Device for directing the operation of a user&#39;s personal communication apparatus

ABSTRACT

A system including a device including an RF tag embedded in a casing, and a mobile phone having an RF tag reader which is operable upon reading the RF tag to perform an operation associated with said RF tag. When the user wants to perform a certain operation with the phone, he can by-pass the normal input technologies, typically a keypad, by manoeuvring the device such that the RIF tag is read by the RF tag reader, and then the personal communication apparatus performs an operation associated with the RF tag. Thus, the present invention offers rapid access to regularly used functions or operations without the need to navigate a menu. Moreover, access to these regularly used functions is made intuitive by associating a physical object, i.e. the device, with an operation.

The present invention relates to directing the operation of a user'spersonal communication apparatus.

Personal communication apparatus in the form of cellular telephones havebecome ubiquitous. As cellular telephones have evolved from just mobileanalogues of traditional fixed-line telephones providing only voicecommunication into multi-faceted communication devices providing notonly voice communication but a range of communication options includingnotably internet access, there is a need to prevent the complexity ofusing the cellular telephone's user interface escalating. The presentinvention is generally concerned with this problem.

According to one aspect, the present invention may provide a device fordirecting the operation of a user's personal communication apparatus,comprising an RF tag located in a decorative casing of a size tofacilitate handling by the user, wherein the RF tag stores a code todirect the operation of a user's personal communication apparatus.

Beyond the dimensional limitation, there is no limit on the appearanceof the casing except to say that, in preferred embodiments, the casingcomprises a gewgaw, ideally appealing to the fashion or aestheticCONFIRMATION COPY sensibilities of the user and which may serve as afashion accessory, or emblem for a particular group.

According to another aspect, the present invention may provide a systemcomprising a device comprising an RF tag embedded in a casing, and auser's personal communication apparatus having an RF tag reader which isoperable upon reading the RF tag to perform an operation associated withsaid RF tag.

By virtue of the above features, when the user wants to perform acertain operation with the personal communication apparatus, he canby-pass the normal input technologies, typically a keypad, bymanoeuvring the device such that the RF tag is read by the RF tagreader, and then the personal communication apparatus performs anoperation associated with the RF tag. Thus, the present invention offersrapid access to regularly used functions or operations without the needto navigate a menu. Moreover, access to these regularly used functionsis made intuitive by associating a physical object, i.e. the device,with an operation. Also, the device can be used to selectivelyenable/disable local functions of a user's personal communicationapparatus. For example, a secrecy mode can be controlled by the device,the device effectively serving as a physical “key” to lock away andunlock sensitive information, thus effectively affording thefunctionality which is normally in a user's personal communicationapparatus by a PIN code.

Preferably, the casing comprises a gewgaw, ideally appealing to thefashion or aesthetic sensibilities of the user and serving as a fashionaccessory, or emblem for a particular group. Preferably, the devices aresized to be easily handled by the user. For example, this means thatthey are of sufficient size to be held by the user's fingers. Alsopreferably, the devices are not so large that it becomes a noticeablehindrance for the user to carry a set of them.

In one embodiment, the user's personal communication apparatus includesa marking on the exterior surface of the housing. This marking serves toindicate the interaction area on the apparatus's housing adjacent towhich the device should be placed for reading.

The user's personal communication apparatus may comprise a docking portinto which the device can be docked for reading the RF tag. In oneembodiment, the RF tag can only be read when docked so as to avoid thepossibility of an accidental request of an operation associated with thecode on an RF tag. To this end, either the RF tag reader/RF tag can becalibrated to provide for only very close range reading i.e. whendocked, or the RF tag can be provided with a switch means which isactivated only when the RF tag is properly docked. In anotherembodiment, a plurality of devices can be docked simultaneously.Preferably, the operation directed by the user is dependent on thecombination of the docked devices. An advantage of employing a dockingport is that the act of docking can signal to the RF tag reader toperform a read operation, whereby it is relatively energy efficient inthat energy is not wasted trying to attempt a reading when there is noRF tag in reading range.

With this in mind, according to another aspect, the present inventionmay provide a set of devices for directing the operation of users'personal communication apparatuses, each comprising an RF tag embeddedin a decorative casing, the appearance of each casing beingdistinguishable from others in the set.

