Remote control authority and authentication

ABSTRACT

The invention relates to systems and methods to enable a mobile device to be used as a remote control, in order to control one or more remotely controllable objects. In possible embodiments of the invention, proximity-based (or other) remote controls include control authorization to enable the transfer or sharing of control between different remote controls being implemented on different mobile devices, in order to permit different users to transfer or share control of a same remotely controllable object, for example. In other possible embodiments of the invention, a proximity-based (or other) remote control uses control authentication to enable the pairing of a remote control implemented on a device and a remotely controllable object, for example. Various embodiments of control authority and control authentication are possible and anticipated by the invention to address a wide range of practical remote control applications and provide many benefits to users.

BACKGROUND

Mobile devices—meaning portable electronic devices that are capable ofwireless communication (e.g., cell phones, smart phones)—are widely usedfor a variety of digital and voice communication, and other purposes.Today's mobile devices enable, among other things, email, textmessaging, instant messaging, Internet browsing and (still) phoneconversation. In addition, mobile devices may be used to remotelycontrol objects. For example, mobile devices may run applications thatallow these devices to wirelessly control a home entertainment orlighting system. Such remote control may, for example, be by means ofdirect wireless control of an object (e.g., Bluetooth), meaning directelectromagnetic communication between the mobile device and thecontrolled object (such as is the case with today's television remotecontrols). This may occur by means of any of a variety of wirelessprotocols.

Some of the challenges faced by today's remote controls, including thoseimplemented on mobile devices, relate to 1) the difficulties posed to auser to synchronize or otherwise set up a remote control so that it willcommunicate with a particular object that the user desires to control,2) the need for a user to have multiple different remote controls formultiple different objects that a user desires to control, 3)difficulties updating remote control user interfaces, if even possible,and 4) a general lack of real-time feedback to the user relating to theobject being remotely controlled.

There exists a need for improved methods, devices and systems that allowa user to use a mobile device, such as a common smart phone or similarelectronic communication device, to readily “synchronize” the mobiledevice with one or more remotely controllable objects, and to enable thepresentation and use of one or more relevant remote control userinterfaces so that a user can efficiently and effectively remotelycontrol one or more remotely controllable objects, possibly includingreal-time feedback.

SUMMARY

The present invention, in one embodiment, relates to a near-fieldcommunication (NFC) enabled mobile device that is able to communicatewith one or more NFC element-associated remotely controllable objects,to cause the presentation of one or more object-relevant remote controluser interfaces on a mobile device, the object-relevant remote controluser interface which is then capable of receiving inputs from a user ofthe mobile device (the inputs relating to the user's desire to causesome action at the remotely controllable object, such as a remotelycontrollable television, for example), and to then wirelesslycommunicate information by means of a remote computer thatelectronically facilitates the desired action at the target remotelycontrollable object. The following definitions are general, notlimiting, and detailed below: a “NFC enabled mobile device” is a mobiledevice (e.g., smart phone) equipped with a NFC reader (e.g., RFID tagreader) capable of wirelessly receiving a transmitted signal from a tag;this tag (or similar structure or object) is a “NFC element” which maybe a passive or active transmitter that is associated (e.g., combined)with a remotely controllable object to provide a “NFC element-associatedremotely controllable object”; a “user interface” is a presentation on amobile device that invites and accepts user input; such a user interfaceis an “object-relevant remote control user interface” when it isdirected to the remote control of a specific object or type of objects;and a “remote computer” is any electronic processing device physicallyseparate from the mobile device.

The present invention includes many embodiments, such as variations inthe ways that a remotely controllable object may be detected oridentified, variations in possible remote control user interfaces andhow they are communicated to a device and presented to a user of thedevice, variations in the protocols used by elements of the invention tocommunication with one another, and more. In addition, embodiments ofthe present invention may enable feedback from the remotely controllableobject to the mobile device, either by means of a remote control userinterface, or otherwise, such as tactile feedback or audio signals. Manyother variations of the invention are possible.

One example of an embodiment of a system of the present inventioninvolves a mobile device, such as a smart phone (e.g., an Apple iPhone),having a mobile device-associated NFC element, the smart phone (whenbrought into physical proximity with an object-associated NFC element,e.g., within five centimeters, such that the mobile device-associatedNFC element is capable of reading/receiving a signal from theobject-associated NFC element) that identifies a remotely controllableobject and then enables a specific remote control user interface for theremotely controllable object, the remote control user interface thenbeing able to receive input from a user of the mobile device (e.g., anindication of a desired action at the remotely controllable object)using the remote control user interface presented on the smart phone,and the smart phone which then communicates (e.g., over the Internet orother network) information relating to the desired action to a remotecomputer (such as one that is in the “cloud” and remotely located fromthe object) to ultimately cause the desired action at the object. Inthis example, subsequent inputs may be input to the smart phone by theuser to cause further responses at the remotely controllable object; theremote control user interface may be updated periodically, based oneither user actions or sensed inputs at the remotely controllableobject, the user may receive information by means of the smart phonerelating to the status of the remotely controllable object, and more.

Another example representative of a method of the present inventionincludes the steps of: 1) a mobile device (being NFC equipped) beingbrought into physical proximity (e.g., within ten centimeters) with aNFC element that is associated with a remotely controllable object, 2)based on and in response to such approximation of the mobile device andthe remotely controllable object, the mobile device then presenting arelevant remote control user interface that is capable of receivinginput from a user relating to a desired action (by the user) at theobject, 3) the mobile device remote control user interface receivinginput from the user relating to a desired action, 4) the mobile devicewirelessly communicating information relating to the desired action witha remote computer, 5) the remote computer communicating informationrelating to the desired action to an object controller associated withthe object, and 6) the object controller facilitating the desired actionat the object. Subsequent steps may relate to feedback of informationsensed at the remotely controllable object, updates to the remotecontrol user interface, and more. Additional steps, and variations onthese steps, are also possible. For example, an authentication step (ormultiple authentication steps) may occur at points in the process, suchas only presenting a remote control user interface to certain users, orto certain (or all) users positioned within a defined geographic area(or space), or performing certain tasks (or exhibiting certainbehaviors, such as may be sensed my sensors associated with a mobiledevice); or limiting inputs at the mobile device, or actions at theremotely controllable object, to certain users (or user groups) based onuser identification, user authentication (by means such as a password,identity, behavior, or biometric scan), user behavior, or any of avariety of other information, inputs or metrics.

The preceding two embodiments are simply examples of embodiments of thepresent invention, and the invention can be embodied and implemented inany of a variety of ways. Examples of variations include different typesof system elements (e.g., smart phone, dedicated remote control,portable control system) and related methods, different presentations ofa remote control user interface, different communication means andprotocols, different means of facilitating control of an object, andmore. Systems and methods of the present invention may be implemented inany of a variety of ways. For example, systems and methods of thepresent invention may be implemented using a bar code and optical readerinteraction, instead of near-field communication transmission andreception, respectively. It should be noted that the term “near-fieldcommunication” (also referred to as “NFC”) is simply one possible meansof having a mobile device interact with an object to learn the identityof the object and/or which remote control user interface (or otherelement of the invention) to use. NFC, RFID, bar code, QR code andrelated “object identification” technologies are evolving rapidly alongwith how we refer to them, and each of these enables the passivenon-contact identification of an object in a manner that is consistentwith the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A shows a representation of an embodiment of a first system of thepresent invention.

FIG. 1B shows a representation of a second embodiment of a system of thepresent invention.

FIG. 1C shows a representation of a third embodiment of a system of thepresent invention.

FIG. 1D shows a representation of a fourth embodiment of a system of thepresent invention.

FIG. 2A shows a representation of a first embodiment of a remote controluser interface.

FIG. 2B show a representation of a second embodiment of a remote controluser interface.

FIG. 2C shows a representation of a third embodiment of a remote controluser interface.

FIG. 3A shows a representation of a first embodiment of a method of thepresent invention.

FIG. 3B shows a representation of a second embodiment of a method of thepresent invention.

FIG. 3C shows a representation of a third embodiment of a method of thepresent invention.

FIG. 4a shows a representation of an embodiment of a first controlauthorization method of the present invention.

FIG. 4b shows a representation of an embodiment of a second controlauthorization method of the present invention.

FIG. 5a shows a representation of an embodiment of a third controlauthorization method of the present invention.

FIG. 5b shows a representation of an embodiment of a fourth controlauthorization method of the present invention.

FIG. 6a shows a representation of an embodiment of a first controlauthentication method of the present invention.

FIG. 6b shows a representation of an embodiment of a second controlauthentication method of the present invention.

FIG. 7a shows a representation of an embodiment of a first remotecontrol user interface presentation of the present invention.

FIG. 7b shows a representation of an embodiment of a second remotecontrol user interface presentation of the present invention.

FIG. 7c shows a representation of an embodiment of a third remotecontrol user interface presentation of the present invention.

FIG. 8 shows a representation of an embodiment of a fourth remotecontrol user interface presentation of the present invention.

DETAILED DESCRIPTION

The present invention relates to systems and methods for proximity-basedremote controls (also, without limitation, referred to asproximity-based identification communication) that may be used, forexample, to facilitate the identification of a remotely controllableobject and enable a remote control user interface (RCUI) to be presentedby a mobile device that then allows a user of the mobile device toremotely control the identified object by means of the remote controluser interface. Such a RCUI may be presented by a mobile device on anelectronic display as soft keys, for example, and such soft keys may bearranged or otherwise presented in a way that is relevant to (or evenreconfigurable by) the system or a user, possibly based on useridentification, authentication, preferences, user location, pastbehavior, or other information. The ability for a user to tag (e.g.,approximate a mobile device to) an object to thereby remotely controlthe object may be implemented in any of a variety of ways. For example,embodiments of the present invention may enable upload of a RCUI (or theinformation needed to create a RCUI on a mobile device) to a mobiledevice, based on identification of an object desired to be controlled,from any of a variety of sources (e.g., a source associated with theobject, a server that is in communication with the mobile device using anetwork such as the Internet). A RCUI may take any of a variety offorms, including but not limited to soft keys that are presented by anelectronic display of a mobile device. Furthermore, embodiments of thepresent invention may use any of a variety of means to communicateremote control user interface inputs to an object controller. In oneembodiments, such communication may take place wirelessly over anetwork, such as the Internet, and may include communication between amobile device and a remote computer, and a remote computer and an objectcontroller (that controls a controllable feature of the object), forexample.

