WO2019217309A1 - Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil - Google Patents

Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil Download PDF

Info

Publication number
WO2019217309A1
WO2019217309A1 PCT/US2019/030901 US2019030901W WO2019217309A1 WO 2019217309 A1 WO2019217309 A1 WO 2019217309A1 US 2019030901 W US2019030901 W US 2019030901W WO 2019217309 A1 WO2019217309 A1 WO 2019217309A1
Authority
WO
WIPO (PCT)
Prior art keywords
new appliance
dev
mobile device
command
handset
Prior art date
Application number
PCT/US2019/030901
Other languages
English (en)
Inventor
Sol Mingso LI
Original Assignee
Li Sol Mingso
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/978,018 external-priority patent/US10652735B2/en
Application filed by Li Sol Mingso filed Critical Li Sol Mingso
Publication of WO2019217309A1 publication Critical patent/WO2019217309A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present invention is in the field of wireless communication, in particular cellular communication where a wireless or wired device or Dev (e.g., appliance) can communicate wirelessly in the wireless network, particularly cellular network, wireless internet network and short range communication (SRC) network.
  • a wireless or wired device or Dev e.g., appliance
  • SRC short range communication
  • the PCMD Program Control & Monitor Device
  • Dev e.g., appliance: - the inventor uses the term“Dev” for the description of this invention in the rest of this text, while the term“appliance” will be used in the claims that follow at the end of this text
  • communicates with a handset e.g., cellular handset
  • the Dev can also be directed by any one of the handsets (e.g., mobile devices), which also can be a smart phone, tablet, tablet PC, laptop PC, VoIP device, iPad-like device, PDA (Personal Digital Assistant), any portable electronic device, wearable device (i.e., smart watch, smartwatch, fitness tracker or the like) or mobile device, so that the Dev can be used to monitor and control its environment, associated equipment, or plurality of associated equipment, and alert when any unauthorized or unsafe events take place, so its owner(s) can take appropriate measure to deal with the situation.
  • a handset e.g., cellular handset
  • the Dev can also be directed by any one of the
  • the Dev can also allow the user to add (register) another handset, so the owner of said handset can have the same access to the vehicle/home control and monitor system, as the original user.
  • the Dev also lets the user remove (deregister) a missing, stolen or no longer used handset.
  • the Dev can also allow the user to program the handset of the household help personnel (i.e., cleaning person) to have access only to a certain limited function of the home security and monitor system, such as: entry and exit on certain day(s) of the week and certain time. And such the entry and exit record can be created, stored and viewed by the user.
  • a certain limited function of the home security and monitor system such as: entry and exit on certain day(s) of the week and certain time.
  • entry and exit record can be created, stored and viewed by the user.
  • the Dev can also alert the user when someone attempts to register his/her handset into its control and monitor system so the user can be aware of such attempt and has the option to allow or not allow it to take place.
  • the Dev can also let the user locate the GPS location of another missing registered handset via his/her handset. [0007] The Dev can also allow the user to have the liberty of choosing another cellular service provider by providing a fairly simple mechanism to which it can be easily activated and registered into the new network.
  • the Dev can also allow the user remotely to enter and retrieve data to and from the GPS, and inquire the vehicle current location through said GPS.
  • the Dev can also allow the driver to pay the toll collector (i.e., bridges, highways) electronically and the transaction account is stored in memory for later review.
  • the toll collector i.e., bridges, highways
  • the Dev can also allow the user to record and view remotely the driving habit of other drivers, such as: driving speed, and optionally alerts the user when such maximum speed limit happens: where, when and the duration. It also allows car rental, taxi, truck companies, and the like, to have the driving record of each vehicle transmitted and stored into the company’s storage servers for later review.
  • the Dev can also alert the car owner when an authorized moving or entry in of his/her vehicle. It lets the owner know the location and time of where and when the event took place.
  • the Dev can also alert the driver who might accidentally leave the car engine on (idle) for a long period of time especially in a closed environment (garage) where the potential of carbon dioxide poisoning is at the greatest. If no response from the driver/owner, the Dev will automatically turn off the engine and all its accessories (i.e., radio, lights, A/C, etc.).
  • the Dev can also alert the emergency center in case of an accident such as: a sudden impact happens to the vehicle and/or its airbag is inflated. It also lets the driver communicate via the hands-free speaker and microphone with the emergency operator. The driver can also talk to a family member of his/hers (another registered handset), with the aid of the vehicle“dial and talk” button, in case his/her phone does not work or is not in his/her possession.
  • the Dev can also allow a third party (police/firefighters/emergency personnel) to take possession over the vehicle when said vehicle has been stolen/hijacked and is being driven dangerously without regard for public safety.
  • a third party police/firefighters/emergency personnel
  • This can be accomplished by transmitting a third party control and monitor command (with a MSK) to said third party by its registered handset and at the same time the Dev receives a notice with a MSK verification key from said registered handset that said command has been transmited to said third party or by the Dev itself transmitting said third- party control and monitor command to said third party.
  • the Dev can also allow the user to lock/unlock the car door, car trunk, start and drive his/her vehicle without using the car key.
  • the user can use his/her registered handset to communicate with the Dev or use voice commands directly to the Dev (with the handset in his/her possession or the vicinity) in controlling his/her vehicle such as: lock/unlock the car door, car trunk, turn on/off lights, starting the vehicle engine (with or without a car key) or the likes.
  • the Dev can also allow a user, who loans out his/her car to a friend or relative (i.e., borrower), to program the Dev remotely via his/her handset to restrict borrower’s usage of said vehicle to a time limit.
  • the user’s handset does it by having the Dev generated a unique one-time and time-limited MSK and then transmitted it to the borrower’s handset.
  • the borrower uses his/her handset or voice commands (with the handset in his/her possession or the vicinity) to lock/unlock the car door, car trunk, start/stop engine (with or without of car key), drive the car and the likes.
  • the Dev invalidates its MSK and borrower cannot use said car any longer because his/her handset and the Dev can no longer have valid communication.
  • the Dev can also allow a driver who has time-limited use of its vehicle i.e., a car lessee who leases said vehicle from a car leasing company.
  • the car leasing company s Application Server (app) generates a unique one-time and time-limited MSK and transmitted it to both the car lessee’s handset and the Dev.
  • the lessee uses his/her handset or voice commands (with the handset in his/her possession or the vicinity) to lock/unlock the car door, car trunk, start/stop engine (with or without of car key) and the likes.
  • the lessee returns the car back to the leasing company and the Dev invalidates its used MSK.
  • the Dev 106 preferably can also allow a user (driver/passenger) who has time-limited use of its driverless (self-driving) vehicle i.e., a car lessee who leases said vehicle from a car leasing company.
  • the car leasing company s Application Server, via its Car Rental App (one of 3 rd Party Apps block 613 in Fig. 6), generates a unique one-time and time-limited MSK and transmits it to the car lessee’s handset (assuming said handset containing its corresponding app download).
  • the lessee then is able to use his/her handset to lock/unlock the car door, car trunk, start/stop engine, input the destination to the GPS and the vehicle then drives itself to said destination and the likes.
  • the lessee uses his/her voice commands (with the handset in his/her possession or the vicinity) to lock/unlock the car door, car trunk, start/stop engine, communicate the destination to the Dev which translates said command to the GPS and then makes the vehicle drive itself to said destination and the likes.
  • the lessee returns the car back to the leasing company; the Dev then invalidates its used MSK and transmits the lessee’s usage data to the company’s data server for accounting and processing.
  • the Dev 106 and its associated app preferably can also offer the user (passenger) requesting an online ride-sharing service with the added confidence of boarding the correct vehicle and the (ride-sharing) driver connecting with the correct passenger.
  • Both the user’s handset and the Dev (or the driver’s handset) will signal (because their SRC communication, assigned with the same unique MSK, has been verified as valid) to their corresponding owners with a positive confirmation (for example, by emitting sound from their corresponding handsets and/or blinking the vehicle lights).
  • the Dev can also alert the vehicle owner if someone or something attempts to plant an adverse object: alien or harmful device such as GPS tracker, explosive device, illegal substance or the likes, by detecting its presence via its external smart motion, video, audio, frequency sensors; and/or especially, in the case of a GPS tracker, via its Frequency Hopper (i.e., TMSI, IMSI detector). It records the video of the said person or said something moving toward its vehicle or within its vehicle peripheral leading to a physical contact.
  • the Dev can also, via its cameras, employ facial recognition technology, as are well known to those of ordinary skill in the art, to record images of persons of interest who, more than one occasion (or determined number of times), snoop around in its vicinity. It then transmits said recorded video to the owner’s handset for his/her visual verification and determination.
  • the Dev can also allow the user to use its control and monitor system to program, control and monitor his/her home security system, such as: turning on or off the alarm, monitoring and viewing the house entries and exits, viewing its motion sensing devices, and observing its interior and exterior surroundings remotely, through his/her handset.
  • the Dev can also alert the home owner when an authorized or illegal entry takes place in his/her own house or business premises. It lets the owner know the exact location within the house or business premises, and time when it happened.
  • the Dev can also alert the home owner when the monitor camera detects changes in its inputs, then transmits the video images to the owner for his/her viewing and decision.
  • the Dev can also communicate wired/wirelessly with one or plurality of wireless handsets/terminals, computers, servers, and the like so account information can be exchanged between the Dev and one or plurality of device, such as: handsets/terminals, servers/computers (wire/wireless) to facilitate the financial (or non-finance) transaction or any other needed financial (or non-finance) exchanges.
  • device such as: handsets/terminals, servers/computers (wire/wireless) to facilitate the financial (or non-finance) transaction or any other needed financial (or non-finance) exchanges.
  • the Dev can also be programmed, controlled, and then communicates wired/wirelessly with institutions, such as: a utility company to pass monthly user’s utility usage information (i.e., electric / water / [heating & cooking gas] meter reading) so said company’s computers can process and calculate the charges.
  • a utility company to pass monthly user’s utility usage information (i.e., electric / water / [heating & cooking gas] meter reading) so said company’s computers can process and calculate the charges.
  • the utility company then completes the payment automatically, or transmits said information to user’s handset, so he/she using said handset is able to complete the transaction by paying online.
  • the Dev can also let the user speak to a visitor who rings the doorbell by alerting him/her via his/her handset (wherever he/she might be), thus allowing their communication through the intercom (front door speaker and microphone).
  • the uninvited visitor is not aware that the owner might not be at home, at the present moment.
  • the Dev can also let the home owner monitor the well-being of his/her pets (dogs), by communicating with the Integrated Smart Pet Door (its door, speakers and cameras), to let them out to the backyard multiple times a day and for specified times, such as: opening its door and playing the owner voice on its speakers, and enticing/commanding them back into the house by replaying the same speaker, then closing and locking the pet door.
  • the Dev can also let the user store/retrieve data (audio, video, files, pictures, graphic and the likes) into/from his/her private cloud 4904 of Fig. 49/51/53/54 via any registered handset.
  • the Dev can also be embedded into robotic device, which can be programmed and controlled remotely by the handset via the cellular network.
  • Cellular communication is more ubiquitous, practical, in real-time and anywhere than the internet.
  • the robotic device can be used in situations, such as: long distance medical surgery, remote rescue mission, remote firefighting and rescue, package delivering flying drones and the like.
  • the Dev Since the Dev is a wireless device and particularly a cellular device, it needs to be registered and activated into a cellular network, so the network computers/servers can recognize it, and allow it into their network, in order for it to communicate with other mobile devices. Unlike cellular phone handsets, tablets, personal assistants, and the like, the Dev communicates with other handsets or wireless devices, when programmed to do so by one or more of its registered handsets.
  • the Dev receives, decodes and executes commands and data from registered handset(s), and does its tasks/functions as
  • Commands and data from the handset can be in packet(s), in binary or combination of binary and ASCII text format.
  • Commands from the handset also preferably contain encoded handset phone number, encrypted mobile security key (MSK) and password, so the Dev can differentiate them from unwanted sources. If the phone number, (and/or) MSK and the password match with the stored ones in the Dev’s memory, the Dev will execute the commands accordingly.
  • Data can also be in video and audio text format.
  • Information and/or status from the Dev can be in packet(s), and in binary or combination of binary, ASCII, video, streaming video and audio, or streaming audio text format.
  • the Dev also sends messages (messages in the present invention, besides being text messages can also in the form data messaging: IM, MMS“Multimedia Message Service”, Messages) to the handset(s), to alert the owner(s) when an event happens, or sends commands to App Server or Email Server to email owner’s password to his/her email address for password recovery; as are known to those of ordinary skill in the art.
  • messages messages in the present invention, besides being text messages can also in the form data messaging: IM, MMS“Multimedia Message Service”, Messages
  • the MSK is a random generated encrypted security data parameter the Dev assigns for each of its registered devices (or commands as in the case of third-party command) and is transmitted by said Dev to its registering device during the activation or registration process; in other words, each MSK is associated with one of the Dev’s registered handsets (devices) or a third-party command (transmitted to a third party who will has a time-limited control and monitor over the Dev).
  • the MSK is then encoded in the commands generated by the handset which allows the Dev to identify and recognize if it communicates with its registered device(s) or a legitimate third party.
  • the MSK provides enhanced security protection between the Dev and its registered device(s) during their communication (via cellular, internet, SRC and satellite) and if an unmatched MSK received by said Dev during the process, said Dev requests that the user is required to register his/her new unregistered device and alerts its users via text messages, voice and emails.
  • the Dev’s function is to monitor and control its environment, communicate with other intended wireless devices; and in such a case where it functions as a security device, it has to be installed in a position, where it is not easily removed or disabled by any un-wanted person.
  • the module preferably is in the form of an embedded electronic module consisting of a microcontroller or CPU, IC (integrated chipset), EPLD, volatile and non-volatile memory (i.e., flash, RAM, SDRAM, EEPROM, ROM, SSD, storage media, ... ) storages (for software code, application programs, cellular account information, OS, ...), antenna(s), cellular phone/wireless LAN chipset, SRC (Short Range Communication) interfaces, components (NFC, WI-FI, Bluetooth, USB, wireless radio frequency (RF) technology), and general I/Os.
  • the module can be part of the automobile controlling circuitry when applies to a vehicle, or part of the home security system, when applies to the house, and part of the electronic circuitry when applies to a robotic device or a shipping container.
  • the Dev can obtain, store and run software applications from other devices/servers wirelessly.
  • it also contains finance account application to facilitate the toll fee transaction, when bridge toll or road toll requires. It also contains features, which allow user to locate the GPS location of other registered handset(s). It also allows user to control
  • the main handset can register other handsets, which then together can communicate with the Dev to coordinate in monitoring and controlling what is going on within the Dev’s environment, such as: a robotic/surgery /search- rescue robot, and monitoring what’s going through the cameras and sensors and display the real time image on the terminal screen.
  • the general purpose control system can be embedded into black boxes, cargos, shipping containers and the likes so they will be programmed by the handset or computer and their positions can then be tracked and monitored in real time by said handset or said computer.
  • the car manufacturers have not yet provided the complete solution, as presented herein by the present invention, is how to come up with a mechanism, so that the cellular phone system (which is already inside the vehicle cellular embedded phone module, as in the case, where it takes over the function of the driver’s cellular handset) can be programmed, controlled, monitored, and thus be able to communicate with the owner’s handset, and execute its functions as cited herein in the present invention.
  • Extending the hardware so it can interface with other devices in the car, such as: its GPS, its engine oil/fuel level, speedometer reading, door locks, car alarm, ignition system and the like, will not do much, if a clear and straight forward mechanism by which the car owner can monitor, program, and have it activated easily with his/her chosen cellular service provider so it can communicate with his/her cellular phone, has not been implemented as presented herein by the present invention.
  • the current car Security, Control & Monitor System allows the car owner (via smart phone) to remotely lock/unlock its doors, turn on/off its ignition/horn/lights, check its engine and electrical/electronic system (e.g., fuel, coolant fluid or oil level, battery reading, etc.) and the like or being alerted via his/her handset (smart phone, smart watch, mobile device, wearable device or the like) when certain events happen to the vehicle (e.g., break in, impact etc.), has some major drawbacks; for example:
  • the user On the consumer side, the user (potential owner of the system) has few options and depends mainly on a single exclusive security service provider (SSP) who likely is the manufacturer of the system or company affiliated with it; in other words, tied to a single security service provider. The user therefore, tends to be less receptive to the product (as added equipment into his/her vehicle) because no other company would be able to provide its connecting service. Common sense tells us that, as the exclusive service provider, the SSP tends to charge more for the service and has less incentive to offer and improve its service quality. The user has no other choice but to accept the service of the sole SSP or his/her“already paid for” equipment sits in the car being unused.
  • SSP exclusive security service provider
  • any useful or handy command for instance, finding out the (GPS) location of the car
  • GPS GPS
  • the security service provider (SSP) leases the lines from the cellular phone company so their equipment can provide the two-way communication between their SCMSs and their clients’ registered smart phones (the term: handset or smart phone can also be any mobile, portable or wearable device as intended within this document).
  • SSP security service provider
  • the user applies for an account with the SSP preferably online by providing his/her tax ID (i.e., social security numbers), personal and financial information to the SSP; he/she then registers his/her SCMS’s unique IDs (e.g., S/N) along with the registered smart phone(s) IDs (contact phone numbers, email addresses) and then downloads the app into said smart phones.
  • the SSP can then associate the SCMS with the user and his/her account.
  • the service thus can begin.
  • the communication between the smart phone and the SCMS which starts at the originating device must first go through the cellular network; it is then routed to the SSP equipment which verifies the device’s ID against its registered accounts.
  • the SSP equipment i.e., switchers/routers
  • the present invention offers a better alternative since it allows a direct communication between the smart phone (handset) and the SCMS (Dev) without third party’s switching/routing equipment involved.
  • the user can choose or switch to any available cellular service provider of his/her choice.
  • car manufacturers can treat the system as an option similar to the built-in garage opener and not having any SSP to deal with.
  • the user can always bundle the service with his/her mobile device plan to lower cost; besides insurance companies may offer drivers better terms on their premium since the insured vehicles will have more and better security options when equipped with said device.
  • the SCMS manufacturing cost can be significantly lower since most of the cellular chipsets typically already have built-in GPS which would allow them to offer car buyers two extra options (GPS capability and SCMS) with the IC (integrated Circuit) cost of one.
  • House monitoring security system presents less of a challenge, since it is a stationary device and can be wired and monitored by a home security company.
  • the house monitoring system also requires a phone line (expensive and prone to being disabled because the phone line can be cut) and comes with a pretty high price tag such as monthly service fee.
  • the monitoring can only be as good as the system and the security personnel who have the responsibility of overseeing so many stations.
  • the system has to be installed by the home security company, and they do not provide much except calling and/or alerting the owner, when something happened or the house has been breached. The owner has no idea what happened, and neither does the alarm company until the police arrives, or the owner gets home or to the business office.
  • the present invention offers better alternative since it allows a direct communication between the smart phone (handset) and the SCMS (Dev).
  • the user can choose or switch to any available cellular service provider of his/her choice.
  • it also acts as a hub or traffic controller/router, communicating or transmitting commands, statuses and/or data between the handset(s) and various house-hold (business/factory /field/farm-related) security equipment and appliances as fast as the cellular network allows.
  • These equipment/appliance(s) can be IoT (Internet of Things) compatible (as illustrated in Figures 50 and 51 showing IPv4 version, but the Dev also supports IPv6) or non-WIFI SRC (Short Range Communication) or NWSRC (non-WIFI SRC) (as illustrated in Figures 48 and 49), such as Bluetooth, wireless RF, ... or a mixture of both IoT (internet of Things) and NWSRC networks.
  • IoT Internet of Things
  • NWSRC Non-WIFI SRC
  • the Dev thus lets user manage all these devices from one single appliance (Dev) unified with one single app while with current technology (e.g., smart appliances such as: smart lock, smart lamps, smart refrigerator, smart washing machine, smart sensors, smart oven, smart thermostat, and the likes), the user has to have an app for each separate device (smart appliance) and also has to depend on the manufacturer’s equipment/server(s) for communication which adds extra delay and more failure points. Furthermore, the plurality of apps populating on the handset’s screen makes them harder to manage, thus adding extra delay and a drain on its battery, etc.
  • smart appliances such as: smart lock, smart lamps, smart refrigerator, smart washing machine, smart sensors, smart oven, smart thermostat, and the likes
  • the present invention allows owner 24 hour monitoring system. It goes straight to the user’s handset (and his/her family members’), instead of to a third party not having the capacity to fully monitor all activity, due to the multiple terminals they need to monitor. It alerts when something happens and owner(s) can see, in real-time, what happens in his/her handset (where the Dev already transmitted the related information). Programming, controlling, and monitoring are all done through the handset, while the current paid system requires keypad located inside the house, plus a remote hand-held device just to turn the system on/off, when user is near the house within a close proximity.
  • the present invention also extends beyond providing security of home alarm system.
  • the owner Before activation of the Dev, the owner should preferably get in touch with his/her chosen cellular service provider, to obtain the wireless service plan for the Dev and receives activation parameters (activation data), such as: activation password and user ID, account number, and/or any required information (so the service provider can associate it/them with the subscriber), in order for the Dev to be successfully activated into the service provider’s network.
  • activation data such as: activation password and user ID, account number, and/or any required information (so the service provider can associate it/them with the subscriber)
  • the owner can go to one of the service provider’s sales office, get in touch by phone, or go online to obtain the required information.
  • Activation is getting easier as cellular handsets are becoming more common devices. But even for a cellular phone user, when choosing or switching to a different service provider, he/she needs to be present in person at one of the service provider’s sales office, since he/she has to choose a new handset, while at the same time having it activated and registered by the service provider sales personnel. To cut down time, manpower and improve efficiency and minimize user’s waiting and frustration, service providers find ways to simplify and speed up the activation processes, by providing automatic activation of the device, such as: over the air (OTA) and on demand activation (ODA).
  • OTA over the air
  • ODA on demand activation
  • OTA means the Dev can temporarily connect to the network during activation
  • ODA means the cellular service provider can allocate any available phone number to the Dev during activation (thus Dev and its SIM, or U/SIM (Universal SIM), or ModSIM (define by the inventor as Modified SIM) like storage area does not have to be pre-programmed with any phone number).
  • U/SIM Universal SIM
  • ModSIM defined by the inventor as Modified SIM
  • the same account number can be used as a group account, as commonly practiced by service providers.
  • the first thing the user/owner needs to do is to activate the Dev and register his/her handset phone number (along with his/her account information) to the Dev, so the Dev can communicate with the handset after it has been successfully activated.
  • the user Before or during the activation, the user also has to pass a certain activation data to the Dev, (using the handset); meaning the handset has to contain associated software for it to do so (communication between the Dev and handset).
  • Normal handset does not contain software application to run the Dev, so during the start of the activation process (after the Dev’s activation button is pushed or voice activated command is excited), the Dev tries to communicates to the handset via SRC. If no response or wrong response coming back from the handset, the Dev sends a message or messages to the handset, informing the user of the website, from which to download the needed software.
  • the Dev and handset can communicate properly via SRC, so information can be exchanged, and the activation data required by the Dev can also be passed from the handset to the Dev.
  • the Dev’s software can also be updated if necessary, and at the pleasure of the user since the website might inform user through the handset of the choice.
  • the Dev activation request can be in the form of SMS, USSD string or any other means, as are known to those of ordinary skill in the art.
  • the Dev and the handset communicate with each other via near distance communication , such as: Bluetooth, wire/wireless USB, NFC, WI-FI, wireless radio frequency (RF) technology or any as defined by this inventor as SRC (Short Range Communication), as are known to those of ordinary skill in the art.
  • near distance communication such as: Bluetooth, wire/wireless USB, NFC, WI-FI, wireless radio frequency (RF) technology or any as defined by this inventor as SRC (Short Range Communication), as are known to those of ordinary skill in the art.
  • the Dev activation can be started via voice activating input, by pushing a button by the side of enclosure (in the case of the home control and monitor system) or the push button located by the interior rear mirror similar to one to program the garage opener (in the case for the car control and monitor system). Most would refer to this as syncing devices, device sync, etc.
  • Activating the Dev into a cellular network is quite similar to programming the garage opener, except the former requires several more steps.
  • the activation button preferably is located as shown by 1814C/1844C of Fig. 18C.
  • the Dev’s activation is carried out by the service provider’s equipment(s) known by various names, such as: service provider servers/computers, Authentication Center, Home Location Registry, activation server/computer, provision server/computer, or any other systems associated with or provided by the service provider; and is mentioned in the present invention, as the Provision Application Storage Computer/Server (PASC) or Provision Server 114.
  • the provision server can be part of the Service Provider internal network system, or it can reside separately on the intemet/cellular network, as are known to those of ordinary skill in the art.
  • Fig. 1 shows the preferred exemplary networks the present invention
  • FIG. 2 shows a preferred example of one hardware functional block diagram of the present invention of Dev 106 in the automobile application.
  • FIG. 3 shows a preferred example of second variation of hardware functional block diagram of the present invention of Dev 106 in the home application.
  • FIG. 4 shows a preferred example of third variation of hardware functional block diagram of the present invention of Dev 106 in robotic application.
  • Fig. 5 shows a preferred example of one software block diagram of the present invention of Dev 106 in the auto application.
  • FIG. 6 shows a preferred example of second variation of software block diagram of the present invention of Dev 106 in the home application.
  • Fig. 7A/7B shows a preferred example of software block diagram on handset 102, related to the present invention in communication with Dev 106 in automobile / home application.
  • Fig. 8 shows a preferred example of the flow diagram of present invention, in the downloading of required activation and application program into handset 102.
  • Fig. 9/10 shows a preferred example of handset’s screen displays of present invention, in the downloading of required activation and application program into handset 102, in the automobile/ home application.
  • Fig. 11/13 shows a preferred example of handset’s screen displays of present invention, in running/executing the just downloaded auto/home application software.
  • Figures 12 and 14 show preferred examples of handset’s screen displays of present invention, in having Dev 106 activated into a network in auto/home application.
  • Figures 15A-18D show preferred examples of present invention, in having Dev 106 activated into a network.
  • Fig. 19/20 shows a preferred example of handset’s screen displays and a flow diagram, presenting the Dev 106’s initial file with user information and the communication interaction of said handset and said Dev, relating to the present invention in the auto/home application.
  • Fig. 21A shows a preferred example of handset’s screen displays of a registered handset 102, adding (e.g., registering) a new handset into the Dev 106. After being added, the new handset 102 signs in, and thus registered into the Dev 106, and is able to control the Dev as much as the registered handset 102, relating to the present invention.
  • Fig. 21B shows preferred examples of handset’s screen displays of a registered handset 102, adding 2 new handsets one after another into the Dev 106. After being added, the first new handset 102 signs in, thus registered into the Dev 106, and is restricted into controlling a limited function of the Dev 106. Similarly, the second handset 102 also signs in temporarily and its ability to control the Dev 106 terminates on a certain programmable date, relating to the present invention.
  • Fig. 22 shows a preferred example of handset’s screen displays and a flow diagram, presenting the interaction between the registered handset 102, the Dev 106, added handset 102 and the App Server 108 during the sign-in of the added handset, relating to the present invention.
  • Fig. 23 shows a preferred example of handset’s screen displays of a registered handset 102, in removing (e.g., deregistering) another registered handset from the Dev 106, relating to the present invention.
  • Fig. 24B shows a preferred example of handset’s screen displays and a flow diagram, presenting the configuration (command) of Dev 106, relating to the present invention in the auto/home application.
  • Fig. 27 shows a preferred example of handset’s screen displays and a flow diagram, presenting the App Update between handset 102 and of Dev 106, relating to the present invention.
  • Fig. 29 shows a preferred example of handset’s screen displays of present invention, in having the active Dev 106 activated into another network, in auto/home application (in a case where the user picks/switches cellular service to a new provider).
  • Fig. 30 shows a preferred example of handset’s screen displays and flow diagram, presenting the Control and Monitor menu of Dev 106, relating to the present invention in the automobile application.
  • Fig. 33 shows a preferred example of handset’s screen displays, presenting the toll fee account setup menu, and the account activity listing of Dev 106, relating to the present invention in the auto application.
  • Fig. 34 shows an example of a toll collecting station with vehicles containing
  • Devs/appliances 106 It also shows a preferred flow diagram presenting the interaction of various devices and program flow of Dev 106 during self-park and self-pickup processes. It also shows a preferred example of Dev equipped vehicles on a road, interacting with one another, relating to the present invention in the automobile application.
  • Fig. 35 shows a preferred example of a flow diagram, presenting the interaction of various devices during a toll collection, relating to the present invention in the automobile application.
  • Fig. 36 shows a preferred example of a flow chart presenting the programming flow of Dev 106 during a toll fee collection, relating to the present invention in the automobile application.
  • Fig. 37 shows a preferred example of handset’s screen displays and flow diagram as well as a flow chart, presenting another toll fee account setup, and the interaction between various devices and program flow of Dev 106, during a toll fee collection, relating to the present invention in the auto application.
  • Fig. 38 shows a preferred example of handset’s screen displays and a flow chart, presenting vehicle locator of Dev 106 relating to the present invention in the automobile application.
  • Fig. 39 shows a preferred example of handset’s screen displays and flow chart, presenting an inquiry handset’s (102) screen interactions with Dev 106, in locating a missing handset 102, relating to the present invention.
  • Fig. 40 shows a preferred example of handset’s screen displays and flow diagram, presenting the Route Tracking and Speedo-Alert Program and Setup, the interaction of various devices.
  • the displays also show the Route Tracking and Speedo-Alert listings of the Dev 106, relating to the present invention in the automobile application.
  • Fig. 41A shows a preferred example of handset’s screen displays, presenting an alert from Dev 106 to handset 102, when an unauthorized event occurs, relating to the present invention in the automobile application.
  • Fig. 41B shows a preferred example of handset’s screen displays, presenting an alert from Dev 106 to handset 102, when an unusual event occurs, relating to the present invention in the automobile application.
  • Fig. 42A shows a preferred example of handset’s screen displays, presenting the engine status from Dev 106 to handset 102, relating to the present invention in the automobile application.
  • Fig. 42B shows a preferred example of vehicle control menu appearing on police’s handset screen and/or police vehicle’s dashboard console display allowing the temporary control by police officer(s) of the affected vehicle equipped with Dev 106, relating to the present invention in the automobile application.
  • Fig. 42C shows preferred examples of a vehicle monitor menu and flow diagrams illustrating vehicle monitoring activities, relating to the present invention in the automobile application.
  • Fig. 42D shows preferred examples of handset’s screen displays, presenting the user booking a vehicle from a car rental company and hailing a cab from a ride sharing company, online along with the flow diagram showing their interaction, relating to the present invention in the automobile application.
  • Fig. 43 shows a preferred example of handset’s screen displays, presenting the configuration of home security alarm of Dev 106, relating to the present invention in the home application.
  • Fig. 44 shows a preferred example of handset’s screen displays, presenting the status and monitoring of home alarm function of Dev 106, relating to the present invention in the home application.
  • Fig. 46 shows a preferred example of handset’s screen displays, presenting an alert from Dev 106 to handset 102, when an unauthorized event occurs, relating to the present invention in the home application.
  • Fig. 47 shows a preferred example of handset’s screen displays, presenting an alert from Dev 106 to handset 102, when a camera event takes place, relating to the present invention in the home application.
  • Figures 48-49 show preferred examples of handset’s screen displays, flow charts and diagrams, presenting the house-hold appliance addition/configuration by Dev 106, relating to the present invention in the home application.
  • Fig. 50 shows a preferred example of the Dev and its household appliances are being configured to form a private wired/wireless LAN network.
  • Fig. 51 shows a preferred example of the communication between the Dev, the
  • Fig. 51A shows a preferred example of handset’s screen displays, interfacing with the Dev’s private cloud storage (via its fde and directory folders) in order to store or recall photos (fdes) to or from said private cloud storage. It also shows a photo and a video taken by a handset while being transmitted in real-time to the Dev's private cloud storage, relating to the present invention in the home application.
  • Fig. 52 shows a preferred example of handset’s screen displays, presenting a house hold appliance removal by Dev 106, relating to the present invention in the home application.
  • Fig. 53 shows a preferred example of the Dev interacting with a handset and functioning as a vending machine dispensing items and as a bus/train monitor/controller communicating its route information.
  • the Figure also presents preferred charts of these two examples relating to the present invention in the robotic/automobile application.
