The present invention relates generally to accessing an application and, more particularly, to accessing an application on a remote device.
Systems to control a remote device located in a different location are utilized by many people. In controlling the remote device from a different location, a user is able to perform tasks on the remote device such as perform modifications to the remote device, view content accessible on the remote device, and the like without having physical access to the remote device.
In one embodiment, the methods and apparatuses display an application that is accessible on a target device; select content associated within the application wherein the content is located on the target device; and remotely access the content on the target device on a local device.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate and explain one embodiment of the methods and apparatuses for accessing an application on a remote device.
In the drawings,
The following detailed description of the methods and apparatuses for accessing an application on a remote device refers to the accompanying drawings. The detailed description is not intended to limit the methods and apparatuses for accessing an application on a remote device. Instead, the scope of the methods and apparatuses for accessing an application on a remote device is defined by the appended claims and equivalents. Those skilled in the art will recognize that many other implementations are possible, consistent with the present invention.
References to a device include a desktop computer, a portable computer, a personal digital assistant, a video phone, a landline telephone, a cellular telephone, and a device capable of receiving/transmitting an electronic signal.
In one embodiment, the methods and apparatuses for accessing an application on a remote device allow a user to view a list of devices. Further, the user is capable of selectively accessing these listed devices. In one embodiment, the user is associated with a corresponding profile that identifies the devices within the list. Further, the status of each of the listed devices is shown.
In one embodiment, the listed devices have a profile associated with each device. In one embodiment, each of the devices have restrictions on the user accessing the device. In one embodiment, there are assigned rights that restrict the type of access that is allowed by the device. In another embodiment, access to the device is restricted by other factors such as the identity of the user, the particular device that the user utilizes to gain access, the number of times the user gains access, and the duration that the user accesses the device.
In yet another embodiment, access to the device is restricted to selected application(s). For example, if the selected application is Microsoft Excel®, then any document that is capable of being viewed through Excel® can be access through this particular device.
In one embodiment, one or more user interface 115 components are made integral with the electronic device 110 (e.g., keypad and video display screen input and output interfaces in the same housing such as a personal digital assistant. In other embodiments, one or more user interface 115 components (e.g., a keyboard, a pointing device such as a mouse, a trackball, etc.), a microphone, a speaker, a display, a camera are physically separate from, and are conventionally coupled to, electronic device 110. In one embodiment, the user utilizes interface 115 to access and control content and applications stored in electronic device 110, server 130, or a remote storage device (not shown) coupled via network 120.
In accordance with the invention, embodiments of selectively controlling a remote device below are executed by an electronic processor in electronic device 110, in server 130, or by processors in electronic device 110 and in server 130 acting together. Server 130 is illustrated in
The server device 130 includes a processor 211 coupled to a computer-readable medium 212. In one embodiment, the server device 130 is coupled to one or more additional external or internal devices, such as, without limitation, a secondary data storage element, such as database 240.
In one instance, processors 208 and 211 are manufactured by Intel Corporation, of Santa Clara, Calif. In other instances, other microprocessors are used.
In one embodiment, the plurality of client devices 202 and the server 210 include instructions for a customized application for communicating between messaging and telephony systems. In one embodiment, the plurality of computer-readable media 209 and 212 contain, in part, the customized application. Additionally, the plurality of client devices 202 and the server 210 are configured to receive and transmit electronic messages for use with the customized application. Similarly, the network 210 is configured to transmit electronic messages for use with the customized application.
One or more user applications are stored in media 209, in media 212, or a single user application is stored in part in one media 209 and in part in media 212. In one instance, a stored user application, regardless of storage location, is made customizable based on selectively controlling a remote device as determined using embodiments described below.
In one embodiment, the system 300 includes a profile manager module 310, a device detection module 320, a storage module 330, an interface module 340, a control module 350, and an access module 360.
In one embodiment, the control module 350 communicates with the profile manager module 310, the device detection module 320, the storage module 330, the interface module 340, the control module 350, and the access module 360. In one embodiment, the control module 350 coordinates tasks, requests, and communications between the profile manager module 310, the device detection module 320, the storage module 330, the interface module 340, the control module 350, and the access module 360.
In one embodiment, the profile manager module 310 organizes and tracks the profiles. In one embodiment, each profile corresponds to a device. In another embodiment, each profile corresponds with a user.
In one embodiment, the device detection module 320 detects and identifies the identity of the devices. In one embodiment, the device detection module 320 detects the identity of devices that are coupled to a network such as an intranet, the Internet, a LAN, a WAN, and the like. The network may include both wired and wireless networks.
In another embodiment, the device detection module 320 also detects the status of the device. A device status includes being available, busy, logged off, and the like.
