The present invention relates to directing the operation of a user's personal communication apparatus.
Personal communication apparatus in the form of cellular telephones have become ubiquitous. As cellular telephones have evolved from just mobile analogues of traditional fixed-line telephones providing only voice communication into multi-faceted communication devices providing not only voice communication but a range of communication options including notably internet access, there is a need to prevent the complexity of using the cellular telephone's user interface escalating. The present invention is generally concerned with this problem.
According to one aspect, the present invention may provide a device for directing the operation of a user's personal communication apparatus, comprising an RF tag located in a decorative casing of a size to facilitate handling by the user, wherein the RF tag stores a code to direct the operation of a user's personal communication apparatus.
Beyond the dimensional limitation, there is no limit on the appearance of the casing except to say that, in preferred embodiments, the casing comprises a gewgaw, ideally appealing to the fashion or aesthetic CONFIRMATION COPY sensibilities of the user and which may serve as a fashion accessory, or emblem for a particular group.
According to another aspect, the present invention may provide a system comprising a device comprising an RF tag embedded in a casing, and a user's personal communication apparatus having an RF tag reader which is operable upon reading the RF tag to perform an operation associated with said RF tag.
By virtue of the above features, when the user wants to perform a certain operation with the personal communication apparatus, he can by-pass the normal input technologies, typically a keypad, by manoeuvring the device such that the RF tag is read by the RF tag reader, and then the personal communication apparatus performs an operation associated with the RF tag. Thus, the present invention offers rapid access to regularly used functions or operations without the need to navigate a menu. Moreover, access to these regularly used functions is made intuitive by associating a physical object, i.e. the device, with an operation. Also, the device can be used to selectively enable/disable local functions of a user's personal communication apparatus. For example, a secrecy mode can be controlled by the device, the device effectively serving as a physical “key” to lock away and unlock sensitive information, thus effectively affording the functionality which is normally in a user's personal communication apparatus by a PIN code.
Preferably, the casing comprises a gewgaw, ideally appealing to the fashion or aesthetic sensibilities of the user and serving as a fashion accessory, or emblem for a particular group. Preferably, the devices are sized to be easily handled by the user. For example, this means that they are of sufficient size to be held by the user's fingers. Also preferably, the devices are not so large that it becomes a noticeable hindrance for the user to carry a set of them.
In one embodiment, the user's personal communication apparatus includes a marking on the exterior surface of the housing. This marking serves to indicate the interaction area on the apparatus's housing adjacent to which the device should be placed for reading.
The user's personal communication apparatus may comprise a docking port into which the device can be docked for reading the RF tag. In one embodiment, the RF tag can only be read when docked so as to avoid the possibility of an accidental request of an operation associated with the code on an RF tag. To this end, either the RF tag reader/RF tag can be calibrated to provide for only very close range reading i.e. when docked, or the RF tag can be provided with a switch means which is activated only when the RF tag is properly docked. In another embodiment, a plurality of devices can be docked simultaneously. Preferably, the operation directed by the user is dependent on the combination of the docked devices. An advantage of employing a docking port is that the act of docking can signal to the RF tag reader to perform a read operation, whereby it is relatively energy efficient in that energy is not wasted trying to attempt a reading when there is no RF tag in reading range.
With this in mind, according to another aspect, the present invention may provide a set of devices for directing the operation of users' personal communication apparatuses, each comprising an RF tag embedded in a decorative casing, the appearance of each casing being distinguishable from others in the set.
In this way, the user can access a range of functions of the personal communication apparatus by selecting the appropriate device from the set and using that to activate the function.
According to a still further aspect, the present invention may provide a method of directing the operation of the user personal communication apparatus by
the user requesting a desired operation by performing an interaction with the user's personal communication apparatus which generates an action code from external of the user's personal communication apparatus;
automatically routing an action-request message, including an action code field which is the same as or derived from said action code, to a server; and
the server performing instructions to further the performance of the desired operation.
These features of the invention enable a user request which originates outside of the user's personal communication apparatus to be processed when the meaning of the request is not known to the user's personal communication apparatus. Preferably, said action code is the code is read from the device of the present invention.
According to another aspect, the present invention may provide a system comprising a user's personal communication apparatus and a server for carrying out the above-mentioned method.
According to another aspect, the present invention may provide a device for directing the operation of a user's personal communication apparatus, comprising an RF tag embedded in a gewgaw.
