Browse Prior Art Database

Remotely Initiated Application Transfer for Personal Computer

IP.com Disclosure Number: IPCOM000061666D
Original Publication Date: 1986-Sep-01
Included in the Prior Art Database: 2005-Mar-09
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Hertel, HF: AUTHOR [+3]

Abstract

A method is described to remotely access an IBM Personal Computer (PC) via telephone and initiate selected applications. While an answering machine application will provide the access, an additional technique is required to specify and start the desired application. After an incoming call is answered by the PC answering machine application and the caller is identified as possessing full owner options, the caller enters the following sequence using the telephone touchpad: * Tn[n[n[n]]] where * signifies command start T identifies A 'transfer' command n[n[n[n]]] is a 1-4 digit application identifier signifies command end Internally, the answering machine searches a user-defined table for a match of the identifier. Each identifier has an associated file name and parameter string.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Remotely Initiated Application Transfer for Personal Computer

A method is described to remotely access an IBM Personal Computer (PC) via telephone and initiate selected applications. While an answering machine application will provide the access, an additional technique is required to specify and start the desired application. After an incoming call is answered by the PC answering machine application and the caller is identified as possessing full owner options, the caller enters the following sequence using the telephone touchpad: * Tn[n[n[n]]] where * signifies command start T identifies A 'transfer' command n[n[n[n]]] is a 1-4 digit application identifier signifies command end Internally, the answering machine searches a user-defined table for a match of the identifier. Each identifier has an associated file name and parameter string. When found, the application represented by the file name is given control via a DOS exec call with the associated parameter string passed as a normal DOS parameter string. When finished, the application should exit normally, giving control back to the answering machine, which can resume line monitoring. When the required application gets control, the telephone line is active and available for use by the application. An interactive PC interface allows the user to add or change application identifiers with associated file name and parameter string.

1