In one embodiment, the storage module 330 stores a record including a profile associated with the each device and/or user. An exemplary profile is shown in a record 400 within
In one embodiment, the interface module 340 detects input from a user. For example, when a user signs into a profile, the interface module 340 recognizes “friends” or “buddies” of the user from the profile.
In one embodiment, the access module 360 monitors the input from the user through the interface module and selectively allows the user to access other devices based on the profile associated with the user and the profile associated with each device accessed by the user. Further, the access module 360 also selectively allows the user to access selected application(s) on the other devices.
The system 300 in
In one embodiment, there are multiple records such that each record 400 is associated with a particular user. Further, each user may correspond with multiple records wherein each record 400 is associated with a particular profile associated with the user. In one embodiment, each record 400 is also associated with a particular device.
In one embodiment, the record 400 includes a participant identification field 410, a friends field 420, an access rights field 430, and a status field 440. In one embodiment, the record 400 resides within the client 110. In another embodiment, the record 400 resides within the server 130.
In one embodiment, the participant identification field 410 includes information related to the identity of the user. In one embodiment, the participant identification field 410 comprises an IM identifier associated with the user.
In another embodiment, the participant identification field 410 includes information related to the identity of the device. In one embodiment, the participant identification field 410 comprises a serial number associated with the device.
In one embodiment, the friends field 420 includes a listing of friends or buddies that is associated with the particular profile. For example, if the profile is associated with a particular user, then the listing of friends indicates devices or other users that are associated with the particular user. In some instances, these devices and/or users have allowed the particular user to have access to and control over corresponding devices.
For example, if the profile is associated with a particular device, then the listing of friends indicates devices or other users that are associated with the particular device. In some instances, these devices and/or users have allowed the particular device to have access to and control over corresponding devices.
In one embodiment, the devices listed within the friends field 420 are incorporated within a device list. In one embodiment, this device list represents devices that are available to another device.
In one embodiment, the access rights field 430 designates the type of access and control the user or device associated with the profile has for respective devices associated with the friends field 420.
In one embodiment, the type of access and control rights include viewing content, downloading content, changing configurations, deleting content, adding content, deleting applications, adding applications, modifying applications, and the like.
In another embodiment, the types of applications that can be accessed may also be specified. For example, an Oracle® application may be specified as the sole application that can be accessed through the remote device. In this case, only documents utilized by the specified Oracle® application on the remote device can be accessed. In one embodiment, multiple applications may be specified.
In one embodiment, the status field 440 allows a particular device or particular user that is listed within the friends field 420 to have a current status associated with that entity. For example, the status is detected through the device detection module 320. The status includes being available, busy, in a meeting, out to lunch, away from my desk, idle, unavailable, and the like.
The flow diagrams as depicted in
The flow diagram in
In Block 510, a user is detected. In one embodiment, the user is identified through a login identification that uniquely identifies that individual user. In another embodiment, the user utilizes a password in conjunction with the login identification to authenticate the user as an authorized party.
In one embodiment, a profile is associated with the user. An exemplary profile is shown as the record 400 in
In Block 520, a device is identified that is associated with the profile corresponding to the user. In one embodiment, the device is uniquely identified by a descriptive name of the device such as “Dan's computer”, “Laptop computer”, and the like. In another embodiment, the device is unique identified by a unique serial number associated with the device. For example, the device may already have a unique serial number assigned at the factory that uniquely identifies that particular device.
In one embodiment, the user has control of the identified device and is able to customize the parties that can access this identified device and limit the type of access to this identified device. For example, the identified device is owned by the user.
In another embodiment, the user has no control of the identified device and utilizes the profile to request access permission from the owner of the identified device.
In Block 530, an entity is assigned access to the identified device referenced in the Block 520. In one embodiment, this entity is a different profile that corresponds to a different user. In another embodiment, this entity is a different profile that corresponds to the same user.
In one embodiment, the entity represents a user that is given access to the identified device when the user owns the identified device. In another embodiment, the entity represents a user that is being asked to give access permission to the user to access the identified device.
In Block 540, access rights are assigned to the identified device. In one embodiment, the access rights include viewing content stored on the identified device, downloading content stored on the identified device, modifying content stored on the identified device, deleting content stored on the identified device, adding content onto the identified device, utilizing applications stored on the identified device, downloading applications stored on the identified device, modifying applications stored on the identified device, deleting applications stored on the identified device, and adding applications onto the identified device. In one embodiment, any of these access rights can be assigned to the identified device. Further, particular content and/or applications can be specified to be accessible.
In one embodiment, the access rights are limited based on the number of times the identified device is accessed. For example, the access rights to the identified device are limited to being accessed a predetermined number of times prior to making the identified device inaccessible. In another embodiment, the access rights are limited based on elapsed time. For example, the access rights to the identified device are limited by a predetermined amount of time prior to rendering the identified device inaccessible.
In one embodiment, the access rights are limited to a specific application that resides on the remote device.
