Electronic Meeting Management System For Mobile Wireless Devices

ABSTRACT

A device management system includes a meeting support system that is configured to generate and transmit a plurality of electronic meeting invitations to a plurality of mobile wireless devices that correspond to a plurality of meeting participants and receive responses indicating whether the plurality of participants will attend the electronic meeting. The device management system receives identification data that identifies one or more documents or information that will be made available to the plurality of participants. The meeting support system determines whether the plurality of participants is authorized to access the one or more electronic documents or information. If any of the participants are not authorized to access any of the electronic documents or information, the meeting support system notifies the meeting organizer. The device management system may also include a meeting session management system that is configured to share information among the plurality of mobile wireless devices.

RELATED APPLICATION

This application is related to U.S. patent application Ser. No. 12/813,436 (Attorney Docket No. 49986-0708) entitled “Security System For Managing Information On Mobile Wireless Devices,” filed Jun. 10, 2010, the contents of which is incorporated by reference in its entirety for all purposes as if fully set forth herein.

FIELD OF THE INVENTION

This invention relates generally to mobile wireless devices, and more specifically, to a security system for managing information on mobile wireless devices.

BACKGROUND

The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, the approaches described in this section may not be prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.

The widespread proliferation of mobile wireless devices, such as telephony devices, tablet computers and personal digital assistants (PDAs), has increased the difficulty of controlling the dissemination of sensitive information, such as business documents. Mobile wireless devices have large amounts of storage and it is not uncommon for individuals to download electronic documents onto their mobile wireless devices so that the electronic documents can be viewed from any location.

One of the problems with this phenomenon is the obvious security risk that a loss of a mobile wireless device presents. Although many mobile wireless devices include access controls to prevent unauthorized access, some users do not use the access controls. Even when they are used, access controls are often a simple password that is easily broken by skilled information technology personnel.

Based on the foregoing, there is a need for an approach for managing information on mobile wireless devices.

SUMMARY

A device management system is provided for managing electronic meetings on mobile wireless devices. The device management system includes a meeting support system that is configured to receive a request for an electronic meeting from a mobile wireless device that corresponds to a meeting organizer. The request specifies a plurality of participants for the meeting. The device management system receives, from the mobile wireless device, identification data that identifies one or more documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices. The meeting support system determines whether the plurality of participants is authorized to access the one or more electronic documents or information. This may include, for example, determining whether the plurality of participants have sufficient access rights to satisfy one or more access policies that apply to the one or more electronic documents or information. If the meeting support system determines that any of the participants are not authorized to access any of the electronic documents or information, the meeting support system notifies the meeting organizer. The device management system may also include a meeting session management system that is configured to share information among the plurality of mobile wireless devices. More particularly, information entered via one or more of the mobile wireless devices, e.g., via a graphical user interface, is shared with the other mobile wireless devices of the meeting participants.

BRIEF DESCRIPTION OF THE DRAWINGS

In the figures of the accompanying drawings like reference numerals refer to similar elements.

FIG. 1 is a block diagram that depicts an example security system for managing information on mobile wireless devices.

FIG. 2 is a block diagram that depicts an example mobile wireless device.

FIG. 3 is a block diagram that depicts an example architecture of a mobile wireless device.

FIG. 4 is a block diagram that depicts an example hardware architecture for a mobile wireless device.

FIG. 5 depicts an example exit system.

FIGS. 6A and 6B are example policy data tables maintained by a policy manager.

FIG. 7 is a flow diagram that depicts an approach for powering on and registering a mobile wireless device.

FIG. 8 is a flow diagram that depicts an approach for managing information on mobile wireless devices.

FIG. 9 is a message ladder diagram that depicts example message interactions between an exit system, a personnel information manager and a device manager to determine whether the user is the registered owner of the mobile wireless device.

FIG. 10 is a message ladder diagram that depicts example message interactions between an exit system, a personnel information manager and a policy manager to determine whether the user is authorized to remove a mobile wireless device from the building.

FIG. 11 is a message ladder diagram that depicts example message interactions between an exit system, a personnel information manager, a policy manager, a document manager and a device manager to cause the deletion from a mobile wireless device of information that is not authorized to be removed from a building on mobile wireless devices.

FIG. 12 is a block diagram of a computer system on which embodiments of the invention may be implemented.

FIG. 13 depicts the use of a mobile wireless device to conduct an electronic meeting among participants.

FIG. 14 depicts an example display for a mobile wireless device.

FIG. 15 depicts example contents of a file specifier.

FIG. 16 depicts an example interaction between the main common display area of a mobile wireless device and a device management system as a user interacts with the main common display.

FIG. 17 depicts an example implementation of the device manager 118 for managing meetings on mobile wireless devices.

FIG. 18 is a flow diagram that depicts arranging an electronic meeting among mobile wireless devices using a meeting support system.

FIG. 19 depicts an example structure of a meeting session management system.

FIG. 20 is a message ladder that depicts example interactions between a meeting session manager and several mobile wireless devices via the main common display.

FIG. 21A depicts a meeting arrangement request form used by a user to request an electronic meeting via a mobile wireless device.

FIG. 21B depicts an example meeting request used to invite attendees to an electronic meeting.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. Various aspects of the invention are described hereinafter in the following sections:

I. OVERVIEW

II. SYSTEM ARCHITECTURE

-   -   A. Mobile Wireless Devices     -   B. Exit System     -   C. Device Management System

III. MOBILE WIRELESS DEVICE POWER ON AND REGISTRATION

IV. MANAGING INFORMATION ON MOBILE WIRELESS DEVICES

V. LOW POWER CONSIDERATIONS

VI. IMPLEMENTATION MECHANISMS

VII. MEETING MANAGEMENT

I. Overview

A device management system is provided for managing electronic meetings on mobile wireless devices. The device management system includes a meeting support system that is configured to receive a request for an electronic meeting from a mobile wireless device that corresponds to a meeting organizer. The request specifies a plurality of participants for the meeting. The device management system generates and transmits a plurality of electronic meeting invitations to a plurality of mobile wireless devices that correspond to the plurality of participants. The device management system receives a plurality of responses from the mobile wireless devices indicating whether the plurality of participants will attend the electronic meeting. The device management system receives, from the mobile wireless device, identification data that identifies one or more documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices. The meeting support system determines whether the plurality of participants is authorized to access the one or more electronic documents or information. This may include, for example, determining whether the plurality of participants have sufficient access rights to satisfy one or more access policies that apply to the one or more electronic documents or information. If the meeting support system determines that any of the participants are not authorized to access any of the electronic documents or information, the meeting support system notifies the meeting organizer. The device management system may also include a meeting session management system that is configured to share information among the plurality of mobile wireless devices. More particularly, information entered via one or more of the mobile wireless devices, e.g., via a graphical user interface, is shared with the other mobile wireless devices of the meeting participants.

The system may also include a location system that is configured to detect that a user has requested to leave a specified location. The location system is also configured to detect that a particular mobile wireless device is in proximity to the user. The device management system is configured to determine whether the user is authorized to remove the mobile wireless device from the specified location. If the user is not authorized to remove the mobile wireless device from the specified location, the device management system signals the location system to prevent the user from leaving the specified location with the mobile wireless device. If the user is authorized to remove the mobile wireless device from the specified location, then the device management system determines, based upon policy data that specifies attributes of information that should not be removed from the specified location on mobile wireless devices, information on the mobile wireless device that is to be rendered inaccessible. The device management system is further configured to cause the determined information on the mobile wireless device to be rendered inaccessible. Rendering information on the mobile wireless device inaccessible may include, for example, deleting the information, encrypting the information or re-encrypting the information. In this manner, the system provides better control over information stored on mobile wireless devices and is particularly helpful in preventing unauthorized information from being removed from a specified location. Embodiments of the invention are described hereinafter in the context of managing information stored on mobile wireless devices upon exit from a building, but the invention is not limited to this context and is applicable to managing access to information stored on mobile wireless devices when leaving any location.