In one embodiment of the present invention, a proximity-basedcommunication technology is near-field communication (NFC) technology,whereby a NFC reader-equipped mobile device communicates with a NFCelement that is associated with a remotely controllable object. By“associated with,” it is meant that a NFC element is either attached to,or located physically near, an object. For example, a NFC element may bebuilt into the structure of a remotely controllable object, such as atoy. As another example, a NFC element may be located near a remotelycontrollable object, such as being placed on a wall of a room for whichthe lighting system is capable of being remotely controlled (in thisexample, it would be impractical to attach or access a NFC element ontoa lighting element located in the ceiling). In such embodiments, thisenables an object-relevant remote control user interface to be presentedby the mobile device, in order to allow a user to control the remotelycontrollable object by means of the relevant remote control userinterface enabled at the mobile device. Such an object relevant remotecontrol user interface is also referred to herein as a “remote controluser interface,” “user interface,” or “RCUI.” An example of such aremote control user interface may be a presentation of soft keys (e.g.,virtual buttons or other controls) on an electronic display on a mobiledevice. Such soft keys may be as simple as “on” and “off” buttons, orthey may be much more complex control elements, such as visualrepresentations of sliders, knobs switches and more. Another embodimentincludes proximity-based identification technology that is an opticalimage reader (e.g., mobile device camera, bar code reader) that iscapable of reading a bar code or other visual identification markingprinted onto, or otherwise associated with, an object, to thereby enablea relevant remote control user interface in accordance with theinvention. Other embodiments involving radio, visual, sound, movementand location (e.g., the enablement of remote control user interfacebased on a location of a mobile device) proximity-based communicationmeans are also possible. In one embodiment of the present invention, amobile device enables control of an object by means of wirelesslycommunicating information (e.g., over the Internet or other network) toa remote computer (e.g., a server or other computer located in the“cloud” and physically separate from an object), to cause the remotecomputer to further communicate information to an object controller thatis capable of performing an action at or by the object.

For clarity, the term “proximity” means physically close, and morespecifically that two structures (such as a mobile device and a NFCelement) are either within a meter of each other, within ten centimetersof each other, within five centimeters of each other, within threecentimeters of each other, within two centimeters of each other, withinone centimeter of each other, or within any similar distance thatenables accurate reading of a NFC or radio frequency identification(RFID) signal. For other identification means, such as the reading of abar code or QR code, distances may be lesser or greater, such as withintens of meters, within one meter, within 10 centimeters, or possiblywithin much greater distances. In general, as NFC, RFID and othertechnologies evolve, the ability for transmitters to transmit signalsover greater distances, and readers to receive signals over greaterdistances, will occur, and so “proximity” as it relates to the presentinvention may vary. In certain embodiments, proximity will be “in theline of sight” or a distance at which a user may readily access aparticular remotely controllable object.

FIG. 1A shows a representation of a first embodiment of a system of thepresent invention. In this particular embodiment, an object 1 a isassociated with an object-associated NFC element 1 c (the associationrepresented as 1 b), communication occurs between object-associated NFCelement 1 c and mobile device-associated NFC element 2 a (thecommunication represented as 1 d), mobile device-associated NFC element2 a communicates with mobile device 2 c (the connection represented as 2b) in order to enable a remote control user interface (“RCUI”) 2 d,wireless communication occurs between mobile device 2 c and a remotecomputer 3 a (such wireless communication represented by 2 e), theremote computer 3 a then communicates with an object controller 4 a (thecommunication represented as 3 b) to ultimately control object 1 a (suchinteraction represented as 4 b). In another embodiment similar to theone represented in FIG. 1A, object-associated NFC element could insteadbe a bar code or other identifying mark or characteristic at or near theobject, mobile device-associated NFC element could instead be an opticalreader (such as a mobile device camera that serves as a bar code readeror scanner), and the communication between them could instead be areading by the mobile device of the optical bar code or visualidentifier. While such an optical implementation (versus the use of NFC)may be less convenient to use since a user of a mobile device would needto scan a bar code or other visual identifier, rather than quickly tagan object using NFC technology, the use of a printed bar code or otheroptically-readable identifier or characteristic at an object is lessexpensive to implement in many cases. For example, bar codes may bepractical on printed documents, books, envelopes, packaging, garments,signs, etc. Other embodiments of systems of the present invention,including but not limited to object identification processes and means,are within the scope of the present invention.

FIG. 1B shows a second representation of an embodiment of a system ofthe present invention, having additional elements relative to theembodiment shown in FIG. 1A. Such additional elements are directed toproviding “feedback” in a direction from generally the object to themobile device (e.g., rather than providing control inputs at a mobiledevice to facilitate control of an object, these additional elementsare, in one embodiment, intended to enable feedback from an object backto a mobile device, in order, for example, to provide a user withfeedback and/or to facilitate control of the object). As shown in FIG.1B, these additional elements may include: communication between mobiledevice-associated NFC element 2 a and object-associated NFC element 1 c(such communication represented as additional element 1 d′), connectionbetween mobile device 2 c and mobile device-associated NFC element 2 a(such connection represented as additional element 2 b′), wirelesscommunication between remote computer 3 a and mobile device 2 c (suchcommunication represented as additional element 2 e′), communicationbetween remote computer 3 a and object controller 4 a (suchcommunication represented as additional element 3 b′), and interactionbetween object controller 4 a and object 1 a (such interactionrepresented as additional element 4 b′). FIG. 1B shows these additionalelements (relative to FIG. 1A), each of such additional elements whichmay be used in an embodiment of the present invention, or combined withother such additional elements (shown in FIG. 1A) to create otherembodiments of the present invention. For example, one embodimentincludes wireless communication 2 e′ and communication 3 b′, and notinclude communication 1 d′, connection 2 b′ and interaction 4 d′. Also,for example, another embodiment of the present invention includeswireless communication 2 e′ and not communication 1 d′, connection 2 b′communication 3 b′ and interaction 4 b′. For purposes of thisdisclosure, the terms “communication,” “connection,” and “interaction”are used interchangeably and generally to mean a transfer of informationbetween a first element and a second element in accordance withembodiments of the present invention. Other embodiments and variationsof these embodiments of systems are within the scope of the presentinvention.

Object 1 a may be any remotely controllable object, meaning that object1 a may be the subject of an action (or actions). Such action may be aform of control of object 1 a, for example, such as turning it on oroff, or altering its direction. Such action may also possibly beelectronic in nature (and/or not readily apparent to a user of object 1a), such as changing a set-point stored in an object-associated dataset, or configuring or reconfiguring software associated with theobject. Embodiments of the present invention may include other types of“action.” Representative objects 1 a include, but are not limited to:electronic devices, mechanical devices, electromechanical devices,televisions, cable set-top boxes, media players, toys, entertainmentsystems, vehicles, aircraft, computers, mobile devices, officeequipment, lighting, climate control systems, documents, securitysystems, doors or passages, manufacturing equipment, exercise equipment,medical devices, living organisms (e.g., by means of anelectromechanical or medical device interface), and more. Representativeactions that one or more objects may be subject to include, but are notlimited to: being turned on, being turned off, being opened, beingclosed, getting directed or redirected (e.g., left, right, up, down),entering settings, changing settings, enabling access, denying access,having data transferred to object electronic memory, having a dataelement reset in object electronic memory, uploading or downloadingsoftware or executable code to the object e.g., over the Internet (orother network using the Internet Protocol (IP)) or other network, suchas a Local Area Network (LAN), causing software or executable code to berun by an electronic processor that is associated with the object,changing channels, changing volume, causing an action to return to adefault setting or mode, and more. Actions that are performed at anobject include, for example, actions that are mechanical, electrical,electromechanical, and/or biological. Other variations in objects andways to control such objects fall within the scope of the presentinvention.