The flow diagram in
In Block 605, a user accesses a user profile associated with the user. In one embodiment, the user identifies the user profile through a login identification. Further, the user authenticates authorization to the user profile by providing a predetermined password associated with the user profile. In one embodiment, the user may be associated with multiple user profiles.
In Block 610, a device list is displayed. In one embodiment, the device list includes devices that are available to be viewed by the user through the user profile.
In one embodiment, the status of the devices is shown through the device list and represents whether each device is available, unavailable, and the like. In another embodiment, the access rights of each device are also shown through the device list.
In one embodiment, the device list is formatted as a textual list that identifies the identity of the device, the status of each of these device, and the access rights associated with each device.
In another embodiment, the device list is embodied within a graphical user interface that utilizes icons to graphically represent each device shown on the device list, the status of each of these devices, and the access rights associated with each device.
In Block 615, a selected device shown within the device list is selected and an access request is transmitted. In one embodiment, the user associated with the profile chooses the selected device. Further, the user associated with the profile transmits the access request to gain access to the selected device.
In Block 620, a determination is made regarding whether the profile associated with the user is authorized to access the selected device. In one embodiment, a check is performed to ensure that the profile associated with the user is authorized to access the selected device. In one embodiment, the selected device includes an associated profile that lists the authorized profiles that are allowed to access this selected device.
In one embodiment, the user is asked to verify the passwords associated with the profile prior to gaining access to the selected device.
If the profile associated with the user is not authorized to access the selected device, then access to the selected device is denied in Block 625. In one embodiment, when access is denied to the selected device, information is not exchanged between the user associated with the profile and the selected device.
After access is denied in the Block 625, the device list is displayed in the Block 610.
If the profile associated with the user is authorized to access the selected device, then access that is restricted based on the location of the user associated with the profile is checked in Block 630.
If access to the selected device is not restricted based on the location of the user associated with the profile, then access to the selected device is granted to the user in Block 645. In one embodiment, access to the selected device by the user is restricted based on the assigned rights for the particular user and the selected device. In one embodiment, the selected device includes a profile that describes the access rights assigned to particular profiles.
If access to the selected device is restricted based on the location of the user associated with the profile, then the device utilized by the user is detected in Block 635. In one embodiment, the identity of the device utilized by the user is identified through a unique serial number associated with each device.
In one embodiment, the selected device includes a profile that describes the devices that are allowed to access the selected device. For example, in addition to restricting access to the selected device based on the user and the corresponding profile, the selected device may also limit access to the selected device from other predetermined devices. In this case, if the authorized user through the corresponding profile attempts to access the selected device through an unauthorized device, then access to the selected device is denied.
In Block 640, if the device is authorized to access the selected device, then access is allowed based on the assigned rights in the Block 645. If the device is not authorized to access the selected device, then access is denied by the Block 625.
The flow diagram in
In Block 710, a user accesses a user profile associated with the user. In one embodiment, the user identifies the user profile through a login identification. Further, the user authenticates authorization to the user profile by providing a predetermined password associated with the user profile. In one embodiment, the user may be associated with multiple user profiles.
In Block 720, a device is selected. In one embodiment, a device list is displayed to the user based on the user profile associated with the user.
In Block 730, an application list is presented. In one embodiment, the application list represents a listing of any available applications associated with the device selected in the Block 720. In one embodiment, there are multiple applications within the application list. In another embodiment, there is only one application within the application list.
In Block 740, an application from the application list is selected. The selected application is accessible from the selected device. In one embodiment, content within the selected device is viewable through the selected application. Other content that cannot be utilized through the selected application is not accessible on the selected device. For example, if the selected application is a music player that only works with audio files, then content within the selected device such as text files are not accessible through the selected device. Similarly, if the selected application on the selected device is an Oracle® application that interfaces with data tables, then image files (even stored on the selected device) is not accessible.
The foregoing descriptions of specific embodiments of the invention have been presented for purposes of illustration and description. The invention may be applied to a variety of other applications.
