IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0193711
(2008-08-18)
|
등록번호 |
US-8311513
(2012-11-13)
|
발명자
/ 주소 |
- Nasserbakht, Gitty N
- Nasserbakht, Mitra
|
출원인 / 주소 |
|
대리인 / 주소 |
Schwegamn, Lundberg & Woessner, P.A.
|
인용정보 |
피인용 횟수 :
64 인용 특허 :
5 |
초록
▼
An automated mobile assistant system provides automated, proactive and anticipatory services for the user of the system. A scheduling system for a mobile device is described and can include a memory to store calendar events and a scheduler to automatically organize the events based on at least one o
An automated mobile assistant system provides automated, proactive and anticipatory services for the user of the system. A scheduling system for a mobile device is described and can include a memory to store calendar events and a scheduler to automatically organize the events based on at least one of temporal, geographical, contextual availability, user-preference, past activities, usage pattern, proximity to other users or events, or combinations thereof. In an example, a customizable personal mobile device for communication and organization can include a core engine and a plurality of modules coupled to the core engine to perform a different one of a plurality of classes of functionality of the mobile device, where each said module includes a processing element and memory dedicated for use by said module. A time-based intelligence system provides robust storage, access, and processing of information on a mobile device.
대표청구항
▼
1. An autonomous and programmable management system for a mobile device, comprising: a memory to store requests;a scheduler to dynamically and proactively initiate and prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, or comb
1. An autonomous and programmable management system for a mobile device, comprising: a memory to store requests;a scheduler to dynamically and proactively initiate and prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, or combinations thereof; anda manager to automatically perform requests in real-time, wherein said manager performs at least one request without prompting for user input; and wherein the manager performs automated security procedure including: detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof; wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system; wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. 2. The system of claim 1, wherein authentication is achieved through pre-determined pattern of biological identification inputs including one or more of a time sequence of finger prints, a sequence of finger prints at particular orientations, a blinking of eyes in a pattern, or combinations thereof. 3. The system of claim 1, wherein security breach confirmation employed for authenticated users is comprised of biological and environmental sensory measurements to identify cases with an authorized user under duress. 4. The system of claim 1, wherein said non-transparent authentication process comprises posing user inquiries that do not resemble authentication checks including security questions in the form of common system question or user preferences or both only known to the authorized user. 5. The system of claim 1, wherein security breach handling procedure includes automatically disabling the device. 6. The system of claim 1, wherein security breach handling procedure includes uploading all information on the device to the network and erasing the content of the device. 7. The system of claim 1, wherein security breach handling procedure includes disabling access to user data and presenting cloned data to the unauthorized user, and wherein cloned data is pre-determined false data. 8. The system of claim 1, wherein security breach handling procedure includes disabling access to user data and presenting cloned data to the unauthorized user, and wherein cloned data is correct data but the changes are not saved as changes to user information or data. 9. The system of claim 1, wherein security breach handling procedure includes collecting environmental or biological information, or both without prompting for user input, wherein environmental information includes at least one of location, temperature, and moisture, and wherein biological information includes at least one of a user photograph, heart rate and user finger print, and uploading said information from the device to the network. 10. The system of claim 1, wherein the requests stored in the memory and the scheduler are accessible via a phone in addition to a mobile device, electronic access device, the internet, or combinations thereof. 11. The system of claim 1, wherein the memory, scheduler, manager are to perform any or all of said storage, scheduling and management functions, respectively, on the network, solely on clients' mobile devices or a combination thereof using user requirements or availability of network or mobile device. 12. The system of claim 1, wherein the manager proactively generates at least one of system-defined personalized alerts and news based on user-specific criteria that includes at least one of temporal data, event-based criteria, financial data, usage pattern, current activity, future activity, proximity, or combinations thereof, wherein the manager is to provide a continuously updated at least one of alerts and news ticker lines moving across the screen making viewing the notification possible without any action required by the user to view the information on a screen of a mobile device, viewable on said mobile device's display or on any display device connected to said system via a network connection. 