II. System Architecture

FIG. 1 is a block diagram that depicts an example system 100 for managing meetings on mobile wireless devices. System 100 includes a device management system 102, an exit system 104 and mobile wireless devices 106, 108, communicatively coupled via a network 110. Network 110 may be implemented by any medium or mechanism that provides for the exchange of data between device management system 102, exit system 104 and mobile wireless devices 106, 108. Examples of network 110 include, without limitation, a network such as a Local Area Network (LAN), Wide Area Network (WAN), Ethernet or the Internet, or one or more terrestrial, satellite or wireless links. The mobile wireless devices 106, 108, exit system 104 and device management system 102 are described in more detail hereinafter.

A. Mobile Wireless Devices

Mobile wireless devices 106, 108 may be implemented by any type of mobile wireless device. Examples of mobile wireless devices 106, 108 include, without limitation, a laptop computer, a tablet computer, a cell phone and an MP3 player.

FIG. 2 is a block diagram that depicts an example mobile wireless device 200 used with the system 100 of FIG. 1. In this example, mobile wireless device 200 includes a power switch 202 for powering on and powering off the mobile wireless device 200. Although powered-off, the mobile wireless device 200 may maintain wireless contact with the device management system 102. Mobile wireless device 200 also includes a solar panel 204 for charging an internal battery of the mobile wireless device 200, as well as a battery monitor 206 for monitoring the state of the internal battery. The battery monitor 206 may also indicate whether the internal battery is being charged by the solar panel 204 and may indicate additional information, such as a current voltage supplied by the solar panel 204. Mobile wireless device 200 includes a screen/touchpad 208 for displaying information and for receiving user input. The screen/touchpad 208 may include a dedicated area with controls for controlling the display of pages and/or for entering information and characters. Mobile wireless device 200 also includes a biometric input 210 for receiving biometric information from a user. The biometric input 210 may be, for example, a touchpad for receiving a finger print of a user. The biometric information may be used to authenticate a user to provide enhanced security over simple password protection. Pen & holders 212, 214 provide devices for users to write and/or select GUI objects on screen/touchpad 208. A microphone 216 accepts audio input, as does a MIC In (input) 218. Mobile wireless device 200 also includes a headset jack 220 and a home position button 222. Mobile wireless device 200 may include other features and components, depending upon a particular implementation that are not depicted in FIG. 2 or described herein for purposes of explanation. Example additional features include, without limitation, communications ports, such as Ethernet, Firewire and USB ports, one or more power outlets, a camera, a mute button, a removable protective cover and various user input controls, such as buttons, sliders, control wheels, touchpads, joysticks a keypad and a keyboard. The physical dimensions of mobile wireless device 200 may vary depending upon a particular implementation and the invention is not limited to any particular physical dimensions. One example set of dimensions is about 8 inches wide, by about 11 inches in height, by about 0.1 to 0.3 inches thick.

FIG. 3 is a block diagram that depicts an example architecture 300 for mobile wireless device 200. In this example, architecture 300 includes several different types of modules that may be implemented in discrete hardware elements, computer software, or any combination of discrete hardware elements and computer software. Furthermore, mobile wireless devices 106, 108 may include additional elements that are not depicted in the figures or described herein for purposes of brevity.

Architecture 300 includes a display module 302 that controls displaying information on the screen/touchpad 208 and for processing user input detected on the screen/touchpad 208. Communication module 304 manages communications between the mobile wireless device 200 and other devices on network 110, such as device manager 118, including selection of communication protocol. Mobile wireless device 200 may communicate using a wide variety of wireless communications and protocol and the invention is not limited to mobile wireless devices on any particular wireless communication method or protocol or any particular frequency range. Example wireless communication methods and protocols include, without limitation, cellular telephony communication methods (3G, 4G, etc), 802.11x, 802.15x and Bluetooth. Mobile wireless device 200 may also change communication methods to adapt to different systems or geographical areas.

Battery management module 306 monitors the state of the internal battery and the charging of the internal battery by the solar panel 204 and also manages power consumption to maximize battery life. For example, the battery management module 306 may manage wireless communications and the brightness of the screen/touchpad 208 to maximize battery life. The battery management module 306 may also cause messages to be displayed on the screen/touchpad 208 to notify a user of a low battery state. The security module 308 manages various aspects of security for mobile wireless device 200. For example, the security module 308 manages the encryption and decryption of information stored on mobile wireless device 200. The security module 308 may also control access to information based upon access policies managed by the device management system 102. For example, the security module 308 may grant or deny access by a particular user to information based upon the user's authorization level and policies that specify the information that corresponds to the authorization level. The security module 308 may also render inaccessible information on the mobile wireless device 200 in response to signals from the device management system 102. A biometric identification module 310 manages the identification of users/owners of the mobile wireless device 200 based upon biometric information received from biometric input 210. A document management module 312 manages documents on the mobile wireless device 200. This may include, for example, downloading documents and information from the device management system 102 to the mobile wireless device 200 and managing versions of information stored on the mobile wireless device 200. A system module 314 manages all other functions of the mobile wireless device 200. The modules depicted in FIG. 3 may be combined into fewer modules or separated into additional modules, depending upon a particular implementation and the invention is not limited to the particular configuration depicted in FIG. 3.

FIG. 4 is a block diagram that depicts an example hardware architecture 400 for mobile wireless device 200. Architecture 400 includes various elements communicatively coupled via a communications bus 402. The architecture 400 includes a volatile memory 404, for example a random access memory (RAM), a non-volatile memory 406, for example one or more disks or Solid State Drives (SSD's), and a processor 408. The volatile memory 404 and non-volatile memory 406 may be used to store configuration information for the mobile wireless device 200, as well as content. The architecture 400 also includes a wireless communications interface 410 for facilitating wireless communications between the mobile wireless device 200 and other devices on network 110, for example the device management system 102, the exit system 104 and other mobile wireless devices 106, 108. A battery charge interface 412 provides a connection between the solar panel 204 and the internal battery. The battery charge interface 412 may also provide a connection between the internal battery and the battery monitor 206. In the situation where the battery monitor 206 also monitors the solar panel 204, the battery charge interface 412 may also provide a connection between the solar panel 204 and the battery monitor 206. The display interface 414 provides a connection between the screen/touchpad 208 and the other internal components of FIG. 4 for displaying information on screen/touchpad 208. A cursor interface 416 provides an interface between the screen/touchpad 208 and the other internal components of FIG. 4 for controlling a cursor displayed on the screen/touchpad 208. An input control module 418 provides an interface between the screen/touchpad 208 and the other internal components of FIG. 4 for processing user input received via the screen/touchpad 208. The elements depicted in FIG. 4 may be combined into fewer elements or separated into additional elements, depending upon a particular implementation and the invention is not limited to the particular configuration depicted in FIG. 4.

B. Exit System

Exit system 104 is configured to detect user requests to exit a building. For example, the user may present an identification card to a scanner and the exit system unlocks a door to allow the user to exit the building. As another example, the user may pass through an area covered by a scanner so that the user does not have to present the identification card to a scanner device. Exit system 104 may also be configured to detect the presence of mobile wireless devices 106, 108 near building exits. This may be done, for example, by using information transmitted by mobile wireless devices 106, 108 to determine their location. For example, mobile wireless devices 106, 108 may be configured with location detection capability, e.g., a global positioning system, and transmit their location to exit system 104. As another example, the location of mobile wireless devices 106, 108 may be determined based upon communications between mobile wireless devices 106, 108 and wireless access points or cellular base stations. Alternatively, exit system 104 may detect the signal strength of wireless devices 106, 108 at multiple points leading to the exit. Exit system 104 may include any number of hardware and software components for performing these functions.

FIG. 5 depicts an example exit system 500 according to one embodiment of the invention. Exit system 500 includes building exit in the form of a door 502 and a scanner/sensor 504. A user 506 may manually enter into scanner/sensor 504 information that uniquely identifies the user 506. For example, the user 506 may manually enter a user ID or employee code into a keypad or keyboard on scanner/sensor 504. Alternatively, the user 506 may present an identification card that is scanned by scanner/sensor 504 to automatically extract from the identification card information that identifies the user. This is more convenient for the user 506 because the user 506 does not have to manually enter their user identification into the scanner/sensor 504. As another alternative, RFID tags or other similar technology may be used that allows the scanner/sensor 504 to extract the identification information from the identification card without the user 506 having to actively present the identification card to the scanner/sensor 504. For example, the user's 506 identification card may include an RFID tag that stores the user identification information. The scanner/sensor 504 includes an RFID scanner so that when the user 506 is in proximity of the scanner/sensor 504, the user's 506 identification information is automatically retrieved from the user's 506 identification card.

In this example, the user 506 has in their possession a mobile wireless device 508. The exit system 500 is configured to detect that the mobile wireless device 508 is in proximity to the user 506. This may be accomplished using information transmitted by the mobile wireless device 506, such as position information, or by determining the location of the mobile wireless device 506 based upon communications between the mobile wireless device 506 and wireless access points or cellular base stations. According to one embodiment of the invention, the mobile wireless device 508 is configured to always communicate with the device management system 102 when the mobile wireless device 508 is powered on to ensure that the location of the mobile wireless device 508 can always be determined. The mobile wireless device 508 may also communicate status information, including for example, operational state and battery level. The use of the exit system 500 to manage information stored on mobile wireless devices is described in more detail hereinafter.

C. Device Management System

Referring to FIG. 1, according to one embodiment of the invention, device management system 102 includes several elements, including a policy manager 112, a personnel information manager 114, a document manager 116 and a device manager 118.

Policy manager 112 manages information retention polices that specify conditions under which information is to be rendered inaccessible. For example, an information retention policy may specify retention periods or absolute retention times for classes of information or for individual information items, such as individual electronic documents. Policy manager 112 also manages access policies that specify conditions under which information may be accessed. For example, an access policy may specify attributes of users that are allowed to access specified information. The attributes may specify classes, levels, of users and how long specified classes of information are to be retained before being rendered inaccessible.

Policy manager 112 manages policies that specify the rights of users with respect to mobile wireless devices. For example, a policy might specify that a user is an authorized user or owner of a particular mobile wireless device or a class of mobile wireless devices. A policy might also specify particular mobile wireless devices or classes of mobile wireless devices that users are allowed to remove from a building.

Policy manager 112 also manages policies that specify attributes of information that is not allowed to be stored on mobile wireless devices, as well as information that is not allowed to be removed from a building on mobile wireless devices. As used herein, the term “information” refers to any type of information or data. Examples of information include, without limitation, data files, emails, electronic messages and electronic documents. Example attributes include, without limitation, types of information, categories of information or names associated with information. For example, a policy may specify that public information may be removed from a building on mobile wireless devices, but that information classified as confidential cannot be removed from the building on mobile wireless devices. As another example, the policy may identify particular information by name that cannot be removed from the building on mobile wireless devices. Attributes may be specific to a particular business organization, sub-group within an organization, employee level or individual employees. For example, a policy may specify that only executives at a specified level or higher may remove classified documents from a building. As another example, a policy may specify that only users who are members of a particular team or project may remove from the building information associated with a particular project.

The policies managed by policy manager 112 may be reflected in policy data that is managed by policy manager 112. The policy data may be stored in any type of database or data files, either local to policy manager 112 or remotely at a location separate from policy manager 112. Policy manager 112 may provide an administrative user interface to allow administrative personnel to create, edit and delete policy data. Policy data may be created at another location and then stored on policy manager 112.

FIG. 6A is an example policy data table 600 maintained by policy manager 112. The policy data contained in policy data table 600 may represent a default document non-download policy. Policy data table 600 includes three columns. The first column indicates an authorization level, the second column specifies the policy to be applied inside a building or company and the third column specifies a policy to be applied outside the building or company. The policy to be applied inside a building or company indicates attributes of information that is not allowed to be stored on mobile wireless devices inside a building or company (inclusive policy). The policy to be applied outside a building or company indicates attributes of information that may not be removed from the building or company on mobile wireless devices (exclusive policy). For Authorization Level 1, which may correspond to the highest level of executives in a business organization, for example, the CEO, CFO, CIO, COO and President, the policy data indicates that any information may be stored on mobile wireless devices within a building or company, but that information having the attribute of Level 0, which may correspond for example to Top Secret information, is not permitted to be removed from the building on a mobile wireless device. Users that correspond to Authorization Level 1 may store on mobile wireless devices within a building or company any information, but may not remove from the building or company on a mobile wireless device information that has a Level 0 attribute. For Authorization Level 2, which may correspond to the next highest level of executives in the business organization, for example, Vice Presidents, the policy data indicates that information having the attribute of Level 0 is not allowed to be stored on mobile wireless devices within a building or company. For Authorization Level 2, information having the attribute of Level 0 or Level 1 is not permitted to be removed from the building or company on a mobile wireless device. Thus, in this example, users that correspond to Authorization Level 2 may not store on mobile wireless devices within a building or company information that has the Level 0 attribute. Users that correspond to Authorization Level 2 may not remove from the building, on a mobile wireless device, information that has the Level 0 or Level 1 attribute. Thus, Authorization Level 2 is more restrictive than Authorization Level 1. At the lowest authorization level, all confidential information is prohibited from being stored on mobile wireless devices, either within or outside of a building or company. Thus, the lowest authorization level is the most restrictive policy.

Policy data may be associated with logical entities other than authorization levels. Examples of other logical entities include, without limitation, projects and groups. Policy data may also be associated with individual users. FIG. 6B is an example policy data table 650 maintained by policy manager 112 that includes policy data defined for projects, groups and users. The policy data contained in policy data table 650 may represent additional access permission policies that may be used instead of or in addition to the policies of policy data table 600. The policy data for Project A indicates that users that correspond to Project A may store on mobile wireless devices within a building or company information associated with Projects A, B, C and D. Users that correspond to Project A may however, only remove from the building or company on mobile wireless devices project information that corresponds to Project A. Information corresponding to other projects may not be removed from the building or company on mobile wireless devices. Thus, unlike the policy data in policy data table 600 that specifies information that cannot be removed from buildings or companies on mobile wireless devices, the policy data in policy data table 650 specifies information that can be removed from the building or company on mobile wireless devices. Other types of information, such as public information, may also be removed from the buildings or companies on mobile wireless devices.

Groups are not limited to executive levels or projects within a business organization. For example, policy data may be established for social groups, such as social networking groups. Suppose that a various groups are established within a social network. For Group E, the policy data in policy data table 650 indicates that group information that has attributes of Groups E, G or X may be stored on mobile wireless devices within the building or company, but only group information associated with Group E may be removed from the building or company on mobile wireless devices. Thus, users associated with Group E may store on mobile wireless devices information corresponding to Groups E, G or X within the building or company, but may only remove from the building on mobile wireless devices group information that has the attributes of Group E. Other types of information, such as public information, may also be removed from the buildings or companies on mobile wireless devices.

Policy data may also be defined for individual users. In policy data table 650, the policy data for User 1 indicates that information that has the attributes of Projects A or D may be stored on mobile wireless devices within the building or company. However, only project information associated with Project A may be removed from the building or company on mobile wireless devices. The policy data for User 2 indicates that information that has the attributes of Groups E or X may be stored on mobile wireless devices within the building or project, but only project information associated with Group E may be removed from the building or company on mobile wireless devices. Other types of information, such as public information, may also be removed from the buildings or companies on mobile wireless devices. Thus, policy data may define the kinds of information that may be removed from a building on mobile wireless devices.

Users may be either directly or indirectly assigned to one or more authorization levels, projects, groups, etc. For example, a user may be directly assigned to a particular authorization level. As another example, a user may be associated with a group that is assigned to a particular authorization level. All the members of the group are therefore indirectly assigned to the particular authorization level.

Personnel information manager 114 maintains information about users. Examples of information maintained by personnel information manager 114 include, without limitation, identification information for users, including biometric information, employment, membership and classification information and authorization levels. For example, for a particular employee of a particular business organization, the personnel information manager 114 may maintain information that indicates the particular employee's name, personal information including biometric information, position, title, employment level within the particular organization, employee groups and projects associated with the particular employee and one or more authorization levels associated with the particular employee.

Document manager 116 manages the storage of and access to information. This includes maintaining and rendering inaccessible information in accordance with information retention policies maintained by policy manager 112. This also includes controlling access to information based upon access policies maintained by policy manager 112.

Device manager 118 manages mobile wireless devices 106, 108, including tracking the location of mobile wireless devices 106, 108 and causing information on mobile wireless devices 106, 108 to be rendered inaccessible, as described in more detail hereinafter.

III. Mobile Wireless Device Power on and Registration

FIG. 7 is a flow diagram 700 that depicts an approach for powering on and registering a mobile wireless device, according to one embodiment of the invention. In step 702, a mobile wireless device is powered on. For example, a user powers on mobile wireless device 106 by selecting a power switch on the mobile wireless device 106. In step 704, the mobile wireless device established communications with the device management system. For example, the mobile wireless device 106 may have previously communicated with device management system 102 and uses the settings and information from the previous communication to reestablish communications with the device management system 102. Alternatively, if the mobile wireless device 106 has not previously communicated with the device management system 102, the mobile wireless device 106 may use a network discovery approach to discover the device management system 102. According to one embodiment of the invention, the mobile wireless device 106 establishes communications with device manager 118.

In step 706, the mobile wireless device requests biometric information from the user. For example, referring to FIG. 2, the mobile wireless device 200 displays a message on the screen/touchpad 208 requesting that the user provide biometric information via the biometric input 210, e.g., by the user placing a finger or thumb on the biometric input 210. In step 708, a determination is made whether the user is registered with the device management system 102. This may include, for example, the mobile wireless device 106 transmitting the biometric information to the device manager 118, which consults personnel information manager 114 to determine whether the user is registered with the device management system 102. If in step 708 the user is determined to not be registered, then the process terminates in step 710. This may include deleting information or rendering information inaccessible and powering down the mobile wireless device 106.

If, in step 708, the user is determined to be registered, then in step 712, a determination is made whether the user is the registered owner of the mobile wireless device 106. This may be determined by the device manager 118 alone, or in conjunction with other elements of the device management system 102, such as the personnel information manager 114. If, in step 712, the user is determined to be the registered owner of the mobile wireless device 106, then in step 714, the user is granted access to the mobile wireless device 106, which may include, for example, displaying a main menu page on screen/touchpad 208.

If, in step 712, the user is determined to not be the registered owner of the mobile wireless device 106, then in step 716 a determination is made whether the ownership can be changed. The mobile wireless device 106 may be configured to not allow a remote change in ownership. For example, for added security, the ownership of some mobile wireless devices can only be changed when the mobile wireless device is connected via a wired connection. The mobile wireless device 106 may communicate with the device manager 118 to determine whether the ownership can be changed remotely. If not, then the process is terminated in step 710 as previously described herein. If the ownership can be changed remotely, then the ownership is changed in step 718. This may include, for example, the mobile wireless device 106 communicating with the device management system 102 to perform user and device authentication and registrations. The process of changing the registered owner of the mobile wireless device 106 may also include rendering inaccessible content on mobile wireless device 106, for example content associated with the prior registered owner of the mobile wireless device 106. The new registered owner is then granted access to the mobile wireless device 106, which may include, for example, displaying a main menu page on screen/touchpad 208.

IV. Managing Information on Mobile Wireless Devices

FIG. 8 is a flow diagram 800 that depicts an approach for managing information on mobile wireless devices, according to one embodiment of the invention. In this approach, it is presumed that an exit system detects that a user has requested to exit a building. For example, as previously described herein with respect to FIG. 5, a user 506 may manually enter into scanner/sensor 504 information that uniquely identifies the user 506 or the user 506 may present an identification card that is scanned by scanner/sensor 504 to automatically extract from the identification card information that identifies the user. As another alternative, RFID tags or other similar technology may be used that allows the scanner/sensor 504 to extract the identification information from the identification card without the user 506 having to actively present the identification card to the scanner/sensor 504.

In step 802, a determination is made whether the user has a mobile wireless device. For example, the exit system may detect that a particular mobile wireless device is in the proximity of the user. As previously described with respect to FIG. 5, this may be accomplished in several ways, including using information transmitted by the mobile wireless device 506, such as position information, or by determining the location of the mobile wireless device 506 based upon communications between the mobile wireless device 506 and wireless access points or cellular base stations, or through the use of RFID tags or similar technology.

If, in step 802, a determination is made that the user does not have a mobile wireless device, then in step 804, the user is allowed to exit the building. If, in step 802, a determination is made that the user does have a mobile wireless device, then in step 806, a determination is made whether the user is the registered owner of the mobile wireless device. This may be accomplished, for example, by the exit system 104 sending user identification information or user biometric information and device identification information that identifies the mobile wireless device 106, for example a MAC address or other identifying information, to the device management system 102, which determines whether the user is the registered owner of the mobile wireless device 106. For example, the exit system 104 may provide the user identification information or the user biometric information and the device identification information to the device manager 118, which in turn makes a request to the personnel information manager 114. The personnel information manager 114 determines whether the user associated with the user identification information or the user biometric information is the registered owner of the mobile wireless device 106 and provides a response to the device manager 118. The device manager 118 may also maintain the information necessary to determine whether the user is the registered owner of the mobile wireless device 106. Alternatively, the exit system 104 may contact the personnel information manager 114 directly to determine whether the user is the registered owner of the mobile wireless device 106.

FIG. 9 is a message ladder diagram 900 that depicts example message interactions between the exit system 104, the personnel information manager 114 and the device manager 118 to determine whether the user is the registered owner of the mobile wireless device 106. The exit system 104 sends to the personnel information manager 114 a request 902 to verify whether a user is the registered owner of the mobile wireless device 106. The request 902 may include, for example, user identification information or the user biometric information and device identification information, for example a MAC address, for the mobile wireless device 106.

The personnel information manager 114 uses the information contained in the request to determine whether the user is the registered owner of the mobile wireless device 106. The personnel information manager 114 then generates and transmits to the exit system 104 a response 904 indicating whether the user is the registered owner of the mobile wireless device 106. Alternatively, the personnel information manager 114 may provide a request 902 to the device manager 118, which may be the original request that is forwarded, or a new request generated by the personnel information manager 114. The device manager 118 processes the request and generates and transmits to the personnel information manager 114 a response 906 indicating whether the user is the registered owner of the mobile wireless device 106. The personnel information manager 114 forwards the response to the exit system 104. The device manager 118 may also provide the response 906 directly to the exit system 104.

If, in step 806, a determination is made that the user is not the registered owner of the mobile wireless device, then in step 808, an alert is generated and transmitted to security or some other entity, such as administrative personnel. The alert may also be logged into device management system 102. If, in step 806, a determination is made that the user is the registered owner of the mobile wireless device, then in step 810, a determination is made whether the user is authorized to remove the mobile wireless device 106 from the building. For example, exit system 104 may communicate with personnel information manager 114 to inquire whether the user of mobile wireless device 106 is authorized to remove the mobile wireless device 106 from the building. This may include, for example, the personnel information manager 114 consulting with policy manager 112 to determine whether the user has privileges to remove the mobile wireless device 106 from the building.

FIG. 10 is a message ladder diagram 1000 that depicts example message interactions between the exit system 104, the personnel information manager 114 and the policy manager 112 to determine whether the user is authorized to remove the mobile wireless device 106 from the building. The exit system 104 sends to the personnel information manager 114 a request 1002 to verify whether the user is authorized to remove the mobile wireless device 106 from the building. The request 1002 may include, for example, user identification information or the user biometric information. The request 1002 may also include device identification information, for example a MAC address, for the mobile wireless device 106. Thus, the request may be made and verified with respect to a particular user, or with respect to a particular user and a particular device.

The personnel information manager 114 uses the user identification information or the user biometric information contained in the request to determine the status of the user. The status may indicate, for example, the position, title, employment level within the particular organization, employee groups, projects or authorization levels associated with the user. The personnel information manager 114 then sends to the policy manager 112 a request 1004 to determine whether the user is authorized to remove the mobile wireless device 106 from the building. The request 1004 includes the status information for the user to enable the policy manager 112 to apply the appropriate one or more policies that apply to the user. The request 1004 may be a modified version of request 1002, with the added status information, or request 1004 may be a new request generated by the personnel information manager 114. The policy manager 112 then generates and transmits to the exit system 104, either directly or via personnel information manager 114, a response 1006 indicating whether the user is authorized to remove the mobile wireless device 106 from the building.

If, in step 810, a determination is made the user is not authorized to remove the mobile wireless device 106 from the building, then in step 808, an alert is generated and transmitted to security or some other entity, such as administrative personnel. The alert may also be logged into device management system 102. If, in step 810, a determination is made that the user is authorized to remove the mobile wireless device 106 from the building, then in step 812, information that is not authorized to be removed from the building on mobile wireless devices is rendered inaccessible. The device management system 102 determines, based upon policy data that specifies attributes of information that should not be removed from the building on mobile wireless devices, information on the mobile wireless device 106 that is to be rendered inaccessible. This determination may use policy data that is specific to the registered user of the mobile wireless device. For example, the device manager 118 may first consult the personnel information manager 114 to determine the status of the user. The status may indicate, for example, the position, title, employment level within the particular organization, employee groups, projects or authorization levels associated with the user. The device manager 118 then consults the policy manager 112 to request one or more policies that apply to the user based upon the user's status. The device manager may then provide to the document manager 116 data that indicates the one or more policies that apply to the user and request data that indicates the information on the mobile wireless device that is to be rendered inaccessible based upon the one or more policies. The document manager 116 determines, based upon the one or more policies that apply to the user, the information on the mobile wireless device 106 that is to be rendered inaccessible. The document manager 116 may maintain data that indicates the information that is currently stored on the mobile wireless device 106. Alternatively, the document manager 116 may communicate with the mobile wireless device 106 to request the information that is currently stored on the mobile wireless device 106. As another alternative, the device manager 118 may communicate with the mobile wireless device 106 to request the information that is currently stored on the mobile wireless device 106. The document manager 116 then applies the one or more policies to determine the information on the mobile wireless device 106 that is to be rendered inaccessible. For example, suppose that the user is associated with authorization level 2. This may be assigned to the user based upon the user's position within a business organization. The document manager 116 determines that a particular electronic document having an assigned level of Level 1 is stored on the mobile wireless device 106. The document manager 116 indicates to device manager 118 that the particular electronic document on the mobile wireless device 106 is to be rendered inaccessible. The information on the mobile wireless device 106 that satisfies the one or more policies for the user is rendered inaccessible. Continuing with the prior example, the device management system 102 causes the particular electronic document to be deleted, encrypted, re-encrypted or otherwise rendered inaccessible. According to one embodiment of the invention, the device manager 118 causes information on the mobile wireless device 106 to be rendered inaccessible by signaling the mobile wireless device 106. The signal may indicate the particular action to be performed with respect to the information, for example, whether the information is to be deleted, encrypted, re-encrypted or otherwise rendered inaccessible.

FIG. 11 is a message ladder diagram 1100 that depicts example message interactions between the exit system 104, the personnel information manager 114, the policy manager 112, the document manager 116 and the device manager 118 to cause information that is not authorized to be removed from the building on mobile wireless devices to be rendered inaccessible. The exit system 104 issues a request 1102 to the device manager 118 to render inaccessible information on the mobile wireless device 106 that is not authorized to be removed from the building on the mobile wireless device 106. The device manager 118 issues to the personnel information manager 114 a request 1104 for the status of the user and the personnel information manager 114 provides to the device manager 118 a response 1106 that includes the user's status. The device manager 118 issues to the policy manager 112 a request 1108 for a policy to be applied for the particular user and the policy manager 112 provides to the device manager 118 a response 1110 that includes the user's status.

The device manager 118 then issues to the mobile wireless device 106 a request 1112 for information that is currently stored on the mobile wireless device 106. The mobile wireless device generates and provides to the device manager 118 a response 1114 that indicates the information currently stored on the mobile wireless device. In situations where the document manager 116 tracks the information stored on mobile wireless devices, the request may be made to the document manager 116 instead of the mobile wireless device 106.

The device manager 118 then generates and sends to the document manager 116 a request 1116 for information on the mobile wireless device 106 to be rendered inaccessible. The request 1116 may include data that identifies the information stored on the mobile wireless device 106 and data that identifies the one or more policies to be applied to the information. The request may identify the one or more policies by name, code or some other identifying information. The document manager 116 applies the one or more policies to the information stored on the mobile wireless device 106 to determine information on the mobile wireless device 106 that is to be rendered inaccessible. For example, referring to FIG. 6, suppose that a determination is made by the policy manager 112 that Executive Level 2 policy applies to the user and that the mobile wireless device 106 includes particular information that has an attribute of top secret. The response 1118 identifies the particular information. The device manager 118 generates and issues to the mobile wireless device 106 a request or command 1120 to render inaccessible the particular information from the mobile wireless device and the mobile wireless device renders the particular information inaccessible. This may include, for example, deleting the particular information, encrypting the particular information, re-encrypting the particular information or otherwise rendering inaccessible the particular information.

Returning to FIG. 8, after the information on the mobile wireless device 106 has been rendered inaccessible, in step 814, a recordation and/or notification may be made to record that the information on the mobile wireless device 106 was rendered inaccessible. The device manager 118 may generate a record that indicates the information on the mobile wireless device 106 that was rendered inaccessible. Other information may also be recorded, for example, data that identifies the user and the last known location of the mobile wireless device 106. The device manager 118 may also generate and transmit a notification, for example to an administrator, that the information on the mobile wireless device 106 has been rendered inaccessible. In step 816, the user is allowed to exit the building.

Variations of the aforementioned approach may also be used. For example, in situations where the device management system 102 tracks the information stored on mobile wireless devices 106, 108, then there is no need for the device management system 102 to query the mobile wireless devices 106, 108 to obtain data that identifies the information currently stored on mobile wireless device 106, 108. For example, document manager 116 may track information stored on the mobile wireless devices 106, 108. Instead, when the exit system 104 issue a request to render inaccessible information on a particular mobile wireless device that should not be removed from the building on the particular mobile wireless device, the device management system 102 determines the information on the particular mobile wireless device that is to be rendered inaccessible and instructs the particular mobile wireless device to render the information inaccessible.

As another example, in some situations the determination of whether the user is the registered owner is not used. For example, in business organizations with a small number of employees, or other situations where unauthorized use of devices is not a concern, being a registered owner may not be required to remove a mobile wireless device from a building. Similarly, verification that a user is authorized to remove a mobile wireless device from a building, e.g., in step 810, may also not be used.

V. Low Power Considerations

In the various embodiments described herein, it is presumed that the mobile wireless device on which the information is rendered inaccessible has sufficient power to operate and respond to signals from the device management system 102 to render the information inaccessible. If signals emitted from a mobile wireless device are relied upon to determine the proximity of the mobile wireless device with respect to an exit of a building, then there is a risk that if the power level of the mobile wireless device is sufficiently low so that the mobile wireless device no longer transmits its location, the mobile wireless device may be removed from a building with information that should not be removed from the building on mobile wireless devices and that has not been rendered inaccessible. The use of other location methods that do not rely upon transmissions from mobile wireless devices can prevent this from occurring. For example, RFID technology does not require the mobile wireless device to actively transmit location information and the mobile wireless device does not have to be in a powered on state. This would prevent unauthorized users from removing mobile wireless devices from buildings, but would not prevent authorized users from removing from the building information that should not be removed from the building on mobile wireless devices.