  • Fig. 54 shows a preferred example of the Dev interacting, in a food service environment (restaurant and/or bar), with a plurality of the handsets of its customers, its service and support staffs, and its owner, in serving their needs, forwarding their orders, transmitting their requests, alerting their attentions, responding to their inquiries and completing their meal payments, relating to the present invention in the business application.
  • Fig. 55A shows one preferred example of the Dev receiving an alert from one of its users’ handsets when said handset lost contact with its Link Device and another example of the Dev interacting with a buyer’s handset during a mobile payment transaction.
  • the Figure also presents preferred charts of these two examples, relating to the present invention in the business application.
  • Fig. 55B shows preferred example of handset’s screen displays, presenting the communication between handset 102 and Dev 106, when user uses his/her handset 102 to open or close (via the Dev 106) the garage opener(s), relating to the present invention in the home application.
  • Fig. 56A shows preferred example of handset’s screen displays, presenting the communication between handset 102 and Dev 106, when user uses his/her handset 102 to control and program (via the Dev 106) the heating and air conditioning system, relating to the present invention in the home application .
  • Fig. 56B shows preferred examples of handset’s screen displays, presenting the communication between handset 102 and Dev 106, when user uses his/her handset 102 to lock or unlock (via the Dev 106) the entry door, relating to the present invention in the home application.
  • Fig. 57 shows preferred examples of handset’s screen displays, presenting the communication between handset 102 and Dev 106, when user uses his/her handset 102 to control and program (via the Dev 106) the landscaping sprinkler system, relating to the present invention in the home application.
  • Figures 58 and 59 show preferred examples of handset’s screen displays and a flow diagram, presenting the communication between handset 102, utility company 5982, Dev 106 and Electric Meter 4884, of the user receiving the monthly invoice and paying the electricity bill, to the utility company 5982, relating to the present invention in the home application.
  • Fig. 60A shows a preferred example of handset’s screen displays and a flow diagram, presenting the communication of handset 102 and Dev 106, in the monitoring and talking to the wearer of Help Alert device 4874, relating to the present invention in the home application.
  • Fig. 60B shows a preferred example of handset’s screens and flow diagram, presenting the communication of user using the handset 102 to communicate to intercom 4886 via Dev 106, in answering the doorbell that is rang by a visitor, relating to the present invention in the home application.
  • Fig. 61 shows a preferred example of handset’s screen displays and a flow diagram, presenting the communication of handset 102 and Dev 106, when user uses his/her handset 102 to program, set up and control (via the Dev 106) the integrated smart pet door control system, relating to the present invention in the home application.
  • Fig. 62 shows a preferred example of the interaction of various devices, relating to the present invention in the robotic application.
  • non-re gistered handset “normal handset”,“regular handset”);“handset” and“registered handset” are used interchangeably herein, for ease of presentation by the inventor, since a handset has to be registered into the Dev, in order for both to communicate with each other, as principal goal of this invention.
  • the present invention is about a wireless device“Dev or appliance”.
  • a wireless device“Dev or appliance
  • Dev is a cellular device, which resides or is part of a module controlling and monitoring its surrounding environment. In the following examples, three are cited and it does not mean that the Dev is restricted for these applications only. Controlling and programming means the Dev needs to be commanded or programmed to do so and its communication is restricted to a selected number of devices (their phone numbers and/or their associated mobile security keys (MSKs) are stored in the Dev’s memory).
  • MSKs mobile security keys
  • the handset has both the cellular and internet connections and thus can download activation and application software from the App Server into its memory if needed and be also used to pass needed activation information from the server to the Dev through SRC media before and during the Dev activation process.
  • the Dev With activation and application software resident in their memory (after successful download to the handset or update to the Dev), the Dev starts the activation process through Over The Air Activation (OTA).
  • OTA Over The Air Activation
  • the Dev can temporarily connect to the service provider or service provider’s equipment known as provision server or activation server/computer in order to be activated.
  • the activation process can be summarized in three phases: First, - activation key and pre-activation data from the service provider and user’s phone number along with user account information (i.e., vehicle make/home address, account name, account number) to the activated device. Second, - activation request, activation key, device identifier(s) and/or activation data from the activated device to the cellular provider.
  • the exchange of messages for the activation of the Dev with the provision server does not necessarily mean it is a direct communication.
  • the messages can go through many nodes and each one of them transmits these messages to each other or one another, and finally to the provision server.
  • the messages first go to one or a series of towers or Base Transceiver Stations (BTS), which transmit(s) the messages to the service provider or MSC/VLR (Mobile Switching Center / Visitor Location Register).
  • BTS Base Transceiver Stations
  • HLR/AuC Home Location Register/ Authentication Center
  • DBS Database Server for data verification and the Provision Server or OTA (Over The Air) Activation Processor for being processed / acknowledged / approved (Fig. 1 of US Patent
  • the present invention also supports plugged-in SIM card 270 (Fig. 2) preferably already activated; otherwise if the user has to activate it, then the SIM storage module is already available. Also, the benefit of the SIM card for the user is the convenience of continue usage when he/she gets a new handset without having to have reactivate it and allowing it to retain all the personal information, such as: phone directory, personal messages and the like while such information is not needed in the Dev, and the Dev functions much differently from a smart handset.
  • the Dev only communicates with a limited numbers of handsets or mobile devices as directed by the registered phone, or one of the registered phones, and unlike the handset, the Dev is not convenient for the user to have access to its SIM card. Its task is to allow users to program, control and monitor what users want it to do. It also can observe and inform of what is going in its surroundings, thus providing the option to alert the users as programmed/instructed.
  • the present invention protocol utilizes a mechanism in having Dev activated and then provisioned into the network (and it thus can register and be recognized/authenticated by the network); configured, programmed, controlled, and monitored its security tasks; set up account for paying tolls; discovered house-hold device for remote control and usage and all the various functions, which make it into a real, useful and very powerful device; also registers/removes (de-registers) other handsets or no longer used handsets into/from the Dev so they can/cannot control, program, monitor and will not be/(no longer be) alerted by the Dev just as the main handset.
  • the user applies and obtains the network service to the Dev with the service provider either in person, through phone call, or online.
  • the user provides information or personal data (Name, address, employer’s name and address, credit card [for payment deposit], handset phone number to the service provider for approval) and the service provider in turn provides user a set of information such account number (service plan, service rate%), user ID, activation password and activation phone number or activation internet link (address).
  • the service provider then generates a one-time and time limited ticket (one-time limited ticket), token or identifier UTAID (Unique Temporary Activation Identifier preferably consists of: activation type/methodology, security /encryption key, activation key) based on user’s account and personal information, and transmits it to user’s handset.
  • the handset passes the UTAID to the Dev, which separates out the activation key, and transmits it along with the Dev’s own identifier(s) and other parameters to the service provider during activation.
  • the service provider/provision server verifies against the one stored in its database server, and thus can associate it with the subscriber (‘s account) during activation.
  • the UTAID also preferably contains a byte, indicating activation methodologies (activation types) of NAM, SIM (or USIM or ModSIM) or any customized activation type/ methodology, which when received by the Dev, will allow the Dev to activate itself into the service provider network accordingly (either using NAM, SIM, USIM, ModSIM or any customized activation type/methodology).
  • the UTAID also preferably contains a mathematically algorithm or security /encryption key; and thus when it is received, decoded, stored and executed by the Dev, will encrypt said Dev’s voice and data transmission in total privacy.
  • the UTAID can also optionally contain an IMSI, which the Dev uses to transmit during activation instead of using its dummy IMSI, as are known to those of ordinary skill in the art.
  • ESN/ MEID/IMEI Electronic Serial Number / Mobile Equipment Identifier / International Mobile Equipment Identifier
  • the dummy IMSI or IMSI International Mobile Subscriber Identity decoded from the UTAID if it is provided
  • IMSI International Mobile Subscriber Identity decoded from the UTAID if it is provided
  • IMEI International Mobile Station Equipment Identity
  • the service provider can also associate the Dev ID Parameter (542/642 of Fig 5/6), such as: Dev’s SN (serial number), model number, manufacturer name with the device, which are already reside in the Dev’s memory, while the user’s account information, the Dev’s assigned phone number, and the TMSI can be stored into the Dev’s memory storage module during the activation, as in the case for ModSIM activation.
  • Dev ID Parameter 542/642 of Fig 5/6
  • the Dev’s SN serial number
  • model number model number
  • manufacturer name manufacturer name
  • the Dev’s assigned phone number can be stored into the Dev’s memory storage module during the activation, as in the case for ModSIM activation.
  • Pre-activation - Un-registered handset A regular handset normally does not contain activation and application software.
  • the activation button is pushed (preferably located similar to where built-in garage door openers are in vehicles near the rear-view mirror, in case for vehicle application, or by the side of the enclosure in case of home system application, or when the Dev is equipped with a display as illustrated by 1814C/1844C, screen 1802C/1832C in Figure 18C)
  • the Dev sends activation query via SRC media to the handset (un-registered to the Dev) and waits for the appropriate response.
  • the Dev assumes the handset does not contain appropriate application software, and sends a text message providing the link to the server location to the handset, informing user that he/she needs to download the activation and application software from the application server (App Sever) into the handset, in order to activate the Dev and run application software to communicate to the Dev. The user then proceeds to download the activation and application software.
  • the App Server preferably checks to see if the requested download version is up to date and if necessary (besides downloading the latest version of the software to the handset), the Dev also needs to be updated (downloaded) with the newest revision.
  • the handset not only downloads its own activation and application software from the App Server, but also the Dev’s application of the latest version to its memory storage, and then transmits it to the Dev; or the handset transmits to the Dev the App Update command with the download web link, making said Dev download said app update.
  • Each cellular service provider in conjunction with the manufacturer of the Dev supplies their own activation and application software, and preferably the service provider also supports OTA (Over The Air) activation and ODA (On Demand Activation) activation.
  • Dev Activation before the user puts the Dev into usage, the Dev needs to be activated so it can be recognized (when it registers into the network), and thus allowed into the service provider network; and can therefore call/send messages or receive calls/messages from other devices.
  • a user utilizes his/her handset in activating the Dev - the pre-activation data (activation User ID 1226/1426, activation password 1228/1428) to obtain UTAID from the service provider can be inputted by the user from the handset’s touch screen and keyboard 1235/1435.
  • the user also provides separate information to the Dev, such as: the handset’s phone number 1229/1429 (along with the account information) as illustrated in Figure 12/14 since the handset phone is the very first device the Dev will send message to, after it has been recognized and connected into the service provider’s network.
  • the Dev does a power-on reset 249 (Fig. 2/3/4) and then is registered and recognized by the network (in 1519A/1519B, 1619A/1619B, and 1719/1719A of Figures 15A/15B, 16A/16B and 17/17A) as are known to those of ordinary skill in the art.
  • the user has to acknowledge back with an Ok message so the Dev knows its communication link to the handset has been accomplished and user can start the Dev’s
  • the Dev can preferably automatically switch to communicate with the handset via SRC network 104 when the handset is within its near distance vicinity or SRC network range, as is known to those of ordinary skill in the art).
  • the Dev then can be initialized or configured by the user via the handset with information, such as: password (for added security), user’s email address (for password recovery) and stores them into its memory.
  • the user then can program, control and monitor the Dev, from then on, for its intended tasks.
  • the Dev preferably does not transmit its IDs (i.e., phone number) during its communication (no caller ID); in other words, the service provider assigns one same dummy number to all the Devs under its service so that they can communicate even with handsets which have been programmed to reject calls/texts without caller IDs.
  • This mechanism shields the Dev from exposing its call number identity, thus minimizes it from denial of service (DoS) attacks and since said Dev only communicates with other devices within its close loop circle.
  • DoS denial of service
  • Dev activation can be either
  • NAM Numberer Assignment Module
  • ESN/MEID/IMEI Access Overload Class
  • Group ID Mark Initial Paging Channel
  • Lock Code Lock Code
  • local use flag A/B system selection and MIN mark flag.
  • SIM Subscriber Identification Module
  • SIM principal parameters are IMSI, TMSI (temporary IMSI), MSISDN, and
  • Authentication key Ki
  • ICCID ICCID
  • IMEI IMEI
  • ModSIM principal parameters are assigned phone number, TMSI, Dev ID parameters and Authentication key (Ki).
  • Activation software is used and executed by both of them during Dev activation and between each one of them or of both of them with the provision server.
  • SRC Short Range Communication
  • RF radio frequency
  • the Dev After the Dev has been successfully activated, it then rims the initialization reset (or self-power recycle), and then registers into the network (and thus will be recognized by the service provider’s network). From then on, the Dev runs and executes its application software to communicate with user’s handset (as mentioned previously, the handset can also be a smart phone, tablet, tablet PC, laptop PC, iPad-like device, PDA (Personal Digital Assistant), any portable electronic device or mobile device). Correspondingly, the user utilizes his/her handset (which had its application software downloaded) to communicate with the Dev, by going and scrolling through the handset’s respected screens and related icons, to program the Dev 106 and thus control, command, monitor and view its programmed tasks. The user will also be informed (alerted) through his/her handset by the Dev when certain unauthorized events take place.
  • the Dev starts out (after its activation button has been pushed) by transmitting (via SRC media) to user’s handset, a text message with the App Server’s URL instructing him/her to download the required activation and application software, from said site into the handset in order to activate the Dev, then runs and executes the downloaded application, in order for the handset to communicate with the Dev.
  • Dev App Server Registration 1175/1375 lets user register the Dev online, creating an account with the App Server by providing owner’s user ID, password, email address, handset phone number and Dev’s S/N and the likes.
  • the account allows the user with the handset to control and monitor the Dev which in turn communicates and alerts, via email and/or mail to SMS messages to the user’s handset if certain events happen.
  • Control & Monitor icon 1132 is shown in Figure 30
  • Engine Status icon 1126 is shown in Figure 42A
  • Toll Fee Pay Acc icon 1134 is shown in Figures 33 and 37
  • Third-Party Control and Monitor icon 1130 is shown in Figure 42B
  • Driving Behavior 1142 and Load Limit 1144 icons are shown in Figure 42C
  • Auto/Home Dev IDs icon 1146/1346 is shown in Figure 28B.
  • Panic icon 1128 allows user to turn on the car alarm to deter potential burglars/thieves.
  • Lock/Unlock icon 1136 lets user lock/unlock the car remotely
  • Self-Parking 1138 and Self-Pickup 1140 icons let the user command the Dev to self-park his/her vehicle and self drive to pick up the driver when command to do so.
  • Control & Monitor icon 1326 is shown in Figure 43
  • Home Door Lock 1332 is shown in Figure 56B
  • Unlock 1334 icons are shown in Figure 56B
  • Home Alarm On 1336 is shown in Figure 56B
  • Home Alarm On 1336 is shown in Figure 45
  • Garage Opener icon 1340 is shown in Figure 55B
  • Household Appliances icon 1344 is shown in Figures 48-54.
  • the user then starts the Dev activation process, after having applied and obtained the service account for the Dev from his/her cellular provider, by executing the Activate icon in Dev Facility Menu (Fig. 11/13).
  • the activation process which can be either NAM (Fig. 15A/15B), SIM (Fig. 16A/16B), ModSIM (Fig. 17/17A) or any new or improved activation methodology
  • the handset receives from the service provider or provision server an UTAID (Unique Temporary Activation Identifier which contains activation key and other parameters), which it then passes (via SRC media) to the Dev.
  • UTAID Unique Temporary Activation Identifier which contains activation key and other parameters
  • the Dev derives from UTAID, the activation key and transmits it along with its identifier(s) and other activation parameters to the provision server in order to complete the activation process ( Figures 12, 14, 15A-17A).
  • the Dev then registers and is thus recognized by the network, and from then on it is able to communicate with the handset and other registered mobile devices.
  • the handset also transmits its phone number (automatically or entered by user) to and receives a MSK from the Dev, which later will also send back (via cellular) to said handset, a confirmation message after it has been able to connect to the network.
  • the Dev As soon as the Dev receives the confirmation acknowledgement from the handset, it sends back an Initialization icon (1290/1490 or 1294/1494 in screen 1280/1480 of Fig. 12/14, containing its assigned phone number), which the user will execute to start his/her handset and the Dev initialization process (Fig. 19/20), allowing said handset to use said Dev’s phone number in its communication with said Dev.
  • the encrypted MSK is preferably encoded, as part of the handset (or wired/wireless device) cellular (or other wireless long distance network) transmit packet(s) during routine communication with the Dev, which only responds back if said MSK matches with one which has been stored in its memory.
  • the user preferably can start the Handset Imitation Activation (HIA) by executing icon 1419 (Fig. 14).
  • the Dev starts the activation by receiving the activation command, the provision server web address, user ID, password and handset phone number via SRC from the handset and in return, it sends back the MSK to the handset. It then obtains the handset’s service parameters; thus connects to the cellular network (of the handset) and then transmits the activation request and activation parameters to the provision server, receives the service parameters and acknowledgement from said provision server and is able to connect to the network (its network).
  • the user preferably can start the Manual activation by executing icon 1413 (Fig. 14).
  • the user goes to the service provider provision website 1844B using his/her handset, fills out the Dev’s information and the account billing and activation codes, and executes the activation thus allowing the Dev to connect to the network.
  • the user preferably has an option to start the Dev registration/activation process via SIM/USIM card by inserting said card into the Dev’s SIM connector 1821D.
  • this option either: 1. It requires a wired/wireless connector (not shown) from the Dev either to the dashboard console display 1802C with its hard-keypad 1806C and soft-keyboard 1822C (auto application) or to the front panel display 1832C with its soft-keyboard 1852C (home application).
  • This option also requires a keypad- keyboard and display firmware driver module (block 568/668 in Fig. 5/6).
  • the dashboard console hard-keypad preferably consists of several buttons for information displaying, such as: GPS for GPS information (1808C Fig. 18C), AM/FM (1810C Fig. 18C) for radio, M/C (1812C Fig. 18C) for Dev Monitor and Control as commonly practiced by the industry. 2.
  • the Dev does not require to have a separate display since Dev’s screens 1816D, 1830D, 1846D and 1866D can also appear on the handset screens 106 transmitted by said Dev via SRC similar to the ones as previously described in Figures 12 and 14.
  • the user executes the just received Initialization icon (1290/1490 or 1294/1494) in his/her handset’s inbox (screen 1280/1480 of Fig. 12/14) from the Dev 106 or 1878A/1876B/1888D orl880A/1878B/1890D of Fig.
  • the handset 102 then navigates to screen 1902/2002 where the user can enter the required information. He/she then enters requested parameters, such as: the user’s chosen account security password 1914/2014 and 1916/2016 (for added security), his/her handset own chosen password 1918/2018, email address (for password recovery), vehicle identification, home address, and emergency phone numbers (such as 911 in North America or other numbers depending on geographical and national locations), which all will be transmitted by the handset to the Dev for processing and storage.
  • the handset also obtains and stores the Dev’s phone number (1226) which is used by its application in their communication, as is known to those of ordinary skill in the art.
  • a new handset 102 can be added (registered) into the Dev 106, by a registered handset 102; and will be able to control said Dev 106 just as said registered handset without any limitation.
  • a new handset 102 can be added (registered) into the Dev 106, by a registered handset 102; and will have limited function in controlling said Dev 106.
  • the application download link and messages instructing its owner to follow its instruction, in order for said handset to operate and communicate with the Dev, which will also notify the owner of the registering handset 102 when said newly handset completes its task.
  • a registered handset can be removed (deregistered) from the Dev by another registered handset.
  • the Dev executes the password recovery process after the user failed to enter a matching password after three attempts.
  • the Dev transmits the password recovery command to the Email Server, which will email the recovered password to said user.
  • the user utilizes the handset to configure the Dev, in order to change, remove and/or update certain information, such as: vehicle license plate(s), house address, passwords, account number(s), email addresses, and emergency center phone numbers and the like.
  • the user utilizes the handset to retrieve the device information from the Dev.
  • the user utilizes the new handset to register said handset into the Dev.
  • the registration command requires the user to enter information, such as: the correct account security password, new handset’s phone numbers (twice), handset passwords (twice), and Dev’s phone number (which the new handset uses to transmit the command to, and will save Dev’s phone number into its memory, when it receives the confirmation response to its registration from said Dev).
  • the Dev verifies the account security password, it then checks to see both the handset phone number entries and its chosen password entries, each entered twice, are identical. If all the information is correct, the Dev will send the confirmation response and its device information to the handset; and from then on, they both can communicate with each other.
  • the Dev will also transmit alert messages to other registered handset(s), if there are any in its memory, to inform the user(s) of such registration.
  • the user attempts to activate or register a new handset into the Dev, using the activation button 202 (of Fig. 2/3/4). If the Dev does not have any cellular service at the time, it will start the activation process as described previously. Otherwise the Dev will inform the registering handset user that the right application is needed to run the process. The user then either downloads the application online (if the handset does not contain the application), or run the application (if the handset contains said software). (The Dev also checks to see if it has any registered handset’s phone number in its memory. If it does not contain any
  • a SIM card must be plugged into its slot [270 in Fig. 2/3/4], it will allow the user to initialize by letting him/her to enter the security password for the account, the phone number of his/her registering handset and the chosen password for said handset).
  • the Dev receives the registration command and its data from the handset, as illustrated previously (in screen 2502 of Fig. 25), it verifies and processes the command and the data; it also alerts the other handset(s) of the attempted action (if there is any).
  • the registration process if any alerted handset sends back a“Not Ok” message 2662, the registration is immediately aborted; or if the Dev receives an OK 2658, then the registration can start immediately without the account security password entries or verification. For added protection, the account security password is required for the user of the alerted handset before he/she is able to allow or not allow such process to take place.
  • the user utilizes the handset to update to the latest version of the application of the handset 102, and of the Dev 106.
  • the handset obtains the Dev’s current version app information from said Dev, and its latest version and the Dev’s latest version from the App Server 108.
  • the user decides to update to the latest version, he/she just executes the update icon allowing the handset to receive the copy of the latest version app from the App Sever.
  • the handset then sends the Dev’s app update URL (or Dev’s latest version app) along with update command to the Dev, and then the handset and the Dev, each updates its own latest version app (or alternatively, the handset 102 receives the Dev’s update app from the App Server 108 and then transmits it to the Dev 106).
  • the user utilizes the handset to retrieve the device information from the Dev 106.
  • the user utilizes the handset to retrieve the device ID parameters from the Dev 106.
  • Fig. 29 when it is time for the user to switch to another service provider, he/she goes through a similar activation process again, in order for the Dev 106 to be able to connect to the network of the new service provider.
  • the user signs up and obtains a new UTAID from the new service provider, and preferably should (via his/her handset) activate the Dev 106 while it is still connecting to the current service provider network.
  • the user therefore can do the activation anywhere (instead of having to be in the vicinity of the Dev 106 in order to communicate with it using the SRC media as the case in previous activation process in Figures 11/13 and 12 and 14) since the handset still can communicate with the Dev 106 via the cellular network.
  • the Dev 106 is activated and able to register, and then connected into the new network, its service to the previous network can be disconnected, and from then on the Dev 106 communicates with other handsets (mobile devices) in the new network.
  • the Dev’s device information fde contains the same programmed data; in other words, there is no need for the user to reinitialize or reconfigure the Dev.
  • the only difference is the new account number and possibly the Dev 106 has been assigned a different number.
  • the handset 102 updates the Dev’s phone number (regardless of it being a different number or not), and uses it from now on in its communication with the Dev 106.
  • the Dev 106 also preferably sends command(s) to the other handset(s) so the user(s) of said handset(s) can also update the Dev’s phone number.
  • the user utilizes the handset’s
  • Auto Control and Monitor menu to communicate with the Dev 106, in order to control the vehicle’s electrical-mechanical components, such as: starting its ignition, locking/unlocking its doors, turning the alarm on/off, and the like, or to check the vehicle accessory status.
  • the user utilizes the handset’s GPS icon in the Auto Control and Monitor menu to communicate with the Dev 106, in order to enter the location address inputs into the vehicle GPS device, or retrieve the stored entries from GPS memory.
  • the user utilizes the handset’s Toll Fee Pay Account menu to communicate with the Dev 106, in order to set up the toll fee payment account on said Dev which will process, pay the required fee when demanded and record the transaction in its memory.
  • the Dev 106 also transmits the transaction activities to the handset when the corresponding icon is executed on said handset 102.
  • the user utilizes the handset’s vehicle Locator icon in the Control and Monitor menu to communicate with the Dev 106, in order to locate the current location of the vehicle.
  • the Dev 106 then translates and transmits the current location command to the GPS, and passes the current GPS location information back to the handset 102
  • Handset Locator icon in the Control and Monitor menu to communicate with the Devi 06, in locating a missing registered handset.
  • the Dev 106 transmits back its listed registered handsets 102, which the user can choose from, in order for the Dev 106 to locate said handset 102.
  • the user utilizes the handset’s
  • the Dev 106 transmits a message preferably with video (or streaming video) data to the user’s handset informing him/her that a certain event has happened to his/her vehicle, such as: a break-in.
  • a certain event such as: a break-in.
  • the user will be able to know the nature of the event, time and date and location, the event took place, and the registered handset phone numbers which have been alerted.
  • the Dev 106 transmits a message preferably with video (or streaming video) data to the user’s handset informing him/her that a certain event has happened to his/her vehicle, such as: a child or pet might have been left inside said parked vehicle.
  • the user will be able to view the accompanied videos, and then takes appropriate actions with the handset, which transmits them to the Dev 106, such as: ignoring because of false alarm or confirming it by either taking one of a combination of these immediate and temporary measures: unlock the car door, car trunk, lower down car windows, sound the horn, turn on the car alarm, turn heat or air on, flash a light, call emergency center, or that the driver in on his/her way to the car.
  • Engine Status icon in the Auto App menu to communicate with the Dev 106, in order to view the vehicle engine status remotely.
  • the user i.e., police officer
  • the user programs the Dev in order to store the data on the driving behavior of a driver of his/her car into his/her secure private cloud storage, to be informed when the vehicle is overloaded and to take part in a traffic monitor program during rush hours.
  • the user goes online with his/her handset to book a rental vehicle from a car leasing company or hail transportation from a ride-sharing company.
  • the user is capable of visually identifying and locating his/her rental car by its make, color, model and license plate; but the exchange of the unique verifiable identifier (MSK previously transmitted by the car rental company App Server) between the (rental car) Dev and his/her handset will let him/her get into said car and man the vehicle (with or without any car key).
  • MSK unique verifiable identifier
  • the user In the ride-sharing case, the user would go to his/her ride at the arranged pickup location, find it by its make, color, and model; but for added assurance, the exchange of the unique verifiable identifier (MSK previously transmitted by the ride-sharing company App Server) to his/her handset, to the driver’s handset and to the (ride-sharing /taxi) Dev will assure both of them: the user getting into the right car and the driver picking up the right passenger.
  • MSK unique verifiable identifier
  • the user utilizes the handset’s
  • Alarm Configure icon in the Home Control and Monitor menu to communicate with the Dev 106, in order to configure the alarm I/O, such as: door and window entries, motion detectors, alarm speakers and horns, and cameras in more descriptive terms (instead of plain numeric values), such as: Door/Window Entry #1 into BR2 (bedroom #2 window), Motion input #1 into Hall (motion detector), Camera #5 into Back yard (camera), when he/she is at home, away, or far away from home.
  • the user utilizes the handset’s
  • the user utilizes the handset’s
  • Program/Control icon in the Home Security menu to communicate with the Dev 106, in order to program and arm the house alarm system, when he/she is at home, away, or far away from home.
  • the Dev 106 transmits a message, preferably with video (or streaming video) data, to the user’s handset informing him/her a certain event has happened to his/her house, such as: a break-in.
  • the user then can view and find out through the handset where and when (which entries and time) the event took place, when he/she is away or far away from home.
  • the Dev 106 transmits a message, preferably with video (or streaming video) data, to the user’s handset informing him/her a certain event has happened in the camera monitoring device, such as: detection of a moving object outside his/her house, when the owner is at home, away, or far away from home.
  • the user utilizes the handset’s Appliance Add icon in the Home Appliances menu to communicate with the Dev 106, in order to discover or find out the presence of house-hold devices.
  • the handset then has them connected and transferred their software applications to the Dev 106, and then to the handset; or has them provided the URLs (web links), which allow the user to download the software applications to his/her handset which also transmits them to the Dev, or the Dev can download automatically the app from said URLs.
  • the user can then run these apps to control these said devices remotely, when he/she is at home, away, or far away from home.
  • the user utilizes the handset’s the handset’s
  • the user communicates with his/her household/premises appliances either interacting with the Dev directly or via his/her handset. It also presents an alert text message the user receives from the Dev on his/her registered handset when an external household/premises device attempts to connect to its private (wired/wireless LAN) LAN/WLAN network; it only allows said attempt into its network with the user’s permission.
  • a household/premises appliance either interacting with the Dev directly or via his/her handset. It also presents an alert text message the user receives from the Dev on his/her registered handset when an external household/premises device attempts to connect to its private (wired/wireless LAN) LAN/WLAN network; it only allows said attempt into its network with the user’s permission.
  • the user communicates with his/her household/premises appliances such as the Cloud Storage (block 4904 of Fig. 49/50/51) via his/her handset (executed by both the Dev’s Cloud Storage app 639 of Fig 6 and the handset’s Cloud Storage app 739B of Fig 7B) in order to store (upload) photos residing in said handset. He/she can also store the photos or video in real-time while taking said pictures or recording video. Files and other documents in the handset such as journals, personal notes can also be stored (with or without encrypted password) on or retrieved from the Cloud Storage.
  • the Cloud Storage block 4904 of Fig. 49/50/51
  • his/her handset executed by both the Dev’s Cloud Storage app 639 of Fig 6 and the handset’s Cloud Storage app 739B of Fig 7B
  • He/she can also store the photos or video in real-time while taking said pictures or recording video.
  • Files and other documents in the handset such as journals, personal notes can also be stored (with or without encrypted password) on
  • the user utilizes the handset’s
  • Appliance Remove icon in the Home Appliances menu to communicate with the Dev 106, in order to remove a certain house-hold device or devices which are no longer in use, when he/she is at home, away, or far away from home.
  • the Dev 106 is used as a
  • Vending Machine Controller (executed by its Vending Machine App, one of 3 rd Party Apps block 613 of Fig. 6) dispensing merchandise item(s) where a customer can use his/her handset (with a displayed QR barcode block 5322 he/she is able to scan using his/her handset to obtain the URL for instant access to Vending Machine App) to purchase said item(s) and pay with the encrypted credit account information in the handset.
  • the Dev 106 also is used as a bus/train passenger information service controller communicating with the passengers’ handsets while they are about to get onboard. It lets the passengers know if they are boarding the right trip by texting to their handsets. It also transmits the trip itinerary information map and alerts its passengers when they are about to arrive to their destination.
  • Restaurant App one of 3 rd Party Apps block 613 of Fig. 6) is used as a Handset Traffic Controller and/or a public DHCP server openly allowing and connecting a plurality of mobile devices (i.e., handsets, tablets, flat screen displays and the likes as mentioned throughout in this invention) to its public WIFI network, in order for it to transmit and display its products and services to potential customers (in this case: menus to its restaurant customers via their handsets), alert its service staffs of the customers’ presence (via handsets/tablets of waiters in charge of the tables or servicing robots), taking the customers’ orders (from their handsets or waiters’ handsets), transmit said orders to its kitchen/bartending staffs (to their handsets/tablets or overhang flat-screen displays), inform its waiting staffs or servicing robots when the orders are ready to be served, complete the payment transaction when the customers are ready to pay and also allow its owner (the restaurant owner) to view, monitor and/or survey the quality of service his/her customers being rendered.
  • mobile devices
  • the user utilizes the handset’s
  • Garage Opener icon in the Home Appliances menu or in the Home App menu to communicate with the Dev 106, in order to open or close the garage door(s).
  • the Dev also lets user know if the garage is closed or opened, when he/she is at home, away, or far away from home.
  • the user utilizes the handset’s
  • Heat/ AC icon in the Home Appliances menu to communicate with the Dev 106, in order to program the central air unit, such as: when and at what degree to turn it on and at what degree to turn it off, to control in real-time, and view its status at any moment, when he/she is at home, away, or far away from home.
  • the user utilizes the handset’s
  • the user utilizes the handset’s
  • Sprinkler icon in the Home Appliances menu to communicate with the Dev 106, in order to program the landscape sprinkler, such as: on which day(s) of the week, at what time and for how long, and which station(s) to turn the sprinkler system on to water the landscape (garden, and house plants and the like).
  • the sprinkler can also be turned on or off at any moment by the user via the handset at home, away, or far away from home.
  • the user utilizes the handset’s Electric Meter icon in the Home Appliances menu to communicate with the Dev 106, in order to set up the monthly electricity payment account, so the Dev 106 will acquire the electricity meter reading every month, and then transmits it to the utility company which will receive the payment automatically or bill the user who will then pay it via his/her handset, when he/she is at home, away, or far away from home.
