UNINTERRUPTED USAGE AND ACCESS OF PHYSICALLY UNREACHABLE MANAGED HANDHELD DEVICE
First Claim
Patent Images
1. A computer-implemented method that is adapted to executed by a processor on a portable handheld device to perform the method, comprising:
- automatically detecting, without manual intervention, a text message, the text message having a predefined format with a predefined content, the text message also identified as being received from a remote and different device;
verifying, without manual intervention, the predefined content;
sending, without manual intervention, a secret to an email address associated with an owner of the portable handheld device;
receiving, without manual intervention, the secret in a second text message from the remote and different device, the second text message in the predefined format;
verifying, without manual intervention, the secret; and
instituting, without manual intervention, a predefined policy to forward information from the portable handheld device to the remote and different device.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for uninterrupted usage and access to physically unreachable handheld devices are provided. A physically unreachable handheld device includes an automated agent that is configured to authenticate a message received without manual intervention and to forward information from the handheld device to another remote and different handheld device.
-
Citations
24 Claims
-
1. A computer-implemented method that is adapted to executed by a processor on a portable handheld device to perform the method, comprising:
-
automatically detecting, without manual intervention, a text message, the text message having a predefined format with a predefined content, the text message also identified as being received from a remote and different device; verifying, without manual intervention, the predefined content; sending, without manual intervention, a secret to an email address associated with an owner of the portable handheld device; receiving, without manual intervention, the secret in a second text message from the remote and different device, the second text message in the predefined format; verifying, without manual intervention, the secret; and instituting, without manual intervention, a predefined policy to forward information from the portable handheld device to the remote and different device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method that is adapted to executed by a processor on a portable handheld device to perform the method, comprising:
-
receiving, at a portable handheld device, a message from a remote portable handheld device; inspecting the message and detecting an email address in the body of the message with special characters delimiting the email address; validating the email address is associated with an owner of the portable handheld device; sending a code to the email address; acquiring a second message having the code; and configuring the portable handheld device to forward subsequent incoming messages or voice calls to the remote portable handheld device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A machine-implemented system, comprising:
-
a portable handheld device; and an automated agent service implemented in a computer readable storage medium of the portable handheld device and to execute on one or more processors of the portable handheld device; wherein the agent service is configured to automatically detect predefined formatted instructions that activate the agent service on the portable handheld device and that instruct the portable handheld device to forward information from the portable handheld device to a remote portable handheld device. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A portable digital phone, comprising:
-
an automated agent service implemented in a computer-readable storage medium and adapted to execute on one or more processors of the portable digital phone; wherein the agent service is configured to operate without manual intervention, and wherein the agent service is to automatically detect an email address embedded in predefined characters as a text message sent to the portable digital phone over a wireless communication provider network, and in response to the email address the agent service generates a secret that is sent to the email address thereafter the agent service receives the secret as a second text message from a different digital phone and in response thereto the agent service forwards incoming information that is being received at the portable digital phone to the different digital phone. - View Dependent Claims (22, 23, 24)
-
Specification