According to one embodiment of the invention, when the power level, e.g., battery level, of a mobile wireless device falls below a specified threshold, one or more actions are taken to prevent information stored on the mobile wireless device from being removed from the building on the mobile wireless device in a usable state. This approach may be used irrespective of the location of the mobile wireless device. The approach may also be implemented for mobile wireless devices that are powered down, before the mobile wireless devices are completely powered off. One example of an action that may be performed in this situation is the deletion, from the mobile wireless device, of information that is not authorized to be removed from the building on mobile wireless devices, as previously described herein. While effective in preventing information from being removed from a building on mobile wireless devices that are in a low power state or are powered off, this approach may have the undesirable consequence of deleting information from mobile wireless devices where the users had no intention of leaving the building, and thus may present an inconvenience to users.

Another example of an action that may be performed in this situation is to encrypt, or re-encrypt, information stored on the mobile wireless device. For example, suppose that it is determined that the power level of a particular mobile wireless device has dropped below a specified threshold, or that the particular mobile wireless device is being powered down. Information that is not supposed to be removed from the building on mobile wireless devices may be encrypted, instead of deleted from the mobile wireless device. For example the device management system 102 may generate an encryption key and transmit the encryption key to the particular mobile wireless device with an instruction to encrypt specified information with the encryption key. This prevents the removal, from a building on a mobile wireless device, information in a usable state that is not intended to be removed from the building on a mobile wireless device. While encryption does not guarantee that a skilled third party cannot decrypt the information, this approach at least makes it more difficult for a third party to access the information.

Once the power level of the particular mobile wireless device has been restored, the device management system 102 may instruct the particular mobile wireless device to decrypt the information that was previously encrypted. Information that is already encrypted on mobile wireless devices may be re-encrypted using a different encryption key, or an additional encryption key if a layered encryption approach is used. This approach may be implemented transparent to the user to provide improved control over information stored on mobile wireless devices, without the inconvenience of deleting information when a user has no intention of removing the mobile wireless device from the building.

The aforementioned approaches for rendering inaccessible information on mobile wireless devices when the power level of a particular mobile wireless device has dropped below a specified threshold, or that the particular mobile wireless device is being powered down may also be applied if the wireless communication transmission capability of a mobile wireless device falls below a specified threshold. For example, if the transmission strength or quality of a communications link falls below a specified threshold, then information on the mobile wireless device may be rendered inaccessible as described herein.

VI. Implementation Mechanisms

Although the flow diagrams of the present application depict a particular set of steps in a particular order, other implementations may use fewer or more steps, in the same or different order, than those depicted in the figures.

According to one embodiment of the invention, the techniques described herein are implemented by one or more special-purpose computing devices. The special-purpose computing devices may be hard-wired to perform the techniques, or may include digital electronic devices such as one or more application-specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs) that are persistently programmed to perform the techniques, or may include one or more general purpose hardware processors programmed to perform the techniques pursuant to program instructions in firmware, memory, other storage, or a combination. Such special-purpose computing devices may also combine custom hard-wired logic, ASICs, or FPGAs with custom programming to accomplish the techniques. The special-purpose computing devices may be desktop computer systems, mobile computer systems, handheld devices, networking devices or any other device that incorporates hard-wired and/or program logic to implement the techniques.

FIG. 12 is a block diagram that depicts an example computer system 1200 upon which embodiments of the invention may be implemented. Computer system 1200 includes a bus 1202 or other communication mechanism for communicating information, and a processor 1204 coupled with bus 1202 for processing information. Computer system 1200 also includes a main memory 1206, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1202 for storing information and instructions to be executed by processor 1204. Main memory 1206 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1204. Computer system 1200 further includes a read only memory (ROM) 1208 or other static storage device coupled to bus 1202 for storing static information and instructions for processor 1204. A storage device 1210, such as a magnetic disk or optical disk, is provided and coupled to bus 1202 for storing information and instructions.

Computer system 1200 may be coupled via bus 1202 to a display 1212, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 1214, including alphanumeric and other keys, is coupled to bus 1202 for communicating information and command selections to processor 1204. Another type of user input device is cursor control 1216, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1204 and for controlling cursor movement on display 1212. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.

Computer system 1200 may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic or computer software which, in combination with the computer system, causes or programs computer system 1200 to be a special-purpose machine. According to one embodiment of the invention, those techniques are performed by computer system 1200 in response to processor 1204 executing one or more sequences of one or more instructions contained in main memory 1206. Such instructions may be read into main memory 1206 from another computer-readable medium, such as storage device 1210. Execution of the sequences of instructions contained in main memory 1206 causes processor 1204 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.

The term “computer-readable medium” as used herein refers to any medium that participates in providing data that causes a computer to operation in a specific manner. In an embodiment implemented using computer system 1200, various computer-readable media are involved, for example, in providing instructions to processor 1204 for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1210. Volatile media includes dynamic memory, such as main memory 1206. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or memory cartridge, or any other medium from which a computer can read.

Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to processor 1204 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 1200 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 1202. Bus 1202 carries the data to main memory 1206, from which processor 1204 retrieves and executes the instructions. The instructions received by main memory 1206 may optionally be stored on storage device 1210 either before or after execution by processor 1204.

Computer system 1200 also includes a communication interface 1218 coupled to bus 1202. Communication interface 1218 provides a two-way data communication coupling to a network link 1220 that is connected to a local network 1222. For example, communication interface 1218 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 1218 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 1218 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.

Network link 1220 typically provides data communication through one or more networks to other data devices. For example, network link 1220 may provide a connection through local network 1222 to a host computer 1224 or to data equipment operated by an Internet Service Provider (ISP) 1226. ISP 1226 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 1228. Local network 1222 and Internet 1228 both use electrical, electromagnetic or optical signals that carry digital data streams.

Computer system 1200 can send messages and receive data, including program code, through the network(s), network link 1220 and communication interface 1218. In the Internet example, a server 1230 might transmit a requested code for an application program through Internet 1228, ISP 1226, local network 1222 and communication interface 1218. The received code may be executed by processor 1204 as it is received, and/or stored in storage device 1210, or other non-volatile storage for later execution.

VII. Meeting Management

Mobile wireless devices as described herein may be used to arrange and manage electronic meetings between entities, such as individuals, groups and organizations. The communications used to establish and manage electronic meetings may be made using any type of network, which may vary depending upon a particular implementation. For example, mobile wireless devices may use cellular, IEEE 802.XX or any wireless means built in the devices. Since the mobile wireless devices are connected to the device management system 102, a user with a mobile wireless device is able to access names, organizations and contact information of meeting participants to arrange the meeting. At the time of the electronic meeting, the device management system 102 connects the mobile wireless devices of the meeting participants.

According to one embodiment of the invention, authorization is performed during the process of arranging an electronic meeting. During the arrangement of a meeting (see FIG. 18 and the accompanying description), the device management system 102 determines whether the planned participants of a meeting are authorized to access documents and/or information that will be made available to meeting participants. If one or more of the planned participants are not authorized to access one or more documents and/or information that will be made available to meeting participants, the device management system 102 notifies the meeting organizer of this condition.

According to another embodiment of the invention, communications between mobile wireless devices and user input, including writing entered via a stylus, for mobile wireless devices are logged and log data is generated and stored in the device management system 102 to document the communications and user inputs. As described in more detail hereinafter, user input entered into a mobile wireless device is shared with other mobile wireless devices of participants in the electronic meeting.

FIG. 13 depicts the use of a mobile wireless device to conduct an electronic meeting among participants.

