System and method of initiating user notification for a wireless device

ABSTRACT

A system and method of initiating user notification for a wireless device is provided for allowing a user to locate the wireless device when it has been accidentally misplaced. Notification settings of a wireless device indicate whether incoming communication triggers user notification. If the wireless device has been configured to not ring, then calling the wireless device will not help the user to locate the wireless device. A message (e.g. email, SMS) configured for prompting user notification notwithstanding the notification settings is sent to the wireless device. The message is routed through a wireless network and received by the wireless device. In accordance with an embodiment of the disclosure, in response to the message, the wireless device executes a user notification notwithstanding the notification settings. In some implementations, the user notification includes audible ringing, which might help the user to locate the wireless device based on the audible ringing.

RELATED APPLICATION

This application is a continuation application of U.S. patentapplication Ser. No. 12/118,195 filed May 9, 2008, the entire contentsof which are incorporated by reference.

FIELD OF THE DISCLOSURE

This disclosure relates to wireless communication, and more particularlyto initiating user notification for a wireless device.

BACKGROUND

A wireless device such as a cell phone or PDA (Personal DigitalAssistant) provides a user with various functionality such as telephony,email, text messaging, etc. The user can be provided with thisfunctionality even when the user moves from one location to anotherlocation. Wireless devices offer the user the flexibility of mobility,which is absent in wired devices.

Although the flexibility of mobility can offer advantages for the user,at the same time there might be certain disadvantages. In particular,since the wireless device is portable, the user might accidentallymisplace the wireless device. The result is that the user might have tospend time looking for the wireless device. Looking for the wirelessdevice can be time consuming and annoying for the user.

An existing approach for finding the wireless device is to call thewireless device using another phone. Upon hearing audible ringing fromthe wireless device, the user can typically locate the wireless devicebased on the audible ringing. However, if the wireless device has beenconfigured to not ring, then calling the wireless device will not helpthe user to locate the wireless device. Thus, the existing approach doesnot adequately solve the problem.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments will now be described with reference to the attacheddrawings in which:

FIG. 1 is a block diagram of an example communication system featuring awireless device and another computing device;

FIG. 2 is a flowchart of a method of a wireless device executing a usernotification;

FIG. 3 is a flowchart of another method of a wireless device executing auser notification;

FIG. 4 is a flowchart of a method of a computing device messaging awireless device for user notification; and

FIG. 5 is a block diagram of another mobile device.

DETAILED DESCRIPTION OF EMBODIMENTS

It should be understood at the outset that although illustrativeimplementations of one or more embodiments of the present disclosure areprovided below, the disclosed systems and/or methods may be implementedusing any number of techniques, whether currently known or in existence.The disclosure should in no way be limited to the illustrativeimplementations, drawings, and techniques illustrated below, includingthe exemplary designs and implementations illustrated and describedherein, but may be modified within the scope of the appended claimsalong with their full scope of equivalents.

According to an aspect, there is provided a method for execution in awireless device, the method comprising: maintaining notificationsettings that indicate whether incoming communication triggers usernotification; maintaining a user password for overriding thenotification settings; receiving a message that has been routed througha wireless network from a computing device, the message comprising apassword; determining whether the message is to trigger usernotification based on whether the password provided by the messagematches the user password that has been maintained; if the message hasbeen determined to trigger user notification and the notificationsettings indicate that incoming communication should trigger usernotification, executing the user notification according to thenotification settings; if the message has been determined to triggeruser notification but the notification settings indicate that incomingcommunication should not trigger user notification, overriding thenotification settings and executing the user notification; and if themessage has been determined to not trigger user notification, avoidingexecution of the user notification.

According to another aspect, there is provided a non-transitory computerreadable medium having computer executable instructions stored thereonfor execution on a processor so as to implement the method summarisedabove.

According to another aspect, there is provided a wireless devicecomprising: at least one memory configured for: maintaining notificationsettings that indicate whether incoming communication triggers usernotification; and maintaining a user password for overriding thenotification settings; a wireless access radio configured for receivinga message that has been routed through a wireless network from acomputing device, the message comprising a password; a notificationinitiator configured for: determining whether the message is to triggeruser notification based on whether the password provided by the messagematches the user password that has been maintained; if the message hasbeen determined to trigger user notification and the notificationsettings indicate that incoming communication should trigger usernotification, executing the user notification according to thenotification settings; if the message has been determined to triggeruser notification but the notification settings indicate that incomingcommunication should not trigger user notification, overriding thenotification settings and initiating the user notification; and if themessage has been determined to not trigger user notification, avoidingexecution of the user notification; and a user interface configured forexecuting the user notification.