Exemplary embodiments of the invention are herein described with reference to the accompanying drawings, in which:
FIGS. 1(a) and 1(b) show an iBead in accordance with the invention;
FIGS. 2(a), 2(b), 2(c) 2(d) show different aspects of a mobile phone equipped with an RF ID reader in accordance with the invention;
FIGS. 5(a), 5(b) 5(c) show the path of a message packet in the
FIGS. 8 shows example applications of a system in accordance with the invention;
FIGS. 10(a), 10(b),
RF ID technology is based on bi-directional radio frequency communication between an RF ID control unit and an RF tag. The tag comprises an antenna, control circuitry and memory in which information is stored. The memory may be read-only in which case the information is unalterable, or read/write which means that information can be overwritten or added to memory at a later time by the user. The control unit comprises an antenna and modulation/demodulation circuits. When operating, the control unit emits an electromagnetic field which extends over a certain volume around the control unit If an RF tag passes into this volume, the field activates the control circuitry of the RF tag. A dialog is then set up in which the tag identifies itself by sending the information contained in its memory to the control unit Upon receiving the information, the control unit decodes it. RF tags can be either passive or active. In the case of a passive RF tag, there is no on-board power supply, rather, energy is obtained from the electromagnetic field generated by the RF ID controller. Active tags contain an intrinsic power source, such as a battery.
RF ID technology has become technically mature and is being adopted in different fields ranging from, for example, storage management to electronics tickets in commuting. At present, RF tags are available at about the size of a sand grain and at low cost.
Referring to
A portable personal communication apparatus in the form of a mobile phone 50 conventionally comprises a display 52, a keypad 54, and a housing 53 as shown in
The cellular network 70 includes a gateway server 75 through which internet access is achieved. An iBead broker server 80 and a plurality of iBead action servers 85a, 85b are also shown making up part of the internet The gateway server 75 is connected to the broker server by an encrypted data pipeline 89, and the broker server 80 is connected to the action servers 85a, 85b by encrypted data pipelines 90a, 90b. Web sites 95a, 95b of service providers are also shown on application servers.
When the user brings the iBead 10 into the reading range of the RF ID reader 60, the RF ID reader 60 reads the code on the iBead 10 and communicates this to the central control unit 58. First, the central control unit 58 checks in its memory 59 to see whether the code of the iBead is known locally. If the code is known locally, the central control unit 58 performs the macro/operation allocated to the code.
One example of this type of macro is sending an email to a spouse to indicate that you will be home later than usual. The whole process of sending the email could be triggered by the iBead 10 with no further intervention being required from the user. Alternatively, the macro might stop short of actually sending the email and provide the user with the opportunity to amend and/or approve the email before sending. Even in this case, navigating the menu structure, and the cumbersome process of entering an email on a mobile phone keypad is largely avoided. Another example is that a macro performs the operation of opening up the browser of the mobile phone at a predetermined IP address. (It is emphasized that the code read from the iBead references the macro, and other than that connection has no relationship to the IP address.) If, for example, the iBead bore the logo of CNN, then the predetermined IP address might be that of the CNN home page. Another example is to use a macro to activate a secrecy mode. A secrecy mode is a conventional feature which enables a user to hide selected information from an unauthorized person and the normal access control mechanism is a PIN code.
If the code of the iBead 10 is not known locally, the phone 50 sends a action_request message over it's cellular interface 56 to a remote server. The server can either be a default server. Alternatively, the server which should be accessed can be indicated by a part of the code itself. The server can be part of the cellular network or a server on the internet
The action_request message 100 comprises at least a message identifier field 102 indicating that the message is an iBead packet, an action code field 104 containing the code of the RF tag in the iBead, and an authentication field 106 containing information such as the IMEI code of the mobile phone.
In the embodiment shown, the action_request message is based on the message identifier field 102 automatically directed to the iBead broker server 80. The broker server 80 contains a database which, inter alia, maps or associates the codes of the RF tags in the iBeads with predetermined actions. If the system is configured such that for each iBead registration, the broker server 80 always contains only a URL to an action server, then the predetermined action can be merely a URL the requirement to access it being implicit as a result of the system configuration.
If the broker server 80 recognizes the action code in the action_request message, then two possibilities arise. In the case where the instruction or operation associated with the code is relatively simple and/or relate to a standard system operation, then the instructions 120 for the macro may be returned to the mobile phone 50 directly by the broker server and carried out as shown by the diagram in
The mobile phone 50 treats the RF ID code which it reads from the memory 26 of iBead as having two parts: a KEY part for decryption, and an action code part for designating the required operation. Referring to
For both the
In the
An advantage of the remotely-stored macro approach illustrated by
In a system having the
In a system having the
A specialist iBead service company on behalf of the retailer registers the set of iBeads on the cellular operator's broker server 80, the broker server database action codes for each iBead containing an encrypted URL corresponding to an action server 85a. The specialist iBead company installs in the action server in respect of each the registered iBeads, iBead middleware necessary to properly interface with retailer's iBead-related web site and further instructions for accessing the retailer's web site 95a. When the phone 50 reads the iBead 10, the broker server 80 and the action server 85a are accessed as described in relation to
Once a connection with the retailer's web site is established, transactions as per
Also, in this case where the amount of the payment is equal to difference between original selling price and the current selling price, it is form of assurance and comfort to the first user that if he buys content early in its lifetime when the price is high, if he puts the iBead into circulation, he may well receive compensatory payment later on reflecting any drop in price. For subsequent transactions, all the previous users receive an additional payment. In some embodiments, where the market price does not fall, no additional payments are made.