FIG. 14 depicts an example display for a mobile wireless device. The display includes a main common display area 1402, a middle display area 1430 and a bottom display area 1440. The main common display area 1402 is shared by all meeting attendees. As described in more detail hereinafter, the main common display area 1402 may be updated to reflect user input on other mobile wireless devices, creating a virtual whiteboard that is visible to all meeting participants. The middle display area 1430 holds a file specifier 1410 and selected files. File objects in the file specifier 1410 may be dragged to either main common display area 1402 or other locations within the middle display area 1430. The middle display area 1430 and a bottom display area 1440 support scrolling with, for example, a finger or stylus moving over the area. For example, file objects may be moved to the main common display area 1402 to be shared by the meeting attendees. In the present example, the bottom display area 1440 contains work areas referred to herein as “boards” and in the present example includes three boards, identified as Board 1 1420, Board 2 1422 and Board 3 1424. If needed, more boards can be added by selecting a next button (not depicted) in the bottom of the Board 4. Boards may be moved to the main common display area 1402 to share as a common white board.

FIG. 15 depicts example contents of file specifier 1410. GUI objects are provided for viewing the contents of folders containing sub-folders and documents. More specifically, “+” and “−” GUI objects 1510 are provided to expand and contract the folders 1500 a-1500 e. A folder named “My Folder” 1500 a is a root folder for the stored documents. Other folders 1500 b-1500 e follow a regular tree structure. A folder named “5 Jul. 2010” contains the documents Doc 1 through Doc 4, identified by reference numerals 1520 a-1520 d, and are used in a meeting scheduled using mobile wireless devices. These folders and files may be created and managed by the user of the mobile wireless device.

FIG. 16 depicts the sharing of information between mobile wireless devices participating in an electronic meeting. A main common display 1402A is displayed on a first mobile wireless device and a main common display 1402B is displayed on a second mobile wireless device. A user of the first mobile wireless device uses the stylus pen to select either a pen GUI object 1602 or an eraser GUI object 1604. Based upon whether the user selects the pen GUI object 1602 or the eraser GUI object 1604, the cursor in the display changes to pen or eraser, respectively. Previous (Prev) GUI object 1620 and Next GUI object 1622 allow a user to view the previous or next page or slide of a document. A user may use their finger or a stylus to scroll the display.

According to one embodiment of the invention, user input entered into the first mobile wireless device is securely shared among other mobile wireless devices participating in an electronic meeting, to allow other users to view the information. In response to detecting user input, the first mobile wireless device generates input data that represents the user input and securely transmits the input data 1606 to the device management system 102. The input data 1606 may be transmitted using any type of data format or communications format, depending upon a particular implementation. Device management system 102 securely transmits the input data 1606 to one or more mobile wireless devices participating in the electronic meeting. In the present example, device management system 102 transmits the input data 1606 as display information 1608 to the second mobile wireless device. The second mobile wireless device processes the display information 1608 and causes the display of the second mobile wireless device to reflect the display information 1608. This allows meeting participants to view a virtual whiteboard, which can greatly facilitate electronic meetings.

FIG. 17 depicts an example implementation of the device manager 118 for managing electronic meetings on mobile wireless devices. Device manager 118 includes a meeting support system 1700 and a meeting session management system 1720. The meeting support system 1700 supports the arrangement of electronic meetings using a meeting arrangement request form and a meeting request, as described in more detail hereinafter with respect to FIGS. 21A and 22B. A meeting organizer uses the meeting arrangement request form of FIG. 21A to request the arrangement of an electronic meeting. Then, the meeting support system 1700 uses the meeting request of FIG. 21B to obtain responses from the requested meeting attendees. Meeting session management system 1720 coordinates the ongoing meeting session.

FIG. 18 is a flow diagram 1800 that depicts arranging an electronic meeting among mobile wireless devices using meeting support system 1700. In step 1802, the meeting organizer accesses the meeting arrangement request form of FIG. 21A to request an electronic meeting. For example, a user uses a mobile wireless device to access meeting support system 1700 and retrieve the meeting arrangement request for of FIG. 21A. As depicted in FIG. 21A, a meeting requestor may specify via the meeting arrangement request form, an agenda, a list of requested attendees and a proposed date and time for the electronic meeting. The entry of information may be assisted by an auto-lookup and/or auto complete function. For example, as the meeting organizer enters the name of an attendee, character by character, the meeting a list of candidate attendees matching the entered characters may be displayed. The candidate attendee list may contain names and the organizations. The user may then select from the list of candidate attendees so that the user does not have to type the entire name of an attendee. The meeting support system 1700 may retrieve candidate attendee information from the personnel information manager 114 and provide the candidate attendee information to mobile wireless devices. In step 1804, a meeting request as depicted in FIG. 21B is transmitted to each of the specified meeting attendees. For example, the meeting support system 1700 may generate and transmit an electronic meeting request to each of the meeting participants.

In step 1806, results of the meeting requests are transmitted to the meeting organizer. For example, the meeting support system 1700 transmits results of the meeting requests to the meeting organizer. In step 1808, the meeting organizer decides whether to proceed with the meeting, based upon the results. For example, the meeting organizer may decide to not conduct the electronic meeting if an insufficient number of attendees indicate that they will attend the electronic meeting. If the meeting organizer decides to not proceed with the electronic meeting, then in step 1810, a determination is made whether to arrange another electronic meeting. If so, then control returns to step 1802. If not, then in 1814, a meeting cancellation notice is transmitted and the process is complete in step 1816. For example, the meeting support system 1700 may transmit a meeting cancellation notice to all meeting invitees.

If, in step 1808, the meeting organizer decides to proceed with the electronic meeting, then in step 1818, the meeting organizer is asked to correct any conflicts in the proposed date and time of the electronic meeting. The meeting attendees are notified of the final date and time.

Once the date and time is fixed, the system notifies all the attendees about the electronic meeting and time in step 1818. In step 1820, the meeting organizer is queried for any documents to be included in or used in the electronic meeting. In step 1822, the meeting organizer submits a list of documents to be used in the electronic meeting. If there is no need for the document, the list will be empty. If the list is empty, the following steps shall be skipped to the end 1828. In step 1824, access rights of the documents are determined and a determination is made whether the meeting invitees are authorized to access the documents. For example, the meeting support system 1700 may determine the access rights of the documents specified by the meeting organizer by consulting other elements within the device management system 102. For example, the device management system 102 may consult the document manager 116 to determine one or more policies that apply to a document and then consult the policy manager 112 for details about the policy, for example, the access rights required to access the document. The meeting support system 1700 then determines whether the meeting invitees are authorized to access the documents. If one or more of the meeting invitees are not authorized to access any of the documents, then in step 1826, the meeting organizer is notified so that the meeting organizer may take appropriate action. For example, the meeting organizer may choose to not use one or more documents for which the meeting attendees do not have proper authorization to access. As another example, the meeting organizer may change the meeting attendees, e.g., by excluding from the meeting one or more users who are not authorized to access the documents. Alternatively, the meeting organizer may change the access rights required to access one or more of the documents and/or change the authorization of one or more of the users. The process is complete in step 1828.

FIG. 19 depicts an example logical structure 1900 of the meeting session management system 1720. The meeting session management system 1720 is able to access various other managers 1910, 1904, 1906 of Device Management System 102 along with the Session Information 1902. A MainCommonDisplay module 1908 coordinates the current session on the main common display 1402 of participating mobile wireless devices. The Main Common Display module 1908 contains the display, DisplayFrame 1912 and input, InputFrameReceptor 1914. DisplayFrame 1912 contains Document 1916 that is displayed. Document is a generic idea and the board in 1440 is also included. InputFrameReceptor 1914 contains multiple InputData 1918. InputData 1918 refers to any input including erase commands and drawing input. InputData 1918 also contains information about the input sender and the time (standard time of the company). The Document 1916 and InputData 1918 are associated to create the comments on the document. In addition, the Meeting Session Manager System 1720 enforces access rights of electronic documents and information. A user may have different, e.g., broader, access rights when located in a building than when the user is located outside of the building. When a user person is not authorized to access the document, the user's Main Common Display may be disabled.

