System and method for setting an alarm by a third party
First Claim
Patent Images
1. An alarm device, comprising:
- a processor;
an alerting component;
a communication interface to receive messages, the message encapsulating an alarm control message from a third party; and
an alarm application that, when executed by the processor, receives the message from the communication interface, validates the message based on a code embedded in the message, parses a body of the message to extract the encapsulated alarm control message, one of schedules and turns off an alarm event based on the body of the message, and activates the alerting component at the scheduled time when the alarm event occurs.
6 Assignments
0 Petitions
Accused Products
Abstract
An alarm device is provided. The alarm device comprises a processor, an alerting component, a communication interface, and an alarm application. The communication interface receives messages encapsulating an alarm control message from a third party. The alarm application, when executed by the processor, receives the message from the communication interface, validates the message based on a code embedded in the message, parses a body of the message to extract the encapsulated alarm control message, schedules an alarm event based on the body of the message, and activates the alerting component when the alarm event occurs.
24 Citations
20 Claims
-
1. An alarm device, comprising:
-
a processor; an alerting component; a communication interface to receive messages, the message encapsulating an alarm control message from a third party; and an alarm application that, when executed by the processor, receives the message from the communication interface, validates the message based on a code embedded in the message, parses a body of the message to extract the encapsulated alarm control message, one of schedules and turns off an alarm event based on the body of the message, and activates the alerting component at the scheduled time when the alarm event occurs. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer based method of setting an alarm by a third party, comprising:
-
receiving, by a computer, input defining an alarm event; formatting, by the computer, a message comprising a subject and a body, the subject embedding an authentication code, the body encapsulating information about the alarm event; and transmitting the message to a first alarm device, wherein the first alarm device is adapted to generate an alarm at a time based on specified in the message, wherein the alarm event is associated with a work schedule. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a method for setting an alarm by a third party, the method comprising:
-
providing a system, wherein the system comprises software modules, and wherein the software modules comprise a messaging module, a user interface module, and an alarm composition module; presenting a plurality of alarm composition controls to a display screen by the user interface module, wherein the alarm composition controls comprise a time of alarm activation; receiving alarm composition inputs from an input device by the user interface module; formatting a message subject comprising an authentication code by the alarm composition module; formatting a message body based on the alarm composition inputs by the alarm composition module; providing the message subject and the message body to the messaging module; and transmitting a message by the messaging module based on the message body and the message subject. - View Dependent Claims (18, 19, 20)
-
Specification