In this way, the user can access a range of functions of the personalcommunication apparatus by selecting the appropriate device from the setand using that to activate the function.

According to a still further aspect, the present invention may provide amethod of directing the operation of the user personal communicationapparatus by

the user requesting a desired operation by performing an interactionwith the user's personal communication apparatus which generates anaction code from external of the user's personal communicationapparatus;

automatically routing an action-request message, including an actioncode field which is the same as or derived from said action code, to aserver; and

the server performing instructions to further the performance of thedesired operation.

These features of the invention enable a user request which originatesoutside of the user's personal communication apparatus to be processedwhen the meaning of the request is not known to the user's personalcommunication apparatus. Preferably, said action code is the code isread from the device of the present invention.

According to another aspect, the present invention may provide a systemcomprising a user's personal communication apparatus and a server forcarrying out the above-mentioned method.

According to another aspect, the present invention may provide a devicefor directing the operation of a user's personal communicationapparatus, comprising an RF tag embedded in a gewgaw.

Exemplary embodiments of the invention are herein described withreference to the accompanying drawings, in which:

FIGS. 1(a) and 1(b) show an iBead in accordance with the invention;

FIGS. 2(a), 2(b), 2(c)

2(d) show different aspects of a mobile phone equipped with an RF IDreader in accordance with the invention;

FIG. 3 shows a first system architecture in accordance with theinvention;

FIG. 4 shows the structure of a message packet in accordance with thepresent invention;

FIGS. 5(a), 5(b)

5(c) show the path of a message packet in the FIG. 3 system;

FIG. 6 shows a second system architecture in accordance with theinvention;

FIG. 7 shows the path of a message packet in the FIG. 6 system;

FIGS. 8 shows example applications of a system in accordance with theinvention;

FIG. 9 shows a third system architecture in accordance with theinvention; and

FIGS. 10(a), 10(b), FIG. 11 to 17

FIGS. 18(a) and 18(b) show how iBeads can interact with an RF ID reader.

RF ID technology is based on bi-directional radio frequencycommunication between an RF ID control unit and an RF tag. The tagcomprises an antenna, control circuitry and memory in which informationis stored. The memory may be read-only in which case the information isunalterable, or read/write which means that information can beoverwritten or added to memory at a later time by the user. The controlunit comprises an antenna and modulation/demodulation circuits. Whenoperating, the control unit emits an electromagnetic field which extendsover a certain volume around the control unit If an RF tag passes intothis volume, the field activates the control circuitry of the RF tag. Adialog is then set up in which the tag identifies itself by sending theinformation contained in its memory to the control unit Upon receivingthe information, the control unit decodes it. RF tags can be eitherpassive or active. In the case of a passive RF tag, there is no on-boardpower supply, rather, energy is obtained from the electromagnetic fieldgenerated by the RF ID controller. Active tags contain an intrinsicpower source, such as a battery.

RF ID technology has become technically mature and is being adopted indifferent fields ranging from, for example, storage management toelectronics tickets in commuting. At present, RF tags are available atabout the size of a sand grain and at low cost.

Referring to FIG. 1(a) and FIG. 1(b), an iBead 10 comprising an RF tag20 embedded in a decorative casing 40. Referring to FIG. 1(b), the RFtag 20 comprises an antenna 22, control circuitry 24, and read-onlymemory 26 in which a 128-bit code number is stored. The RF tag 20 ispassive and so does not contain its own power source. The physical sizeof the chip bearing the RF tag is only 0.4 mm squared. The casing 40 ismuch larger and is made so deliberately to facilitate easy handling bythe user, and to enable the casing to perform an aesthetic function. Forthe purposes of the accompanying drawing, the casing is showndiagrammatically without regard to aesthetic considerations. However, ina physical embodiment of the invention, the casing can serve as afashion accessory and blend with or augment the look of the user, ormake a statement about the user. Also, the casing may represent aparticular private group of people, the emblem of a sporting team, orthe brand of a commercial venture. The casing can also be hard or soft.The casing may be as substantially planar as the RF tag architecturewill allow. Also, the casing may be provided by another object having adifferent original primary purpose. The casing may also not whollyenclose the RF tag, although normally it should afford significantprotection to the RF tag 20.