  • the user utilizes the handset’s
  • Help Alert icon in the Home Appliances menu to communicate with the Dev 106, in order to monitor and communicate with the wearer of the Help Alert device via his/her handset, when he/she is far away from the premises.
  • the user utilizes the handset’s
  • the user utilizes the handset’s
  • Smart Pet Door icon in the Home Appliances menu to communicate with the Dev 106, in order to program and set up the Smart Pet Door system for the pets’ daily needs, and to control its components in real-time, when he/she is at home, away, or far away from home.
  • Dev 106 integrating in the robotic application, allows a plurality of users to program, control, direct, command, and monitor its functions in its surrounding environment, while at the same time, be informed of any expected and unexpected events relating to its application.
  • the invented device/appliance or Dev (for short) 106 is the present invention communicating with the handset 102 which also can be a smart phone, tablet PC, laptop PC, iPad- like device, PDA (Personal Digital Assistant), or any portable, mobile electronic device through SRC media 104 (Short Range Communication) which it uses during an activation process or when they are within said SRC network range.
  • the Dev 106 is shown either residing in an automobile 120, a residential house (or business premises) 122 or a general robotic device (equipment) 124.
  • the Cellular Service Provider or Service Provider 112 is the provider of cellular communication service to the Dev 106 thus recognizing and allowing it to communicate with other cellular devices through wireless network 118. Before the Service Provider 112 can recognize the Dev 106, the Dev 106 has to be activated.
  • the activation process involves the exchanges of pre-usage/pre- programmed and/or specific unique issued information between the Dev 106 and the Service Provider 112 itself or a combination of its network computers/servers [such as MSC (Message Switching Center), VLR (Visitor Location Register), HLR (Home Location Register), AuC (Authenticity Center), Activation Server, and other backend systems as are known to those of ordinary skill in the art] , which are proprietary in nature to the service provider but known in this invention simply as Provision Server 114.
  • the Dev 106 contains some of the parameters for activation in its internal memory storage. Some of them the Dev 106 obtained by downloading from the service provider 112 and/or the Provision Server 114 via the handset 102.
  • the App Server 108 can be either provided by the Dev 106 manufacturer (not shown in Fig. 1) and/or by the Service Provider 112 operator (also not shown in Fig. 1 in cooperation with the Dev 106 manufacturer).
  • the App Server 108 in latter case can be part of the Service Provider 112 intranet network just as shown in the backend connection 120 between the Provision Server 114 and the Service Provider 112
  • Fig. 1 also shows BTS (Base Transceiver Stations) or The Towers 110 (as illustration herein, the communication between the various devices going to the Service Provider 112 but actually goes through one or more Towers 110 first).
  • BTS Base Transceiver Stations
  • the Towers 110 (as illustration herein, the communication between the various devices going to the Service Provider 112 but actually goes through one or more Towers 110 first).
  • the information from one device goes through one or more towers 110 and then is transmitted to one of the regional Service Provider 112.
  • the Service Provider 112 then again passes said information to one or more towers 110 where it finally reaches the destination server/computer.
  • FIGS 2- 4 illustrate preferred examples of embodiments 200, 300 and 400 of the present invention in terms of hardware block diagrams as are known to those of ordinary skill in the art. They present the Dev 106 integrating and interfacing into the Car control and Monitor System as represented by Illustrations 200 in Fig. 2, the House Control and Monitor System 300 in Fig. 3, and the General Robotic Control and Monitor System 400 in Fig. 4.
  • the principle components of the Dev 106 are the CPU 248, its associated cellular phone circuitry 246, and its RF interface circuitry (RF Transceiver 244, RF Amp 234 and Antenna 232).
  • RF Transceiver 244, RF Amp 234 and Antenna 232 One noticeable exception is the Car Control and Monitor System (Fig.
  • CAN Controller Area Network
  • An example of the CPU and its associated circuitry, or chipset is X- GOLD 101 single-chip by Intel Corp., NEON Cortex-A9 licensed by ARM, and others, such as: Qualcomm and many, as are known to those of ordinary skill in the art.
  • Block diagrams 200, 300 and 400 also include the wireless LAN controllers (which may also referred to as Wi-Fi or WIFI communication over one of more wireless local area network WLAN) and its associate circuitry 256, 254, 252 and 242, the volatile and non-volatile memory storage 264 (flash, SDRAM, RAM, EEPROM, ...), clock system 236, I/O interface 238/338/438, Real Time Clock 240 and power and battery backup 250. They also include one or more of the SRC (Short Range Communication) devices, such as: NFC 258, Bluetooth 260, wireless/wire USB 262, and other wireless radio frequency (RF) technology (not shown).
  • SRC Short Range Communication
  • Embodiment 200 includes the Hands-free Speaker, Microphone, and voice activated circuitry 230 which can also reside in embodiments 300 and 400.
  • the Hands-free Speaker, Microphone, and voice activated circuitry application 532 can also reside in embodiment 600 while embodiment 400 offers a plurality of cellular handset interface circuitry 439, 436, 434, and 432.
  • Fig. 2 also includes some inputs and outputs (I/O) which are very useful and lifesaving, such as when the driver runs into an accident, where he/she may not have the mental or physical capability to take immediate actions to deal with the circumstances.
  • I/O inputs and outputs
  • the Input Dial & Talk button 204 offers a convenient way, when the driver does not happen to have the handset in his/her possession, to get in touch with a family member (registered handset 102) when the occasion requires.
  • - Air Bag (226) In the case when there is an accident, which caused big impact to the car and/or inflated its Air Bag (226 in Fig. 2), the Dev 106 transmits alert emergency messages with the vehicle location to the Emergency Center (not shown) and to registered handsets at least one time (i.e., 911 in US and Canada, China 110 or similarly depending on national and geographical locations as mentioned earlier in the text). The Dev 106 also dials Emergency Center, and turns on the Hands-Free Microphone and Speaker (230 in Fig. 2), so the driver can communicate with the Emergency Center operator.
  • the Emergency Center not shown
  • registered handsets at least one time i.e., 911 in US and Canada, China 110 or similarly depending on national and geographical locations as mentioned earlier in the text.
  • the Dev 106 also dials Emergency Center, and turns on the Hands-Free Microphone and Speaker (230 in Fig. 2), so the driver can communicate with the Emergency Center operator.
  • the Dev 106 will transmit emergency messages with the vehicle location to the Emergency Center (not shown) via satellite network if programmed to do so (not shown) or via a hybrid network consisting many types of media - wire, wireless, terrestrial and satellite as are known to those of ordinary skill in the art. If the Dev 106 still gets no response, after its message transmission, from the Emergency Center, whatsoever, it will transmit a satellite emergency command to the GPS (3182 in Fig. 31), which in turn preferably transmits it to the Emergency Center, along with its GPS location (not shown) via satellite.
  • the Dev 106 (multiple times in a row) will transmit an electrical signal to the Dev 106 which will transmit the emergency messages with the current GPS location to the other registered handsets 102 and the Emergency Center (not shown).
  • the Dev 106 also dials the Emergency Center and turns on the Hands-Free Microphone and Speaker (230) to allow the driver of the vehicle to communicate with the Emergency Center personnel.
  • the Dev 106 also dials a registered handset and (if it answers) connects to the Hands-Free Microphone and Speaker (230) to allow the driver of the vehicle to communicate with the user (i.e.; family member) of said handset.
  • Figures 2 and 3 also illustrate the communication between the handset 102A and the
  • Dev 106 via the SRC network 104, such as: during the activation process ( Figures 8, 9, 11/13, 12 and 14), or when they are within their short range communication (SRC) medium, and via the cellular (or other wireless) network 118 during normal operation.
  • SRC short range communication
  • Figures 5 and 6 illustrate preferred examples of embodiments 500 and 600 of the present invention in terms of software block diagrams as are known to those of ordinary skill in the art. Illustration 502 represents the Auto Application and illustration 602 represents the Home Application. Each of these two preferably contains two principle software blocks:
  • Dev Base 552/652 along with core OS 540 (such as iOS, Google’s Android mobile OS) forms the basic kernel.
  • the Dev base 552/652 preferably consists of the Dev ID Parameter 542/642 (contains manufacturer name and production date, S/N number, model number, plant location), the Download layer/module 544 (used to download the updated version of Op App module 506/606 when the current version of its software application needs to be updated), the Cellular and Wireless LAN layer/module 546 (cellular and wireless LAN device driver and management module), the NAM (Name Assignment Module) 548/648 and the SIM (Subscriber Identity Module) 550/650 which contain all NAM and SIM related information parameters, such as: ESN, IMSI, etc.
  • NAM Name Assignment Module
  • SIM Subscriber Identity Module
  • Dev App 504/604 runs the application software allowing the Dev 106 to communicate with other wireless devices - decode and execute the program/control commands and the status/monitor commands received from the handset 102.
  • the Dev App 504/604 preferably consists of two modules:
  • Handset Information module 560 (common for both automobile and home applications - consists of the handset 102 information such as: user’s handset phone number, account number, passwords, other handsets’ phone numbers, email addresses, etc.).
  • - Op App module 506/606 preferably consists of the Command Communication layer/module 508/608 which receives the commands from and transmits the statuses to the handset 102, the Status and Monitor layer/module 510/610 which decodes and executes the status and monitor commands from the handset 102, the Event layer/module 512/612 which detects the changes in Dev’s I/O and events, the Program and Control layer/module 518/618 which decodes and executes the program and control commands from the handset 102, the Dev Activate/De-activate layer/module 514/614 which decodes and executes the activation/de-activation commands from the handset 102, the Handset App Update layer/module 516/616 which decodes and executes the handset information update commands from the handset 102, the Handset Registration layer/module 522/622 which decodes and executes the handset registration commands from the handset 102, the Dev Configure layer/module 524/624 which decodes and execute
  • Car Op App module 506 and Home Op App module 606 preferably contain some other modules which are only applicable to each own functions.
  • the Op App module 506 preferably contains the Account Payment setup layer/module 530, the Hands-free Audio I/O layer 532 (used for voice triggered Dev activation) that allows the Dev 106 to communicate in hands-free mode, with the driver during toll collector fee transaction or commands the Dev 106 to dial and connect to an emergency center, thus allowing the driver to communicate in hands-free with the emergency personnel.
  • the module 606 preferably contains the Home Appliance layer/module 630 which discovers the household appliances/equipments, downloads their online applications or provides their download links to handset 102); then stores, executes the HH App 632 as commanded by the handset 102 (Household Appliances icon 1344 Fig. 13) in communication with a plurality of household
  • Dev App 504/604 preferably contains the communication and application functions interacting with the resident (or on-device) functions and the OS kernel which provides a uniform interface to the CPU and its environment.
  • the kernel manages the CPU resource by allocating task (RTOS) for each function, such as: Command Communication layer/module, IPC (Inter-Process Communication between multiple tasks or Process-Cooperation), memory management, fde system (FS), I/O device management, network management (cellular, LAN and other wireless networks), and associated drivers (all are not shown).
  • RTOS allocating task
  • Figures 7A and 7B illustrate preferred examples of embodiments 700A and 700B of the present invention in terms of software block diagrams residing on the registered handset(s) 102.
  • Illustration 702A is the counter part of 502 in Fig. 5 and illustration 702B is the counter part of 602 in Fig. 6 as are known to those of ordinary skill in the art.
  • Both the Handset Application 704A of the handset 102 in Fig. 7A and the Dev App 504 of the Dev 106 in Fig. 5 are used to communicate to each another.
  • An example is when the user wants to see the car device information. The user browses through the handset 102 to the Auto Dev Facility Menu 1150 which preferably contains the Dev Info icon 1166, which when executed, makes the handset 102 navigate to the Auto Device
  • the handset 102 transmits the“car Dev information” message/command to the Dev
  • the command/message is then received and decoded by the Command Communication layer/module 508 and executed by the Car Dev Info module 520 of Dev 106 in Fig. 5.
  • the Dev 106 then transmits the requested data back to the handset 102 which receives and displays the information as shown on the Auto Device Information screen 2810A (Fig. 28A).
  • Dev Application 604 of Dev 106 in Fig. 6 are used to communicate with each another.
  • the Operation layer 706B of Fig. 7B there is an equivalent counterpart module in the Op App 606 of Fig. 6.
  • An example is when an unauthorized entry /break-in to the house as indicated in illustration 4632 through Bedroom 2 (BR2 4638) in Fig. 46 (one of the inputs of the Entry detections 308 in Fig. 3) produces an alarm which sends a signal to the Dev 106 and is handled by the Event layer/module 612 in Fig. 6.
  • the Event layer/module 612 decodes the break-in, which is one of the inputs of the Entry detections 308 Fig.
  • the Command Communication layer/module (708B in Fig. 7B) receives and decodes the message and passes it and its data to the Event layer/module 716B which executes and retains data in its memory ready to be displayed (as indicated by illustrations 4632, 4652 and 4660 in Fig. 46) when the user views the displayed message(s) after navigating through several display screens (as indicated by illustrations 4602, 4606, 4612 and 4622 in Fig. 46) as are known by those of skill in the art.
  • Figures 8, 9 and 10 illustrate preferred examples of embodiments 800, 900, and 1000 of the present invention in the handset 102 having the activation and application software downloaded into its memory storage from the App Server 108.
  • the handset 102 Before being able to communicate with the Dev 106, the handset 102 has to have compatible software application in its Memory /Storage area 264 Fig. 2/3/4. While the user attempts to have the Dev 106 activated by pushing the activation button (located somewhere near the garage button on the lower side of the interior rear view mirror, in the case of the automobile application; or using the voice activated circuitry (230 of Fig. 2) while inside the car; or an activation button inside the enclosure in the case of the home application; or as shown 1814C/1844C in Fig.
  • the activation button located somewhere near the garage button on the lower side of the interior rear view mirror, in the case of the automobile application; or using the voice activated circuitry (230 of Fig. 2) while inside the car; or an activation button inside the enclosure in the case of the home application; or as shown 1814C/1844C in Fig.
  • the newly Dev 106 (has not been activated nor registered) sends the activation software request message/command step 802 to the handset 102 via SRC (Short Range Communication) 104.
  • SRC Short Range Communication
  • the Dev 106 sends another message step 804 to the handset 102 inbox, indicating no associate software existing in the handset 102 (step 820 in Fig. 8, which is shown in more detail as in handset display screen 902/1002 in Fig. 9/10).
  • the user then screen touches the web address link (URL) 906/1006 (Fig. 9/10), which makes the handset 102 send the application menu download request step 806 to the App Server 108 (Fig. 8).
  • the App Server 108 transmits back the requested information step 808 to the handset 102 as shown in the handset display 822 presented in more detail in screen 920/1020 (Fig. 9/10).
  • Screen 940/1040 shows the application being downloaded 944/1044, its model or serial number 942/1042, and message to the user to check the tool box 948/1048 for the presence of the software.
  • the user then flips to screen 960/1060 and selects (e.g., executes) the Auto/ Home Application 962/1064 which takes to screen 980/1080, which shows the icon 982/1082 representing the just downloaded software.
  • the handset 102 also preferably displays the updating status of Dev application software 950/1050, if there is any update requirement from the App Server 108 to the Dev 106.
  • the Dev’s application may need to be updated from the App Server to the Dev (step 816).
  • Fig. 11/13 illustrates a preferred example of embodiment 1100/1300 of the present invention for auto/home application. It illustrates what first preferably needs to be done after the activation and application 1104/1304 has been downloaded into the handset 102.
  • the handset 102 starts at screen 1102/1302 which shows the Auto/Home App 1104/1304 has been completely downloaded into the handset 102 after the user flips through screens 902/1002, 920/1020, 940/1040, 960/1060, and 980/1080 then executes the appropriate link and icons regarding the auto/home application download.
  • Screen 980/1080 is repeated as screen 1102/1302 containing the Auto/Home App icon 1104/1304.
  • said icon 1104/1304 is executed by the user, it will make the handset 102 navigate to screen 1120/1320 showing the Auto/Home App Menu 1122/1322.
  • the Dev 106 will be able to communicate with the handset 102 (the one helping it to be activated into the network - handset #1) as soon as it is finished with the activation, since it contains the phone number of the said handset 102.
  • the user then registers his Dev to the App Server website by creating his/her account, unique access IDs such as: user ID and password, and enters required information such as his/her name, contact phone number, email address along with Dev’s ID parameters such as: S/N (serial number) and the likes (not shown) as required similarly to the currently available system(s) and also as are well known to those of ordinary skill in the art.
  • Dev Dev
  • S/N serial number
  • the App Server simply acts like a router
  • the Dev During subsequent registration from another handset/device with an unmatched MSK, the Dev will alert and transmit an allowance/non-allowance command to its registered handset(s) and only when it receives an affirmative response from its registered user or one of its registered users, it will allow said registration to come to a successful conclusion and thus transmitting a MSK to the newly registered handset. If no response from its registered handset, the Dev requires the user, even after providing the right user ID and password, to provide the correct answers to further security questioning, such as: user’s birth place, mother maiden name, favorite color and the likes.
  • the following table presents a very short and partial list of the Mail to SMS gateway of some carriers as illustration only.
  • Telecom 1616 Truphone Limited, China Motion Telecom, and China-Hong Kong Telecom.
  • Fig. 12 illustrates a preferred activation example of embodiment 1200 of the present invention for auto/home application. It presents the Dev Vehicle/Home activation screen 1202, where the handset 102 navigates to, after the Activate icon 1154/1354 (Fig. 11/13) is executed. This screen starts the activation process by letting user enter required information in order to have the Dev 106 activated into the service provider’s network. Before the Dev 106 can connect to the network, so it can make calls and communicate data with other cellular and/or wireless devices, it needs to be recognized by the service provider, its user/owner subscribes to and thus activation is required.
  • the present invention takes advantage of the advance and progress made by the service provider, providing OTA (Over The Air) activation procedure where“not yet register mobile device (Dev 106)” can make one time connection to its network in order to be
  • the user applies, signs up, and chooses a service plan with the service provider.
  • the user after being approved, preferably receives from the service provider an IP address, user ID, an activation password and through his/her handset 102 obtains an encrypted UTAID (Unique Temporary Activation Identifier) which as mentioned earlier also preferably contains an activation type/methodology (NAM, SIM, ModSIM or other) and the activation key.
  • the handset 102 starts the activation process by transmitting the UTAID and the user account information to the Dev 106.
  • the Dev 106 then processes the data and separates the activation type from the UTAID, decodes the activation type and begins the activation accordingly (either NAM, SIM, ModSIM or any other activation methodology).
  • the Dev 106 then transmits the activation key, Dev ID parameters along with the accompanying activation data to the service provider 112 or the provision server 114 when it is temporarily allowed into the service provider’s network.
  • the activation key and data are then routed to the OTA activation processor (or responsible servers) by the service provider/provision server/computer which authenticates them for activation processing and finally registers the Dev 106 into its network.
  • the Dev 106 also derives its security/encryption key from the UTAID for the encryption of its communication data to other devices.
  • the user enters the service provider’s IP address 1208 (as shown in 1224), activation User ID 1210 (as shown in 1226), activation password 1212 (as shown in 1228), and his/her handset phone number 1214 (as shown in 1229), using screen keyboard 1235; then executes Ok icon 1230.
  • Handset 102 then connects to the Dev 106 and communicates with it via SRC 104 (since Dev 106 has not been able to connect to the network 118 yet) 1253 transmitting its phone number 1254, user account information 1256, UTAID 1258 and receives the mobile security key (MSK) from the Dev 1259.
  • the handset then transmits the activation command 1260 to the Dev 106, and then waits for said Dev 106 to complete its activation 1262.
  • the Dev 106 completes its activation, it recycles its power (or does a power-on reset 249 Fig. 2/3/4), and then registers into the network.
  • the Dev 106 completes the activation successfully as soon as it receives the confirmation message from the service provider 1268 within a predetermined time out period.
  • the user is notified of the activation completion message from the Dev 106 in the inbox 1274 and executes the Success icon 1276 to complete the activation process.
  • the Dev 106 sends the confirmation message 1274, 1292/1296 and initialization icon 1290/1294 to the handset 102 for the user to respond.
  • the user executes initialization icon 1290/1294 in setting up all user’s information and the handset’s parameters into Dev’s memory as described in Fig. 19/20.
  • user can manually enters Dev’s phone number into his/her handset for communication with said Dev via its screen display inputs (not shown) when the network does not support such mechanism as shown in 1266.
  • Fig. 14 illustrates a preferred activation example of embodiment 1400 of the present invention for auto/home application.
  • the user preferably has an option to start the Dev activation, as shown in the handset’s screen 1402, either via OTA (Over The Air) Activation selection 1416 (as described in detail in Figures 12, 15A - 17A), Manual (Manual Activation) selection 1413), HIA (Handset Imitation Activation) selection 1419 or HAA (Handset Assist Activation) selection 1418.
  • OTA Over The Air
  • Activation selection 1416 as described in detail in Figures 12, 15A - 17A
  • Manual Manual Activation
  • HIA Heandset Imitation Activation
  • HAA Heandset Assist Activation
  • Handset Assist Activation allows user (when HAA icon 1418 is checked and Ok icon 1415 is then executed by the user) to activate the Dev using his/her handset, communicating directly via said handset with the cellular provider/provision server without the Dev interacting with the provider/provision server (as was in the case of the OTA activation of Fig. 12).
  • the user starts out the HAA by filling Provider/Provision server’s activation web address 1424, Activation User ID 1426 and Activation password 1428 along with the handset phone number 1429.
  • the user then executes Ok icon 1430 making the handset navigate to screen 1436 showing the handset transmitting the activation request to the cellular provider/provision server 1439 and the name of the provider 1441.
  • the screen also shows the handset sending the correct activation password 1440 and receiving the user account information 1442 (or Dev/account phone number) and 1444 along with the UTAID 1446 (also in block 1506A/1506B of Fig. 15A/15B, block 1506A/1606B of Fig. 16A/16B, block 1506A/1706A of Fig. 17/17A) from the service
  • the handset then navigates to screen 1450 displaying the communication (transmission) of its phone number (1454), ace information 1456, UTAID 1458 and activating command 1460 to the Dev (also in block 1508A/1508B of Fig. 15A/15B, block
  • the handset also acknowledges receiving and saving the MSK from the Dev 1459 (also in block 1509A/1509B of Fig. 15A/15B, block 1509A/1609B of Fig. 16A/16B, block 1509A/1709B of Fig. 17/17A).
  • the handset receives the Dev’s Activation key and ID parameters 1461 (also in block 1510A2 of Fig. 15A, block 1610A2 of Fig. 16A, block 1710a of Fig. 17), and passes the activation key 1462 and said parameters 1463 to the provider/provision server (also in step 1510A4 of Fig.
  • the handset receives the activation confirmation (along with Dev assigned phone number 1466 and Dev activation/registered service ID parameters 1465) from the provider/server (also in block 1514A2 of Fig. 15A, block 1614A2 of Fig. 16A, block 1714a of Fig. 17), and passes them (confirmation and Dev phone number, service ID parameters) to the Dev 1467 (also in step 1514A4 of Fig. 15A, step 1614A4 of Fig. 16A, step 1714c of Fig. 17).
  • the Dev 106 As soon as the Dev 106 receives the confirmation and parameters from the handset, it saves all these parameters in its memory (also in block 1516A/1516B of Fig. 15A/15B, block 1616A/1616B of Fig. 16A/16B, block 1716/1716A of Fig. 17/17A), recycles its power (also in block 1519A/1519B of Fig. 15A/15B, block 1619A/1619B of Fig. 16A/16B, block 1719/1719A of Fig. 17/17A or does a power-on reset 249 Fig. 2/3/4), and then registers into the network.
  • the Dev then transmits a message 1492/1496 and initialization icon 1290/1294 to the registered handset where its user confirms 1476 and executes initialization icon 1490/1494 in setting up all user’s information and the handset’s parameters into Dev’s memory as described in Fig. 19/20.
  • the Dev preferably transmits several messages, one at a time within one hour of each other, to the handset until it receives the acknowledgement from its user. Otherwise if it has not received any within 24 hours, the Dev deletes handset phone number from its memory and the user has to restart the activation again.
  • Figures 15A-17A show more in detail of the handset screens 1220/1420
  • NAM name
  • the present invention also supports the systems and methods of activation not yet known to the inventor, still under development and/or not yet developed as technology advances and keeps on improving, and the Dev 106 can be specifically designed to work with any cellular service providers to comply with their specification and requirement.
  • Figures 15A and 15B illustrate preferred activation examples of embodiment
  • step 1502A/1502B (which is equivalent to screen 1220/1420 in Fig. 12/14), where the user enters the handset’s phone number, the service provider/provision server IP address, user’s activation ID, the activation password, and executes the command Ok icon
  • the handset 102 then transmits the activation request and activation password
  • the handset 102 transmits its phone number, user’s account information, and the UTAID to the Dev 106 in steps 1254/1454, 1256/1456, and 1508A/1508B.
  • the Dev 106 preferably starts the OTA activation by transmitting the activation key and ESN/MEID/EMEI (Electronic Serial Number / Mobile Equipment Identifier / International Mobile Equipment Identifier) 1510A/1510B.
  • Step 1510A illustrates Dev transmitting its activating parameters to the Service Provider / Provision Server during the OTA (Fig. 12) while during the HAA (Fig. 14), the handset receives said activating parameters from the Dev (step 1510A2), then transmits them to the Service Provider / Provision Server (step 1510A4).
  • the Service Provider / Provision Server 112/114 receives, processes and verifies the activation key is correct and is able to associate the activation key with the user’s account information in its server database 1512A/1512B.
  • the Provision Server 114 then preferably transmits the assigned phone number, all other parameters**, and the activation acknowledgement 1514A/1514B to the Dev 106.
  • Step 1514A illustrates Dev transmitting the assigned phone number, all other parameters**, and the activation acknowledgement the Service Provider / Provision Server during the OTA (Fig. 12) while during the HAA (Fig. 14), the handset receives said activating parameters and activation acknowledgement from the Service Provider / Provision Server (step 1514A2), then transmits them to the Dev (step 1514A4).
  • the Dev 106 then stores the NAM parameters into its NAM storage memory area
  • the Dev 106 then recycles its power (or does a power-on reset 249 in Fig. 2/3/4) and then registers into the network 1519A/1519B as are known to those of ordinary skill in the art.
  • the activation is successful when it receives confirmation acknowledgement 1520A/1520B from the service provider 112; in other words it is able to connect to the network.
  • the Dev 106 preferably communicates (via SRC 104) its progress status with the handset 102 as shown previously on screen 1250/1450, step 1511 A, and finally via the cellular network 118 the confirmation text message 1522A/1522B also as shown on screen 1292/1492 along with Dev Initialization icon 1290/1490 or 1294/1494.
  • the user preferably then executes said icon to start the Dev initialization process on his/her handset 102 (as shown in Figures 19 and 20), in order for said handset 102 to communicate and utilize all the Dev’s functions and capabilities. If the user fails to do the initialization right away, preferably the Dev 106 will periodically sends the same initialization message and icon to the user’s handset until it receives the confirmation response from said user.
  • the Dev 106 is not like the typical mobile handset which along with its SIM module is issued or manufactured by the cellular service provider or its affiliated third parties. These mobile handsets already have the Serial Number and IMEI (International Mobile Equipment Identity) recorded into the handsets’ memory or in print inside the handset by the battery, IMSI (International Mobile Subscriber Identity) programmed into the SIM modules, a Ki (authentication key), encryption key, possibly an ICCID, and thus are associated with said cellular service provider; and therefore can be easily activated into the service provider network, at initial power-up.
  • the SIM module also functions as a storage device and thus contains personal information, such as: user phone directory, text messages, pictures, etc.
  • the Dev 106 is designed each with its own unique IMEI and a SIM storage memory area containing a minimum amount of preprogrammed parameters such as a dummy IMSI (or optionally IMSI derived in the UTAID issued by the service provider dining pre-activation). This would allow any service provider to supply the remaining parameters to store into its SIM memory during the activation process. The user therefore, can choose, pick, and change service provider at any moment.
  • the Dev’s SIM contains a minimum amount of pre -activation parameters as in this exemplary embodiment, an IMEI or a SN (serial number so it can be associated with the Dev 106), an IMSI value which it uses during the activation for identification.
  • the Dev is preferably factory programmed into its NVRAM (non-volatile random access memory) or EEPROM (blocks 266 Fig. 2/3) with SIM parameters such as: IMEI (International Mobile Station Equipment Identity), ESN/MEID (Electronic Serial Number/Mobile Equipment Identifier), IMSI (International Mobile Subscriber Identity), TMSI (Temporary Mobile Subscriber Identity), MSISDN (Mobile Subscriber ISDN Number) and so for.
  • SIM parameters such as: IMEI (International Mobile Station Equipment Identity), ESN/MEID (Electronic Serial Number/Mobile Equipment Identifier), IMSI (International Mobile Subscriber Identity), TMSI (Temporary Mobile Subscriber Identity), MSISDN (Mobile Subscriber ISDN Number) and so for.
  • IMEI International Mobile Station Equipment Identity
  • ESN/MEID Electronic Serial Number/Mobile Equipment Identifier
  • IMSI International Mobile Subscriber Identity
  • TMSI Temporary Mobile Subscriber Identity
  • MSISDN Mobile Subscriber ISDN Number
  • Step 1610A illustrates Dev transmitting its activating parameters to the Service Provider / Provision Server during the OTA (Fig. 12) while during the HAA (Fig. 14), the handset receives said activating parameters from the Dev (step 1610A2), then transmits them to the Service Provider / Provision Server (step 1610A4).
  • the service is Dev transmitting its activating parameters to the Service Provider / Provision Server during the OTA (Fig. 12) while during the HAA (Fig. 14), the handset receives said activating parameters from the Dev (step 1610A2), then transmits them to the Service Provider / Provision Server (step 1610A4).
  • the Dev 106 then stores the SIM parameters into its SIM storage memory area
  • the Dev 106 then recycles its power (or does a power-on reset in Fig. 2/3/4) and then registers into the network 1619A/1619B, as are known to those of ordinary skill in the art.
  • the activation is successful when it receives a confirmation
  • acknowledgement 1620A/1620B from the service provider 112 in other words it is able to connect to the network.
  • the Dev 106 preferably communicates via SRC 104 its progress status with the handset 102 as shown previously on screen 1250/1450 and step 1611A, and finally via the cellular network 118 the confirmation text message 1622A/1622B, (also as 1292/1492, shown on inbox screen 1280/1480) along with Dev Initialization icon 1290/1490.
  • the user preferably then executes said icon 1290/1490 to start the Dev initialization process on his/her handset 102 (as shown in Figures 19 and 20) in order for said handset 102 to communicate and utilize all the Dev’s functions and capabilities. If the user fails to do the initialization right away, preferably the Dev 106 will periodically sends the same initialization message and icon to the user’s handset until it receives the confirmation response from said user.
  • Figures 17 and 17A illustrate preferred activation examples of embodiment 1700 and 1700A of the present invention in having the Dev 106 activated in the Modified Subscriber Identity Module (ModSIM) storage memory area.
  • ModSIM Modified Subscriber Identity Module
  • the Dev 106 starts out similarly as described in steps 1502A/1502B, 1504A/1504B, 1506A/1506B and 1508A/1508B in Fig. 15A/15B.
  • acknowledgement 1720/1720A from the service provider 112 in other words it is able to connect to the network.
  • the Dev 106 in the home application (as represented by the hardware and software block diagrams in Figures 3 and 6) is a stationary device. In other words, it normally does not need to do roaming. There preferably exists a mechanism or a method such as a bit/flag in the subscriber account, so the service provider can distinguish it from a typical mobile device which does roaming; and therefore few service provider’s resources are allocated to support it, which in turn can lower the service cost to users/customers in the home application.
  • the Dev 106 (in home application unlike in vehicle and robotic applications), in turn, does not have to broadcast its presence periodically, as in this method, since its registration (identity data) stays (resides) with the same MSC/VLR in the service provider’s network.
  • Service Provider/Provision Server s activation website address 1806A, Activation User ID 1808A and Activation password 1810A along with user’s handset phone number 1814A (screen 1802A) are entered on the handset via keyboard 1820A.
  • Ok icon 1812A When Ok icon 1812A is executed, it makes the handset pass said data to the Dev via SRC steps 1824A, 1826A and 1828A.
  • the Dev then sends back to the handset MSK 1830A and acquires IMSI or TMSI (step 1832 A) which it transmits to the cellular service provider 1834 A and in return, the provider requests for the authentication key 1836A.
  • the Dev requests authentication key from handset (1838A), receives (1840A) and transmits it 1842A to the server and is able to connect to the network (thus using said handset’s service account and said handset device service IDs).
  • the handset at this time ceases its cellular activities temporarily (by not transmitting or broadcasting IMSI, TMSI and only resumes said activities after being informed by the Dev of its activation completion 1868A/1870A or after a certain timeout period e.g., less than 5 minutes).
  • the Dev connects to the network 1844 A, is online to the Service Provider/Provision Server website 1846 A, transmits the activation request, User ID and password to the Service Provider/Provision Server 1848A. After User ID and password are verified and passed 1850A by the Service
  • IMSI (15 digits long or less) consists of MCC
  • Figure 18B illustrates a preferred activation example of embodiment 1800B of the present invention where the user preferably has an option to start the Manual Activation selection.
  • This activation is simple and quick as in the case where the user wants to add a line (phone number to the Dev) to his/her existing account with the current service provider who is already in possession of the user’s personal and account information.
  • the user In order to prepare for the activation, the user either contacts customer service or makes an online request for an additional line.
  • the customer service representative will ask for his/her existing main cellular number, customer’s address, tax ID (i.e., last 4 digits of social security number, in the USA) and in return, provides the user his/her Dev’s new number and the activation code preferably via text messages to his/her handset.
  • the user starts the activation by selecting Man icon 1413 and executes Ok icon 1415 (Fig. 14) making the handset navigate to screen 1804B where he/she enters the handset phone number 1806B, 1806B (twice), user ID 1810B, password 1812B, 1814B (twice).
  • the user executes 1818B making the handset transmit said information to the Dev which in turn transmits back a MSK to the handset which stores it in its memory.
  • the user then goes online to the Service Provider/Provision Server website 1848B (screen 1842B) in order to have to Dev provisioned/activated.
  • the user enters the request information such as: Dev’s new phone number 1850B and activation code 1856B
  • the Dev’s ESN or MEID retrieved by executing Dev IDs icon 1146/1346 of Fig. 11/13 and the values are as shown in 2826B of Fig. 28B
  • the account billing code 1854B executes Activate icon 1860B.
  • the user will receive a message 1872B or 1874B in the inbox informing him/her that the Dev is connecting to the network.
  • the user then executes icon 1876B/1878B to start the initialization process as described in Figure 19/20. After the initialization is finished, the user is able to fully communicate with the Dev via his/her handset.
  • FIG. 18C illustrates a preferred activation example of embodiment 1800C of the present invention where the Dev is equipped with a display (via video connector 272 Fig. 2/3/4) so the user can see what is going inside the Dev (Control and Monitor System or M/C).
  • the Dev (auto) display screen 1804C is turned on when the user starts the car ignition key and selects the M/C button 1812C while the Dev (home) display is always on as soon as the Dev is power-on 1836C. Setting up and programming the Dev can then be optionally done through its hard keypad 1806C (auto application) and soft keyboard 1822C (auto/home application).
  • dashboard console display is used to display commands up which its Dev can communicate, control and monitor other Devs as in the case of a police officer using screen 4232B in Fig. 42B