13. A mobile device, comprising: at least one processing element,at least one memory element operably connected to the processing element,a display, anda programmable management system; wherein the programmable management system performs dynamic and proactive scheduling to initiate and to prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, proximity to other users or events, or combinations thereof, and to automatically perform said requests in real-time, wherein said management system initiates and performs services on behalf of the user of an electronic mobile device, wherein the management system is to process at least one request in the background without prompting user input, wherein said device performs automated security procedure including: detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof; wherein upon discrepancy detection, breach verification is performed; wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system; wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. 14. The device of claim 13, wherein the management system uses past activities, time, location, context, availability, preference, usage pattern, proximity to other users and events, or combinations thereof, together with user's schedule's multi-dimensional tags to anticipate upcoming schedule or schedule changes and to generate present and near-term tasks, alerts, and appointments, wherein said multi-dimensional tags include one or more of time, location, participant, source, user-defined field or combinations thereof. 15. The device of claim 13, wherein the management system is to map future events into present and near-term tasks, alerts and appointments and to schedule, perform and track progress of said tasks. 16. The device of claim 13, wherein the management system performs multi-user scheduling with multi-level access control allowing groups of users' schedules be coordinated without user intervention and without viewing calendar detail, to view all or part of calendar detail, to modify contents of calendar, or combinations thereof. 17. The device of claim 13, wherein the management system is to merge availability of multiple users' multi-modal schedules for viewing among a shared group without user intervention, according to users' preferences, and wherein the mode includes at least one selected from a group consisting of travel, business, athletics, home, specific location name, specific activity name. 18. The device of claim 13, comprising a temporal listing of scheduled items within a user's schedule, and an automated visual symbol displayed with said listing to dynamically highlight current time position in the schedule, wherein said symbol moves along said temporal listing with time, viewable on said mobile device's display and on any additional display device connected to said system via a network connection. 19. The device of claim 13, wherein the management system provides one-step viewing of appointments using time grouping, location grouping, subject grouping, users grouping or other user-defined categories, viewable on said mobile device's display and on any display device connected to said system via a network connection. 20. The device of claim 13, wherein the management system provides one-step viewing of all user communication and messaging including landline and mobile calls, voice messages, email, and multimedia messaging, viewable together on one screen, viewable on said mobile device's display and on any display device connected to said system via a network connection. 21. The device of claim 13, wherein the management system allows a user to customize a user interface by defining a location, a look, an appearance and functionality of buttons and menus, and combinations thereof, viewable on said mobile device's display or on any display device connected to said system via a network connection. 22. A mobile device, comprising: at least one processing element,at least one memory element operably connected to the processing element,a display, anda programmable management system; wherein the programmable management system performs user-defined and automated services, consisting of automated information access, event and appointment scheduling, ordering, reservation, account inquiry and payment, and combinations thereof proactively and in real-time, wherein the management system is to process at least one request in the background without prompting for user input,wherein the device performs automated security procedure including: detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof; wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system; wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. 23. The device of claim 22, wherein the device is to pull advertisements, coupons, or promotions from vendors to a said mobile device or user mailbox on the network using at least one of user preference, activity, usage pattern, current/future scheduled location/activity, or combinations thereof, wherein pull of the management system includes proactively selecting appropriate advertisement, coupon, or promotion on the network, and wherein said pull initiates from the mobile device and downloads selected advertisements, coupons or promotions to said device. 24. The device of claim 23, wherein the device does not allow push advertising from vendors to said mobile device, wherein said push advertising includes unsolicited information transmitted from vendors to the mobile device. 25. The device of claim 22, wherein the management system is to generate automated user-defined or machine-generated statistics using past activities in one or multiple categories or time groupings, viewable on said mobile device's display or on any display device connected to said system via a network connection. 26. The device of claim 22, wherein the management system is to track progress of user or machine-defined tasks in one or multiple categories or time groupings, viewable on said mobile device's display or on any display device connected to said system via a network connection. 