A portable personal communication apparatus in the form of a mobilephone 50 conventionally comprises a display 52, a keypad 54, and ahousing 53 as shown in FIG. 2(a), and a cellular radio interface 56capable of data/speech reception and transmission to and from a cellularnetwork 70, and a central control unit 58 for coordinating the overalloperation of the mobile phone and a memory unit 59, as shown in FIG.2(b). The memory unit is used to store, inter alia, a phonebook, anaddress book, emails and SMS messages which have been sent and received,and call lists containing lists of calls made and received, and missedcalls. In accordance with an embodiment of the invention, the mobilephone 50 further comprises an RF ID reader 60. In FIG. 2(a), the RF IDreader 60 is shown in dotted outline to indicate that it lies below thesurface of the housing 53. A marking 61 provided on the housing 53 inthe area near to the RF ID reader 60 serves to indicate to the user thearea in which the iBead can be read.

The cellular network 70 includes a gateway server 75 through whichinternet access is achieved. An iBead broker server 80 and a pluralityof iBead action servers 85 a, 85 b are also shown making up part of theinternet The gateway server 75 is connected to the broker server by anencrypted data pipeline 89, and the broker server 80 is connected to theaction servers 85 a, 85 b by encrypted data pipelines 90 a, 90 b. Websites 95 a, 95 b of service providers are also shown on applicationservers.

When the user brings the iBead 10 into the reading range of the RF IDreader 60, the RF ID reader 60 reads the code on the iBead 10 andcommunicates this to the central control unit 58. First, the centralcontrol unit 58 checks in its memory 59 to see whether the code of theiBead is known locally. If the code is known locally, the centralcontrol unit 58 performs the macro/operation allocated to the code.

One example of this type of macro is sending an email to a spouse toindicate that you will be home later than usual. The whole process ofsending the email could be triggered by the iBead 10 with no furtherintervention being required from the user. Alternatively, the macromight stop short of actually sending the email and provide the user withthe opportunity to amend and/or approve the email before sending. Evenin this case, navigating the menu structure, and the cumbersome processof entering an email on a mobile phone keypad is largely avoided.Another example is that a macro performs the operation of opening up thebrowser of the mobile phone at a predetermined IP address. (It isemphasized that the code read from the iBead references the macro, andother than that connection has no relationship to the IP address.) If,for example, the iBead bore the logo of CNN, then the predetermined IPaddress might be that of the CNN home page. Another example is to use amacro to activate a secrecy mode. A secrecy mode is a conventionalfeature which enables a user to hide selected information from anunauthorized person and the normal access control mechanism is a PINcode. FIG. 2(c) shows a typical list of options available in respect ofan individual entry in the user's phonebook If a “secrecy” iBead isread, an association is created between the secrecy iBead andcurrently-displayed phonebook entry. The display 52 for a short whileindicates that the phonebook entry has been made secret as shown in FIG.2(d), and then that phonebook entry disappears, either indefinitely orfor a predetermined duration controllable via a menu by the user. Whenthe secrecy iBead is read again, the associated phonebook entry is madevisible again and the display 52 adopts the FIG. 2(d) state. At thispoint, the association between the iBead and the phonebook may be brokenby selecting and thereby deactivating the secrecy option. If the userdoes not select that option, then, after a short duration, pre-selectedby the user, the phonebook entry reverts to its hidden, secret state.More than one iBead maybe associated with selected information, wherebyif a given iBead is lost, the secrecy mode may be disabled or unlockedby another iBead. A conventional PIN code is used to globally reveal allthe information previously made secret.

If the code of the iBead 10 is not known locally, the phone 50 sends aaction_request message over it's cellular interface 56 to a remoteserver. The server can either be a default server. Alternatively, theserver which should be accessed can be indicated by a part of the codeitself. The server can be part of the cellular network or a server onthe internet

The action_request message 100 comprises at least a message identifierfield 102 indicating that the message is an iBead packet, an action codefield 104 containing the code of the RF tag in the iBead, and anauthentication field 106 containing information such as the IMEI code ofthe mobile phone.

