Automated mobile system
First Claim
1. An autonomous and programmable management system for a mobile device, comprising:
- a memory to store requests;
a scheduler to dynamically and proactively initiate and prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, or combinations thereof; and
a manager to automatically perform requests in real-time, wherein said manager performs at least one request without prompting for user input; and
wherein the manager performs automated security procedure including;
detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;
wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;
wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;
wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;
wherein upon confirmation of breach, protection is performed;
wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and
wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
An automated mobile assistant system provides automated, proactive and anticipatory services for the user of the system. A scheduling system for a mobile device is described and can include a memory to store calendar events and a scheduler to automatically organize the events based on at least one of temporal, geographical, contextual availability, user-preference, past activities, usage pattern, proximity to other users or events, or combinations thereof. In an example, a customizable personal mobile device for communication and organization can include a core engine and a plurality of modules coupled to the core engine to perform a different one of a plurality of classes of functionality of the mobile device, where each said module includes a processing element and memory dedicated for use by said module. A time-based intelligence system provides robust storage, access, and processing of information on a mobile device.
169 Citations
47 Claims
-
1. An autonomous and programmable management system for a mobile device, comprising:
-
a memory to store requests; a scheduler to dynamically and proactively initiate and prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, or combinations thereof; and a manager to automatically perform requests in real-time, wherein said manager performs at least one request without prompting for user input; and
wherein the manager performs automated security procedure including;
detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification, wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user; wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;
wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and
wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A mobile device, comprising:
-
at least one processing element, at least one memory element operably connected to the processing element, a display, and a programmable management system; wherein the programmable management system performs dynamic and proactive scheduling to initiate and to prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, proximity to other users or events, or combinations thereof, and to automatically perform said requests in real-time, wherein said management system initiates and performs services on behalf of the user of an electronic mobile device, wherein the management system is to process at least one request in the background without prompting user input, wherein said device performs automated security procedure including;
detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;
wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user; wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;
wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and
wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user.- View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A mobile device, comprising:
-
at least one processing element, at least one memory element operably connected to the processing element, a display, and a programmable management system;
wherein the programmable management system performs user-defined and automated services, consisting of automated information access, event and appointment scheduling, ordering, reservation, account inquiry and payment, and combinations thereof proactively and in real-time, wherein the management system is to process at least one request in the background without prompting for user input,wherein the device performs automated security procedure including;
detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification, wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user; wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;
wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and
wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A mobile device, comprising:
-
at least one processing element, at least one memory element operably connected to the processing element, one or more of a display, a camera, environmental sensors, and biological sensors, and wherein the device performs automated security procedure including;
detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification, wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user; wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;
wherein upon confirmation of breach, protection is performed;wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and
wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification