Methods of authorizing actions

ABSTRACT

Methods for authorizing actions using mobile phones. Embodiments include receiving from a person having authority to authorize the action, an identification of a phone number for obtaining authorization for the action, receiving from a person seeking the action a request for authorization of the action, sending an automated first message through a mobile phone network to the mobile phone, including a description of the action for which authorization is requested, and receiving, from the first mobile phone, a second message, which authorizes the action. Actions that are authorized, in different embodiments, include computer access, physical access, and financial transactions. In various embodiments, the phone number may be received through the mobile phone network through the Internet, through a local signal, or directly from the user.

RELATED APPLICATIONS AND CLAIM OF PRIORITY

This patent application is a Continuation-In-Part patent application ofand claims priority to U.S. patent application Ser. No. 11/864,329,filed on Sep. 28, 2007, titled: DISSEMINATION OF REAL ESTATE INFORMATIONTHROUGH TEXT MESSAGING, which is hereby incorporated by reference, andwhich is a Continuation-In-Part patent application of and claimspriority to U.S. patent application Ser. No. 11/807,024, filed on May25, 2007 now U.S. Pat. No. 7,920,851, titled: SECURE MOBILE INFORMATIONMANAGEMENT SYSTEM AND METHOD. This patent application is aContinuation-In-Part patent application of and claims priority to U.S.patent application Ser. No. 11/807,024, filed on May 25, 2007, titled:SECURE MOBILE INFORMATION MANAGEMENT SYSTEM AND METHOD, which is herebyincorporated by reference. This patent application claims priority to,and incorporates by reference the following: U.S. provisional patentapplication 60/847,981, titled: DISSEMINATION OF REAL ESTATE INFORMATIONTHROUGH TEXT MESSAGING, which was filed on Sep. 28, 2006; U.S. patentapplication Ser. No. 11/807,024, and Patent Cooperation Treaty (PCT)patent application serial number PCT/US07/12436, both filed on May 25,2007, both titled: SECURE MOBILE INFORMATION MANAGEMENT SYSTEM ANDMETHOD, and both claiming priority to, and incorporating by reference,U.S. provisional patent application 60/809,052, titled: MOBILEINFORMATION MANAGEMENT SYSTEM AND METHOD, which was filed on May 25,2006, and U.S. provisional patent application 60/920,603, titled: SECUREMOBILE INFORMATION MANAGEMENT SYSTEM AND METHOD, which was filed on Mar.29, 2007. All of these patent applications have the same inventors asthis application.

FIELD OF INVENTION

This invention relates to systems and methods for authorizing actionsthat use mobile phones. For example, particular embodiments relate toauthorization of financial transactions, authorization of computeraccess to electronically-stored information, and physical access tocontrolled space. Specific embodiments of this invention relate towireless communication, cellular telephony, Internet-based systems andmethods, software, computers, or a combination thereof.

BACKGROUND OF THE INVENTION

In the past, people have carried many different items in their walletsor purses, for example. Certain of these items store personalinformation, provide identification for various purposes, allow theperson to make purchases, provide proof of particular facts, or acombination thereof. Certain items that have been carried in walletsinclude credit cards, bank cards, debit cards, check books, bank books,bank account records, credit card records, bills, identification cards,licenses such as a driver's license, CDL, pilot's license, etc., socialsecurity cards, voter registration cards, passports, visas, immigrationcards, loyalty cards, e.g., for grocery stores such as SAFEWAY™, andALBERTSONS™, retail stores such as GAP™, and STARBUCKS™, membershipcards such as COSTCO™, REI™, gyms, and country clubs, frequent flyerprogram cards or numbers, rewards programs, video clubs, library cards,insurance cards, such as health, auto, home, and life insurance, loginand password information, elevator cards, parking structure cards, roomkeys, phone numbers, e-mail and street addresses, calendars, callingcards, medical information such as medical history, drugs being taken,immunization records, living wills, medical power of attorney, emergencycontact information, personal photographs, personal memorabilia,receipts, proof of warranties and warranty information, tax records,proof of professional credentials, proof of authority, and businesscards, as examples.

In the past, people have also carried mobile phones, which, besidesbeing used to place and receive calls, have contained information suchas phone numbers and calendars, and some of which have had Internetaccess. Mobile phones typically include processors, digital storage,displays, and software, among other things, and many hold and displayphotographs, provide for purchases on the Internet, include a globalpositioning system (GPS) or a combination thereof. Further, systems andmethods have been developed to manage various information and activitiesincluding personal information. Various such systems and methods arecomputer implemented, involve computer software, utilize computerstorage databases, are network or Internet based, or a combinationthereof, as examples. Still further, bar codes, near field communication(NFC) and Bluetooth communication, among other technologies, have beenused to communicate with electronic devices of certain types. Evenfurther, personal digital assistants (PDAs), such as the BLACKBERRY™have been used to send and receive e-mails, as well as placing andreceiving telephone calls, although, in the past, users of PDAs havetypically had to sort through a large number of e-mails to findparticular information that they needed or desired.

However, needs and the potential for benefit exist in the area of suchinformation and item management, and these needs and potential forbenefit often extend to many types of personal, business, andprofessional information. For instance, people often have many thingsthat they would like to place in their wallets, and people must oftenchoose between competing items to carry. Further, wallets and purses areoften too large or bulky to carry conveniently, particularly when peopleare wearing particular styles of clothing. Thus, needs and potential forbenefit exist for systems and methods that reduce the number of itemsthat need to be carried in a wallet or that increase the amount ofinformation that can be carried on one's person. In addition, there is aneed and potential for benefit to be able to efficiently identify,replace, cancel, or destroy items or information, for example, of thetype carried in a wallet or purse, if the wallet, purse, or one or moreitems is lost, stolen, damaged, or destroyed.

Furthermore, needs and potential for benefit, exist for a person to beable to use the Internet, or otherwise provide for efficientcommunication, entering of data, and transferring of data, but needsalso exist that an acceptable level of data security be maintained withsuch systems and methods. Further needs and areas for potential forimprovement include improving the availability of information from anumber of different sources, reducing duplication in the entering ofinformation, organizing information and providing information in amore-usable form, more effectively transferring information between astorage device and another device, and providing more information, moreup-to-date information, or both, to a user. Further needs and areas forpotential for improvement include updating information, for example, ina timely manner or in real time, and providing notifications or alarms,at least for particularly important information.

In specific examples, needs and potential for benefit exist in the areasof methods and systems for managing information for a number of users,using the Internet and mobile phones of the users. Particular needs andpotential for benefit exist for such systems and methods that receiveinformation from users, that include a criteria for alarming, thatreceive information from one or more third parties, that select afraction of the information from third parties, that transmit thisfraction of the information to the mobile phones of the users, where theinformation is organized in a manner that it is accessible to the users.Additional needs and potential for benefit exist for certain processesto be repeated, and for alarms to be provided to the users when certaininformation satisfies a criteria, for example, that the users haveidentified.

In the past, various systems and methods for authorizing actions haveexisted. For example, locks and keys have been used to control physicalaccess to spaces (e.g., locked doors on buildings, electronic keys forhotel rooms, etc.), however, people had to carry such keys to obtainaccess. Passwords and pass codes have been used to authorize access tocontrolled spaces, and to grant computer access to electronically storeddata; however, users must remember these passwords or pass codes. Cardshave also been used to authorize financial transactions, such as paymentat the point of sale for the purchase of goods or for the provision ofservices. Besides requiring the presence of the card, transactions havebeen authorized using bank card networks, which verified that the cardswere authorized. Signatures have also been used to authorizetransactions. However, users needed to carry the cards, and signatureshave been forged. Needs and potential for benefit exist for other orbetter systems and methods for authorizing such actions, or otheractions, that do not require the users to carry additional cards orkeys, remember additional passwords, codes, or information, that useitems already carried by the users, that use items that are frequentlyused and controlled by the user, that are more convenient, that offeralternatives, that are easily trackable, that provide an ability toauthorize a variety of different actions, or a combination thereof.Further needs and potential for benefit exist for software modulesoperating on servers and on mobile phones that provide for securestorage of information, that select, send, and receive nuggets ofpersonal information, and that store the nuggets for access by the user,for example, without sorting through a number of e-mails.

In addition, in the past, various systems and methods for authorizingactions and authenticating access have existed. For example, locks andkeys have been used to control physical access to spaces (e.g., lockeddoors on buildings, electronic keys for hotel rooms, etc.). However,people had to carry such keys to obtain access. Passwords and pass codeshave been used to authorize access to controlled spaces, and to grantcomputer access to electronically stored data. However, users mustremember these passwords or pass codes. Systems and methods have alsoexisted for authorizing other actions. For example, cards have also beenused to authorize financial transactions, such as payment at the pointof sale for the purchase of goods or for the provision of services.Besides requiring the presence of the card, transactions have beenauthorized using bank card networks, which verified that the cards wereauthorized. Signatures have also been used to authorize transactions.However, users needed to carry the cards, and signatures have beenforged.

Needs and potential for benefit exist for other or better systems andmethods for authorizing such actions, or other actions, that do notrequire the users to carry additional cards or keys, remember additionalpasswords, codes, or information, that use items already carried by theusers, that use items that are frequently used and controlled by theuser, that are more convenient, that offer alternatives, that are easilytrackable, that provide an ability to authorize a variety of differentactions, that cannot easily be forged, or a combination thereof.

Systems and methods have also existed to track individuals. For example,devices have been used to track prisoners who have been placed underhouse arrest that are locked onto the prisoners and alarm when aprisoner travels more than a predetermined distance from their home.Devices have also been used to track vehicles, including using GPStechnology, to aid in recovery if the vehicles are stolen. However,needs and potential for benefit exist for systems and methods that trackindividuals without using such devices, for particular applications. Asan example, needs and potential for benefit exist for systems andmethods that track individuals by tracking their mobile phones. As afurther example, needs and potential for benefit exist for trackingindividuals, including children, for their own protection.

In a particular example, in the past, convicted sex offenders have beenrequired to register where they reside and such information has beenmade available to the public, including via the Internet, so thatmembers of the public can take steps to protect themselves and theirchildren, as examples, from potential future sexual predation. However,many registered sex offenders often reside in densely populated areas,making it difficult for members of the public to keep track of all ofthem. In addition, parents are not always aware of exactly where therechildren are at all times. Thus, needs and potential for benefit existfor systems and methods that alert parents or guardians of children whenthe children enter or travel within a predetermined distance of theresidence of a registered sex offender. Needs and potential for benefitalso exist for systems and methods that provide positional awareness ofparticular individuals for other purposes, including such systems andmethods that use mobile phones.

Potential for improvement exists in these and other areas that may beapparent to a person of skill in the art having studied this document.

SUMMARY OF PARTICULAR EMBODIMENTS OF THE INVENTION

This invention provides, among other things, a number of embodiments ofsystems and methods of storing or making available information, items,functionality, or a combination thereof, in a mobile phone. In certainembodiments, information or items that otherwise might be carried in aperson's wallet or purse may be stored on a mobile phone. Variousembodiments include a software application loaded on a mobile phone thatstores certain information for access by the user. In addition, variousembodiments of the invention include an Internet website through whichcertain information can be transmitted to the phone. In someembodiments, the information on the website can be updated through thephone, by the user through a personal computer, or both.

Furthermore, in some embodiments, various third parties, such asmerchants, businesses, banks, airlines and the like may provideinformation, for example, to the website. Information may be transmittedfrom the website to the phone, or vice versa, via a telephone signal orthrough a mobile telephone network, for example, at particular times oras needed. In some embodiments, a user may be alerted to certaininformation or changes in information that meet certain criteria.Further, in particular embodiments, a software module receives e-mails,searches the e-mails, extracts information, and sends the information tothe user's mobile phones.

Various embodiments of the invention provide as an object or benefitthat they partially or fully address one or more of the needs, potentialareas for benefit or improvement, and functions described herein, forinstance. The present invention provides various embodiments that maystore or make available information, items, or functionality in a mobilephone. Various embodiments may provide a higher level of data security,be easier to use, accomplish more functions, contain more usefulinformation, provide a better level of control, provide easiermanagement and replacement if lost or stolen, or a combination thereof,in comparison with various prior art. Various embodiments may, forexample, manage personal information for a number of users, sort certaininformation, provide alarms, transfer information between, for instance,a server and mobile phones, and store information on mobile phones in amanner that facilitates access by the users.

In a number of different embodiments, this invention also providessystems and methods for authorizing actions, authenticating access, andproviding positional awareness for multiple users using mobile phones.Various embodiments provide, for example, as objects or benefits,systems or methods for authorizing such actions that do not require theusers to carry additional cards or keys or to remember additionalpasswords, codes, or information. Particular embodiments use items(e.g., mobile phones) already carried by the users and that arefrequently used and controlled by the user. Some embodiments may be moreconvenient, may offer alternatives, may be easily trackable, may providean ability to authorize a variety of different actions, may provide ahigher level of security, or a combination thereof, for instance.Further features and advantages of the invention may be apparent tothose skilled in the art.

In particular embodiments, this invention provides, for example, varioussystems including a first software module of a server, where the firstsoftware module is recorded on a computer-readable medium and includesprogramming instructions to receive a request for information from auser. The user sends a text message to a short code, where theinformation depends on a generic assigned identification associated withreal estate information, automobile information, and/or personalproperty information. The server communicates with a third party serverto obtain the real estate information, automobile information, and/orpersonal property information requested by the user. The server sendsthe real estate information, automobile information, and/or personalproperty information to a mobile phone of the user through a mobilephone network.

In another embodiment, this invention includes a system having a firstsoftware module of a server recorded on a computer-readable medium andincluding programming instructions to receive a request for real estateinformation from a user using at least one of a short code, a long code,and a generic assigned identification; communicate with a real estateserver to obtain real estate information requested by the user; and sendthe real estate information requested by the user to a mobile phone ofthe user through a mobile phone network.

In another embodiment, this invention includes a system having a firstsoftware module of a server recorded on a computer-readable medium andincluding programming instructions to receive a request for informationfrom a user via at least one of a text message and a short messageservice message sent to at least one of a short code and a long code,wherein the information requested by the user depends on a genericassigned identification associated with at least one of real estateinformation, automobile information, and personal property information;obtain at least one of real estate information, automobile information,and personal property information requested by the user; and send the atleast one of real estate information, automobile information, andpersonal property information requested by the user to a mobile phone ofthe user through a mobile phone network.

In another embodiment, the first software module includes programminginstructions to: create at least one of a text message, a multimediamessaging service (MMS) message, an email message, and a short messageservice (SMS) message including real estate information requested by theuser related to a Multiple Listing Service listing; configure at leastone of a text message, a multimedia messaging service (MMS) message, anemail message, and a short message service (SMS) message with a nuggetof predefined information; configure whether at least one of a textmessage, a multimedia messaging service (MMS) message, an email message,and a short message service (SMS) message should be sent to a thirdparty each time the user requests real estate information; be capable ofpurchasing at least one of short message service (SMS) credits, emailcredits and multimedia messaging service (MMS) credits for at least oneof a text message, a multimedia message service (MMS) message, an emailmessage, and a short message service (SMS) message; allow the user toreceive automatic updates of real estate information related to aMultiple Listing Service listing via at least one of a text message, amultimedia messaging service (MMS) message, an email message, and ashort message service (SMS) message; allow the user to receiveinformation about at least one of a real estate agent, a MultipleListing Service listing, and real estate information based on therequest for real estate information from the user; at least one ofencrypt the real estate information before sending the real estateinformation to the mobile phone of the user, decrypt the real estateinformation, compress the real estate information before sending thereal estate information to the mobile phone of the user, and decompressthe real estate information.

In another embodiment, a second software module for running on themobile phone of the user is recorded on a computer-readable medium andincludes programming instructions to: store the real estate informationon the mobile phone of the user; and provide access to the real estateinformation by the user.

Some embodiments various systems for managing information for multipleusers using the Internet and mobile phones of the users. In manyembodiments, the system includes a first software module for sortinginformation, that may be recorded on a computer-readable medium, forexample, and which includes programming instructions to receive aplurality of select e-mails containing information about the business ofthe user, to search more than one of the select e-mails for at least oneof keywords and identifying numbers, to extract the particularinformation from the select e-mails, and to send the particularinformation to the user's mobile phone through a mobile phone network.Various such embodiments also include a second software module forrunning (or that is running) on the user's mobile phone (e.g., recordedon a computer-readable medium), which includes programming instructionsto store the particular information on the user's mobile phone, and toprovide access to the particular information by the user.

Some such embodiments also include a third software module configuredfor running on the user's computer, (e.g., that is recorded on acomputer-readable medium or that is actually running on the user'scomputer) that includes programming instructions to search for e-mailsfrom at least one particular sender and to send the e-mails from the (atleast one) particular sender, through the Internet, to the firstsoftware module. Further, in some embodiments, the first software moduleincludes programming instructions to encrypt, compress, or both, theparticular information before sending the particular information to theuser's mobile phone, and the second software module includes programminginstructions to decrypt, decompress, or both, the particularinformation.

Additionally, in certain embodiments, the first software module includesprogramming instructions to receive instructions from the useridentifying at least one threshold for alarm for at least a portion ofthe particular information, and the first software module or the secondsoftware module (or both) includes programming instructions to compareat least a portion of the particular information to the threshold.Furthermore, in some embodiments, the first software module or thesecond software module (or both) includes programming instructions toprovide an alarm to the user if the particular information passes thethreshold.

For example, in some embodiments, for each of a plurality of the users,the particular information includes financial account informationincluding amounts of withdrawals or debits (or both) from an account,the at least one threshold includes the amount of a withdrawal or debit,and the first software module or the second software module (or both)includes programming instructions to provide an alarm to the user if awithdrawal or a debit (or both) exceeds the threshold. In anotherexample, the particular information includes travel informationincluding a departure time or a departure location (or both), and thefirst software module or the second software module (or both) includesprogramming instructions to provide an alarm if there is a change in thedeparture time or the departure location (or both).

Further, in a number of embodiments, the second software module containsprogramming instructions to allow the user to select at least a portionof the particular information that is stored on the mobile phone, selector enter a third party mobile phone number, and elect to send theportion of the particular information to the third party mobile phone.In some embodiments, for example, the first software module furthercontains instructions to evaluate whether the third party mobile phonecontains a copy of the second software module, and if it does, then tosend the portion of the personal information to the second softwaremodule on the third party mobile phone, for instance, through the mobilephone network.

In other embodiments, the invention provides various methods of managinginformation for multiple users using the Internet and mobile phones ofthe users. Certain such methods include an act of receiving, at aninformation sorting software module, select e-mails containinginformation about the business of the user. In many such embodiments,the user has caused the select e-mails to be sent to the informationsorting software module. Such methods may also include, using theinformation sorting software module, an act of searching the selecte-mails for keywords or identifying numbers (or both), and extractingthe particular information from the select e-mails.

In a number of embodiments, such methods also include sending theparticular information to the user's mobile phone, for example, througha mobile phone network, for storage on the user's mobile phone andaccess by the user. Some such embodiments also include repeating thesearching, the extracting, and the sending. Various embodiments of suchmethods may be performed in various orders and may include additionalacts.

Some such methods further include, for example, using the informationsorting software module, acts of searching the select e-mails for akeywords or identifying numbers (or both), and identifying a fraction ofthe select e-mails containing the particular information. In someembodiments, the extracting of the particular information includesextracting such particular information only from the fraction of theselect e-mails. Further, in some embodiments, before the receiving ofthe select e-mails, also included is an act of configuring the user'se-mail handling software module to automatically forward incominge-mails from at least one particular third party to the informationsorting module. In many such embodiments, the select e-mails include theincoming e-mails from the (at least one) particular third party.