In the embodiment shown, the action_request message is based on themessage identifier field 102 automatically directed to the iBead brokerserver 80. The broker server 80 contains a database which, inter alia,maps or associates the codes of the RF tags in the iBeads withpredetermined actions. If the system is configured such that for eachiBead registration, the broker server 80 always contains only a URL toan action server, then the predetermined action can be merely a URL therequirement to access it being implicit as a result of the systemconfiguration.

If the broker server 80 recognizes the action code in the action_requestmessage, then two possibilities arise. In the case where the instructionor operation associated with the code is relatively simple and/or relateto a standard system operation, then the instructions 120 for the macromay be returned to the mobile phone 50 directly by the broker server andcarried out as shown by the diagram in FIG. 5(a). In the case where theinstruction or operation associated with the code is more complicated orrelates to a non-standard operation, the broker server 80 delegatesresponsibility to a relevant action server, let's say in this caseaction server 85 a, which then sends the instructions 120 for the macroto the phone 50, either directly as shown by the diagram in FIG. 5(b),or back via the broker server 80 as shown in FIG. 5(c). The advantage ofthe FIG. 5(c) embodiment is that it is possible to make use of theencrypted pipeline 90 b. An alternative architecture is shown in FIG. 6.In this embodiment, the broker server 80 is located inside the cellularnetwork 70. As the broker server 80 is wholly controlled by theoperator, there is a business need to insulate the private informationof the iBead sponsor and users from the operator and so to this endsecurity is provided by an encryption mechanism as described below.

The mobile phone 50 treats the RF ID code which it reads from the memory26 of iBead as having two parts: a KEY part for decryption, and anaction code part for designating the required operation. Referring toFIG. 7, on reading an iBead, the phone 50 sends an action_requestmessage 100 a to the cellular network. On the basis of the messageidentifier field 102 of the action_request message 100 a indicating thatthis message is an iBead packet destined for the broker sever 80, themessage is routed to the broker server 80. The broker server 80 containsa database containing a plurality of iBead registrations, eachregistration record comprising at least an action code field and acorresponding encrypted macro/instructions field. On receipt of themessage 100 a, the broker server matches the action code field 104 withthe action code of an iBead registration in its database and sends backthe corresponding encrypted instructions 120 a to the mobile phoneidentified by the authentication field 106. Since the mobile phone knowsthe KEY, i.e. the code part of the RF ID code, it is able to decrypt theinstructions. It will thus be appreciated that although the iBeadregistration database is located on a server located in the operator'snetwork, the operator lacking knowledge of the KEY cannot interpret theinformation which stores and maintains. As per the FIG. 3 embodiment,the received instructions 120 a can simply be for local operations orcan instruct further remote access. With the FIG. 6 system architectureespecially, it is preferred to keep the length of the encrypted macrosshort, where possible, to minimize the amount of decryption which needsto be performed by the mobile phone and to minimize the burden on theoperator. Thus, it is preferred that the received instructions provideonly a further URL to a remote action server 85 a, 85 b and aninstruction for further more detailed instructions to be retrievedtherefrom. Thus, in this case, a further action_request message 100 b issent, this time the message identifier field 102 indicating that this isan iBead packet destined for the internet and specifies the URL of anaction server 85 a, 85 b. The action server 85 a, 85 b also contains adatabase containing a plurality of action code fields, and acorresponding macro/instructions field. On receipt of the message 100 b,the action server matches the action code field 104 with an entry in theaction server database and sends back the corresponding instructions 120b to the mobile phone identified by the authentication field 104.

For both the FIG. 3 and FIG. 6 embodiments, instructions for the actionservers 85 a, 85 b can either be for local operations or can instructfurther remote access to the service provider web sites 95 a, 95 b or acombination thereof.

In the FIG. 3 embodiment, the KEY derived from the iBead can be used forencryption of the traffic between the mobile phone and the servers 85 a,85 b, 95 a, 95 b in the internet

An advantage of the remotely-stored macro approach illustrated by FIG. 3and FIG. 6 is that the perceived function of the iBead 10 can becentrally controlled and updated according to need by the sponsor of theiBead 10. A further advantage of this approach is that the remote accessperformed by the mobile phone 50 alerts the servers to the use of theiBead, and to the identity of the iBead by the authentication field 106.Another advantage is that the nature of the system, especially thepivotal role of the broker server 80, enables iBeads which haveinappropriate functionality associated with them to be easily disabled.The commercial advantage of this remotely-stored macro approach might befurther illustrated by the following examples, where a retailer is useda specific example of an iBead sponsor.

