Title of Invention

METHOD FOR ACCESSING AND CONTROLLING A REMOTE MOBILE DEVICE

Abstract The present invention, in general, relates to remote mobile device access and control. More importantly, this invention relates to a generic approach to provide remote mobile device access adn control. This invention explains a method to provide remote mobile device access and control comprising a mobile device user accessing his mobile device at a remote place using remote mobile device access and control arthitecture which allows the said mobile device user to access his mobile device application and mobile device data.
Full Text FORM 2
THE PATENTS ACT, 1970 [39 of 1970]
& THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(Section 10; Rule 13)
A GENERIC APPROACH TO PROVIDE REMOTE MOBILE DEVICE ACCESS
AND CONTROL
SAMSUNG INDIA SOFTWARE OPERATIONS PVT. LTD.,
BAGMANE LAKEVIEW, BLOCK 'B1,
No. 66/1, BAGMANE TECH PARK,
C V RAMAN NAGAR,
BYRASANDRA,
BANGALORE - 560093
A wholly owned subsidiary
of Samsung Electronics Company Limited, Korea,
an Indian Company
The following Specification particularly describes the invention and the manner in which it is to be performed

FIELD OF INVENTION
The present invention, in general, relates to remote mobile device access and control. Further, this invention relates to a generic approach to provide remote mobile device access and control. This invention talks about speech recognition an upcoming area in mobile device access and control approach. It suggests remote mobile device access and control. This invention uses remote mobile device access and control framework and speech recognition area text to speech and speech to text to support remote mobile device access and control and remove the limitation felt in mobile device access and control approach.
DESCRIPTION OF RELATED ART
This section talks about mobile device access and control approach. Mobile device access and control approach refer to how mobile devices are accessed and controlled by a user.
For mobile devices to be accessed and controlled by user, there is a need of human interference between user and mobile device.
Mobile device access and control approach consist of following component
§ User
§ Mobile device
o Mobile application

o Mobile data
§ Human interference
o Hand interference
o Speech interference
For mobile device access and control approach, the physical proximity between user mobile device and human interference is mandatory.
Physical proximity between user, mobile device and human interference make possible interaction between user, mobile device, mobile application and mobile data.
Mobile device access and control approach is based on human interference and allow user to access and control mobile device, mobile application and mobile data.
Human interference
§ Base for mobile device access and control approach
§ Base for interaction between user and mobile device
§ Exist between user and mobile device
§ Make mobile device, mobile application, mobile data to be of any use to user
Structure or Step(s) of Related Art

Structure of related art talks about how mobile device access and control work to allow user access to mobile device by human interference.
Figure 3.1.1 represent steps to mobile device access and control o User
§ User is one component of mobile device access and control
§ User component interact with human interference component
§ User component use one of human interference component types

• Hand interference
• Speech interference
■ User component use human interference component types to
make interaction between user and human interference
o Human interference
§ Human interference is one component of mobile device access and control
§ Human interference component interact with mobile device component
§ Human interference component use one of mobile device component types

• Mobile application
• Mobile data
■ Human interference component use mobile device

component types to make interaction between human interference and mobile device
o Mobile device
§ Mobile device is one component of mobile device access and control
§ Mobile device component interact with human interference component
§ Mobile device component use one of the human interference component types

• Hand interference
• Speech interference
• Mobile device component use human interference
component types to make interaction between mobile
device and human interference
The operation of the related art (below) shows the manner of working of mobile device access and control.
§ User
o User component of mobile device access and control
■ Interact with human interference
o User component of mobile device access and control is
■ In physical proximity

