The present invention relates to a modified formula for making a hydrophilic foam which uses fillers or additives to enhance certain features of the hydrophilic foam. Smart phones are everywhere. People rely on them to communicate with others, search for information, take and store pictures, store music, and store other important information on them. As a result, people rely on them for many of the activities during the day. Depending on use of the smart phone on a particular day, there may not be sufficient power to run the smart phone all day. While the batteries are getting better, there may times that the batteries are not sufficient and the phone “may die.” This may be as a result of the amount of use and nowhere to charge them, or the battery may be older and not hold a sufficient charge. Simply, it could be just from spending too much time on the phone. Thus, the smart phone owners may find themselves without an operating phone. This could be an issue if the person needs to make a call (emergency?). Naturally, the owners could borrow someone else's phone to make a call, but that would mean that owner would have to remember the telephone number they wanted to call! With ability to store people's phone numbers and ask the phone to call a person, rarely do people need to remember phone numbers.
Additionally, if an owner needs to replace a phone because it was lost, stolen or broken, then the owner may be without a telephone for a day or more (insurance may need to send the owner a refurbished phone). If the phone is used for business, that may not work.
The system also allows access to one's smart phone when the phone is located somewhere else, e.g., it has been stolen or lost. The contents of the telephone may be accessed from a prior storage session and the phone may be accessed remotely to employ a number of actions. For example, the lost/stolen phone may be accessed (even it is turned off), to send a location or pictures or sounds to help find the phone. The phone may also be remotely locked or deleted. The phone may also have certain functions that are either limited or blocked altogether.
A system has been designed that allows a smart phone user to access the owner's own stored information from another person's telephone or other connected device without any effect to the other person's device.
The present invention is directed to a method of communicating with a contact person from a secondary communication device that includes the steps of displaying, in response to an inquiry, previously stored contact information that may include contact information about the contact person on the secondary communication device, the secondary communication device not having the previously stored contact information, providing at least one option to communicate with the contact person, initiating the communication with the contact person based on a selection of a communication option, and transmitting the communication to the contact person from the secondary communication device.
In some embodiments, the option provided is based on the previously stored contact information for the contact person.
In some other embodiments, the secondary communication device is one of a computer, a tablet, a telephone, and a kiosk.
In another embodiment, there is a method of controlling a first mobile device through a second mobile device that includes the steps of displaying, in response to an inquiry, at least some previously stored information from the first mobile device, the second mobile device not having the previously stored contact information, providing access to the first mobile device, and controlling the first mobile device in response to input from the second mobile device.
It is to be understood that both the foregoing general description and the following detailed description of the present embodiments of the invention are intended to provide an overview or framework for understanding the nature and character of the invention as it is claimed. The accompanying drawings are included to provide a further understanding of the invention, and are incorporated into and constitute a part of this specification. The drawings illustrate various embodiments of the invention and, together with the description, serve to explain the principles and operations of the invention.
The present invention relates to a modified formula for making a hydrophilic foam which used fillers or additives to enhance certain features of the hydrophilic foam. In some embodiments the modified formula makes the hydrophilic foam less absorptive and therefore makes available more of the material which was absorbed by the foam. In other embodiments the modified formula makes the hydrophilic foam easier to clean and reduces the staining propensity of the foam. In other embodiments additives are included to enhance the foam or the experience of using the foam. Reference will now be made in detail to the present preferred embodiment(s) of the invention, examples of which are illustrated in the accompanying drawings. Whenever possible, the same reference numerals will be used throughout the drawings to refer to the same or like parts.
A plurality of devices, including a telephone, a smart phone of the user 32, a desk top computer 34, a tablet/phone 36, a second phone (generally the secondary communication device) 38, and a kiosk 40 may also be connected to the IT structure 20 through the network 30 as allowed by the provider's computer 22 through the server 24. Any number of computers/tablets/phones 32,34,36,38,40 may be connected to the system 10 through the network 30.