FIG. 20 is a message ladder that depicts example interactions between the meeting session manager 1720 and several mobile wireless devices via the main common display 1402. the Meeting Session Manager 1720 with the Tablet Devices through the Main Common Display.

FIG. 21A depicts a meeting arrangement request form used by a user to request an electronic meeting via a mobile wireless device. The form queries a user for an agenda, a list of requested attendees and one or more proposed dates and times. According to one embodiment of the invention, the meeting support system 1700 transmits the meeting arrangement request form to a meeting organizer and also processes completed forms received from meeting organizers. The meeting arrangement request form may be generated in a wide variety of formats that may vary depending upon a particular implementation. For example, the meeting arrangement request form may be generated as a Web page. The meeting support system 1700 may assist the meeting organizer by listing candidate attendees along with their department names while the attendees are entered. The meeting support system 1700 may also display a calendar to check the dates for availability. The meeting support system 1700 may also display schedules and/or otherwise indicate the availability of meeting attendees to assist the organizer in scheduling the meeting.

FIG. 21B depicts an example electronic meeting request used to invite attendees to an electronic meeting, according to one embodiment of the invention. In this example, the electronic meeting request specifies an agenda for the electronic meeting, the meeting organizer, one or more candidate dates and times for the electronic meeting. The electronic meeting request also requests the attendee indicate whether or not they will attend the electronic meeting. Other information and other presentation of the information may be provided, depending upon a particular implementation. According to one embodiment of the invention, the electronic meeting request depicted in FIG. 21B is generated by the meeting support system 1700.

In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is, and is intended by the applicants to be the invention is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. 

What is claimed is:
 1. An apparatus comprising: a meeting support system configured to: receive, from a mobile wireless device that corresponds to a meeting organizer, a request for an electronic meeting that specifies a plurality of participants for the electronic meeting, receive, from the mobile wireless device, identification data that identifies one or more documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, in response to receiving, from the mobile wireless device, the identification data that identifies one or more electronic documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information, and in response to determining that one or more participants from the plurality of participants is not authorized to access any of the one or more electronic documents or information, the meeting support system generating and transmitting to the mobile wireless device a message that indicates that one or more participants from the plurality of participants is not authorized to access at least one of the one or more electronic documents or information.
 2. The apparatus as recited in claim 1, wherein the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information includes: determining one or more access policies that apply to the one or more electronic documents or information, wherein the one or more access policies specify one or more requirements for accessing the one or more electronic documents or information, determining access rights for the plurality of participants, determining, based upon the one or more policies and the access rights, whether the plurality of participants are authorized to access the one or more electronic documents or information.
 3. The apparatus as recited in claim 1, wherein the meeting support system is configured to query the mobile wireless device for the identification data that identifies the one or more documents or information that will be made available to the plurality of participants.
 4. The apparatus as recited in claim 1, further comprising a meeting session management system configured to: receive information pertaining to the electronic meeting entered via one or more of the mobile wireless device and the plurality of mobile wireless devices, and transmit the information to the other mobile wireless devices from the mobile wireless device and the plurality of mobile wireless devices.
 5. The apparatus as recited in claim 1, further comprising: a location system configured to: detect that a user has requested to leave a specified location, detect that a particular mobile wireless device is in proximity to the user; and a device management system configured to: determine whether the user is authorized to remove the mobile wireless device from the specified location, if the user is authorized to remove the mobile wireless device from the specified location, determine, based upon policy data that specifies attributes of information that should not be removed from the specified location on mobile wireless devices, information on the mobile wireless device that is to be rendered inaccessible, and cause the information on the mobile wireless device to be rendered inaccessible.
 6. A computer-implemented method for managing an electronic meeting, the computer-implemented method comprising: a meeting support system: receiving, from a mobile wireless device that corresponds to a meeting organizer, a request for an electronic meeting that specifies a plurality of participants for the electronic meeting, receiving, from the mobile wireless device, identification data that identifies one or more documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, in response to receiving, from the mobile wireless device, the identification data that identifies one or more electronic documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information, and in response to determining that one or more participants from the plurality of participants is not authorized to access any of the one or more electronic documents or information, the meeting support system generating and transmitting to the mobile wireless device a message that indicates that one or more participants from the plurality of participants is not authorized to access at least one of the one or more electronic documents or information.
 7. The computer-implemented method as recited in claim 6, wherein the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information includes: determining one or more access policies that apply to the one or more electronic documents or information, wherein the one or more access policies specify one or more requirements for accessing the one or more electronic documents or information, determining access rights for the plurality of participants, determining, based upon the one or more policies and the access rights, whether the plurality of participants are authorized to access the one or more electronic documents or information.
 8. The computer-implemented method as recited in claim 6, wherein the meeting support system is configured to query the mobile wireless device for the identification data that identifies the one or more documents or information that will be made available to the plurality of participants.
 9. The computer-implemented method as recited in claim 6, further comprising a meeting session management system configured to: receive information pertaining to the electronic meeting entered via one or more of the mobile wireless device and the plurality of mobile wireless devices, and transmit the information to the other mobile wireless devices from the mobile wireless device and the plurality of mobile wireless devices.
 10. The computer-implemented method as recited in claim 6, further comprising: a location system configured to: detect that a user has requested to leave a specified location, detect that a particular mobile wireless device is in proximity to the user; and a device management system configured to: determine whether the user is authorized to remove the mobile wireless device from the specified location, if the user is authorized to remove the mobile wireless device from the specified location, determine, based upon policy data that specifies attributes of information that should not be removed from the specified location on mobile wireless devices, information on the mobile wireless device that is to be rendered inaccessible, and cause the information on the mobile wireless device to be rendered inaccessible.
 11. A computer-readable medium for managing an electronic meeting, the computer-readable medium storing instructions which, when process by one or more processors, causes: a meeting support system: receiving, from a mobile wireless device that corresponds to a meeting organizer, a request for an electronic meeting that specifies a plurality of participants for the electronic meeting, receiving, from the mobile wireless device, identification data that identifies one or more documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, in response to receiving, from the mobile wireless device, the identification data that identifies one or more electronic documents or information that will be made available to the plurality of participants via the plurality of mobile wireless devices in connection with the electronic meeting, the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information, and in response to determining that one or more participants from the plurality of participants is not authorized to access any of the one or more electronic documents or information, the meeting support system generating and transmitting to the mobile wireless device a message that indicates that one or more participants from the plurality of participants is not authorized to access at least one of the one or more electronic documents or information.
 12. The computer-readable medium as recited in claim 11, wherein the meeting support system determining whether the plurality of participants are authorized to access the one or more electronic documents or information includes: determining one or more access policies that apply to the one or more electronic documents or information, wherein the one or more access policies specify one or more requirements for accessing the one or more electronic documents or information, determining access rights for the plurality of participants, determining, based upon the one or more policies and the access rights, whether the plurality of participants are authorized to access the one or more electronic documents or information.
 13. The computer-readable medium as recited in claim 11, wherein the meeting support system is configured to query the mobile wireless device for the identification data that identifies the one or more documents or information that will be made available to the plurality of participants.
 14. The computer-readable medium as recited in claim 11, further comprising additional instructions which, when processed by the one or more processors, causes: receive information pertaining to the electronic meeting entered via one or more of the mobile wireless device and the plurality of mobile wireless devices, and transmit the information to the other mobile wireless devices from the mobile wireless device and the plurality of mobile wireless devices.
 15. The computer-readable medium as recited in claim 11, further comprising additional instructions which, when processed by the one or more processors, causes: a location system configured to: detect that a user has requested to leave a specified location, detect that a particular mobile wireless device is in proximity to the user; and a device management system configured to: determine whether the user is authorized to remove the mobile wireless device from the specified location, if the user is authorized to remove the mobile wireless device from the specified location, determine, based upon policy data that specifies attributes of information that should not be removed from the specified location on mobile wireless devices, information on the mobile wireless device that is to be rendered inaccessible, and cause the information on the mobile wireless device to be rendered inaccessible. 