According to another aspect, there is provided a method for execution ina computing device, the computing device being capable of communicatingwith a wireless device having notification settings indicating thatincoming communication should not trigger user notification, the methodcomprising: receiving input for initiating user notification by thewireless device notwithstanding the notification settings; and inresponse to the input: generating a message for prompting usernotification; and sending the message for prompting user notification,the message being routed through a wireless network to the wirelessdevice; wherein the message comprises a password for overriding thenotification settings thereby activating user notification by thewireless device notwithstanding the notification settings.

According to another aspect, there is provided a non-transitory computerreadable medium having computer executable instructions stored thereonfor execution on a processor so as to implement the method summarisedabove.

According to another aspect, there is provided a computing devicecapable of communicating with a wireless device having notificationsettings indicating that incoming communication should not trigger usernotification, the computing device comprising: a user interfacecomprising an input designated for sending a message for prompting usernotification; and a notification messenger configured to, in response toactivation of the input: generate a message for prompting usernotification; and send a message configured for prompting usernotification, the message being routed through a wireless network to thewireless device; wherein the message comprises a password for overridingthe notification settings thereby activating user notification by thewireless device notwithstanding the notification settings.

Other aspects and features of the present disclosure will becomeapparent, to those ordinarily skilled in the art, upon review of thefollowing description of the specific embodiments of the disclosure.

Communication System

Referring first to FIG. 1, shown is a block diagram of an examplecommunication system featuring a wireless device 10 and anothercomputing device 30. The communication system has a wireless network 20through which the wireless device 10 and the computing device 30 cancommunicate. The communication system may have other components, butthey are not shown for sake of simplicity. The wireless device 10 hasnotification settings 11, a wireless access radio 12, a notificationinitiator 13, a processor 14, and a user interface 15. The computingdevice 30 has a user interface 31, a notification messenger 32, and aprocessor 33. The wireless device 10 and the computing device 30 mayhave other components, but they are not shown for sake of simplicity.

In operation, the wireless device 10 communicates with the wirelessnetwork 20 using its wireless access radio 12. The wirelesscommunication is over a wireless connection 21 between the wirelessdevice 10 and the wireless network 20. The computing device 30 maysimilarly communicate with the wireless network 20 over a connection 22,which might be wired or wireless depending on whether the computingdevice 30 is a wireless device. In the illustrated example, it isassumed that the computing device 30 is used by the same user as thewireless device 10.

Since the wireless device 10 is mobile, the user of the wireless device10 might accidentally misplace the wireless device 10. The notificationsettings 11 of the wireless device 10 indicate whether incomingcommunication triggers user notification. If the wireless device 10 hasbeen configured to not ring, then calling the wireless device 10 willnot help the user to locate the wireless device 10.

The user interface 31 of the computing device 30 is used for initiatinguser notification by the wireless device 10 notwithstanding thenotification settings 11. In accordance with an embodiment of thedisclosure, in response to the user input, the notification messenger 32of the computing device 30 sends to the wireless device 10 a message forprompting user notification notwithstanding the notification settings11. The message is routed through the wireless network 20 and receivedby the wireless device 10. In accordance with an embodiment of thedisclosure, in response to the message, the notification initiator 13initiates a user notification notwithstanding the notification settings11. The user interface 15 executes the user notification.

If the notification settings 11 indicate that incoming communicationshould not trigger user notification, then the notification initiator 13overrides the notification settings 11 and subsequently initiates theuser notification. Note that if the notification settings 11 indicatethat incoming communication should trigger user notification, then theremight be no need to override the notification settings 11. However, notethat the notification settings 11 might be overridden in order to changethe way in which the user notification is executed. For instance, thenotification settings 11 might be overridden in order to allow anaudible ringing when the notification settings 11 would otherwise notallow this.