Moreover, some such methods further include, before the receiving of theselect e-mails, instructing at least one particular third party to sende-mails containing information about the business of the user to theinformation sorting module. In some such embodiments, the select e-mailsinclude the e-mails containing information about the business of theuser, for example. Additionally, in some embodiments, the searchingincludes searching for e-mails from at least one particular sender, andthe extracting of the particular information includes extracting theparticular information only from the e-mails from the (at least one)particular sender. And in some embodiments, such methods may include,for instance, after the extracting of the particular information andbefore the sending of the particular information to the user's mobilephone, encrypting the particular information, compressing the particularinformation, or both.

Further, in some embodiments, the method may include an act of receivinginstructions from the user identifying at least one threshold for alarmfor at least a portion of the particular information. In some suchembodiments, after the extracting of the particular information, themethod may include the acts of comparing at least a portion of theparticular information to the threshold for alarm, and providing analarm to the user if the particular information passes the threshold.For instance, in some such methods, for each of multiple users, theparticular information includes financial account information includingan amount of a withdrawal or a debit from an account, and the thresholdis an amount of the withdrawal or debit beyond which the alarm isprovided. In another example, for each of more than one of the users,the particular information includes travel information including adeparture time or a departure location (or both), and an alarm isprovided if there is a change in the departure time or the departurelocation (or a change in both).

Still other embodiments include, upon instruction by the user, forexample, transmitting at least a portion of the particular informationto a third party mobile phone through the mobile phone network forstorage on the third party mobile phone, for instance, for access by thethird party. In some such embodiments, at least a portion of theparticular information does not include a complete e-mail, and in someembodiments, the (at least a portion of the) particular informationincludes a travel itinerary. In addition, other embodiments of theinvention are also described herein.

In particular embodiments, this invention provides, for example, variousmethods of authorizing an action. Various such methods include, ineither order, an act of receiving from a person having authority toauthorize the action, an identification of a first phone number forobtaining authorization for the action, and an act of receiving from aperson seeking the action, a request for authorization of the action.After the receiving of the identification of the first phone number, andafter the receiving of the request for authorization, many suchembodiments also include an act of sending an automated first messagethrough a mobile phone network to a first mobile phone having the firstphone number. In such embodiments, the first message may include adescription of the action for which authorization is requested, forexample. In addition, after the sending of the first message, many suchembodiments include an act of receiving, from the first mobile phone,(i.e., having the first phone number) a second message, which authorizesthe action.

In some such embodiments, prior to the receiving of the request forauthorization of the action, the first phone number is received throughan Internet website, the mobile phone network, or both. As an example,in some embodiments, the action is granting of computer access toelectronically stored information and the person seeking the action isseeking the computer access to the electronically stored information. Inanother example, the action is granting of physical access to acontrolled space and the person seeking the action is seeking thephysical access to the controlled space. Other examples are describedherein.

Some of these embodiments further include an act of receiving, throughan Internet website or a mobile phone network (or both), from each of atleast a plurality of persons having authority to authorize the action,an indication of a criteria for obtaining authorization for the actionfor the person. Further, some of these embodiments further include anact of receiving from the person having authority to authorize theaction, through at least one of the Internet website and the mobilephone network, an identification of time limits for sending the firstmessage, and the sending of the first message may be performed only inaccordance with the time limits. Further still, some of theseembodiments further include an act of encrypting the first messagebefore the sending of the first message to the first mobile phone, andan act of decrypting the second message after the receiving of thesecond message from the first mobile phone.

In some embodiments, the first message includes at least one menu and atleast one prompt to authorize the action by making a selection from themenu. Further, certain embodiments include an act, in the first message,of asking a personal question about the person having authority toauthorize the action, and an act, in the second message, of receiving apresent answer to the personal question. Such embodiments may furtherinclude an act of comparing the present answer to a previous answer tothe personal question provided by the person having authority toauthorize the action. And some embodiments include an act of allowingthe action only if the second message is received and the second messageauthorizes the action.

In a number of embodiments, the first message identifies the personseeking the action. Additionally, in some embodiments, first mobilephone is controlled by the person seeking the action, and in someembodiments, the person seeking the action is the same person havingauthority to authorize the action. Moreover, some embodiments furtherinclude an act of receiving from the person having authority toauthorize the action, through the Internet website or the mobile phonenetwork (or both), an identification of a second phone number foradvising a third person of the action. And some such embodiments includean act, after receiving the request for authorization, of automaticallysending the first message, the second message, a third message, or acombination thereof, to the second phone number, as examples, which mayinclude a description of the action for which authorization isrequested.

Some embodiments further include acts of repeating the receiving of therequest for authorization of the action, the repeating the sending ofthe first message, and the repeating the receiving of the secondmessage. Many such embodiments further include acts such as tracking theauthorization granted for the action over time and reporting results ofthe tracking. Furthermore, in some embodiments, the first message is anSMS message and the second message is an SMS message received throughthe mobile phone network, while in some embodiments, the first messageis a voice message, as examples.

In another specific example, in particular embodiments, the action is afinancial transaction, the first message includes an amount of thetransaction, and the second message includes an authorization of thetransaction. Some such embodiments include an act of receiving from theperson having authority to authorize the action, through an Internetwebsite or a mobile phone network (or both), an identification of athreshold monetary value of transactions, wherein the first message issent for transactions exceeding the threshold, and transactions belowthe threshold are approved without sending the first message. Further,in some embodiments, the transaction is a withdrawal or a debit from abank account and the person having authority to authorize the action isan authorized user of the account.

In another example, in particular embodiments, the transaction is a bankcard expenditure made at a point of sale for a purchase of goods or apayment for services, and the person having authority to authorize theaction is an authorized user of the bank card. In some such embodiments,the bank card has a bank card number, and the method further comprises,before the sending of the first message, an act of receiving the bankcard number from the first mobile phone via a local signal transmittedfrom the first mobile phone. In certain embodiments, the transaction isan expenditure made from a credit or debit account at a point of salefor a purchase of goods or a payment for services, the person havingauthority to authorize the action is an authorized user of the account,the account has an account indicia, and the method further includes,before the sending of the first automated message, an act of receivingthe account indicia from the mobile phone via a local signal transmittedfrom the mobile phone.

In some embodiments, the transaction is an expenditure made from acredit or debit account at a point of sale for a purchase of goods or apayment for services, the person having authority to authorize theaction is an authorized user of the account, and the second messageincludes an authorization code which has been memorized by the personhaving authority to authorize the action and keyed into the first mobilephone after receiving the first message and before sending the secondmessage. In addition, in some embodiments, the transaction is anexpenditure made from a credit or debit account at a point of sale for apurchase of goods or a payment for services, the person having authorityto authorize the action is an authorized user of the account, theaccount has an account indicia, and the second message includes theaccount indicia. Furthermore, in some embodiments, the second message isan SMS message received through the mobile phone network and the methodfurther includes, before the act of sending of the first message, an actof receiving from the person seeking the action, or from the firstmobile phone, the first phone number.

In yet another embodiment, the invention provides, as another example,various methods of authenticating a transaction. Such methods include atleast the act of receiving through an Internet website or a mobile phonenetwork (or both) from each of multiple users, an indication of acriteria for the user for obtaining authorization for transactions. Suchembodiments also include, for each of at least a plurality of the users,an act of sending a first automated message through the mobile phonenetwork to a mobile phone of the user, the message containing an amountof the transaction and requesting an affirmative action to indicateauthorization of the transaction. And such methods also include, foreach of at least a plurality of the users, receiving from the mobilephone of the user a second message indicating that the user of themobile phone has taken the affirmative action to indicate authorizationof the transaction. Various such embodiments include other limitationsdescribed herein, or other combinations of the elements or actsdescribed herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating, among other things, an exampleof an environment in which various embodiments of the invention mayoperate and various examples of systems of managing information for anumber of users, illustrating examples of embodiments of the invention;

FIG. 2 is a flowchart illustrating examples of various methods,including, for instance, methods of managing information for at least aplurality of users using the Internet and mobile phones of the users;

FIG. 3 is a flowchart illustrating examples of various methods,including, for instance, methods of authorizing actions, methods ofauthenticating transactions, and methods of authenticating access, inmany embodiments, using mobile phones;

FIG. 4 is a flowchart illustrating examples of various methods,including, for instance, methods of providing positional awareness, inmany embodiments, using mobile phones;

FIGS. 5 and 6 are block diagrams illustrating particular examples ofsystems of managing and disseminating information for a number of users;

FIG. 7 is a block diagram illustrating an environment where server 15manages and disseminates information to users 21, 22, and 23; and

FIG. 8 illustrates a flowchart illustrating examples of various methodsof using server 15 to communicate with one or more of users 21, 22, and23 to provide at least one of real estate information, automobileinformation, and personal property information to users 21, 22, and 23.

The drawings illustrate, among other things, various particular examplesof embodiments of the invention, and certain examples of characteristicsthereof. Different embodiments of the invention include variouscombinations of elements or acts shown in the drawings, describedherein, known in the art, or a combination thereof.

DETAILED DESCRIPTION OF EXAMPLES OF EMBODIMENTS

Examples of embodiments of the invention include apparatuses, systems,for instance, with server modules and phone modules (e.g., stored orrecorded on a computer-readable medium), and methods of managinginformation and providing alarms. Particular embodiments include systemsof managing personal information for a number of users, each user havinga mobile phone operating on a mobile phone network, and methods ofmanaging information for multiple users using the internet and mobilephones of the users. Further, in a number of embodiments, a softwaremodule receives e-mails, searches the e-mails, extracts information, andsends the information to the user's mobile phones.

Particular embodiments include methods for authorizing actions usingmobile phones. Embodiments may include acts such as receiving from aperson having authority to authorize the action, an identification of aphone number for obtaining authorization for the action, and receivingfrom a person seeking the action a request for authorization of theaction. Certain embodiments also include acts such as sending a firstmessage through a mobile phone network to the mobile phone, including adescription of the action for which authorization is requested, andreceiving, from the first mobile phone, a second message, whichauthorizes the action. Actions that are authorized, in differentembodiments, include computer access, physical access, and financialtransactions, as examples. In various embodiments, the phone number maybe received through the mobile phone network, through the Internet,through a local signal, or directly from the user, as examples.

Other embodiments include methods for authenticating access andproviding positional awareness using mobile phones. Examples ofembodiments for authenticating access include receiving identificationindicia from a person seeking access, sending a message to a personhaving authority for access, and receiving either a second messageindicating that the person has taken an affirmative action to indicateauthorization, or a password that was provided in the first message.Access may be computer access or physical access, as examples. Examplesof methods of providing positional awareness include obtaining orstoring location coordinates, monitoring the location of a mobile phone,and providing an alarm, for example, through a second mobile phone. In anumber of embodiments, location coordinates are automatically obtainedfrom Internet websites, for example. In some embodiments, for example,parents can monitor the location of their children to make sure they donot get too close to a reported residence of a registered sex offender,for instance.

Various embodiments of the invention provide on mobile devices, items orinformation that might otherwise be found in a person's wallet or purse,for example. Such a mobile device may be a phone, Palm Pilot, personaldigital assistant, or the like, for example. The mobile device is oftenreferred to herein as a “phone” or “mobile phone”, but it should beunderstood that it may have other functionality or be another type ofmobile device in some embodiments. Thus, in certain embodiments, aperson may be able to leave their wallet or purse behind and bring justtheir phone, for example, when they leave home, go shopping, go to arestaurant, travel, or the like, or their phone may provide a backup totheir wallet, for instance, or vice versa. In other embodiments, a phonemay provide a portion of the functionality or information found in awallet, or may contain additional information or functionality as well.

In some embodiments, a user may be able to enter information into awebsite, or may authorize entry of information into the website byothers, which may be transmitted to the phone automatically for storage.In addition, in some embodiments, users may be able to enter informationthrough their phone for transfer to the website server. In variousembodiments, third parties, such as airlines, financial institutionssuch as banks, and the like, may provide information to the website,some or all of which may be transferred to the phone. Further, in someembodiments, certain such information may provide an alert or alarm tothe user, for example, regarding important information such asnotification of large deposits or withdrawals, changes in flightinformation, location of children, etc. In various embodiments, a usermay be able to view other information on the phone, on the website, orboth, such as, for example, bank account balances, transactionhistories, frequent flier miles, credit card bills, automatic depositsand withdrawals, insurance information, warranties, service contracts,and the like.

FIG. 1 illustrates an example of an environment in which variousembodiments of the invention may operate, and also illustrates variousexamples of systems, including systems of managing information for anumber of users. System 100 is, among other things, an example of anInternet-based system for managing information that is transferred toand stored on a mobile phone, which is accomplished in many embodimentswhile maintaining an acceptable level of data security. In the exampleof system 100, users 21, 22, and 23 own, use, control, or have access tomobile phones 41, 42, and 43 respectively, which are serviced throughmobile phone network 40. Although one mobile phone network 40 is shown,some embodiments may include or use a number of mobile phone networks,which may be interconnected, for example. As used herein, unlessspecifically stated otherwise, a “mobile phone network” may be acellular network, a WiFi system, WiMAX, or another way to network mobilephones. Further, the three users 21 to 23 and mobile phones 41 to 43shown may serve as examples of a larger number of users and mobilephones. Many users of system 100 may have access to the Internet 10. Forexample, in the embodiment illustrated, user 23 has access to theInternet 10 through personal computer 13. Further, in this embodiment,mobile phone network 40 is in communication with the Internet 10, orinformation is capable of being communicated (e.g., in one or bothdirections), between mobile phone network 40 and the Internet 10.

In the embodiment illustrated, server 15 is in communication with theInternet 10. In this embodiment, server 15 is part of system 100, whichprovides an example of a system of managing personal information for aplurality of users (e.g., 21 to 23), each user having a mobile phone(e.g., 41 to 43) operating on a mobile phone network (e.g., 40). In thisexample, system 100 includes, on server 15, (at least one) firstsoftware module 61. Although shown just on server 15, in someembodiments, module 61 may be installed on or operating on more than oneserver. For example, server 15 may include multiple servers, such as oneor more of a firewall server, a database server, an SMS gateway server,a web server, a domain server, or any other server. In certainembodiments, software module 61 may form at least one website 65. Inthis embodiment, multiple users (e.g., 21 to 23) may access or visitwebsite 65 through the Internet 10 and elect to have their personalinformation managed through system 100 using their mobile phones (e.g.,41 to 43). For example, user 23 may access website 65 through computer13 and internet 10. In different embodiments, computer 13 may be a desktop personal computer, a lap top or notebook computer, a PDA, etc. Insome embodiments, users may access website 65 on server 15 through theirphones (e.g., 41 to 43), through mobile phone network 40, or both, asexamples.

In many embodiments, first software module 61 provides secure storage 64for each user's (e.g., 21 to 23) personal information, for example,received from the user. In a number of embodiments, storage 64 may alsobe used to store personal information about the users that has beenreceived by module 61 or server 15 from at least one third party, whichmay be acting on behalf of the user to provide information to the user,for example. In the embodiment illustrated, third party 33 may providesuch information to module 61 through the Internet 10, and third party31 may provide such information to module 61 through mobile telephonenetwork 40 and the Internet 10. In some embodiments, information that iscommunicated through mobile telephone network 40 may also, or instead,be communicated through a traditional phone network, for example, thatprovides direct wired phone service for a number of users.

In the embodiment illustrated, third party 32 also provides informationto module 61 on server 15 through a communication means other than theInternet 10. Such a communication means may be, for example, a privatenetwork, a local area network (LAN) a wide area network (WAN), atelephone network, a financial or bank card network, etc. Third parties31, 32, and 33 are examples of data providers, or personal dataproviders. Third parties 31 to 33 may be, for example, financialinstitutions, airlines, bank card providers, merchants, an employer oremployee of the user, news providers, health care providers, insurancecompanies, stock brokers, governmental agencies, non-governmentalorganizations, etc.

In some embodiments, for example referring to FIGS. 1 and 7, server 15communicates with one or more third parties 31, 31, and 32 and/or users21, 22, and 23 to disseminate information to users 21, 22, and 23. Forexample, server 15 may communicate with one or more real estate servers,so that real estate agents can disseminate information to users 21, 22,and/or 23 (e.g., prospective clients) and collect the users' contactinformation for current and future real estate sales, leases, etc., forexample. Third parties 31, 32, and/or 33 can each be a real estateserver, such as a Multiple Listing Service (MLS) server. In otherembodiments, server 15 acquires and stores various information (e.g.,real estate information, automobile information, personal propertyinformation), so that access to a real estate server or other thirdparty (31, 32, 33) is not necessary to provide information that users21, 22, and/or 23 may request. Server 15 can acquire and storeinformation (or have access to other servers with information) on taxes(e.g., real property tax information), lender or mortgage options, titleagencies or titles, property inspections and inspectors, propertyappraisals, school districts, crime statistics, or any other itemsdesirable to users 21, 22, and/or 23. Various embodiments of system 100help real estate agents and users 21, 22, and/or 23 exchange informationto quickly aid users 21, 22, and/or 23 in purchasing, leasing, orlearning about various pieces of real property.

In some embodiments, a real estate agent 703 creates a label 701 with anassigned short code (or long code) and a generic assigned identification(ID) (e.g., a keyword) for a piece of real property (e.g., a house).Label 701 may be attached to real estate agent's 703 sign locatedoutside of the house or advertised through magazines, web/Internet, orother means/media, as examples. Short codes are also referred to asshort numbers, dedicated short codes, shared short codes, or CommonShort Codes (CSC) (e.g., special telephone numbers that can be used toaddress SMS and Multimedia Messaging Service (MMS) messages from phone41, 42, or 43). For example, the generic assigned ID includes a keywordsent in a message to the short code (or long code), the Multiple ListingService (MLS) listing number sent in a message to the short code (orlong code), or a generic assigned ID for a piece of real property (e.g.,a house) sent in a message to the short code (or long code). Forexample, server 15 or real estate agent 703 may store real estateinformation or have access to a Multiple Listing Service (MLS) server.User 21 sends a keyword (e.g., house 1234) to a short code (e.g., 54321)via phone 41. Server 15 or real estate agent 703 are notified that user21 requests information on house 1234, and server 15 or real estateagent 703 provide information on house 1234 to user 21 by sending an SMSmessage or MMS message to user 21 via the internet, an SMS gateway (orMMS gateway), and phone 41. In this example, user 21 sends an SMSmessage or MMS message for house 1234 to short code 54321 via phone 41.Since short code 54321 is assigned to server 15, server 15 hasinformation stored on house 1234 (e.g., server 15 has a nugget ofpredefined information on house 1234 stored). Server 15 provides thenugget of information on house 1234 to user 21 by replying to the SMSmessage or MMS message user 21 previously sent to short code 54321.Server 15 has an SMS gateway with a nugget of predefined informationassociated with each keyword (e.g., “house 1234”, “ABCD”, or any otherkeyword), so that it can easily return the specific information user 21requests.

First software module 61 of server 15 is recorded on a computer-readablemedium and includes programming instructions to receive informationabout one or more real estate agents 703 to create one or more realestate agent accounts. In an exemplary embodiment, with continuedreference to FIGS. 1 and 7, real estate agent 703 receives a real estateagent account at server 15 or a vendor 705 (e.g., a service provider,title agency, mortgage broker, MLS listing service, or any other serviceused by real estate agents, merchant, third party, or other entity)directly or via server 15. In this exemplary embodiment, the real estateagent account enables real estate agent 703 to perform the followingtasks via server 15: create an SMS or MMS message for a propertylisting, customize the message, activate and de-activate a message,configure the message, purchase SMS, email credits, or MMS credits, andview reports. The real estate agent account can be set-up and configuredin various ways depending on the needs of real estate agent 703.

Real estate agent 703 creates an SMS or MMS message for a propertylisting (e.g., an MLS listing) for the generic assigned ID (or akeyword) via server 15. For example, real estate agent 703 can purchaseone or more generic assigned IDs from server 15. Real estate agent 703customizes the message for specific keywords relevant to the informationrequested by users 21, 22, and/or 23 via server 15. Real estate agent703 activates and/or de-activates a message depending on thecircumstances (e.g., if a property has been sold or is in escrow, theninformation about that MLS listing is deactivated) via server 15. Realestate agent 703 configuring the message via server 15 includes having astart date and an end date of the property listing, deciding if an SMSor MMS or email should be sent to real estate agent 703 every time auser (e.g., perspective buyer) requests information, and responding tothe user's request for information on a property listing by furtherrequesting that the user provide an email address to send furtherinformation about the property listing to the email address provided bythe user. If the user provides an email address, then server 15 can sendthe user an SMS message, email, or MMS message with more detailedinformation about the property (e.g., pictures/photos, video, livevideo, room-by-room size or other information, demographics, realproperty tax, lender or mortgage options, title agencies or titles,property inspections and inspectors, property appraisals, schooldistricts, crime statistics, or any other items desirable to the user).For example, server 15 can send a link (e.g., WAP push) to the user viaan SMS message or MMS message with such information (e.g., such as amessage with a link to a WAP address). Server 15 can also communicatewith phone 41, 42, or 43 of the user and by using location basedservices provide information about other properties in a neighborhood orzip code, information about other properties in the location of phone41, 42, or 43 based on the global positioning system of phone 41, 42,and 43 at any instance in time, or any other location specificinformation the user may desire. Real estate agent 703 purchases SMS orMMS credits from server 15 and can make the SMS or MMS credits availablefor users 21, 22, and/or 23 to use. Real estate agent 703 viewingreports includes identifying the number of perspective buyers, phonenumbers of the perspective buyers, and other relevant information.

Perspective users 21, 22, and/or 23 (e.g., property buyers) may usephone 41, 42, or 43 (such as a mobile phone or cell phone in someembodiments) to retrieve information about the property by sending ashort message service (SMS) message, MMS message, or text message, forexample, to the short code (or long code) and type the MLS listingnumber or a generic assigned ID for the house as the text for themessage. For example, label 701 may include information to send amessage including the generic assigned ID for the house (e.g., ABCDE),an MLS listing, or any other identifying information to the short orlong code (e.g., 65203). SMS gateways can be used for sending andreceiving SMS messages (or MMS gateways can be used for sending andreceiving MMS messages). For example, although not illustrated in FIG.1, an SMS gateway or an MMS gateway is typically between phone network40 and internet 10 or internet 10 and server 15 or a part of server 15.Server 15, phone 41, 42, or 43, and/or third parties 31, 32, and/or 33can send or receive SMS or MMS messages via such an SMS gateway or MMSgateway.

In some embodiments, once server 15 receives the SMS or MMS message,server 15 retrieves information about the MLS listing, and in someembodiments, server 15 may format the information, attach a personal orgeneric message from real estate agent 703, or both, and send theinformation to users 21, 22, and/or 23. Server 15 receives a request forinformation from user 21, 22, and/or 23 via the SMS or MMS message,where the information depends on at least one of the short code, longcode, and a generic assigned ID associated with at least one of realestate information, automobile information, and personal propertyinformation. Server 15 communicates with third parties 31, 32, and/or 33(e.g., a car dealership server, an AUTOTRADER™ server, or an EBAY™server) to obtain at least one of real estate information, automobileinformation, and personal property information requested by user 21, 22,and/or 23. For example, server 15 communicates with third parties 31,32, and/or 33 (e.g., the MLS server) to retrieve the information aboutthe MLS listing. Communication between server 15 and third parties 31,32, and/or 33 can be through a HTTP/HTTPS protocol and/or Web Serviceover an internet connection. Server 15 requests information from an MLSserver using the MLS listing number as the keyword. The MLS serverresponds to the request by server 15 by providing data corresponding tothe particular MLS listing. Server 15 extracts the relevant information(e.g., price, number of bedrooms, number of bathrooms, square footage,description, and any other desirable information). This relevantinformation is formatted to a package of information that is often lessthan 160 characters if it is to fit in one SMS message. Server 15 canformat the information (e.g., taking the SMS or MMS message informationin a desirable format (e.g., limited number/type of characters) andconverting the information into a more desirable format). Server 15 canattach a message (e.g., from real estate agent 703) and send the atleast one of real estate information, automobile information, andpersonal property information requested by user 21, 22, and/or 23 tophone 41, 42, and/or 43 of user 21, 22, and/or 23 through a mobile phonenetwork. Real estate agent 703 has the ability to access server 15 viaweb (the Internet) and modify the property listing (e.g., house data) insome embodiments.

FIG. 8 illustrates a flowchart illustrating examples of various methodsof using server 15 to communicate with one or more of users 21, 22, and23 to provide at least one of real estate information, automobileinformation, and personal property information to users 21, 22, and 23.Server 15 receives a request for information from one or more of users21, 22, and 23 (act 801). Users 21, 22, and 23 send the request forinformation via at least one of a text message, multimedia messagingservice message, and a short message service message sent to at leastone of a short code and a long code (act 803). The information requestedby users 21, 22, and 23 depends on a generic assigned identificationassociated with at least one of real estate information, automobileinformation, and personal property information. Server 15 communicateswith one or more third parties 31, 32, or 33 to obtain at least one ofreal estate information, automobile information, and personal propertyinformation requested by users 21, 22, and 23 or otherwise has access toat least one of real estate information, automobile information, andpersonal property information requested by users 21, 22, and 23 (e.g.,within server 15) (act 805). Server 15 sends the at least one of realestate information, automobile information, and personal propertyinformation requested by users 21, 22, and 23 to one or more phones 41,42, 43 of users 21, 22, and 23 via at least one of a text message, amultimedia messaging service (MMS) message, and a short message service(SMS) message through phone network 40 (act 807).

In one exemplary embodiment and with further reference to FIG. 1, asecond software module 72 (described below) for running on phone 41, 42,and/or 43 of user 21, 22, and/or 23 is recorded on a computer-readablemedium and includes programming instructions to store at least one ofreal estate information, automobile information, and personal propertyinformation on phone 41, 42, and/or 43 of user 21, 22, and/or 23. Secondsoftware module 72 also includes programming instructions to provideaccess to at least one of real estate information, automobileinformation, and personal property information by the user.

Real estate agent 703 can configure messages and view reports viacommunication with server 15. Real estate agent 703 can change theinformation provided to server 15, on a property listing, or on the MLSlisting. Real estate agent 703 can configure its profile or environmentwith server 15 to alert real estate agent 703 if any of users 21, 22, or23 request specific information, send a message to a short or long code,or otherwise communicate with server 15. Some embodiments include one ormore of the following features: perspective users (e.g., buyers) canregister on the web to receive updates through SMS, MMS, or email abouta property listing; real estate agents can automatically send theircontact information through email, MMS, or SMS to perspective buyers;and real estate agents can offer a service to SMS, MMS, or emailperspective buyers when a property listing becomes available that matchthe buyer's profile (e.g., in certain areas/neighborhoods or size orprice or any other desired feature).

With further reference to FIG. 1, website 65 may include a main or homepage (or more than one such page) to which new users and new thirdparties may be directed. New users may be directed to this page or pagesor to website 65 by search engines, advertisers, brokers, agents, or thelike, as examples. Users (e.g., 21 to 23) may be assigned (or asked toelect) user names, user ID's, passwords, etc., which they may use toaccess secure areas or pages of website 65, for example, where theirpersonal information may be entered, displayed, updated, etc. In someembodiments, security of such areas may be provided, for example, usingnovel systems and methods which may be described herein, for instance.In some embodiments, these secure areas may include information enteredby third parties (e.g., 31, 32, and 33). Further, in some embodiments,third parties (e.g., 31 to 33) may have their own secure areas (e.g.,that are password protected, or protected as described herein), forexample, within website 65 or on server 15 or another server, in whichthe third parties (e.g., some or all of 31, 32, and 33) may be able toenter, view, update, or a combination thereof, information for a numberof users.

In some embodiments, the first software module 61 filters the personalinformation and selects nuggets of the personal information which thefirst software module 61 sends to the mobile phone (e.g., 41) of theappropriate user (e.g., 21). As used herein, a “nugget of information”is a discrete piece of information that is a subset of the totalinformation. Nuggets of information may be in digital form, for example,and may be in text form, in the form of numbers or values, or acombination thereof, as examples. In some embodiments, nuggets mayinclude pictures, text, graphics, or the like, as further examples.These nuggets may be sent, for example, through mobile phone network 40,for instance, and may be sent as text, MMS messages, or short messageservice (SMS) messages, for instance. In some embodiments, server 15 mayaccess mobile phone network 40 through the Internet 10, for example.

In the embodiment illustrated, a second software module 72, is operating(e.g., independently) on more than one of the mobile phones (e.g., 41 to43, although module 72 is shown only on phone 41). Further, in thisembodiment, the second software module 72 is configured to receive thenuggets of the personal information of the user (e.g., 21) from thefirst software module 61 through the Internet 10 and through mobilephone network 40, and to store the personal information on mobile phone41 so that the personal information may later be accessed by user 21,for example, even when mobile phone 41 is not connected to mobile phonenetwork 40. In the embodiment illustrated, user 21 may access thepersonal information, for instance, by viewing folder 76 containingnuggets 78 and 79, which may be organized by subject matter, forexample. One such subject may be financial information, for example,which may include account balances, transaction records, etc., andanother such subject, in some embodiments, may be travel information, asanother example, which may include, for example, flight departure timesand locations, etc. Other examples of subjects are described herein, andinclude insurance information, bank card information, medical records,appointments, and the like.

In some such embodiments, for multiple users (e.g., 21 to 23), secondsoftware module 72 is downloadable by the users from first softwaremodule 61 to the mobile phones (e.g., 41 to 43), for example, throughwebsite 65, through the Internet 10, through mobile phone network 40, ora combination thereof. Further, in some embodiments, for many of theusers (e.g., 21 to 23), first software module 61 includes instructionsto search some or all of the e-mails received for or to the users (e.g.,21 to 23) for keywords, identifying numbers, or both, and to select thenuggets (e.g., 78 and 79) of the personal information from the e-mailsusing the keywords, identifying numbers, or both. For example, softwaremodule 61 may search e-mails received for a specific user (e.g., 21, 22,or 23) for account numbers, flight numbers, names of third parties(e.g., one or more of 31, 32, and 33), etc., and may extract nuggets ofinformation pertaining thereto. In some embodiments, software module 61may search all e-mails (e.g., sent to particular users), while in otherembodiments, only e-mails from certain sources, or certain e-mailaddresses may be searched.

In addition, in some such embodiments, for many or all of the users,second software module 72 contains instructions to allow the user (e.g.,21) to select at least a portion of the personal information that isstored on the mobile phone (e.g., select nugget 78), select or enter anidentifier of at least one of a different party (e.g., 22) and adifferent party mobile phone (e.g., 42), and elect to send the personalinformation (e.g., nugget 78) to the different party mobile phone (e.g.,42). Examples of such a different party are other users, for instance,for user 21, users 22 and 23 may be different parties, and their phones42 and 43 may be different party mobile phones. Examples of such anidentifier include the name of the different party, the phone number forthe different party, a user identification number, etc. In manyembodiments, for multiple users, the first software module 61 furthercontains instructions to evaluate whether the different party mobilephone has certain functionality or contains a copy of particularsoftware, such as second software module 72.

In some such embodiments, if the different party mobile phone contains acopy of the second software module 72, for example, then the firstsoftware module 61 may send the (at least a) portion of the personalinformation to the copy of the second software module 72 on thedifferent party mobile phone, for instance, through mobile phone network40, the Internet 10, or both. On the other hand, in some embodiments, ifthe different party mobile phone does not contain a copy of the secondsoftware module 72, for example, or in some cases other software havingadequate equivalent functionality, then the first software module 61 maysend the (at least a) portion of the personal information to thedifferent party mobile phone, in another form, for instance, in the formof a standard e-mail or text message.

In other embodiments, software module 72 may send the informationdirectly to the different party rather than having the first softwaremodule (e.g., module 61) do it. In some embodiments, for more than oneof the users, the first software module 61 further contains instructionsto receive a command from the user (e.g., from user 21), for instance,through mobile phone network 40, and upon the receipt of the command, totransmit at least a portion of the nuggets of the personal informationto a different party (e.g., to user 22 or 23, or specifically, in someembodiments, to their phones 42 or 43), for example, through theInternet 10.

In addition, in some embodiments, for many or all of the users, firstsoftware module 61 contains instructions to receive a command from theuser (e.g., one of users 21 to 23), for instance, through mobile phonenetwork 40, to dispute a financial transaction for a particular accountdescribed in the nuggets of the personal information. In particularembodiments, for example, upon the receipt of the command, firstsoftware module 61 may contain instructions to transmit a dispute of thetransaction to a manager of the particular account through a network,such as Internet 10, for example. The manager of the account may bethird party 33, for example, and may be a bank or financial institution,for instance. Such a dispute of the transaction may be transmitted tothe third party (e.g., 33) in the form of an e-mail or a text message,for example, sent via the Internet 10, mobile phone network 40, or both,while in other embodiments, a dispute of a transaction may be sentthrough a private or financial network, as another example.

Further, in some embodiments, some or all of the mobile phones (e.g., 41to 43) may be configured to transmit, receive, or both, local signals.For example, in the embodiment illustrated, mobile phone 42 includeslocal transmitter, receiver, antenna, or a combination thereof, localcommunication device 82, which, in this embodiment, communicates withreader or local communication device 88. In different embodiments,device 88 may read signals, send signals, or both. Communicationsdevices 82 and 88 may exchange signals in one or both directions throughnear-field communications, a personal area network, Bluetooth, barcodes, WiFi, or the like, as examples.

Various embodiments of the invention provide for extracting particularinformation from a user's e-mails and sending that information to theuser's mobile phone. Referring to FIG. 1, particular embodimentsinclude, for example, various systems for managing information formultiple users (e.g., 21 to 23) using the Internet 10 and mobile phones(e.g., 41 to 43) of the users (e.g., 21 to 23). In many embodiments, thesystem includes a first software module 67 for sorting information. Sucha software module 67 may be recorded on a computer readable medium, forinstance, such as a hard drive, random access memory (RAM), read onlymemory (ROM), a disk, a memory stick, or the like, as examples. Such asoftware module 67 may be located on server 15, for example, and may be,or be part of, module 61, for instance, as shown. In some embodiments,first software module 67 includes programming instructions to receivemultiple e-mails containing information about the business of the user(e.g., one of users 21 to 23). These e-mails may be all or a selectportion of e-mails that have been sent to the particular user's (e.g.,one of users 21 to 23) e-mail address, for example, via Internet 10.

The information about the business of the user may be, or include, asexamples: personal information; financial information; travelinformation; information concerning financial accounts, financialtransactions, expenditures, purchases, savings, loans, etc.; or otherinformation described herein or known in the art. Further, informationabout the business of the user may concern the user's personal affairsor the affairs of a business that is owned, controlled, managed,invested in, or an employer of the user, as additional examples. In someembodiments, fewer than all (i.e., select) e-mails sent to theparticular user (e.g., one of users 21 to 23) may be received (e.g., atfirst software module 67). For example, in some embodiments, onlye-mails sent from one or more particular senders or entities (e.g., fromsome or all of third parties 31 to 33), or one or more particular e-mailaddresses, may be received (i.e., select e-mails), by module 67. Suchsenders (e.g., some or all of third parties 31 to 33) may include, forexample, banks, financial institutions, card providers, airlines, travelagents, etc., or other examples of third parties 31 to 33 describedherein, which may have been selected by the user (e.g., one of users 21to 23) in certain embodiments.

In some embodiments, first software module 67 includes programminginstructions to search some or all of the (e.g., select) e-mails forkeywords or identifying numbers (or both), as examples, and to extractparticular information from the select e-mails. Examples of suchkeywords and identifying numbers include account numbers, frequent flyernumbers, flight numbers, words like “balance”, “withdrawal”, “debit”,“delayed”, “gate”, “flight”, “cancelled”, or the like. Such particularinformation may include, for instance, account balances, amounts ofwithdrawals or debits from, or deposits to, accounts, amounts of bankcard billings, travel information such as departure times, departurelocations, status of flights, etc. In various embodiments, the firstsoftware module 67 also includes programming instructions to send theparticular information to the user's (e.g., one of users 21 to 23)mobile phone (e.g., the appropriate one of phones 41 to 43) through, forinstance, mobile phone network 40, the Internet 10, or both.

Various embodiments also include second software module 77 for running(e.g., that is running) on the user's mobile phone (e.g., theappropriate one of phones 41 to 43). Second software module 77 mayinclude programming instructions to store (e.g., in folder 76) theparticular information on the user's mobile phone (e.g., the appropriateone of phones 41 to 43), and provide access to the particularinformation by the user (e.g., one of users 21 to 23). Such a secondsoftware module 77 may be recorded on a computer readable medium, forinstance, such as a hard drive, random access memory (RAM) read onlymemory (ROM), a disk, a memory stick, or the like, as examples.

In some embodiments, second software module 77 may be stored or recordedon a server (e.g., server 15), for downloading onto the user's mobilephone (e.g., the appropriate one or more of phones 41 to 43). In anumber of embodiments, second software module 77 may be recorded onmemory within the user's mobile phone (e.g., the appropriate one ofphones 41 to 43), for example. Such a second software module 77 may be,for example, part of software module 72 shown in FIG. 1 on mobile phone41. The particular information may be, include, or be included within,for example, the nuggets 78, 79, or both, for instance, as describedherein.

Some such embodiments also include a third software module 17 (e.g.,recorded on a computer-readable medium) configured for running on theuser's computer (e.g., computer 13 of user 23), (or that is actuallyrunning on the user's computer) that includes programming instructionsto search for e-mails from at least one particular sender (e.g., fromone or more of third parties 31 to 33) and to send the e-mails from theat least one particular sender, for example, through the Internet 10, tofirst software module 67. In various embodiments, module 17 may forwarde-mails to module 67, and in different embodiments, the e-mails may bekept as new, marked as read, or marked as forwarded on the user'scomputer (e.g., computer 13 of user 23), or may be deleted or erasedtherefrom. In certain embodiments, third software module 17 may be aplug-in for an e-mail management application, such as MICROSOFT OUTLOOK,for example.

Further, in some embodiments, first software module 67 or 61 includesprogramming instructions to encrypt the particular information beforesending the particular information to the user's mobile phone (e.g.,41). In some embodiments, second software module 77 or 72 includesprogramming instructions to decrypt the particular information. Evenfurther, in some embodiments, first software module 67 or 61 includesprogramming instructions to compress the particular information beforesending the particular information to the user's mobile phone (e.g.,41). And in some embodiments, second software module 77 or 72 includesprogramming instructions to decompress the particular information.Decryption and compression may be used together or separately indifferent embodiments.

Additionally, in certain embodiments, first software module 67 or 61includes programming instructions to receive instructions from the user(e.g., user 21) identifying at least one threshold for alarm for atleast a portion of the particular information. In particular suchembodiments, first software module 67 or 61 or second software module 77or 72 (or a combination thereof) includes programming instructions tocompare at least a portion of the particular information to thethreshold. Furthermore, in some embodiments, first software module 67 or61 or second software module 77 or 72 (or a combination thereof)includes programming instructions to provide an alarm to the user if theparticular information passes the threshold. Such an alarm may be, forexample, in a manner described herein, such as an audible alarm a lightor display, a vibratory alarm, or a combination thereof.

In some embodiments, for example, for one or more of multiple users(e.g., users 21 to 23), the particular information includes financialaccount information, which may include, for instance, amounts ofwithdrawals or debits from an account, such as a financial or bankaccount. In certain embodiments, the (e.g., at least one) threshold maybe, or include, the amount of a withdrawal or debit, for example, andfirst software module 67 or second software module 77 (or both) mayinclude programming instructions to provide an alarm to the user [e.g.,the appropriate one (or more) of users 21 to 23] if a withdrawal or adebit (or both) exceeds the threshold. In another example, in someembodiments, for each of a number of the users (e.g., users 21 to 23),the particular information includes travel information, which includes adeparture time, a departure location (e.g., a departure gate), or both.In some such embodiments, first software module 67 or second softwaremodule 77 (or both) includes programming instructions to provide analarm if there is a change in the departure time or the departurelocation (or both), as examples. In other embodiments, alarms may beprovided for other thresholds or other criteria.