• Human interference
• Mobile device
o Example
■ User use his mobile device
o Contradicting situations
■ User can not access and control mobile device in absence of
user, human interference and mobile device when they are
not in physical proximity of each other Human interference
o Human interference component of mobile device access and control
■ Interact with mobile device
o Human interference component of mobile device access and control is
■ In physical proximity
• Mobile device
• User
o Example
■ Dial phone number
o Contradicting situations
■ User can not access and control mobile device in absence of
user, local human interference and mobile device when they
are not in physical proximity of each other
Mobile device

o Mobile device component of mobile device access and control
■ Interact with human interference
o Mobile device component of mobile device access and control is
■ In physical proximity
• Human interference
• User
o Example
■ Human interference is involved between client and mobile
device
o Contradicting situations
■ User can not access and control mobile device in absence of
user, local human interference and mobile device when they
are not in physical proximity of each other
The limitations of the related art (below) outlines the problems in mobile device access and control in the existing technology.
Mobile device access and control is limited to physical proximity of user, human interference and mobile device
Example
§ To make call there should be physical proximity of user, human interference and mobile device
§ To send SMS there should be physical proximity of user, human interference and mobile device

■ Etc...
Mobile device user is paralyzed if not carrying mobile device and need to access
o Mobile device
§ Mobile application
§ Mobile data
User can not access remotely mobile device, mobile application and mobile data
SUMMARY OF THE INVENTION
The generic approach suggests remote mobile device access and control.
The generic approach proposed in this invention uses remote mobile device access and control and speech recognition area text to speech and speech to text to support remote mobile device access and control and remove the limitation felt in mobile device access and control approach.
The generic approach suggests remote mobile device access and control that allow local and remote mobile device access simultaneously.
Accordingly, this invention explains a method to provide remote mobile device access and control comprising a mobile device user accessing his mobile device at a remote place using remote mobile device access and control architecture

which allows the said mobile device user to access his mobile device application and mobile device data.
The mobile device user establish communication link with his remote mobile device using other mobile device or landline phone. The remote mobile device access and control architecture consist of authentication layer for allowing only authorized mobile device user to establish communication link with his mobile device at remote location from any mobile device or landline phone based on missed call count as password and DTMF password. Mobile device access and control architecture consist of remote engine start which enable to start remote finite state manager once authentication is success and does all initializations required to bring up mobile device access and control architecture. Mobile device access and control architecture consist of remote finite state manager start which bring up remote finite state manager and maps mobile device as finite state machine that is controlled by remote finite state manager and has state queue which receive state event and process state event and at a given time mobile device will be in any one of the state as state idle, state instruction, state command or state end. The remote finite state manager provides a speech interface and a DTMF key input for mobile device user to interact with his remote mobile device. State idle is the default state of remote finite state manager where there will be no pending event in state event queue. State instruction is the instruction state of remote finite state manager where remote finite state manager reads remote XML predefined instruction file. The state command is command state of remote finite state manager where the finite state manager reads remote

XML command file. State end is end state of remote finite state manager where remote finite state manager will end the remote finite state manager.
Accordingly, this invention explains a method to provide remote device access and control comprising an other device user accessing his other device at a remote location using remote other device access and control architecture which allows the said other device user to access his device application and device data.
These and other objects, features and advantages of the present invention will become more apparent from the ensuing detailed description of the invention taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
Figure 3.1.1 illustrates mobile device access and control
Figure 5.1 illustrates remote mobile device and access control
Figure 5.2 illustrates remote other devices access and control
Figure 5.3.1 is a structure of the invention for remote mobile access and control
Figure 5.3.2 is a structure of the invention for remote other devices and control

DETAILED DESCRIPTION OF THE INVENTION
The preferred embodiments of the present invention will now be explained with reference to the accompanying drawings. It should be understood however that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. The following description and drawings are not to be construed as limiting the invention and numerous specific details are described to provide a thorough understanding of the present invention, as the basis for the claims and as a basis for teaching one skilled in the art how to make and/or use the invention. However in certain instances, well-known or conventional details are not described in order not to unnecessarily obscure the present invention in detail.
Mobile device access and control (Approach to remove limitation felt in mobile device access and control)
o Remote mobile device access and control
■ User
• Allow user to access mobile device remotely
■ Remote mobile device access and control architecture
• Allow user to access mobile device without physical
interference between user and mobile device
■ Mobile device
• Mobile application
• Mobile data