There are many possibilities for the user notification. In someimplementations, the user notification depends on notification means ofthe user interface 15. The user interface 15 might for example include aspeaker, an LED (light emitting diode), an LCD (Liquid Crystal Display)screen, a motor for vibrating, etc. In some implementations, the usernotification includes audible ringing, which might help the user tolocate the wireless device 10 based on the audible ringing. Moregenerally, the user notification can include one or more appropriatenotifications such as an audible noise, a flashing light, andvibrations, etc. In some implementations, the user notification includesall notification means of the user interface 15. It might help the userlocate the wireless device 10 if the wireless device 10 simultaneouslyrings, has flashing lights, and vibrates. In some implementations, theuser notification occurs for a predetermined time duration. In otherimplementations, the user notification occurs according to apredetermined schedule. Other implementations are possible.

There are many possibilities for the message for prompting usernotification notwithstanding the notification settings 11. In someimplementations, the message is a packet switched message, for examplean email message or an SMS message. In some implementations, the packetswitched message is configured for prompting user notificationnotwithstanding the notification settings 11. For example, in someimplementations, the packet switched message includes a commandprompting user notification notwithstanding the notification settings11. The command might for example be a keyword such as “locate me”.Other commands are possible. The command might be part of a messageheader, or part of a message body. The format and location of thecommand within the message might depend on the type of packet switchedmessage being used. In some implementations, the message also includes auser address for use in routing the packet switched message to thewireless device 10 through a wireless network.

In alternative implementations, the message is a circuit switchedmessage, for example a phone call from a particular phone number. Thewireless device 10 can determine whether the circuit switched message isto trigger user notification notwithstanding the notification settings11 based on the origin of the phone call. For instance, in someembodiments, the wireless device 10 determines that the circuit switchedmessage is to trigger user notification notwithstanding the notificationsettings 11 if the circuit switched message originates from a trustedsource, for example a known call centre.

More generally, the message can be any appropriate message from whichthe wireless device 10 can deduce that user notification is to beexecuted notwithstanding the notification settings 11. In someimplementations, the message does not include any explicit encoding thatwould indicate that user notification is to be executed notwithstandingthe notification settings 11. In other implementations, the messageincludes specific encoding for instructing the wireless device 10 thatuser notification is to be executed notwithstanding the notificationsettings 11. Other implementations are possible.

There are many possibilities for the computing device 30. In someimplementations, the computing device 30 is a wireless device. In otherimplementations, the computing device 30 is a personal computer. Moregenerally, the computing device 30 can be any computing device capableof sending a message for prompting user notification notwithstanding thenotification settings 11.

As noted above, it is assumed that the computing device 30 is used bythe user. In alternative implementations, the user does not directly usethe computing device 30. For example, in alternative implementations,the computing device 30 is an enterprise server. A system administratorcould initiate user notification notwithstanding the notificationsettings 11. In other implementations, the computing device 30 is a callcenter device. Again, a system administrator could initiate usernotification notwithstanding the notification settings 11.Alternatively, the call center device could automatically initiate usernotification notwithstanding the notification settings 11 in response toa phone call. Further details are provided below with reference to FIG.4. Other implementations are possible.

In some implementations, the computing device 30 is any existingcomputing device that can send a message for prompting user notificationnotwithstanding the notification settings 11. In alternativeimplementations, the user interface 31 of the computing device 30includes a designated input that when activated causes the computingdevice 30 to send a message for prompting user notificationnotwithstanding the notification settings 11. The designated input mightfor example include a single designated button or a designated menuitem. Other implementations are possible.

In the illustrated example, the notification initiator 13 of thewireless device 10 is implemented as software and is executed on theprocessor 14 of the wireless device 10. Also, the notification messenger32 of the computing device 30 is implemented as software and is executedon the processor 14 of the computing device 30. However, more generally,the notification initiator 13 and the notification messenger 32 may eachbe implemented as software, hardware, firmware, or any appropriatecombination thereof. Although shown as single components, moregenerally, the notification initiator 13 and the notification messenger32 may each have one or more components. The one or more components maybe integrated with other components. Also, functionality of thenotification initiator 13 and the notification messenger 32 might becombined with other components. For example, in alternativeimplementations, the notification initiator 13 and the notificationsettings 11 are combined as a single component. Other implementationsare possible.

Method in a Wireless Device

Referring now to FIG. 2, shown is a flowchart of a method of a wirelessdevice executing a user notification. This method may be implemented ina wireless device, for example by the notification initiator 13 of thewireless device 10 shown in FIG. 1. Alternatively, this method may beimplemented in any appropriately configured wireless device. For thismethod it is assumed that the user has accidentally misplaced thewireless device. However, note that this is not a requirement forexecuting the method.