Also, for various applications, the operation performed for the first user can be different or accumulative for the second and subsequent users. The retailer can track the use patterns (type/frequency) of its iBeads via a real time interface accessing the relevant server 80, 85a, 85b, in the internet. In the above example, the iBead sponsor was a retailer. However, it is an important aspect of the herein-described preferred systems that the architecture
is open and flexible enough so that end-consumers, should they so wish, can straightforwardly become distributors of their own iBeads and content.
In one business model, for example, using the
Where the instructions to be downloaded to the user are dynamic as in some other examples above, it is preferred that the downloading operation is coordinated from an action server, to which the retailer has rights to program, or at the retailer's own server—although, in principle, this might also be done at the broker server 80.
In other embodiments, when the macro or instructions have been first retrieved from a remote server 80, 85a or 85b, they can be cached locally to avoid repeating the download operation.
It will be appreciated that in a system according to the
In other embodiments, a iBead/URL directory server 82 can be used in parallel with a broker sever 80.
In the above described embodiments, the reading of an iBead 10 was triggered by moving it into the reading range of the RF tag reader 60. This process is illustrated in
It will be appreciated that from a technical standpoint the RF tag technology does not require contact between an iBead 10 and an RF reader 60 in order to function. However, users are likely to carry a set of iBeads 10 which provide them with a quick and easy way to perform a range of tasks. However, in carrying a set of iBeads, which may be carried together on a single string or strap, there is the risk that more than one iBead will be read by the iBead reader which could lead to actions unintended by the user being performed. One way of indicating which iBead should be activated is to list the iBeads which have been read by the RF tag reader in a menu, and request the user to select the required iBead from the menu. Alternatively, as shown in FIGS. 10(a) and 10(b), the RF tag reader 60 is equipped with a docking mechanism 30 into which the iBead must be docked in order to be activated for reading. In
There are various ways to activate the iBeads, for example by mechanical activation. In one embodiment, a magnet in the RF ID reader 60 causes mechanical movement inside the iBead 10 which closes and open circuit pathway in the iBead, thereby activating the resonator of the iBead. Another example is resonator circuit activation, in which the iBead 10 is provided with a magnetic resonator which when remote from the reader does not resonate; but when it is brought close to the reader, a matched circuit in the reader causes the resonator inside the iBead to resonate. From the user experience standpoint, some kind of tactile interaction is often desirable. Accordingly, in one embodiment, a spring/switch is built into the in the RF ID reader and/or docking mechanism 30 and provides tactile feedback when interaction occurs.
FIGS. 12 to 14 show another example where tactile feedback is provided to the user. Referring to
Another docking mechanism is shown in FIGS. 15 to 17. In this embodiment the casing 40 is first manoeuvred, as indicate by the arrow P in
To unlock and remove the iBead, it is twisted in the opposite direction to T and pulled.
The above embodiments are particularly suited to a situation in which a user buys an iBead and programs it to open a page of the news headlines and he does not like carrying beads on a strap. Since this is something he wants to do every day, he inserts the iBead into the RF ID reader.
Thus it will be appreciated that having a physical object (e.g. a iBead) representing a task or thing (e.g. “call Leon “get latest news”) can be easier for the user to understand, since there is a 1:1 relationship between the task, and the object used to complete the task. Also, tactile feedback is a natural extension of what humans already do, for example, when shaking hands or exchanging business cards.
In the
This embodiment provides user feedback on a mobile electronics device. It is particularly suited for status related tasks where the user needs to be kept informed with the status of a task. Example of particular types of application for this type of iBead are given below.
The user buys an “WLAN status bead” to check when they are in range of a WLAN hotspot, and docks it on their functional cover. The bead glows when it is in range (after getting the information from the handset).
The user buys a “Wizard Bead” from their online gaming environment, which represents the health of their character in the online world. When the character is in danger, the wizard-shaped bead glows red, prompting the user to interact more with the online world.
The user decides to back up the photos in the phone's inbox to their Club Nokia storage space. The status iBead flickers showing the data being sent, and glows green once the transfer is complete.
Thus, it will be appreciated that the described embodiments of the invention provide a solution which might replace some of the utilitarian things which people carry in their wallets with potentially items which can serve as fashion items but also have a function, this function being to simplify the, for example, mobile phones are used.
It is also noted that by docking a plurality of iBeads at the same time, a physical programming language can be created, where each iBead represents a command e.g. Call, Open Web Page Of, or an argument of a command e.g., Ingrid, Mike. In such a programming language, the order of the iBeads may also have meaning.
In other embodiments (not shown), each docking mechanism 30 could be provided with a dedicated RF ID reader and the range of the RF ID reader could be adjusted to prevent mutual interference.
Number | Date | Country | Kind |
---|---|---|---|
02147148 | Jun 2002 | GB | national |
03146933 | Jun 2003 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB03/02494 | 6/26/2003 | WO | 1/23/2006 |