Further, in a number of embodiments, for one or more of the users (e.g.,users 21 to 23), second software module 77 contains programminginstructions to allow the user (e.g., user 21) to select at least aportion of the particular information that is stored on the mobile phone(e.g., 41), select or enter a third party mobile phone number (e.g., thephone number of user 22), and elect to send at least a portion of theparticular information to the third party mobile phone (e.g., to mobilephone 42 of user 22). In some embodiments, at least for many users(e.g., user 21), first software module 67 further contains instructionsto evaluate whether the third party mobile phone (e.g., mobile phone 42of user 22) contains a copy of second software module 77, module 72, orboth. In some such embodiments, if the third party mobile phone (e.g.,mobile phone 42 of user 22) contains a copy of second software module77, for example, then first software module 67 may send the portion ofthe personal information to the copy of second software module 77 on thethird party mobile phone (e.g., mobile phone 42 of user 22) for example,through mobile phone network 40, the Internet, or both.

The invention also provides various methods, including, for example,methods of managing information for a number of users, methods ofauthorizing actions, methods of authenticating transactions, methods ofauthenticating access, and methods of alarming as to proximity to alocation. FIGS. 2 to 4 illustrate examples of such methods, anddifferent methods in accordance with the invention may include aselection of the operations or acts shown in FIGS. 2 to 4, describedherein, or both, which may be performed or accomplished in the orderpresented, or in many embodiments, in a different order.

Turning now to FIG. 2, this figure is a flowchart illustrating examplesof various methods, including, for instance, methods of managinginformation for a number of users using the Internet and mobile phonesof the users. Many embodiments of the invention have some but not all ofthe acts shown in FIG. 2. In the particular embodiment illustrated,method 200 includes receiving information from a user (act 205). Thismay include, in some embodiments, at least for some of the users,receiving a first set of personal information (e.g., of the user) fromthe user through at least one of the Internet and the mobile phone ofthe user.

For example, user 23 shown in FIG. 1 may access website 65 throughcomputer 13 and the Internet 10, may open an account, and may enterinformation, select options, etc. Information that may be entered orselected may include, for example, names of financial institutions,account numbers, names of airlines, frequent flyer numbers, names ofinsurance companies, insurance policy numbers, driver's license numbers,passport information, etc. In some cases, this personal information maybe complete, while in other cases, the first set of personal informationmay include information to facilitate receipt or completion ofinformation from one or more third parties (e.g., 31 to 33), such as byidentifying the third parties, accounts, etc.

Further, in some embodiments, the first set of personal informationincludes identification of information that is important to the user,which may include a criteria for alarming. Such a criteria (e.g.,received in act 205) may be entered by the user or selected from one ormore menus, for example. The criteria may include, for instance, anelection to receive an alarm if a withdrawal, debit, or charge from afinancial account exceeds a threshold that is entered or selected by theuser. In some embodiments, the criteria (e.g., received in act 205) mayinclude a selection or indication of whether the user is to receivealarms throughout the day, or only during certain hours of the day, asanother example, which may vary depending upon the nature of the alarmor the particular threshold. Other examples of alarms include whethertravel departure times, departure locations, or the like, have changed,whether bills are due, whether insurance coverage has expired, whetherstock prices have changed, whether weather conditions or forecasts, orother environmental conditions meet a certain criteria, whether adocument or credential is about to expire, whether someone has requesteda particular action or access, whether children have traveled into aregion of concern, etc.

In certain embodiments, method 200 further includes downloading a mobilephone module (act 210). In some embodiments, for example, for multipleusers, the user instructs the server (e.g., 15) or selects at a website(e.g., 65) to download a mobile phone module, for example, secondsoftware module 72, 77, or both, shown in FIG. 1. In a particularembodiment, for instance, second software module 72 is downloaded fromfirst software module 61 through the Internet 10 and mobile phonenetwork 40 to mobile phone 41, upon instruction by user 21. In otherembodiments, software module 72 may be downloaded to mobile phone 43,for example, through the Internet 10, and computer 13, for instance,through a USB port or a wireless network. In other embodiments, softwaremodule 72, 77, or both, may be loaded onto the phone at a store wherethe mobile phone was purchased, or at an establishment of the entitythat controls server 15, that operates website 65, or that provides aservice or system of managing information for a number of users.

In a number of embodiments of the invention, and in the particularembodiment shown in FIG. 2, method 200 includes receiving informationfrom third parties (act 215). In some embodiments, for example, for eachof multiple users, this act (215) includes receiving a second set ofpersonal information of each user from at least one third party, forinstance, through a network (e.g., the Internet 10). In manyembodiments, this act (215) may be performed or accomplished, for aparticular user, after receiving personal information (act 205) fromthat particular user, which may identify the third party, provideinformation with which the third party can identify the particular user,identify particular information that the particular user authorizes orrequests be provided from the third party, identify bank accounts, etc.

In many embodiments, the user may directly request a third party to sendthe information. For example the user may visit a third party website(e.g., via the Internet 10), login to the third party website andprovide information to the third party through the website to identifythe user in system 100 (FIG. 1), which would also indicate the user'swillingness for the third party to send the information. In variousembodiments, the information received from the third parties (e.g., inact 215) may include one or more account balances, one or moredescriptions of account transactions (e.g., an amount of a withdrawal,which may include, who the withdrawal is to), flight information,changes in flight information, insurance information, loyaltyinformation, passwords, pass codes, calendar entries, navigationalinformation, account numbers, bank card numbers, location informationconcerning regions of concern, etc.

In the embodiment illustrated, method 200 further includes selecting afraction of the information (act 220). In some embodiments, for example,a fraction of the information received from the third parties (e.g., inact 215) may be selected, for example, by the first software module 61.As used herein, “selecting a fraction” of certain information meansselecting less than all of that information. For example, particularsubsets or nuggets of the information may be selected. In someembodiments, the fraction of the information may be selected (e.g., inact 220) using a criteria that has been predefined (e.g., in module 61).In some embodiments, the fraction of the information may be selected(e.g., in act 220) using the criteria (e.g., received in act 205).

In various embodiments, in act 220, particular information is selectedthat is considered to be of particular importance or concern to theuser. Examples include changes in departure time, status, or departurelocation for a flight that the user is booked on, withdrawals from anaccount that exceed a threshold, account balances, etc. In particularembodiments, for each of a more than one of the users, for instance, act220 may include selecting a fraction of the second set of personalinformation described herein, while in various embodiments, act 220 mayinclude selecting a fraction of the first set of personal informationinstead, or in addition.

Various embodiments of the invention include encrypting the fraction ofthe information (act 225). The information that is encrypted may be thefraction of the information that is selected in act 220, for example. Insome embodiments, a fraction of the second set of personal informationis encrypted (e.g., in act 225), for example. Information may beencrypted (e.g., in act 225), for instance, to maintain itsconfidentiality. Information may be encrypted (e.g., in act 225), forexample, using PGP (pretty good privacy), public-key cryptography,asymmetric key encryption, or the like, as examples.

Further, Various embodiments of the invention include compressing thefraction of the information (act 230). The information that iscompressed may be the fraction of the information that is selected inact 220, for example. In some embodiments, a fraction of the second setof personal information is compressed (e.g., in act 230), for instance.Information may be compressed (e.g., in act 230), for example, to makeit easier, quicker, or less expensive to transmit, store, or both.

In different embodiments, information may be compressed (e.g., in act230), encrypted (e.g., in act 225), or both, in either order. In someembodiments, method 200 further includes, for each of multiple users,before the transmitting of the fraction of the second set of personalinformation (e.g., act 235), for example, to the user's mobile phone, atleast one of encrypting (e.g., act 225) the fraction of the second setof personal information (e.g., selected in act 220), and compressing(act 230) the fraction of the second set of personal information (e.g.,selected in act 220). In certain embodiments, the encrypting (e.g., act225), and the compressing (act 230), for example, of the fraction of thesecond set of personal information (e.g., selected in act 220), may berepeated, for instance, along with other acts, as described herein.

In the embodiment illustrated, method 200 also includes, as mentioned,transmitting information (act 235). Such information may include, forexample, the fraction of the second set of personal information (e.g.,selected in act 220). In various embodiments, the receiving (act 205),for example, of the first set of personal information, the receiving(act 215), for example, of the second set of personal information, theselecting of the fraction (act 220), and the transmitting of thefraction (act 235), are all performed by the first software module 61residing on server 15 connected to the Internet 10. And in someembodiments, the first software module 61 further forms the (at leastone) Internet website 65. In some embodiments, methods include, forexample, for each of multiple users, transmitting the fraction (e.g.,selected in act 220) of the second set of personal information to theuser's mobile phone, for example, through the mobile phone network(e.g., network 40 shown in FIG. 1) for storage on the user's mobilephone, for instance, using second software module 72 (e.g., residing onthe phone).

In this embodiment, method 200 further includes evaluating whetherinformation satisfies a criteria (act 240). Such a criteria may be, asdescribed herein, or provided or selected by the user (e.g., in act205). If the information (e.g., the fraction of the information selectedin act 220, transmitted in act 235, or both) satisfies the criteria(e.g., for alarming, for instance, as determined in act 240), then analarm may be provided (act 245). In some embodiments, the methodincludes, for each of multiple users, for example, using the secondsoftware module, providing an alarm to the user (act 245) if at least aportion of the fraction of the second set of personal informationsatisfies the criteria. Such an alarm (e.g., of act 245) may be audible,visual, or, for example, in the form of a vibration. In someembodiments, a sound or vibration may be produced by the mobile phone ofthe user (e.g., in act 245), and the reason for the alarm may bedisplayed on the screen of the phone, for instance. In some embodiments,the default ring tone of the phone or an existing phone ring setting maybe used for the alarm (e.g., in act 245), as examples.

In some embodiments, the user may be prompted to acknowledge the alarmor the description of the reason for the alarm, or may be asked to makea response or take an affirmative action to provide consent, forexample, for the reason for the alarm or an event described in thedescription. For example, if the reason for the alarm is that awithdrawal has been made from the user's bank account, the mobile phonemay ring or vibrate. The user may then open the phone or press a buttonon the phone to acknowledge the alarm. The phone may then display theamount of the withdrawal, for example, along with a description of theaccount, and of the transaction. In some embodiments, the user may beasked to make a selection to provide consent to the withdrawal, forinstance. In another scenario, the phone may ring to provide an alarmthat the user's flight has been delayed, as another example. The usermay open the phone to acknowledge the alarm, and a brief description ofthe delay, and new estimated departure time, may be provided on thescreen of the mobile phone, for instance. Other examples are describedherein.

In some such methods, for example, for each of a number of the users,the first set of personal information (e.g., received in act 205)includes an identification of at least one financial account, the secondset of personal information (e.g., received in act 215) includes anidentification of deposits into the account, withdrawals from theaccount, and a balance of the account, and, the providing of an alarm(act 245) includes at least one of alarming if a withdrawal exceeds afirst threshold identified within the criteria (e.g., received in act205), and alarming if the balance of the account drops below a secondthreshold identified within the criteria. As used herein, such a“withdrawal” may be a debit from, or a charge to, the account, asexamples.

As another example, in some methods, for each of a plurality of theusers, the first set of personal information (e.g., received in act 205)includes at least one of travel information (e.g., frequent flyerinformation such as a frequent flyer identification number) and anidentification of at least one of a common carrier (e.g., an airline)and a travel agent. Further, in some embodiments, the second set ofpersonal information (e.g., received in act 215) includes travelitinerary, which may include identification of a departure time and adeparture location, for example. And the providing of an alarm (act 245)may include alarming if there is a change in at least one of thedeparture time and the departure location, in some embodiments. In manyembodiments, if the information (e.g., the fraction of the informationselected in act 220, transmitted in act 235, or both) does not satisfythe criteria (e.g., for alarming, for instance, as determined in act240), then an alarm may not be provided, and act 245 may be skipped, atleast for that particular iteration of method 200.

In various embodiments, method 200 further includes transmittinginformation to a different party (act 255). In many such embodiments,the user may (e.g., first) select, or otherwise provide instructions orcommands to send certain information to the third party (evaluated inact 250). In particular, in some embodiments, (e.g., in the orderindicated or in another order), at least for several of the users,method 200 may include, upon instruction by the user (e.g., evaluated inact 250), transmitting (e.g., in act 255) at least a portion of thesecond set of personal information (e.g., received in act 215, selectedin act 220, transmitted in act 235, or a combination thereof) to adifferent party mobile phone. In some embodiments, this may beaccomplished through the mobile phone network (e.g., 40) for storage onthe different party mobile phone, for instance, for access by thedifferent party.

Referring to FIG. 1 for an example, user 21 may provide an instructionor command (e.g., in act 250), for instance, through user 21's mobilephone 41, to send at least a portion of the information received (e.g.,in act 235), to different user 22, specifically, via mobile phone 42. Indifferent embodiments, mobile phone 41 may send the portion of theinformation to mobile phone 42, for example, through mobile phonenetwork 40, or mobile phone 41 may instruct server 15 or first softwaremodule 61 to send the portion of the information to mobile phone 42, forinstance, through the Internet 10, mobile phone network 40, or both, asexamples. In some embodiments, delivery may be certified, or deliverymay be tracked and the sender may be notified when delivery has beenaccomplished, or alternatively, when delivery has been unsuccessful.

In some embodiments, the first software module 61 receives a command(e.g., in act 250) from the user (e.g., 21), for instance, throughmobile phone network 40, and upon the receipt of the command (e.g., inact 250), transmits (e.g., in act 255) at least a portion of the nuggets(e.g., 78) or fraction of the personal information to the differentparty (e.g., 22) through the Internet 10. In some embodiments, thesystem (e.g., system 100) may send the particular information, fractionthereof, or nuggets in different ways (e.g., in act 255), depending onwhether the different party is a user of system 100 [e.g., has visitedwebsite 65 and elected to have their personal information managed bysystem 100, or has downloaded (e.g., act 210) or otherwise received, orhas installed, the second software module 72 on their mobile phone].

In some embodiments, the user (e.g., 21) may select (e.g., in act 250)at least a portion of the personal information that is stored on themobile phone (e.g., 41), select or enter (e.g., in act 250) anidentifier of at least one of a different party (e.g., 22) and adifferent party mobile phone (e.g., 42), and elect (e.g., in act 250) tosend (e.g., in act 255) the at least a portion of the personalinformation to the different party mobile phone (e.g., 42). In manyembodiments, the first software module 61 evaluates whether thedifferent party mobile phone (e.g., 42) contains a copy of the secondsoftware module 72, and if the different party mobile phone (e.g., 42)contains a copy of the second software module 72, then the firstsoftware module 61 sends (e.g., in act 255) the portion of the personalinformation to the copy of the second software module 72 on thedifferent party mobile phone (e.g., 42), for example, through the mobilephone network 40 (e.g., by SMS). In some embodiments, delivery may becertified, or a notification message may be sent (e.g., by SMS to user21) when delivery has been accomplished, or alternatively, after acertain amount of time or number of attempts when delivery has beenunsuccessful.

In particular embodiments, for example, the portion of the second set ofpersonal information (e.g., transmitted in act 255) includes a travelitinerary, for instance. Thus, in some embodiments, a user is able toconveniently send their travel itinerary to another person. In FIG. 2,in many embodiments, if the user does not instruct particularinformation to be sent to a different party, then the act oftransmitting information to a different party (act 255) is omitted, atleast for that iteration of method 200.

Still referring to FIG. 2, in many embodiments of the invention, and inthe embodiment illustrated, method 200 further includes receiving alocal signal (act 260), transmitting a local signal (act 265) or both.As used herein, a local signal is a signal that is transmitted andreceived without going through the main transmitter that the mobilephone uses for placing telephone calls and without going through themain receiver that the mobile phone uses for receiving telephone calls.In addition, a local signal does not go through the mobile phone network(e.g., 40). For example, a local signal from mobile phone 42 may betransmitted by local transmitter or communications device 82 andreceived (i.e., directly) by reader or communications device 88, or viceversa. Examples of local signals include near field communication (NFC)signals and Bluetooth communication signals, for example, that usetransmitters, receivers, or both (e.g., device 82), on the mobile phonethat are separate from the transmitter and receiver that are used fortelephone conversations.

In particular embodiments, method 200 further includes, for each ofmultiple users, using signal receiving hardware (e.g., device 82 shownin FIG. 1) located on the user's mobile phone (e.g., 42), and using thesecond software module (e.g., 72), under the control of the user (e.g.,user 22), receiving (e.g., in act 260) a local signal from a transmitter(e.g., device 88) within proximity to the mobile phone (e.g., 42).Further, some embodiments of the invention include, for example, foreach of a number of the users, using local signal transmitting hardware(e.g., device 82) located on the user's mobile phone (e.g., 42), andusing the second software module (e.g., 72), under the control of theuser (e.g., 22), transmitting a local signal (e.g., in act 265) thatincludes at least a portion of at least one of the first set of personalinformation (e.g., received in act 205) and the second set of personalinformation (e.g., received in act 215) to a reader (e.g., device 88)within proximity to the mobile phone (e.g., 42). As used herein,“proximity”, in this context, means within ten (10) feet, and “closeproximity” means within one (1) foot.

In particular embodiments, for example, for each of several of theusers, the first set of personal information (e.g., received in act 205)includes at least one of loyalty information and identification of atleast one of a merchant and a service provider, and at least one of thefirst set of personal information (e.g., received in act 205) and thesecond set of personal information (e.g., received in act 215) includesthe loyalty information. Further in some such embodiments, the localsignal (e.g., transmitted in act 265) includes at least a portion of theloyalty information, and the transmitting of the local signal (e.g., act265) includes transmitting the at least a portion of the loyaltyinformation to at least one of the merchant and the service provider.Such a merchant and service provider are examples of the third parties31 to 33 shown in FIG. 1, for example. Thus, a user (e.g., 22) may beable to use their mobile phone (e.g., 42) to store and provide loyaltyinformation, for example, a COSTCO membership, membership to a healthclub, a SAFEWAY card, etc. In some embodiments, insurance informationmay be handled in such a manner, or similarly.

Local signals (e.g., between devices 82 and 88) may also (or instead) beused to make purchases or payments. In certain embodiments, as anexample, for each of multiple users, the first set of personalinformation (e.g., received in act 205) includes at least one of bankcard information and an identification of at least one of a bank and abank card provider. Such a bank or a bank card provider may be furtherexamples of the third parties 31 to 33 shown in FIG. 1, for instance. Insome embodiments, at least one of the first set of personal information(e.g., received in act 205) and the second set of personal information(e.g., received in act 215) includes the bank card information, thelocal signal (e.g., transmitted in act 265) includes the bank cardinformation, and the transmitting of the local signal (e.g., in act 265)includes transmitting the bank card information to at least one of themerchant and the service provider to make or authorize a payment, asexamples. As used herein, the phrase “bank card” includes, for example,credit cards and debit cards, whether or not issued by a bank.

In some embodiments, for instance, using near field communications, auser (e.g., 22) can swipe his or her phone (e.g., 42, or specifically,device 82) past an NFC reader (e.g., device 88) to communicate theuser's bank card number or information for payment for goods orservices, thus eliminating the need to carry or present the bank card.

In the embodiment illustrated, method 200 further includes organizingcertain information (act 270), for example, information that is handledby system 100. For example, in many embodiments of the invention, thesecond software module 72 organizes (act 270), at the mobile phone(e.g., 41), the fraction (e.g., nuggets 78, 79, or both) of the secondset of personal information (e.g., selected in act 220 and transmittedin act 235), which may include, in various embodiments, whereapplicable, decrypting the information, decompressing the information,making the fraction of the second set of personal information accessibleto the user (act 275), for instance, on the user's mobile phone, or acombination thereof. In some embodiments, for each of multiple users,the second software module (e.g., 72) organizes (act 270) the fractionof the second set of personal information based on topic and makes thefraction of the second set of personal information (e.g., nuggets 78,79, or both) accessible (act 275) to the user (e.g., 21), for instance,based on the topic of the information (e.g., in folder or folders 76).

