Browse Prior Art Database

System and Method to Create a Dynamic Collaboration with Mobile Device with Low Battery Charge Disclosure Number: IPCOM000249537D
Publication Date: 2017-Mar-02
Document File: 3 page(s) / 46K

Publishing Venue

The Prior Art Database


Proposed is a system and method to create a collaboration network to optimize application usage from mobile devices power management point of view

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.


System and Method to Create a Dynamic Collaboration with Mobile Device with Low Battery Charge

Nowadays mobile devices are widely used for daily activities and recharging the battery is therefore a crucial aspect. Usually when smartphone battery level is too low the phone is turned off, and the user can only recharge it as soon as a plug and power set is available. The wireless charge method is also available but the user must have a specific set to perform that action.

The system and method here proposes a collaborative approach among devices in close proximity, in order to redirect one or more applications to other devices in case of low available power. The collaboration between devices is established if the device owners are trusted. When an application is hosted on another device, to use the switched application, the owner of the application is required to insert a one-time password or predefined password. The method and system described here allows to switch one or more applications that run on a mobile device to another device located in close proximity in case of low charge power, in order to maintain the device with low charge turned on for the longest possible time.

This is implemented through a trusted network of devices, then performing the switch to the best device that satisfies the following requirements:

- it is located close to the user with low battery, and it will remain near for the longest period of time with respect to other possible candidate devices (a predictive algorithm based on the collection of information of each user subscribed is exploited here)

- host device owner satisfies the defined policy A one-time password is made available for security purposes to exploit the

application on the host device. The following different phases can be identified in the method here

Subscribing Phase The user subscribes to the application implementing the system and method

described here in order to switch applications to trusted devices according to its device power battery level. After the subscription the application accesses the device's address book and all social media where the user has been registered to identify relationships. This is key to identify trusted devices where to switch applications provided that they will be the nearest devices compared to the local user's position. So after the subscription, the system will have identified a well defined subset of trusted devices.

Setting Phase The subscribed users define the policies for the application switch. In particular

for each application installed in the device, the battery level to move the application on a near trusted device will be set. Example of policies are:

-if the battery level is equal to 15% switch communication applications -if the battery level is less then 5% switch all inco...