Browse Prior Art Database

SIM-BIOTIC OPERATOR - Communication between a mobile and Complimentary SIM Device (CSD)

IP.com Disclosure Number: IPCOM000194967D
Publication Date: 2010-Apr-16
Document File: 9 page(s) / 3M

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a system used for the automation of human day-to-day activities like vehicle locking/unlocking/tracking, ATM cash withdrawal, shopping, bank or home locker locking/unlocking, home/office security etc remotely through the communication between a mobile and a Complimentary SIM Device (CSD). The problem solved is that this invention eases manual activities and makes things simpler by having the mobile device as a key to simplify and automate our day-to-day activities. Physical inventories like keys, credit/debit cards are eliminated using the SIM-BIOTIC Operator. There is no such known solution to automate the above activities. This solution automates the above processes and simplifies day-to-day activities using mobile communication. Authors:- IBM CORPORATION Diptiranjan Kar, Dhanaji P Ghorpade, Raghavender Chiramchetty and Rajendra K Nirmal

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 19% of the total text.

Page 1 of 9

SIM

SIMSIM

SIM-
---BIOTIC OPERATORBIOTIC OPERATORBIOTIC OPERATOR

BIOTIC OPERATOR

---- Communication between a mobile and ComplimentaryCommunication between a mobile and ComplimentaryCommunication between a mobile and Complimentary

Communication between a mobile and Complimentary

((((CSDCSDCSD

CSD))))

The SIM-Biotic Operator can be used across numerous domains where -in two SIMs can talk to each other and automate a myriad of manual activities eliminating the use of physical inventories like keys or debit/credit cards etc. The working of the SIM-Biotic Operator is illustrated in the following flowchart :

SIM Device

SIM DeviceSIM Device

U S E R R E Q U E S T S T H E

S E R V I C E P R O V I D E R /

V E N D O R F O R T H E C S D D E V I C E W I T H A V A L I D

N U M B E R I D

T H E S E R V IC E

P R O V I D E R / V E N D O R P R O V ID E S T H E C S D D E V I C E A N D T H E

S A M E IS R E G I S T E R E D W I T H T H E U S E R 's

M O B IL E P H O N E

T H E U S E R C A N A L S O M U L T I - R E G IS T E R T H E C S D D E V IC E W IT H T H E A D D IT IO N A L N U M B E R S

IF R E Q U IR E D .

 T H E U S E R W I L L N O W B E A B L E T O C O N N E C T

T O T H E C S D D E V IC E A N D P E R F O R M T H E O P E R A T IO N S D E S IR E D

U S E R C O N N E C T S T O T H E C S D D E V IC E

T H R O U G H H I S

R E G I S T E R E D M O B IL E
D E V IC E

T H E C S D D E V I C E

V A L I D A T E S T H E U S E R

N U M B E R A N D T H E N

P R O M P T S F O R T H E V A L I D

P IN N U M B E R T O A L L O W O P E R A T IO N S T O B E

P E R F O R M E D

T H E 4 - D IG I T P I N I S V A L ID

Y E S

N O

T H E C S D D E N IE S T H E

U S E R A C C E S S T O T H E S Y S T E M A N D A L S O

G E N E R A T E S A S E C U R IT Y B R E A C H M A IL IN C A S E O F T A M P E R IN G

T H E C S D D E V IC E

A L L O W S T H E U S E R T H E C O M P L E T E A C C E S S T O T H E S Y S T E M T H A T I T IS C O N N E C T E D L IK E T H E

V E H IC L E S Y S T E M , H O M E
D E V IC E S E T C .

 T H E U S E R E N T E R S T H E O P E R A T I O N S H E W I S H E S

 T O P E R F O R M T O T H E C S D D E V IC E T H R O U G H

H IS M O B I L E D E V IC E

A

T H E C S D D E V IC E

R E C E I V E S T H E

C O M M A N D S F R O M T H E U S E R I N F O R M O F

S IG N A L S A N D T H E N

S E N D S T H E S E T O T H E C O N T R O L L E R C H I P

F IT T E D I N T H E

C IR C U IT O R Y

T H E C O N T R O L L E R C H IP W IL L IN T U R N I N T E R A C T

W IT H T H E S Y S T E M I N C O N S ID E R A T I O N A N D T H E D E S IR E D A C T IV IT Y

B Y T H E U S E R W IL L
O C C U R .

A

P E R F O R M M O R E

A C T I V I T IE S

E N D

Illustrated below are the Automobile, Banking and Security domains where the application can be used.

1

11.

..

Vehicle Security and Tracking

Vehicle Security and TrackingVehicle Security and Tracking :

::

     Here the basic aim is to use the Mobile communication as a medium to lock/unlock the vehicle doors, to track the stolen vehicles and also help in retrieving them back.

     In the...