摘要:
The present application allows two-way communication between a remote client and a mobile device, such as a mobile phone. User's can be informed of phone events in real time, regardless of their proximity to the mobile device. A two-way communication link allows a remote client to communicate back to the mobile device to leverage the capabilities of the mobile device. For example, a mobile device can be controlled remotely to send a text message. In this way, third parties receive a text message from the mobile device itself, even though it is not in the user's possession.
摘要:
A method of switching a network access configuration associated with a first electronic system to a second electronic system via a network is described. The first electronic system is inoperable. The second electronic system replaces the first electronic system such that a user seamlessly transitions from the first electronic system to the second electronic system. The user continues to access the network resources using the second electronic system rather than the first electronic system.
摘要:
A method of switching a network access configuration associated with a first electronic system to a second electronic system via a network is described. The first electronic system is inoperable. The second electronic system replaces the first electronic system such that a user seamlessly transitions from the first electronic system to the second electronic system. The user continues to access the network resources using the second electronic system rather than the first electronic system.
摘要:
A method and system for restoring device personality after failure. Specifically, the present invention discloses a method and system for automated personality transfer in a wireless enabled handheld device. In one embodiment, the present invention automatically extracts personality information that is unique and critical to the proper functionality of an electronic device. A personality file containing the personality information is created and stored on the electronic device. The personality file can be then transferred to another electronic device for archival purposes. Thereafter, should the personality information be lost due to device failure, embodiments of the present invention provide for restoring the electronic device back to its original operating state by importing the personality information back into the electronic device.
摘要:
A method of switching a network access configuration associated with a first electronic system to a second electronic system via a network is described. The first electronic system is inoperable. The second electronic system replaces the first electronic system such that a user seamlessly transitions from the first electronic system to the second electronic system. The user continues to access the network resources using the second electronic system rather than the first electronic system. According to an embodiment of the present invention, an application for switching the network access configuration is invoked using the second electronic system. During a first phase, the application transmits first data to a network infrastructure provider. The network infrastructure provider obtains approval for switching the network access configuration from the network service provider. If the network service provider approves switching the network access configuration, the network infrastructure provider updates its databases such that the network access configuration of the first electronic system is associated with the second electronic system. During a second phase, the network service provider updates its databases such that the network access configuration of the first electronic system is associated with the second electronic system if the network infrastructure provider successfully updates its databases. At the conclusion of the second phase, the second electronic system can access the network using the network access configuration.
摘要:
Embodiments herein relate to associating an account of a user of a handheld computer with at least a second computer. A request is sent by the second computer to associate the second computer with the account of the user. Whether the second computer is authorized to be associated with the account is determined. The second computer is allowed to access resources on a network if the second computer is authorized to be associated with the account.
摘要:
A method and system for restoring device personality after failure. Specifically, the present invention discloses a method and system for automated personality transfer in a wireless enabled handheld device. In one embodiment, the present invention automatically extracts personality information that is unique and critical to the proper functionality of an electronic device. A personality file containing the personality information is created and stored on the electronic device. The personality file can be then transferred to another electronic device for archival purposes. Thereafter, should the personality information be lost due to device failure, embodiments of the present invention provide for restoring the electronic device back to its original operating state by importing the personality information back into the electronic device.
摘要:
A method of switching a network access configuration associated with a first electronic system to a second electronic system via a network is described. The first electronic system is inoperable. The second electronic system replaces the first electronic system such that a user seamlessly transitions from the first electronic system to the second electronic system. The user continues to access the network resources using the second electronic system rather than the first electronic system.According to an embodiment of the present invention, an application for switching the network access configuration is invoked using the second electronic system. During a first phase, the application transmits first data to a network infrastructure provider. The network infrastructure provider obtains approval for switching the network access configuration from the network service provider. If the network service provider approves switching the network access configuration, the network infrastructure provider updates its databases such that the network access configuration of the first electronic system is associated with the second electronic system. During a second phase, the network service provider updates its databases such that the network access configuration of the first electronic system is associated with the second electronic system if the network infrastructure provider successfully updates its databases. At the conclusion of the second phase, the second electronic system can access the network using the network access configuration.
摘要:
A method of switching a network access configuration associated with a first electronic system to a second electronic system via a network is described. The first electronic system is inoperable. The second electronic system replaces the first electronic system such that a user seamlessly transitions from the first electronic system to the second electronic system. The user continues to access the network resources using the second electronic system rather than the first electronic system.
摘要:
A method and system providing simultaneous data entry for a computer system having both on-screen keyboard entry and mechanisms for handwriting recognition entry. In one embodiment, a portable or palmtop computer system contains a flat panel display screen capable of displaying thereon a keyboard image (“virtual keyboard”). Characters can be entered into the computer system by a user interacting with (e.g., tapping) the displayed characters of the virtual keyboard. The computer system also provides a handwriting recognition mechanism (e.g., digitizer pad) whereby characters are recognized based on a user drawing strokes on the pad. In accordance with the present invention, the virtual keyboard and the handwriting recognition mechanism are simultaneously active for data entry. Therefore, the computer system can accept character entry from the handwriting recognition mechanism while the virtual keyboard is displayed and active and capable of providing character entry itself. Specifically, from the virtual keyboard, the user is allowed to either tap the individual buttons, representing characters, on the screen to enter data or the user can enter data via the handwriting recognition mechanism. Since both methods are active simultaneously, the user does not have to switch between them. The present invention gives a user increased flexibility in the manual entry of characters to the computer system.