In a system having the FIG. 3 system architecture, as part of a productpromotion, a retailer may have produced a set of iBeads having a casingsignifying the retailer, each iBead bearing the same code. The retailerregisters the iBead's code and the action to be performed on the brokerserver 80 via the internet. Thus, once a customer reads the iBead (andassuming the action is not known in the phone 50 itself the actiondefined by the retailer can be performed in various ways, as describedabove. One possibility is that the iBead might provide access to theretailer's own web site 95 a which includes web pages dedicated to theproduct to be promoted. Because the server will record the number ofhits on the web pages, the promotional material shown and/or terms ofthe offer for sale can be dynamically adjusted or customized in realtime according to consumer interest The retailer also has a real timeoverview of currently active iBeads.

In a system having the FIG. 6 system architecture, the retailer mayproduce a set of iBeads having a casing signifying the retailer, buteach iBead bearing a different code. Because in this case, there is aone-to-one relationship between an iBead and an individual, anassociation can be made between an individual iBead and its users. Thisknowledge enables other possible applications.

A specialist iBead service company on behalf of the retailer registersthe set of iBeads on the cellular operator's broker server 80, thebroker server database action codes for each iBead containing anencrypted URL corresponding to an action server 85 a. The specialistiBead company installs in the action server in respect of each theregistered iBeads, iBead middleware necessary to properly interface withretailer's iBead-related web site and further instructions for accessingthe retailer's web site 95 a. When the phone 50 reads the iBead 10, thebroker server 80 and the action server 85 a are accessed as described inrelation to FIG. 7, where the instructions 120 b sent from the actionserver comprise the retailer's iBead middleware and further instructionsfor accessing the retailer's web site 95 a.

Once a connection with the retailer's web site is established,transactions as per FIG. 8 can be carried out. In FIG. 8, the particulartransaction being carried out is the download of digital content,specifically music. User 1 who is the first user and buyer of the iBead10 accepts the music to be downloaded at the specified price (100currency units) by means of a payment message 130 which also specifiesthe identity (ID) of the iBead and that of the user. Once the paymenthas been received the purchased content is downloaded in the message132. The retailer thus has a record of the first user of the iBead, theidentity of the first user, and the price that was paid for the music.The iBead 10 is then passed by user 1 to user 2. User 2 then by means ofthe iBead as previously described initiates a second transaction withthe web site 95 a. When user 2 accepts the music to be downloaded at thespecified price (90 currency units) by means of a payment message 134which also specifies the identity (ID) of the iBead and the second user.Once the payment has been received the purchased content is downloadedin the message 136. As the retailer knows the first user of the iBead,the identity of the first user, and the price that was paid for themusic, he is able to make a compensatory payment (10 currency units) tothe first user via message 138. This payment could be regarded as aroyalty for the first user for putting a particular iBead intocirculation amongst his circle of acquaintances.

Also, in this case where the amount of the payment is equal todifference between original selling price and the current selling price,it is form of assurance and comfort to the first user that if he buyscontent early in its lifetime when the price is high, if he puts theiBead into circulation, he may well receive compensatory payment lateron reflecting any drop in price. For subsequent transactions, all theprevious users receive an additional payment. In some embodiments, wherethe market price does not fall, no additional payments are made.

Also, for various applications, the operation performed for the firstuser can be different or accumulative for the second and subsequentusers. The retailer can track the use patterns (type/frequency) of itsiBeads via a real time interface accessing the relevant server 80, 85 a,85 b, in the internet. In the above example, the iBead sponsor was aretailer. However, it is an important aspect of the herein-describedpreferred systems that the architecture

is open and flexible enough so that end-consumers, should they so wish,can straightforwardly become distributors of their own iBeads andcontent.

