request to the server, after downloading the application. Registration implies exchange of user data as described in relation to the method in the server above. In principle the method could be implemented without user registration. However, collecting user data is often desired.
According to one aspect of the invention, the application then requests, S13, an object list from the server. This is typically performed automatically each time the user starts the application.
In the next step the wireless retrieves S20 from a server, a list of objects. Each object comprises a set of rules defining settings of the wireless device during a predefined time period, as described in relation to the server above. The objects are typically presented to the user e.g. on the screen. In principle it would be possible to skip this step and have one or several fixed options in the wireless device. According to one aspect, the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule. Examples of media files are audio files or images. According to one aspect, the media file is an audio signal, and the set of rules comprise that the media file shall be used as a notification signal.
The wireless device initialises S30, the execution of one selected object, which is selected from the retrieved list of objects. According to one aspect the step of initialising, S30, the execution of one of the retrieved objects in the wireless device comprises detection of a user object. The object is e.g. selected by the user pointing to an icon on the screen. The object may also be selected by another application in the wireless device or by any other means.
The method also involves sending, S40, authorisation information to the server. In principle authorisation information may be exchanged anytime during the method, as explained above. The important thing is that the server may verify that the wireless device is trusted. According to one aspect, the wireless device comprises a software application and the step of sending, S40, authorisation information to the server comprises using authentication information comprised in the software application.
According to one aspect, the step of configuring, S50, properties of wireless device comprises configuring the use of the media file within the wireless device. For example the rules specify that an audio file shall be used as a ring or notification signal or that an image shall be used as a background.
According to one aspect, the method further comprises receiving, S41, a media file. The media file may be received from the server 10 controlling the settings in the wireless device or from another server. Then, the address to the other server may be provided by the server 10 controlling the settings. The address provided may be an IP address.
The method further comprises configuring, S50, properties of wireless device according to rules of the selected object. This may e.g. be done by settings in a platform of the wireless device. Settings may typically be set by application programming interfaces. For example in android the ring signal is defined by a uniform resource identifier, URI. The wireless device then monitors S60, S61 that the properties of wireless device are configured according to rules of the selected object during a predefined time. This is typically done by reading the configured setting or settings to verify that it has not been changed with a certain frequency until the predefined time has elapsed. One way to monitor that the predefined time has elapsed is to start a process when an option is initialised, S30. The process may continuously monitor one or several settings of the wireless device. The process typically has a counter that counts time. The counter may be interrupted when the process is stopped. If the process is stopped, the process stores the elapsed time. This implies that it is difficult to manipulate, or at least prolong the elapsed time, because erasing the elapsed time will restart the counter.
The software application monitors the settings and counts the time simultaneously. The user may stop the application, even uninstall it, but it doesn't matter since the time cannot be incremented if the monitoring process is not running and the verification will not be sent to the server unless the monitoring process are allowed to run the full predefined time. Also since the time increment is based on elapsed time since boot, the user cannot affect the time counting by changing the device's time setting.
Some settings are broadcasted by the system, e.g. "muting" in android. In this case the process does not need to monitor the settings, but the wireless device may instead listen to such a broadcast message. In any case, the process counts the time, when the settings are set in accordance with the rules of the selected option. If the wireless device detects that the settings change it may either interrupt the method and then the user needs to restart the method. The time count will stop and the user needs to restart the method at which time the time count will resume.
The time is typically measured using a system clock e.g. elapsed time in android. According to one aspect of the invention, the mobile-application includes means to detect when the user changes the settings to divert from the set of rules. For example the user changes the volume of the ring (or notification) signals or inserts the smart phone to silent, vibration or plug in headset / headphones. Then, if the mobile application detects a change of volume that violates the set of rules, it pauses the current process of monitoring i.e. the measurement of time, of the smart phone's setting of the ring (or notification) signals. The monitoring will be resumed when the settings changes as to fulfil the rules.
Finally, only if the rules of the selected object have been fulfilled, the wireless device sends, S70, a confirmation to the server that that the rules of an object have been fulfilled. The wireless device may of course as an alternative send a message stating that the rules have not been fulfilled. According to one aspect of the invention, it further comprises receiving, S80, a credit from the server, as explained above.
In order to fully introduce the invention and its advantages, an example of controlling settings of a wireless device will now be described referring to the system of figure 1 and the flow chart of figure 4.
This example is mainly directed to controlling the ring signal in mobile phones 20 from a remote server 10. However, the aspects described in this example, may be implemented in other contexts as well.
The steps performed in the server are shown at the left in the figure, and the steps in the wireless device are shown at the left. While executing the methods, the user sends and receives messages created, via the mobile application via a communication network to the server unit by utilizing the wireless device. The method is typically started when the user of the wireless device 20 downloads a software application, which is e.g. provided on a public server, and installs it on the wireless device, step Sll. When the application is started for the first time the user registers S12 him/her-self as a user and the information is uploaded SI to the server e.g. through a HTTP request.
