1. Field of Invention
The present application relates to the differential execution of code on an electronic device when such a device detects a beacon signal. Such a process allows a device to behave differently based on an external stimulus not resident on the device even when the device is only passively receiving information. Among other uses, differential execution could enable privacy protections limiting the data collection capabilities of a device such as a smart phone in certain places and certain times, could activate an affinity program installed by a user to alert the user to locations nearby, provide discounts or other opportunities at such locations, disable or change features of a device such as preventing a phone from ringing (perhaps putting it in vibrate mode) during a performance (such as opera, symphony, stage, or cinema), change a device from silent mode to deliver urgent information such as a severe weather alert, or merely change settings and preferences when at home or work.
2. Discussion of Related Art
Highly sophisticated electronic devices have become ubiquitous, distributed, and often mobile: smart phones, tablets, laptop and desktop computers, smart electronics built into cars and other consumer items, distributed and connected sensors and switches (i.e. for smart homes) as part of the internet of things, smart meters, etc. For the most part, these devices perform in predetermined ways, react to user input, or respond to commands and signals when a two-way communications path is established between the device and other entities. There may be significant enhancements to functionality when the device reacts differently to an external signal of some sort (described using the term beacon here) which can work when the device is fully functioning but even work when the device is only passively receiving information. As a simple example, a mobile phone may be put into vibrate mode only when a person is at work (based on the WiFi® signal at work) and back into normal ringing mode when home (based on the home WiFi®). A locally broadcast beacon might take phones out of vibrate or silent mode when severe weather is approaching (such as a tornado) or in the case of a national emergency. Beaconing might be used to restrict, change, limit, or alter the data collection capabilities of a device in certain places and/or at certain times. Such functionality might be used to ensure privacy and security in certain sensitive locations from unconsented collection or recording. Similarly, a device user may load software which alerts him to beacons from certain commercial establishments and provide discounts, suggestions, or other benefits for the user.
This application discloses a process whereby software is differentially executed by an electronic device based on detection of an external beacon signal. Once the beacon signal is detected by the device, some set of software is executed differently than it would have been in the absence of such detection, causing the device to behave differently in some cases. The response to the beacon signal might directly cause the device to behave differently or cause the device to interact with another source of data or direction. There are a number of reasons why such a configuration may be useful including power conservation, emergency alerts, and activation of privacy protection or affinity marketing software. It could also be used to control a potentially large number of distributed devices (such as may be found in the internet of things).
This application discloses a process whereby software is differentially executed by an electronic device based on detection of an external beacon signal. Such a signal could be electromagnetic, acoustic (inside or outside audible range), or some other form of signal detectable by the electronic device. By beacon, we mean a signal which is external to the device and broadcast to and potentially receivable by all devices in an area rather than directed to a particular device. A beacon requires no communication with, response from, or even awareness of the presence of a device. While the functionality of a beacon is one way (from the broadcast point to the device) and requires no response from the device, it can be part of a two-way signal (i.e., the broadcast address (SSID or Service Set Identifier) of a WiFi® router could be used as a beacon even if the device merely detects rather than connects to that WiFi® network). The beacon signal may or may not be encrypted.
Once the beacon signal is detected by the device, some set of software is executed differently than it would have been in the absence of such detection, causing the device to behave differently in some cases. (See
The response to the beacon signal might directly cause the device to behave differently or cause the device to interact with another source of data or direction. In the latter case, it may serve as an alert or “wake up call” to otherwise have the device communicate with an external source of data or instructions which can in turn be processed on or off the device. (See
There are a number of reasons why such a configuration may be useful. Devices can conserve power or users can better protect their privacy by keeping devices in passive mode. Geographically-based controls of mobile device collection might be accomplished by activating blocking software whenever the device is turned on. Emergency alerts can reach a larger number of users. It could also be used to control a potentially large number of distributed devices (such as may be found in the internet of things). For example, enabling or disabling all (or some) sensors in a security system. (See
The ubiquity of connected devices in the so-called internet of things as well as increased hacking concerns generally raise the possibility of a beacon dependent layer of security for devices. For example, a business might encrypt its data with the decryption program only enabled in the presence of a beacon signal. Similarly, distributed devices in a home or business may receive a beacon signal and only transfer information to another device (such as a laptop or tablet) which is receiving the same beacon signal, in effect foreclosing remote access for some capabilities.
The present application relates to and claims priority of U.S. provisional patent application (“Copending Provisional Application”), Ser. No. 62/045,371, entitled “BEACON ACTIVATED SOFTWARE,” filed on Sep. 3, 2014. The disclosure of the Copending Provisional Application is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62045371 | Sep 2014 | US |