In various embodiments of the invention, some or all of the acts ofmethod 200 may be repeated. For example, in some embodiments (e.g., foreach of some or all of the users) method 200 may involve repeating, atleast a number of times, the receiving (act 215), for example, of thesecond set of personal information, the selecting of the fraction (act220), and the transmitting of the fraction act 235). In manyembodiments, where applicable, the encrypting (act 225), compressing(act 230), providing of an alarm (act 245), transmitting of informationto a different party (act 255), receiving or transmitting (or both) oflocal signals (acts 260, 265, or both), the organizing of theinformation (act 270), the providing of the information to the user (act275) or a combination thereof, may be repeated, as appropriate. Further,in some embodiments, the receiving of information from the user (act205) may be repeated, but may be repeated less often than certain otheracts, such as the receiving of information from third parties (act 215),for instance.

In many embodiments (e.g., for each of multiple users), the repeatingincludes (e.g., as part of act 270) replacing at least a portion of thefraction of the second set of personal information that is stored on theuser's mobile phone, while maintaining the organization of theinformation, for instance, based on the topic of the information.Further, in various embodiments, for each of more than one of the users,the repeating includes (e.g., as part of act 270) synchronizing at leasta portion of the fraction of the second set of personal information thatis stored on the user's mobile phone with corresponding personalinformation that was already stored on the mobile phone, whilemaintaining the organization of the information based on the topic ofthe information. As used herein, “synchronizing” of information includesboth replacing and appending the information, while sorting ormaintaining a sorted organizational structure based on topic. Topics mayinclude, for example, travel information, account information (which maybe sorted for different accounts), bank card information, loyaltyinformation, insurance information, etc.

In various embodiments, a user (e.g., 22) may be able to use a mobilephone (e.g., 42) to gain access to a physical space, such as anelevator, floor or area of a building, parking garage, etc. Access maybe obtained, in some embodiments, for example, by passing the phone(e.g., 42) by or over a reader (e.g., communications device 88),transmitting a local signal (e.g., in act 265), for example, using nearfield communication (NFC). In some embodiments, for instance, user 22selects the desired code or number on phone 42, and then rubs phone 42against the reader or device 88 or passes phone 42 over or by device 88.In certain embodiments, user 22 may provide or select the code by name,for example, “elevator”, which may be selected from a menu on mobilephone 42 or input as a voice command, for instance.

In some embodiments, phone 42 may then transmit (e.g., in act 265) alocal signal containing a code that the reader (e.g., device 88) willunderstand, for example, to identify user 22. In such embodiments, phone42 may have local transmitter or communications device 82, which may bean NFC antenna, for example. In some embodiments, an NFC antenna (e.g.,local transmitter or device 82) may be retrofitted onto a preexistingphone 42 by replacing a back or battery cover of the phone with a coverhaving an antenna, circuitry, or both. In other embodiments, an NFCantenna (e.g., local transmitter or device 82) may be an originalequipment component of phone 42, for example.

Some embodiments may use (e.g., for local transmitter or communicationsdevice 82) Bluetooth communication for particular functions in additionto or instead of NFC. For example, Bluetooth may be used for access toparking areas, and a user carrying a phone may be given access in someembodiments without a need to open the car window. Other embodiments mayuse WiFi or other forms of communication such as infrared, bar codes, orthe like. And in some embodiments, transponders may be used. In additionto providing access, such use of mobile phones and local signals may beused to track who has accessed particular areas, track movement ofemployees or other people, verify that employees are working quicklyenough, verify that employees or others are traveling at safe speeds,track work or break times, etc., which may be published in one or morereports.

In some embodiments, a user (e.g., 22) may make selections, identifydesired actions, provide assent, or perform other affirmative acts, bypassing the phone (e.g., 42) by a reader (e.g., device 88) or acombination of several readers. For example, a user in a store mayobtain information on a particular product by passing the user's phoneby a particular reader (e.g., device 88). Or, in some embodiments, auser may identify potential gifts for a bridal registry or identify alarge item to be picked up at the register, as other examples. Further,in particular embodiments, a user may be able to subscribe, in such amanner, to particular advertisements, for example, for a particular typeof product or from a particular source. Further, phone 42 may be able tobe used in a similar manner, in some embodiments, by passing phone 42past reader or device 88, to show membership (e.g., to COSTCO or to agym or country club) to obtain frequent flyer miles, to get discountsthat are provided to holders of loyalty cards, or the like. In otherembodiments, a user may make affirmative acts in other ways, forexample, responding to questions displayed on a phone by pressing one ormore buttons, for example, on the phone.

In some embodiments, a phone may provide identification of the user. Forexample, phone 42 may contain and provide user 22's driver's licensenumber, social security number, credit card number, account number,address, phone number, employee ID number, birth certificate, proof ofcitizenship, proof of legal residency, security clearance, passportnumber, visa number, criminal record, credentials, badge number, or thelike, for example, through transmitter or local communications device82. For example, in particular embodiments, in an airport, the phone mayindicate a higher level of security which may permit the user to bypassof some or all of security. In addition, in certain embodiments, if aphone is lost or stolen, the authorized user may be able to wipe thephone of personal information, locate the phone, disable the phone, or acombination thereof, for example, with another phone or through website65, for example. Such an action may be accomplished by sendinginstructions to the phone (e.g., through mobile phone network 40), andin the case of locating the phone, instructing the phone to provide itsGPS coordinates, other location information, or both. In someembodiments, this may require entering at least one code or password,for instance. Further, it may be possible, in some embodiments, toreload the information back onto the phone, or onto a new or otherphone, from an archive, for instance, at website 65.

In some embodiments, the mobile phone (e.g., software module 72 on phone41) may lock to prevent the user (e.g., 21, or another user who mightnot be authorized) from accessing information if the software (e.g., 72)or the phone (e.g., 41) has not been used for a specified period oftime, or if the user has repeatedly failed to provide the correctpassword for the software (e.g., 72). In other embodiments, the software(e.g., software module 72 on phone 41) may provide the GPS coordinatesof the phone (e.g., to module 61 on server 15) at regular intervals,upon accessing or exiting the software (e.g., 72), upon accessing thephone (e.g., 41), upon turning the phone off, upon turning the phone(e.g., 41) on, upon running out of battery charge, or a combinationthereof, as examples.

In a number of embodiments, a mobile phone may contain insuranceinformation, as an example of a topic of personal information, which mayinclude, for example, proof of insurance (e.g., automobile or healthinsurance), coverage, payment dates, preferred providers, contractterms, and the like. In some embodiments, the user (e.g., 21 to 23) maybe reminded (e.g., provided an alarm in act 245) to make payments,obtain expanded coverage, make or keep an appointment, or the like, viathe phone (e.g., 41 to 43). For instance, in some embodiments, a usermay be prompted (e.g., provided an alarm in act 245) through the phoneto authorize payment, for example, for insurance, utilities, mortgage orhouse payments, rent, credit card payments, various bills, etc. Inanother example, a user may be reminded (e.g., provided an alarm in act245) to obtain automobile insurance for another country when travelinginto or near that country, and in some embodiments, it may be possibleto purchase such insurance over the phone, obtain proof of insurance onthe phone, or both, as examples.

As described herein, specific embodiments include, among other things,ways to communicate information to other electronic devices, and, incertain embodiments, ways to affirmatively make selections. In someembodiments, the electronic device or reader (e.g., device 88) may querythe phone (e.g., 42) for the particular information that is needed, ahandshake routine may be followed, or both. In some embodiments, anaffirmative act of assent may be required, at least for certainfunctions, for example, to authorize a transaction or payment, or toauthorize access. Such an act of assent may include, in someembodiments, for example, user 22 entering a personal identificationnumber (PIN) or a password into a graphical user interface or keyboardon the mobile phone, providing a signature on a touch pad, providing abiometric, passing the phone (e.g., 42) by an NFC reader (e.g., device88), or the like.

Further, in some of these embodiments, for yet another example, thefirst software module (e.g., module 61) includes programminginstructions to receive (e.g., in act 205) instructions from the useridentifying at least one threshold for alarm (e.g., used in act 240) forat least a portion of the particular information (e.g., nugget 78). Insome of these embodiments, at least one of the first software module(e.g., 61) and the second software module (e.g., 72) includesprogramming instructions to compare (e.g., in act 240) at least aportion of the particular information to the threshold. And in some suchembodiments, at least one of the first software module (e.g., 61) andthe second software module (e.g., 72) includes programming instructionsto provide an alarm (e.g., in act 245) to the user if the particularinformation passes the threshold (e.g., in act 240).

As mentioned, in some embodiments, certain methods of managinginformation for users using the Internet and mobile phones involveextracting information from e-mails and sending the information to themobile phones. Particular such methods include (e.g., as or within act215), an act of receiving e-mails, for instance, from third parties. Forexample, in some embodiments, for each of multiple users (e.g., users 21to 23), method 200 includes an act of receiving at an informationsorting software module (e.g., 67), a plurality of (e.g., select)e-mails containing information about the business of the user, whereinthe user has caused the select e-mails to be sent to the informationsorting software module. A user may, for example, cause (e.g., select)e-mails to be sent to an information sorting software module (e.g., 67)through the entering or selection of information (e.g., in act 205) orby downloading or enabling software module or plug-in 17, as examples.

Such examples of method 200 may also include, for example, for each ofnumerous users, using the information sorting software module (e.g.,67), an act of searching at least two of the select e-mails for at leastone of keywords and identifying numbers, and also for each of multipleusers, using the information sorting software module (e.g., 67), an actof extracting the particular information from the select e-mails (e.g.,act 220). As used herein, this act of extracting particular informationdoes not mean or include forwarding or sending (e.g., in act 235) thewhole e-mail. Rather, a portion (i.e., less than all) of the informationwithin the e-mail is extracted (e.g., in act 220) to be sent (e.g., inact 235).

In a number of embodiments, such examples of method 200 also include,for each of numerous users (e.g., users 21 to 23 shown in FIG. 1),sending (e.g., in act 235) the particular information to the user'smobile phone (e.g., phone 41 of user 21) through a mobile phone network(e.g., 40) for storage on the user's mobile phone (e.g., 41) and accessby the user (e.g., 21). In some embodiments, the particular informationthat is sent may be, contain, or be similar to, the nuggets (e.g., 78and 79, and may be stored, for example, within folder 76, by module 77,for example). In some embodiments, software module 67 on server 15 maybe a sorting software module, and may perform or initiate the acts ofreceiving the e-mails (e.g., act 215), searching for keywords oridentifying numbers (or both) and extracting the particular information(e.g., in act 220), and in some embodiments, transmitting or sending(e.g., act 235) the particular information. In some embodiments, theparticular information may be the same or similar to the fraction of theinformation described herein, for example, with reference to acts 220 to235.

In many embodiments, method 200 also includes acts of repeating, forexample, multiple times, the searching (e.g., part of act 220), theextracting (e.g., part of act 220), and the sending (e.g., act 235).Various embodiments of such methods may be performed in various ordersand may include additional acts. For example, in some embodiments,method 200 may include, (e.g., for each of more than one of the users 21to 23), after the extracting of the particular information (e.g., in act220), and before the sending of the particular information (e.g., in act235), for example, to the user's mobile phone (e.g., 41 to 43), acts ofencrypting the particular information (act 225), compressing theparticular information (act 230), or both. In some embodiments, theinformation sorting software module (e.g., 67), extracts the particularinformation (e.g., in act 220) only from a fraction of the selecte-mails. In such embodiments, the e-mails may be searched for keywordsor identifying numbers (or both) (e.g., in act 220, or in a previousoperation), and the particular information may be extracted or selected(e.g., in act 220) only from the e-mails that have those keywords oridentifying numbers.

Further, in some embodiments, for multiple users, before the receivingof the (e.g., select) e-mails (e.g., in act 215), method 200 alsoincludes an act of configuring the user's e-mail handling softwaremodule (act 212). For example, the user's e-mail handling module may beconfigured to automatically forward incoming e-mails from at least oneparticular third party (e.g., at least one of third parties 31 to 33) toinformation sorting module 67. In such embodiments, the select e-mailsmentioned herein may include (or be) the incoming e-mails from the (atleast one) particular third party (e.g., one or more of third parties 31to 33). As an example, plug-in module 17 may be added to MICROSOFTOUTLOOK on computer 13 of user 23, and may provide functionality toautomatically forward e-mails that are sent to an e-mail account of user23 from particular senders to module 67 (e.g., via the Internet 10).

In other embodiments, a user's e-mail handling module may be configured,or a plug-in or software module may be added (e.g., module or plug-in14), that will search e-mails for keywords or identifying numbers (orboth), select the particular information, perform tasks associated withact 220 or even acts 220 to 235, or a combination thereof, as examples,which may result in a select set of e-mails, the particular information,a fraction of the information, nuggets of information, or the like. Insuch embodiments, the user's computer (e.g., computer 13 of user 23), orsoftware running on the computer (e.g., module or plug-in 14 on computer13), may perform tasks described herein for software module 67. In somesuch embodiments, software module 67 may not be needed. In otherembodiments, on the other hand, some or all of such tasks may beperformed at server 15, software module 61, or software module 67, asexamples. In different embodiments, tasks described herein as beingperformed by modules 14, 17, and 67, may in other embodiments bedescribed by others of such modules.

Moreover, some examples of method 200 further include, for various ofthe users (e.g., 21 to 23), for example, before the receiving of theselect e-mails (e.g., in act 215), instructing (e.g., in act 205) atleast one particular third party (e.g., of 31 to 33) to send e-mailscontaining information about the business of the user to the informationsorting module (e.g., 67). These select e-mails may include (or be), forexample, e-mails containing information about the business of the user.In various embodiments, the users (e.g., 21 to 23) may provide theseinstructions through the Internet 10 (e.g., user 23 may provide theseinstructions via computer 13), through their mobile phones (e.g., 41 to43), or both. In addition, in various embodiments, users (e.g., 21 to23) may provide these instructions through module 61 or website 65, ordirectly to the third parties (e.g., 31 to 33), for example, through theInternet 10, mobile phone network 40, or both.

In some embodiments, as another example, the searching of the e-mails(e.g., in act 220 or otherwise) includes (e.g., for each of numeroususers), searching for e-mails from at least one particular sender (e.g.,from one particular e-mail address), and the extracting of theparticular information (e.g., in act 220) includes extracting theparticular information only from the e-mails from the at least oneparticular sender.

In particular embodiments, (e.g., for each of multiple users); method200 may include acts of receiving instructions (e.g., in act 205) fromthe user (e.g., one of users 21 to 23), and identifying at least onecriteria or threshold for alarm for at least a portion of the particularinformation. In some such embodiments, after the extracting of theparticular information (e.g., act 220), method 200 may include comparing(e.g., in act 240) at least a portion of the particular information tothe criteria or threshold for alarm, and providing an alarm (e.g., inact 245) to the user (e.g., one of users 21 to 23) if the particularinformation satisfies the criteria or passes the threshold, as examples.

For instance, in some such methods, (e.g., for each of various users),the particular information includes financial account informationincluding an amount of a withdrawal or a debit from an account, and thethreshold is an amount of the withdrawal or debit beyond which the alarmis provided (e.g., in act 245). In another example, (e.g., for each of anumber of the users), the particular information includes travelinformation including a departure time or a departure location (orboth), and an alarm is provided (e.g., in act 245) if (e.g., asdetermined in decision activity 240) there is a change in the departuretime or the departure location (or both). In specific embodiments, forexample, the travel information includes flight information, forinstance, including the departure time and a departure gate, and thealarm is provided (e.g., in act 245) if there is a change in either thedeparture time or the departure gate.

Still other embodiments include, (e.g., for multiple users 21 to 23),upon instruction by the user (e.g., user 21), transmitting (e.g., act255) at least a portion of the particular information to a third party(e.g., 22) mobile phone (e.g., 42) for instance, through mobile phonenetwork 40, for storage on the third party mobile phone (e.g., 42), foraccess by the third party (e.g., user 22). In some such embodiments, theat least a portion of the particular information (e.g., transmitted inact 255) does not include a complete e-mail (e.g., an e-mail received byuser 21 or by module 67, and forwarded to user 22). As an example, insome embodiments, the (at least a portion of the) particular informationincludes a travel itinerary (e.g., of user 21). Thus, user 21 can easilysend his travel itinerary (or other of the particular information) toanother person, to facilitate such communication.

Turning now to FIG. 3, this flowchart illustrates, among other things,various methods of authorizing an action and various methods ofauthenticating access, as examples. Most of the various acts of method300 may be performed, for example, in an automated process, forinstance, by server 15, module 61, or both, shown in FIG. 1. In variousembodiments, method 300 may be performed by a company or business, forinstance, as a service for other companies or businesses, or the like.

In the embodiment illustrated, in various methods of authorizing anaction, method 300 includes receiving (act 303), for example, from aperson having authority to authorize the action, an identification of afirst phone number for obtaining authorization for the action. Such aperson having authority to authorize the action may be, for example, oneof users 21 to 23 shown in FIG. 1. In some embodiments, the personhaving authority to authorize the action may provide the phone number(e.g., received in act 303) through their computer or mobile phone, forexample. For instance, if user 23 is the person having authority toauthorize the action, user 23 may provide the phone number (e.g.,received in act 303) of phone 43 via phone 43 or via computer 13 andwebsite 65.

In some embodiments, the person having authority to authorize the actionmay enter or key in the phone number directly, while in otherembodiments, the person (e.g., user 23) may enter or select a name, forexample, or other identifier or indicia, which may be used (e.g., in act303, for instance, by server 15 or module 61) to look up the appropriatephone number (e.g., of phone 43). In some embodiments, the person havingauthority to authorize the action may select the phone number, forexample, from a menu, or the number may be read automatically from theperson's phone or from a caller ID feature or service when the phone isused. As used herein, all such are examples of acts (e.g., 303) ofreceiving, from a person having authority to authorize the action, anidentification of a first phone number for obtaining authorization forthe action.

In the embodiment illustrated, method 300 also includes an act (309) ofreceiving, for instance, from a person seeking the action, a request forauthorization of the action. In different embodiments, acts 303 and 309may occur in either order, including, for example, the order shown inFIG. 3. In different embodiments or different situations, the personseeking the action (e.g., who requests authorization in act 309) and theperson having authority to authorize the action (e.g., who provides thenumber in act 303) may be the same person, or may be different people(e.g., of users 21 to 23).

After the receiving of the identification of the first phone number(e.g., in act 303), and after the receiving of the request forauthorization (e.g., act 309), in the embodiment illustrated, method 300also includes an act (315) of sending a first message, for example,through a mobile phone network (e.g., 40 shown in FIG. 1) to a firstmobile phone, for instance, having the first phone number. In suchembodiments, the first message (e.g., of act 315) may include adescription of the action for which authorization is requested, forexample. In some embodiments, the first phone message is sent (e.g., inact 315) automatically (i.e., it is automated), meaning herein thatother than making the request for authorization (e.g., received in act309), and providing the number and any criteria (e.g., received in oneor both of acts 303 and 309), no human interaction is involved (i.e.,between acts 309 and 315).

In addition, in the embodiment illustrated, after the sending of thefirst message (e.g., after act 315), method 300 includes an act (321) ofreceiving, for example, from the first mobile phone, (i.e., having thefirst phone number) a second message, which may authorize the action. Invarious embodiments, the second message (e.g., received in act 321) maybe the result of the person who controls the phone taking an affirmativeaction to indicate authorization of the action (act 318). Act 318 may beperformed, by one of users 21 to 23 shown in FIG. 1, for example.