Then a list of offers, here referred to as objects, are downloaded to the wireless device S20. The downloading of the list of offers is typically done on request S13 of the wireless device, for example each time the software application is started.
When the server 10 gets the request for the list, the server provides S2 the list of objects or offers to the wireless device. Each offer or object comprises a set of rules defining settings of the wireless device during a predefined time. The settings are e.g. the use of a particular sound sequence as a ringtone for a predefined time. The user now has the opportunity to choose or by any other user interaction or other interaction select S100 one of the offers or objects. If so, the application initializes execution of the object. According to one aspect the wireless device contacts the server 20 to inform the server that the wireless device has accepted a particular offer and starts executing the object. The server 10 then receives the initialization S3 and registers that the user has initiated the offer and sends S4 an authorization request, e.g. comprising an authorization key to the wireless device. The wireless device sends S40 authorization information to the server and the server verifies S5 the authorization information.
Then the application then initiates S41 the downloading S6 of an associated audio file from the server 10 to the wireless device 20 and appropriate settings S50 are configured according to rules of the offer or object. In this example the audio file is set as the default ringtone and volume settings are set so that the ringtone can be heard when the device rings. Hence, this aspect of the invention makes it possible for the server to control the use of a particular audio file as a ring signal.
The wireless device then monitors S60 that the rules are fulfilled during a predetermined time S70. When the agreed upon time is up (usually after one week), the application again contacts the server. If the server can verify S7 that according to its system time at least the minimum time has passed since the offer initialization S30 a confirmation is sent to the server 10. According to one aspect a code is passed S8 on to the device as a voucher for the offer. When the user presents this code, a discount may be accepted at the place of business where it originated.
As stated above, in order to implement the solution one typically needs an application that can run on wireless devices such as modern smart phones. The application may be downloaded and installed by the user. It may therefore be available on one or more popular online application markets such as App Store and/or Android Market. As an alternative it may be downloaded in the wireless device at manufacturing. The application is trusted by the server, e.g. by the use of a shared secret. The software application should provide a user interface for the user to start an offer. In order to dynamically provide new offers, the application should be able to download audio files from a dedicated server. The download can be initiated by the application and managed through the HTTP or FTP protocol. These audio files should preferably be in a format that is readable by the device and will be used as ringtones on the device once they are downloaded.
The application should provide information about the different offers. In order to make this dynamically and be able to continuously provide new offerings, this information should be fetched by the application from the server. When an offer is commenced by the user, the ringtone associated with that offer is downloaded and saved on the device. The application then sets the system default ringtone to that file. It then sets the desired ring volume and makes sure that the phone is in normal i.e. not quite mode. After this, the application starts monitoring theses settings until the end of the offer time. If the settings are changed during this time, the application can either pause or terminate the offer. If the application provides a pause objects there should be functionality for restarting the offer by the user. When the time is up and if the user had kept the promise of not altering the settings, a token is provided by the phone to be displayed by the user at the place of business where the offer originated. The original ringtone is reset and the downloaded file is deleted.
Hence, according to one aspect of the invention, it relates to a method for positioning ring and notification signals e.g. advertising jingles / commercial recordings in smart phones and monitoring of agreements between a user of a smart phone and an advertising company on setting the ring and notification signal for a fixed period.
The present disclosure provides for a targeted and general marketing opportunity for companies to effectively communicate with the public in order to e.g. market their products or services. The solution is based on opening up a previously wholly unused channel for reaching specific audiences, by letting a server control the settings like notification signal or screen saver of a number of wireless devices. Thereby, e.g. commercials may easily be distributed to the users of the wireless devices and even to people in the vicinity of the devices.
According to one aspect, the server may include means for the user smart phones transmit a list of the advertising companies also including their unique offering.
According to one aspect, the wireless device may include means for using the smart phone's location features and determine the phone's geographical position. The server may then include means for using the information on the smart phone's geographical position filter out relevant promotions. According to one aspect of the invention, the server unit is adapted to, at request of the software application, transmit ring and notification signals (advertising jingles / commercial recordings) to the user's smart phone for over an agreed period being stored there and played when the user receives a phone call or take receive SMS or MMS messages. According to one aspect of the invention, the server and mobile application further comprises means for inputting additional data such as user name, user ID, user and customer size preferences customer billing preferences, selection algorithm to the home database.
Turning now to figure 5, a schematic diagram illustrating some modules of an exemplary embodiment of a server will be described. The server may be implemented by common gateway interface scripts e.g. php and a database running on a web server.
The server comprises a controller (CTL) or a processor 102 that may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc., capable of executing computer program code. The computer program may be stored in a memory 104. The memory 104 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM. The memory 104 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory. The server 100 further comprises a communication interface (i/f) 101 arranged for communication with the wireless devices. The communication interface 101 is typically a standard Ethernet interface for connection of the server to the internet. When the above-mentioned computer program code is run in the controller 102 of the server 100, it causes the radio server 100 to execute the method of controlling the settings of wireless devices, as described above.