In one business model, for example, using the FIG. 3 system, endconsumers could buy a set of their own iBeads which at the point of saleare registered on the broker server 80. The iBead registration includesa URL of an action server 85 a, which URL could be supplied by the iBeadseller or the user who wants to use his chosen iBead service company.Thereafter, the user either by means of his mobile phone, or in morecomplicated cases a PC, accesses the action server and throughuser-friendly action server user interface software the user can definethe actions which it want to perform. For example, a very simple commonaction might be simply to access his personal home page. Other actionscould be to download recently taken pictures or the user's latest song.In the case, where an iBead is used to simply control the localfunctions of the phone, the programming is done locally.

Where the instructions to be downloaded to the user are dynamic as insome other examples above, it is preferred that the downloadingoperation is coordinated from an action server, to which the retailerhas rights to program, or at the retailer's own server—although, inprinciple, this might also be done at the broker server 80.

In other embodiments, when the macro or instructions have been firstretrieved from a remote server 80, 85 a or 85 b, they can be cachedlocally to avoid repeating the download operation.

FIG. 9 shows a third system architecture in accordance with theinvention. In this architecture, the broker server 80 is replaced with aiBead/URL directory server 82, but other than this respect, this systemcan be used like, and is analogous to, the FIGS. 3 and 6 systems. Thedirectory server 82 contains a database relating to a certain set ofiBeads. The database maps each iBead, as identified by it's RF tag code,with a URL of an internet server 85 a,85 b,95 a,95 b. On request from amobile phone 50, the directory server 82 downloads via a WLAN link 83 adatabase containing entries relating to a typically large set of iBeadsand caches that information for future use. Then, if the usersubsequently acquires any Bead in the downloaded set, the mobile phonecan directly access that web page without going through a broker server80. A typical application for this might be in relation to a city'strain network. At a station hotspot equipped with a high speed WLANaccess point, a user can download the database for the entire network.Then, as needed, the user when needing information about a particulartrain or a particular station can obtain the relevant iBead at astation. On reading the iBead, the mobile phone gains access to therelevant web pages without accessing the broker server. User's mighttypically carry an iBead for each of the train lines upon which theynormally travel. If they travel on a new line, they just obtain a newiBead for that line.

It will be appreciated that in a system according to the FIG. 9architecture, it is incumbent on the user to periodically update thedatabases which it locally stores as the they will, no doubt, changewith time. However, updating probably need not be so frequent as theURLs should mainly remain quite stable, at least for an entity like acity's train network.

In other embodiments, a iBead/URL directory server 82 can be used inparallel with a broker sever 80.

In the above described embodiments, the reading of an iBead 10 wastriggered by moving it into the reading range of the RF tag reader 60.This process is illustrated in FIG. 11. Referring to FIG. 11, an iBead10 comprising an RF tag 20 is embedded into a protective and/ordecorative casing 40. An RF ID reader 60 is located close to the surfacebut beneath the surface of the phone cover 53. The interaction betweeniBead 10 and the RF ID reader 60 may be characterized as “skimming”. Thearrow 32 shows the motion of the iBead which moves it into the readingrange of the RF ID reader 60 enabling a non-contact data transfer. Forskimming the casing 40 need only pass in the general vicinity of the RFID reader 60 in order for the RF tag to be read. The marking 61 on thehousing 53 identifies for the user the which area which should beskimmed.

It will be appreciated that from a technical standpoint the RF tagtechnology does not require contact between an iBead 10 and an RF reader60 in order to function. However, users are likely to carry a set ofiBeads 10 which provide them with a quick and easy way to perform arange of tasks. However, in carrying a set of iBeads, which may becarried together on a single string or strap, there is the risk thatmore than one iBead will be read by the iBead reader which could lead toactions unintended by the user being performed. One way of indicatingwhich iBead should be activated is to list the iBeads which have beenread by the RF tag reader in a menu, and request the user to select therequired iBead from the menu. Alternatively, as shown in FIGS. 10(a) and10(b), the RF tag reader 60 is equipped with a docking mechanism 30 intowhich the iBead must be docked in order to be activated for reading. InFIG. 10(a), the iBead 10 is not docked and not activated, and thuscannot be read. In FIG. 10(b), the iBead is docked to the dockingmechanism 30 and can be read. Thus, the use of docking mechanism servesto identify for sure the iBead to be read. Also, in the case where theiBead contains a read-only RF tag, which does include any encryption,whereby the fixed 128-bits can be read by any third party, the selectiveactivation of the iBead is facilitated by docking. Another advantage ofemploying a docking mechanism is that the act of docking can signal tothe RF ID reader 60 that it should attempt a reading operation. Thisresults in a power saving over the FIG. 11 embodiment in which the RF IDreader 60 attempts a reading operation at frequent intervals.