At step 2-1, the wireless device maintains notification settings thatindicate whether incoming communication triggers user notification. Ifthe wireless device has been configured to not ring, then calling thewireless device will not help the user to locate the wireless device. Amessage for prompting user notification notwithstanding the notificationsettings is sent to the wireless device. Example details for the messagehave been described above. The message is routed through a wirelessnetwork and received by the wireless device at step 2-2. At step 2-3 thewireless device determines whether the message is to trigger usernotification notwithstanding the notification settings. Upon determiningthat the message is to trigger user notification notwithstanding thenotification settings, the wireless device executes a user notificationnotwithstanding the notification settings at step 2-4. The usernotification can help the user to locate the wireless device. Exampledetails for the user notification have been described above.

There are many ways for the wireless device to determine whether themessage is to trigger user notification notwithstanding the notificationsettings. This determination might depend on the type and format of themessage. In some implementations, when the message is a packet switchedmessage such as an email or SMS message, the wireless device determinesthat the message is to trigger user notification notwithstanding thenotification settings if the message has a command such as the keyword“locate me”. In other implementations, when the message is a circuitswitched message such as a phone call, the wireless device determinesthat the message is to trigger user notification notwithstanding thenotification settings if the originating phone number of the message istrusted. More generally, any suitable determination can be performed inlight of the type and format of the message.

Referring now to FIG. 3, shown is a flowchart of another method of awireless device executing a user notification. In this method there is aform of user authentication to help avoid unauthorised users fromtriggering user notification for the wireless device. This method may beimplemented in a wireless device, for example by the notificationinitiator 13 of the wireless device 10 shown in FIG. 1. Alternatively,this method may be implemented in any appropriately configured wirelessdevice. For this method it is assumed that the user has accidentallymisplaced the wireless device. However, note that this is not arequirement for executing the method.

At step 3-1, the wireless device maintains notification settings thatindicate whether incoming communication triggers user notification.Additionally, at step 3-2, the wireless device maintains a user passwordfor user notifications. If the wireless device has been configured tonot ring, then calling the wireless device will not help the user tolocate the wireless device. A message for prompting user notificationnotwithstanding the notification settings is sent to the wirelessdevice. Example details for the message have been described above. Themessage is routed through a wireless network and received by thewireless device at step 3-3. The wireless device determines whether themessage is to trigger user notification notwithstanding the notificationsettings. Examples of how this determination can be performed have beenprovided above. In this example, it is assumed that the message alsoincludes a password. The password might be encoded in the message in theevent that the message is an email or SMS message, or in the event thatthe message is a phone call the password could be keyed in by the userduring the phone call. If at step 3-4 the wireless device determinesthat the message is to trigger user notification notwithstanding thenotification settings and the password provided by the message matchesthe user password that has been maintained, then a user notificationwill be executed notwithstanding the notification settings. Note that ifthere is no match in password, then a user notification will not beexecuted. By verifying that the password provided by the message matchesthe user password that has been maintained, user notification promptedby unauthorised users is prevented.

At steps 3-6 and 3-7, the wireless device executes the user notificationnotwithstanding the notification settings. If at step 3-5 the wirelessdevice determines that the notification settings indicate that incomingcommunication should not trigger user notification, then at step 3-6 thewireless device overrides the notification settings so that the usernotification can be executed. Finally, at step 3-7 the wireless deviceexecutes the user notification. Example details for the usernotification have been described above.

In the illustrated example, if the notification settings indicate thatincoming communication should trigger user notification, then thenotification settings are not overridden. However, in someimplementations the notification settings might be overridden. In someinstances the notification settings might be overridden in order tochange the way in which the user notification is executed. For instance,the notification settings might be overridden in order to allow anaudible ringing when the notification settings would otherwise not allowthis.

Method in a Computing Device

Referring now to FIG. 4, shown is a flowchart of a method of a computingdevice messaging a wireless device for user notification. This methodmay be implemented in a computing device, for example by thenotification messenger 32 of the computing device 30 shown in FIG. 1.Alternatively, this method may be implemented in any appropriatelyconfigured computing device.

At step 4-1, the computing device receives user input for initiatinguser notification by the wireless device notwithstanding notificationsettings. In some implementations, the user input involves a designatedinput, example details of which have been described above. At step 4-2,in response to the user input, the computing device sends a message forprompting user notification notwithstanding the notification settings.Example details for the message have been described above. The messageis routed through a wireless network to the wireless device. In responseto the message, the wireless device executes a user notification,example details of which have been described above.