  • Figure 18D illustrates a preferred activation example of embodiment 1800D of the present invention where the user preferably has an option to start the Dev registration by inserting a valid SIM/USIM card 1802D through the SIM card connector 1821D.
  • the Dev CPU
  • receives an external interrupt 1804D wherein it verifies if its account is active or not 1806D. If the Dev’s account is active, it checks to see if Multi Account (block 1810D) is selected. If the Dev is not in Multi Account mode (Multi Accounts icon 1179/1379 of Fig.
  • the Dev tries to connect to the network 1878C and if it is not able to connect to the network, it navigates to screen 1866D letting the user know that said SIM/USIM has failed 1870D; otherwise it navigates to screen 1880D where it informs that a text and Initialization icon have been transmitted to his/her handset 1884D/1886D where user confirms and executes Initialization icon 1888D/1890D which navigates the handset to Initialization screens as described in Fig. 19/20 so the user can initialize said Dev.
  • Multi account feature (1179/1379 of Fig. 11/13) allows users to have a plurality of accounts residing in the Dev at any time, with only one active account, which is either default or previously chosen, can be used at a time. This allows the user to use the most preferable account with a new particular carrier by connecting the Dev into said carrier network without having to deactivate said Dev from the current existing network. In other words, the user can always select the new network for the Dev or revert back to any existing accounts when it is advantageous for him/her to do so.
  • screen 1930/2030 (also as shown in step 2082), the user enters car make and model, License Plate 1934 (for Auto Dev) or house address 2034 (for Home Dev), account security password 1936/2036, registered phone numbers 1937/2037 and its password, account name and service provider account number 1938/2038, Dev phone number 1940/2040, email address 1942/2042 for password recovery, emergency center phone number 1946/2046, and a plurality of other required information (not shown for clarity purpose and ease of presentation as are known to those of ordinary skill in the art).
  • the Dev also updates the encrypted MSK 1989a/2089a and transmits it 1989/2089 to the handset which stores it in its memory 1989b/2089b. Updating the MSK lets the Dev find out when an unwanted handset or device had been snooping around during the prior activation because said device attempts to communicate with it using the old expired MSK; then Dev can alert its registered handset of such activity.
  • the Dev 106 then transmits 1990/2090 back the information 1992/2092 as shown in screen 1930a/2030a, which the user can re-edit again
  • Device Name (1933/2033) lets user edit Dev’s name so said name can be saved under said Dev (1998/2098 in screen 1994/2094) allowing user to know right away which Dev to deal with, as in the case where a plurality of Devs (Dev 1996/2096 and Dev 1998/2098) reside in or are being controlled and monitored by his/her handset. For example: the user might have two vehicles (Blue Sedan and White Coupe) or multiple homes such as: Home Sara and Home Vacation.
  • the police and Emergency phone number 1946/2046 (in US and Canada 911 step 1960/2060 - GHz GHz 110 and 119, Hong Kong 999 - EU 112 - Taiwan, Japan, South Korea, France 119, India 100 and 101, Mexico 066 and 068, Brazil 190 and 193) will be called and sent voice and text messages by the Dev 106 when the air bag 226 (Fig. 2) is inflated or its house is on fire (smoke alarm) 304 (Fig. 3), as well as to other registered handsets 102.
  • the Email addresses 1942/2042 are for the password recovery when the user forgets the account security password.
  • said phone number may or may not be encrypted and it is preferable that the cellular service provider industry accommodates the encryption of said phone number (so said phone number will be then encrypted in this invention accordingly) in order for said phone number not to be exposed to a third party and also to make it harder for hackers who are always on the prowl for any network breaches.
  • FIG. 21 A illustrates a preferred application example of embodiment 2100A of the present invention.
  • This exemplary embodiment presents preferred steps taken by the user in his/her handset to add (register) a new handset 102 into the Dev 106.
  • FIG. 21B illustrates a preferred application example of embodiment 2100B of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to add (register) in a new handset 102 into the Dev 106 in the restricted or temporary mode.
  • the Dev 106 verifies and processes, then transmits back the data to the handset 102 which displays them in screen 2120B/2170B for user’s verification.
  • Screen 2120B presents the added handset is in restricted mode while screen 2170B presents the added handset is in temporary mode.
  • the user then executes the Confirm icon 2134B/2184B, which makes the handset 102 transmit the confirmation back to the Dev 106, which processes and updates its device information file in the memory, and sends it back to the handset 102, which also preferably stores it in its own memory.
  • the user can always retrieve, view, or request the up-to-date device information (as described later in Fig. 28).
  • the Dev 106 also sends the instruction messages with the application download link and the Sign-In icon 2214 (which contains its phone number), as shown on screen 2202 of Fig. 22, to the added handset 102 whose user can start the signing-in as illustrated in Fig. 22.
  • Temporary registered handset 102 such as: the one owned by a friend, a guest or a neighbor who has the temporary access to the house, is preferably programmed with a starting date (2167B1) and time (not shown), ending date (2167B2) and time (not shown), and its access privilege to the house is as a normal registered handset’s 102. It has no capability of registering another handset 102 into said Dev 106 or no capability of activating the Dev 106 into a new network. It will be automatically removed (deregistered) from the Dev 106 on its expiration date (2167B2).
  • Household help member s handset 102 is preferably restricted in its functionality to only be able to turn on or turn off the house security alarm for entry or exit into the house or the premises, entering and exiting on a certain time and day of the week (not shown). It will not be able to command the Dev 106 to control, observe or monitor anything else; and to have no capability of registering another handset 102 into the Dev 106.
  • This embodiment preferably allows a user of the Dev 106, away from home (near or far), or on business trip or on vacation somewhere, to remotely add (register) his/her friend’s handset 102, using his/her own registered handset 102, to the Dev 106.
  • This allows the friend to use his/her own handset 102 to enter and exit to stay at the user’s house, for any programmable duration.
  • the user preferably can also even keep track of the time and date of the ins and outs of said friend (not shown), or a household help member (not shown) by executing the List Handset In & Out Activity icon 1342 in screen 1320 of Fig. 13.
  • the household help member or the friend can preferably always remove from his/her handset 102, the software application associated with the Dev 106 when it is no longer needed.
  • FIG. 22 illustrates a preferred application example of embodiment 2200 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her newly added handset 102 to sign in said handset 102 into the Dev 106.
  • the user of the recently added (registered) handset 102 receives (step 2242 in flow diagram 2240) in its inbox (screen 2202) a notification 2204 from the Devi 06 that he/she needs to download the application 2210, and then signs in 2212 in order for his/her handset 102 to work with the Dev 106.
  • the user first executes the application URL (2210) for the app download, also is shown in step 2244 (download link 2210 whose app downloading steps were described previously in screens 920/1020, 940/1040, 960/1060, and 980/1080 of Fig. 9/10).
  • step 2246 the user then executes the Sign In icon 2214 (also shown in step 2248) which navigates the handset 102 to screen 2220 where the user enters his/her correct handset password 2226 (which is the same password the user of the adding /registering handset had assigned
  • the user finally executes (Execute icon 2228) allowing the handset 102 to store the Dev’s phone number into its memory 2250 (in graph 2240) and transmit the acknowledgement to the Dev 106.
  • the Dev receives the acknowledgement 2252 and then transmits (step 2254) the notification (2262) to the user of the registering handset 102r (in flow chart 2240) as shown in screen 2260. From now on, the sign-in handset 102 and the Dev 106 can communicate with each other (2256).
  • FIG. 23 illustrates a preferred application example of embodiment 2300 of the present invention. This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to remove a registered handset 102 from the Dev 106.
  • the Dev 106 verifies and processes the data, then transmits them back to user’s handset 102 (screen 2320/2370) for confirmation 2328/2378 and 2330/2380.
  • the user then confirms 2334/2384, making the handset 102 transmit the confirmation to the Dev 106 which verifies, processes and update its device information, and sends it back to the handset 102
  • Fig. 23 also showing mobile security keys (MSKs) associated with each registered devices is for illustration only as in 2313, 2345, 2363 and 2395 and 2145A/2145B, 2195A/2195B of Fig. 21A/21B. In other words, there is no need for the Dev to communicate these encrypted parameters to the user.
  • MSKs mobile security keys
  • Fig. 24A illustrates a preferred example of embodiment 2400A of the present invention.
  • This exemplary embodiment presents preferred program flow of the Dev 106 password recovery when the user fails to enter to the correct password more than the allowed attempts (i.e., three attempts).
  • the user enters the email address, and then executes the Exe icon 2414 A/2434 A, making the handset 102 transmit the command to the Dev 106 which receives and processes (step 2478A). If the email address is verified 2480A and does not match, the Dev 106 sends“Email address does not match” message 2484A to handset 102 and stop 2486 A. If Email address matches, the Dev 106 transmits the password recovery command along with the user’s email address 2482 A, and the password to the mail Server 116 for password recovery. The user can then check his/her email (2452A of screen 2450A) and retrieve the password (2456A).
  • Figure 24B illustrates a preferred application example of embodiment and 2400B of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to configure the Dev 106 with any changes in personal and or handset information.
  • Some preferable information (not all) is shown, such as: Dev’s name (A0/B0), vehicle ID information (Al) / home address (Bl), account security password (A2/B2), registered handset phone numbers and its passwords (A3/B3), user name and account number (A4/B4), Dev phone number (A5/B5), email address (A6/B6), Time and Date (A8/B8) and emergency center phone number A7/B7.
  • the user preferably can edit to change information on screen 2402A/2422A (also shown in step 2466B) any information but the registered handsets’ phone numbers (A3/B3) and Dev’s phone number (A5/B5).
  • step 2466B the user edit changes (step 2466B) by adding a second email address 2404B/2424B and executes Exe icon 2408B/2428B making the handset 102 transmit the command and data to the Dev 106 (step 2468B).
  • the Dev 106 then processes the data and sends it back (step 2472B) to the handset 102 for user confirmation (screen 2412B/2432B and step 2470B) showing a second email address (2ndowner@any.com) has been added (2414B/2434B) into the configuration/device file.
  • the user confirms 2418B/2438B making the handset 102 transmit the confirmed data back (step 2474B) to the Dev 106 which saves it in its memory (step 2476B).
  • Fig. 25 illustrates a preferred example of embodiment 2500 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her new handset 102 to register said handset 102 to the Dev 106.
  • This feature allows the user to register a new handset 102 if he/she lost his/her only registered handset. Let us suppose that the user lost his/her old handset (phone number 916-987- 6500 in 2410C/2440C) and bought a new one (phone number 916-987-0000). The user then registers the new handset 102 into the Dev 106. This feature thus allows a new handset 102 to be registered into the Dev 106 in case the old registered one is no longer available.
  • the user can use it to remove (deregister) the lost handset 102 as was previously described in Fig 23. Also as mentioned earlier, he/she needs to download the application (and activation) online in order to run the application and uses the related commands/icons to register his/her handset 102 into the Dev. He or she does not have to be in the vicinity (within the SRC range) of the Dev 106 since it already registered with the network. The requirement is that the user knows the Dev’s phone number and its security password in order for his/her handset 102 to transmit the command and data to the Dev 106 to begin the registration.
  • the user executes the Handset Register icon 1158/1358 in Fig 11/13, making his/her handset navigate to the Handset Registration menu as shown on its screen 2502.
  • the user enters the Dev phone number 2508, the account security password 2510, the handset phone number twice (2512 and 2514) and the chosen handset password twice (2516).
  • the user then executes the Exe icon 2520 making the handset 102 transmit the command and data to the Dev 106 which receives and processes said information (2572 in chart 2570).
  • the inventor will skip, (on occasion,) the handset screen display messages (2510) which prompt back and forth the communication between the handset 102 and the Dev 106 for the required account security password entries and retries. He also will skip, (on occasion,) the handset screen display messages, such as: the phone numbers not matched and the reentries, or the chosen handset passwords not matched and the reentries, (for ease of presentation,) as are known to those of ordinary skill in the art.
  • each type of password is required (for the user’s protection) in order for the Dev to perform its separate operations.
  • They functions requiring the account security password
  • the Dev’s structure functions such as: handset registration, handset addition or removal, device configuration, device information, handset locator, toll fee payment setup, route and speed tracking, home alarm configuration, home appliances/equipments addition and removal, and the like.
  • the handset password is for the Dev’s operation functions such as: vehicle/home control, program, monitor and view, engine status, home
  • Flow chart 2570 shows the program flow of the Dev 106 when it executes the
  • Registration command transmitted by the handset (screen 2502). It starts at step 2572 when it receives the command and the data, then verifies that if the account security password (PW) is correct 2574.
  • PW account security password
  • the Dev 106 checks to see if the handset phone numbers entered two times 2512 and 2514 are identical and so are the chosen handset passwords 2516 (in step 2582). The Dev 106, at the same time, transmits the registration process status to the handset (screen 2532, to keep the user informed). If they all are, the Dev 106 proceeds to process the command and stores all information (including the handset’s phone number step 2586) into its memory.
  • the Dev 106 transmits the message“PW not Matched” (step 2576) to the handset 102 and lets it attempt 3 times (step 2580) and if it fails, the Dev 106 goes to password recovery 2588 and also sends messages to other registered handsets 102 informing them of the action (step 2592). This feature allows users to be informed if there is any illegal registration from an unauthorized source. If the handset phone numbers or handset’s chosen password entries are not identical, the Dev 106 goes to step (step 2584) requiring the user to re-enter the information.
  • Fig. 26 illustrates a preferred example of embodiment 2600 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her new handset 102 to register said handset 102 into Dev 106 via the SRC network.
  • Chart 2602 presents a new handset 102 attempting to activate/register with the Dev
  • the Dev 106 checks to see if its current account is active 2606; and if the account is not active (either has not been activated, or has been deactivated or has not been able to register into the network for the last 30 days, for example), it sends the inquiry message to the activating/registering handset 102 (2608).
  • the Dev 106 If the Dev 106, within some short amount of time, it sends messages 2614 to said handset 102 indicating that said handset 102 user needs to download the application (app) software to activate and communicate with the Dev 106 (these steps have already been presented in Figures 8 and 9/10). If in step 2610 the Dev 106 gets the proper response back from the handset 102, then the activation starts 2612 (as illustrated in Figures 11/13, 12, 14, 15A-17A which already presented one or the plurality of ways of activating the Dev 106).
  • SRC Short Range Communication
  • the Dev 106 sends messages“You need the right software to run this application” (2616) to the registering handset 102.
  • the user either downloads the application (app) online 2618 (by typing in the URL of the App Server 906/1006 on his/her handset’s screen, and hits the screen keyboard return, as shown previously on screens 920/1020, 940/1040, 960/1060 and 980/1080 of Figure 9/10), if his/her handset 102 does not contain the software. Or the user just runs his/her handset’s existing application 2620 (as shown previously on the handset screen 2502 of Fig. 25 after its user executed the Handset Register icon 1158/1358 in Fig 11/13).
  • the Dev 106 checks to see if any registered phone numbers exist in its memory. If no registered phone numbers exist in its memory, while the Dev 106 is being active, meaning it is containing a SIM card module (270 of Fig 2/3/4) in its slot (and that was the reason it did not have to go through the normal activation process, as illustrated in Figures 11/13 to 12, 14, and 15A to 17A in order to be able to register into a network).
  • the Dev 106 is connecting to the network, but a first handset’s phone number has to be registered into said Dev’s memory in order for these two devices to communicate with each other.
  • the Dev 106 prompts the user of the new handset for his/her chosen security passwords (2623) and verifies if their entries are identical step 2625. If the security password entries are identical, the Dev 106 prompts for the handset phone number entries and its chosen handset password entries at step 2627, then proceeds to verily them at step 2640.
  • step 2624 (there are registered phone numbers in the Dev’s memory, meaning the Dev 106 went through the normal activation and registration process,) the Dev 106 receives the handset registration command, account security password, handset numbers and chosen handset passwords from the registering handset 102.
  • the Dev also alerts (step 2622) by sending messages 2654 to the owner of the registered handset 102 of this attempted registration (as shown on his/her handset screen 2650).
  • the Dev 106 verifies if the account security password (indicated by 1936a/2036a in screen 1930a/2030a of Fig. 19/20) is ok. From this point on and thereafter, if the Dev 106 receives the“OK” command in step 2626 from one of the handsets 102 (executed by 2658 icon in screen 2650), it proceeds to verifies the handset phone number and its password entries (they were both entered twice to prevent typing mistakes) to see if they identical 2640 (without going through the account security password entry verification 2630). If the Dev 106 receives a“No OK” step 2644 from one of the handsets 102 (executed by 2662 in screen 2650), it will stop the process right away step 2636.
  • the account security password indicated by 1936a/2036a in screen 1930a/2030a of Fig. 19/20
  • the Dev 106 if it receives no messages from a registered user, it proceeds to verify the account security password 2630 (since the owner might have lost his/her only handset 102 and wanted to register a new one). If the password is not ok, the Dev 106 prompts for another entry 2628. If the entry still fails at the third attempt 2632, the Dev 106 proceeds to the password recovery process step 2634 (described in Fig. 24A) and finally to goes to stop (step 2636). If the account security password passes, the Dev goes to handset phone number entry and handset password entry verification step 2640 to verily if their twice entries and identical. If their twice entries are not identical, it prompts for re-entry step 2638; or if they are, it proceeds to allow the handset 102 to start the registration 2642; as already described in Fig. 25.
  • Fig. 27 illustrates a preferred example of embodiment 2700 of the present invention. This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to update said handset 102 and the Dev 106 applications.
  • the user executes the Handset and Dev App Update icon 1164/1364 of Fig. 11/13, making his/her handset navigate to the Handset and Dev App Update command as shown on its screen 2702.
  • the handset prompts the user to enter the account security password (this embodiment assumes the handset already retained/stored the URL of the App Server for the convenience of the user, otherwise it will also prompt the user for the App Server’ URL 906/1006 of Fig. 9/10).
  • the password 2704 matches (otherwise the Dev 106 proceeds to password recovery as in Fig.
  • the handset 102 navigates to screen 2712 and transmits the app version query command to the Dev 106 (step 2762) and the App Server 108 (step 2764) which both send back the version information steps 2772, 2774 and 2776 respectively as displayed by the handset 102 in screen 2716: the handset current ver. 2718/2768, handset latest ver. 2720/2774a, Dev current ver. 2722/2772a and Dev latest ver. 2724/2776a.
  • the handset 102 When the user wants to update to the latest app version 2726 and executes the Exe icon 2730, making the handset 102 transmit the app download command to the App Server 108 (step 2780), and receives (step 2782) the downloaded copies of the latest application (2782a) from the App Server 108.
  • the handset 102 then transmits the Dev’s latest version app (2784a) and the app update command to the Dev 106 (step 2784).
  • the Dev 106 receives the command and the latest version app, it updates its application to the latest version app 2786 and then sends back to the handset 102 the acknowledgement 2788.
  • the handset 102 updates its application to the latest version 2790.
  • the updated information of both the handset 102 and the Dev 106 is displayed by the handset 102 in screen 2740.
  • the Dev 106 can download the latest version app directly from the App Server 108 when it receives the app update command from the handset 102.
  • Fig. 28A illustrates a preferred application example of embodiment 2800A of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to retrieve and view the Dev’s device information.
  • 2810A/2840A It shows the Dev type Car ID information/Home address 2813A/2843A and 2816A/2846A, service provider (carrier) name 2817A/2847A, account security password
  • 2818A/2848A registered phone numbers 2820 A/2850A and passwords, account name and number 2822A/2852A, Dev’s phone number 2824A/2854A, email addresses 2826A/2856A, Emergency center phone number 2828A/2858A and some Dev identification numbers 2829 A/2859 A.
  • Fig. 28B illustrates a preferred application example of embodiment 2800B of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to retrieve and view the Dev’s ID information.
  • the user executes the Dev IDs icon 1146/1346 in the Auto/Home App Menu 1120/1320 (Fig. 11/13), making his/her handset 102 transmit the Dev IDs query command to the Dev 106 which processes said command and sends the response back to said handset 102, which displays the Auto/Home Device Information as shown on its screen 2810B/2840B.
  • the user can also retrieve the Dev IDs via Dev keypad 1822C/1852C and display 1802C/1832C of Fig. 18C by inputting #06# (as presently practiced in the industry).
  • the Dev has not been activated or been inactive (and is not equipped with a display)
  • the user needs to push and hold the activation button while executing the Dev IDs retrieving command in order for the Dev to transmits via SRC its ID information to his/her handset,
  • the combination of holding the activation button and executing the ID command simultaneously would prevent other users from obtaining said information since they do not have physical access to the Dev.
  • the Remote Access icon 1167/1367 of Auto/Home Dev Facility Menu 1152/1352 of Fig. 11/13 preferably allows the user to program the Dev 106 via his/her handset 102 (tablet or any wearable, mobile device) in order for said handset to have remote access to all of the Dev’s functions.
  • the handset screen and all its keyboard soft-keys take the place of the Dev’s screen and all its keyboard soft-keys. The user does this by executing Remote Access icon 1167/1367 making the handset 102 transmit the command to the Dev 106.
  • the Dev 106 verifies, and processes the command, then transmits back the affirmative response to the handset 102 which then displays the Dev’s startup screen on its (handset’s 102) display. From then on, every action on the handset screen, such as: execution of an icon, soft-keyboard control-key, return-key, esc-key, and the likes will make the handset 102 transmit said action (along with any data) to the Dev 106 as if the user uses the Dev itself. The Dev then reacts, responds and/or executes each one of said commands along with the information and transits back the result to the handset 102. In this case, the handset takes over the Dev 106 functionality, meaning the handset’s display is in place of the Dev’s display; the user then has complete control over the Dev 106 from a remote distance by executing the handset screen soft-keyboard and associated icons.
  • the user via his/her handset, is then able run diagnostics on the Dev, set up its initial parameters, clean up any redundancy, obsolete accounts and fdes, update its software and apps, navigate the Dev online (Internet via cellular connection), install/remove 3 rd party apps and the likes.
  • executing the Esc key or Done icon will allow the Dev to abort or save its new parameters and to recycle its power (initialization reset). This feature will be aborted by the Dev 106 with a screen warning if there is no screen activity by the user after 5 minutes, for instance.
  • a secondary security measure is recommended such as requirement for an additional physical access to the Dev (execution of its button/keypad) or two- factor authentication while executing the Remote Access icon 1167/1367.
  • Fig. 29 illustrates a preferred application example of embodiment 2900 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to activate his/her currently registered Dev 106 into the network of a new cellular provider when he/she decides to switch to said provider.
  • This embodiment shows when the user decides to switch the cellular service of the
  • Dev 106 to a different (second) cellular service provider, he/she has to have the Dev 106 activated into the new network. It is preferable that the user has his/her Dev 106 activated into the new (second) service provider’s network before he/she has the Dev 106 disconnected from the existing (first) service provider’s network. In other words, the Dev 106 should still have access to the current network while the user is having it (Dev 106) activated into a second network. As soon as the Dev activation into the new network is completed, the user can have the Dev 106 disconnected from the current (first) service provider’s network.
  • the activation process begins, after the user executes the Activate icon 1154/1354 of the Auto/Home Dev Facility Menu 1150/1350 (Fig. 11/13), making his/her handset navigate to the Vehicle/Home Activation menu, as shown its screen 2902.
  • the rest of the activation procedure is identical as shown in Fig. 29, which is nearly identical to Fig. 12 with the exception that the Dev 106 already contained handset’s phone numbers 2914; whereas the user had to enter it 1214 in screen 1202 of Fig. 12 and the Dev receives the MSK 2959 from the handset thus recognizing said handset.
  • the Dev 106 sends its Device Information (screen 2980/2980A) containing its phone number, which the handset stores and uses from then on in its communication with the Dev 106.
  • the Dev’s cellular service to the current network can then be disconnected (no longer active) and from here on the Dev 106 communicates with other mobile devices (handsets) 102 in the new network.
  • the Dev’s information file (screen 2980/2980A) contains the same programmed data. In other words, there is no need for the user to reinitialize or reconfigure the Dev 106.
  • the Dev also preferably sends command(s) to the other handset(s) as shown in the forms of the icon 2992/2992A in the inbox(es) (screen 2990/2900A) along with messages 2994/2994A informing the user(s) to update his/her (their) handset(s) with the Dev’s (new) number.
  • Fig. 30 illustrates a preferred application example of embodiment 3000 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to program, retrieve, view and monitor the Dev Auto Control and Monitor system.
  • the Auto Control and Monitor Menu 3004 presents the user with the Control icon 3014 which the user uses to control the vehicle accessories (screen 3050), such as: to turn the alarm on/off 3052, to lock/unlock doors 3054, to sound the horn 3056, to turn the ignition on/off 3058 and the emergency lights 3060.
  • the Status icon 3018 which the user uses to view the status of the vehicle at the moment, is shown in handset screen 3020/3036.
  • the Monitor icon 3006 is the input of the cameras (216 of Fig.
  • Chart diagram 3070 shows the interaction between the handset 102 and the Dev 106 as discussed in screen 3050.
  • the handset 102 Take for example when Alarm icon 3052 is selected (screen touched) by the user, the handset 102 sends the alarm“toggle command” to the Dev 106 (In this example, the inventor adds the Service Provider 112 to show that as always, the Dev 106 has to have access to the network in order to communicate with the handset 102 and other devices) as shown in step 3072 of graph 3070 via the cellular network when the handset 102 is not in the vicinity within the Dev 106’s SRC medium range.
  • both the Dev 106 and the handset 102 when both the Dev 106 and the handset 102 are within their SRC medium range, they preferably select to communicate with each other via the SRC communication network, which can be faster and preferably just as secure since built-in protection, such as: the handset’s phone number and/or MSK has been encapsulated into the data streams and, if necessary, the owner’s account security password has been also preferably encrypted.
  • built-in protection such as: the handset’s phone number and/or MSK has been encapsulated into the data streams and, if necessary, the owner’s account security password has been also preferably encrypted.
  • Step 3072 corresponds to the icon Alarm selection 3052; step 3073 corresponds to the message“is OFF” 3053.
  • Step 3074 corresponds to the icon Doors selection 3054; step 3075 corresponds to the message“Are locked” 3055.
  • Step 3076 corresponds to the icon Horn selection 3056; step 3077 corresponds to the message“Sounding” 3057.
  • Step 3078 corresponds to the icon Ignition selection 3058; step 3079 corresponds to the message“Engine OFF” 2359.
  • Step 3080 corresponds to the icon Emergency Lights selection 3060; step 3081 corresponds to the message“are OFF” 3061.
  • FIG. 31 illustrates a preferred application example of embodiment 3100 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to retrieve, view, and enter information into the Dev GPS system.
  • the user executes the GPS icon 3008 (Fig. 30), making his/her handset 102 transmit the command to the Dev 106, which in turns processes said command and passes it to the GPS 3182, receives the response from said GPS 3182, processes said response and passes it back to the handset 102, which displays the Auto GPS menu, as shown on its screen 3102. It shows the Auto GPS menu 3104 comprising the GPS address Destination Entry 3108, the Destination Retrieval 3106, and the Recent Entries icons 3110.
  • the GPS Destination Entry and the Destination Retrieval allow the user to enter and retrieve the GPS location addresses without seating at the driver’s seat.
  • Entry icon 3108 making the handset 102 navigate to screen 3120.
  • the user then enters City 3124, State 3126, Street and Address 3128 using keyboard 3132 for data inputs.
  • the handset 102 transmits the information preferably in real-time (IM) to the Dev 106 which passes the information to the GPS 3182 which in turn responds with a pop up hint screen 3150 (when the number of characters, making the city name narrows to dozen or less of potential matched names) via the Dev 106 as presented in screen 3140.
  • executing the Save icon 3170 will make the handset 102 send the information and the command to the Dev 106 which passes it to the GPS 3182 to save all the information in screen 3160 to the GPS memory.
  • Graph 3180 shows the interaction between the handset 102, the Dev 106 and the
  • GPS 3182 Service Provider 112 is omitted here for ease of presentation.
  • the Dev 106 acts like a conduit, translating and passing the information back and forth between the handset 102 and the GPS 3182.
  • Step 3184 corresponds to passing the city name 3166 from the handset 102 to the Dev 106 and to the GPS 3182.
  • Step 3186 is the corresponding the response from the GPS 3182 to the Dev 106 and then to the handset 102.
  • Step 3188 corresponds to passing the State name 3164 from the handset 102 to the Dev 106 and to the GPS 3182.
  • Step 3190 (if any) is the corresponding response from the GPS.
  • Step 3192 corresponds to passing the Street and Address 3162 from the handset 102 to the Dev 106 and to the GPS 3182.
  • Step 3194 is the corresponding response from the GPS 3182.
  • Step 3196 corresponds to the command Save icon 3170 from the handset 102 to the Dev 106 and to the GPS 3182.
  • step 3198 is the corresponding response from the GPS 3182.
  • steps 3184, 3188, 3192 and 3196 can be combined into one single step (or all the GPS information in one packet) to the Dev 106 and gets a single response back 3198 from the Dev 106.
  • the steps and ways presented in the present invention are one or more of many applications which accomplish the same goal and should not be limited as the only way as are known to those of ordinary skill in the art.
  • Fig. 32 illustrates a preferred application example of embodiment 3200 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to retrieve, view, and enter the graphical information into the Dev GPS system.
  • the handset’s screen display 3120 is repeated here to show an alternative way for the GPS entry using the drag and drop icon 3130.
  • the user can use his/her handset 102 to Google search an address location 3204 and gets the search results 3206 and 3210. He/she then just copies and drags the information in 3208 over, then drops it into the icon 3130 which the handset 102 decodes and translates into Street and Address 3246, City 3242, and State 3244. The user then selects the Save icon 3252 to have the handset 102 transmitted the information to the Dev 106 which passes it over to the GPS 3182 as demonstrated in flow diagram 3180 of Fig. 31.
  • Fig. 33 illustrates a preferred application example of embodiment 3300 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to program, set up pay account and view the activity listing of the Dev Toll Fee Payment system.
  • the user executes the Toll Fee Pay Account icon 1134 ( Fig. 11), making his/her handset 102 transmit the command to the Dev 106 which processes said command and sends the response back to said handset 102, which displays the Toll Fee Pay Account menu as shown on its screen 3302.
  • Toll Fee Pay Account menu 3304 with the Account Pay Setup 3310 (used to set up a toll fee pay account), Account Pay Cancel 3312 (used to cancel an existing toll fee pay account), Account Activities 3306 (to display various existing toll fee pay accounts and activities), and On Demand Toll Pay Ace Setup 3314 (to pay on demand from any toll fee collector on/from this account).
  • the driver 3752 can always elect to pay in cash.
  • Screen 3320 and 3350 show examples of how the setup is done. Just as mentioned in the preceding and proceeding figures of this invention, examples such as these are not the only one resolution since there exist many ways to accomplish the respective applications, as are known to those of ordinary skill in the art.
  • Screen 3380 showing the Account Pay Activities allows the use to view past account activities, when the user selects the icon 3306 which the handset 102 navigates to after transmitting the command to the Dev 106 which responds back with the information as shown. It shows Payee’s name 3384, individual payments 3386 and 3390 and total monthly payments 3388 and 3392.
  • Figures 35 and 36 illustrate preferred examples of embodiments 3500 and 3600 of the present invention. They show the transactions taking place between the Devs 106 (residing in cars 3410, 3412 and 3414) and the Toll Collector 3402, 3404 and3406 as illustrated in Fig. 34.
  • Flow diagram 3750 shows the transaction taking place between the Dev 106, the
  • the Dev 106 then sends the account name, account number and address to Toll Collector 3402 (steps 3760 and 3780) and receives payment acknowledgement (steps 3762 and 3782) from the Toll Collector.
  • the Dev 106 then announces the transaction completion (steps 3764 and 3784) to the driver, and finally stores the transaction record in its memory in (steps 3766 and 3786).
  • Fig. 38 illustrates a preferred example of embodiment 3800 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to locate his/her vehicle (controlled by the Dev 106) remotely via his/her handset.
  • the user executes the Locator icon 3016 in Fig. 30, making his/her handset 102 transmit the command to the Dev 106, which processes said command and sends the response back to said handset 102, which displays the Vehicle Locator command as shown on its screen 3802. It shows the Vehicle Locator command 3804 which lets the user find the vehicle’s (Dev 106) current GPS location.
  • the user fills in the required account security password 3806, and the handset 102 transmits it to the Dev 106 after the Execute icon 3808 is selected.
  • the Dev 106 receives the password 3806 and the command (also shown in step 3852 of chart 3850).
  • the Dev 106 then verifies if the security password matches with the one stored in its memory, and if it does, the Dev 106 translates the command to the GPS’s command format, and then sends it to the GPS 3182 (step 3854).
  • the GPS 3182 transmits the response back to the Dev (step 3856) which translates said response and sends it to the handset 102 (step 3858) which displays the information as shown on screen 3820.
  • Screen 3820 shows where the car is located at that moment 3822 and the graphic icon 3824, when expanded will show the detailed map 3832 as shown on screen 3830.
  • Fig. 39 illustrates a preferred example of embodiment 3900 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset 102 to locate a missing registered handset 102 via his/her registered handset.
  • the user executes the Handset Locator icon 1170/1370 (Fig. 11/13), making his/her handset 102 transmit the command to the Dev 106, which processes said command and sends the response back to said handset 102, which displays the Handset Locator command as shown on its screen 3902.
  • the Dev 106 receives and processes (as shown in step 3952 of flow chart 3950) and sends back the currently registered handsets 3910 (step 3954).
  • the user decides to search for the missing handset 102 (phone number 916-987-6500) by highlighting it 3912 in area 3906, then selecting Exe icon 3914 again, making the inquiry handset 102 (for example, whose phone number is either 916- 987-6543 or 408-234-5678) transmit the handset locator command and the required data to Dev 106.
  • the Dev 106 processes the data, then transmits the handset locator command to the missing handset 102 (phone number 916-987-6500) in step 3956, and also transmits back its searching its status 3922 to the inquiry handset 102, as shown on screen 3920.
  • the Dev 106 When the Dev 106 receives the GPS position of the missing handset 102 from said handset (3958), it sends the information 3960 back to the inquiry handset 102, which displays its location 3926 accompanied by the icon 3928.
  • the inquiry handset 102 displays the graphic location of the missing handset 102 (3932 of screen 3930) after the icon 3928 is executed (expanded).
  • This embodiment restricts the Dev in searching and locating only its registered handsets 102, for practical and security reason.
  • Application and operation software residing and operating in handsets preferably can also be designed and modified in the App Server (for downloading and updating into handsets 102 and Devs 106), which can render this embodiment application more general and universal; and it will allow the users of smart handsets 102 to locate their missing smart handsets 102 via another smart handset 102 as long as the missing handsets still utilize their old phone numbers.
  • the user executes the Route Tracking & Speedo-Alert icon 3010 (Fig. 30), making the handset 102 transmit the command (step 4076 in Chart 4070) to the Dev 106, which processes said command and sends the response back to said handset 102 (step 4078), which displays the Route Tracking and Speedo-Alert Program & Setup as shown on its screen 4002. It shows the Speedo-Alert and route tracking as being off (disabled) 4020 and 4021.