There are various ways to activate the iBeads, for example by mechanicalactivation. In one embodiment, a magnet in the RF ID reader 60 causesmechanical movement inside the iBead 10 which closes and open circuitpathway in the iBead, thereby activating the resonator of the iBead.Another example is resonator circuit activation, in which the iBead 10is provided with a magnetic resonator which when remote from the readerdoes not resonate; but when it is brought close to the reader, a matchedcircuit in the reader causes the resonator inside the iBead to resonate.From the user experience standpoint, some kind of tactile interaction isoften desirable. Accordingly, in one embodiment, a spring/switch isbuilt into the in the RF ID reader and/or docking mechanism 30 andprovides tactile feedback when interaction occurs.

FIGS. 12 to 14 show another example where tactile feedback is providedto the user. Referring to FIG. 12, the iBead casing 40 includes aprotruding docking member 34. It is inserted into the complementary jaws31 of a docking mechanism 30 made of compressible, deformable material.Downward pressure, as indicated by the arrow P, on the iBead 10 exertedby the user causes the abutting face of the casing 40 to gently compressthe body of the docking mechanism to enable the insertion of the dockingmember 24 into the jaws 31 to a distance at which ribs (not visible atthe scale shown) formed in the jaws 31 snap into engagement with thegrooves 36 formed in the docking member 24 and retain the iBead 10 inposition. The positive retainment of the iBead is sensed by the user andthus serves to provide tactile feedback. (The grooves are most clearlyvisible in the enlarged portion of FIG. 14). The RF ID reader 60 iscalibrated such that it can only read the iBead 10 at a very limitedrange equivalent to when the iBead is held fast in the docking mechanism30 as shown in FIG. 14. It will be appreciated that this example dockingmechanism not only provides the user with tactile feedback as justdescribed, but also serves to control which iBead is read. The iBead canbe removed by a concerted pull, the deformability of the dockingmechanism enabling proper withdrawal. In a variation of this embodiment,the calibration of the RF ID reader and the physical properties of thedocking mechanism 30 can be adjusted such that once the iBead is heldfast in the docking mechanism still further user-applied pressure isrequired to reduce the distance between the RF tag and the RF ID readerto reading range. Thus, the iBead can act very much like a button.

Another docking mechanism is shown in FIGS. 15 to 17. In this embodimentthe casing 40 is first manoeuvred, as indicate by the arrow P in FIG.15, such that the docking member 34 enters the jaws of the dockingmechanism and then twisted, as indicated by the arrow T in FIG. 16, tolock it into place. As per the previous embodiment, the calibration ofthe RF ID reader and the physical properties of the docking mechanism 30can be adjusted such that once the iBead is twist locked into thedocking mechanism still further user-applied pressure is required toreduce the distance between the RF tag and the RF ID reader to withinreading range. Again, the iBead can act very much like a button.

To unlock and remove the iBead, it is twisted in the opposite directionto T and pulled.

The above embodiments are particularly suited to a situation in which auser buys an iBead and programs it to open a page of the news headlinesand he does not like carrying beads on a strap. Since this is somethinghe wants to do every day, he inserts the iBead into the RF ID reader.

Thus it will be appreciated that having a physical object (e.g. a iBead)representing a task or thing (e.g. “call Leon “get latest news”) can beeasier for the user to understand, since there is a 1:1 relationshipbetween the task, and the object used to complete the task. Also,tactile feedback is a natural extension of what humans already do, forexample, when shaking hands or exchanging business cards.

In the FIG. 17 embodiment, the iBead 10 is provided with an LED 42 whichis coupled to a connection terminal 39 via power supply lines 41. TheiBead can be mounted in the docking mechanism 30 as per any of the FIG.12 to 16 embodiments. The RF reader supplies power via a power line 38to the mouth of the docking mechanism. When the iBead is docked, aspreviously described, a direct contact is made between the iBead 10 andthe RF ID reader 60. Acting on instructions from the central processor58 an electrical current is sent to the iBead via power supply lines.This can be used to power devices providing user feedback in the casing40, such as the light emitting diode 42 shown. Alternative devicesinclude a small speaker for providing an audio signal, a bipolar displayor a mechanical device for moving or rotating part of the casing 40.

