Method and apparatus to remotely set alarms on a mobile device
First Claim
1. A method for a mobile phone to set an alarm based on an external request, comprising:
- receiving the external request to create the alarm on the mobile phone, the external request including a set of one or more parameters at least partially defining the alarm and a set of one or more actions to take upon the alarm triggering;
upon determining that the external request is trusted, automatically setting the alarm on the mobile phone according to the set of parameters included in the request, wherein the alarm cannot be modified by the mobile phone after the setting unless in response to another external request; and
upon the alarm triggering, performing the set of actions included in the request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for a mobile device to set an alarm based on an external request is described. In one embodiment of the invention, the mobile device receives the external request which includes a set of one or more parameters at least partially defining the alarm and a set of one or more actions to take upon the alarm triggering. Upon determining that the external request is trusted, the mobile device automatically sets the alarm on the mobile device according to the set of parameters included in the request. Upon the alarm triggering, the mobile device performs the set of actions included in the external request. Other methods and apparatuses are also described.
-
Citations
54 Claims
-
1. A method for a mobile phone to set an alarm based on an external request, comprising:
-
receiving the external request to create the alarm on the mobile phone, the external request including a set of one or more parameters at least partially defining the alarm and a set of one or more actions to take upon the alarm triggering; upon determining that the external request is trusted, automatically setting the alarm on the mobile phone according to the set of parameters included in the request, wherein the alarm cannot be modified by the mobile phone after the setting unless in response to another external request; and upon the alarm triggering, performing the set of actions included in the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A mobile phone to set an alarm based on an external request, comprising:
-
a messaging module to receive the external request, the external request to include a set of one or more parameters at least partially defining the alarm and a set of one or more actions to take upon the alarm triggering; a security module coupled with the messaging module, the security module to authenticate the external request; and an alarm module coupled with the messaging module, the alarm module including, an alarm creation module to create the alarm in accordance with the external request, an alarm trigger detection and action module to detect whether to trigger the alarm, and to perform the set of actions upon determining to trigger the alarm, and a clear alarm module to detect whether to clear the alarm and to clear the alarm, wherein the alarm cannot be modified by the mobile phone after the creating. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory machine-readable storage medium that provides instructions that, if executed by a processor, will cause said processor to perform operations for a mobile phone to set an alarm based on an external request, comprising:
-
receiving the external request to create the alarm on the mobile phone, the external request including a set of one or more parameters at least partially defining the alarm and a set of one or more actions to take upon the alarm triggering; upon determining that the external request is trusted, automatically setting the alarm on the mobile phone according to the set of parameters included in the request, wherein the alarm cannot be modified by the mobile phone after the setting unless in response to another external request; and upon the alarm triggering, performing the set of actions included in the request. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for a computing device to remotely set an alarm on a mobile phone, comprising:
-
selecting one or more alarms to set on the mobile phone; defining one or more actions for the mobile phone to perform upon at least some of the one or more alarms triggering; configuring an alarm request message to include the selected alarms and defined actions, wherein the selected alarms included in the alarm request message cannot be modified by the mobile phone; adding security information to the alarm request message; and transmitting the alarm request message to the mobile phone. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41)
-
-
42. A computing device to remotely set an alarm on a mobile phone, comprising:
-
a user interface to allow a user of the computing device to select the alarm to set on the mobile phone and to select one or more actions the mobile phone is to take upon the alarm triggering; a remote alarm module coupled with the user interface, the remote alarm module to create an alarm request message including the alarm and actions, wherein the alarm included in the alarm request message cannot be modified by the mobile phone; a security module to add security data to the alarm request message; and a messaging module coupled with the security module, the messaging module to transmit the alarm request message to the mobile phone. - View Dependent Claims (43, 44, 45, 46)
-
-
47. A non-transitory machine-readable storage medium that provides instructions that, if executed by a processor, will cause said processor to perform operations for a computing device to remotely set an alarm on a mobile phone, comprising:
-
selecting one or more alarms to set on the mobile phone; defining one or more actions for the mobile phone to perform upon at least some of the one or more alarms triggering; configuring an alarm request message to include the selected alarms and defined actions, wherein the selected alarms included in the alarm request message cannot be modified by the mobile phone; adding security information to the alarm request message; and transmitting the alarm request message to the mobile phone. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54)
-
Specification