Object-associated NFC element 1 c is any means that enables “near-field”contactless communication with a mobile device-associated NFC element ofthe present invention. NFC technology aimed at use with mobile devicesmay generally perform one or more of the following functions, withoutlimitation: 1) card emulation to cause a NFC element to behave like acontactless card; 2) reader mode wherein a NFC element may receivesignals from a RFID tag or other passive or active transmitter; and 3)peer-to-peer (P2P) mode when a first NFC element associated with anobject is able to communicate with a second NFC element associated witha mobile device, and more. A particular NFC technology (e.g., a NFC“chip” or RFID “tag”) may transmit information, possibly receiveinformation, or both (e.g., exchange information). Today's NFCtechnologies—meaning NFC technologies typically used at the time of thisdisclosure—are generally very short-range high-frequency (e.g., 13.56MHz) wireless communication technologies that enable the communicationof information or data between NFC-enabled devices over a distance oftypically less than twenty centimeters, often less than ten centimeters,and often less than five centimeters. Such NFC technology may becurrently (and in general) an extension of the ISO/IEC 14443 proximitycard (RFID) standard that combines the interface of a smartcard and areader into a single unit. A NFC-enabled device may be capable ofcommunicating with existing ISO/IEC 1443 smartcards and readers, andalso with other NFC-enabled devices. In general, this makes today's NFCtechnologies compatible with existing contactless communicationinfrastructure, such as contactless access and payment systems used inpublic transportation and retail environments, respectively. Forpurposes of this disclosure, “close physical proximity” may, asdiscussed earlier, mean distances of up to a meter, or up to tencentimeters, or up to five centimeters, or other distances; and possiblydistances of more than a meter such as may be enabled by an activetransmitter or more sensitive receiver. NFC element operating rangesdepend on the type of NFC technology being used, specific models, andthe way in which a particular NFC technology is implemented. Forexample, many passive RFID tags and readers require proximity of lessthan a few centimeters to operate under most operating conditions,whereas active (or semi-active) RFID tags may have a much greaterfunctional range. Conditions that are external to a specific NFCtechnology or product may influence operating ranges and otherfunctional characteristics. Antenna type and implementation, as well asthe object or device with which a particular NFC technology isassociated, may also affect the technology's performancecharacteristics. Today's NFC technology is being actively incorporatedinto a variety of mobile devices, such as smart phones, and it isexpected that virtually all mobile communication devices will be NFCequipped (at least with readers capable of receiving signals beingtransmitted from a NFC element or RFID tag) in the future. In additionto NFC technology as it is known and recognized today, the presentinvention anticipates that NFC technology, along with related standardsand communications protocols, will evolve. The use of the terms“near-field communication” and “NFC” (and “RFID”) herein are meant onlyto represent such technologies in a general way. It is anticipated thatfuture NFC technologies and implementations will enhance the value ofembodiments of the present invention, and such future NFC technologiesare anticipated in the present references relating to near-fieldcommunication, NFC and RFID. Variations in NFC elements and technologiesof the present invention fall within the scope of the present invention.

Association 1 b between object 1 a and object-associated NFC element 1 cmay take any of a variety of forms. For example, in one embodiment ofassociation 1 b, object-associated NFC element 1 c may be incorporatedinto or onto the physical structure of object 1 a (e.g., embedded in atelevision, positioned on the surface of a set-top box). In anotherembodiment of association 1 b, object-associated NFC element 1 c may bephysically separate from object 1 a. In one such example,object-associated NFC element 1 c may be located on or in a physical(e.g., paper) user manual relating to object 1 a. In another example,object-associated NFC element 1 c may be located on, at, or within abuilding or other structure, and may enable control of an objectassociated with the building or other structure, such as a lighting orentertainment system in a room of the building. In yet other examplesconsistent with the present invention, object-associated NFC element 1 cmay be located or positioned at a related object that is physicallydistant from the object to be controlled, but nevertheless associatedwith the object to be controlled. As an example, one such embodimentinvolves using a mobile device to tag a first object that is similar toa second object 1 z (e.g., first and second objects are of the same typeor category, first and second objects have one or more similarcontrollable elements), and being able to remotely control the secondobject 1 z using the mobile device and user interface. FIG. 1C shows arepresentation of an embodiment relating to the concept of tagging afirst object 1 a and then being able to use a relevant RCUI to control asecond similar object 1 z. Various other associations 1 b between object1 a and object-associated NFC element 1 c are within the scope of thepresent invention. In general, however, a feature of any suchassociation 1 b is that a user may realize or be informed (e.g., bywritten notice or an image or logo that represents, for example, anetwork of objects or elements) that a particular object-associated NFCelement 1 c is associated with object 1 a.

Mobile device-associated NFC element 2 a may be a NFC element asdescribed previously. Mobile device-associated NFC element 2 a may bethe same type as, or different from, object-associated NFC element 1 c.For example, mobile device-associated NFC element 2 a may be afully-functional means that may serve to both wirelessly transmit andreceive information, whereas object-associated NFC element 1 c maysimply be capable of transmitting a signal (e.g., a passive RFID tag).Mobile device-associated NFC element may be integrated with a mobiledevice, or may be connected or otherwise attached to a mobile device ofthe present invention using any of a variety of means. Mobiledevice-associated NFC element may be embodied in any of a variety ofways.

Mobile device-associated NFC element 2 a and object-associated NFCelement 1 c are capable of communicating with one another, such as whenthey are brought into physical proximity with one another (this processmay be referred to as “tagging” an object, and an object may be “tagged”by a NFC-equipped mobile device), either unidirectionally (meaninginformation is transmitted by an object-associated NFC element andreceived by a mobile device-associated NFC element) or bidirectionally(meaning both NFC elements have the ability to transmit information to,and receive information from, each other). In general, NFC communicationbetween these elements occurs wirelessly (even when the structuresassociated with each NFC element touch one another). In one embodimentof the present invention, communication may be one-way transmission ofinformation from object-associated NFC element 1 c to mobiledevice-associated NFC element 2 a, as represented by 1 d in FIG. 1A(this may occur even when object-associated NFC element 1 c is capableof two-way communication). In another embodiment of the presentinvention, communication may be two-way, meaning that both of theelements transmit and receive information from one another, asrepresented by 1 d and 1 d′ in FIG. 1B. The preference or need forone-way or two-way communication between object-associated NFC elementand mobile device-associated NFC element will depend on a variety offactors, including but not limited to the particular application(s) foran embodiment of a system of the present invention. In some embodiments,only identification of object 1 a by mobile device 2 c may be desired,in which case one-way flow of information from object-associated NFCelement 1 c to mobile device-associated NFC element 2 a is required.References to “physical proximity” in this disclosure are intended tomean that NFC elements of the present invention are positioned closeenough together that they are capable of communicating with one another.Variations in the communication between object-associated NFC element 1c and mobile device-associated NFC element 2 a are within the scope ofthe present invention. In addition, the information communicated betweenan object-associated NFC element and a mobile device-associated NFCelement may include, without limitation, information relating to theidentity of the object. Furthermore, such information may relate to aremote control user interface, such as providing an upload of aparticular RCUI to a mobile device (or alternatively providinginformation needed for the device to create a RCUI, e.g., based onaccessing a library of remote control user interface elements that maybe stored either by the device or by a remote computer, for example).Other types of information may also be communicated, possibly includinginformation being sent from a mobile device to storage by electronicmemory associated with the object-associated NFC element. In addition,any of a variety of communication protocols may be used to facilitatesuch communication between an object-associated NFC element and a mobiledevice-associated NFC element.

Mobile device 2 c may be any of a variety of portable electronic devices(and that are equipped with, enabled, or associated with mobiledevice-associated NFC element 2 a). In one embodiment, mobile device 2 cis a smart phone (e.g., Apple iPhone, Android phone, Blackberry device).In other possible embodiments, mobile device 2 c may be another deviceor technology fitting the functional description of a mobile device ofthe present invention (e.g., capable of presenting information to auser, receiving an input from a user, and being capable of communicatingwirelessly with a remote computer). In one embodiment of the presentinvention, mobile device 2 c includes a display capable of visuallypresenting information to a user. Other embodiments may include othermeans of presentation of information to a user, such as presentinginformation to the user via audio output (e.g., providing prerecordedand/or synthesized sounds, such as providing prerecorded and/orsynthesized speech). Embodiments of mobile device 2 c of the presentinvention may also provide tactile output, such as having the devicevibrate. In addition, embodiments of mobile device 2 c of the presentinvention include means for receiving an input (or multiple inputs, orsimultaneous inputs) from a user of the device. Examples of means forreceiving an input include, but are not limited to: soft keys, touchscreen (e.g., interactive touch display), hard keys, switches, knobs,microphones, and user manipulation (e.g., tilting, turning, shaking) ofthe device. Variations in mobile devices, display means and input meansof the present invention are within the scope of the present invention.

Remote control user interface 2 d is, in one embodiment, a presentationat mobile device 2 c that communicates a remote control, such as one ormore soft controls that may be interacted with by a user. Remote controluser interface 2 d enables interaction by a user to facilitate controlof an object 1 a. In one embodiment, remote control user interface 2 dmay automatically appear on a display of a mobile device, for example,and be readily available for use by a user. In another possibleembodiment, remote control user interface 2 d may be uploaded to amobile device and stored for presentation and use at a future time.Control of an object 1 a may be facilitated by remote control userinterface 2 d in any of a variety of ways, and using any of a wide rangeof embodiments. For example, remote control user interface 2 d may be avisual presentation on an interactive (e.g., touch screen) display, suchas the representative embodiments of remote control user interface shownin FIGS. 2A-2C, each of which shows a simplified representation of amobile device 2 c having a touch screen (e.g., display that can be usedto both present information to a user of the device, and receive inputfrom the user of the device, such as by means of touching the displaysurface with a finger) upon which representations of various embodimentsof remote control user interface 2 d are shown. In other embodiments,remote control user interface 2 d may present information in other ways,and/or receive input from a user in other ways. For example, in oneembodiment, remote control user interface 2 d may be presented onanother type of visual display, such as a non-interactive (e.g.,non-touch screen) display. In another embodiment, remote control userinterface may be presented as hard keys or controls, possibly involvingan indication of which hard keys or controls may be used to control aparticular target object. Embodiments may also involve non-visualpresentations of a remote control user interface. In one suchembodiment, sounds may be used to represent the possibility for a userto interact with such a remote control user interface to provide inputor a command. In another embodiment, a synthetic voice may notify a userrelating to control of a target object, or even guide a user through theinput or selection of permissible commands to control a target object.Other means and modes of presenting a remote control user interface to auser are within the scope of the present invention. In addition, othermeans of interaction with a remote control user interface of the presentinvention may be used by embodiments of the present invention. In oneembodiment, an interactive touch-screen display is used, such as shownin FIGS. 2A-2C. In another embodiment, hard keys located on a mobiledevice may be used to input information to a remote control userinterface of the present invention. In other embodiments, sounds and/orvoice commands may be used to provide input to a remote control userinterface of the present invention. In yet another embodiment of aremote control user interface of the present invention, movement of themobile device upon which the remote control user interface is operatingmay provide input to facilitate control of a target object (e.g., movingor rotating the mobile device to the left to cause a remotely controlledmoving object to turn left; moving or tiling the mobile device to theright to cause the same remotely controlled moving object to turnright). Various combinations of one or more remote control userinterface presentations and input means are within the scope of thepresent invention. In addition, embodiments that use other forms ofinput and output are within the scope of the present invention.

In one embodiment of the present invention, remote control userinterface 2 d is determined by virtue of object 1 a identification, andthen enabled on mobile device 2 c. Remote control user interface may beselected from a group of predetermined remote control user interfaces,e.g., from a library of RCUIs stored in memory. Such a library of RCUIsmay, for example, be stored in memory associated with mobile device 2 c,or in memory associated with remote computer 3 a (and made accessible tomobile device 2 c, for example). Alternatively, embodiments of thepresent invention may provide for dynamic creation of a RCUI from alibrary of pre-defined remote control user interface elements. Such alibrary of RCUI elements may, for example, exist in memory associatedwith a mobile device 2 c, remote computer 3 a, or object-associated NFCelement 1 c. In the case when RCUI (or RCUI element) information or datais stored separately from mobile device 2 c, such information or data(as needed to facilitate creation or presentation of a RCUI on mobiledevice 2 c) is communicated from where the data is stored to mobiledevice 2 c, using any of a variety of means, including those describedherein. For example, a user may place a mobile device 2 c near anobject-associated NFC element 1 c for object 1 a to cause mobile device2 c (possibly in communication with remote computer 3 a) to identify arelevant remote control user interface 2 d for the particular object 1a. In the case where object 1 a is a television, for example, theenabled remote control user interface 2 d may resemble therepresentative remote control user interface 2 d shown in FIG. 2B(including on/off, volume and channel selection controls). In oneembodiment of the present invention, remote control user interface 2 dis provided from a set of predesigned remote control user interfaces,subject to identification of an object and determination of which one ofthe set of predesigned remote control user interface is most relevant toa user relative to the remote control of the particular object. Inanother embodiment of the present invention, a remote control userinterface may be dynamically created based on a set (e.g., a library) ofpredefined remote control user interface elements (e.g., volume control,channel control, direction control), and provided to a user, possiblybased on the known preferences of the particular user (e.g., whichremote control user interface elements should be included and/orpositioned in a particular way, color scheme), or other informationrelating to a user, object or circumstances. In yet another embodimentof the present invention, a remote control user interface may becommunicated by means of a transfer of executable code or otherwise(e.g., using identifiers that enable selection and configuration ofremote control user interface elements) from an object-associated NFCelement to a mobile device so that the particular remote control userinterface may be enabled on the mobile device. In yet another embodimentof the present invention, the object-associated NFC element communicatesinformation that enables a mobile device to further communicate with aremote computer in order to transfer information (possibly includinginstructions, software or executable code, or a combination of these)from the remote computer to the mobile device. In yet other embodimentsof the present invention, the remote control user interface may beprovided to the mobile device, or enabled at the mobile device (e.g.,presentation to a user, or access enabled for a user) based on a devicelocation, such as may be determined by a device-associated globalpositioning system (GPS) or Wifi positioning system (WPS), or otherdevice location determination means. These embodiments, and others,enable the provision and/or presentation of a remote control userinterface that is most relevant (e.g., most useful, efficient,well-organized, pertinent) for the remote control of a particularobject, type of object, or controllable element that may exist inmultiple objects or types of objects. Notably, embodiments of thepresent invention may enable “on the fly” access to a relevant remotecontrol for an object, for immediate or future use. In addition, remotecontrol user interfaces of the present invention may be, in someembodiments of the present invention, reconfigurable —possibly eitherautomatically (e.g., by means of a remote control user interfacesoftware update, by means of some development at the object), ormanually by a user of a mobile device. Examples of reconfiguration mayinclude addition or deletion of a control element (e.g., a button orslider), rearrangement of control elements, and more. Suchreconfigurations may occur during an instance of use, or betweeninstances of use. Variations of remote control user interfaces of thepresent invention, methods and means of their selection, methods andmeans of their presentation, methods and means of their use, and methodsand means of their enablement on a mobile device of the presentinvention, are within the scope of the present invention.

In general, any wireless communication described herein—including butnot limited to the upload of a RCUI from a source to a mobiledevices—may be implemented in any of a variety of ways, including,without limitation, by means of current near-field communicationstechnologies and related standards and protocols (e.g., for near-rangewireless communications used by certain embodiments of the presentinvention), as well as current mobile device (e.g., cell phone)communication technologies and related standards and protocols (e.g.,for longer-range wireless communication used by certain otherembodiments of the present invention). It is understood that wirelesscommunication technologies, standards and protocols are evolvingrapidly, and that systems and methods of the present invention may beimplemented using any of a wide range of these technologies, standardsand protocols.

Similarly, uploading, transferring, transmitting, or otherwise providinga remote control user interface (or any data or information related tosuch an user interface) described herein may be implemented, forexample, by performing such transmission over any network, such as theInternet (or other network that uses the Internet Protocol (IP)), aLocal Area Network (LAN), or other similar network. Furthermore, anyreference herein to communication over “the Internet” should beunderstood to refer more generally to any communications performed usingthe Internet Protocol (IP) or any similar protocol.

As a specific example, the systems of FIGS. 1A-1D may include multipleremote control user interfaces. For example, such multiple remotecontrol user interfaces may be stored at the remote computer 3 a, theobject 1 a, the object-associated NFC element 1 c, or elsewhere. Atleast two of the multiple RCUIs may differ from each other and beassociated with different remotely-controllable objects. Within themultiple remote control user interfaces there may, for example, be atleast: (1) a first remote control user interface associated with a firstremotely-controllable object; and (2) a second remote control userinterface associated with a second remotely-controllable object. Thefirst remote control user interface may differ from the second remotecontrol user interface, and the first remotely-controllable object maydiffer from the second remotely-controllable object. For example, thefirst remote control user interface may include a user interface element(such as a soft key representing a button) that the second remotecontrol user interface does not include. As examples of ways in whichthe first remotely-controllable object may differ from the secondremotely-controllable object, the first and second remotely-controllableobjects may be different instances of the same product (e.g., a firstand second television of the same make and model), or instances ofdifferent products (e.g., a television and a DVR). For example, inresponse to detecting that the mobile device is in physical proximity tothe first object, the first user interface that is associated with thefirst object is selected, and presented by the mobile device to theuser. Also, for example, in response to detecting that the mobile deviceis in physical proximity to the second object, the second user interfacethat is associated with the second object is selected, and presented bythe mobile device to the user. A mobile device may store (and makeaccessible to a user) only the first remote control user interface, onlythe second remote control user interface, or both of them (e.g., a usermay be able to select one of them, or switch between them in order tohave ready access to two different RCUIs for control of two differentobjects). In addition, a mobile device or other element of an embodimentof a system of the present invention may store various RCUIs (such asthose that have been previously accessed or used by a user on aparticular mobile device) so that the user may readily access any ofthem on the mobile device in the future. Similarly, portions or elementsof RCUIs may be stored in electronic memory by the mobile device orelsewhere for future access and use, such as for the creation of afuture remote control user interface.

In one embodiment, based on input received by mobile device 2 c remotecontrol user interface 2 d relating to an action that a user desires tobe performed at object 1 a, mobile device 2 c communicates informationrelating to the desired action to remote computer 3 a by wirelesscommunications means. Such wireless communications means may, in oneembodiment, be any communication means typically used by cellular phonesthat uses radio waves to exchange information with one or more basestations (e.g., cell sites) of a network of base stations, the networkwhich is further connected (e.g., by wires, or wirelessly) to remotecomputer 3 a. Variations in communication between mobile device 2 c (orpossibly other elements of the present invention having wirelesstransmission means) and remote computer 3 a of the present invention arewithin the scope of the present invention. In such an embodiment of thepresent invention, remote computer 3 a is remote and physically separatefrom object 1 a, meaning that remote computer 3 a and object 1 a may belocated thousands of miles away from each other, for example. In otherembodiments of the present invention, remote computer 3 a and object 1 amay be in close proximity. In general, however, mobile device and remotecomputer are physically distinct.

In one embodiment, remote computer 3 a is a computer, server or otherelectronic information processing technology, possibly including orbeing associated with a database, that is i) capable of receivinginformation from mobile device 2 c, ii) possibly manipulating,converting or interpreting the received information, and then iii)further communicating the same or new information to object controller 4a to ultimately facilitate some action to be performed at object 1 a,for example. In another embodiment of the present invention, remotecomputer 3 a is “in the cloud,” meaning that remote computer 3 a is aninformation processing system (e.g., computer) that is physically remoteand distinct from object 1 a, and may be distributed in nature. As aresult, remote computer 3 a may communicate with object 1 a over theInternet or other network. Other embodiments of remote computer 3 a arewithin the scope of the present invention.

Information may be communicated between remote computer 3 a and objectcontroller 4 a using any one or more of a variety of means, including,but not limited to, wires, fiber optic cable, or wirelessly. In oneembodiment, for example, remote computer 3 a communicates with objectcontroller 4 a (the interaction represented in FIG. 1A as 3 b) using theInternet (which may include wired and/or wireless modes of informationtransfer, for example), for example. Also, any of a variety ofcommunications protocols may be used in such an information transfer orexchange 3 b. Whether the communication between remote computer 3 a andobject controller 4 a is one-way or two-way, the information beingtransferred from remote computer 3 a to object controller 4 a issufficient to enable object controller to facilitate the control ofobject 1 a in a manner desired by a user, according to the inputreceived at the relevant remote control user interface 2 d. Suchcommunication between remote computer 3 a and object controller 4 a maytake place by means of a network, such as the Internet. An embodimentmay use multiple such communications means, possibly simultaneously.Variations in communication means between remote computer 3 a and objectcontroller 4 a are within the scope of the present invention.

Object controller 4 a receives information from remote computer 3 a,such information relating to the desired action to be performed at orupon object 1 a. Object controller 4 a may, in one embodiment, be anymeans that translates the information received from remote computer 3 ainto the action to be implemented at object 1 a, for example. In oneembodiment, object controller 4 a may be built into object 1 a and maycontrol some controllable aspect of object 1 a, such as a movement orsound volume, for example. In yet another embodiment, object controller4 a may be external to object 1 a, such as a robot or piece ofmanufacturing equipment that performs some action to control object 1 a.In yet another embodiment, object controller 4 a may be attachable orconnectable to object 1 a. Object controller 4 a may, in one embodiment,include a combination of electronic means to receive and processinformation, and electromechanical means to cause the performance of aphysical movement or action at object 1 a, e.g., opening a door (thedoor which would, in this example, be object 1 a), causing a toy to moveforward (the toy which would, in this example, be object 1 a), resettinga medical device (the medical device which would, in this example, beobject 1 a). In another embodiment, object controller 4 a may be anelectronic processor capable of controlling electronic signals that mayfacilitate performance of a desired action, e.g., changing volume of atelevision (the television which would, in this first example, be object1 a), changing a presentation on a display (the display which would, inthis example, be object 1 a). In yet another embodiment, objectcontroller 4 a may be an electronic processor that causes execution ofcode or software in another electronic processor or device. In variousembodiments, object controller 4 a may be or include, either alone or incombination, without limitation, any of the following: actuator, servo,motor, computer, signal processor, electronic storage device, responsivematerial, magnetic device, biomechanical means, light, display, heatingelement, or speaker. In yet other embodiments, object controller 4 a maybe or include means that are adjustable or changeable, and that performany of a wide range of permissible actions at object 1 a. Variations inthe way object controller 4 a controls an object 1 a of the presentinvention are within the scope of the present invention.

FIG. 1B shows examples of other possible interactions between variouselements an embodiment of the present invention similar to theembodiment shown in FIG. 1A, including interactions 1 d′, 2 b′, 2 e′, 3b′ and 4 b′. Each of these interactions may, for example, relate to acommunication protocol (e.g., a signal to initiate or facilitate acommunication, acknowledge receipt of information, increase dataintegrity), or provision of feedback to the recipient element of thepresent invention. For example, interaction 4 b′ may provide informationfrom object 1 a to object controller 4 a indicating that a specificdesired action has been performed by object 1 a. Alternatively,interaction 4 b′ may include the provision of information relating toobject 1 a that gets communicated back to remote control user interface2 d (by means of remote computer 3 a) to provide information at remotecontrol user interface 2 d that would help a user of the remote controluser interface 2 d control object 1 a. In general, an embodiment of anindividual interaction 1 d′, 2 b′, 2 e′, 3 b′, 4 b′ may be acommunication (e.g., exchange of data, bits, information) betweenrelevant elements of the present invention that i) transfers informationrelating to a desired action to be performed at object 1 a, ii) confirmsinstructions or actions relative to performance of a desired action atobject 1 a (e.g., feedback), or iii) provides information to remotecontrol user interface 2 d that helps a user understand, monitor orcontrol object 1 a. Other interactions and communications betweenelements of the present invention are within the scope of the presentinvention.

FIG. 1C shows a representation of an embodiment of a system of thepresent invention that represents tagging of a first object 1 a (that issimilar to a second object, of the same type as a second object 1 z, orhaving one or more similar controllable features as second object 1 z),which—by means of the systems and methods described herein—enables theremote control of second object 1 z. For example, tagging a first imageprojector with a NFC-equipped mobile device would allow a user to usethe mobile device 2 c and remote control user interface 2 d tocommunicate with a remote computer 3 a and object controller 4 a thatcontrols a second image projector, in order to control the second imageprojector. In such a use case, where there are two or more similarobjects (meaning, for example, objects that have the same controllablefeatures and may be controlled by the same relevant remote control userinterface), the remote control user interface that is enabled may, forexample, offer a user the ability to select which specific object(possibly from a group of objects) the user desires to control. Forexample, tagging a first object that is a remotely controllable toy mayenable a relevant remote control user interface that allows a user toselect if the user wants to control the first object, or any one (ormore) other similar remotely controllable toys. Such ability to selectwhich object to control, from among multiple similar objects, mayinvolve user authentication and/or authorization protocols (as describedherein) so that any particular mobile device 2 c or user is provided theability to control only certain objects. Variations in the methods andmeans for tagging a first object to then be able to control a secondobject that is similar (or has similar control elements) to the firstobject, are within the scope of the present invention.

FIG. 1D shows yet another embodiment of the present invention. In thisembodiment, first object 1 a is tagged, leading to enablement of aremote control user interface 2 d that facilitates the control ofmanufacturing equipment (second object 1 z, which is not similar toobject 1 a), which causes the manufacture of a third object 5 which issimilar in at least some ways to object 1 a. An example of this would bea user using a mobile device to tag an item of clothing that the useradmires and wishes to order in a different color, size, etc. Upontagging the item of clothing, the user would be presented with a remotecontrol user interface that allows the user to select, for example, agarment size, color, fabrics, and possibly other customizablecharacteristics of the garment. The remote control user interface wouldthen lead to the control (by providing the user's desired garmentcharacteristics) to machinery capable of creating the garment, forexample. Such machinery would then, in whole or in part, manufacture thegarment according to the desired characteristics as input to the remotecontrol user interface by the user. The result would be a third object 5that is similar, in at least some ways, to tagged object 1 a. When anobject may be considered as part of a set of related objects, such anembodiment may be viewed as tagging one element of the set and thencontrolling another related element of the set.

FIGS. 2A-2C each show a representation of an embodiment of remotecontrol user interfaces of the present invention. FIG. 2A shows anembodiment of a remote control user interface 10 a shown on aninteractive (e.g., touch screen) display of a mobile device 2 c thatcould be used to enable control of a residential lighting system. As afurther example, FIG. 2B shows an embodiment of a remote control userinterface 11 a shown on an interactive (e.g., touch screen) display of amobile device 2 c that could be used to control a television, includingturning the television on and off, and also enabling channel and volumeselection. As yet another example, FIG. 2C shows an embodiment of aremote control user interface 12 a shown on an interactive (e.g., touchscreen) display of a mobile device 2 c that could be used to remotelycontrol a remote control aircraft, enabling a user to cause the aircraftto go left or right, up or down, faster or slower. These representationsshow only a small range of features and presentations of remote controluser interfaces that may be implemented according to the presentinvention. Notably, remote control user interfaces of the presentinvention may be presented in other ways (e.g., using sounds or voices),may be interacted with in other ways (e.g., mobile device movement,voice commands), may use any of a wide range of control elements andcontrol element presentations (some of which may possibly be modified bya user), and may provide additional information or feedback to a user.Many variations in the remote control user interface of the presentinvention are within the scope of the present invention.

FIG. 3A shows a representation of an embodiment of a method 100 of thepresent invention. In a first step 100 a, object-associated NFC elementand mobile device-associated NFC element are placed in physicalproximity (e.g., a distance of less than twenty centimeters from oneanother). Next, as shown in step 100 b, mobile device remote controluser interface (RCUI) is enabled, meaning that a user interface ispresented to a user. In step 100 c, the remote control user interfacereceives an input from a user that relates to a desired action(Action-A). Next, in step 100 d, the mobile device communicatesinformation relating to Action-A to a remote computer. In step 100 e,the remote computer further communicates information to an objectcontroller. In step 100 f, Action-A is implemented at the object.Variations of the method 100 shown in FIG. 3A are within the scope ofthe present invention, including the addition or deletion of steps inthe process, additional communications between various elements of thepresent invention, possibly enabling visual or tactile feedback to beprovided to the user by means of the remote control user interface orother means; updating of information presented on a remote control userinterface, possibly including real-time updates relating to an object;and more.

Embodiments of the present invention may also present a remote controluser interface to a user prior to the tagging (e.g., identification) ofa specific object to be controlled. FIG. 3B shows a representation ofsuch an embodiment of a method 200 of the present invention. Method 200relates to providing remote control user interface prior to tagging anobject that is desired to be remotely controlled, involving the stepsof: first enabling remote control user interface at a mobile device 200a, then having the remote control user interface receive input from auser relating to an Action-B 200 b, next placing mobiledevice-associated NFC element and object-associated NFC element inphysical proximity (e.g., tagging the object with the mobile device) 200c, next mobile device wirelessly communicates information relating toAction-B to a remote computer 200 d, the remote computer thencommunicates information relating to Action-B to an object controller200 e, and in a last step of method 200 the Action-B is implemented atthe object 200 f. Other preceding, intervening or following steps arewithin the scope of the present invention (e.g., feedback from theobject to the RCUI, or other communications between elements of thesystem of such an embodiment of the present invention). For example, afirst object may be tagged, and then a second object (that is similar tothe first object, of the same type as the first object, or having atleast one common controllable feature as the first object) may beremotely controlled. As may be seen by this example, embodiments of thepresent invention may include variations in how they are used, thesequence of steps or events during use, and how this provides for thecontrol of objects.