As illustrated in
Turing now to
For those users who have already signed up, the user selects the sign in selection 104. An exemplary screen 116 is illustrated on a screen of the phone 32 in
Returning to
At 134, the new user is prompted to upload all of the contacts that are on the phone 32. See
As noted above, the system 10 is particularly useful when the user does not have access to the phone 32, but needs to make contact with one of the contacts. This could happen because the phone 32 has a dead battery, is broken, is lost or misplace, or has been stolen. If the user of phone 32 needs to communicate with one of the contacts, the user would be unable to in this scenario. The user may be able to find a payphone (although the number of payphones in the US are decreasing significantly) or borrow someone else's phone, but the user needs to know what number to call. Given that most smartphones do not require the user to know a person's phone number to communicate with the contacts stored on a phone, most people are not familiar with the phone numbers of their contacts. Thus, having another phone is typically not very helpful if the owner of the other phone does have the contact information needed. Thus, having access to the user's contact information is important.
The user of the now dead/lost/stolen phone 32 can use another mobile device 34,36,38,40 (computer, another smartphone, tablet, etc.) as a secondary communication device and login to the app controlled by system 10. The user could log-in by first downloading the app to the secondary communication device or login to the website controlled by the system 10. The user would then follow the sign-in 104 button after inputting the email address in box 118 and password in box 120. The user will see the same screen as in
If there is an email address for a user that is selected from the list of contacts 140, the user is also presented with an email message (button 150) in addition to the other methods as illustrated in
As illustrated in
As noted before, the user could download the contacts to another device by using the button 138 as illustrated in
When the user places a phone call (Free Audio Call (button 142) or a Free Video Call (button 144), or make a Phone Call (button 146)), the secondary communication device will show that the call is being connected as illustrated in
After the phone calls, messages are sent, the secondary communication device will have a screen such as that illustrated in
The user may also download a virtual image of the user's phone 32 to the system 10. Upon signing in at 104, there are a number of options available to the user. As noted above the Open Contacts 138 is available. That is available to the user when the phone 32 is dead, lost, or stolen.
In the event that the phone 32 is lost or may have been stolen, the user can opening the Locate My cell phone 160 portion of the system. The user can select the GPS portion 162 whereby the system 10 will contact the phone 32 through accessing the native operating system of the phone and it will be able to locate the coordinates of the phone 32 by triangulation of the phone 32 with the cell towers. Alternatively, the system 10 can have the phone 32 share its location by sending a signal back to the system 10 using the phone's share location feature. Finally under this Locate My cell phone selection, the system 10 can, in response to the user making a requested at 166, cause the phone 32 to emit a loud signal or alarm. This would be particularly useful if the user lost the phone recently or misplaced it at an enclosed location (house or office) so that the user would be able to hear the alarm.
Another option available to the user is the Lock My Cell Phone option 170. If the user selects this option, then the system 10 would send a signal to the phone 32 through the native operating system of the phone to lock it, thereby preventing others from being able to access the contents of the phone 32. Again, this would need to be done quickly as most phones are set to lock after a predetermined time. Thus, this option is most useful when that time is relatively long or the phone 32 has not been missing for too long. If the phone has been stolen and the thief has been able to keep the phone from locking, then this option may be of greater benefit.
Disable My Apps 180 is another option that is available. This option closes any applications that are open on the phone 32, preventing someone from accessing data or other information that may be sensitive or preferably not shared with someone. This would be useful if personal apps are used on a business issued phone and the user does not want the boss to have access to the information. The closed apps would need to have a password to be able to reopen them. This is also useful if the phone is stolen, preventing the thief from accessing personal information while still allowing the phone to provide its location through the Locate My Cellphone option 160.
The Turn on My Camera option 188 and the Turn on My Mic option 190 are closely related. The Turn on My Camera option 188 allows the user to see where the phone 32 is located (or perhaps who has the phone). The Turn on My Mic option 190 allows the user to hear, again all through the secondary communication device, the sounds of where the phone is located. It may be possible for the user to identify the location from the pictures or the sound. The images and sounds can be recorded on the phone 32 or the secondary communication device by use of these options.
The screen mirroring option 200 allows the user to see what is being done on the phone 32 from the secondary communication device. Through the secondary communication device, the user will be able to “see” what changes are made to the screen while connected.