In some implementations, the message includes a password for use ininitiating user notification by the wireless device notwithstanding thenotification settings. Example details of this have been describedabove.

In the example presented above with reference to FIG. 4, it is assumedthat the computing device receives user input for sending the messagefor prompting user notification notwithstanding the notificationsettings. In alternative implementations, the computing device receivesa message for prompting the user notification. For example, forimplementations where the computing device is a call center device, thecall center device might receive a call from the user who has misplacedthe wireless device. In some implementations, the call center deviceaccepts a password that is keyed in from the user during the phone calland if the password is correct then the call center device sends themessage to the wireless device for initiating user notificationnotwithstanding the notification settings. Thus, the user that hasmisplaced the wireless device can call the call center and input thepredetermined set of numbers in order to trigger the user notification.Other implementations are possible. More generally, the computing devicecan receive any appropriate input from which the computing device candeduce that a message is to be sent to the wireless device forinitiating user notification notwithstanding notification settings.

Another Mobile Device

Referring now to FIG. 5, shown is a block diagram of another mobiledevice 100 that may implement any of the mobile device methods describedherein. The mobile device 100 is shown with specific components forimplementing features similar to those of the mobile device 10 ofFIG. 1. It is to be understood that the mobile device 100 is shown withvery specific details for exemplary purposes only.

A processing device (a microprocessor 128) is shown schematically ascoupled between a keyboard 114 and a display 126. The microprocessor 128is a type of processor with features similar to those of the processor14 of the mobile device 10 shown in FIG. 1. The microprocessor 128controls operation of the display 126, as well as overall operation ofthe mobile device 100, in response to actuation of keys on the keyboard114 by a user.

The mobile device 100 has a housing that may be elongated vertically, ormay take on other sizes and shapes (including clamshell housingstructures). The keyboard 114 may include a mode selection key, or otherhardware or software for switching between text entry and telephonyentry.

In addition to the microprocessor 128, other parts of the mobile device100 are shown schematically. These include: a communications subsystem170; a short-range communications subsystem 102; the keyboard 114 andthe display 126, along with other input/output devices including a setof LEDs 104, a set of auxiliary I/O devices 106, a serial port 108, aspeaker 111 and a microphone 112; as well as memory devices including aflash memory 116 and a Random Access Memory (RAM) 118; and various otherdevice subsystems 120. The mobile device 100 may have a battery 121 topower the active elements of the mobile device 100. The mobile device100 is in some embodiments a two-way radio frequency (RF) communicationdevice having voice and data communication capabilities. In addition,the mobile device 100 in some embodiments has the capability tocommunicate with other computer systems via the Internet.

Operating system software executed by the microprocessor 128 is in someembodiments stored in a persistent store, such as the flash memory 116,but may be stored in other types of memory devices, such as a read onlymemory (ROM) or similar storage element. In addition, system software,specific device applications, or parts thereof, may be temporarilyloaded into a volatile store, such as the RAM 118. Communication signalsreceived by the mobile device 100 may also be stored to the RAM 118.

The microprocessor 128, in addition to its operating system functions,enables execution of software applications on the mobile device 100. Apredetermined set of software applications that control basic deviceoperations, such as a voice communications module 130A and a datacommunications module 130B, may be installed on the mobile device 100during manufacture. In addition, a personal information manager (PIM)application module 130C may also be installed on the mobile device 100during manufacture. The PIM application is in some embodiments capableof organizing and managing data items, such as e-mail, calendar events,voice mails, appointments, and task items. The PIM application is alsoin some embodiments capable of sending and receiving data items via awireless network 110. In some embodiments, the data items managed by thePIM application are seamlessly integrated, synchronized and updated viathe wireless network 110 with the device user's corresponding data itemsstored or associated with a host computer system. As well, additionalsoftware modules, illustrated as another software module 130N, may beinstalled during manufacture.

The flash memory 116 stores computer executable instructions forimplementing features similar to those of the notification initiator 13of the mobile device 10 shown in FIG. 1. In a specific implementation,the other module 130N of the flash memory 116 stores computer executableinstructions that when executed implement a notification initiator. Notethat the implementations described with reference to FIG. 5 are veryspecific for exemplary purposes.