This embodiment provides user feedback on a mobile electronics device.It is particularly suited for status related tasks where the user needsto be kept informed with the status of a task. Example of particulartypes of application for this type of iBead are given below.

EXAMPLE 1

The user buys an “WLAN status bead” to check when they are in range of aWLAN hotspot, and docks it on their functional cover. The bead glowswhen it is in range (after getting the information from the handset).

EXAMPLE 2

The user buys a “Wizard Bead” from their online gaming environment,which represents the health of their character in the online world. Whenthe character is in danger, the wizard-shaped bead glows red, promptingthe user to interact more with the online world.

EXAMPLE 3

The user decides to back up the photos in the phone's inbox to theirClub Nokia storage space. The status iBead flickers showing the databeing sent, and glows green once the transfer is complete.

Thus, it will be appreciated that the described embodiments of theinvention provide a solution which might replace some of the utilitarianthings which people carry in their wallets with potentially items whichcan serve as fashion items but also have a function, this function beingto simplify the, for example, mobile phones are used.

FIG. 18(a) and FIG. 18(b) show arrangement in which two iBeads aredocked for reading at the same time. In the FIG. 18(a) arrangement, twoseparate docking mechanisms 30 a, 30 b are provided adjacent oneanother. An iBead 10 can then be docked into the respective dockingmechanism 30 a, 30 b. A single RF ID reader 60 is located intermediatethe docking mechanisms. The RF ID reader 60 is provided with softwarewhich implements an anti-collision algorithm which enables both dockediBeads to be detected and individually read. In the FIG. 18(b)arrangement, an adaptor 65 is removably docked in a single dockingmechanism 30. The adaptor 65 hosts a pair of iBeads 10 at the same timebetween a pair of resilient arms 66, which allow the iBeads to beinserted and removed. The curves at the end of the arms 66 facilitatethe easy initial insertion of the iBeads. In this embodiment too,anti-collision software is needed. By reading both iBeads at the sametime, the functionality of the iBead system can be extended. Forexample, two business partners each carry an iBead which when usedseparately access their company bank account. When both iBeads aresimultaneously docked, then and only then can funds be transferred froma joint bank account

It is also noted that by docking a plurality of iBeads at the same time,a physical programming language can be created, where each iBeadrepresents a command e.g. Call, Open Web Page Of, or an argument of acommand e.g., Ingrid, Mike. In such a programming language, the order ofthe iBeads may also have meaning.

In other embodiments (not shown), each docking mechanism 30 could beprovided with a dedicated RF ID reader and the range of the RF ID readercould be adjusted to prevent mutual interference.

1-19. (canceled)
 20. A system comprising a device comprising an RF taginside a casing, and a user's personal communication apparatus includinga docking means and an RF tag reader operable upon said device beingdocked in said docking means to read the RF tag and perform an operationassociated with said RF tag.
 21. A system as in claim 20, whereinreading of the RF tag can take place only when the device is docked intothe docking means.
 22. A system as in claim 20, wherein reading of theRF tag can take place only when the device is docked into the dockingmeans, and further pressure is applied to the casing by the user.
 23. Asystem as in claims 20, wherein said docking means can accommodateseveral devices simultaneously for reading.
 24. A system as in claim 23,wherein the operation requested by the docked devices is dependent onthe combination thereof.
 25. A system as in claim 20, wherein the devicefurther comprises a personal communication apparatus comprises a powersupply means to supply power to said feedback means, when the device isdocked.
 26. A system as in claim 20, wherein the device is docked intothe docking means by a push and twist action.
 27. A device for directingthe operation of a user's personal communication apparatus, comprisingan RF tag located in a decorative casing of a size to facilitatehandling by the user, wherein the RF tag stores a code to direct theoperation of a user's personal communication apparatus, the devicefurther comprising switch means by which the device can be switchedbetween an inactive mode to an active mode in which it can be read. 28.A user's personal communication apparatus for use in a system as inclaim 20.