  • the user then enters data which are illustrated in screen 4032 where, for example, the user sets: the maximum speed limit at 70 Mph (4038), storage server destination 4040, no immediate alert 4044 to user’s handset 102, Speedo-Alert being On 4048, and the route tracking On 4052 with the sample every 5 minutes 4053; then completes the programming by executing the Exe icon 4056, making the handset 102 send the command and information to the Dev 106 (step 4080 in Chart 4070).
  • the Dev then communicates the maximum speed (step 4082) to the Speedo-meter
  • the Dev 106 gets interrupted by the Speedometer 4074 as soon as the speed goes over the speed threshold or under the speed threshold in step 4084.
  • the Dev 106 keeps track of the time and day of the interruptions (via RTC 240 of Fig. 2), and obtains the GPS locations by
  • step 4086 communicating and acquiring them (step 4086) from the GPS 3182.
  • the handset user therefore, can retrieve and view the record of over-speed-limit, its duration, and the locations.
  • This preferred embodiment is very useful, when the principal user of the vehicle Dev 106 wants to find out the driving habit of other drivers who may be driving too fast. It can also apply to the car rental, taxi, trucking companies and the like which can keep track of the driving route of their vehicles, by having the Dev’s tracking turned on (4052). This allows the Dev to take one tracking sample every 5 minutes (as is in this case) by obtaining the speed from the Speedo-meter 4074 (step 4092 of Chart 7070a) and the location from the GPS 3182 (step 4094).
  • the tracking record be can viewed later by the user (step 4096) or downloaded at the end of the day into the Storage Server 4072 (step 4098) for company’s bookkeeping, as are known to those of ordinary skill in the art.
  • Handset 102 (whose user programmed the Dev 106) is able to view the over maximum speed history (as shown in screen 4060) by executing the Speed-alert Listing icon 3012 (in screen 3002 of Fig. 30).
  • This feature allows the Dev 106 to build up a history of where, when, and how long each duration, the vehicle exceeded its programmed speed limit. It displays the vehicle license plate 4066, speed limits, time, date, and its duration 4068.
  • Route Tracking Listing 4051 allows the user or the company to view (by executing
  • Route Tracking Listing icon 3013 in screen 3002 of Fig. 30, the daily routing of the vehicle when its tracking is enabled 4022/4052. It shows the driving record of the vehicle, such as: license ID 4057, the date 4059, time 4061, location 4069, and speed 4065, which can be useful when the user/owner wants to know how his/her vehicle is being used (or just the driving record of his/her vehicle).
  • the Dev 106A keeps on communicating (step 3462) with the Handset 102 in order to keep track of where the Owner 3442 is in real-time and the Owner 3442, in turn via his/her handset’s GPS map (transmitted by the Dev 106A), can see where his/her vehicle is at any moment in real-time.
  • Illustration 3440 also present cases where the user is able to command by gesturing (step 3464) to his/her Parking Vehicle Dev 106A (via its vehicle front/rear Camera 3428/3430 equipped with Facial & Gesture Recognition hardware (block 275 of Fig. 2) when his/her facial features and hand gestures are within video input range of said device) in order for it (Dev 106 A) to move its vehicle closer to his/her pickup location (in case when a nearest pickup space opens up or is available).
  • the Dev 106A receives (step 3466) the gesture data from its video device (Camera 3428/3430), it then processes said data (executed by its Gesture Recognition layer 551 of Fig. 5) and finally moves the vehicle nearer to its Owner 3442 as commanded.
  • Dev 106B (of Car B 3472) will preferably alert the presence of said vehicle (in this instance the presence of Car C 3492 via its front and rear sensors 3479 and 3483 and/or the presence of Car A 3489 via its rear sensors 3476 and 3483 when either of them is preferably within 100 feet or 30 meters or less in its vehicle’s vicinity) by an audio sound and communicates and displays their respective positions on its vehicle (Car B 3472) Dashboard Display (1802C of Fig. 18C). In case when Drive B still attempts to change to Lane 3, Dev B (of Car B 3472) will sounds off an alert and prevents said action by communicating its prevention command to the vehicle’s steering wheel controller/mechanism (not shown).
  • Dev A (of Car A 3489) also alerts its driver the presence of Cars B and C (via its front sensors 3478 and 3487) by displaying their respective position on its own vehicle Dashboard (Car A 3489) Display (1802C of Fig. 18C).
  • Dev C (of Car C 3492) also alerts its driver the presence of Cars A and B (via its front and rear sensors 3481 and 3486) by displaying their respective positions on its own vehicle Dashboard (Car C 3492) Display (1802C of Fig. 18C).
  • communication between one another among Devs A, B and C via SRC media allows their respective controlled vehicles to display, on their dashboard GPS screens (1802C of Fig.
  • the Dev 106 preferably also displays (on its dashboard screen) when another vehicle appears at visible distance in front (detecting via its front sensors 3416 and 3418) and issues a too close of a distance warning beep to its driver in order to keep his/her vehicle at a safe following distance (i.e., the three second rule - at least 3 seconds behind another vehicle to maintain a safe trailing distance at any speed). It also preferably prevents speed acceleration when its vehicle comes into within said distance by transmitting“no acceleration” or“slow down” commands to the vehicle’s accelerator (not shown).
  • the Dev 106 preferably can stop the vehicle in order to prevent acts of terror by its driver such as using the vehicle in mowing down a crowd of people.
  • the Dev 106 accomplishes by using its Artificial Intelligence (AI) block 555/655 of Fig. 5/6 along with its sensors (i.e., interior cameras, biometric sensors in observing, detecting and discovering the driver’s unusual behavior before him/her being able to endanger the safety of his/hers, passenger[s] and any nearby person[s].
  • AI Artificial Intelligence
  • the application also applies to the driver who might suffer a heart-attack, intoxicated or under the influence [alcohol, drugs] while driving or about to commit said major crime) on his/her facial expression, increase/decrease in heartbeats, heavy sweating, excessive trembling. It then transmits the“stop” command to the vehicle’s Speed Controller (not shown) when the Dev 106 senses a sudden acceleration (via Speed Pedal input 215 of Fig.
  • the Dev 106 sends to the handset 102, a message in the handset’s inbox 4102 A which notifies the user that an unauthorized event happened to his/her vehicle, such as: a break-in, collision, or its removal from its parked location.
  • the user navigates the handset 102 to the Tools screen 4114A, and selects Security Auto 4116A to find out the auto alert 4122 A from the Dev 106.
  • the auto alert icon 4124A is executed by the user, the handset 102 navigates to screen 4130A, which contains the event information, the Dev 106 just transmitted along and among others with the alert message 4110A.
  • Screen 4130A information includes the cause - the Break in 4134A, date and time 4136A, the location 4138A, if the car is being moved or not 4140A. It also lists the phone numbers of the registered handsets having been alerted 4142A. The icon 4144A lets the user see the graphical map where the event took place 4164 A as shown in screen 4162 A.
  • the Dev 106 sends to the handset 102, a message in the handset’s inbox 4104B, which notifies the user that an abnormal and potentially dangerous situation, such as a child or pet accidentally left in his/her parking vehicle for a certain period of time.
  • the user then can, when he/she views the message 4112B along with the Video icons 4114B and 4116B, make the appropriate decision.
  • Video icons 4114B and 4116B let the user see the inside view of his/her vehicle 4180B and 4190B through the car interior camera, so he/she knows for sure if the situation is real or not.
  • Fig. 42 A illustrates a preferred example of embodiment 4200A of the present invention. It presents steps taken to monitor the vehicle engine status and the Dev’s responses when the Panic icon or vehicle emergency button is pushed.
  • Fuel Level icon 4224 A indicates how much fuel is in the tank (not shown).
  • Electrical icon 4226A shows the vehicle’s electrical condition (not shown).
  • Last Service icon 4234A displays the date of the most recent service of the vehicle
  • Lights icon 4238A tells the user(s) which lights are out or not working (not shown).
  • Battery Level icon 4240 A tells the user(s) the battery level or how many miles left on the remaining charges (mileage remaining balance) in case of electric car.
  • Fig. 42B illustrates a preferred example of embodiment 4200B of the present invention. It presents a third party controlling and monitoring the first party Dev temporarily from said third party’s handset and/or third party’s own Dev (Dev, i.e., in his/her vehicle).
  • the control and monitor command is transmitted by the first party Dev or by its user’s handset (second party) so third party (police) can have temporary control of the effected vehicle (first party) where the safety of the public is in great danger.
  • FIG. 408 It illustrates the menu to control (accompanied with a flowchart) said vehicle which has been transmitted and appears on the pursuing policeman’s handset (mobile device) 4202B and/or the dashboard console display 4232B of the police vehicle (correspondingly in flowchart 4250B are policeman’s handset 102 A and police vehicle PCMD“Program Control and Monitor Device” or police Dev 106 A) whereby said officer can have temporary control of said vehicle (Owner car PCMD) 106 in order to manage the situation.
  • Screens 4202B and 4232B illustrate the command screen appearing on the pursuing police officer’s mobile device 102 A and/or on the console display of the pursuing police vehicle (police vehicle Dev/PCMD) 106 A.
  • Flowchart 4250B illustrates communication between various devices for such scenario, in case of emergency, such as the vehicle (Owner car PCMD) 106 is being hijacked or reported stolen while it is being driven dangerously without regard for public safety.
  • the owner (handset 102) reports by calling police emergency center 4252B (in flowchart 4250B where in the USA and Canada, the emergency dial code is 911 as shown by 1960a in screen 1932a of Fig. 19) indicated by arrow 4254B and executes a third-party control and monitor command (icon 1132, screen 1120 of Fig.
  • the police emergency center 4252B then forwards it (arrows 4258B and 4260B) to the nearest possible police officer(s), either to his handset 102A and/or to his police Dev (police vehicle PCMD)106A; or the victim driver executes the panic button hidden nearby in the vehicle making the affected Dev (Owner car PCMD) 106 transmit said third-party control and monitor command 4256B (embedded with a temporary MSK) to the police emergency center 4252B which forwards it (4258B and/or 4260B) to the nearest possible police officer(s) 102A and/or 106A, or the affected Dev (Owner car PCMD) 106 transmits said third-party control and monitor command 4256B (embedded with a temporary MSK) itself to the police emergency center 4252B while it detects the erratic and dangerous driving behavior of the driver (running red lights, excessive speed, driving on the wrong way, causing impact to the vehicle without stopping) via its corresponding vehicle accessory inputs.
  • the police officer can also turn on the emergency lights and/or horn of the affected vehicle by executing Emergency Lights icon 4216B/4246B and/or Horn icon 4218B/4248B.
  • the police officer can also attempt to speak to the driver by executing Speaker icon 4214B/4244B making the officer’s handset/(police Dev) 102A/106A transmit the command to the affected Dev 106 which establishes the two-way communication with its affected vehicle speaker by receiving and transmitting audio data between two parties (not shown).
  • the 3 rd party control and monitor is of limit in time and temporary by nature (and always accompanied by app download web link so a third-party (non-Dev owning-user can do an app download and run the software) meaning as soon as the police officer resolves the problem and executes Done icon (not shown) or navigates his/her device to another task, the affected Dev 106 is notified by said device 102A/106A and will not accept any more any commands from said devices 102 A/ 106 A.
  • Third party controlling and monitoring command can also be programmed to be effective on a certain date, time and duration. This feature allows the owner to loan a car to a friend in such a way that the friend can only have possession of it for a certain date, time and duration.
  • the handset navigates to Driving Behavior Monitor menu, screen 4202C where the user can check to be aware that if the seat belt is being fastened 4206C, running on red light 4208C, failing to stop at stop sign 4210C, turning right on red light without a complete stop 4212C, speeding excessively in a speed bump area 4214C.
  • Chart 4220C shows the interaction between the Dev 106, driver’s handset 102C, owner’s handset 102 and various intelligent traffic controllers such as: Stop sign controller 4222C, Speed bump controller 4224C, Red (Traffic) light controller 4226C and the user’s private Cloud storage 4904.
  • the Dev during a driving routine, first communicates (indicated by 4228C) with the driver’s handset 102C and thus recognizing his/her identity.
  • the Dev keeps track of time (via RTC 240, Fig. 2) and location (via GPS 3182, Fig.
  • the Dev can also be programmed to participate in the traffic monitor website after the user executes Traffic Monitor icon 1148 (Fig. 11) making the handset navigate to the Traffic Flow Monitor menu, screen 4260C.
  • the user fills out the Traffic Monitor website address 4264C, checks mark the selections such as: speed 4266C, location 4268C, time 4270C and the likes such as: day of the week, morning start time, end time, evening start time, end time and frequency (not shown). It starts out during morning and evening rush hours, as shown in Chart 4280C, when the Dev 106 periodically communicates 4286C with the handset 102.
  • the Dev can also detect if the driver is intoxicated while attempt to drive by detecting his/her blood alcohol content/concentration (BAC) via a foolproof vehicle-equipped breath detector. It then prevents the driver from turning on the car engine and also informs other registered users of the problem.
  • the effected vehicle can only be driven again when the Dev no longer detects any alcohol level within the law or it receives instruction by another registered user or a designate driver who has to answer successfully to some unlocked answers to the Dev in order to enable said Dev again so he/she can drive said vehicle.
  • BAC blood alcohol content/concentration
  • the Dev 106 preferably can also allow the user to lock/unlock the car door, car trunk, start and drive his/her vehicle without using the car key.
  • the user can use his/her handset to communicate with the Dev or use voice commands directly to the Dev (with the handset in his/her possession or in the vicinity - enabling the Dev to recognize said registered handset via encrypted SRC/WIFI communication; thus its user either uses voice or handset input commands) in controlling his/her vehicle such as: lock/unlock the car door, car trunk, turn on/off lights, starting the vehicle engine (with or without a car key) or the likes.
  • the Dev can also optionally be programmed (toggling the EN 1163a of the Door Unlock Announcer icon 1163 of the Auto Dev Facility Menu 1150 in Fig. 11) to automatically unlock the vehicle when at least one of its smart sensors detects the driver (with his/her registered handset in possession or in the vicinity) approaching its driver- side door.
  • This feature allows the driver to get into the car, start its engine and drive it without using a physical vehicle key.
  • the Dev is then to announce in audio“the door is unlocked now” for his/her convenience when he/she approaches the driver-side door.
  • the Dev also smartly locks the door back, sensing (via its door smart sensor input) that the owner (his/her handset) steps away from the vehicle.
  • This same feature can also be applied to the home application of Dev 106 (toggling the EN 1363a of the Door Unlock Announcer icon 1363 in Home Dev Facility Menu 1350 in Fig.
  • the user utilizes this feature by executing the Biometric Activation icon 1169/1369 (of the Auto/Home Dev Facility Menu 1152/1352 of Fig. 11/13) which makes the handset 102 navigate to another handset screen (not shown) where he/she is able to input his/her biometrical data (i.e., at least one of his/her facial features or fingerprints per handset biometric command instruction) in the handset’s screen designated areas (via the handset camera or scanner and screen command icons).
  • the handset then processes, stores the biometrical information and associates said information with its user’s personal and or mobile payment account in its memory.
  • the Dev 106 also lets user to enter both the biometric commands (via voice and or video devices) and input his/her biometric features (facial and or fingerprints) directly into its one of its video devices (i.e., Big-Screen TV 5009 of Fig. 50 equipped with video and audio input capability) by transmitting its biometric command screen (with corresponding command/status icons) to said video device (Big-Screen TV 5009) as long as the registered handset 102 is in the vicinity.
  • the Dev 106 then processes the information. If the biometrical information is verifiable per the Dev’s biometric requirement (executed by its Biometrics layer 527/627 of Fig.
  • the Dev first verifies said user’s biometrical data via its corresponding Facial & Gesture Recognition Circuitry 275 of Fig. 2/3 and Biometrics layer 527/627 of Fig. 5/6.
  • the user is then able to use his/her handset 102 either via handset soft-key and/or icon inputs or voice commands to communicate with the Dev 106 in order to control and monitor his/her household appliances (or auto accessories) remotely anywhere.
  • the user is also able to use his/her voice commands to communicate with the Dev 106 directly (via its video and audio inputs) in order to control his/her vehicle equipment accessories (or household appliances).
  • the user is also able to use his/her voice commands and command icons to communicate with the Dev 106 via one of its associated household appliances (i.e., Big-Screen TV equipped with Video and Audio I/O) in order to control his/her other household appliances.
  • One of the preferred examples The user is able, directly via one of the Dev’s Video
  • Input devices i.e., Driver Side Door Camera 3426 of Fig. 34
  • the Dev receives processes and verifies said video information, it unlocks its car door(s), outputs said door unlock audio announcement“Doors are unlocked” and thus allows the user to have complete access to said vehicle.
  • the driver/user has complete control of the vehicle (such as turning on/off its engine, the radio, locking/unlocking its doors, trunk, rolling down its windows, inquiring GPS locations) without the car key via audio commands to the (Dev’s) steering wheel mounted Audio Input (Microphone 1803C of Fig.
  • the Dev processes said audio input (decoded by its Voice Recognition Circuitry 279 of Fig. 2/3 and processed by its Voice Recognition layer 525/625 of Fig. 5/6) and from then on, it will respond to all the driver’s recognizable audio commands. The driver is then able to drive the car away (or to have it driven him/her away, in case of a self-driving vehicle).
  • the Dev 106 preferably can also detect, as somebody or something approaching its vehicle, attempting to plant hostile or harmful devices: such as GPS tracker, explosive device, narcotic drug and the like, via the Alien Device Detection layer (block 521 in Fig. 5).
  • Said software layer constantly runs its Cameras (216 in Fig. 2), recording video images of every movement, logging 5 minutes before and 10 minutes after (or a programmable duration of time) when at least one of its Cameras or Video Inputs 216 and smart motion video Sensors 221 in Fig. 2 (for example: Smart Motion Video Sensors: 3416, 3418, 3420 and 3422 in Fig.
  • the Dev 34 detect any movement, at its peripherals, leading to physical contact(s) on its body surface or underneath its frame. The Dev then transmits said video to its user’s handset(s) for verification.
  • the Dev can also detect, via the Alien Device Detection layer (block 521 in Fig. 5), a GPS tracking device by using its Frequency Hopper circuitry (block 263 of Fig.
  • 3 ⁇ Party Device emitting out at least one of the repeated cellular device identifiers such as: TMSI, IMSI, MEID, IMEI, ESN or the likes
  • the Dev transmits the findings to its user’s handset, allowing said owner for a thorough visual inspection on his/her vehicle.
  • the Dev alerts its owner/driver one last time as he/she approaches its vehicle ready to get in when its latest alert has not had any response from said owner/driver.
  • the Dev is also able to detect, via its Radio Freq Finder layer (block 611 of Fig.6), any External Tracking Device at home and if it detects the presence of said device, the Dev will transmit the information to its user’s handset and thus starting up the search of its existence by its owner/user.
  • the Dev 106 preferably can also employ facial recognition technology, as are well known to those of ordinary skill in the art, via at least its Facial & Gesture Recognition logic block 275 and Video 272 in Fig. 2/3, controlled and decoded by its Biometrics layer (527/627 in Fig. 5/6) to record images of persons of interest who, more than one or multiple of times, are suspected of snooping or loitering around in its vicinity.
  • the Dev then transmits said images to its user’s handset allowing said owner to review if said persons might be persons of interest, pose danger to his/her family or they are friends or associates not to be monitored anymore in the future.
  • the Dev 106 preferably can also alert the vehicle owner (executed by its Hostile
  • the Dev then, as soon as it receives its inquiry parameter, transmits said information to the cellular service provider which requests the authentication key from the Dev which then requests said information (i.e., session key) from the driver’s handset (Handset D).
  • the Dev is able to connect to the Handset D’s cellular service network as soon as it obtains the information from Handset D and transmits the authentication key to the cellular service provider. It then takes over the functionality of driver’s handset, intercepting calls coming from outside intending for Handset D and optionally transmitting the texts back informing the callers that its driver is driving and therefore will not answer any calls or messages.
  • the Auto Dev can be programmed to keep track of or follow another Auto Dev during a travel trip together or a rendezvous on the road.
  • Driver A programs his/her Dev (Dev A, follow -vehicle) via his/her handset 102 A (Handset A) so his/her vehicle can meet and follow driver B’s car (Dev B, lead- vehicle) in order to keep track of each other while both of them travel together or want to meet each other on the road.
  • Driver A starts out by executing the Drive-Pool icon 1145 in the Auto App Menu (Fig.
  • Dev B If driver B chooses the Ok icon, his/her handset 102B (Handset B) will forward the Drive-Pool response command to Dev B (of his/her vehicle). Dev B, as soon as it receives the Drive-Pool response command from Handset B, it is able to connect to Dev A (with Dev A’s identical time-limited MSK associated with its acknowledge command) and transmits to Dev A the Drive-Pool acknowledge command along its dynamic GPS map which contains the Dev B’s current location (as Dev A’s floating/moving GPS destination).
  • Dev A vehicle A
  • Dev B vehicle B
  • Dev B vehicle B
  • its GPS map either showing or not showing its travel destination
  • Dev A GPS guidance follows exactly the GPS guidance of Dev B or until either one of them is cancelled or discontinued (and thus their communication enabled connection MSK is no longer valid) by its respective driver either via Handset A or Handset B.
  • This application is also useful where the first police car (Lead-Vehicle) chases some other vehicle in close pursuit while some other police vehicles (Follow-Vehicles) would like to join in to back up their fellow officer.
  • the Auto Dev can preferably to communicate with the Traffic Controller at a cross street intersection which monitors both cross traffic and incoming traffic at said intersection.
  • the Traffic Controller via its Cross Traffic Monitoring cameras, can see clearly, for instance, a runner running full-speed ahead without stopping into crossing traffic while its Incoming Traffic
  • the Traffic Controller transmits an alert to the Dev’s vehicle via its SRC network making the Dev display it on the vehicle’s Dashboard Display (screen 1802C/1832C in Figure 18C) along with an audio sound warning its driver of said potential accident.
  • This also applies to the case where a distract jogger or a confused child crossing the incoming traffic at a blind spot by the intersection.
  • the Traffic Controller accomplishes by transmitting the alert to the Dev (via its strategically located SRC medium I/O devices) and making the Dev sound off the video and audio alarms to its driver; and therefore the driver is able to come to a complete stop. It also applies to where the Dev Driver, not being aware that he/she is dozing on and off, keeps on driving and thus can be alerted by the Dev itself via its Facial Recognition camera (Microphone & Video 1803C of Fig. 18C or 3424 of Fig. 34) and the Dev thus sounds off an audio alarm so that its driver is waken up out of his/her unknowing sleep.
  • Facial Recognition camera Microphone & Video 1803C of Fig. 18C or 3424 of Fig. 34
  • the unexpected presence of said foreign objects might render self-driving car’s sensors from detecting any moving objects, all at a sudden, popping out from behind; while the Intersection Traffic Controller, with its multi-angle positioned cameras, is able to transmit the warning to the Dev of said scenario.
  • the alert can also be about a just happened accident, a freshly falling object, a slowing-down traffic or a parked vehicle without any of its emergency lights on.
  • the Dev also can alert its driver to give way to emergency vehicles such as: fire buck, ambulance, emergency police vehicle or the likes.
  • Fig. 42D illustrates preferred application examples of embodiment 4200D of the present invention. It presents one handset screen 4202D, where the user (lessee) using the Server App (Car Rental App, one of 3 rd Party Apps block 613 in Fig. 6), from the car rental website, transmitted from an App Server 4258D (of Flowchart 4280D), books and selects (4222D, 4226D, 4230D or 4234D) a rental car (4220D, 4224D, 4228D or 4232D) from the choice of suppliers 4210D.
  • the Server App Car Rental App, one of 3 rd Party Apps block 613 in Fig. 6
  • App Server 4258D of Flowchart 4280D
  • books selects (4222D, 4226D, 4230D or 4234D) a rental car (4220D, 4224D, 4228D or 4232D) from the choice of suppliers 4210D.
  • the App Server 4258D After he/she is done booking (after going over several handset screens [not shown]) of the rental vehicle: deciding on its make and model to his/her choosing, checking and signing off on the online lease agreement (not shown), the App Server 4258D generates a unique one-time, time- limited and time-stamped MSK (time-limit is based length of the lease) and transmits it to both his/her handset 102 and the (rental car) Dev 106B (assuming the user’s handset phone number has been provided during the online checkout process [not shown]).
  • MSK time-limit is based length of the lease
  • the MSK identifier 4287D lets the Dev 106B recognize the user 4252D as the intended driver during the SRC communication between said Dev 106B and said user’s handset 102 when he/she is in the vicinity (within SRC range) or inside said vehicle.
  • the App Server transmits to more than one intended leased vehicle MSK to his/her handset allowing the user/lessee a choice of more than one vehicle.
  • each leased vehicle with its own MSK permanent assigned by the App Server
  • the App Server 4258D updates the lessee/user 4252D leasing information with its vehicle identification.
  • Flowchart 4280D illustrates various interactions from the browsing and booking of the rental car to its picking, using and returning processes by a user.
  • the user 4252D using his/her handset 102, step 4282D browses and books a rental vehicle while online, step 4284D, in a car rental service website (App Server 4258D).
  • the App Server’s app 4258D (Server App) generates a unique one-time, time-limited and time-stamped MSK 4287D; and transmits it to both the user’s handset 102, step 4286D and the (rental car) Dev 106B, step 4288D (step 4288D optionally is not needed if the rental car Dev 106B has already been assigned a permanent MSK).
  • the MSK 4287D is the verification key during SRC communication, step 4292D between the (rental car) Dev 106B and user’s handset 102; thus confirms said user 4252D with his/her Handset 102 as the lessee (when said Handset 102 is in the vicinity or inside said rental vehicle).
  • the user 4252D then commands the Dev 106B via his/her handset 102, also step 4290D and 4292D or directly through voice commands step 4294D (via Audio Input 3424 of Fig. 34 or voice-activated microphone 230 of Fig. 2, its associated Hands-Free software layer 532 and Voice Recognition layer 525 of Fig.
  • Dev 106B in making said Dev 106B performing tasks such as: locking/unlocking car doors, car trunk, turning on/off engine ignition (with or without a car key), turning on/off lights, driving the car and the likes.
  • all the device one-time and time-limited MSKs 4287D are rendered invalid by the Dev 106B.
  • Vehicle usage information such as mileage, driver license information, driving time, driving duration, start and stop locations, odometer reading, gas tank level and the likes are transmitted back to (step 4296D) the company 4258D for account and bookkeeping (for storage) purposes by the Dev 106B via cellular network or some other long-distant network.
  • the company receives said information from an attendant recording it on his/her handheld device.
  • This Dev is also very useful to law-enforcement agencies to veriiy (by retrieving said vehicle usage information) if truck-drivers who drive their long-haul vehicles across long distances to comply with rule and regulation in order to keep them to perform at their best and safest environment.
  • the Dev 106 preferably can offer a user (lessee) who already booked a rental car, the moment he/she steps out from an airport terminal or train/bus station, the convenience of having his/her rental car ready to be picked up at or nearest to the exiting terminal.
  • the user has to pick it up from the car rental parking garage which can be a shuttle ride away and possibly has to wait for a long queue at its check-out station.
  • the user 4252D as previously described in Handset Screen 4202D can, for example, using his/her Handset (step 4283D in Chart 4281D) connects to (step 4289D) the rental car’s App Server 4258D to have its rental car to be self picked up (self- driven) at the designated location.
  • the user then provides, at handset screen 4285D, the request information such as: lease reference number (assuming his/her handset 102 containing said previously lease reference number and other rental information), his/her handset phone number, pickup time and date, pickup location address and the likes (not shown).
  • the user transmits the processed information (step 429 ID) to the Dev 106B (the rental car per user’s request as previously described in Screen 4202D).
  • the Dev 106B then transmits (step 4293D) the confirmation to said Handset 102.
  • the Dev 106B starts its (leased) vehicle engine, executes its Self-Pickup layer (block 549 of Fig. 5) and drives its vehicle to the designated location.
  • the Dev 106A connects and transmits to his/her handset 102 a GPS map guiding him/her to its pickup location and interactively updating each other locations and the time duration to get to said pickup location.
  • the Dev 106A When the pickup vehicle (Dev 106 A) reaches its parking space, the Dev 106A transmits its location to the user’s handset 102 with its GPS location blinking. When the user’s Handset 102 is within SRC range of the rental vehicle, the Dev 106A alerts him/her with its blinking headlights and or its sounding horns.
  • Illustration 4240D presents one handset screen among many (not shown) applied to Uber Technologies Inc. where a user uses its Ride-Sharing App (i.e., Uber or Lyft in the USA, Didi Chuxing in China or Ola in India) to request a sharing ride from said company.
  • ride-Sharing App i.e., Uber or Lyft in the USA, Didi Chuxing in China or Ola in India
  • the user can see the Google map 4242D where the ride pickup 424 ID and his/her destination 4243D are located. He/she also sees how much the ride costs 4244D ($23.98 or $25.24), his/her existing stored charged account 4246D and the ride request execution button 4248D.
  • the illustration process 4250D starts when the user 4252D, using his/her handset 102 step 4260D, requests a sharing ride from the Ride Sharing Co. website (App Server 4254D).
  • the App Server (app) 4254D After he/she is done requesting the ride 4262D, the App Server (app) 4254D generates a unique one-time, time-limited and time-stamped MSK 4265D; and transmits it to the user’s/passenger’s handset 102, step 4264D, to the (ride-sharing) Dev 106 A step 4266D and the ride-sharing driver’s handset 102A, step 4268D. (Steps 4266D and 4268D are not needed if the ride-sharing Dev 106A and the ride-sharing driver’s handset 102A have already been assigned a permanent MSK).
  • the MSK 4265D is the verification key during SRC communication between the (ride-sharing) Dev 106A and user’s handset 102, step 4270D, and/or between the ride sharing driver’s Handset 102A and user’s handset 102, step 4272D, when the user 4252D with his/her Handset 102 approaches (or in the vicinity of) the ride-sharing (Dev 106 A) with the ride sharing driver 4256D with his/her Handset 106 sitting inside.
  • the communication step 4270D between the Dev 106A and the user’s handset 102 is verifiable; and at the same, the communication step 4272D between the ride-sharing driver’s handset 102A and the user’s handset 102 is also verifiable; both devices (user’s handset 102 and ride-sharing driver’s handset 102A) then signal confirmation to the user 4252D (step 4274D) and ride-sharing driver 4256D (step 4276D) by the user inputting (into his/her handset) a counting number of either audio sound, light flashing or the like and expecting to receive the right confirming count number (of audio sound, light flashing or the like) back (from said vehicle).
  • the entire device one-time and time- limited MSKs 4265D are rendered invalid and the ride information is transmitted by the Dev 106 A back to the ride-sharing company (App Server 4254D) for accounting and billing verification.
  • the time-stamped MSK 4265D lets the company keep track of when (and where via
  • the Dev 106 preferably functions as a ride payment-charging instrument for the ride-sharing/taxi driver.
  • the Dev 106 communicates with the handset of a customer or one of the riders inquiring about its credit payment information as soon as the passenger(s) settle into the cab (via SRC medium) and receives back said inquired information.
  • the Dev 106 transmits, via cellular network, the fare payment transaction to its bank account center and a copy to the passenger’s handset and said passenger is able to examine the receipt to verity the validity of said transaction.
  • the driver does not have to run the credit card of his/her customer as being the norm as is currently.
  • the copy of said transaction is stored on the customer’s handset which can also transmits it for long term storage on his/her Private Cloud 4904 in Fig. 49/50.
  • the Dev 106 preferably can also allow the user, who loans out his/her car to a friend or relative (i.e., borrower), to program the Dev remotely via his/her handset to restrict borrower’s usage of said vehicle to a time limit.
  • the user does this by executing on his/her handset display the Auto Loan Out icon 1149 (of Auto App menu 1122 of Fig 11) which takes his/her handset to a new screen containing related information (not shown) the user then can fill out, where under“handset phone number”, enters the friend’s handset phone number; and where under“time and date”, enters the time and date on which his/her friend has to return the vehicle.
  • the user then executes Ok icon making the handset 102 transmit the command and data to the Dev 106.
  • the Dev 106 verifies and processes the information, then transmits the user’s previously completed data back to the handset 102, which displays them (not shown) for user’s verification.
  • the user then verifies and executes the Confirm icon, which makes the handset 102 transmit the confirmation back to the Dev 106, which processes and executes said information and command.
  • the Dev then generates a unique one-time and time-limited MSK command and transmits it to the borrower’s handset (informing that he/she can have possession of its vehicle), which then stores said MSK to its memory.
  • the borrower from then on, is able to use his/her handset (by then is temporarily registered into the Dev and can thus communicate with each other with said MSK as validation key) or voice commands (with the handset in his/her possession or in the vicinity) to utilize the borrowed vehicle such as: to lock/unlock the car door, car trunk, car trunk, start/stop engine (with or without of car key), drive the car and the likes.
  • the Dev invalidates its MSK and the borrower cannot use said car any longer because his/her handset and the Dev no longer have valid communication.
  • Fig. 43 illustrates a preferred application example of embodiment 4300 of the present invention. It presents steps taken to configure the various input and output connections of the Home Alarm System controlled by the Dev 106 via a handset 102 into more descriptive terms.
  • the handset 102 navigates to screen 4302, showing the Home Control and
  • Monitor menu 4304 after the user screen-flips to the Home App Menu 1320 and selects the Home Control & Monitor icon 1326 (in Fig. 13).
  • the handset 102 then navigates to screen 4320 when the user selects the Alarm Configure icon 4306, which makes the handset 102 send the command to the Dev 106 which sends back the configuration information as shown on said screen 4320.
  • Screen 4320 presents the factory default home alarm security system configuration, showing the Door/window entries (4324), Motion Inputs 4328, Loud Speakers/Horns 4330 and Cameras 4332, which are all in numeric terms.
  • the handset 102 navigates to screen 4340 as it sends command and receives information back from the Dev 106.
  • keyboard 4348 the user can edit the entry into a descriptive name in 4342, such as Entry 1 into Main (main entry), in order to make it more recognizable; and the final result is as shown in screens 4360, 4370 and 4380. (T symbol allows some timer delay in disabling the alarm when designated entry is used.)
  • Fig. 44 illustrates a preferred application example of embodiment 4400 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to monitor and view his/her home environment (controlled by the Dev 106) via his/her handset.
  • the 102 transmit the command to the Dev 106, which processes said command and sends the response back to said handset 102, which displays the Home security Status/Monitor information, as shown on its screen 4402.
  • the user can check the status by selecting/highlighting individual icon/entry as shown in 4422 with pop up screen 4424 saying the MB (Master Bedroom) window is opened or the Hall icon 4434 (Motion) detector is off 4432.
  • the user can also monitor in real-time camera inputs by selecting the Kitch icon 4446, which displays it in the pop up kitchen window 4444.
  • the Back Yard icon 4454 and its pop up window 4452 can be expanded, by the user touching the screen 4452 which the handset 102 displays as shown in full screen 4474 or closing it by executing close area 4456.
  • Fig. 45 illustrates a preferred application example of embodiment 4500 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to program, control and monitor his/her home security system (controlled by the Dev 106) remotely via his/her handset.
  • the handset 102 navigates to screen 4502 when the Program/Control icon 4308 (Fig. 43) is executed by the user, making the handset 102 transmit the command to the Dev 106, which sends back the control information to the handset 102 which displays it on 4502.
  • This feature allows the user to use either the keyboard control key 4506 or keypad control key 4536; so either the keyboard 4508 or keypad 4546 can be used to control and program the Dev 106 for the home security functions.
  • Screen 4502 shows that the home security system is off and not ready 4504.
  • the user can find out more by pushing the Program icon 4548, which makes the handset 102 display the cause“Master Bedroom ... opened” 4534 after it gets the information back from the Dev 106.
  • the Dev 106 can bypass the Master bedroom entry when the user selects the bypass icon
  • the Dev 106 will send a message and the videos of the camera input changes 4570 to user’s handset 102 to alert of any activity outside of the house (as shown in Fig. 47).