Communication functions, including data and voice communications, areperformed through the communication subsystem 170, and possibly throughthe short-range communications subsystem 102. The communicationsubsystem 170 includes a receiver 150, a transmitter 152 and one or moreantennas, illustrated as a receive antenna 154 and a transmit antenna156. In addition, the communication subsystem 170 also includes aprocessing module, such as a digital signal processor (DSP) 158, andlocal oscillators (LOs) 160. The communication subsystem 170 having thetransmitter 152 and the receiver 150 is an implementation of a wirelessaccess radio with features similar to those of the wireless access radio12 of the mobile device 10 shown in FIG. 1. The specific design andimplementation of the communication subsystem 170 is dependent upon thecommunication network in which the mobile device 100 is intended tooperate. For example, the communication subsystem 170 of the mobiledevice 100 may be designed to operate with the Mobitex™, DataTAC™ orGeneral Packet Radio Service (GPRS) mobile data communication networksand also designed to operate with any of a variety of voicecommunication networks, such as Advanced Mobile Phone Service (AMPS),Time Division Multiple Access (TDMA), Code Division Multiple Access(CDMA), Personal Communications Service (PCS), Global System for MobileCommunications (GSM), etc. Examples of CDMA include 1X and 1x EV-DO. Thecommunication subsystem 170 may also be designed to operate with an802.11 Wi-Fi network, and/or an 802.16 WiMAX network. Other types ofdata and voice networks, both separate and integrated, may also beutilized with the mobile device 100.

Network access may vary depending upon the type of communication system.For example, in the Mobitex™ and DataTAC™ networks, mobile devices areregistered on the network using a unique Personal Identification Number(PIN) associated with each device. In GPRS networks, however, networkaccess is typically associated with a subscriber or user of a device. AGPRS device therefore typically has a subscriber identity module,commonly referred to as a Subscriber Identity Module (SIM) card, inorder to operate on a GPRS network.

When network registration or activation procedures have been completed,the mobile device 100 may send and receive communication signals overthe communication network 110. Signals received from the communicationnetwork 110 by the receive antenna 154 are routed to the receiver 150,which provides for signal amplification, frequency down conversion,filtering, channel selection, etc., and may also provide analog todigital conversion. Analog-to-digital conversion of the received signalallows the DSP 158 to perform more complex communication functions, suchas demodulation and decoding. In a similar manner, signals to betransmitted to the network 110 are processed (e.g., modulated andencoded) by the DSP 158 and are then provided to the transmitter 152 fordigital to analog conversion, frequency up conversion, filtering,amplification and transmission to the communication network 110 (ornetworks) via the transmit antenna 156.

In addition to processing communication signals, the DSP 158 providesfor control of the receiver 150 and the transmitter 152. For example,gains applied to communication signals in the receiver 150 and thetransmitter 152 may be adaptively controlled through automatic gaincontrol algorithms implemented in the DSP 158.

In a data communication mode, a received signal, such as a text messageor web page download, is processed by the communication subsystem 170and is input to the microprocessor 128. The received signal is thenfurther processed by the microprocessor 128 for an output to the display126, or alternatively to some other auxiliary I/O devices 106. A deviceuser may also compose data items, such as e-mail messages, using thekeyboard 114 and/or some other auxiliary I/O device 106, such as atouchpad, a rocker switch, a thumb-wheel, or some other type of inputdevice. The composed data items may then be transmitted over thecommunication network 110 via the communication subsystem 170.

In a voice communication mode, overall operation of the device issubstantially similar to the data communication mode, except thatreceived signals are output to a speaker 111, and signals fortransmission are generated by a microphone 112. Alternative voice oraudio I/O subsystems, such as a voice message recording subsystem, mayalso be implemented on the mobile device 100. In addition, the display126 may also be utilized in voice communication mode, for example, todisplay the identity of a calling party, the duration of a voice call,or other voice call related information.

The short-range communications subsystem 102 enables communicationbetween the mobile device 100 and other proximate systems or devices,which need not necessarily be similar devices. For example, the shortrange communications subsystem may include an infrared device andassociated circuits and components, or a Bluetooth™ communication moduleto provide for communication with similarly-enabled systems and devices.

Numerous modifications and variations of the present disclosure arepossible in light of the above teachings. It is therefore to beunderstood that within the scope of the appended claims, the disclosuremay be practised otherwise than as specifically described herein.

