Abstract:
Disclosed herein is a method and system for allowing voice short message service (SMS) messaging using methods of recipient addressing as used by text SMS messaging. A user creates a text SMS message and addresses the message to a recipient. The address of the recipient may be obtained from the address book stored locally on the user's mobile device. A client application intercepts the text SMS message and prompts whether the user wants to include a voice SMS message. If the user wants to include the voice SMS message, the user's voice message is recorded on a server. The text message along with a notification of the voice message is transmitted to the recipient. The recipient may use the information in the voice message notification to access and listen to the user's recorded voice message.
Abstract:
A method and system are disclosed herein for accepting multimodal inputs and deriving synchronized and processed information. A reusable multimodal application is provided on the mobile device. A user transmits a multimodal command to the multimodal platform via the mobile network. The one or more modes of communication that are inputted are transmitted to the multimodal platform(s) via the mobile network(s) and thereafter synchronized and processed at the multimodal platform. The synchronized and processed information is transmitted to the multimodal application. If required, the user verifies and appropriately modifies the synchronized and processed information. The verified and modified information are transferred from the multimodal application to the visual application. The final result(s) are derived by inputting the verified and modified results into the visual application.
Abstract:
Disclosed herein is a method and system for allowing voice short message service (SMS) messaging using methods of recipient addressing as used by text SMS messaging. A user creates a text SMS message and addresses the message to a recipient. The address of the recipient may be obtained from the address book stored locally on the user's mobile device. A client application intercepts the text SMS message and prompts whether the user wants to include a voice SMS message. If the user wants to include the voice SMS message, the user's voice message is recorded on a server. The text message along with a notification of the voice message is transmitted to the recipient. The recipient may use the information in the voice message notification to access and listen to the user's recorded voice message.
Abstract:
A method and system are disclosed herein for accepting multimodal inputs and deriving synchronized and processed information. A reusable multimodal application is provided on the mobile device. A user transmits a multimodal command to the multimodal platform via the mobile network. The one or more modes of communication that are inputted are transmitted to the multimodal platform(s) via the mobile network(s) and thereafter synchronized and processed at the multimodal platform. The synchronized and processed information is transmitted to the multimodal application. If required, the user verifies and appropriately modifies the synchronized and processed information. The verified and modified information are transferred from the multimodal application to the visual application. The final result(s) are derived by inputting the verified and modified results into the visual application.
Abstract:
A method and system are disclosed herein for accepting multimodal inputs and deriving synchronized and processed information. A reusable multimodal application is provided on the mobile device. A user transmits a multimodal command to the multimodal platform via the mobile network. The one or more modes of communication that are inputted are transmitted to the multimodal platform(s) via the mobile network(s) and thereafter synchronized and processed at the multimodal platform. The synchronized and processed information is transmitted to the multimodal application. If required, the user verifies and appropriately modifies the synchronized and processed information. The verified and modified information are transferred from the multimodal application to the visual application. The final result(s) are derived by inputting the verified and modified results into the visual application.
Abstract:
A security file system for a portable data carrier provides improved security for the data carrier and for data contained in files in the data carrier. Although the data carrier may be embodied to look and feel much like an ordinary credit card, it contains a computer and a programmable memory with operating power and input and output data provided through a contactless interface. In order to provide security for the data carrier, the security file system on the data carrier includes a stored access code for verifying the identity of an individual attempting to access the data carrier, and an appropriate routine for limiting the number of unsuccessful attempts to access the data carrier. The security file system is also configurable to include select ones of multiple stored access codes for enabling the retrieval and modification of data in corresponding select ones of the files. The routine similarly limits the number of unsuccessful attempts to access these files. Operation of the routine is such that a counter in the data carrier is advanced a count each time a code is externally provided to the data carrier. If this external code compares favorably with the stored access code, the counter is reset to its previous count and access to the data carrier is permitted. If the external code does not compare favorably with the stored access code, however, the counter is not reset. When the counter advances to a predetermined number, the data carrier is locked preventing further access attempts or, alternatively, the data erased from the data carrier. In limiting access to select files, the routine similarly locks or erases the data in the selected file in the same manner.
Abstract:
A portable data carrier system provides improved security for files which support multiple applications, from custom repertory dialing to storage of individual medical and/or banking records. Included in the system is a portable data carrier which looks and feels much like an ordinary credit card. The portable data carrier, however, includes a computer and an electrically erasable field programmable read-only memory. Power for operation of the portable data carrier is provided from an associated station via a reader/writer. The reader/writer also couples data between the data carrier and the associated station. Operation of the data carrier is through an executive operating system that is accessed from the station via a set of commonly understood command primitives. These command primitives manipulate the files in the data carrier in accordance with security requirements. Security is enhanced since the stations's application software receiving and interpreting the data from a file sees a contiguous stream of bytes relating only to the file of the application being accessed. No information is provided to a user of a particular application about other applications in the data carrier or about the data carrier's internal file structure.
Abstract:
A file system for a portable data carrier provides improved security for files which support multiple applications, from custom repertory dialing to storage of individual medical and/or banking records. Although the portable data carrier looks and feels much like an ordinary credit card, it includes a computer and an electrically erasable programmable read-only memory. Power for operation of the portable data carrier is provided from an associated station via a reader/writer. The reader/writer also couples data between the data carrier and the associated station. The applications reside in multiple files in memory on the portable data carrier. Appropriate application software residing in the station, when accompanied by an appropriate password, enables the retrieval and modification of these files. A separate password is required for gaining access to each of designated levels of interaction between the portable data carrier and the associated station. Additional restrictions such as requiring an additional password for writing to a file and also allowing a user logged in at a particular security level to only append information to a file may be imposed in accordance with file security on the portable data carrier. And since each of the files may have its own security requirements, multiple applications may exist on the portable data carrier without conflict or confusion.