  • the Camera Motion Alert 4570 is used in cases where the owner wants to know when a truck is making a delivery, a gardener taking care of the landscape or a neighbor stopping by picking up the mail, while Camera Motion Sound 4572 will also make sound to defer any unwanted guests, while the family is being away.
  • Fig. 46 illustrates a preferred example of embodiment 4600 of the present invention. This exemplary embodiment presents preferred screen displays when user receives an alert in his/her handset, when an unexpected or unauthorized event happened to his/her home.
  • the handset 102 navigates to screen 4602 informing the user of a message and alert information data from the Dev 106 in the inbox 4606.
  • the user scrolls to screen Tools 4612 and selects Security Home 4614 to find out said information in the home alert, screen 4622, from the Dev 106.
  • the handset navigates to screen 4632 which contains event information the Dev 106 just sent along and among others with the alert message 4606. It shows BR2 (Bedroom 2) 4638 is where the break-in happened and Hall and LR (Living Room) motion detectors 4640 also detected it.
  • Screen 4652 shows the pop-up icon 4656 when the BR2 icon 4638 is selected, detailing the time and date.
  • Screen 4660 shows the pop-up icon 4664 when either the SPK1 or SPK2 icon 4642 is selected, detailing the time the alarm sounded 4668, and the alerted phone numbers (4672) the alarm sent messages to.
  • Fig. 47 illustrates a preferred example of embodiment 4700 of the present invention.
  • This exemplary embodiment presents preferred screen displays when user receives an alert in his/her handset when a video camera detects changes around his/her house.
  • the handset 102 navigates to screen 4710 informing the user of message 4712 and alert information data (video) 4722 from the Dev 106 in the inbox 4720.
  • the user finds out by executing the House icon 4724 which contains several camera shots, showing screen changes, when user flips/scrolls through - from screen 4730 (taken 6/14/13 at 10:23AM) to screen 4740 with an object 4744 (taken 6/14/13 at 10:24AM) 4742.
  • This alert takes place when the user turned the alarm on with the Camera Motion Alert icon 4570 enabled as previously done in Fig. 45.
  • Figures 48 and 49 illustrate a preferred application example of embodiments 4800 and 4900 of the present invention.
  • the exemplary embodiment 4800 presents preferred steps taken by a user in his/her handset to add household appliances/equipments into the Dev’s Home Control and Monitor System, while the exemplary embodiment 4900 presents the communication interaction of these devices within the SRC network (except Wi-Fi).
  • the user executes the Household Appliances icon 1344 (Fig. 13), making his/her handset 102 transmit the command to the Dev 106, which processes said command and sends the response back to said handset 102, which displays the Household Appliances menu, as shown on its screen 4802.
  • the Home Appliances menu 4804 lets the user add (4806) home
  • appliances/equipments or accessories that he/she can control remotely using the handset 102, or remove 4808 them when they are no longer in use, when he/she is at home or away from home.
  • the user executes the Appliance Add icon 4806 which makes the handset 102 send the command to the Dev 106, which processes and transmits back the appliances/equipments it discovers on screen 4810.
  • This feature allows the handset 102 to command the Dev 106 either to ignore 4828 or connect 4829 the Entry Door Lock 4814, Help Alert 4816, Heating and Air conditioning 4818, Cable Box 4820, Garage Opener 4822, Lawn Sprinkler 4824, Electric Meter 4826 and Door Bell & Intercom 4827, by selecting and checking appropriate boxes as shown in Home Appliances Discovery screen 4830.
  • Exe icon 4848 makes the handset 102 send the command to the Dev 106, which processes and transmits back the corresponding software applications: Door Lock 4854, Help Alert 4856, Heat/ Air 4858, Cable Box/TV 4860, Garage Opener 4862, Sprinkler controller 4864, Electric Meter 4866, and Door Bell & Intercom 4868, from said appliances as shown in the Home Appliances screen 4850.
  • the user then executes the Done icon 4868a which makes the handset 102 navigate back to screen 4802, as being shown as screen 4851.
  • the Home Appliances menu 4853 comprises the eight newly additional household appliances controlling icons: Door Lock 4859, Help Alert 4861,
  • Chart diagram 4870 and Fig. 49 show the interaction between the handset 102, the
  • Dev 106 and all the appliances - Door Lock 4872, Help Alert 4874, AC/Heat controller 4876, Cable Box/TV 4878, Garage Opener 4880, Sprinkler 4882, Electric Meter 4884, and Door Bell & Intercom 4886 (and the like, such as: Water Meter, Heating and Cooking Gas Meter). It starts at step 4881 when the Dev 106 communicates with the handset 102, after it receives the Home Appliances Connecting command from the handset 102 and after the user executes the feature as shown in screen 4830.
  • the Dev 106 connects and communicates with the Door Lock step 4883 (also shown as the communication link/medium 4883 in Fig. 49), and receives its software application step 4883A which the Dev 106 also passes its copy to the handset step 4883B, showing in the form of the icon 4854 (DA).
  • the Door Lock step 4883 also shown as the communication link/medium 4883 in Fig. 49
  • the software application step 4883A which the Dev 106 also passes its copy to the handset step 4883B, showing in the form of the icon 4854 (DA).
  • the Dev 106 connects and communicates with the Help Alert step 4885 (also shown as the communication link/medium 4885 in Fig. 49), and receives its software application step 4885A which the Dev 106 also passes its copy to the handset step 4885B, showing in the form of the icon 4856 (HA).
  • the Help Alert step 4885 also shown as the communication link/medium 4885 in Fig. 49
  • the software application step 4885A which the Dev 106 also passes its copy to the handset step 4885B, showing in the form of the icon 4856 (HA).
  • the Dev 106 connects and communicates with the AC/Heat controller step 4887
  • the Dev 106 connects and communicates with the Cable Box/TV step 4889 (also shown as the communication link/medium 4889 in Fig. 49), and receives its software application step 4889 A which the Dev 106 also passes its copy to the handset step 4889B, showing in the form of the icon 4860 (CA).
  • CA icon 4860
  • the Dev 106 connects and communicates with the Garage Opener step 4891 (also shown as the communication link/medium 4891 in Fig. 49), and receives its software application step 4891A which the Dev 106 also passes its copy to the handset step 4891B, showing in the form of the icon 4862 (GA).
  • the Garage Opener step 4891 also shown as the communication link/medium 4891 in Fig. 49
  • the Dev 106 also passes its copy to the handset step 4891B, showing in the form of the icon 4862 (GA).
  • the Dev 106 connects and communicates with the Sprinkler step 4893 (also shown as the communication link/medium 4893 in Fig. 49), and receives its software application step 4893 A which the Dev 106 also passes its copy to the handset step 4893B, showing in the form of the icon 4864 (SA).
  • SA icon 4864
  • the Dev 106 connects and communicates with the Electric Meter step 4895 (also shown as the communication link/medium 4895 in Fig. 49), and receives its software application step 4895A which the Dev 106 also passes its copy to the handset step 4895B, showing in the form of the icon 4866 (EA).
  • the Electric Meter 4884 is embedded or equipped with an identifier (such as S/N, location address) in its communication with any wireless device and also during the Dev’s home appliances discovery phase (not shown in screen 4810) so it can be distinguished by the user from the ones of his/her neighbors.
  • the Dev 106 connects and communicates with the Door Bell & Intercom step 4897 (also shown as the communication link/medium 4897 in Fig. 49), and receives its software application step 4897A which the Dev 106 also passes its copy to the handset step 4897B, showing in the form of the icon 4868 (BA).
  • the Door Bell & Intercom step 4897 also shown as the communication link/medium 4897 in Fig. 49
  • the Dev 106 also passes its copy to the handset step 4897B, showing in the form of the icon 4868 (BA).
  • SRC Short Range Communication
  • the software applications which were transmitted previously from the household appliances to the Dev 106 and to the handset 102 such as: Icons: DA 4854, HA 4856, AA 4858, CA 4860, GA 4862, SA 4864, EA 4866, and BA 4868 preferably can be the URLs (app download address links or hyperlinks), which the user then uses to download the appropriate online applications into his/her handset 102, which then transmits them to the Dev 106.
  • the user can also download the household applications online, using App
  • appliances/equipments via his/her handset 102.
  • Fig. 50 illustrates a preferred application example of embodiments 5000 of the present invention in a private (closed) wired/wireless LAN (Local Area Network) network.
  • the exemplary embodiment 5000 presents preferred steps taken by a user in his/her handset, by executing the Home Appliance Configuration icon 1373 (in the Home Dev Facility Menu 1350 of Fig.
  • the Dev 106 in order to configure the Dev 106 as a DHCP server (as shown in line 5022 by checking box 5024) and its household appliances or premises equipment (Door Lock 4872, Help Alert 4874, AC/Heat controller 4876, Cable Box/TV 4878, Garage Opener 4880, Sprinkler 4882, Electric Meter 4884, and Door Bell & Intercom 4886, Integrated Smart Pet Door 6196 [its Door 6190, Speakers 6192, and Cameras 6194], Digital Dog 5008, Big-Screen TV 5009, Private Cloud 4904 and Other Appliance 5006 which can be a servicing robot, a dishwasher, a stove, a wine cellar, a solar water heater, a swimming pool heater, a refrigerator, a washing machine, a clothing dryer, main water valve shutoff or the like) as clients/hosts.
  • a servicing robot a dishwasher, a stove, a wine cellar, a solar water heater, a swimming pool heater, a refrigerator, a washing machine, a clothing dryer, main water valve shutoff
  • the hub extender 5004 extends the wireless connection 5008 to the Dev 106, allowing the Dev 106 better wireless coverage of the appliances, in this example, such as: Integrated Smart Pet Door 6196, Private Cloud 4904 and Other Appliance 5006 which are at the harder to reach areas of the Dev’s wireless LAN network generated by the Wired/wireless Switch 280 in Fig. 2/3/4.
  • the Wired/wireless Switch 280 (shown in Fig. 2/3/4 as a separate entity) is used by the Dev 106 (via its LAN connector 253b) as its communication hub connecting/communicating (to all the Dev’s household appliances or premises equipment) through its wireless LAN transmission.
  • the Wired/wireless Switch 280 can also be incorporated alternatively as internal component of the Dev 106. Not shown in Fig. 50 are Routers and some other devices in order for the ease of the presentation.
  • Dev s DHCP & Web Server layer (519/619 of Fig. 5/6) execute its function configuring the Dev as a Dynamic Host Configuration Protocol (DHCP) server which will assign its available IP addresses dynamically to the household appliances or premises equipment as soon as one of them is powered on and connected to its LAN network (device provisioning).
  • DHCP Dynamic Host Configuration Protocol
  • the detailed description and their protocols (DHCPv4/ DHCPv6) are beyond the scope of this invention as they are available online (refer to RFC 1541/3315 - Dynamic Host Configuration Protocol for IPv4/ IPv6 for more information) and are also known to those of ordinary skill in the art.
  • DHCPv4 description of the process known as DORA (Discovery, Offer, Request and Acknowledge) followed by a brief DHCPv6 of how the Dev and its household appliances is given below in order to have a picture of how a server (Dev) and its clients (household appliances) interact during this (provisioning) process.
  • DORA Discovery, Offer, Request and Acknowledge
  • DHCPv6 of how the Dev and its household appliances
  • the Dev 106 responds its DHCPOFFER message 5083 (actually responds by broadcasting as indicated by signals: 5083, 5085, 5087, 5089, 5091, 5093, 5095, 5097, 5015, 5017 and 5008) with at least the DHCP server’s IP address i.e., 192.168.254.254 (shown in 5027 of handset screen 5020) and one or more of its DHCP parameters (i.e., client’s MAC address, its offering IP address, Subnet mask, Lease Duration, Standard gateway, Proxy configuration and the likes).
  • the Dev also transmits (via either cellular network 118/5082 or SRC network 104/5084) its server and client IP addresses (5027 and 5028) to the user’s handset as shown on its screen 5020.
  • the Door Lock 4872 (DHCP client) broadcasts a DHCPREQUEST message 5083 indicating it selecting the Dev as its DHCP server by specifying the server identifier (typical IP address of the server, i.e., 192.168.254.254).
  • the Dev then responds by sending a DHCPACK message 5083 granting the connection (lease) to the client (Door Lock) 4872 with the lease information containing at least the Door Lock leased IP address i.e., 192.168.254.2 (5028) or any other configuration information that the client (Door Lock 4872) might have requested.
  • Handset screen 5020 presents IP addresses 252.168.254.254 (5027) and 252.168.254.2 (5028) in IPv4 format for ease of this example presentation.
  • DHCPv6 Host Configuration Protocol v6
  • Door Lock DHCPv6 host/client
  • the Dev DHCP server
  • Advertise message 5083 to indicate that it is available for DHCP service.
  • Door Lock 4872 sends a Request message 5083 to request configuration parameters, including at least an IP (Internet Protocol) address from the Dev (DHCP server).
  • the Dev (DHCP server) 106 sends a Reply message 5083 containing assigned IP addresses and configuration parameters to the Door Lock.
  • Renew message to extend the lifetime on its assigned IP address from the Dev
  • Rebind message (not applicable in the invention) to extend the lifetime on its assigned IP address from any available server.
  • the Dev 106 also supports Static IP addressing as well as the Internet of things
  • the Dev functioning as a Dynamic Host Configuration Protocol (DHCP) servers and its household appliances or premises equipment in home application (or vehicle equipment accessories in auto application) functioning as DHCP hosts/clients, offer a webpage-like interface between the Dev 106 (server) and its hosts/clients in a closed-loop LAN or “Private WIFI Network” as are well known to those of ordinary skill in the art.
  • DHCP Dynamic Host Configuration Protocol
  • the Dev 106 By functioning as a DHCP server, the Dev 106 frees the owner from having to have an Internet connection and thus not having to pay extra for said service. In other words, no Internet connection is necessary. Communication between the Dev and one or more of its household devices or office/business/commercial/industrial equipment (or vehicle equipment accessories in auto application) is through the private LAN network and therefore shields these devices from being breached by unwanted guests (via Internet or public WIFI). Communication between the Dev and one or more of its registered handsets 102 is via the cellular network (with its encrypted and dynamic MSK embedded in the communication data stream) and thus allows the user to communicate, control and monitor these household devices or office/business/commercial/industrial equipment (or vehicle equipment accessories in auto application) only via the said Dev.
  • This architecture increases the level of security /protection and offers better alternative than the technology currently on the market where unwanted users can breach the Control and Monitor System (via the Internet) just by having its correct user ID and password.
  • Static IP addressing demands more effort because it requires human intervention but it provides better protection against network security problem than dynamic IP addressing does during provisioning. The user does this by executing Static IP addressing icon 1171/1371 in Auto/Home Dev Facility Menu 1150/1350 of Fig. 11/13 making the handset 102 transmit the command to the Dev 106.
  • the Dev 106 verifies and processes said command, then transmits back the IP-address map (not shown) to his/her handset, showing its IP address availability where the user picks and checkmarks which available IP address for which appliance (i.e., household appliances in home application or vehicle equipment accessories in auto application; let’s say Appliance A in this case), The user then executes the Confirm icon (not shown), which makes the handset 102 transmit the confirmation back to the Dev 106, which processes and executes said command and information.
  • the Dev transmits a command (i.e., ping command, for instance) via said IP address to Appliance A and waits for a response for testing purpose.
  • a command i.e., ping command, for instance
  • the Dev will transmit to the user’s handset the success response if it receives a response from Appliance A within its timeout period. If the Dev does not, it will transmit to the user’s handset a response asking the user to verify if the assigned static IP address to the appliance (Appliance A) matches the selected one. It is also preferable that the Dev 106 generates and transmits a unique dynamic MSK to each one of its appliances during this provisioning and it will be embedded in subsequent communication between the Dev 106 and said appliance in order to prevent unwanted devices from masquerading as legitimate connected device in order to breach the Dev’s private appliance network.
  • the Digital Dog 5008 is actually one or plurality of wired/wireless speakers receiving commands from the Dev 106 in order to provide a real dog barking sounds to scare off potential prowler(s).
  • the user can turn the Digital Dog 5008 on or off by toggling the handset’s Digital Dog icon 1347 with the EN 1347a (in Home App Menu 1322 of Fig. 13) indicating it is enabled or DIS (not shown) as disabled.
  • the user can also make the Digital Dog 5008 bark when executing Digital Dog Bark icon 1339.
  • the Dev senses (via its smart Gesture, video Sensors 321 of Fig.
  • the barking command (transmitted by the Dev 106 to the Digital Dog 5008) can consist of data whose values indicate its intensity, frequency, pitch and duration. If more than one speaker is used, the Dev 106 will simulate that the dog is running around the house while barking and generate the barking intensity in order to impersonate that of a real big dog.
  • the Dev also transmits the alerts and any affected movement recorded by its video inputs to the handset(s) of its users. It also connects the audio communication with its user’s handset so he/she can inquire about the unexpected presence.
  • the vehicle external devices preferably can be configured and each accessory or sensor such as: wire/wireless Cameras 216 and Smart Motion Sensors 221 of Fig. 2, Smart Motion Video Sensors (blocks 3416, 3418, 3420 and 3422, of Fig. 34), Audio Sensors (3424 of Fig. 34), Facial Recognition Cameras (3426, 3428 and 3430 of Fig. 34), Built-in vehicle scale (4242C of Fig. 42C), Other Auto Accessory Interface and the likes can be assigned a static IP (or a dynamic IP) accordingly.
  • wire/wireless Cameras 216 and Smart Motion Sensors 221 of Fig. 2 Smart Motion Video Sensors (blocks 3416, 3418, 3420 and 3422, of Fig. 34), Audio Sensors (3424 of Fig. 34), Facial Recognition Cameras (3426, 3428 and 3430 of Fig. 34), Built-in vehicle scale (4242C of Fig. 42C), Other Auto Accessory Interface and the likes can be assigned a static IP (or a
  • Fig. 51 illustrates a preferred application example of embodiments 5100 of the present invention.
  • the exemplary embodiment 5100 presents the interaction between the Dev 106, the User (5120-In) and his/her handset 102A when the latter two are within the Dev’s wireless range coverage (i.e.,“the User 5120-In” inside his/her home).
  • the User either utilizes the handset 102A, via its screen display inputs, to communicate with the household/premises devices (Door Lock 4872, Help Alert 4874, AC/Heat controller 4876, Cable Box/TV 4878, Garage Opener 4880, Sprinkler 4882, Electric Meter 4884, Door Bell & Intercom 4886, Integrated Smart Pet Door 6196 [its Door 6190, Speakers 6192, and Cameras 6194], Digital Dog 5008, Big-Screen TV (5009- In), Private Cloud 4904 and Other Appliance 5006) via the Dev 106 with its wireless LAN communication link 5126.
  • the household/premises devices Door Lock 4872, Help Alert 4874, AC/Heat controller 4876, Cable Box/TV 4878, Garage Opener 4880, Sprinkler 4882, Electric Meter 4884, Door Bell & Intercom 4886, Integrated Smart Pet Door 6196 [its Door 6190, Speakers 6192, and Cameras 6194], Digital Dog 5008, Big-Screen TV (5009- In), Private Cloud 4904 and Other Appliance 5006)
  • the handset can also communicate separately and directly to each one of these household/premises devices (without via the Dev) as shown via wired/wireless or combination of wired and wireless LAN communication links: 5104 to Door Lock 4872, 5106 to Help Alert 4874,
  • the User can also communicate directly to the Dev 106 (as long as his/her registered handset is in the vicinity or his/her biometric features, i.e., facial and or fingerprint inputs, have been verified by the Dev 106 through one of its video inputs 216/312 of Fig. 2/3, by its Biometrics layer 627 of Fig.
  • Fig. 6 against its stored biometrical data
  • its HF Speaker microphone & voice activated Circuitry block 230 of Fig. 2/3/4 as shown via voice commands 5122 whose inputs to the Dev are decoded by its Hands-Free Audio I/O & voice-activated layer 532/629 and Voice Recognition layer block 525/625 as shown in Fig. 5/6 in order to control and monitor its auto accessory or household/premises devices.
  • voice commands 5122 whose inputs to the Dev are decoded by its Hands-Free Audio I/O & voice-activated layer 532/629 and Voice Recognition layer block 525/625 as shown in Fig. 5/6 in order to control and monitor its auto accessory or household/premises devices.
  • One such example is the user (5120-In) speaking 5122 “Dev turn on the TV” to the Dev 106 in order to turn on the Cable Box/TV 4878.
  • the Dev 106 (The voice command 5122 is executed and decoded by the Dev’s Voice Recognition layer block 5
  • the User 5120-In is also able to communicate with the Dev 106 via a Big-Screen
  • the Big- Screen TV (5009-In) preferably with Video, Audio and Touch Screen capability (Link 5023-1/0).
  • the Big- Screen TV (5009-In) acts like a DHCP client to the Dev server 106 as previously presented in Fig.
  • An example is a Big-Screen TV (5009-In) which, located in the user’s bedroom/living room, is able to offer him/her a better prospective (because of its big screen display) while interacting/interfacing with the Dev in viewing, controlling and monitoring its household appliances (versus via the handset 102A or versus directly to the Dev 106 via one of its embedded Audio/Video Inputs).
  • the Big-Screen TV communicates both the user’s facial features and voice inputs (Link 5017-1) to the Dev 106 which then verifies, decodes and processes said information.
  • the Dev will transmit (Link 5017-0) in audio data message (for example“Hi, I am the Dev. May I help you?”) to the Big-Screen TV and a video display presenting the panoramic view and command icons of its monitoring household environment.
  • the user then is able to command the Dev either by speaking to the Big-Screen TV (Link 5023-0), hand/head Gesture or executing its touch-screen command icons.
  • the Big-Screen TV transmits (Link 5017-1) audio, gesture commands and or command icon inputs from the user, to the Dev 106.
  • the Dev decodes and processes these commands (via Voice Recognition circuitry 279, Facial & Gesture Recognition circuitry 375 of Fig. 3 and executed by Voice
  • the User 5120-Ex (when away from home) is also able to communicate with the
  • a Big-Screen TV 5009-Ex
  • a Big-Screen TV 5009-Ex
  • the TV is mirrored via its connection (i.e., USB C-to-HDMI cable 5164 (5164-1 & 5164-0); USB stands for“Universal Serial Bus” and HDMI is for“High-Definition Multimedia Interface”) from his/her handset 102B which is able to generate said mirror when it detects the connection or else when he/she executes the Mirror TV icon (1335 of the Home App menu 1322 of Fig.
  • the handset 102B receives (Link 5164-1) the user’s audio or touch-screen commands from the Big-Screen TV (5009-Ex), transmits said commands to the Dev 106 (Link 118) which processes (decodes audio video and data commands via Voice Recognition circuitry 279, Facial & Gesture Recognition circuitry 375 of Fig. 3 and executed by Voice Recognition layer 625, Facial & Gesture Recognition layer 651 of Fig.
  • the Dev 106 then communicates back the responses and statuses (Link 118) from its appliance(s) to the handset 102B which transmits (Link 5164-0) the information (either in Audio and or Video forms) to the Big-Screen TV (5009-Ex).
  • Handset screen 5140 presents inbox Alert 5142 (transmitted by the Dev 106) to the user of an attempt (assigned IP address 192.168.1.13, line 5148) to connect to the Dev’s network. It then lets him/her verily if said connection is allowed. It is only allowed after him/her checking box 5150 and then executing Ok button 5152.
  • the Dev 106 also supports voice recognition (executed by its Voice Recognition layer 525/625 of Fig. 5/6) and allows the user to make change on its default name and the names of its appliances in order to make them more user-friendly and easier to comprehend to its user.
  • the User (5120-In) for instance, is able to change the Dev’s default name“Dev” into“Lisa” and any of its appliances to more descriptive names to make them easier and more specific to remember (i.e., Entry or Dining Light instead of Light #1 or Light #2).
  • Linel Q1 of column I presents the default Dev’s name“Dev” which is the only recognizable default word the Dev will only responds when being addressed to, in the beginning, as is shown in the Dev’s answer A1 in column II.
  • Line2 The Dev will not respond to command lacking its name (in order to make sure that it is the intended object being addressed to by the user).
  • Line3 and line3a show the Dev answering what its function is.
  • Line4, line4a, line4b and line4c list (various ways) the names of appliances when being asked about them.
  • Line5 and line6 shows the status of appliance #1 before (locked) and after said appliance has been issued unlock command to the Dev (unlocked).
  • Line7 and line8 shows the Dev’s name being commanded to change to“Lisa” with a confirmation.
  • Line9 and line 10 shows the Dev only responds to the new name“Lisa” and not“Dev”.
  • Linel 1 Linel2 and linel3: the Dev is commanded to change the names its appliances from“Appliance #1” to“Entry Door”,“Appliance #2” to“Dining Room Light” and “Appliance #3” to“Thermostat”.
  • Line 14 and linel5 the Dev is commanded to turn the Dining Room Light on and verified that the Dining Room Light old name is no longer in use.
  • Line 16 the Dev lists the new name of its appliances.
  • Linel7 and linel8 the Dev lists the Entry Door as being unlocked and it is commanded to lock the Entry Door.
  • each one of the users has the option, with his/her registered handset in the vicinity or has his/her facial features and or fingerprints inputted into and recognized by the Dev, change (tailor) the name of the Dev per his/her personal liking and still is able to command the Dev in turning on or off the appliances (for example, Lisa for previous user as shown in Table 1, while Debbie is a more preferred name for the second user).
  • the Dev Voice Recognition layer (block 525/625 of Fig. 5/6) is able to be programmed so it only listens to voice of each user in the family (per his/her registered handset) meaning each user has to program the Dev at least once so his/hers is in its Voice Recognition database if he/she so desires.
  • any user can turn the Voice Cmd All icon on (icon 1361a of Home Dev Facility Menu 1352 of Fig. 13) so the Dev will listen to the commands from anybody in the case where the user has guests come visiting.
  • the user preferably has the option to program the Dev, as indicated in the previous paragraphs, in listening/obeying to his/her voice input only in turning on/off the appliances or listening to anybody by turning on the Voice Command All button 1361a in Fig. 13.
  • Each user within the family /company is able to program the Dev in changing its name to his/her liking (for example; to Debbie for his/her use while Lisa name is for the previous user as shown in Table 1).
  • Dev to input his/her voice into the Dev Audio input (block 277 of Fig. 2/3) in words, phrases and sentences so its Voice Recognition layer (block 525/625 of Fig. 5/6) is able to recognize his/her voice without his/her having the handset in the vicinity whenever he/she wants to communicate with the Dev.
  • An example is the user executing the Voice Recognition Record icon 1165/1365, and then starting speaking into the Dev’s audio input 277 (microphone) per the Dev audio instruction.
  • the Voice Recognition Record icon 1165/1365 executes the Voice Recognition Record icon 1165/1365 again to complete the training and from then on, he/she can command the Dev and there is no need for his/her handset to be nearby.
  • This feature allows the user to unlock his/her car/house amongst other things without having the registered handset in possession.
  • the voice recognition per user is valid as long as his said handset is in use (registered). As soon as said handset is no longer in use or reported lost by the user to the Dev, the Dev will invalidate all said information.
  • Fig. 51A illustrates a preferred application example of embodiments 5100A of the present invention.
  • the exemplary embodiment 5100A presents the handset screens (executed by its Cloud Storage App 739B of Fig. 7B) during the interaction between the Dev 106 (executed by its corresponding Cloud Storage App 639 of Fig. 6) and the handset 102 when the user wants to store/transfer photos residing in said handset to his/her Data Storage (Private Cloud 4904 in Fig. 49/50/51). He/she can also store/retrieve other documents such as files, journals, notes to/from his/her Private Cloud 4904.
  • the Cloud Storage directory 5103A shows it consists of two storage drives:
  • CloudDrl 5104A consisting of Family folder 5105A and CloudDr2 5106A as being empty.
  • the Cloud Storage screen 5103 A offers functions where the user can create new directory folder by executing Create Folder icon 5113 A, load (and search) handset 102 documents by executing File icon 5115 A, retrieve directories and documents from the Private Cloud 4904 by executing Retrieve icon 5110 A, load (and search) handset 102 photo by executing Photo icon 5111 A, backup
  • Folder icon 5113 A making the handset display a Drop-Down entry (not shown) where he/she enters “Picnic” in order to create said Folder 5121 A making the handset 102 navigate to another display as shown in Screen 5117A.
  • the user then saves/transfers the handset photos by executing Photo icon 5123 A which makes the cloud storage program load the handset photo album into the handset display as shown in Screen 5126A where the user chooses by selecting/touching photos such as: Photol 5130A, Photo3 5134A and Photo6 5141 A.
  • the user has the option of encrypting these photos with a password with Encrypt PW icon 5139A before executing the Copy icon 5144A which makes the handset navigate to Screen 5152A.
  • Handset Screen 5152A shows the user selecting the Picnic Folder 5164A and then executing Paste icon 5161A in order to store Photo7 5157A, Photo8 5158A and Photo9 5159A in the directory Picnic 5156A. The user then executes the Save icon 5162 A making the handset 102 transmit the information and the command to the Dev 106 in order for the Dev 106 to store said information to the Private Cloud 4904.
  • the Dev also preferably allows the user to store the photo or video being taken by his/her registered handset into the Private Cloud 4904 in real-time as shown in Handset Screen 5166A.
  • the handset’s picture is immediately transmitted to the Private Cloud 4904 as the user takes picture (in Photo Mode 5170 A) while enabling the Cloud icon 5168A or, as shown in Handset Screen 5171A, when the user rims video (in Video Mode 5174A) while enabling Cloud icon 5173 A.
  • the Dev also preferably allows the user to backup or restore its stored image or of the registered handset’s when he/she executes the Handset’s Image Backup icon 5114A or Image Restore icon 5109A in Screen 5102A.
  • Executing Image Backup icon 5114A will make the handset 102 transmit the command to the Dev which transmits back the stored images on its Cloud Storage as shown in Handset Screen 5175 A where Images of Home Sara 5183 A and Auto Blue Sedan 5178A already had been backed up.
  • the user is asked to fill out if the Backup Image (Source 5185 A) is either of the Handset (by checking Box 5180 A) or of the Dev (by checking Box 5181 A).
  • the user also has to give the Backup Image a Name 5186A (by filling the blank).
  • pushing the Execute icon 5182 A will make the handset 102 transmit the command to the Dev.
  • the Dev either communicates with and then stores its image to the Cloud Storage (Source Dev box 5181A) or it communicates with the handset and receives the handset’s image and then stores it to the Cloud Storage (Source Handset box 5180A).
  • Executing Image Restore icon 5109A will make the handset 102 transmit the command to the Dev which transmits back the stored images on its Cloud Storage as shown in Handset Screen 5189 A where Images of Home Sara 5183 A, Auto Blue Sedan 5178 A, Mi Handset 5195 A and Sol Handset 5190A already had been backed up.
  • the user is asked to fill out where to restore the image (Destination 5196A) is either to the Handset (by checking Box 5192A) or to the Dev (by checking Box 5193 A).
  • the user either fills out the name 5198A or by touching one of the Backup icons (5183 A, 5178A, 5195A and 5190A) will make the handset fill out the Image Name 5198A.
  • Executing Execute icon 5194A will make the handset transmit the command to the Dev.
  • the Dev either communicates with and then retrieve the chosen image from the Cloud Storage and either restore its own image (Destination Dev box 5193 A) or it communicates with the handset and transmits said image to the handset which then restores its own image (Destination Handset box 5192 A).
  • Fig. 52 illustrates a preferred application example of embodiment 5200 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to remove a household appliance/equipment from the Dev’s Home Control and Monitor system.
  • This feature allows user to remove appliance devices from the menu as selected by highlighting the Appliance Remove icon 5057, which makes the handset 102 navigate to screen Home Device Removal 5202. The user then can select devices to be removed by screen touching appropriate remove boxes such as: Door Lock 5206, Help Alert 5208, Heating and A/C 5210, Cable Box 5212, Garage Door Opener 5214, Sprinkler 5216, Electric Meter 5218, and Door Bell & Intercom 5220.
  • the handset screen“Home Device Removal” 5230 shows Device #6 - Sprinkler 5244 (Toro-356) being selected to be removed.
  • the handset 102 When the handset 102 receives the response back from the Dev 106, it means the lawn sprinkler (application software) has been removed from the Dev 106. The handset 102 then removes the sprinkler application software from its memory.
  • the Home Appliances menu 5282 shows its updated content with the sprinkler no longer the listed as a house-hold device. (The handset software preferably will not remove the device software application until the Dev 106 completes its removal function - thus prevent partial removal of the application software and maintain synchronization between the Dev 106 and the handset 102).
  • the External Apps block 513 of Fig. 5 is the memory space (block 264 of Fig 2) allocated to additional applications, which the Dev executes in order to extend its functionalities associated with said additional apps in the Auto Application.
  • the 3 rd Party Apps block 613 of Fig. 6, likewise, is memory space (block 264 of Fig 3) allocated to 3 rd party application executed by the Dev, in order to provide the interface to 3 rd party devices in the Home/Business/Institution Application i.e., additional 3 rd party implementations such as: Taxi Hailing App, Vending Machine App,
  • the preferred 3 rd Party App icon 1341 of Home App Menu 1322 in Fig. 13, with a pull-down menu arrow 1341a (or 1325a in the PC 1321), provides the user (i.e., employee of 3 rd Parties/Companies providing said service) the interface where he/she can communicate with the Dev via a handset 1302/102, PC 1321 or similar device.
  • the PC 1321 (preferably via its Intranet connection with the Dev) is a better design and setup platform for the design and layout of the Dev’s 3 rd Party Apps since it has a much bigger display screen (1321) than the handset (1302).
  • a handset/PC preferred 3 rd Party Apps pull-down window 1345 (of Home App Menu 1322 in Fig. 13) shows a long list of preferable Apps Interfaces (Item 1 Taxi Hailing App - Item 31 Goods Delivery App) supported by the Dev is shown for demo only; the reality is each listed business or industry has its few own specific apps.
  • the taxi company needs only the Taxi Hailing App (pull-down window 1345, Item 1) in order to communicate with the Dev 106 (via a handset 102/1302 or PC 1321) so its employee can perform tasks (executed by Taxi Hailing App, one of 3 rd Party Apps block 613 of Fig. 6) such as: adding/ removing new/old vehicles to/from its fleet, recording/deleting each vehicle and its driver ID information, and so on and so forth.
  • tasks executed by Taxi Hailing App, one of 3 rd Party Apps block 613 of Fig. 6
  • Vending Machine App Item 2, pull-down window 1345) or Supermarket App (Item 3, pull-down window 1345) where its employee can program the Dev 106 (via a handset 102/1302 or PC 1321) in order to set up the goods/merchandise such as: categories, name, price, original quantity.
  • the Dev 106 in essence, besides allowing its user to have access, via his/her registered handset, to its controlled and monitored devices (household appliance in home application, business environment, equipment and its peripheral in business application, and vehicle accessories in auto application), in this case, as a business or institution owner/operator instrument, via its 3rd Party Apps (613 of Fig. 6), extends its (the Dev’s) connection to 3 rd Party Users
  • the Dev forms an eco-system where its owner/operator is able to provide a smooth, efficient, secure, discreet and pleasant experience to its 3 rd Party Users/Visitors/Customers.
  • the 3 rd Party Apps extend the Dev’s function further.
  • a user via his/her non- registered handset (with or without auto/home application) with the appropriate 3 rd Party App download, is able to: receive goods and services (i.e., Taxi Hailing App, Vending Machine App, Supermarket App, Restaurant App, Ride-Sharing App, Car Rental App, Gas Station App, Battery Recharging App, Parking Station App, Hotel/Motel App, Auto Dealership App and Goods Delivery App), conduct a payment transaction (i.e., Cash Register App, Credit Payment App, Mobile Payment App and Crypto-Currency Payment App), make a trip (i.e., Bus/ Train App and Passenger Plane App), entertain (i.e., Amusement Park App, Sport Stadium App, Movie Theater App and Cruise Ship App) and obtain personal services (i.e., Classroom App, Workshop/Training App, Hospital App, Child-Care Nursery App, VoIP App and Goods Delivery App) from the operator, business owner or merchant of the Business
  • FIG. 53 illustrates a preferred application example of embodiment 5300 of the present invention.
  • the exemplary embodiment 5300 presents the Dev 106 as a Vending Machine Merchandise Dispenser distributing purchased goods when a customer using his/her handset 102 (with its associated app downloaded and executed by scanning and executing the displayed QR Barcode block 5322) to purchase its displayed items.
  • Vending Machine 5302 represents such preferred example with an embedded Dev 106a, Customer Instruction Display 5310 (i.e., instructing buyers how to purchase using their handsets, how to scan the displayed QR Barcode 5322 in order to download the app into their handsets), Speaker 5314, Camera 5312, items to be purchased in Rows 5316, 5320 and 5324.
  • step 5374 When a customer wants to buy an item such as A1 5304, his/her handset 102 communicates step 5374 with the Dev 106B (Vending Machine 5371) via the handset app (executed by Vending Machine App, one of 3 rd Party Apps block 613 of Fig. 6). He/she then enters A1 (block 5375 as shown in flow diagram 5370) on his/her handset’s displayed Order Menu (not shown) or scans barcode 5308 with his/her handset 102 making/letting (by communicating step 5376 via SRC network to) the Dev (Vending Machine) 106B inquire and receive (from the handset 102) its mobile payment account information step 5377 (via mobile network) associated with owner of said handset. The Vending Machine (Dev 106B) transmits (step 5378) the payer account information to its bank (Vending machine Bank Ace 5373 or its credit account service
  • the Vending Machine Bank Account 5373 communicates and receives the payment confirmation 5378 from the User’s Bank Account 5372. It then transmits the successful transaction step 5379 to the Dev (Vending Machine 106B), which finally releases the purchased Item (block 5380) through the Released Box 5329 where the customer is able to retrieve it.
  • the customer’s handset 102 and his/her Bank Account 5372 can also optionally reconcile their balances, step 5381.
  • the vending Machine owner can also monitor using his/her handset to
  • the Vending Machine 5302 can primarily be cashless and monitored 24 (hours a day) by Video Camera 5312, rendering it less susceptible to theft and break-in damage.
