Method of Wireless Decision Authorization on Mobile Device
Publication Date: 2005-Oct-31
The IP.com Prior Art Database
Often one sends a message to his / her manager. For example, one might type the following email to his manaer. Sample 1: Please approve of the purchase of $500 tp be charged to the cost centre 12345
WIRELESS DECISION AUTHORIZATION Method of Wireless Decision Authorization on Mobile Device
I often send a message to my manager for approval. For example, I might type the following email to my manager:
Sample 1: Please approve of the the purchase of $500 to be charged to cost centre 12345. Sample 2: May I take Jul 2 - 4 off as vacation days?
Sample 3: Please sign-off for the kick-off of Project X.
Upon receving these messages on my manager's mobile device, he / she will send back an email stating that the decision has been "approved" or "declined".
It would be nice if there is an application or process that can be used to approve decisions with security. Decisions might be different, but the overall process is similar. This invention idea attempts to address such a process.
Currently there is no security in approving decisions. Malicious users or hackers might be able to hack in and spoof an email address and steal a manager's identity and provide false approval.
Regardless of what the decision is, the process for making a decision on a wireless device is the similar. The process can be summarized in Figure 1.
The general process is as follows. A message is first received on a manager's mobile device. The manager decides whether it requires approval. If not, nothing happens. If so, the manager then decides whether to approve the message.
If the manager does not approve the message, he/she has an option to input a reason for the the rejection. Once a reason is provided (or skipped), the result is sent back to the recipient.
If the manager approves of the message, an authentication is inserted. The authentication can be as simple as an "OK" or "Approved" text reply. In other embodiments, it can be more complex and can incorporate the insertion of an encrypted signature, an authentication code, a watermark, a hash code or an encrypted attachment representing authentication (i.e., authenticates that manager is really the manager).
On the device, insertion of the authentication may include insertion of an applet or attachment at the Compose Message screen. Once the message is approved, it is then sent off to the recipient.
The recipient can then use this approved decision and proceed...