In some embodiments, the first message (e.g., of act 315) includes atleast one menu and at least one prompt to authorize the action by makinga selection from the menu. The person who controls the phone may take anaffirmative action to indicate authorization of the action (act 318) bymaking a selection from the menu, for example. In some embodiments,authorization is indicated (act 318) and the second message authorizingthe action is sent (e.g., which is received in act 321) by pressing, forexample, a single button on the mobile phone, after the first message(e.g., sent in act 315) is received by the mobile phone. As used herein,“pressing a single button” does not include such actions such as openinga flip phone, scrolling to view a message, or pressing “send”. In otherwords, when determining how many buttons have been pressed, opening aflip phone, scrolling to view a message, or pressing “send”, are notcounted.

In some embodiments, the first message (e.g., sent in act 315), thesecond message (e.g., received in act 321), or both, are SMS messages.One or both (e.g., of the first and second messages sent in act 315 andreceived in act 321, respectively) may be transmitted (e.g., sent andreceived) through the mobile phone network (e.g., 40 shown in FIG. 1).Further, in some embodiments, the first message, (e.g., sent in act315), the second message (e.g., received in act 321), or both, are voicemessage, as further examples, which may be computer generated,interpreted using voice recognition software, or both, as examples. Insome embodiments, the first message (e.g., sent in act 315), may be avoice message, while the second message (e.g., received in act 321), isan SMS message. Other embodiments may have other combinations.

In the embodiment illustrated, method 300 also includes an act (327) ofevaluating whether the second message (e.g., received in act 321)authorizes the action. If so, then (in act 330) the action may beallowed, facilitated, or performed, as examples. Some embodimentsinclude an act of allowing the action (act 330) only if the secondmessage is received (e.g., in act 321) and the second message authorizesthe action (e.g., as determined in act 327). Some embodiments furtherinclude repeating the receiving of the request for authorization of theaction (e.g., act 309), the sending of the first message (e.g., act315), and the receiving of the second message (e.g., act 321). Theseacts may be repeated, for example, for requests for different actions,requests for the same action for different people, requests for the sameaction or same person at different times, etc.

Further still, some of these embodiments further include an act (312) ofencrypting the first message, for example, before the sending of thefirst message (e.g., act 315), for instance, to the first mobile phone.Some embodiments also (or instead) include an act (324) of decryptingthe second message, for example, after the receiving of the secondmessage (e.g., act 321), for instance, from the first mobile phone. Insuch embodiments, the first mobile phone may decrypt the first messageand encrypt the second message, as examples. In some embodiments,compression and decompression may also (or instead) be utilized.

In some embodiments, prior to the receiving of the request forauthorization of the action (e.g., act 309), the first phone number isreceived (e.g., in act 303) through an Internet website (e.g., website65 via the Internet 10 shown in FIG. 1), the mobile phone network (e.g.,40), or both. Some embodiments further include an act (306) ofreceiving, for instance, through an Internet website (e.g., website 65via the Internet 10) or a mobile phone network (e.g., 40), or both, forexample, from each of numerous persons having authority to authorize theaction, an indication of a criteria for obtaining authorization for theaction, for instance, for that particular person. Such a criteria may betyped in or entered verbally by the person, or may be selected by theperson from one or more menus, for example. In some embodiments, act 306may be similar to act 205 shown in FIG. 2 and described herein. Further,in some embodiments, act 303 may be included within act 306 or viceversa, or acts 303 and 306 may be performed in another order.

As an example, in some embodiments of method 300, act 306 includesreceiving, for instance, from the person having authority to authorizethe action, through at least one of the Internet website (e.g., website65 via the Internet 10 shown in FIG. 1) and the mobile phone network(e.g., 40), an identification of time limits for sending the firstmessage (e.g., in act 315). In many such embodiments, the sending of thefirst message (e.g., act 315) may be performed only in accordance withthe time limits. For example, in some embodiments, the person may notwant to be prompted for certain kinds of authorization during certainnighttime hours, and may enter a criteria or make selectionsaccordingly.

In a number of embodiments, the person who controls the phone (e.g., whois in a position to indicate authorization in act 318) is, in fact, oris intended to be, the person having authority to authorize the action(e.g., from whom the number was received in act 303, criteria wasreceived in act 306, or both). In other embodiments, the person whocontrols the phone is, in fact, or is intended to be, a person who isauthorized by the person having authority to authorize the action (e.g.,from whom the number was received in act 303, criteria was received inact 306, or both). Further, some embodiments provide certain assurancesthat the person who controls the phone is the correct person.

For example, in some embodiments, the second message (e.g., received inact 321) includes a password or an authorization code which has beenmemorized by the person having authority to authorize the action andkeyed into the first mobile phone (e.g., in act 318) after receiving thefirst message (e.g., sent in act 315) and before sending the secondmessage (e.g., received in act 321). As another example, certainembodiments include, for example, in the first message (e.g., in act315), an act of asking a personal question about the person havingauthority to authorize the action who is expected to be in control ofthe mobile phone. Such embodiments may also include, in the secondmessage (e.g., in act 321), an act of receiving a present answer to thepersonal question. Such embodiments may further include (e.g., in act327) an act of comparing the present answer to a previous answer to thepersonal question provided (e.g., in act 306), for instance, by theperson having authority to authorize the action.

In a number of embodiments, the first message (e.g., sent in act 315)identifies the person seeking the action. And in some embodiments, thefirst message (e.g., sent in act 315) also (or instead) identifies theaction being requested (e.g., in act 309). Such information may bevaluable, for example, in embodiments or situations where the personrequesting the authorization (e.g., in act 309) is different than theperson who has the authority to authorize the action (e.g., thatprovided the number received in act 303, to which the first message wassent in act 315, who indicates the authorization in act 318, etc.). Insome embodiments, on the other hand, the first mobile phone iscontrolled by the person seeking the action (e.g., who requests theauthorization received in act 309), and in some embodiments, the personseeking the action (e.g., who requests the authorization received in act309) is the same person having authority to authorize the action (e.g.,in act 303, act 318, or both).

Moreover, some embodiments further include an act (e.g., within act 306)of receiving, from the person having authority to authorize the action,for instance, through the Internet website (e.g., website 65 via theInternet 10 shown in FIG. 1) or the mobile phone network (e.g., 40), orboth, an identification of a second phone number for advising a thirdperson of the action (e.g., the action for which a request is receivedin act 309, which is allowed in act 330, or both). Some such embodimentsinclude an act (e.g., 333), for example, after receiving the request forauthorization (e.g., in act 309), of automatically sending the firstmessage, the second message, a third message, or a combination thereof(e.g., in act 333), to the second phone number. The act (333), ofnotifying the third person, may include, for example, sending adescription of the action for which authorization is requested,identifying the person requesting the action (e.g., in act 309), orboth, as examples.

In the embodiment illustrated, method 300 further includes act 336 oftracking the authorization granted for the action over time, which mayinclude reporting results of the tracking. For example, a report may beissued which may indicate which authorizations were requested (e.g., inact 309), when authorizations were requested, who requested suchauthorizations, whether and when authorizations were granted (e.g., inact 318), and whether or when actions were allowed (e.g., in act 330).In some embodiments, such a report or data may be provided (e.g., in act336) to or through the (e.g., first or second) mobile phone, forexample, as SMS messages or nuggets of information described herein, asexamples.

In some embodiments, information may be provided via a local signal(received in act 307). Act 307 may be similar to act 260 shown in FIG. 2and described herein with reference thereto. A local signal may bereceived (e.g., in act 307), for example, via local communicationsdevices 88 and 82 shown in FIG. 1 and described herein with referencethereto, wherein device 88 is receiving and device 82 is transmitting. Alocal signal may be received (e.g., in act 307), via NFC, for instance,and may be received (e.g., in act 307) when the mobile phone is passedby a reader (e.g., device 88).

In different embodiments, different types of actions are requested(e.g., in act 309), authorized (e.g., in act 318), and allowed (e.g., inact 330). Some embodiments are limited to particular types of actions.For example, some actions involve providing access, physical orotherwise, and some embodiments involve transfer of funds or money fromone entity or account to another, for instance. As a specific example,in some embodiments, the action is granting of computer access toelectronically stored information, and the person seeking the action(e.g., requesting the authorization in act 309) is seeking the computeraccess to the electronically stored information. Embodiments of method300 may be used to provide computer access, for example, instead of apassword, if a password has been forgotten, or in addition to apassword, for example, to provide an added level of security in case anunauthorized user has obtained the password. In some such embodiments,the first message (e.g., of act 315) may include a description of thecomputer access or electronically stored information for whichauthorization is requested.

In another example, the action is granting of physical access to acontrolled space and the person seeking the action (e.g., requesting theauthorization in act 309) is seeking the physical access to thecontrolled space. Physical access may be controlled, for example, to abuilding, part of a building, a floor of a building, a room, anenclosure, a compound, a storage area, a parking area, a road, furnituresuch as a desk or filing cabinet, a safe, etc. In such embodiments,physical access may be allowed (e.g., in act 330), for example, byelectronically unlocking or opening a door, gate, or compartment, byallowing an elevator to reach a particular floor, etc. In suchembodiments, the first message (e.g., of act 315) may include adescription of the room, floor, building, space, etc., for whichauthorization for access is requested.

In another specific example, in particular embodiments, the action(e.g., requested in act 309, authorized in act 318, allowed in act 330,or a combination thereof) is (or includes) a financial transaction, thefirst message (e.g., sent in act 315) includes an amount of thetransaction, and the second message (e.g., received in act 321) includesan authorization (e.g., from act 318) of the transaction. Some suchembodiments include (e.g., in act 306), receiving from the person havingauthority to authorize the action, for example, through an Internetwebsite (e.g., website 65 via the Internet 10 shown in FIG. 1) or amobile phone network (e.g., 40), or both, an identification of athreshold monetary value of transactions. In some such embodiments, thefirst message is sent (e.g., act 315) for transactions exceeding thethreshold, and transactions below the threshold are approved orauthorized without sending the first message (e.g., without acts 312through 327).

Further, in some embodiments, the transaction is (or includes) awithdrawal or a debit from a bank account and the person havingauthority to authorize the action is an authorized user of the account.Thus, in some embodiments, a user (e.g., 21 to 23 shown in FIG. 1) canelect (e.g., in selecting or indicating the criteria that is received inact 306) to be notified via their phone (e.g., 41 to 43) of largewithdrawals or debits (e.g., in act 315), but not to be bothered (e.g.,by a first message sent in act 315) with smaller (e.g., routine)withdrawals or debits. Furthermore, in a number of embodiments, the usermust authorize (e.g., in act 318) the larger transactions, thusprotecting the user, the bank (or other financial institution), or bothfrom losses resulting from unauthorized withdrawals or debits.

In some embodiments, the first message (e.g., sent in act 315) mayinclude the balance of the account, and even where debits or withdrawalshave been authorized, method 300 may help the user to avoid overdrawingthe account. And in some embodiments, the user can choose the thresholdamount above which authorization is required. As used herein, accountsheld at credit unions and other businesses that receive deposits offunds from various customers, hold the funds in accounts, and return thefunds to the customers upon request, are considered to be “bankaccounts”.

In another example, in particular embodiments, the transaction (e.g.,requested in act 309, authorized in act 318, allowed in act 330, or acombination thereof) is (or includes) a bank card expenditure made at apoint of sale for a purchase of goods or a payment for services. In somesuch embodiments, the person having authority to authorize the action isan authorized user of the bank card. As used herein, the term “bankcard” includes, but is not limited to, credit cards, debit cards, andthe like. In some such embodiments, the bank card has a bank cardnumber, and the method further comprises, for example, before thesending of the first message (e.g., in act 315), an act of receiving thebank card number from the first mobile phone via a local signaltransmitted from the first mobile phone (e.g., where the local signal isreceived in act 307).

In certain embodiments, as another example, the transaction (e.g.,requested in act 309, authorized in act 318, allowed in act 330, or acombination thereof) is (or includes) an expenditure made from a creditor debit account at a point of sale for a purchase of goods or a paymentfor services, the person having authority to authorize the action (e.g.,user 22) is an authorized user of the account, the account has anaccount indicia, and the method further includes, before the sending ofthe first message (e.g., act 315), an act of receiving (e.g., act 307)the account indicia from the mobile phone (e.g., 42) via a local signaltransmitted from the mobile phone (e.g., from communication device 82).As used herein “account indicia” includes credit card numbers, debitcard numbers, and combinations of letters, numbers, symbols, or acombination thereof, that identifies an account from which a user canmake credit or debit charges using the indicia.

In further examples, in some embodiments, the transaction (e.g., theapproval of which is the action requested in act 309, authorized in act318, allowed in act 330, or a combination thereof) is (or includes) anexpenditure made from a credit or debit account at a point of sale for apurchase of goods or a payment for services, the person having authorityto authorize the action is an authorized user of the account, and thesecond message (e.g., received in act 321) includes an authorizationcode which has been memorized by the person having authority toauthorize the action and keyed into the first mobile phone afterreceiving the first message (e.g., sent in act 315) and before sendingthe second message (e.g., received in act 321). The keying in of theauthorization code may constitute, or be included within, the act ofindicating authorization (act 318), for example.

In addition, in some embodiments, the transaction (e.g., the approval ofwhich is the action requested in act 309, authorized in act 318, allowedin act 330, or a combination thereof) is (or includes) an expendituremade from a credit or debit account at a point of sale for a purchase ofgoods or a payment for services, the person having authority toauthorize the action is an authorized user of the account, the accounthas an account indicia, and the second message (e.g., received in act321) includes the account indicia. In an example of such an embodiment,a customer provides a merchant with his phone number, either verbally orby keying it into a key pad, as examples. Then the merchant sends orcauses to be sent the first message (e.g., in act 315) to the customer'smobile phone. Then the customer presses one or more buttons on the phoneto indicate authorization of the transaction (e.g., act 318), and thephone sends the second message (e.g., received in act 321) to themerchant, along with the customer's credit or debit card number to becharged.

In other embodiments, the customer's phone number may be received by themerchant via a local signal (e.g., in act 307) when the customer passeshis mobile phone by a local receiver (e.g., reader or device 88 shown inFIG. 1). And in other embodiments, the acts of sending the first message(315), receiving the second message (321), or both, may be performed bya service provider rather than directly by the merchant. In someembodiments, the second message (e.g., received in act 321) is (orincludes) an SMS message received through the mobile phone network(e.g., 40) and method 300 further includes, before the act of sending ofthe first message (e.g., act 315), an act of receiving from the personseeking the action, or from the first mobile phone, the first phonenumber. In different embodiments, or different situations, the personseeking the action may provide the phone number verbally, through akeyboard, or by passing the phone by a reader (e.g., device 88), asexamples.

Other methods of authenticating a transaction that are illustrated byFIG. 3 include (at least) the act of receiving through an Internetwebsite (e.g., 65) or a mobile phone network (e.g., 40) (or throughboth), from each of multiple users (e.g., 21 to 23), for instance, anindication of a criteria for the user for obtaining authorization fortransactions (act 306). Such embodiments may also include, for each ofmore than one of the users (e.g., 21 to 23), an act of sending a firstautomated message (e.g., act 315), for example, through mobile phonenetwork (e.g., 40) to a mobile phone (e.g., 41 to 43) of the user, themessage containing an amount of the transaction and requesting anaffirmative action (e.g., in act 318) to indicate authorization of thetransaction. And such methods may also include, for instance, for eachof at least a number of the users (e.g., 21 to 23), receiving from themobile phone (e.g., 41 to 43) of the user, a second message (e.g., inact 321) indicating that the user (e.g., 21 to 23) of the mobile phonehas taken the affirmative action (e.g., in act 318) to indicateauthorization of the transaction.

Such an affirmative action (e.g., in act 318) may be pressing a button,making a selection from a menu, entering a voice command, entering apassword or authorization number, etc. Various examples of actions thatmay be allowed (e.g., in act 330) in different embodiments are describedherein. In a number of different embodiments, such acts may be combinedin various combinations or with other acts or features (or both)described herein.

In addition to other things, FIG. 3 also illustrates various methods ofauthenticating access. In particular examples, such embodiments ofmethod 300 include, (e.g., in the order illustrated, or in anothersuitable order) various acts. Some such embodiments include, forexample, the act of receiving from a person seeking access (e.g., fromone of users 21 to 23 shown in FIG. 1), identification indicia for theperson seeking the access (e.g., in act 309). In various suchembodiments, the identification indicia may be or include the name ofthe person, a user ID or identification number for the person, or thephone number for the person, as examples.

Some embodiments include, for example, after the act of receiving theidentification indicia (e.g., act 309), and before the act of sending ofthe first automated message (e.g., act 315), an act (310) of looking upthe requester (e.g., the person who made, or allegedly made, the requestfor authorization in act 309). In particular embodiments, this (e.g.,act 310) may involve looking up the identification indicia (e.g.,received in act 309) in a database (e.g., in storage 64), and obtainingfrom the database a phone number for the mobile phone of the personhaving authority for the access (e.g., to which the first message issent in act 315).

In embodiments where the identification indicia includes the phonenumber for the mobile phone of the person having authority for theaccess (e.g., to which the first message is sent in act 315), the act oflooking up the requester (e.g., act 310) may involve verifying that thephone number corresponds to that of a (or the) person having authorityfor access. In embodiments where the request for authorization (e.g.,received in act 309) includes more than one indicia, the act of lookingup the requestor (310) may include verifying that some or all of theindicia are consistent, correspond to the same person, are correct, etc.

In a number of embodiments, method 300 may also include an act ofsending a first (e.g., automated) message (e.g., act 315), for example,through mobile phone network 40 shown in FIG. 1, to a mobile phone of aperson (e.g., identified in act 309 or 310) having authority for theaccess. In such embodiments, “automated” means that the first message issent (e.g., in act 315) by machines, for example, by one or morecomputers, servers, software, or the like. For example, in someembodiments, the first message is sent (e.g., in act 315) by server 15,software module 61, or both, shown in FIG. 1, in response to receivingthe request for authorization (e.g., in act 309). In some embodiments,the first (e.g., automated) message is sent (e.g., in act 315) to thephone number of the person identified in act 310 as having authority forthe access.

In some of these embodiments, the act of sending the first message(e.g., act 315) includes or consists of sending the first message (e.g.,through mobile phone network 40) to a mobile phone of the person seekingthe access. In other words, the person seeking access and the personhaving authority for access are, or are assumed to be, the same person,in some embodiments. On the other hand, in other embodiments, the personseeking the access is a first person, the person having authority forthe access is a second person (i.e., a different person). In many suchembodiments, the first message (e.g., sent in act 315) includes anidentification of the first person who is seeking the access. Such anidentification may be, or include, part or all of the indicia (e.g.,received in act 309), or that is obtained (e.g., in act 310) withreference thereto.

In some embodiments, the first automated message (e.g., sent in act 315)includes an identification of the access requested and a request for anaffirmative action to indicate authorization of the access. In otherembodiments, the first automated message (e.g., sent in act 315)includes a password. And in some embodiments, the first automatedmessage (e.g., sent in act 315) includes an identification of the accessrequested, a request for an affirmative action to indicate authorizationof the access, and a password.

Many such embodiments of method 300 also include the act of receivingthe password (act 319), for example, from the person seeking the access.Further, many embodiments include the act of receiving, for example,from the mobile phone of the person having authority for the access, asecond message (e.g., act 321) indicating, for example, that the personhaving authority for the access has taken the affirmative action toindicate authorization of the access. Some embodiments include act 319but not act 321 (e.g., wherein the first message, sent in act 315,includes a password, but not a request for a response or a secondmessage), some embodiments include act 321 but not act 319 (e.g.,wherein the first message, sent in act 315, includes a request for aresponse or a second message, but not a password), and some embodimentsinclude both act 319 and act 321 (e.g., wherein the first message, sentin act 315, includes a request for a response or a second message, and apassword).