Remote mobile device access and control is shown in Figure 5.1
Other devices access and control (Approach to remove same limitation felt in other devices access and control)
o Remote other devices access and control
■ User
• Allow user to access other devices remotely
■ Remote other devices access and control architecture
• Allow user to access other devices without physical
interference between user and other devices
■ Other devices
• Other devices application
• Other devices data
■ Remote other devices access and control is shown in Figure
5.2
The primary objective of this invention is to remove the limitations in mobile device access and control and can be applied in other devices to overcome similar limitations.
Mobile device access and control (Approach to remove limitation felt in
mobile device access and control)
This section talks about why suggested remote mobile device access

and control required under mobile device access and control. Mobile device access and control is limited to physical proximity of user, human interference and mobile device and there are no mobile device access and control that can be used to remove limitation felt in mobile device access and control as mentioned above. Remote mobile device access and control remove limitation felt in mobile device access and control. Keeping above mentioned points the approach is suggested.
§ Other devices access and control (Approach to remove same limitation felt in other devices access and control)
This section talks about why suggested remote other devices access and control required under other devices access and control. Other devices access and control is limited to physical proximity of user, human interference and other devices and there are no other devices access and control that can be used to remove limitation felt in other devices access and control. Remote other devices access and control remove limitation felt in other devices access and control. Keeping above-mentioned points the approach is suggested.
Structure of the Invention
This section explains the structure of generic approach to overcome the limitations in mobile device access and control and other devices access and control.
§ Mobile device access and control (Approach to remove limitation felt in

mobile device access and control)
o Remote mobile device access and control
Figure 5.3.1 present structure of the invention for remote mobile device access and control. The remote mobile device access and control consists of user, remote mobile device access and control architecture and mobile device. Based on platform support for remote mobile device access and control architecture the user can remotely access mobile device.
If platform support for remote mobile device access and control architecture is there then user can remotely access mobile device.
If platform support for remote mobile device access and control architecture is not there then user cannot remotely access mobile device.
The remote mobile device access and control architecture for remotely interaction between user and mobile device use speech interface and DTMF interface.
The remote mobile device access and control architecture consist of authentication layer, remote mobile device access and control architecture layer and mobile device layer.

Authentication layer assure that only authorized user get access remotely to mobile device.
Remote mobile device access and control architecture layer assure interaction between user and mobile device.
Mobile device layer assure access to mobile application and mobile data.
§ Other devices access and control (Approach to remove limitation felt in
other devices access and control)
o Remote other devices access and control
Figure 5.3.2 present structure of the invention for remote other devices access and control. The remote other devices access and control consists of user, remote other devices access and control architecture and other devices. Based on platform support for remote other devices access and control architecture the user can remotely access other devices.
If platform support for remote other devices access and control architecture is there then user can remotely access other devices.

If platform support for remote other devices access and control architecture is not there then user cannot remotely access other devices.
The remote other devices access and control architecture for remotely interaction between user and other devices use speech interface and DTMF interface.
The remote other devices access and control architecture consist of authentication layer, remote other devices access and control architecture layer and other devices layer.
Authentication layer assure that only authorized user get access remotely to other devices.
Remote other devices access and control architecture layer assure interaction between user and other devices.
Other devices layer assure access to other devices application and other devices data.
Operation of the Invention
This section explains the operation of the present invention and how generic approach works to overcome the limitations in mobile device

access and control and other devices access and control.
■ Mobile device access and control (Approach to remove limitation felt in
mobile device access and control)
o Remote mobile device access and control
■ User
• User remotely wants to access mobile device
• User makes call from
o Mobile device
o Landline phone
o Etc...
■ Authentication layer
• First level authentication
o Missed call count is password
■ User can set missed call count in continuation from same number as
password on mobile device
• Example user can set four missed call count from same number in
continuation as password
§ User passes first level authentication then call is connected between
user and mobile device
§ User fails first level authentication then call is not connected between
user and mobile device
• Second level authentication
o User enters password as DTMF

