« PreviousContinue »
508 / 506 504 /'r’/' 4 / ' I’ //I / /¢,/ Authenticator Mobile device /' rt Authentication ,/ / message receiver information storer 500 502 personalized service command personalized /'17” service command receiver service command ' macro executor macro storer
1 CUSTOMIZABLE MOBILE MESSAGE SERVICES
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to mobile message services. More particularly, the present invention relates to customizable mobile message services.
2. Description of the Related Art
Mobile messaging protocols, such as Short Message Service (SMS) are utilized to allow mobile devices, such a personal data assistants (PDAs) and cell phones, to send textbased messages to one another. Various server-based services have also been introduced that allow users to send text messages to the service and receive responses with relevant information. For example, a user can type an SMS message saying “s restaurants” and send it to a service provider. A list of restaurants in the user’ s area may then be returned via an SMS message.
In one embodiment, a method includes: receiving, at a mobile device, a first service command and a second service command; sending the first service command from the mobile device to a server; sending the second service command from the mobile device to a server; receiving, at the mobile device, first service results corresponding to the first service command; receiving, at the mobile device, second service results corresponding to the second service command; combining the first service results with the second service results; and displaying the combined service results on the mobile device.
In another embodiment, an apparatus includes: a service command receiver; a personalized service command macro storer coupled to the service command receiver and to a memory; an authentication information storer coupled to the memory; a mobile device message receiver; an authenticator coupled to the mobile device message receiver and to the memory; and a personalized service command macro executor coupled to the authenticator and to the memory.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a screen capture illustrating an example of a server-side implementation in accordance with an embodiment of the present invention.
FIG. 2 is a flow diagram illustrating a method for executing client- side macros in accordance with another embodiment of the present invention.
FIG. 3 is a block diagram illustrating a method for executing server-side macros in accordance with an embodiment of the present invention.
FIG. 4 is a block diagram illustrating an apparatus in accordance with an embodiment of the present invention.
FIG. 5 is a block diagram illustrating an example apparatus in accordance with various embodiments of the invention.
FIG. 6 is a block diagram illustrating an example network environment in which various embodiments may be implemented.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Reference will now be made in detail to specific embodiments of the invention including the best modes contemplated
by the inventors for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying drawings. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims. In the following description, specific details are set forth in order to provide a thorough understanding of the present invention. The present invention may be practiced without some or all of these specific details. In addition, well known features may not have been described in detail to avoid unnecessarily obscuring the invention.
In accordance with the present invention, the components, process steps, and/or data structures may be implemented using various types of operating systems, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein.
According to various embodiments of the present invention, users are provided with the ability to create personalized “macros” or programs to execute a customized set or sequence of services. This allows users to set their own programs to perform the common tasks that are of primary importance to the user, as opposed to relying on a service provider to create programs that are only important to a large number of users.
The present invention may be implemented in at least two different ways. In one embodiment, client-side macros are enabled. Here, the service provider may provide a common set of functions that can be performed independently or can be performed in sequence where the results of one operation can be applied to a subsequent operation. Thus, rather than a user being able to only search on restaurants, the user may combine multiple queries into one operation and type, for example, “s japanese restaurant, sanjose, ca 1 d 1 top 10”. In this example, the service provider would then search for Japanese restaurants in San Jose and get directions (:d) for each of the restaurants, returning only the top 10 results. In another example, a user may type “s flight 90 american airline arrival time I c est 1 cal” and get the arrival time for a flight converted to eastern time. In another example, a user may type “s Dr. Smith, Cupertino, A I a contact” and search for information on Dr. Smith and add the listing to contacts.
In another embodiment, server-side macros are enabled. Here, the service provider may provide an interface, such as a website, which the user may use to define macros. These macros are linked to the particular user, thus when a mobile message is received from the user, the macros linked for that user may be used. In this embodiment, security may be provided to keep other users from accessing the user’s macros. This is especially important if, for example, the user defines macros that access sensitive information, such as bank account records or medical files.