In a specific example, a number of embodiments involve sending the firstautomated message (e.g., act 315) through the mobile phone network(e.g., 40) to the mobile phone of the person having authority for theaccess, wherein the first automated message contains the password. Suchmethods may also include receiving the password from the person seekingthe access (act 319). In some such embodiments, for example, the personseeking the access is seeking computer access to electronically storedinformation.

In a particular example, if a user (e.g., 23) attempts to log into acomputer (e.g., 13) or a system (e.g., a personal area of website 65),but has forgotten his password, then the computer (e.g., 13) or system(e.g., module 61) may ask the user (e.g., 22) to identify himself, forexample, by entering his name, user ID, phone number, or otheridentification indicia (e.g., in act 309). The computer (e.g., 13) orsystem (e.g., software module 61) may then look up (e.g., in act 310)the user's phone number in a database (e.g., in storage 64), or verifythat the user's (e.g., 23) phone number is in the database, and thensend the first message (e.g., in act 315) to the user (e.g., to hismobile phone 43) with the password. The user (e.g., 23) then receivesthe password on their mobile phone (e.g., via a SMS message, a voicemessage, or the like) and enters the password into the computer (e.g.,13) or system (e.g., website 65).

In different embodiments, such a password may be the original password,a temporary password, or a one-time use password, as examples. In otherembodiments, instead of using such a process only when a password islost or forgotten, the process may be used every time a person logs in,randomly, at regular intervals (e.g., of time or numbers of log ins),when an unauthorized user is suspected, in addition to requiring apassword (e.g., for added security), or the like.

For additional security, for example, some embodiments further includethe acts of asking the person seeking the access a personal question(e.g., in act 315), for example, about the person having authority forthe access (which may be the same person, in some embodiments). Such amethod may also include an act of receiving from the person seeking theaccess (e.g., in act 321) a present answer to the personal question.Some of these embodiments also include the acts (e.g., within act 327, asimilar act occurring before act 321, or act 319) of comparing thepresent answer to a previous answer to the personal question provided(e.g., in act 306) by the person having authority for the access, andproceeding to allow the action (e.g., in act 330) or to send the firstautomated message containing the password (e.g., in act 321) only if thepresent answer matches the previous answer.

In some such embodiments, the first automated message (e.g., sent in act315) contains the personal question and the second message (e.g.,received in act 321) contains the present answer, for example. Such apersonal question may be, or include, as examples, “what is yourmother's maiden name?”, “what is your pet's name?”, or “what is yourfavorite color?”, or a combination or alternate selection thereof. Suchquestions may provide an added level of security, in some embodiments.

Certain embodiments of method 300 include the specific act of sendingthe first automated message (e.g., in act 315) through the mobile phonenetwork (e.g., 40) to the mobile phone of the person having authorityfor the access, wherein the first message contains the identification ofthe access requested (e.g., received in act 309) and the request for anaffirmative action to indicate authorization of the access. Theseembodiments may also include the specific act of receiving (e.g., in act321), from the mobile phone of the person having authority for theaccess, the second message (e.g., indicating that the person havingauthority for the access has taken the affirmative action to indicateauthorization of the access). Such an affirmative action may be, forexample, making a selection from a menu, pressing a button on the phone,making a voice command, or the like.

For example, in some embodiments, the first (e.g., automated) message(e.g., received in act 315) includes at least one menu and at least oneprompt to authorize the access by making a selection from the menu. Insome such embodiments, the second message (e.g., received in act 321)either authorizes the access, or does not authorize the access (e.g., asdetermined in act 327) based upon which menu selection is made. In somesuch embodiments, failure to make a menu selection at all either resultsin the second message not being sent, or the second message being sentafter a period of time indicating that the affirmative action has notbeen taken.

Some of these embodiments further include the acts of receiving apresent password (e.g., when the request for authorization is receivedin act 309, in act 319, or in the second message in act 321) from theperson seeking (e.g., in act 309) the access. Such methods may alsoinclude an act of comparing (e.g., within act 327, a similar actoccurring before act 321, in act 310, or in act 319) the presentpassword to a previous password stored in memory (e.g., in storage 64),and proceeding to provide the access (e.g., allow the access or actionin act 330) only if the present password matches the previous password(e.g., as evaluated in act 327). In different embodiments, the passwordmay be received (e.g., when the request for authorization is received inact 309, in act 319, or in the second message in act 321) through alocal key pad or key board, through the user's mobile phone, verbally(e.g., using voice recognition software), etc.

Many different embodiments include other features or aspects, includingthose described herein. As some specific examples, in many embodiments,the first message (e.g., sent in act 315), the second message (e.g.,received in act 321), or both, are SMS messages. Such messages may bereceived through mobile phone network 40, for example. Further, somemethods further include the acts of encrypting (e.g., act 312) the firstautomated message (e.g., before the sending, in act 315, of the firstautomated message to the mobile phone of the person having authority forthe access). Embodiments that include a second message (e.g., receivedin act 321), may include (e.g., in addition to or instead of act 312) anact of decrypting (e.g., act 324) the second message (e.g., after thereceiving, in act 321) of the second message from the mobile phone ofthe person having authority for the access). Further, some of thesemethods further include the act of receiving, for example, throughInternet website 65, mobile phone network 40, or both, for instance,from each of at least a number of persons who have authority for access,an indication of a criteria for obtaining authorization for access forthe person (e.g., in act 306).

In some embodiments, the access that is being sought (e.g., in act 309)is physical access. For example, in a number of embodiments, the act ofsending the first automated message (e.g., act 315) includes, orconsists of, sending the first automated message through the mobilephone network (e.g., 40) to a mobile phone of the person seeking theaccess (e.g., as requested in act 309), and the person seeking theaccess is seeking (e.g., in act 309) physical access to a controlledspace. In other words, the person seeking the access (e.g., as requestedin act 309) and the person having authority for the access (e.g., in act303, 306, 321, or a combination thereof) are the same person, and thatperson is seeking physical access. Such physical access may be, forexample, physical access to enter a building or a floor or area of abuilding, or access to move a vehicle into a controlled space. Furtherexamples of physical access are described elsewhere herein.

Further, in certain embodiments, the receiving of the identificationindicia for the person seeking the access (e.g., in act 309) involvesreceiving a near-field communications signal from a mobile phone of theperson seeking the access. For instance, user 22 may pass her phone 42past NFC reader or communications device 88. In so doing, mobile phone42 may transmit the indicia (e.g., of act 309) to device 88, which maybe in communication with server 15, software module 61, or both, forexample via the Internet 10. In different embodiments, such a NFC signalmay also indicate the access or authorization requested (e.g., in act309), or the selection of reader or device 88 may serve to indicatewhich access or authorization is requested (e.g., in act 309).

Turning now to FIG. 4, this flowchart illustrates, among other things,various methods of providing positional awareness, for instance, of aparticular individual, for example, using mobile phones. In theembodiment illustrated, method 400 includes acts of obtaining (act 416)and storing (act 420) location information. Particular embodimentsinclude (at least) the act of obtaining (act 416) or storing (act 420)(or both) at least one location coordinate defining at least one regionof concern, for example. Such location coordinates may be (or include)global positioning system (GPS) coordinates, for example, latitude andlongitude, grid coordinates, elevation, coordinates or distances fromone or more known points, Cartesian coordinates, polar coordinates, orthe like, as examples.

A region of concern may be defined by one such coordinate and a distancetherefrom, by more than one coordinate and a distance therefrom (e.g.,by two coordinates defining a line segment and a distance therefrom), orby three, four, or more coordinates, which may define a perimeter orparcel of land (e.g., four coordinates defining corners of squares orrectangles), as examples. In other embodiments, street addresses may beused. Location information or coordinates defining regions of concernmay be obtained, for example, from a third party (e.g., 31 to 33 shownin FIG. 1), from an Internet website, through Internet 10, from a user(e.g., 21 to 23), or the like. In some embodiments, there may be anumber of locations, regions of concern, coordinates, or the like, whichmay correspond to different regions of concern, which may be of concernfor different reasons, in certain embodiments.

In the embodiment illustrated, method 400 also includes monitoring thelocation of a first mobile phone (act 424), which may be possessed by aparticular individual, for example. Such monitoring may be, for example,continuous, at regular intervals of time, during certain times of theday, or the like, which may be selectable by the user in someembodiments. In some embodiments, the frequency of monitoring may beincreased if the particular individual is near a region of concern. Inthe embodiment illustrated, method 400 also includes evaluating whetherthe first phone is near or within a region (act 428), for example, ofconcern, and providing an alarm (act 432), for example, through a secondmobile phone, when the first mobile phone passes into a region ofconcern, or within a predetermined distance of a region of concern. Sucha predetermined distance may be, for example, 25 feet, 50 feet, 75 feet,100 feet, 200 feet, 300 feet, 500 feet, or the like, and may be userselectable, in some embodiments. In addition, or instead of alarming atthe second phone, in some embodiments, an alarm may be provided (e.g.,in act 432) at the first mobile phone, which may be the same or adifferent alarm, in different embodiments.

An alarm may be provided (e.g., in act 432) in a manner similar to otheralarms described herein, for example, in act 245 shown in FIG. 2, or maybe similar to the notification of the third person (act 333) or thefirst message (e.g., sent in act 315) shown in FIG. 3, or a combinationthereof. An alarm (e.g., provided in act 432) may include a typicalringing of the phone, making a particular ring tone, a text or SMSmessage, a vibration, a synthetic voice message, one or more lights, ora combination thereof, as examples. The nature of the alarm (e.g.,provided in act 432) may be selectable by the user, in many embodiments,for example, in an act similar to act 205, act 306, or both. In someembodiments, the alarm (e.g., provided in act 432) may identify thefirst phone, the person to which the first phone is assigned, the phonenumber of the first phone, a name of the region of concern, the reasonwhy the region is of concern, how far away from the region of concernthe first phone is located, uncertainty associated with suchinformation, etc.

In some such embodiments, for example, the location coordinate (e.g.,obtained in act 416, stored in act 420, or both) is for a reportedresidence of a registered sex offender. In some such embodiments, thefirst phone (e.g., of which the location is monitored in act 424) may beassigned to or used by a child, and the second phone (e.g., whichreceives the alarm in act 432) may be assigned to a parent or guardianof the child. Thus, the parent or guardian may be alerted (e.g.,automatically) if the child enters or approaches the residence of aregistered sex offender. In some embodiments, the alarm (e.g., providedin act 432) may indicate that the region of concern is the residence ofa registered sex offender, in some embodiments, including details of theoffender, crimes that he has been convicted or accused of, a descriptionof him, a picture of him, etc.

In some embodiments, registered residences of a number of registered sexoffenders may be obtained (e.g., in act 416), for example, through theInternet 10, for instance, from one or more governmental websites, whichmay be converted into coordinates, for example, demarking the propertyboundary, the center of the property, or the like. Location informationmay be stored (e.g., in act 420), for instance, on server 15, in storage64, by software module 61, or the like, which may be temporary storage,for example, for the area in which the first mobile phone is located.Other information included in alarms (e.g., provided in act 432) may beobtained from the website(s) as well, in act 416, or both.

In other embodiments, regions of concern may be for other threats, suchas traffic hazards, pollution or toxic waste sites, areas of highradioactivity, industrial areas, neighborhoods with high crime rates,gang-controlled areas, quarantine areas, areas with insect infestations,high-drug use or dealing areas, bars, adult establishments, houses ofprostitution, gambling establishments, construction areas, areas ofsevere weather, areas of fighting in theater of war, forbidden areas,foreign territory, private land, areas below high tide, areas whererip-tides occur, areas of shallow water, coastlines, or other maritimenavigational hazards, etc. Besides protecting children, embodiments maynotify (e.g., in act 432), protect, or both, individuals with substanceabuse, alcohol, or gambling problems, police officers, fire fighters,probation officers, parole officers, census workers, soldiers, deliverypersonnel, salesmen, missionaries, sailors, etc. In some embodiments,the alarm (e.g., provided in act 432) may be provided to the firstphone, in addition to, or instead of the second phone.

In some embodiments, special software may be provided on one or moremobile phones to accomplish certain acts of the method (e.g., method400). For instance, a number of embodiments of method 400 furtherinclude, for example, the acts of providing a first mobile phonesoftware module for installation on the first mobile phone (act 404),providing a second mobile phone software module for installation on thesecond mobile phone (act 408), or both. In some such embodiments, thefirst mobile phone software module (e.g., provided in act 404) includesprogramming instructions for the monitoring (e.g., in act 424) of thelocation of the first mobile phone, for instance, possessed by theparticular individual. And in some embodiments, the second mobile phonesoftware module (e.g., provided in act 408) includes programminginstructions for the providing of the alarm (e.g., in act 432), forexample, through the second mobile phone when the first mobile phonepasses into a region of concern or within the predetermined distance ofa region of concern. In some embodiments, the first mobile phonesoftware module (e.g., provided in act 404), the second mobile phonesoftware module (e.g., provided in act 408), or both, may be similar, atleast in some respects, or part of, the second software module 72described herein, for example.

Particular embodiments of such methods (e.g., method 400) furtherinclude an act of obtaining or providing a third software module (act412), for example, installed on at least one Internet server (e.g., 15)and forming at least one Internet website (e.g., 65). In someembodiments, the third software module (e.g., provided in act 412) maybe similar, at least in some respects, or part of, the first softwaremodule 61 described herein, for example. In some of these embodiments,more than one or many users (e.g., users 21 to 23) visit the website(e.g., 65) through the Internet 10 and elect to be provided the alarm(e.g., in act 432) through their mobile phone, for example, through thesecond mobile phone. In various embodiments, information, criteria,selections, etc., may be received from the users (or potential users)for example, in acts similar to acts 205, 306, or both, shown in FIGS. 2and 3 and described herein with reference thereto.

In a number of such embodiments, the third software module (e.g.,obtained or provided in act 412) further contains instructions todownload (e.g., in act 404), for instance, through mobile phone network40, for example, to the first mobile phone, the first mobile phonesoftware module. In many such embodiments, the first mobile phonesoftware module (e.g., provided or downloaded in act 404), the thirdsoftware module (e.g., obtained or provided in act 412), or both,includes programming instructions for the monitoring (e.g., in act 424)of the location of the first mobile phone, for instance, possessed bythe particular individual. Further, in some such embodiments, the thirdsoftware module (e.g., obtained or provided in act 412) further containsinstructions to download (e.g., in act 408), for instance, throughmobile phone network 40, for example, to the second mobile phone, thesecond mobile phone software module.

In many such embodiments, the second mobile phone software module (e.g.,provided or downloaded in act 408) includes programming instructions forthe providing of the alarm (e.g., in act 432), for instance, through thesecond mobile phone when the first mobile phone passes into the regionof concern or within the predetermined distance of the region ofconcern. And in particular embodiments, the first mobile phone softwaremodule (e.g., provided or downloaded in act 404) also, or instead,includes programming instructions for the providing of the alarm (e.g.,in act 432), or instance, through the first mobile phone when the firstmobile phone passes into the region of concern or within thepredetermined distance of the region of concern.

Moreover, in many embodiments, multiple users (e.g., 21 to 23) enter(e.g., in act 416), for example, through the Internet website (e.g., 65)at least one location coordinate defining at least one region ofconcern. Thus, in different embodiments, some or all of the regions ofconcern may be of specific concern to the particular user. On the otherhand, in some embodiments, the third software module (e.g., obtained orprovided in act 412) further contains instructions to obtain from athird party website (e.g., from one or more of third parties 31 to 33),data with which to determine at least one location coordinate definingat least one region of concern. An example of such data includes streetaddresses, which may be used to determine longitude and latitude or GPScoordinates, for example. In some such embodiments, for example, thethird party website contains reported residence addresses or locationsfor numerous registered sex offenders, there are more than one regionsof concern (e.g., monitored in act 424), and at least two of the regionsof concern surround at least one of the reported residences of theregistered sex offenders, as examples.

Some or all of the acts of method 400, or other methods describedherein, may be repeated. For example, in many embodiments, locationinformation may be obtained (e.g., act 416) and stored (e.g., act 420)periodically, when the first phone moves into another area, when newinformation becomes available, or the like. Further, in someembodiments, location information that is stored (e.g., in act 420) maybe used many times (e.g., in acts 424 and 428, and if appropriate, inact 432) between instances when location information is obtained (e.g.,in act 416). In a number of different embodiments, the acts illustratedor described may be combined in various combinations or with other actsor features (or both) described herein.

Referring now to FIGS. 1, 5, and 6, in a particular embodiment of theinvention, provided as an example, system 502 manages personalinformation for any number of users and includes a SECURE MOBILEINFORMATION MANAGEMENT™ (SMIM) platform 500 and Personal Data Providers509. SMIM platform 500 is an example of a technology platform for system100 which enables mobile phone users (e.g., 21 to 23) to have access tocertain personal information via their mobile phone (e.g., 41 to 43), insome embodiments, even when there is no signal or internet connectionfor the cell phone (e.g., from mobile telephone network 40). In thisembodiment, SMIM platform 500 includes one or more blocks of code thatprovide the framework and foundation of system 100 and encompassesfunctionality from defining standards under which development takesplace to defining security, to communication between components andvarious core software applications.

In certain embodiments, SMIM platform 500 includes module 501 (e.g.,MICRO AGENT™ module or MICRO AGENT TECHNOLOGY™ (MAT) module) and module503 (e.g., WEB SERVICES module or CELLTRUST WALLET WEB SERVICES™module). In this example of an embodiment, module 501 runs on mobilephones, and is an example of the second software module 72, or a portionthereof, and module 503 is an example of first software module 61, or aportion thereof. In this example, module 503 is a block of code orsoftware that runs on server 15 and that communicates with or exchangesdata with module 501 on the phones, website 65, and secure storage 64,for example. Module 503 may be a communication layer between module 501,website 65, and storage 64, for instance. Module 503 may provide orallow authentication, communication, protocol definition, auditing ofthe integrity of data, prevention of unauthorized access, and so on, andmay allow access to website 65 from the Internet 10.

Module 503 also, in this embodiment, allows third parties (e.g., 31 to33) or Personal Data Providers 509 (e.g., banks, airlines, merchants) toupdate their customer's accounts or personal information, for example,on, storage 64, website 65, or secure areas thereof. Module 501 orsecond software module 72 provides a user interface, local storage,synchronization, and alerts components, in this embodiment, forinstance, on one or more of phones 41 to 43. Further, in this particularembodiment, a user interface, for instance, within mobile phone 41 orsecond software module 72, may gather information from the user (e.g.,21) and provide information back to the user. For example, Personal DataProviders 509 include financial institutions, airlines, retailers, ormerchants. Module 503 allows Personal Data Providers 509 to updatecustomer accounts or personal information such as bank accountinformation and statements, flight information, credit card informationand charges.

In some embodiments, local storage (e.g., folder 76 on mobile phone 41)enables the application (e.g., second software module 72) to storeinformation (e.g., nuggets 78 and 79 of information) on the phone (e.g.,41), which may provide for faster access, reduce dependence on thenetwork (e.g., mobile phone network 40, the Internet 10, or both), andmay reduce the total cost of ownership by limiting the amount of datacommunication through mobile phone network 40 that takes place (e.g., atthe expense of user 21). In some embodiments, the data (e.g., nuggets 78and 79) on the phone (e.g., 41) is synchronized with data on server 15to ensure that the user (e.g., 21) has access to updated informationboth on their phone (e.g., 41) and on the web (i.e., Internet 10, whichmay be accessed, at least by user 23, through computer 13, forinstance).