FIG. 3C shows such a method 300, which may be essentially method 200with some variation, such that a first object is tagged and a secondobject is controlled. For example, mobile device could show a RCUI andallow a user to provide one or more inputs using the RCUI, and then themobile device could be used to tag an object in order to control thatobject in some way, including for example, providing user-specificsettings to the object, by means of communication with a remotecomputer, as described. A similar (but not the same object that is to becontrolled) may have been tagged initially, which may have facilitatedthe upload, download or other provisioning of a relevant RCUI to themobile device. In one example of a use of such an embodiment of a methodand systems of the present invention, a user would use a RCUI thatallows the user to enter settings for a piece of exercise equipment,such as a treadmill. Settings could relate to the duration and/ordifficulty of an exercise session, for example. Alternatively, a usermight be able to simply select from one of a variety of exerciseroutines. These settings would be stored in memory and uponapproximation of the NFC-equipped mobile device and a NFC-equippedobject (which may be the same or a similar object to one previouslytagged, such as the same treadmill as was initially tagged, or atreadmill right next to it or of a similar type at another location),the object would receive the user's selected settings and implementthem. Another example relating to embodiments that may apply a method300 of the present invention relates to tagging a building or associatedstructure, such as an first object at a front desk of a hotel, and thenbeing able to control various second objects, possibly depending on thelocation of the mobile device (e.g., a lighting remote control wouldenable control of lights only in a guest room in which the mobile deviceis then located). Variations in methods 200 and 300 are within the scopeof the present invention. Control of a second object (based on initiallytagging a separate but related object) has many benefits, and may befurther modified based on the location of a user, user identification orauthentication, and more.

An embodiment of a method of the present invention may provide for useror device authentication as part of a process. For example, user ormobile device identity might be verified by any of a variety of meansprior to enablement (e.g., presentation) of a remote control userinterface, or prior to a user's ability to use a remote control userinterface, or prior to the acceptance or carrying out of certain usercommands by means of a particular remote control user interface. Forexample, controlling a piece of dangerous machinery might requireauthentication of the device user prior to enabling control; placing anorder that would charge a credit card might seek authentication of theuser (or possibly the device, or both) prior to enabling control of theorder process; or control of any personal or privately-owned objectmight require authentication of a mobile device or user, meaning adevice or user that has been predetermined to be allowed to control theobject. Such authentication could be accomplished in any of a variety ofways, or combinations of ways, using any of a range of means, includingbut not limited to: username and/or password input, deviceidentification, device location, time of day, timeframe (e.g., if inputis received within a certain amount of time from an initial use or otherevent), biometric data input to a device, user behavior (e.g., speed,movement, past purchases), user metrics (e.g., sensed inputs, trends),and more. Authentication may be automatic or require a user'scooperation.

Beyond authentication of a particular user or device to enable controlof an object, embodiments of the present invention may also provide forcontrol of authority, meaning how one or more of multiple possiblecontrolling mobile devices are authorized to control an object (separatefrom, but possibly in combination with, whether or not such mobiledevices or their users are required to be authenticated by anyparticular implementation of systems and methods of the presentinvention as described above). For example, in one embodiment, controlauthority over a particular object is granted only to the most recentmobile device to have tagged the object-associated NFC element. In yetanother embodiment relating to control authority, only a mobile devicewithin a certain geographic area or proximity to an object is grantedthe authority to control the object (and in such an embodiment, thegranting of a control privilege might be further limited to when themobile device remains within the certain geographic area or proximity tothe object). In yet another embodiment, control authority might begranted to a device or user only during a particular time range (e.g.,work shift), or for a particular duration after first use of aparticular RCUI to control a particular object, for example. In otherembodiments of the present invention, control authority might only begranted to a device or user to control a given object based on whether amobile device is the first device to tag an object-associated NFCelement or, alternatively, if a mobile device is the last device to tagthe object's object-associated NFC element, for example (and in the casewhere the mobile device is the first device to tag an object in order tobe able to control it, control authority might further be limited to acertain amount of time, or maintaining proximity to the object, forexample). In yet another embodiment, control authority may be granted toa most senior user, e.g., a user with highest experience, rank, or othertiered rating or credential. A practical example of control authoritymight relate to a media or entertainment system, such as one commonlyfound in a home, or one commonly found in front of a seated passenger ona commercial airplane. In such an example, a first user could tag anobject-associated NFC element with a first device to be able to controlthe object using the first device. Later, a second user could tag thesame object-associated NFC element with a second device to control thesame object with the second device, and the first device's controlauthority would be voided (e.g., the first device would no longer beable to control the object). In another scenario, the first device'scontrol authority lasts for the period of time when the device is inproximity to the object, or for a limited period of time (e.g., an hour,duration of a flight, an amount of time that a user has paid for, suchpayment mechanism which may be incorporated into a method of the presentinvention) following initial tagging of the object, for example. Itshould also be noted, relating to authentication and controlauthorization, that there may be instances where more than one mobiledevice could be controlling an object, or aspects of an object, at thesame time. This could happen relating to control any of a variety ofobjects, including but not limited to machinery, manufacturingequipment, computers, transportation means, entertainment and gamingsystems, etc. For example, different mobile devices and their usersmight simultaneously control (e.g., in cooperation, as a crowd-sourced)an object, or different mobile devices and their users might controldifferent controllable aspects of an object, at the same time (and mayalso, for example, be able to trade off control). Many variations ofembodiments of authentication and control authority are within the scopeof the present invention.

Embodiments of the present invention may be used in any of a variety ofways, and for many different purposes. Sample applications includeremote control of (among other things): consumer electronic devices,entertainment systems (both residential and commercial, such as thosefound on aircraft), commercial electronic devices, office equipment,manufacturing processes, transportation means, wheeled craft, sea craft,aircraft, medical devices, medical instrumentation, explosives or otherdangerous materials or processes, doors, access portals, tubes, pipes,materials, living organisms, and more. To the extent that an objectcontroller can control any aspect of a thing or process, the thing orprocess may represent an embodiment of an object of the presentinvention.

Features of embodiments of the present invention may include, withoutlimitation, the identification of an object (or environment) to becontrolled by means of approximating a mobile device with the object ora tag associated with the object; upload to the mobile device of aremote control user interface (or instructions or other information thatleads to the creation of such a remote control user interface) that isspecific to the object and/or the user (e.g., at least partly based on auser's behaviors or preferences); presentation of a remote control userinterface by the mobile device that enables control of an object; andfacilitation of control of the object (per the inputs provided by a userat the mobile device) by means of wireless communication between themobile device and a network such as the Internet or similar network. Inaddition, embodiments of the present invention may enable the mobiledevice to provide feedback to a user, such feedback based on sensing at,or information about, the object. The inclusion of authentication bysome embodiments of the present invention enable access control andcustomization, such as by permitting some users (but not others) to beable to have a RCUI uploaded to a mobile device in the first place, tohave a RCUI functioning on the mobile device, to have certain RCUIcontrol elements present (or not), or to have certain RCUI elementsenabled (or disabled). In addition, the present invention may enable oneor more remote control user interfaces on a given mobile device, eitherto be presented and used one at a time, or simultaneously. Embodimentsof systems and mobile devices of the present invention may facilitatepresentation and use of a RCUI “on the fly” (e.g., single use), or maystore a library of user interfaces that are accessible to a particularuser or device. A RCUI may, according to embodiments of the presentinvention, be user manipulated (e.g., a user may be able to reconfigurea presentation of RCUI control elements, including moving them around ordeleting any that are unnecessary or not used) or otherwise customizedby or for a particular user or device, or even according tocircumstances such as the location, behavior or other sensed attributesrelating to a user. Many variations to these and other features of thepresent invention are possible.

In general, embodiments of the present invention offer many benefits. Asone example, embodiments of the present invention enable a user toaccess relevant remote control user interfaces (meaning, for example, aremote control user interfaces that are specific to control ofparticular target objects), on a mobile device, for one or more objectsthat the user desires to control—all by means of a NFC initiatedphysical approximation of the user's mobile device and anobject-associated NFC element (as noted, other types of interactions arealso within the scope of the present invention). As another example ofbenefits of the present invention, embodiments of the present inventionenable mobile device users to remotely control objects by means ofwireless communication with a remote server, rather than directly(meaning direct communication between a device and an object, such aswould be the case with a current television remote control). This hasmany benefits, including the ability to use information other than thatwhich would be available in a direct interaction between a mobile deviceand an object. Embodiments of the present invention allow a mobiledevice user to possess and use different remote control user interfacesfor each of many different objects, providing remote control userinterfaces that are most relevant to each target object. Embodiments ofthe present invention also benefit users by enabling revisions andupdates to remote control user interfaces for particular objects,possibly either automatically or manually based on a user's behaviors orpreferences. Another benefit of the present invention relates to userauthentication, which may be provided in any of a variety of ways thatare not possible using conventional remote controls. Another benefit ofthe present invention relates to control authority and the ability toprovide various approaches (including combinations of approaches) toenable different users control that same object in any of a variety ofways. Ultimately, embodiments of the present invention benefit users byenabling them to use a personal mobile device (rather than one or moreother devices) to control one or more remotely controllable objectsusing remote control user interfaces that are specific and relevant toeach object. In addition, features of embodiments of the presentinvention including but not limited to modification of a remote controluser interface according a user's preferences or behaviors, and also theapplication of any of a variety of authentication and control authorityschemes, provide other useful benefits. Many other benefits areattributable to embodiments of the present invention.