We claim:
 1. A method for execution in a wireless device, the methodcomprising: maintaining notification settings that indicate whetherincoming communication triggers user notification; maintaining a userpassword for overriding the notification settings; receiving a messagethat has been routed through a wireless network from a computing device,the message comprising a password; determining whether the message is totrigger user notification based on whether the password provided by themessage matches the user password that has been maintained; if themessage has been determined to trigger user notification and thenotification settings indicate that incoming communication shouldtrigger user notification, executing the user notification according tothe notification settings; if the message has been determined to triggeruser notification but the notification settings indicate that incomingcommunication should not trigger user notification, overriding thenotification settings and executing the user notification; and if themessage has been determined to not trigger user notification, avoidingexecution of the user notification.
 2. The method of claim 1 whereinexecuting the user notification comprises generating audible noise. 3.The method of claim 1 wherein the user notification occurs for apredetermined time duration or for a predetermined schedule.
 4. Themethod of claim 1 wherein the message is any one of an email message, anSMS message, and any packet switched message.
 5. The method of claim 1wherein the message comprises: a user address for use in routing themessage to the wireless device, and a command; wherein determiningwhether the message is to trigger user notification comprisesdetermining whether the command provided by the message prompts usernotification.
 6. The method of claim 1 wherein the message is any one ofa voice call, and any circuit switched message.
 7. The method of claim 6wherein: the message has an originating phone number; and determiningwhether the message is to trigger user notification comprisesdetermining whether messages from that originating phone number promptsuser notification.
 8. A non-transitory computer readable medium havingcomputer executable instructions stored thereon for execution on aprocessor so as to implement the method of claim
 1. 9. A wireless devicecomprising: at least one memory configured for: maintaining notificationsettings that indicate whether incoming communication triggers usernotification; and maintaining a user password for overriding thenotification settings; a wireless access radio configured for receivinga message that has been routed through a wireless network from acomputing device, the message comprising a password; a notificationinitiator configured for: determining whether the message is to triggeruser notification based on whether the password provided by the messagematches the user password that has been maintained; if the message hasbeen determined to trigger user notification and the notificationsettings indicate that incoming communication should trigger usernotification, executing the user notification according to thenotification settings; if the message has been determined to triggeruser notification but the notification settings indicate that incomingcommunication should not trigger user notification, overriding thenotification settings and initiating the user notification; and if themessage has been determined to not trigger user notification, avoidingexecution of the user notification; and a user interface configured forexecuting the user notification.
 10. The wireless device of claim 9wherein the user interface comprises a speaker for generating audiblenoise for the user notification.
 11. A method for execution in acomputing device, the computing device being capable of communicatingwith a wireless device having notification settings indicating thatincoming communication should not trigger user notification, the methodcomprising: receiving input for initiating user notification by thewireless device notwithstanding the notification settings; and inresponse to the input: generating a message for prompting usernotification; and sending the message for prompting user notification,the message being routed through a wireless network to the wirelessdevice; wherein the message comprises a password for overriding thenotification settings thereby activating user notification by thewireless device notwithstanding the notification settings.
 12. Themethod of claim 11 wherein receiving input for initiating usernotification by the wireless device notwithstanding the notificationsettings comprises: receiving user input for initiating usernotification by the wireless device notwithstanding the notificationsettings.
 13. The method of claim 11 wherein receiving input forinitiating user notification by the wireless device notwithstanding thenotification settings comprises: receiving a phone call with apredetermined set of numbers keyed in during the phone call forinitiating user notification by the wireless device notwithstanding thenotification settings.
 14. The method of claim 11 wherein the message isany one of an email message, an SMS message, any packet switchedmessage, a voice call, and any circuit switched message.
 15. Anon-transitory computer readable medium having computer executableinstructions stored thereon for execution on a processor so as toimplement the method of claim
 11. 16. A computing device capable ofcommunicating with a wireless device having notification settingsindicating that incoming communication should not trigger usernotification, the computing device comprising: a user interfacecomprising an input designated for sending a message for prompting usernotification; and a notification messenger configured to, in response toactivation of the input: generate a message for prompting usernotification; and send a message configured for prompting usernotification, the message being routed through a wireless network to thewireless device; wherein the message comprises a password for overridingthe notification settings thereby activating user notification by thewireless device notwithstanding the notification settings.
 17. Thecomputing device of claim 16 wherein the computing device is any one ofa wireless device, a personal computer, an enterprise server, and a callcenter device.
 18. The computing device of claim 16 wherein the input isa single designated button or a designated menu item.