The server or the computer program typically comprises a provider 1041 configured to provide a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period, a receiver 1042 configured to receive authorisation information from the wireless device, a verifier 1043 configured to verify, based on the authorisation information, that the wireless device is trusted and a receiver 1044 configured to receive from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects during the predefined time period.
According to one aspect of the invention the server also comprises a web interface for administration of rules lists, e.g. by advertisers who adds offers with associated ringtones and discounts. Turning now to figure 6 a schematic diagram illustrating some modules of an exemplary embodiment of the wireless device 20 will be described. A wireless device referred to in this application could be any user equipment capable of communicating with a mobile communication network. Examples of such devices are of course mobile phones, smartphones, laptops and Machine to Machine, M2M, devices etc.
The wireless device 20 comprises a controller or a processor 21 that may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc., capable of executing computer program code. The computer program may be stored in a memory (MEM) 23. The memory 23 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM. The memory 23 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory. The wireless device 20 further comprises a network communication unit or a communication interface (i/f) 22 arranged for wireless communication with other devices or nodes. The wireless device can communicate with the server 10 over the communication interface typically using a base station or other access point to connect to the internet.
When the above-mentioned computer program code is run in the processor 21 of the wireless device 20 it is causes the wireless device 20 to execute the method in a wireless device of enabling a server to control of the settings within the wireless device described above.
The method comprises, that the wireless device retrieves, using a retriever, from a server, a list of objects; each object comprising a set of rules defining settings of the wireless device during a predefined time period, initialises, using an initialiser, the execution of one selected object, which is selected from the retrieved list of objects, sends, using the communication interface 22, authorisation information to the server, configures, using a configurer, properties of wireless device according to rules of the selected object, monitors, using a monitor, that the properties of wireless device are configured according to rules of the selected object during a predefined time; and only if the rules of the selected object have been fulfilled, sends, using the communication interface 22, a confirmation to the server that that the rules of the object have been fulfilled.
The wireless device is further configured to execute all aspects of the method in a wireless device as described above. The wireless device or smart phone may further comprise means for displaying a list on a display device, means for enabling the user to select varying discounts making enterprises, and means for the application to the server unit transmit information on the chosen company. Android Specific Description
There are special considerations regarding applications for smart phones running on the Android operating system. To implement the above described application for Android, one should make sure that after download the ringtone is saved in a partition of the file system where it is available for both the application and the operating system's media system. The file must also be included in the system's media content provider. This also restricts the location of the file system where the file can be stored. One solution is to save the file in the media directory on the device's exterior memory. After this is done, an URI that identifies the specific audio file can be extracted from the system. This URI is later used to identify what media file to use as the phone's ringtone. Android provides functionality for setting the ringtone using a URI to a file included in its media content provider.
Monitoring sound settings in an Android application is relatively easy since Android offers functionality for receiving broadcasts when sound mode changes happen or when the volume up or down buttons are pressed. The application does not have to be active when these events occur. If it's not active the application will be started. All the application has to do is implementing and register broadcast receivers for these events.
In order to monitor ringtone changes however another approach has to be taken. The operating system does not send broadcasts for this event. One solution is to implement a process that continuously checks for changes of ringtone. The process has to be started every time the device boots and stay alive until the end of the offer time. The Android operating system provides Action based solution
The above mentioned solutions are suitable for wireless devices having API:s for changing the settings. However, some mobile device operating systems, like Apple's operating system iOS do not allow setting of e.g. ringtones programmatically. On wireless devices having Apple's operating system (iOS) even the download of ringtone has to be made through iTunes. On these devices the approach of downloading and setting of notification signals e.g. ringtones through an application is not possible. An alternative approach for these devices is to have an application that execute an action e.g. stream music at random intervals rather than configuring settings e.g. ringtones. The user will still select an option or offer in a list from the server and monitor that the action is executed in accordance with a set of rules. Furthermore, the user may still pause the option or offer as described above. Hence, according to this embodiment the step of configuring the settings implies performing an action e.g. streaming a certain jingle at certain intervals. According to one aspect of this embodiment, to make this alternative less intrusive for the user, the function would only be activated while the user is in motion. The device's accelerometer could be used to indicate movement and turn the functionallity on and off. In order to maximize the audience of the streamed content, one may want to make the application more likely to start streaming when the device is in area that is likely to be crowded by people. The device's positioning system may be used to check if the device is in one of those areas, and if so change the randomizing algorithms to make sure that the device is more likely to start streaming.