■ User can set user enter password as DTMF on mobile device
• Example user can set 1234 as password
§ User passes second level authentication and gets access to remote
mobile device access and control architecture layer
§ User fails second level authentication then call is disconnected between
user and mobile device
§ Remote mobile device access and control architecture layer
• Start remote engine
o Remote finite state manager start
■ Remote finite state manger state
• State idle
• State instruction
• State command
• State end
■ Remote finite state manger manages state queue
• Based on state event in state queue the remote finite state manger
changes remote finite state manager state
■ State idle
• Default state
• When there is state idle event in remote finite state manger manages
state queue then remote finite state manger state change to state idle
• Keep scanning state manger manages state queue for state event
■ State instruction
• Process instruction

• When there is state instruction event in remote finite state manger
manage state queue then remote finite state manger state change to
state instruction
• Instruction processor read remote xml predefined instruction file using
remote xml parser. Based on instruction mode such as
o Instruction mode input is given to grammer engine and converted to WAVE form production and speech as predefined instruction.
o Instruction mode output is given to speech synthesis engine and based on instruction type such as
o Instruction offline the call is disconnected and written to remote xml command file
o Instruction online written to remote xml command file
o Post state event state command to change remote finite state manager
state to state command
o Instruction mode end post state event state idle to change remote finite state manager state to state idle
■ State command
• Process command
• When there is state command event in remote finite state manger
manage state queue then remote finite state manger state change to
state command
• Command processor read remote xml command file using remote xml
parser. Based on command mode such as
o Command mode execute

· Mobile device
application
· Mobile device data
o Command mode end post state event state instruction change remote finite state manager state to state instruction
■ State end
• End remote engine
• When there is state end event in remote finite state manger manage
state queue then remote finite state manger state change to state end
■ Mobile device layer
• Mobile application
• Mobile data
■ Other devices access and control (Approach to remove limitation felt in
other devices access and control)
o Other devices access and control
■ User
• User remotely want to access other devices
• User make call from
o Mobile device
o Landline phone
o Etc...
■ Authentication layer
• First level authentication

o Missed call count is password
■ User can set missed call count in continuation from same number as
password on other devices
• Example user can set four missed call count from same number in
continuation as password
■ User pass first level authentication then call is connected between user
and other devices
• User fail first level authentication then call is not connected between
user and other devices
• Second level authentication
o User enter password as DTMF
■ User can set user enter password as DTMF on other devices
• Example user can set 1234 as password
§ User pass second level authentication and get access to remote other
devices access and control architecture layer
§ User fail second level authentication then call is disconnected between
user and other devices
§ Remote other devices access and control architecture layer
• Start remote engine
o Remote finite state manager start
■ Remote finite state manger state
• State idle
• State instruction
• State command

• State end
■ Remote finite state manger manage state queue
• Based on state event in state queue the remote finite state manger
change remote finite state manager state
■ State idle
• Default state
• When there is state idle event in remote finite state manger manage
state queue then remote finite state manger state change to state idle
• Keep scanning state manger manage state queue for state event
■ State instruction
• Process instruction
• When there is state instruction event in remote finite state manger
manage state queue then remote finite state manger state change to
state instruction
• Instruction processor read remote xml predefined instruction file using
remote xml parser. Based on instruction mode such as
o Instruction mode input is given to grammer engine and converted to WAVE form production and speech as predefined instruction.
o Instruction mode ouput is given to speech synthesis engine and based on instruction type such as
§ Instruction offline the call is disconnected and written to remote xml
command file
§ Instruction online written to remote xml command file
§ Post state event state command to change remote finite state manager

state to state command
o Instruction mode end post state event state idle to change remote finite state manager state to state idle
■ State command
• Process command
• When there is state command event in remote finite state manger
manage state queue then remote finite state manger state change to
state command
• Command processor read remote xml command file using remote xml
parser. Based on command mode such as
o Command mode execute
· Other devices application
· Other devices data
o Command mode end post state event state instruction change remote finite state manager state to state instruction
■ State end
• End remote engine
• When there is state end event in remote finite state manger manage
state queue then remote finite state manger state change to state end
■ Other device layer
• Other devices application
• Other devices data