  • the (Bus) Dev 106A inquires (step 5361 in Chart 5360) from his/her Handset 102 the trip ticket (purchase) information and if the received information matches its schedule database, it informs (step 5362) the passenger (also as shown in Handset Screen 5340) that he/she is“Boarding the Right Bus!” 5341 optionally accompanied by Audio 5342.
  • the Dev also downloads the Itinerary Map 5343 showing his/her trip with the Boarding Location (Fresno 5345) and Trip Destination (San Francisco 5344) so the passenger can see his/her trip in more graphical detail.
  • the Dev again informs (step 5363) the passenger via Text 5352 and Audio 5355 as shown in Handset Screen 5350 that the next bus stop will be at his/her destination (San Francisco 5353).
  • Fig. 54 illustrates a preferred application example of embodiment 5400 of the present invention.
  • the exemplary embodiment 5400 presents the Dev 106 as a traffic controller, enabler and host in a business environment/establishment, as in the example, a Restaurant/Bar (via its Restaurant App, one of 3 rd Party Apps block 613 in Fig. 6) enabling public WIFI connection to any of its (on-premises) customers and its workers (staffs). It then transmits its web pages, menus and other available services to the handsets of its customers via public WIFI network and conducts the payment transactions of said service via the more secured cellular network (in order to protect its customers’ financial information).
  • the Dev 106 also functions as a DHCP server while all handsets (of the restaurant/bar customers and its staff) function as DHCP hosts/clients as similarly described in Fig. 50 (Dev 106 assigning the available IP address to each individual handset and connecting each via said IP address). But unlike the example of Fig. 50 (where only exclusive known household/premises appliances are allowed to connect and then controlled and monitored by the Dev itself), the Dev f 06, in this scenario, allows any of these handsets to connect to its open (public) network automatically as soon as they are within the restaurant/bar premises (within its WIFI range).
  • the Dev 106 can also function as DHCP host/client, if needed, in conjunction with another DHCP server (if any such as a PC with its high-speed broadband internet modem for better service, higher bandwidth and faster response time), communicating with all other handsets functioning as DHCP hosts/clients, as are known to those of ordinary skill in the art.
  • the Dev preferably can be programmed to reserve a separate“private” IP address range (scope) for its household /premises appliance clients as in shown Fig. 50/51 and a separate“public” IP address range (another scope) for customer and staff handsets as shown in Fig. 54.
  • the Dev is also preferably able to function as a Router periodically broadcasting/multicasting packet advertising its availability.
  • Handset 5410 communicates Menu Selection 5488 to the Dev 106 via WIFI connection 5404.
  • the Dev 106 transmits his/her order via WIFI connection 5456/5458 to one of its Kitchen/Bar 5464 staff via his/her Handset 5460/5462; while customer (with Handset) 5444 is being served by a Serving Staff 5443 with Handset 5443 (or a Servicing Robot 5475) since the latter (staff with Handset 5443 or Servicing Robot 5475) had been alerted by the Dev via WIFI connection 5441 or connection 5445 when its Kitchen/Bar staff (with Handset) 5460 completed his/her order (of Customer 5444) via WIFI connection 5456 to the Dev; at the same moment, customer with his/her Handset 5428 completes his drink/meal and has the Dev 106 transmitted the Bill connection 5424 into his/her handset as shown on Handset 5490. All the communications in this example up until this point have been handled via the public WIFI network.
  • the restaurant owner can, via his/her handset 102, monitor by communicating with the Dev 106 (steps 118 and 5454) inquiring about the service of his/her staff and customer feedback.
  • Square Inc. is a financial services, merchant services aggregator and mobile payment company which offers its users a platform to complete their payment transaction also via the cellular network.
  • the user either enters the credit card account information on the platform (handset, tablet), or swipe it with a reader (Square Reader) attached to said platform.
  • Square platform also performing the payment transaction via cellular
  • the Dev receives the payment information wirelessly and remotely from the customer’s handset (or from the Card Reader 5405) while the Square System is itself the platform.
  • the communication between the Dev and the handset(s) can be at least one in cellular, SRC, WIFI, LAN, satellite and any other forms of wire and wireless networks as previously cited in this invention.
  • the Dev operates in a complete Ecosystem where it can communicate, control and monitor in a plurality of networks: in cellular network (118 of Fig. 1) when communicating with its owner’s handset or conducting a customer’s handset mobile financial transaction (steps 5366 and 5386 of Fig. 53), in satellite network device (in case of emergency with the absence of cellular signal), in private wired/wireless LAN network (block 5002 of Fig. 50) when communicating with its household/premises appliance clients (can also either via SRC network 4902 of Fig.
  • the Dev 106 preferably extends its 3 rd party function (while its main function, as usual, is to control and monitor the premise other equipment, accessories and its surrounding environment such as: security system, lighting, heating and air conditioning, entry ways, cameras and so for), controlling a cash register (5508 as one of its appliances/equipment) and communicating with a customer’s handset (Handset2 102-2 in Enclosure 5506) in conducting and completing his/her payment transaction for goods and services while he/she is at the vicinity of the Cash-Register Counter 5511 (consisting of a Cash Register 5508, QR Barcode Display 5507, SRC hub 5509 and Credit Card Reader 5405).
  • the Cash-Register Counter 5511 consististing of a Cash Register 5508, QR Barcode Display 5507, SRC hub 5509 and Credit Card Reader 5405.
  • step 5548 mobile payment account information associated with the customer’s handset (Handset2 102-2) directly and/or wirelessly or via SRC hub (block 5550 or 5509, such as NFC“Near Field Communication, step 5552 or SRC links 104-2 and 104-4).
  • the Dev (Dev2 106-2) When the total is rung up, the Dev (Dev2 106-2) receives the final payment amount from the Cash Register 5508 and transmits (via cellular 118-4) the information to its Banking Service Provider (Merchant Bank Ace 5514) which completes said transaction and transmits back the confirmation (step 5554) to the Dev.
  • the Dev (Dev2 106-2) then signals to the handset (Handset2 102-2) of said completion (step 5558) and the user is able to verily the result (step 5559 or cellular link 118-3) with a copy of the receipt in his/her handset (Handset2 102-2).
  • step 5545 For (user/customer) handset without the appropriate app, scanning and executing the displayed QR barcode (block 5545) for said app download into his/her handset (Handset2 102-2) is achieved via step 5546 (with customer’s handset reading the QR barcode 5507 located by the Cash Register 5508).
  • step 5546 With customer’s handset reading the QR barcode 5507 located by the Cash Register 5508.
  • the credit card payment transaction is also shown in Chart 5540. It starts at Step 5543 where the Cashier scans his/her Customer’s Credit Card 5405b through the Credit Card Reader 5405a after he/she totals up the payment amount at Step 5542.
  • the Cashier then enters the payment amount at Step 5547 which makes the Credit Card Reader 5405 transmit payment amount and the credit card account information (associated with the customer) to the Dev2 step 5549 (or link 5403 in Enclosure 5506).
  • the Dev2 transmits (via cellular 118-4) said information to (step 5554) its Banking Service Provider (Merchant Bank Acc 5514) which completes said transaction and transmits back the confirmation (step 5554) to the Dev.
  • the Dev (Dev2 106-2) then signals to the Customer’s handset (Handset2 102-2) of said completion (step 5558) and the Customer is able to verily the result (step 5559 or cellular link 118-3) with a copy of the receipt in his/her handset (Handset2 102-2).
  • the user of this invention might not even have to produce the handset from his/her pocket/purse. He/she is only near enough to the Cash-Register Counter 5511 so the Dev’s SRC appliance 5509 (or any other NFC device) can communicate effectively with his/her handset without being snooped by another unwanted device.
  • the Dev also supports with a Credit Card Reader 5405 for customers who still use the credit card payment method.
  • the card holder’s payment information 5405b is read via its Reader 5405a which then transmits said information via a secure physical connection 5403 or via cellular connection 118-5 (to 118-4) to the Dev which then completes the transaction with its Banking Service Provider 5514.
  • the Dev 106 preferably can be informed by the user’s handset when said handset is being left behind or out of reach of its corresponding link device as shown in Enclosure 5502 and Graph 5510.
  • the Handset Link Device 5504 can be in form of a Ring 5504a, Pendant 5504b, Link Card 5504c or any likewise mobile device (i.e., smart, wearable device, fitness tracker), communicating (step 5518 or SRC link 104-1) constantly with the handset (Handsetl 102-1).
  • the user starts out by linking the communication (executed by the handset’s Handset Link layer 729A/729B of Fig.
  • the Dev 106-1 will keep track (5534) of the lost device by transmitting its GPS location to other registered handset(s) 5538.
  • the user should delete the alert from the Dev (Devi 106-1) via the Handset Located Command (not shown) in order to erase the Handset Missing ALARM 5536 from the Dev (Devi 106-1).
  • this feature can also be turned off (not shown) if necessary.
  • the Dev 106 preferably functions as a control and monitor system connecting and checking employees (by pinging every 5/10 minutes or a determined amount of time) with their handsets 102 as time-cards (registered each with their own unique MSKs or employee numbers) when they come to work, take a break, time out for lunch, move in/out of the premises and finally go home (programmed via Item 13 Work Day App in 3 rd Party Apps 1345 of Fig. 13). It also can register visitors coming to visit (by connecting and downloading the visitor its inquiry forms into their handsets) requiring them to enter the required information on their handsets. It then can keep track of their whereabouts (by pinging every 1 minute or a determined amount of time with the visitors’ handsets) while they visit with its employees and each visit time duration.
  • 1152/1352 of Fig. 11/13 allows the user to program the Dev 106 via his/her handset (tablet or any device) for meeting scheduling (Item 14 Conference Meeting App in 3 rd Party Apps 1345 of Fig. 13) in order for the user to arrange, organize, request to attend to or excuse from a meeting with his/her coworkers.
  • meeting scheduling Item 14 Conference Meeting App in 3 rd Party Apps 1345 of Fig. 13
  • the Dev transmits back to the handset an
  • the Dev communicates the invitation to the handsets of all the attendees (whose names and phone numbers are on the list).
  • the user is able, via his/her handset, to make changes to the meeting and all the attendees being informed in real-time, such as: rescheduling, cancelling, relocating,
  • the Dev then keeps back of the attendance by connecting (via WIFI) with each attendee’s handset (through MSKs or employee ID numbers) during the meeting and also lets distant attendees to call in to attend the meeting remotely via overhead displays in the meeting room.
  • the Dev also can video record the meeting for cloud storage, which it can be retrieved later on for viewing.
  • the Dev 106 preferably functions as a Parking Controller via its Parking Station
  • the parking lot owner or city parking administrator uses the Parking Station icon (Pull-Down Window 1345 Item 15 of Fig. 13) to communicate with the Parking Lot Dev 106 in order to design the layout of the parking area as a two or three-dimension map with each parking lot position on x and y or x, y and z axes relative to its point of origin located on the map south-west comer.
  • Each numerical labeled parking spot is equipped with a smart motion sensor and the whole geographical map can be projected on any overhead screen display for observation and presentation.
  • Each parking spot smart motion sensor is then configured via the (Parking Lot) Dev’s Parking Station App (one of 3 rd Party Apps block 613 of Fig. 6).
  • Each parking spot smart motion sensor is assigned an IP address statically by the Dev (i.e., via Static IP addressing icon 1171/1371 in Auto/Home Dev Facility Menu 1150/1350 of Fig. 11/13); and together they constitute a private LAN network.
  • the driver parks his/her vehicle in one of its parking spots, its sensor marks the spot as occupied, transmits said information and the vehicle (equipped with its own Dev) encrypted mobile payment account information to the Parking Lot Dev 106.
  • the parking sensor marks the spot as vacant and transmits said information to the Parking Lot Dev 106 which then completes the parking payment transaction with said vehicle.
  • the driver marks his/her parking spot number in his/her handset that transmits said information along with the mobile payment account information to the Parking Lot Dev (through its parking smart motion sensor) via its more secured cellular network. All this assuming that the (car) Dev has been transmitted with the URL link (via the Parking Lot Dev transmission) or the user’s handset has been scanned with the parking QR code which the user then executes in order to complete the app download and rim its application.
  • This feature helps the city to enforce its parking policy more effectively such as time limit by transmitting its violation to the enforcement department and inform the vehicle owner of said time limit. It also replaces the current costly parking meters, which are also prone to vandalism and fraud.
  • the system truly enforces the parking limit by not allowing the car driver to keep feeding the meter when it is about to expire (in other words, the driver has to move his/her vehicle). For owner whose vehicle not yet equipped with the controlling Dev, he/she enters his/her parking spot number via his/her handset which then transmits said information to the Parking Lot Dev 106 and is charged against the mobile payment account information in said handset.
  • the Parking Lot Dev 106 requests the parking payment (mobile payment account associated with the car owner) from and communicates the parking lot information i.e., parking ID (associated with its parking lot number, parking date and time) to the parked car Dev or the driver’s handset 102 (when his/her car is not equipped with the Dev).
  • parking ID associated with its parking lot number, parking date and time
  • the owner needs only to execute the Vehicle Retrieve icon (not shown) on his/her handset 102 which either transmits the command to his/her car Dev 106 which then forwards said command to the Parking Lot Dev 106 or (the handset 102 transmits the command) directly to the parking lot Dev.
  • the Parking Lot Dev 106 informs the driver via his/her handset when his/her car is ready for pick-up.
  • the parking fee payment information is requested and processed by the Parking Lot Dev 106 from either the parked car Dev or from the driver’s handset 102.
  • the (Parking Lot) Dev 106 will transmit its appropriate available parking spot(s) in form of GPS map via (public) WIFI whose hub extenders (similar to the extender 5004 in Fig. 50) strategically located throughout its service area, to a vehicle Dev’s dashboard display (the vehicle equipped with its own Dev) or/and to its driver’s handset when its driver is looking for a place to park, depending on its driving location in order to maximize efficiency and thus optimize driving traffic flow.
  • Valet Parking Dev 106 associated with the Valet Parking Dev 106
  • VID Vehicle ID
  • the attendant transmits said information to the Valet Parking Dev which verifies said account payment information with its Merchant Bank Account.
  • the attendant again uses the Parking Meter Device to scan the VID and transmit it to the Valet Parking Dev which matches it against its previous received information (calculating its parking time/duration) and completes the parking payment transaction associated with the said driver’s mobile payment account.
  • the Dev 106 preferably, extends its function as a school and/or classroom attendant via its Classroom App (one of 3 rd Party Apps block 613 in Fig. 6). Students registering for a class are assigned with a distinct time-limit student ID number to each of their handsets, tablets, wearable, mobile device or ID card.
  • the course secretary puts together (using the Classroom App in the Pull- Down Window 1345 Item 17 of Fig. 13) a list (registration information from school computer database network) consists of name of the course, classroom number/name, attending students, time and date schedules and the likes.
  • the Dev then can keep track of the student attendance (via their handsets or issued wireless ID devices/tags).
  • the Dev also lets students know (via their handsets) in advance if a course which has been cancelled by its teacher or moved to another classroom without the students arriving at the classroom, then realizing there is not a class for the day or it has been moved to another location.
  • the Dev 106 keeps track of the on-site student roll calls via its WIFI (transmitting the list of attendants to the lecturer’s handset, to flat-screen display and/or to administration server), alerts teacher on non-registered students and allows off-site registered students to sign in or attend via the Internet. It also video-records teacher lectures via classroom cameras for cloud storage and transmits the lecture information playback when requested.
  • the Dev 106 can be programmed to disallow any student attendance by invalidating its student ID number.
  • the Dev 106 preferably, besides monitoring its surroundings for security and protection in a passenger in a subway, school bus or passenger train application, extends its functions as a rider/passenger verification attendant via its Subway App, Bus/Train App (one of 3 rd Party Apps block 613 in Fig. 6). Passengers/students paying/registering for said transportation are assigned with a distinct ride ID with time-limit, day -limit or ride-count-limit to each of their handsets (or tablets, ID cards, wearable devices or mobile devices) along with seating number, boarding time & date, boarding gate, boarding station.
  • Each of the plurality of Devs is then able to keep track of the boarding passengers (list) via wired/wireless SRC or WIFI network onboard of its vehicle/train/ship, at the boarding station, at boarding gate, at boarding entry or passenger stops.
  • a passenger is able to verily via the handset if he/she is at the right boarding location; and if not he/she will be advised to proceed to the intended destination via the handset’s GPS map.
  • the passengers getting onboard are being checked, via wired/wireless SRC or WIFI network, by the onboard Dev for their ticket validity and if they are boarding the right trip. An alarm signal will alert the passenger, attendant or driver that something is wrong with said passenger’s ticket.
  • the passengers are able to enter or have their destinations entered on their handsets will be alerted when their destinations have arrived.
  • a map showing the trip being taken is also downloaded, by the onboard Dev, to the passengers’ handsets which clearly guide them on their destination.
  • the Dev 106 preferably, besides monitoring its surroundings for security and protection in a passenger in a cruise ship application, extends its functions as a rider/passenger verification attendant via its Cruise Ship App (one of 3 rd Party Apps block 613 in Fig. 6). Its passenger registration and check-in are done via its Cruise Ship App (Item 28 of 3 rd Party Apps pull down window in Fig 13) when they are at the registration counter, scanning the QR code or simply aiming their smart phone (handset) cameras at a QR code in order to complete the app download and run its application. Passengers paying/registering for said transportation are assigned with a distinct passenger ID number (with day -limit) to each of their handsets, ID cards, wearable devices or mobile devices. The Dev is also able to keep track of the boarding passengers (list) via its WIFI on its boarding station, boarding gate or boarding entry.
  • Passengers boarding cruise ship can go online registering their personal and account information via their handsets or PCs. They can even take their own pictures (facial feature) and or scanning their fingerprints via their handsets which then transmit said information to the Cruise Ship Dev. At the boarding gate, the passengers then can be processed with facial recognition or their fingerprint being processed by the Cruise Ship Dev’s Biometrics Scanner (via its Biometrics Software layer 627 of Fig. 6) and or verified by the cruise ship personnel. The Dev assigns each passenger’s handset a dynamic IP address and its connection lease time is the length of the cruise duration.
  • the Dev also maps the handset’s IP address to his/her town room number, thus allowing the passenger to communicate with each other with his/her handsets via VoIP with the room number as the phone number and the number of guests in each room as the extension.
  • Each passenger is able to activate his/her handset connection to the Dev’s VoIP by executing the VoIP icon (not shown) while onboard.
  • the Dev then transmits the VoIP information verification back to his/her handset which allows the user to fill out his/her name, guest registration and room/cabin numbers, how many guests in each room and the likes (not shown).
  • the passenger then executes the Ok icon making the handset transmit all the information back to the Dev.
  • the Dev processes the information and if all is ok, transmits back the confirmation response informing the passenger that from then on until the end of the cruise, his/her onboard phone number is his/her room number with the lowest extension number order (#1) assigned to whichever handset is being registered first.
  • the passengers can keep in touch using their handsets communicating with another via the VoIP network with the Dev as the Private Branch Exchange (PBX) or Switch Board since there is no cellular service while the ship is on the open sea. All the onboard activities such as fine dining, gift purchasing, entertaining, off-ship excursion can be paid for via their handsets.
  • PBX Private Branch Exchange
  • Each cabin/room on the cruise ship is assigned with a static IP address where the Dev can monitor the in and out of its registered passengers.
  • the Dev can also keep track of the location of its passengers while they are onboard the ship. This will help the cruise ship to replace the current registration system where each passenger has to register and get issued an identification card every time he/she boards the ship.
  • the feature allows the passenger via his/her handset transmitting his/her biometric information via said handset to the cruise ship registration database and it will help speed up the boarding process and improve the overall cruising experience.
  • all the information on the handset is erased from its memory after the passenger settles the account payment with the cruise account department.
  • the Dev 106 preferably extends its functions as a fast food restaurant, drive through or coffee bar where customers’ handsets 102 are connected and downloaded with the menu via WIFI when they are in the vicinity of the business establishment. Customers then view the menu and thus are able to choose and transmit the orders to the Dev 106 via the handsets and the payment transactions are completed via the Dev’s secured cellular network (with the available encrypted payment information already filled in as shown in 1211/1411 of Fig. 12/14 and 5498 of Fig. 54 or with their existing credit profile [as shown in 1211/1411 121 la/141 la, 121 lb/141 lb and
  • the Dev 106 preferably functions as a gasoline station dispensing/recharging fuel/battery to vehicle drivers who stop by a fill/charge up (there is no need for him/her to step out or has his credit card or handset or smart phone scanned by a paying device).
  • the Dev 106 connects and communicates with each of the driver’s handset on the mobile payment for the goods and service (accompanied by its phone number) on its screen display via SRC medium and receives said information back via cellular while the driver optionally is able to examine the receipt to verify the validity of said transaction and finishes the transaction with the OK tap on its screen (not shown).
  • the Dev 106 preferably extends its functions as a Hotel/Motel App allowing the registration personnel to sign in the guests by having them, during check-in, scanned the QR code or simply aimed their smart phone (handset) cameras at a QR code in order to complete the app download and run its application. As soon as the registration personnel total up the registration fee, the Dev 106 requests the mobile payment information from the guests’ handsets in order to complete their check-in. After the Dev clears the payment transaction with its payment service vendor, it transmits the room check-in information to the guests’ handsets.
  • the Dev also transmits the hotel GPS map (this also implied that the GPS map can also applied to College Campuses, Shopping Centers, Amusement Parks, Cruise Ships, Recreation Centers and the likes where their GPS maps are transmitted to the visitors’ handsets, in place of currently printed handouts or strategically located fixed directories, thus, useful in allowing visitors quick and inquiring information such as: his/her current location, where/how to proceed to the intended locations, what is going on in certain locations, where the bathroom is located) layout to the handset with the booked room highlighted directing the guest a clear way to his/her room.
  • the Dev also transmits the door key to his/her handset, which lets the guest open the door to his/her room. With all hotel service icons available in their handsets, the guests are also able to inform the hotel personnel via their handsets for room services, not to disturb sign and the like. At the end of their stay, all the handset room information is deemed invalid and erased from said handsets.
  • Fig. 55B illustrates a preferred example of embodiment 5500B of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to open or close the Garage Opener of the Dev’s Home Control and Monitor system.
  • the handset 102 navigates to screen 5560 when the user hovers over the handset’s
  • Garage Opener icon 4867/5067 for a second or more (until the handset 102 changes screen) presenting remotely the status of the Garage Door Opener 5560. The user then can open/close the garage when he/she is far away from home, and also knows if it is opened or closed as displayed on screen 5562. [00528] Button control 5570 and the display 5562 are controlled by GA software
  • Keypad control 5606 and display status 5604 are controlled by AA software
  • the handset 102 navigates to screen 5630, when the user programs the heater (by keying in Prog icon 5614, Heat icon 5620, Time icon 5616, keypad icon 5612 and Set icon 5618) to turn on Heat/ Air Conditioner 4876 from 10AM to 6PM to 78 Degrees F, as are known to those of ordinary skill in the art.
  • Fig. 56B illustrates a preferred example of embodiment 5600B of the present invention. This exemplary embodiment presents preferred steps taken by a user in his/her handset to open or close the House Entry of the Dev’s Home Control and Monitor system.
  • the handset 102 transmits the command to the Dev 106, which in turns processes said command and passes it to the Door Lock 4872 (Fig. 48/50), receives the response from said Door Lock 4872, and processes said response and passes it back to the handset 102, which displays the information, as shown on its screen 5650.
  • Screen 5650 shows the status of the door lock every time icon 5656 is touched; it toggles between unlocked (message 5654) and locked (message 5664).
  • Screen touch control icon 5656/5666 and the display screen 5652/5662 are controlled by DA software 4854/5054 in Fig. 48/50 which has been transmitted from the Door Lock 4872 (or downloaded from the web), with one copy into the Dev 106 and one into the handset 102.
  • Fig. 57 illustrates a preferred example of embodiment 5700 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to program, set up and view the indoor/outdoor watering control of the Dev’s Home Control and Monitor system.
  • the handset 102 transmits the command to the Dev 106, which in turns processes said command and passes it to the Sprinkler 4882 (Fig. 48/50), receives the response from said Sprinkler 4882, and processes said response and passes it back to the handset 102, which displays the information, as shown on its screen 5702.
  • Keypad control 5706 and the display 5704 are controlled by SA software
  • Figures 58 and 59 illustrate preferred examples of embodiments 5800 and 5900 of the present invention.
  • the exemplary embodiment 5800 presents preferred steps taken by a user in his/her handset to set up the payment account, view the meter reading, and program the Electric Meter of the Dev’s Home Control and Monitor system.
  • the Electric Meter Menu 5804 contains Account Setup 5810, which when programmed, allows the interaction between the Dev 106, the handset 102, the electric meter 4884, and the utility company 5982. The user then can pay the electricity bill online using the handset 102 or the utility company 5982 will be paid automatically every month.
  • Meter Reading 5806 and Account Payment 5808 let user view current electric meter reading and past account billings (screen 5954).
  • the Pay online icon 5812 lets user pay any account outstanding and the Monthly Usage Inf. Icon 5814 let user view past account usage activity 5822.
  • the user selects the Account Setup icon 5810 which makes the handset 102 navigate to screen 5820 showing the Account Application Setup 5822. It requires the user to fill out user’s name 5826, address 5828, handset phone number 5830 and Utility’s web address 5832 (Utility web address 5832 preferably came pre-filled with electric meter application EA 4866/5066 in Fig 48/50; otherwise user obtains it from the said company either by phone, text message, downloading or any other means).
  • the handset screen 5820a shows the required information filled by the user, who then executes the Exe icon 5834a, which makes handset 102 transmit the information 5824a to the Utility Company 5982 (also as shown in step 5984, flow diagram 5980).
  • the Utility Company 5982 processes the application data, and then transmits back (step 5985) to the user’s handset 102, the partially filled Account Payment Setup information 5844, as shown in the handset screen 5840.
  • Window 5844 shows the Utility Company name 5846, the user/customer assigned account number 5848, the Electric Meter S/N 5850 (Serial Number or identification number since each meter is used to measure electricity usage and hooked to its corresponding residence/business address. It is for device identification during its communication with the Dev since there might be a plurality of devices in close proximity i.e., apartment or high rise building) and the utility company payment web address (URL) 5852.
  • URL utility company payment web address
  • Field 5844 also shows customer’s name, address, and phone number 5854 and 5856 (filled out previously in screen 5820a). The user fills out the remainder information, such as: Bank Name 5858, Payer’s Bank Account Number 5860 and type of payment 5862.
  • the handset 102 also transmits a copy of it 5844a to the Dev 106 as shown in step 5987 and the Dev 106 in turn communicates with the Electric Meter 4884 as shown in step 5988 using the S/N 5850a to make sure it communicates with and reading from the right device.
  • the Dev 106 also uses the utility company URL 5852a to send the month electricity reading to the utility company 5982 account payment department. Auto payment box 5863 (checked) allows user to pay automatically every month.
  • the Dev 106 communicates and reads (step 5990) the electricity usage from the Electric Meter 4884 and transmits the reading information 5920 (screen 5902) as shown in step 5991 to the Utility Co. 5982.
  • the utility company 5982 processes and sends (step 5992) the bill 5924 to user’s handset 102 as shown in screen 5922.
  • the field 5926 outlines the user’s monthly electricity usage 5936 and the required payment 5938 for the month 5940. It also shows that the payment information is on file 5942 (URL link to the utility company database server) and can be edited 5950 if there are any changes in the payment information.
  • the payment information also is hyper-linked to the Pay online icon 5946, which when executed by the user, makes the handset 102 transmit the information (step 5993) to the Utility Co. 5982, which transmits back (step 5994) the payment information screen 5954.
  • the user then can make the payment by executing 5968, which makes the handset send the payment command, and receives (step 5995) the confirmation 5970 in the inbox from the Utility Co. 5982.
  • the application software allows the Dev 106 to communicate with the Electric
  • EA software 4866/5066 in Fig. 48/50 which has been transmitted from the Electric Meter 4884 (or alternatively downloaded from App Server whose URL provided by the Electric Meter 4884) with one copy into the Dev 106 and one into the handset 102
  • This embodiment can also be similarly applicable to the Water Meter, Cooking &
  • Fig. 60A illustrates a preferred activation example of embodiment 6000A of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to monitor, and talk with the Help Alert wearer, via the Dev’s Home Appliances system remotely.
  • the Dev 106 communicates with Help Alert device 4874, so the user can monitor (via his/her handset) the well being of the person who wears said device.
  • the device 4874 preferably consists of a wireless camera and the voice recognition integrated circuit so the Help Alert 4874 connects to the Dev 106, which transmits a message and rings up the user’s handset 102, in order for its wearer to communicate with the handset user.
  • the Help Alert device 4874 transmits the command to the Dev 106, which in turn rings up the user’s handset, and also preferably transmits a text message. When the user answers the call, then the conversation takes place. As soon as the user hangs up or if there is no audio variation for 5 minutes, the Dev 106 will stop the audio communication to the Help Alert device 4874.
  • the Help Alert Menu 6004 consists of the Talk icon 6008 and the Monitor icon 6006.
  • the handset will transmit the command to the Dev 106 which connects to the Help Alert device 4874 camera and transmits back to the handset 102 what the camera sees and thus allows the user to monitor what is in front of the wearer (to monitor the well-being of his/her elder parent for instance).
  • the handset will transmit the command to the Dev 106 which then answers and connects to the Help Alert device 4874 audio, and thus allows the conversation to take place.
  • the Help Alert device 4874 also preferably is able to detect vibration, such as a fall so that it can send commands to the Dev 106, which alerts the user of such an event, and he/she can immediately monitor and talk to the wearer.
  • the application software allows the Dev 106 to communicate with the Help Alert
  • the handset 102 is controlled by the HA software 4856/5056 in Fig. 48/50, which has been transmitted from the Help Alert 4874 (or alternatively downloaded from App Server whose URL provided by the Help Alert 4874), with one copy in the Dev 106 and one in the handset 102.
  • Fig. 60B illustrates a preferred activation example of embodiment 6000B of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset to answer, talk, and monitor the visitor, who rings the door bell and intercom via the Dev’s Home Control and Monitor System remotely.
  • Intercom 4886 transmits command (step 6084) to the Dev 106 which alerts (step 6086) the user via his/her handset screen 6020.
  • the user then scrolls to the inbox 6040 and sees the Door Bell ringing message 6042.
  • the user executes the Talk icon 6044 (in order to answer to door), which makes the handset 102 navigate to the Door Bell Intercom menu 6052 in screen 6050.
  • the Door Bell Intercom menu 6052 allows the user and the visitor to communicate with each other, through the front door speaker and microphone, without the visitor realizing that the user (i.e., the house owner) may not be at home, at the moment.
  • the user can also put the conversation on speaking phone 6054, make it mute 6056, or put it temporarily on hold 6058. This embodiment makes the unexpected visitor believe that somebody is at home, and any intention of breaking into the house therefore hopefully can be avoided.
  • Fig. 61 illustrates a preferred activation example of embodiment 6100 of the present invention.
  • This exemplary embodiment presents preferred steps taken by a user in his/her handset in order to program, set up, and control the Integrated Smart Pet Door (its door, speakers and cameras), via the Dev’s Home Control and Monitor System remotely.
  • the user sets up the Pet Program and Monitor system by executing the Smart Pet
  • the Program and Setup control (screen 6112 after the user executes icon 6106) lets the user schedule (Add schedule icon 6116), such as: schedule #1 (6120) and schedule #2 (6124) showing the time for the pets to go out of the house and back in (6122). It also lets user delete old schedules (Delete schedule icon 6118). The user has the option of recording the scene in order to play back if he/she needs to verify that the schedule meets their needs. This exemplary embodiment shows that the user schedules the pets do go out three times a day, and each lasts 20 minutes (8:00 AM-8:20 AM, 12 PM-12:20 PM and 04:20 PM-04:20 PM). Chart 6160 illustrates the actions taken by the Dev 106 at schedule time.
  • schedule #1 (6120) and schedule #2 (6124) showing the time for the pets to go out of the house and back in (6122). It also lets user delete old schedules (Delete schedule icon 6118).
  • the user has the option of recording the scene in order to play back if he/she needs to verify that the schedule meets
  • the Dev 106 sends the Open Door command to the Pet Door 6190 (step 6166), transmits the audio recording the owner’s calling the pets on the speaker 6192 (step 6168) to trick them out of the house and optionally turns on the camera (step 6164).
  • the Dev 106 transmits the audio recording the owner’s calling the pets on the speaker 6192 (step 6168) to induce them back into the house, sends the Close Door command to the Pet Door 6190 (step 6166) and turns off the camera (step 6164).
  • the Smart Pet Command menu (screen 6140 after the user executes icon 6108) allows the user to open or close the pet door icon 6144 (steps 6172 and 6174) in real time, and let him/her view its status icon 6145.
  • the user can try calling the pet through the speaker 6192 while holding on Call Pets icon 6146 (also shown in steps 6176 and 6178). He/she can record his/her audio (his/her voice onto the Devl06 ) call icon 6150 calling to the pets, to play it on the speaker, or play it back to listen to it (icon 6148).
  • the user can record the video and play it back (icons 6152 and 6154, and also in steps 6180 and 6182). This allows the owner the peace of mind on the daily needs of his/her pets and there is no urgency about getting home on time, or asks somebody to do the task.
  • the Dev 106 can be programmed to transmit commands to the Smart Pet
  • Feeder (6079 in screen 6051 of Fig. 60 A)) and schedule it of the pet feeding time, the right amount of food and alert the handset 102 when the feeder needs to be refdled.
  • the owner can also program the Dev 106 via the handset 102 to cancel these tasks when they are no longer needed; and remove their software applications from both the handset 102 and the Dev 106, as previously described in Fig. 52, regarding other house-hold devices.
  • Fig. 62 illustrates a preferred activation example of embodiment 6200 of the present invention for robotic application.
  • This exemplary embodiment presents the communication interaction between the Dev 106, and the plurality of other mobile devices in the robotic application, where a plurality of users (handsets) can program, control and monitor said Dev in fulfdling its task.
  • FIG. 4 It illustrates the operation performed or carried out by the Dev 106 regarding the tasks or functions 6208 through the communication link/connector 6210 connecting to its I/O interface 438 (Fig. 4).
  • the Dev 106 performs the task 6208 using its I/O control 401 (Fig. 4), such as: Lighting Control 410 on behalf of the handset 102 (user) for brightness, Temperature Sensors 404 to check the environment reading, Audio I/O 408 for voice/sound, Video I/O 406 for seeing and General I/O 412 for performing and controlling various steps and procedures in order to complete a task.
  • the Video screen 6206 projects images from the video I/O 406 so a third party can observe and participate in.
  • An unregistered handset 6204 (which as mentioned earlier in Fig.
  • Connections 6214 and 6216 are preferably cellular 118 and 6212 is preferably wired/wireless LAN but they can also be any wireless network.
  • Task 6208 can be a robotic device on medical surgery, robotic moving, flying and steering devices on rescue operation inside a collapsed building, houses on fire or a rescue operation where human cannot have access to.