Claims

1. A method in a server, of controlling the settings of wireless devices, comprising the steps:
- providing (S2) a list of objects to a wireless device; each object comprising a set of rules, wherein the set of rules defines settings of the wireless device during a predefined time period;
- receiving (S4) authorisation information from the wireless device;
- verifying (S5), based on the authorisation information, that the wireless device is trusted; and
- receiving (S7) from the wireless device a confirmation that the settings of the wireless device have been configured according to the predefined set of rules of one of the provided objects.
2. The method in a server according to claims 1, further comprising: receiving (S3) an objects initialisation from the wireless device, which informs the server that the wireless device starts to execute one of the provided objects.
3. The method in a server according to any of the preceding claims, wherein the wireless device comprises a software application, and wherein the step of verifying (S5) that the wireless device is trusted, comprises verifying that the software application is trusted.
4. The method in a server according to any of the preceding claims, further comprising:
- registrating the wireless device (SI) in the server.
5. The method in a server according to any of the preceding claims, further comprising: sending a media file (S6) corresponding to one of the provided objects to the wireless device; wherein the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
6. The method in a server according to any of the preceding claims, further comprising: - sending (S8) a credit to the wireless device in response to the confirmation.
7. The method in a server according to any of the preceding claims, wherein the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
8. A computer program, comprising computer readable code which, when run on a server, causes the server to perform the method as claimed in any of claims 1-7.
9. A server being configured to perform the method as claimed in any of claims 1-7
10. A method in a wireless device of enabling a server to control the settings of the wireless device, the method comprising the steps: retrieving (S20) from a server, a list of objects; each object comprising a set of rules defining settings of the wireless device during a predefined time period; initialising (S30), the execution of one selected object, which is selected from the retrieved list of objects; - sending (S40) authorisation information to the server; configuring (S50) properties of wireless device according to rules of the selected object; monitoring (S60, S61) that the properties of wireless device are configured according to rules of the selected object during a predefined time; and - only if the rules of the selected object have been fulfilled, sending (S70) a confirmation to the server that that the rules of the object have been fulfilled.
11. The method in a wireless device according to claim 10, wherein the wireless device comprises a software application and wherein the step of sending (S40) authorisation information to the server comprises using authentication information comprised in the software application.
12. The method in a wireless device according to claim 10-11, wherein the method further comprises,
- downloading (Sll) the software application in the wireless device; wherein the software application is configured to enable a server to control of the use of an audio signal within the wireless device.
13. The method in a wireless device according to claim 10-12, wherein the method further comprises,
- sending (S12) a registration request to the server.
14. The method in a wireless device according to claim 10-13, wherein the method further comprises,
- requesting (S13) an object list from the server.
15. The method in a wireless device according to claim 10-14, wherein the method further comprises,
- receiving (S41) a media file; and wherein the step of configuring (S50) properties of wireless device comprises configuring the use of the media file.
16. The method in a wireless device according to claim 10-15, wherein the method further comprises,
- receiving (S80) a credit from the server.
17. The method in a wireless device according to claim 10-16, wherein the step of initialising (S30) the execution of one of the retrieved objects in the wireless device comprises detection of a user object.
18. The method in a wireless device according to claim 10-17, wherein the step of initialising (S30) the execution of one of the retrieved objects in the wireless device comprises starting a dedicated software process in the wireless device.
19. The method in a wireless device according to any of the preceding claims 10-18, wherein the set of rules comprise that a media file shall be used in the wireless device according to a predefined rule.
20. The method in a wireless device according to claim 10-19, wherein the media file is an audio signal, and wherein the rules comprise that the media file shall be used as a notification signal.
21. A computer program, comprising computer readable code which, when run on a wireless device, causes the wireless device to perform the method as claimed in any of claims 10-19.
22. A wireless device (20), being configured to execute the method claimed in any of claims 1-20.
PCT/EP2013/062267 2013-06-13 2013-06-13 Remote control of settings in wireless devices Ceased WO2014198320A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/062267 WO2014198320A1 (en) 2013-06-13 2013-06-13 Remote control of settings in wireless devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/062267 WO2014198320A1 (en) 2013-06-13 2013-06-13 Remote control of settings in wireless devices