They are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed, and naturally many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5062060 | Kolnick | Oct 1991 | A |
5107443 | Smith et al. | Apr 1992 | A |
5430719 | Weisser, Jr. | Jul 1995 | A |
5491795 | Beaudet et al. | Feb 1996 | A |
5522025 | Rosenstein | May 1996 | A |
5577188 | Zhu | Nov 1996 | A |
5623603 | Jiang et al. | Apr 1997 | A |
5708780 | Levergood et al. | Jan 1998 | A |
5758110 | Boss et al. | May 1998 | A |
5760769 | Petrie | Jun 1998 | A |
5805846 | Nakajima et al. | Sep 1998 | A |
5844553 | Hao et al. | Dec 1998 | A |
5892511 | Gelsinger et al. | Apr 1999 | A |
5944791 | Scherpbier | Aug 1999 | A |
5987611 | Freund | Nov 1999 | A |
5995103 | Ashe | Nov 1999 | A |
6023730 | Tani | Feb 2000 | A |
6167432 | Jiang | Dec 2000 | A |
6223212 | Batty et al. | Apr 2001 | B1 |
6302698 | Ziv-El | Oct 2001 | B1 |
6308199 | Katsurabayashi | Oct 2001 | B1 |
6329984 | Boss et al. | Dec 2001 | B1 |
6343313 | Salesky et al. | Jan 2002 | B1 |
6567813 | Zhu et al. | May 2003 | B1 |
6570590 | Dubrow et al. | May 2003 | B1 |
6601087 | Zhu et al. | Jul 2003 | B1 |
6654032 | Zhu et al. | Nov 2003 | B1 |
6674992 | Helmick et al. | Jan 2004 | B2 |
6691154 | Zhu et al. | Feb 2004 | B1 |
6694379 | Hanko et al. | Feb 2004 | B1 |
6757733 | Gupta | Jun 2004 | B2 |
6763501 | Zhu et al. | Jul 2004 | B1 |
6788933 | Boehmke et al. | Sep 2004 | B2 |
6789119 | Zhu et al. | Sep 2004 | B1 |
6901448 | Zhu et al. | May 2005 | B2 |
6911987 | Mairs et al. | Jun 2005 | B1 |
6925645 | Zhu et al. | Aug 2005 | B2 |
6973482 | Mohammed et al. | Dec 2005 | B2 |
7028266 | Ben-Shachar et al. | Apr 2006 | B2 |
7069298 | Zhu et al. | Jun 2006 | B2 |
7089279 | Sakaguchi | Aug 2006 | B1 |
7130883 | Zhu et al. | Oct 2006 | B2 |
7203755 | Zhu et al. | Apr 2007 | B2 |
7249262 | Hauck et al. | Jul 2007 | B2 |
7266779 | Baek et al. | Sep 2007 | B2 |
7284203 | Meeks et al. | Oct 2007 | B1 |
7305365 | Bhela et al. | Dec 2007 | B1 |
7324804 | Hrastar et al. | Jan 2008 | B2 |
7392286 | Riddle | Jun 2008 | B2 |
7562226 | Aiken et al. | Jul 2009 | B2 |
20020165922 | Wei | Nov 2002 | A1 |
20020174181 | Wei | Nov 2002 | A1 |
20020194272 | Zhu | Dec 2002 | A1 |
20030048292 | Branson et al. | Mar 2003 | A1 |
20030084169 | Zhu et al. | May 2003 | A1 |
20030085922 | Wei | May 2003 | A1 |
20030164853 | Zhu et al. | Sep 2003 | A1 |
20030167301 | Zhu et al. | Sep 2003 | A1 |
20030167302 | Zhu et al. | Sep 2003 | A1 |
20030167304 | Zhu et al. | Sep 2003 | A1 |
20030167339 | Zhu et al. | Sep 2003 | A1 |
20030167418 | Zhu et al. | Sep 2003 | A1 |
20030182375 | Zhu et al. | Sep 2003 | A1 |
20030189601 | Ben-Shachar et al. | Oct 2003 | A1 |
20030206189 | DeMallo et al. | Nov 2003 | A1 |
20050033817 | Wei | Feb 2005 | A1 |
20050096048 | Clare et al. | May 2005 | A1 |
20050125560 | Brockway et al. | Jun 2005 | A1 |
20050132045 | Hornback et al. | Jun 2005 | A1 |
20050165859 | Geyer et al. | Jul 2005 | A1 |
20050174975 | Mgrdechian et al. | Aug 2005 | A1 |
20050246588 | Deng et al. | Nov 2005 | A1 |
20060010392 | Noel et al. | Jan 2006 | A1 |
20060015580 | Gabriel et al. | Jan 2006 | A1 |
20060026588 | Illowsky et al. | Feb 2006 | A1 |
20060053375 | Humpleman et al. | Mar 2006 | A1 |
20060073788 | Halkka et al. | Apr 2006 | A1 |
20060101098 | Morgan et al. | May 2006 | A1 |
20060161622 | Montgomery et al. | Jul 2006 | A1 |
20060168219 | Ahluwalia et al. | Jul 2006 | A1 |
20060253545 | Lakamp | Nov 2006 | A1 |
20060259953 | Earl et al. | Nov 2006 | A1 |
20070002367 | Yuan | Jan 2007 | A1 |
20070130289 | Defazio et al. | Jun 2007 | A1 |
20070180447 | Mazzaferri et al. | Aug 2007 | A1 |
Number | Date | Country |
---|---|---|
1 107 510 | Jun 2001 | EP |
Number | Date | Country | |
---|---|---|---|
20080021975 A1 | Jan 2008 | US |