A more drastic option is available with the Fry My Phone option 210. This option allows the system in response to the user's request to reset the phone 32 to the factory settings, essentially rendering the phone 32 useless.
A final option, which has a number of sub-options is the MyLife option 220, which allows the user to remotely access and operate other apps and functions on the phone 32. Again, after signing in, the user is able to select MyLife 220, which then provides access to the user's social media feeds 222 (Snapchat, Instagram, Twitter, etc.), car rides and sharing 224, important documents 226 (copies of passport and birth certificates; business documents; etc.), banking apps 228 (WellsFargo, BOA, etc.), and the Internet of Things through any of the home assistants (Echo devices, Google Home, HomePod, etc.)
In each of these areas of MyLife 220, the user will be able to operate each of the options as if the user had the phone 32 in their hand. Naturally, if the phone has been stolen, it would not be advisable to try and use these options without knowing that the phone is safe and secure. If the phone 32 has simply died, then the user could operate these apps and functions with a peace of mind. Again, once the user logs out on the secondary communication device, then the content is erased from the secondary communication device and the user need not worry about the owner of the secondary communication device being able to access the information viewed on that device.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit and scope of the invention. Thus it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.
This application is a continuation application of U.S. Non-Provisional patent application Ser. No.: 16/386,161, filed Apr. 16, 2019 and titled “System and Method for Using a Secondary Device to Access Information Stored Remotely,” which claims priority to U.S. Provisional Application No.: 62/761,980, filed on Apr. 16, 2018. The contents of the above-identified Applications are relied upon and incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
7623854 | Satoh | Nov 2009 | B2 |
8855601 | Grkov | Oct 2014 | B2 |
9746999 | Kurihara | Aug 2017 | B2 |
10417020 | Desai | Sep 2019 | B2 |
10868902 | Durrani | Dec 2020 | B2 |
11032285 | Handler | Jun 2021 | B2 |
20030054860 | Chen | Mar 2003 | A1 |
20030104833 | Chiu | Jun 2003 | A1 |
20090197579 | Celik | Aug 2009 | A1 |
20090221264 | Minami | Sep 2009 | A1 |
20100138298 | Fitzgerald | Jun 2010 | A1 |
20100203874 | Scott | Aug 2010 | A1 |
20100227605 | Fournier | Sep 2010 | A1 |
20110047033 | Mahaffey | Feb 2011 | A1 |
20120188064 | Mahaffey | Jul 2012 | A1 |
20120196571 | Grkov | Aug 2012 | A1 |
20120216292 | Richardson | Aug 2012 | A1 |
20130237204 | Buck | Sep 2013 | A1 |
20140057608 | Hillier | Feb 2014 | A1 |
20140058951 | Kuppuswamy | Feb 2014 | A1 |
20140245014 | Tuck | Aug 2014 | A1 |
20140274008 | Olodort | Sep 2014 | A1 |
20150042575 | Dong | Feb 2015 | A1 |
20150227116 | Ronkainen | Aug 2015 | A1 |
20150372981 | Cohan | Dec 2015 | A1 |
20160066189 | Mahaffey | Mar 2016 | A1 |
20170026316 | Li | Jan 2017 | A1 |
20170099386 | Weber | Apr 2017 | A1 |
20170142090 | Mahaffey | May 2017 | A1 |
20180206124 | Mahaffey | Jul 2018 | A1 |
20190182678 | Kikinis | Jun 2019 | A1 |
20190279317 | Burton | Sep 2019 | A1 |
20190279744 | Howley | Sep 2019 | A1 |
20190320052 | Durrani | Oct 2019 | A1 |
20190342759 | Mahaffey | Nov 2019 | A1 |
20210051225 | Durrani | Feb 2021 | A1 |
20220029882 | Sarukkai | Jan 2022 | A1 |
Number | Date | Country | |
---|---|---|---|
20210051225 A1 | Feb 2021 | US |
Number | Date | Country | |
---|---|---|---|
62761980 | Apr 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16386161 | Apr 2019 | US |
Child | 17089857 | US |