Publications (1)

Publication Number Publication Date
WO2014198320A1 true WO2014198320A1 (en) 2014-12-18

Family

ID=48669914

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/062267 Ceased WO2014198320A1 (en) 2013-06-13 2013-06-13 Remote control of settings in wireless devices

Country Status (1)

Country Link
WO (1) WO2014198320A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016110769A1 (en) * 2015-01-08 2016-07-14 Nokia Technologies Oy Usage of radio access network rules and access network discovery and selection function policies

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070116227A1 (en) * 2005-10-11 2007-05-24 Mikhael Vitenson System and method for advertising to telephony end-users
US20090197577A1 (en) * 2008-01-31 2009-08-06 Qualcomm Incorporated System and methods for controlling advertisements on wireless device assets
EP2224709A1 (en) * 2009-02-27 2010-09-01 Research In Motion Limited System and method for providing audible messages in replacement of telephone tones
US20110300838A1 (en) * 2010-06-04 2011-12-08 International Business Machines Corporation Advertising Ringtone Coverage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070116227A1 (en) * 2005-10-11 2007-05-24 Mikhael Vitenson System and method for advertising to telephony end-users
US20090197577A1 (en) * 2008-01-31 2009-08-06 Qualcomm Incorporated System and methods for controlling advertisements on wireless device assets
EP2224709A1 (en) * 2009-02-27 2010-09-01 Research In Motion Limited System and method for providing audible messages in replacement of telephone tones
US20110300838A1 (en) * 2010-06-04 2011-12-08 International Business Machines Corporation Advertising Ringtone Coverage

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016110769A1 (en) * 2015-01-08 2016-07-14 Nokia Technologies Oy Usage of radio access network rules and access network discovery and selection function policies

Similar Documents

Publication Publication Date Title
US20180373847A1 (en) Broadcast DRM License Support for Receive Only Devices
EP3131266B1 (en) Method and apparatus for presenting multimedia information
CN102934118B (en) Subscriber equipment and control method thereof
JP5383821B2 (en) Distributing content items to user devices in a mobile environment
CN111355731A (en) Resource access method, device, resource access system, equipment and storage medium
US9443088B1 (en) Protection for multimedia files pre-downloaded to a mobile device
US20070173236A1 (en) Methods for Marketing Digital Content to Mobile Communication Device Users
US20130007240A1 (en) Systems and methods to provide availability notifications for denied content requests
US10623796B2 (en) Detection of smartphone to enable content
US9571876B2 (en) Virtual set-top box device methods and systems
US9838869B1 (en) Delivering digital content to a mobile device via a digital rights clearing house
KR20120040245A (en) System and method for protecting content in a wireless network
US20130079036A1 (en) System and method for targeted location-based advertising
CN105204949A (en) Method and device for actively triggering system broadcast
CN101663682A (en) Animated connection page
CN105450772A (en) Traffic-free downloading method and device
CN101277491A (en) An advertising monitoring system and method
US20120253941A1 (en) Method And Apparatus For Distributing Content
WO2020252185A1 (en) Methods and apparatus for facilitating network credential updates for media meters
WO2014198320A1 (en) Remote control of settings in wireless devices
JP7145565B2 (en) Communication device, advertisement delivery system, advertisement delivery method and program
WO2015071758A1 (en) Data plan and usage based application interface control
US9043244B2 (en) License consignment method and system for portable device
KR101591731B1 (en) Mobile terminal, service providing server and issuing a ticket using thereof
KR20060065924A (en) How to Provide Access Information for Wireless Internet Content

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13730185

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 19/02/2016)

122 Ep: pct application non-entry in european phase

Ref document number: 13730185

Country of ref document: EP

Kind code of ref document: A1