Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

System and Method For Dynamically Setting and Controlling Networked Personal Alarms

IP.com Disclosure Number: IPCOM000223124D
Publication Date: 2012-Nov-05
Document File: 1 page(s) / 38K

Publishing Venue

The IP.com Prior Art Database

Abstract

In devices such as mobile telephones, personal digital assistants (PDAs), alarm clocks, wireless music players or other devices, personal time alarms are set up as static notifications; set to a specific day and time or "sync'd" with another device where the alarms are static as well. The problem with static alarm notifications is that, in most cases, the events these alarms reference are dynamic. To adapt to these events the user needs to pro-actively check for changes and manually adjust the alarm device to compensate. This invention enables these devices, when connected to a network, to activate, adjust (move up or postpone), or suppress/cancel alarms based on notifications from trusted (or authenticated) network connected services. Exemplary applications of this invention by different users: - User one could sleep-in when schools are closed without being awakened by an alarm clock which would be set at the usual time. - User two could spend extra time on that important sales call with the client because user two's flight had been delayed, without having to interrupt the discussion with the client to check flight status or to react to an alert. - User three could be awakened earlier than normal when alerted to the fact that the commute may take longer than normal.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 58% of the total text.

Page 01 of 1

System and Method For Dynamically Setting and Controlling Networked Personal Alarms

Disclosed is a software-implemented feature that is added to a cell phone or network-connected personal digital assistants (PDAs), music players, or other similar devices, and uses a combination of network and authentication technologies including an alert/trigger technology.

     In a specific embodiment, a software-implemented agent would be added to a device (such as a cell phone) that would automatically adjust the cell phone's onboard alarm settings triggered by the cell phone's reception of a pre-defined message (or notification).

     Each notification would be subscription based. Upon subscribing, a phone number, email address, or other identifier is registered to which specific notifications would be sent. That is, when an event is postponed or cancelled, a traffic jam develops, schools are closed, etc, a notification would be sent to the phone number, email address, or other identifier alerting the subscriber of the event. Authentication can be carried out via the use of SSL (Secure Sockets Layer) or other available authentication mechanism to ensure that the notification was received from a trusted source. After receiving a notification from a trusted source, the receiving device will activate, adjust, or postpone/cancel the pre-set alarm based on the content of the notification and user preferences. (In the simplest form, a user using a cell phone enabled with such an agent cou...