Security may be provided using some sort of identification in the mobile message as well as a password or other authentication scheme. For example, a user name and password may
be embedded into the mobile message. Alternatively, digital certificates or biometrics (such as fingerprint scans) can be used.
In various embodiments, a number of commands may be applied to result sets, including, but not limited to: Regular Expression Sort Truncate Union Intersection Unique Group By If/then/else Loops (While/for/do-While) String operations such as
translate (to different languages)
reverse Mathematical functions such as
base n conversion
Various phone specific functions may also be executed, such as
Other example services include:
find loWest price for item
query yahoo ansWers
get nearest store/restaurant
get sports score updates
get financial information
stock PE/Earnings or other information
convert betWeen currency, units (pint->liters, lbs->kilos)
hotjobs (job listings/search)
get information on music (artist/ lyrics)
bid on auctions/price Watch on auction
FIG. 1 is a screen capture illustrating an example of a server-side implementation in accordance With an embodiment of the present invention. A search 100 is performed through tWo different search services 102, 104, and the results are passed through a filter 106. In this example, the macro is created using a graphical user interface that alloWs the various commands and services to be linked using graphical “pipes.”
FIG. 2 is a floW diagram illustrating a method for executing client-side macros in accordance With an embodiment of the present invention. Each of the steps illustrated in FIG. 2 may be performed by a mobile device or by softWare/hardWare associated With a mobile device. At 200, a first service com
mand, a second service command, and/or a first filtering command are received at a mobile device. At 202, the first service command is sent to a server. At 204, the second service command is sent to a server. This may or may not be the same server that the first service command Was sent to in step 202. Specifically, an embodiment is envisioned Wherein service commands are sent to different service providers and the results from the disparate service providers are combined. At 206, first service results corresponding to the first service command are received. At 208, second service results corresponding to the second service command are received. At 210, the first filtering command may be applied to the first service results. At 212, the first service results are combined With the second service results. At 214, the combined service results are displayed on the mobile device. It should be noted that the order in Which these steps are presented in FIG. 2 does not necessarily reflect the order that the steps are executed. For example, embodiments are envisioned Wherein step 206 is performed before step 204.
FIG. 3 is a floW diagram illustrating a method for executing server-side macros in accordance With another embodiment of the present invention. At 300, a first service command and a second service command are received, at a server, from a user. This may be received from the user via a mobile device. At 302, the first service command and the second service command are stored as a personalized service command macro corresponding to the user. At 304, first authentication information corresponding to the user is stored. At 306, a message, such as an SMS message, is received from a mobile device, Wherein the message includes second authentication information and an identification of the user. At 308, the personalized service command macro is executed and results of the service are returned to the mobile device if the second authentication information matches the first authentication information.
FIG. 4 is a block diagram illustrating an apparatus in accordance With an embodiment of the present invention. This apparatus may be included as softWare or hardWare on a mobile device that also includes a display and a processor. A service command receiver 400 may perform steps 200 and 202 of FIG. 2. A service command sender 402 coupled to the service command receiver 400 may perform steps 204 and 206 of FIG. 2. A service result combiner 404 may perform step 212 of FIG. 2. A service result displayer 406 coupled to the service result combiner 404 may perform step 214 of FIG. 2.
FIG. 5 is a block diagram illustrating an apparatus in accordance With an embodiment of the present invention. This apparatus may be included as softWare or hardWare on a server that also includes a processor. A service command receiver 500 may perform step 300 of FIG. 3. A personalized service command macro storer 502 coupled to the service command receiver 500 and to a memory (not pictured as it may or may not be part of the apparatus) may perform step 302 of FIG. 3. The memory may be, for example, a database. An authentication information storer 504 coupled to the memory may perform step 304 of FIG. 3. A mobile device message receiver 506 may perform step 306 of FIG. 3. An authenticator 508 coupled to the mobile device message receiver 506 and to the memory may perform the authentication aspects of step 308 of FIG. 3. A personalized service command macro executor 510 coupled to the authenticator 508 and to the memory may perform service execution and results returning of step 310 of FIG. 3.
It should also be noted that embodiments of the present invention may be implemented on any computing platform and in any netWork topology in Which presentation of service