Using a mobile phone to control a personal computer
First Claim
1. A method, comprising:
- establishing a communication protocol between a mobile phone and a computing device;
controlling the computing device via the mobile phone using the communication protocol, the controlling including controlling multiple applications on the computing device via a user interface of the mobile phone, the controlling further including enabling a user to dynamically define and change mapping relationships between one or more user interface elements of the mobile phone and control messages of each of the multiple applications utilizing a pop-up dialogue interface,wherein the mobile phone includes a help manual to assist the user in controlling at least one of the multiple applications on the computing device;
utilizing a phone number of the mobile phone as a unique identifier to authenticate an owner of the mobile phone on the computing device, the unique identifier further enabling the owner to share content with a user on a second computing device and enabling the owner to login to the second computing device to receive limited access to pre-designated files, applications, and other resources of the second computing device when the mobile phone is present and active; and
preventing the user from accessing the shared content on the second computing device when the mobile phone is not present and active.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for using a mobile phone to control a computing device. In one implementation, a communication protocol stack is established that includes a wireless layer, such as a BLUETOOTH wireless protocol (IEEE Standard 802.15.1) stack, a communication layer that multiplexes the wireless layer into virtual channels, and an application adaptation layer by which the mobile phone controls and previews content from each of multiple applications on the computing device. The communication protocol stack dynamically maps mobile phone keys to computer keyboard messages for controlling the applications on the computing device. A data packet structure is established for communications between the mobile phone and the computing device via the communication protocol stack.
-
Citations
21 Claims
-
1. A method, comprising:
-
establishing a communication protocol between a mobile phone and a computing device; controlling the computing device via the mobile phone using the communication protocol, the controlling including controlling multiple applications on the computing device via a user interface of the mobile phone, the controlling further including enabling a user to dynamically define and change mapping relationships between one or more user interface elements of the mobile phone and control messages of each of the multiple applications utilizing a pop-up dialogue interface, wherein the mobile phone includes a help manual to assist the user in controlling at least one of the multiple applications on the computing device; utilizing a phone number of the mobile phone as a unique identifier to authenticate an owner of the mobile phone on the computing device, the unique identifier further enabling the owner to share content with a user on a second computing device and enabling the owner to login to the second computing device to receive limited access to pre-designated files, applications, and other resources of the second computing device when the mobile phone is present and active; and preventing the user from accessing the shared content on the second computing device when the mobile phone is not present and active. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 20, 21)
-
-
16. A system, comprising:
-
a computing device; a mobile phone communicatively coupled with the computing device; a communication protocol stack in each of the computing device and the mobile phone, wherein the mobile phone controls each of multiple applications on the computing device via virtual channels of the communication protocol stack, the communication protocol configured to enable a user to dynamically define and change mapping relationships between one or more user interface elements of the mobile phone and control messages of each of the multiple applications utilizing a pop-up dialogue interface, wherein the mobile phone includes a help manual to assist the user in controlling at least one of the multiple applications on the computing device; and a second computing device communicatively coupled with the mobile phone, wherein a phone number of the mobile phone is utilized as a unique identifier to authenticate an owner of the mobile phone on the computing device, the unique identifier further enabling the owner to share content with a user on the second computing device and to enable the owner to login to the second computing device to receive limited access to pre-designated files, applications, and other resources of the second computing device when the mobile phone is present and active, the user not being able to access the shared content on the second computing device when the mobile phone is not present and active. - View Dependent Claims (17, 18)
-
-
19. A system, comprising:
-
a computing device; a mobile phone communicatively coupled with the computing device; a communication protocol stack in each of the computing device and the mobile phone, the communication protocol stack including a physical communication layer for providing a wireless link between the mobile phone and the computing device and a communication layer for communicating control data between the computing device and the mobile phone; an application adaptation layer included within the communication protocol stack for controlling each of multiple applications on the computing device via the control data from the mobile phone, the application adaptation layer configured to enable a user to dynamically define and change mapping relationships between one or more user interface elements of the mobile phone and control messages of each of the multiple applications utilizing a pop-up dialogue interface, wherein the mobile phone includes a help manual to assist the user in controlling at least one of the multiple applications on the computing device; and a second computing device communicatively coupled with the mobile phone, wherein a phone number of the mobile phone is utilized as a unique identifier to authenticate an owner of the mobile phone on the computing device, the unique identifier further enabling the owner to share content with a user on the second computing device and enabling the owner to login to the second computing device to receive limited access to pre-designated files, applications, and other resources of the second computing device when the mobile phone is present and active, the user not being able to access the shared content on the second computing device when the mobile phone is not present and active.
-
Specification