Proximity-Enabled Remote Controls of the present invention, and possiblyother remote controls (e.g., remote controls that are not proximityenabled) are useful in a wide range of use cases. For example, a usecase may involve a remotely controllable object, such as a television orlighting system, that is accessible by multiple devices (e.g.,controllable by a remote control user interface on each device), such asa first mobile device that is associated with a first user, and a secondmobile device that is associated with a second user (whereby the firstmobile device and the first user, and the second mobile device and thesecond user, are not the same). For example, in a residential familyroom setting, a first user may wish to change the channel on atelevision at a first moment in time and using a first remote controlpresented on a first device (e.g., the first user's mobile device), anda second user may wish to later change the channel on the sametelevision at a later moment in time using a second remote controlpresented on a second device (e.g., the second user's mobile device,which, as noted, is distinct from the first user's mobile device). Asanother example involving the same users and the same object, a firstuser may wish to change the channel on the television at a first momentin time and using a first remote control presented on a first device(e.g., the first user's mobile device), and a second user may wish tochange the volume on the same television at the same first moment intime using a second remote control presented on a second device (e.g.,the second user's mobile device which, as noted, is distinct from thefirst user's mobile device). As previously described, such control maybe enabled by means of a remote control user interface along with othersystems and methods of embodiments of the present invention. Such usecases are in stark contrast to the use of a single infrared remotecontrol that needs to be physically passed from a first user to a seconduser in order to enable each of the individual users to remotely controlthe remotely controllable object, such as the television used in theexamples above. Such an infrared remote control that is associated witha single object (and notably, the object is associated with only oneremote control) does not enable different users to control differentaspects of the same object at the same time, for example, nor does itallow different users to control aspects of an object at different timeswithout physically ‘handing off’ the remote control. Accordingly, thepresent invention provides novel systems and methods for remote controlof objects by multiple users (e.g., a first user and a second user)using distinct remote controls (e.g., a first remote control implementedon a first device, and a second remote control implemented on a seconddevice that is not the first device). While several representativeembodiments are described herein, many variations of theserepresentative embodiments are possible and anticipated by the presentinvention in order to enable unique user benefits.

A first possible embodiment 400 of a control authority for transferringcontrol between a first remote control and a second remote control isrepresented in FIG. 4a . Such remote controls of embodiment 400 may beproximity-enabled remote controls as described by the present invention,non-proximity-enabled remote controls, or combinations of these. Thisfirst embodiment 400 involves, at a first time 402, the presentation ofa first prompt 404. The first prompt 404 may be, for example, apresentation of a first remote control user interface on a display of afirst wireless communication device being used by a first user. Firstprompt 404 may be caused by any of a variety of causes, including butnot limited to: a determination of proximity between a device and anobject, a determination of proximity between two devices, adetermination of proximity between two objects, a determination ofproximity between a device and a location, a determination of proximitybetween an object and a location, a user action, a user input, a userbehavior, a user physiologic measure or state, a time of day, aduration, and more, or some combination of these. Various other types offirst prompts, including but not limited to visual, auditory or tactileencouragement or enablement for a user to access a remote control userinterface or remote control user interface element (and subsequentlyprovide input to such remote control user interface or element), arepossible and anticipated by the invention. Notably, such prompts relateto embodiment 400, as well as other embodiments of the invention(including embodiments shown in FIGS. 4b, 5a, 5b ). Following the firstprompt 404, the first user accesses the first remote control userinterface 406 (implemented on a the first user's device, for example)and uses the first remote control user interface to input a firstcommand to be implemented at a first object 408. The first user mayprovide an input to the remote control user interface to turn an objecton or off, increase a volume of an object, change a channel of anobject, cause an object to open or close, or instruct an object to moveor change location, as examples. Many other inputs (e.g., commands,instructions) are possible and anticipated by the invention. Thisenables the first user to use the first remote control user interface ona first device to remotely control a first object, as represented byfirst control 410 (notably, first control 410 occurs after first time402 and before second later time 412). Subsequent to first control 410,at a second time 412 (e.g., 10 seconds later, 5 days later, 27 monthslater), a second prompt 414 (which may be of the same type, or adifferent type, as the first prompt 404) enables a second user to accessa second remote control user interface on a second device 416, such thatthe second user thereby uses the second remote control user interface toinput a second command that is implemented at the first object 418, suchthat the first user assumes second control 420 of the first object. Thisprocess may then continue with other devices, remote controls and users.For example, at a third time 422 following the second time 412 andsecond control 420, a third user (which may be the first user or a newuser) may be provided with a third prompt 424 (which may be of the sametype, or a different type, as the first prompt 404 and second prompt414). The third user accesses a third remote control user interface 426and inputs a third command that is then implemented at the first object428, thereby exercising third control 430 of the first object.Variations of embodiment 400 are possible and anticipated by the presentinvention.

An example of a use case that uses the embodiment of a control authorityscheme as shown in FIG. 4a may be represented by the family televisionexample above. A first user, the father, uses his wireless communicationdevice to turn on a television and change or input a channel (heaccesses a first remote control user interface on his device to entercommands, for example) at a first time. Then, at a second time thatfollows the father's control of the tv, a second user, the daughter,uses her wireless device and a remote control user interface presentedon her device to adjust the volume. Next, at a third time that followsthe daughter's control of the tv, a third user, the son, uses hiswireless communication device and a remote control user interfaceimplemented on his device to turn the television off. In this example ofan embodiment, a device with access to a remote control user interfacefor a particular object may be used (at any time or possibly only whenin proximity with the object or when a user is permitted to control anobject, for example) to control the object, and control authority istransferred from one such device to the next. This particular embodimentrepresents ‘distributed’ or ‘shared’ remote control of an object, withmultiple remote control devices (and their respective users) having thepossibility to exercise control over the same remotely controllableobject. In this embodiment, a first user might enhance or counter theaction of a second user. Variations of this embodiment are possible,including but not limited to limiting access to only certain devices orcertain users, based on certain conditions (e.g., proximity, time of theday, day of the week, permission, if the user has completed herhomework, the weather, security conditions, and more). Such variations,including but not limited to the use of limitations and permissions, arepossible and anticipated by the invention, and may relate to embodimentsshown in FIGS. 4a, 4b, 5a, 5b , and other embodiments.

FIG. 4b shows another possible embodiment 450 relating to controlauthority. At a first time 452 a first prompt 454 is presented to afirst user. As noted, a prompt of the invention may take any of avariety of forms. For example, first prompt 454 may be a presentation ofa remote control user interface on a display of a wireless device, basedon a determination of proximity between the device and an object thatwill be subject to control by the device (the determination of proximitymay be determined by the object, the device, or another element of asystem of the invention). The first user accesses a first remote controluser interface 456, and uses the remote control user interface to inputa first command to be implemented at a first object 458, to thereby givethe first user first control 460 of the first object. At a second time462, following first control 460, a second user is given a second prompt464. In this embodiment 450, despite the second user being able toaccess a second remote control user interface (on the second user'swireless communication device, for example) 466, the second user isdenied control of the first object 468, meaning that the first usercannot control the first object. Such denial may be implemented in anyof a variety of ways. For example, a notice may appear on (or atop) avisually displayed remote control user interface stating “accessdenied,” or other word(s) or symbols to this effect. Alternatively, thecontrol elements (one or more of them) on the remote control userinterface may be disabled, which could be presented as grayed-outcontrols, or controls that have been colored red, or controls that arealtogether absent (removed), for example. These are examples, and othermeans for communicating that a remote control user interface (or one ormore particular control elements) have been disabled (e.g., notavailable to the user) are possible. As a further example, a remotecontrol user interface may not appear at all (meaning it is notpresented to the user in the first place, for example), and may bereplaced by a notice to the user, for example. Embodiment 450 may bevaluable, for example, when a first user's control of a remotelycontrollable object is intended to remain in place, for at least as longas the first user is using his or her remote control user interface tocontrol the object, or for as long as a system of the invention enablesthe user to use his or her remote control user interface to control theobject.

As one example of embodiment 450, a first user and a second user mayhave booked the same hotel room for different days, and both secureaccess to a remote control user interface to control various objects inthe hotel room, such as entertainment, environmental and lightingsystems (perhaps they had each separately previously stayed at the hotelor even in the same particular room). If a first user has control of theroom because he is the current occupant of the room (and the second useris not the current occupant of the room), then, according to thisparticular embodiment of a control authority of the present invention,only the first user will be able to control the objects in the roomusing a first remote control user interface, and the second user isdenied the ability to control objects in the hotel room at that time,e.g., during the period of time when the first user is the occupant ofthe hotel room. After the first user departs the room (at the end of hisstay, for example) the first user's control authority expires (e.g., hiscontrol authority is disabled and he can no longer use his remotecontrol user interface on his device to control objects in the room),and after the second user enters the room (at the start of her stay, forexample) the second user's control authority begins (e.g., she can useher remote control user interface on her device to control objects inthe room until she departs the hotel room at the end of her stay, forexample). Such remote control may be subject to other limitations,permissions, rules or processes of the invention (and this may be thecase for other embodiments of the invention), including but not limitedto proximity enablement (e.g., a proximity-enabled remote control, suchas one that is used in combination with a control authority concept ofthe invention), for example. An embodiment of a system of the presentinvention may determine or otherwise assign which one (or more) users isgiven the ability to control particular objects, and which other one (ormore) users does not have the ability to control particular objects.Such limits, permissions and assignments may be changed to givedifferent users (or different groups of users) the ability to remotelycontrol different objects at different times, based on any of a range offactors. A few examples of such factors include, but are not limited to:proximity to an object, the time or a period of time, a rule,determination of an algorithm, weather condition, health condition,proximity of another person or device, user physiologic parameter, userbehavior, and more. As noted, such factors (e.g., limitations,permissions, rules, assignments) may apply to this embodiment 450, aswell as other embodiments of the present invention.