27. The device of claim 22, wherein the management system includes a live directory of user contacts whose entries include temporal, location and contextual data including at least one of relationships, contact information, contact history, link to contact history, or combinations thereof with entries automatically updated. 28. The device of claim 27, wherein the live directory includes predefined subsets of directory data to be presented to the user as groupings with associated hot buttons added to the live directory listing view, viewable on said mobile device's display or on any display device connected to said system via a network connection. 29. The device of claim 28, wherein the directory includes ability to drag and drop directory entries to specific category listings, viewable on said mobile device's display and on any display device connected to said system via a network connection. 30. The device of claim 29, wherein directory subset grouping hot buttons are user-programmable. 31. The device of claim 22, wherein the management system is to communicate with an automated server that communicates with the target servers on a computing network and negotiates a schedule, uploads or downloads information or completes requested transaction and reports the results back to the manager. 32. The device of claim 22, wherein the management system is to initiate communication with a service provider via phone and negotiates a schedule or completes requested transaction through a voice menu, or using voice recognition. 33. The device of claim 22, wherein the management system simultaneously communicates to an automated network server through a broadband connection, communicates with the user interface manager on the mobile device, and coordinates with modules on the mobile device providing live updating and service access. 34. The device of claim 22, wherein predefined subsets of service providers are presented to the user as groupings with associated hot buttons added to the services menu, viewable on said mobile device's display and on any display device connected to said system via a network connection. 35. The device of claim 34, wherein services hot buttons are user-programmable. 36. A mobile device, comprising: at least one processing element,at least one memory element operably connected to the processing element,one or more of a display, a camera, environmental sensors, and biological sensors, andwherein the device performs automated security procedure including: detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof; wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system; wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. 37. The device of claim 36, wherein security breach handling includes collecting environmental information, biological information or both without prompting user input, wherein environmental information includes at least one of location, temperature, and moisture, and wherein biological information includes at least one of a user photograph, heart rate and user finger print, and uploading said information from the device to the network. 38. The device of claim 36, wherein a single telephone number associated with one mobile device is further associated with multiple mobile devices, wherein the multiple mobile devices are able to receive and send voice or data calls and access the same user data using the same telephone number, wherein said single telephone number is dedicated for use solely by said mobile devices and wherein calling said telephone number directly places simultaneous calls to all said mobile devices. 39. The device of claim 36, wherein authentication is achieved through pre-determined pattern of biological identification inputs including one or more of a time sequence of finger prints, a sequence of finger prints at particular orientations, a blinking of eyes in a pattern, or combinations thereof. 40. The device of claim 36, wherein security breach confirmation employed for authenticated users is comprised of biological and environmental sensory measurements to identify cases with an authorized user under duress. 41. The device of claim 36, wherein said non-transparent authentication process comprises posing user inquiries that do not resemble authentication checks including security questions in the form of common system question or user preferences or both only known to the authorized user. 42. The device of claim 36, wherein security breach handling procedure includes automatically disabling the device. 43. The device of claim 36, wherein security breach handling procedure includes uploading all information on the device to the network and erasing the content of the device. 44. The device of claim 36, wherein security breach handling procedure includes disabling access to user data and presenting cloned data to the unauthorized user, and wherein cloned data is pre-determined false data. 45. The device of claim 36, wherein security breach handling procedure includes disabling access to user data and presenting cloned data to the unauthorized user, and wherein cloned data is correct data but the changes are not saved as changes to user information or data. 46. The device of claim 36, wherein the automated security procedure is accessible via a phone in addition to a mobile device, electronic access device, the internet, or combinations thereof. 47. The device of claim 36, wherein the automated security procedure can be performed on the network, solely on clients' mobile device or a combination thereof based on user requirements or availability of network or mobile device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.