In certain embodiments, data is compressed, encrypted, or both, forcommunication with the mobile phone or device (e.g., between module 501and module 503 or between the first software module 61 and the secondsoftware module 72). In addition, in some embodiments, alerts mayprovide substantially real time notification of various events oractivities that can be sent to a phone (e.g., 41) running module 501 (anexample of module 72, or a portion thereof). For example, alerts mayinform the user of an important or critical event such as a largewithdrawal from their account or a flight cancellation, flight changes,gate changes, or the like. And in particular embodiments, module 505(e.g., MOBILE SERVICES™ module or CELLTRUST WALLET MOBILE SERVICES™module) or module 507 (e.g., PERSONAL PORTAL™ module or CELLTRUSTPERSONAL PORTAL™ module, such as via an extranet at my.celltrust.com)(or both) provides a middle tier between an application running on aserver (e.g., server 15) and a phone (e.g., 43) running module 501. Inaddition, in some embodiments, module 507 provides a middle tier betweenusers (e.g., 23) operating on their computers (e.g., 13) and module 505,module 501, or both. In some embodiments, module 503 may provideinformation (e.g., from Personal Data Providers 509) to module 507,which may then be provided to module 505, module 501 (e.g., on themobile phones), or both.

Further, in certain embodiments, module 507 (an example of part of firstsoftware module 61 or part of website 65) is a web application thatenables users (e.g., 21 to 23) to access and modify various information,such as their personal information, such as their card information forexample, on the web (e.g., through the Internet 10 and web site 65). Insome embodiments, module 507 uses module 505 to communicate andsynchronize users' information with their mobile phone. In a number ofembodiments, module 503, module 507, module 505, or a combinationthereof, can also be used by third parties (e.g., 31 to 33) or PersonalData Providers 509 to send, receive, or both, information to (or from)mobile phones (e.g., 41 to 43) running module 501 (e.g., second softwaremodule 72). For example, a bank such as WELLS FARGO™ bank may be able tosend alerts to their customers' mobile phones (e.g., 41 to 43) and toprovide them with the latest bank account information, for instance.Another example (e.g., of a third party 31 to 33) is an airline such asSOUTHWEST AIRLINES™, which may send their customers (e.g., 41 to 43)up-to-the-minute gate and cancellation information, as appropriate.

In a particular example of an embodiment, SMIM platform 500, whichincludes embodiments of first software module 61 and second softwaremodule 72, provides functionality and features that includesubstantially secure storage of cards and information, including, forexample, credit cards, bank cards, identification cards such as adriver's license to identify a person, loyalty cards, for instance, forgrocery stores such as SAFEWAY™, and ALBERTSONS™, and retail stores suchas The GAP™, and STARBUCKS™, frequent flyer programs, rewards programs,membership cards, video clubs, library cards, insurance cards, forinstance, health, auto, or life, and login and password information, andthe like. Various embodiments may provide a combination of the items orinformation described herein or (e.g., any information or data) that istypically found or has been known to have been carried in a person'swallet or purse, for example, or equivalent functionality.

Further, some embodiments of the invention include central, secured, andbacked up storage, for example, through module 61, server 15, or both.In various embodiments, a user (e.g., 21 to 23) may enter the data once(e.g., into their phone 41 to 43, into website 65, etc.) and may usesuch information, for example, as long as it remains current. Inaddition, in particular embodiments, a user (e.g., 21 to 23) may be ableto easily replace a particular phone (e.g., user 21 may be able toreplace mobile phone 41), a carrier or service provider (e.g., of mobilephone network 40), or both, without re-entering personal information.Further, in this particular embodiment, a user (e.g., 21 to 23) may haveaccess to their personal information from virtually anywhere (e.g.,through their mobile phone).

In addition, particular embodiments that provide alerts to inform usersof important changes, are configurable. In some such embodiments, theuser (e.g., 21 to 23) may select which nuggets of information or changesare important to them such that the user should be alerted when theinformation is updated (e.g., immediately) and which should be storedfor later review, for instance. Certain embodiments may provideimmediate or near-immediate notification. Specifically, in someembodiments, a message may pop up on the mobile phone (e.g., 41 to 43)to alert the user (e.g., 21 to 23) of an event. In this embodiment,users can then bring up MICRO AGENT, or second software module 72, fordetailed information about the event.

In some embodiments, a user can use module 501, or second softwaremodule 72 to take an immediate action. For example, if the user isinformed of a large withdrawal from their account, the user may be ableto use module 501, or second software module 72 to inform the bank(which may be one of the third parties 31 to 33 or a Personal DataProviders 509, for example) of possible fraud or mistake. Hence, in thisparticular embodiment, banks or other financial institutions may be ableto limit their liability or reduce their losses by immediately puttingthe account under investigation. In various embodiments, users may takecontrol of their data by putting their personal information in SMIMplatform 500 or system 100. In many embodiments, users' personalinformation is not stored on an employers' server where the employercontrols the information and has the ability, or even the legal right,to access it. Further, in some embodiments, users (e.g., 21 to 23) canchange jobs without the need for re-entering their data over again.

Moreover, certain embodiments of the invention may use mobile phones(e.g., 41 to 43) to provide certain identification card functions. Forexample, mobile phone 42 may be used to identify user 22. Personalinformation stored on a mobile phone, on server 15, or both, may includea driver's license number, a social security number, a passport number,visa information, security clearance information, credentials, a birthcertificate, a green card, a work permit, a military ID, access cards,membership cards, elevator cards, copy cards, etc. In some embodiments,if cards or the phone are lost, destroyed, or stolen, a user may replacesome or all access cards with a mobile phone. In various embodiments, auser may use a mobile phone to access a parking garage, an officebuilding, secure labs, or other areas, for example. Further, in someembodiments, a user may use SMIM platform 500, module 505 (e.g., SecureMobile Services), or first software module 61 to locate employees, forexample, immediately or within a certain time period. User 22 may belocated, for example, by determining the location of the cell that phone42 is within, by using GPS information from phone 42, or a combinationthereof.

In a number of embodiments, SMIM platform 500 or system 100 may be usedin a retail sales environment. For example, in some embodiments, user 22may use mobile phone 42 to retrieve product information about a productusing a local signal such as Near Field Communication or Bluetooth, forexample. In some embodiments, a user may use a phone to look up alocation of a product, receive a coupon as the user enters a store,receive daily specials, store product information and price for pricecomparisons, or a combination thereof. In some embodiments, a user maysend friends or family, for example, gift cards from a mobile phone, anda recipient may be able to redeem the gift certificate using theirmobile phone. In certain embodiments, SMIM platform 500 or system 100may also allow users to purchase products in stores by payment with aphone, for example, charging a credit card, debit card, or the like. Inparticular embodiments, SMIM platform 500 or system 100 also allows forsecure communication between module 501 or second software module 72 andthe website (e.g., 65) as well as secure SMS communication, for example,for transmitting sensitive information rather than text messaging usingclear text.

Yet another embodiment of the invention includes or combines a phonewith key card. An example is an apparatus for communicating a code, thatincludes a component for a mobile phone (or a mobile phone that includesthe component) wherein the component includes a passive code configuredto be read by a reader when the phone is passed in close proximity tothe reader. In many of these embodiments, the reader is an apparatus,for example, as opposed to a person. The reader of this embodiment maybe similar to communications device 88 shown in FIG. 1 and describedherein, and may be a card reader configured to read passive codes fromcards, for example, or similar thereto.

In certain embodiments, for example, the passive code is (or includes) amagnetic code and the reader is configured to read magnetic codes or thepassive code is (or includes) a bar code and the reader is (or includes)a bar code reader. In some embodiments, the passive code issubstantially unchangeable. As used herein, “substantially unchangeable”means that a typical user cannot change the passive code in a mannerthat is more convenient than replacing the component or the phone. Thus,a user cannot change their code on a whim, which a person reading thecode may rely on, for example, to identify the user. Although notnecessarily fool proof, in some of these embodiments, changing thepassive code of a specific phone or component to copy the passive codeof a different phone would be at least as difficult as making aduplicate of someone else's credit card, as a further example.

As used herein, “passive” or “passively” means to not be powered by thebattery or electrical system of the phone or electrically connected tothe phone (or another battery or electrical system). Further, as usedherein, in this context, the “component” of the phone excludesdisposable packaging for the phone (that may contain a bar code forproduct sales or tracking purposes, for example). Further, in someembodiments, for example, the component is (or includes) a back of themobile phone, a battery cover of the mobile phone, a battery for themobile phone or a case for the mobile phone, as examples.

Further, in some embodiments, for instance, the mobile phone has a phonenumber and the passive code includes (or is) the phone number of themobile phone. Further, in some embodiments, for another example, thepassive code includes (or is) a number that is unique to the componentfrom all other components for mobile phones and all other mobile phones.In other embodiments, the passive code may be or include the name of theuser, an indicia for the user, an indicia for an account, a portionthereof, or a combination thereof, as examples.

Various embodiments of the invention also (or instead) include a methodto replace a back of a phone with key card. Another example of theinvention is (or includes) a method of eliminating a need to carry acard. This method includes providing or obtaining a mobile phone havinga component (or at least providing or obtaining a component for a mobilephone), wherein the component is configured to passively produce a codeconfigured to be read by a reader (e.g., device 88) when the mobilephone, that includes the component, is passed in close proximity to thereader. (Some embodiments may require only proximity instead of closeproximity, for example, using Bluetooth.) Such a method may includeobtaining or providing components having one or more aspects describedabove for the example of the apparatus for communicating a code.Particular embodiments include providing the component as a replacementpart for a preexisting mobile phone that previously did not have anability to passively produce such a code.

Other embodiments include (or are) various methods to use a phone with akey card. An example of such an embodiment is (or includes) a method ofidentifying people, that includes, in the order indicated, or in anotherorder, (at least) the acts of providing or obtaining at least one reader(e.g., device 88) configured to read a passive code from an apparatuscontaining the code that is passed within (e.g., close) proximity to thereader, permitting people who whish to be identified to pass theirmobile phones (e.g., 42) within close proximity to the reader (e.g.,device 88), for example, wherein the people (e.g., 22) who wish to beidentified have the passive code located on their mobile phones (e.g.,42). Such methods may also include an act of using the passive code, asread by the reader (e.g., device 88), to identify the people (e.g., 22).

Such a method may be employed by a merchant, a service provider, anemployer, a land lord, a manufacturer, a company, a school, or agovernment agency, for example. Further, such a method may includeobtaining or providing components having one or more aspects describedabove for the example of the apparatus for communicating a code. In someembodiments, such a method may be used in combination with, or as partof, other methods described herein. In some embodiments, such a methodor system may be used for a particular purpose, or for more than onepurpose.

In particular embodiments, for instance, for each of multiple people,the identity of the person is used to authorize an expenditure from acredit or debit account at a point of sale for a purchase of goods or apayment for services. In particular embodiments, as another example, foreach of numerous people, the identity of the person is used to authorizephysical access to a controlled space. Further, in some embodiments, foreach of at least two of the people, the identity of the person is usedto authorize computer access to electronically stored information. Evenfurther, in some embodiments, for another example, the method furtherincludes at least one other means for identifying the people. Suchanother means may be one of the means described herein, or known in theart, for example.

Still another embodiment is (or includes) a method of eliminating a needto carry a card. This example of a method includes replacing an oldcomponent of a mobile phone with a new component. In some embodiments,the new component includes at least one of a back, a battery cover, abattery, and a case for the mobile phone, as examples. In someembodiments, for example, the new component includes a magnetic codearea configured to produce a magnetic code to be read by a card reader(e.g., device 88) when the phone is passed in close proximity to thecard reader. Other embodiments may use a bar code, as another example.

Another embodiment is (or includes) another method of eliminating a needto carry a card. Such a method may include, for example, configuring amobile phone with a component, wherein the component is or includes atleast one of a back, a battery cover, a battery, and a case for themobile phone, wherein, the component includes a code configured to beread by a card reader (e.g., device 88) when the phone is passed inclose proximity to the card reader. Other embodiments include a methodor phone that communicates a code using near-field communication, forexample, wherein the code is stored on the phone, selected by the user,and transmitted via a NFC transmitter (e.g., device 82). Different usesare described herein wherein the codes are sent to the phone via themobile phone network (e.g., 40) from a server (e.g., 15) or thatcollects the codes from third parties (e.g., 31 to 33) through theinternet 10, for example.

Different embodiments of the invention may include differentcombinations of elements described herein, shown in the drawings, orknown in the art. Benefits, other advantages, and solutions to problemshave been described herein with regard to specific embodiments. However,the benefits, advantages, solutions to problems, and element(s) that maycause benefit, advantage, or solution to occur or become more pronouncedare not to be construed as critical, required, or essential features orelements of the claims or the invention. Reference to an element in thesingular is not intended to mean “one and only one” unless explicitly sostated, but rather “one or more.” As used herein, the terms “comprises”,“comprising”, or a variation thereof, are intended to cover anon-exclusive inclusion, such that a process, method, article, orapparatus that comprises a list of elements does not include only thoseelements but may include other elements not expressly listed or inherentto such process, method, article, or apparatus. Further, no elementdescribed herein is required for the practice of the invention unlessexpressly described as “essential” or “critical”.

1. A method of authorizing an action, the method comprising, in anypermissible order, at least the acts of: receiving from a person havingauthority to authorize the action, an identification of a first phonenumber for obtaining authorization for the action; receiving a requestfor authorization and an indication of a criteria for obtainingauthorization for the action; encrypting a first message, wherein thefirst message contains the request for authorization of the action;receiving at a first mobile phone having the first phone number, a firstmessage that is encrypted and containing the request for authorizationof the action; decrypting the first message containing the request forauthorization of the action; after the receiving the identification ofthe first phone number, and after the receiving the request forauthorization and the indication of the criteria for obtainingauthorization for the action, and after encrypting the first message,and after the receiving of the first message containing the request forauthorization, and after decrypting the first message, sending a secondmessage through a mobile phone network and from the first mobile phonehaving the first phone number, wherein the second message authorizes theaction; receiving an identification of a second phone number foradvising a third person of the action, and further comprisingautomatically sending at least one of the first message, the secondmessage, and a third message to the second phone number, wherein the atleast one of the first message, the second message, and a third messageincludes at least a description of the action for which authorization isrequested.
 2. The method of claim 1 wherein, prior to the receiving ofthe request for authorization of the action, the first phone number isreceived through at least one of an Internet website and the mobilephone network.
 3. The method of claim 1, wherein the action is grantingof computer access to electronically stored information and a personseeking the action is seeking the computer access to the electronicallystored information.
 4. The method of claim 1, wherein the action isgranting of physical access to a controlled space and a person seekingthe action is seeking the physical access to the controlled space. 5.The method of claim 1 further comprising receiving through at least oneof an Internet website and a mobile phone network, from each of at leasta plurality of persons having authority to authorize the action, anindication of a criteria for obtaining authorization for the action forthe person.
 6. The method of claim 1, further comprising receiving fromthe person having authority to authorize the action, through at leastone of the Internet website and the mobile phone network, anidentification of time limits for sending the first message, and whereinthe sending of the first message is performed only in accordance withthe time limits.
 7. The method of claim 1 wherein the first messagecomprises at least one menu and at least one prompt to authorize theaction by making a selection from the menu.
 8. The method of claim 1,further comprising: wherein the second message indicates that the personhaving authority to authorize the action has taken an affirmative actionto indicate authorization of the action.
 9. The method of claim 1,further comprising allowing the action only if the second message isreceived and the second message authorizes the action.
 10. The method ofclaim 1 wherein the first message is an automated first message.
 11. Themethod of claim 1 wherein the first mobile phone is controlled by aperson seeking the action.
 12. The method of claim 1 wherein a personseeking the action is the person having authority to authorize theaction.
 13. The method of claim 1, further comprising looking up anidentification indicia in a database and obtaining the first phonenumber for obtaining authorization for the action from the database. 14.The method of claim 1, further comprising repeating the receiving of therequest for authorization of the action, repeating the sending of thefirst message and repeating the receiving of the second message, andfurther comprising tracking the authorization granted for the actionover time and reporting results of the tracking.
 15. The method of claim1 wherein the first message is an SMS message and the second message isan SMS message received through the mobile phone network.
 16. The methodof claim 1, wherein the action is a financial transaction, the firstmessage includes an amount of the transaction, and the second messageincludes an authorization of the transaction.
 17. The method of claim 16further comprising receiving from the person having authority toauthorize the action, through at least one of an Internet website and amobile phone network, an identification of a threshold monetary value oftransactions, wherein the first message is sent for transactionsexceeding the threshold, and transactions below the threshold areapproved without sending the first message.
 18. The method of claim 16wherein the transaction is at least one of a withdrawal and a debit froma bank account and the person having authority to authorize the actionis an authorized user of the account.
 19. The method of claim 16 whereinthe transaction is a bank card expenditure made at a point of sale for apurchase of goods or a payment for services, and the person havingauthority to authorize the action is an authorized user of the bankcard.
 20. The method of claim 19 wherein the bank card has a bank cardnumber, and the method further comprises, before the sending of thefirst message, receiving the bank card number from the first mobilephone via a local signal transmitted from the first mobile phone. 21.The method of claim 16 wherein the transaction is an expenditure madefrom a credit or debit account at a point of sale for a purchase ofgoods or a payment for services, the person having authority toauthorize the action is an authorized user of the account, the accounthas an account indicia, and the method further comprises, before thesending of the first automated message, receiving the account indiciafrom the mobile phone via a local signal transmitted from the mobilephone.
 22. The method of claim 16 wherein the transaction is anexpenditure made from a credit or debit account at a point of sale for apurchase of goods or a payment for services, the person having authorityto authorize the action is an authorized user of the account, and thesecond message includes an authorization code which has been memorizedby the person having authority to authorize the action and keyed intothe first mobile phone after receiving the first message and beforesending the second message.
 23. The method of claim 16 wherein thetransaction is an expenditure made from a credit or debit account at apoint of sale for a purchase of goods or a payment for services, theperson having authority to authorize the action is an authorized user ofthe account, the account has an account indicia, and the second messageincludes the account indicia.
 24. The method of claim 23 wherein thesecond message is an SMS message received through the mobile phonenetwork and the method further comprises, before the sending of thefirst message, receiving from a person seeking the action or from thefirst mobile phone, the first phone number.
 25. A method of authorizingan action, the method comprising, in any permissible order, at least theacts of: receiving from a person having authority to authorize theaction, an identification of a first phone number for obtainingauthorization for the action; receiving from a person seeking theaction, a request for authorization of the action; after the receivingthe identification of the first phone number, and after the receiving ofthe request for authorization, sending an automated first messagethrough a mobile phone network to a first mobile phone having the firstphone number, wherein the first message includes a description of theaction for which authorization is requested and wherein in the firstmessage, asking a personal question about the person having authority toauthorize the action; and after the sending of the first message,receiving from the first mobile phone, having the first phone number, asecond message wherein in the second message, receiving a present answerto the personal question, comparing the present answer to a previousanswer to the personal question provided by the person having authorityto authorize the action, and wherein the second message authorizes theaction.
 26. A method of authorizing an action, the method comprising, inany permissible order, at least the acts of: receiving from a personseeking an action and in an encrypted manner, an identification of afirst phone number and a request for authorization of an action;receiving at a first mobile phone having the first phone number, a firstmessage containing the request for authorization of the action and apassword, wherein the first message is an SMS message; after thereceiving the identification of the first phone number and the requestfor authorization of an action, and after the receiving of the firstmessage that is the SMS message and containing the request forauthorization of the action and the password, sending a second messagethat is encrypted and including the password through a mobile phonenetwork and from the first mobile phone having the first phone number,wherein the second message authorizes the action.
 27. A method ofauthenticating access, the method comprising in any order at least theacts of: receiving from a person seeking access, identification indiciaand a present password for the person seeking the access; comparing thepresent password to a previous password stored in memory; proceeding toprovide the access only if the present password matches the previouspassword stored in memory; looking up an identification indicia in adatabase and obtaining the first phone number for obtainingauthorization for the access from the database; sending a firstautomated message to the person seeking the access, the first automatedmessage is encrypted and containing a password; receiving from themobile phone of the person having authority for the access, a secondmessage that is encrypted and containing the password indicating thatthe person having authority for the access has taken the affirmativeaction to indicate authorization of the access.