Abstract

L'invention concerne un système pour programmer, commander et surveiller des réseaux sans fil permettant à un dispositif (Dev) sans fil d'être utilisé et intégré dans un module de commande électronique de voiture ou un système d'alarme/sécurité domestique (ou d'entreprise). Le système selon la présente invention comprend également un dispositif (robotique) de commande générale qui commande des fonctions d'entrée et de sortie générales, une pluralité de combinés cellulaires et de dispositifs Internet pouvant commander conjointement, surveiller, partager et échanger des informations via le réseau cellulaire, du réseau Internet et un autre réseau filaire/sans fil.
PCT/US2019/030901 2018-05-11 2019-05-06 Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil WO2019217309A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/978,018 US10652735B2 (en) 2013-10-04 2018-05-11 Systems and methods for programming, controlling and monitoring wireless networks
US15/978,018 2018-05-11

Publications (1)

Publication Number Publication Date
WO2019217309A1 true WO2019217309A1 (fr) 2019-11-14

Family

ID=68467601

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/030901 WO2019217309A1 (fr) 2018-05-11 2019-05-06 Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil

Country Status (1)

Country Link
WO (1) WO2019217309A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361465A (zh) * 2022-08-16 2022-11-18 浙江师范大学 基于树莓派和微信小程序的智能遥控器系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100292886A1 (en) * 2009-05-18 2010-11-18 Gm Global Technology Operations, Inc. Turn by turn graphical navigation on full windshield head-up display
US20130210360A1 (en) * 2012-02-13 2013-08-15 Sony Corporation Methods of communicating identification information and a responsive command via short-range communications, and related devices
US20140121883A1 (en) * 2012-10-30 2014-05-01 Robert Bosch Gmbh System And Method For Using Gestures In Autonomous Parking
US20140337221A1 (en) * 2013-05-13 2014-11-13 Hoyos Labs Corp. Systems and methods for biometric authentication of financial transactions
US20150097669A1 (en) * 2013-10-04 2015-04-09 Sol Mingso Li Systems and methods for programming, controlling and monitoring wireless networks
US20150161377A1 (en) * 2013-12-05 2015-06-11 Sony Corporation Wearable device and a method for storing credentials associated with an electronic device in said wearable device
US20170212511A1 (en) * 2014-01-30 2017-07-27 Universidade Do Porto Device and method for self-automated parking lot for autonomous vehicles based on vehicular networking

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100292886A1 (en) * 2009-05-18 2010-11-18 Gm Global Technology Operations, Inc. Turn by turn graphical navigation on full windshield head-up display
US20130210360A1 (en) * 2012-02-13 2013-08-15 Sony Corporation Methods of communicating identification information and a responsive command via short-range communications, and related devices
US20140121883A1 (en) * 2012-10-30 2014-05-01 Robert Bosch Gmbh System And Method For Using Gestures In Autonomous Parking
US20140337221A1 (en) * 2013-05-13 2014-11-13 Hoyos Labs Corp. Systems and methods for biometric authentication of financial transactions
US20150097669A1 (en) * 2013-10-04 2015-04-09 Sol Mingso Li Systems and methods for programming, controlling and monitoring wireless networks
US20150161377A1 (en) * 2013-12-05 2015-06-11 Sony Corporation Wearable device and a method for storing credentials associated with an electronic device in said wearable device
US20170212511A1 (en) * 2014-01-30 2017-07-27 Universidade Do Porto Device and method for self-automated parking lot for autonomous vehicles based on vehicular networking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361465A (zh) * 2022-08-16 2022-11-18 浙江师范大学 基于树莓派和微信小程序的智能遥控器系统
CN115361465B (zh) * 2022-08-16 2023-07-28 浙江师范大学 基于树莓派和微信小程序的智能遥控器系统

Similar Documents

Publication Publication Date Title
US10652735B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
US11812258B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
US9736688B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
EP3053280B1 (fr) Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil
JP6590348B2 (ja) 自動運転車及び自動運転車用プログラム
CN107409278B (zh) 用于对无线网络进行编程、控制和监控的系统和方法
US20190279440A1 (en) Fleetwide vehicle telematics systems and methods
US20160086391A1 (en) Fleetwide vehicle telematics systems and methods
US20130132286A1 (en) Method and systems for servicing a subscriber vehicle
CN104012133A (zh) 移动设备安全驾驶
EP1965354A1 (fr) Système et procédé de gestion de service
EP2948934B1 (fr) Système de guidage et de surveillance de trafic
WO2019217309A1 (fr) Systèmes et procédés pour programmer, commander et surveiller des réseaux sans fil
US20230162535A1 (en) MultiPark Valet Parking Application
CN117981275A (zh) 借助于车辆相关的数据的用户授权
KR20190124077A (ko) 픽업 지원용 사용자 무선장치, 그리고 이에 적용되는 방법 및 기록매체

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19800081

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19800081

Country of ref document: EP

Kind code of ref document: A1