ADVANTAGES
Markup language
o Generic approach can lead to development of a new standard markup language
Devices
o Generic approach remove limitation felt in
§ Mobile device access and control
§ Other devices access and control
§ Community
o Generic approach removes limitation of carrying device always with user
o Generic approach allow remote access to device when not carried by user
o Generic approach allow anytime and anywhere access to device, application and data
o All together new experiences for user
§ Technology
o The generic approach add new dimensions to the technology areas mentioned
■ Markup language

· W3C
Applications
• Real time application
§ Non real time application
Device

• Handheld devices
• Personal computer
It will also be obvious to those skilled in the art that other control methods and apparatuses can be derived from the combinations of the various methods and apparatuses of the present invention as taught by the description and the accompanying drawings and these shall also be considered within the scope of the present invention. Further, description of such combinations and variations is therefore omitted above. It should also be noted that the host for storing the applications include but not limited to a microchip, microprocessor, handheld communication device, computer, rendering device or a multi function device.
Although the present invention has been fully described in connection with the preferred embodiments thereof with reference to the accompanying drawings, it is to be noted that various changes and modifications are possible and are apparent to those skilled in the art. Such changes and modifications are to be understood as included within the scope of the present invention as defined by the appended claims unless they depart therefrom.

GLOSSARY OF TERMS AND DEFINITIONS THEREOF
DTMF-SMS-
W3C - World Wide Web Consortium
TTS - Text To Speech

Documents:

936-CHE-2006 AMENDED CLAIMS 01-02-2013.pdf

936-CHE-2006 AMENDED PAGES OF SPECIFICATION 01-02-2013.pdf

936-CHE-2006 EXAMINATION REPORT REPLY RECEIVED 01-02-2013.pdf

936-CHE-2006 FORM-1 01-02-2013.pdf

936-CHE-2006 FORM-13 01-02-2013.pdf

936-CHE-2006 FORM-3 01-02-2013.pdf

936-CHE-2006 FORM-5 01-02-2013.pdf

936-CHE-2006 OTHER PATENT DOCUMENT 01-02-2013.pdf

936-CHE-2006 OTHER PATENT DOCUMENT 1 01-02-2013.pdf

936-CHE-2006 POWER OF ATTORNEY 01-02-2013.pdf

936-CHE-2006 CORRESPONDENCE OTHERS.pdf

936-CHE-2006 FORM-1.pdf

936-CHE-2006 FORM-18.pdf

936-che-2006-abstract.pdf

936-che-2006-claims.pdf

936-che-2006-complete description.pdf

936-che-2006-correspondance -others.pdf

936-che-2006-drawings.pdf

936-che-2006-form 1.pdf

936-che-2006-form 26.pdf


Patent Number 255655
Indian Patent Application Number 936/CHE/2006
PG Journal Number 11/2013
Publication Date 15-Mar-2013
Grant Date 13-Mar-2013
Date of Filing 31-May-2006
Name of Patentee SAMSUNG INDIA SOFTWARE OPERATIONS PRIVATE LIMITED
Applicant Address Bagmane Lakeview, Block 'B', No. 66/1, Bagmane Tech Park, C V Raman Nagar, Byrasandra, Bangalore 560 093.
Inventors:
# Inventor's Name Inventor's Address
1 Man Mohan Singh Bisht Bagmane Lakeview, Block 'B', No. 66/1, Bagmane Tech Park, C V Raman Nagar, Byrasandra, Bangalore 560 093.
PCT International Classification Number G06F12/00
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 NA