In yet another embodiment of the invention, shown in FIG. 5a , controlauthority may be implemented in another way. Embodiment 500 shows, at afirst time 502, a first prompt 504, such as a first remote control userinterface presentation to a first user on a display (or otherwise) at afirst device, the first user accessing the first remote control userinterface 506 to use the first remote control user interface to input afirst command 508, in order to secure first control 510 (e.g., in orderto have the first command implemented at the first object). Next, at asecond time 512 that follows first control 510, a second prompt 514,such as a second remote control user interface presented on a display ofa second wireless communication device (that is not the same as thefirst wireless communication device), is generated for a second user,and the second user accesses the second remote control user interface516 in order to use the second remote control user interface to input asecond command 518. In embodiment 500, a next step at a third time 522following step 518 is that the first user is presented with the abilityto approve or deny the second user's second command (an input orinstruction that is intended to control an aspect of the first object,such as its movement, for example) 524. The first user may then approvethe second user's command 526 in which case the second user's command isimplemented at the first object, or the first user may deny the seconduser's second command 528 in which case the second command is notimplemented at the first object. In this embodiment, the first user mayreceive a notice that “User 2 desires to implement command Y at object Z. . . please approve or deny this request” (or other words or type ofnotice to this effect), following which the first user may approve ordeny the request using input means associated with the first user'sremote control user interface, or by using other means of a system ofthe present invention, for example. Such notice to the first user may bepresented (and a response received) using any of a variety ofnotification output and response input means and methods. Variations inthis embodiment are possible and anticipated by the present invention,including but not limited to the methods and details relating to deviceor other communications with each of the respective users.

Notably, in the embodiment shown in FIG. 5a , the first user retainscontrol of the first object, even following approval of the seconduser's control (command or instruction) relating to the first object. Inembodiment 500, the first user not only controls whether or not thesecond user's command will be implemented at the first object, but alsocontrols the object subsequently, including any further inputs by thesecond user or any other user. Embodiment 500 offers benefits to usersin certain situations. FIG. 5b shows another possible embodiment 550, inwhich command of the first object is transferred from the first user tothe second user as a part of the method represented. It should be notedthat embodiments 500 and 550 are not mutually exclusive, e.g.,embodiments of the present invention are possible that combine featuresof these two embodiments (and possibly other embodiments), such as anembodiment whereby a first user may approve a command by a second userand either simultaneously or subsequently retain or transfer remotecontrol of the first object to the second user. In embodiment 550, at afirst time 552, the first user is presented with a first prompt 554 andthe first user accesses a first remote control user interface 556 to usethe first remote control user interface to input a first command 558that enables first control 560 (e.g., implementation of the firstcommand by the first object) by first user. At a second later time 562,after step 560, a second prompt 564 is presented to a second user whoaccesses a second remote control user interface 566 to input a secondcommand 568. Next, at a third time 572, the first user is given theopportunity to approve or deny the second user's assumption of controlof the first object 574 (e.g., first user is given an option to transfercontrol of the first object to the second user). If the first userapproves, then the second user assumes control of the first object 576,meaning that control of the first object is transferred from the firstuser to the second user. Alternatively, if the first user does notapprove (e.g., denies the request), then the second user does not assumecontrol of the first object 580, meaning that transfer of control fromthe first user to the second user does not take place at approximatelythe third time (although this and also other embodiments of the presentinvention anticipate that transfer of control may happen at anotherlater time, for example, possibly following a subsequent prompt to thesecond user and approval at that time for the transfer by the firstuser). Notably, many variations of this and other embodiments of thepresent invention are possible. For example, following a first prompt, afirst user does not need to necessarily enter a first command in orderto have first control of a first object (the first user may, forexample, achieve first control of the first object simply by launching aremote control user interface, being in proximity with the first object,or by other means, and the first user may not actually provide an inputto control the first object, for example). In another variation ofembodiment 550, for example, a second user may initiate (e.g., by meansof the second user's device) a request for control of an object withouthaving to provide a command to control the first object (meaning that arequest for control of an object may be separate from a request toimplement a specific command at that same object). A use case example ofembodiments discussed might occur in an office setting, for example. Afirst user may be using a first remote control user interface on a firstwireless communication device to control a remotely controllable digitalprojector (to show a slide show to her colleagues, for example), and atsome point in the presentation the first user desires to hand off thepresentation to a second user, who desires to use a second remotecontrol user interface on a second wireless communication device inorder to control the same projector. After the second user is prompted(by seeing a remote control user interface for the projector on hisdevice, for example), the second user enters an input—and the first useris notified and approves the second user's use of the projector, therebytransferring control of the projector (the first object, in this case)to the second user. Embodiments may be implemented in any of a varietyof possible ways. For example, instead of a second user using a controlelement of a remote control user interface, there may first (as theprompt and as part of the remote control user interface) be a noticepresented to the second user noting that another user has control of theobject, and asking the second user to indicate a desire to control thefirst object (this embodiment would be optimal for certain situations,such as when multiple user desire control of a particular object, orcertain objects benefit from control by any one of several users, forexample). Many other variations of these embodiments are possible andanticipated by systems and methods of the present invention. Therepresentative embodiments shown provide examples of how systems andmethods of the present invention may enable multiple users (who areusing different remote controls implemented on different devices) tocontrol a single object. The representative embodiments shown also offerexamples of how systems and methods of the present invention enable agroup of one or more users to transfer control of an object to (or sharecontrol of an object with) another group of one or more users in anorderly manner. Such embodiments of systems and methods of the inventionprovide significant benefits for users of remote controls implemented ona variety of devices.

Control authority embodiments of the invention may vary from theembodiments described in any of a variety of ways. For example, incertain embodiments of the invention, remote control authority mayinvolve proximity enablement (as part of a system or method thatincludes proximity-enabled remote control, for example), whereas otherembodiments may not involve proximity enablement. It is also notablethat embodiments of the invention may anticipate the possibility that auser who has control authority following a prompt may not actuallyprovide an input or command to be implemented at a target object. Insuch embodiments, a subsequent prompt may occur, and another user mayassume control (or be denied control) of the object. In other words, incertain embodiments a first user's control authority may be sufficientto then enable (or disable) a second user's control authority, forexample. It should also be noted that control of an object may meancontrol of a particular aspect of that object (and not necessarilycontrol of every controllable aspect of an object) in some embodiments.For example, it is possible to transfer the control of one aspect of anobject from a first user to a second user, while the first user retainscontrol of other aspects of the same object. This could be achieved bymethods that relate to a single remote control user interface element,for example. As a practical example, I might transfer control (for asingle control instance or, longer-term control duration, or otherwise)of the volume aspect of my television to my wife, while I retain controlof the channel selection, or vice-versa. Whereas some descriptions ofembodiments of the invention may reference a “remote control userinterface,” they could just as easily reference an individual “controlelement of a remote control user interface” (such as to control thesingle aspect of the object that's controllable by means of thatparticular control element), or a group or subset of such controlelements. This makes sense since a remote control user interface is acollection (or group) of control elements, which may be arranged orrearranged by a developer or possibly even a user in certainembodiments. This is a valuable feature of the present invention inorder to distribute control (various aspects of control) of an objectamong multiple users. Benefits of such embodiments, or variations of thedescribed embodiments, enable multiple users to share in the control ofa remotely controllable object, for example. This is in addition toother benefits provided by control authority systems and methods of thepresent invention, irrespective of whether they are used withproximity-enabled remote controls or mobile remote controls moregenerally. As noted and described, control authority concepts have manypossible variations that are anticipated by the present invention.

An example use case that combines proximity-enabled remote control andcontrol authority may be represented by two individuals travelingtogether—a first user and a second user—who check into the same hotelroom together. The first user uses a first mobile communication deviceon which is implemented a first remote control by means of a firstremote control user interface, as previously described. The second usersimilarly uses a second mobile communication device on which isimplemented a second remote control by means of a second remote controluser interface. Upon entry at the hotel lobby, the first user's devicedetermines that the first device is in proximity to several remotelycontrollable objects (e.g., door locks for the hotel room, thermostatand fan, lighting system, and more), some of which are in the users'hotel room, and others of which may be associated with the hotel or room(but not in the room), such as remotely controllable objects that may belocated in or around the hotel property. In any case, the first user,based on a determination of proximity based on either the first user'slocation (as may be determined by a GPS module of the device, or othermeans) or proximity with a RFID tag of the invention (located near theentry to the room, for example), as examples, is given access to (orautomatically presented with) a first remote control user interface onthe first device. This first remote control user interface enables thefirst user to remotely control— using the first device— various objectsassociated with the hotel. Similarly, the second user's devicedetermines proximity upon entry to the same hotel room, based on adetermination that the device is (or has been placed) in proximity witha RFID tag (or similar tag, transmission or beacon means) within or nearthe entrance to the hotel room, for example. Following such proximitydetermination, the second user is enabled to use a second remote controland remote control user interface on the second device, empowering theuser to control the same or different (possibly based on a profile orother information or permissions) objects that the first user is able tocontrol. The first user uses the first remote control user interface toturn on a few lights in the hotel room, while the second user uses thesecond remote control user interface to adjust the temperature and fanspeed settings in the hotel room, for example. Since these are differentobjects being controlled, in this example each of the two users hascontrol authority. In this particular example, control authority is(let's say) of the type represented in FIG. 4a , wherein any authorizeduser may (one user at a time) control an object, or a controllableaspect of an object. For clarity, in a possible embodiment of theinvention, if multiple users are attempting to control the same aspectsof the same object at the same time, then only a first user thatcommunicates a first command to control a particular aspect of theparticular object would have their command implemented at the object,although another user may immediately thereafter input a new command,possibly revising or even negating the command of the first user, forexample. To continue with the example of the first user and the seconduser at the hotel, each of them may go on to remotely control variousobjects in the hotel room and possibly also around the hotel propertyusing their remote control user interfaces operating on each of theirdevices. Once proximity no longer exists (or non-proximity exists)between the first device and the hotel property, and between the seconddevice and the hotel property, then the first and second users are nolonger enabled to control objects at the hotel property, for example.This disablement may be achieved by disabling user access to aparticular remote control or remote control user interface or remotecontrol user interface elements. Such disablement may also be achievedby disabling the control capability of the first and second users'remote controls upon non-proximity. Enablement and disablement of remotecontrols may include actions taken at a remote server. Other methods ofdisablement of a remote control, remote control user interface andremote control user interface elements are possible and anticipated bythe invention. Upon disablement, as user may be presented with a visualor other notice or other indication that the user no longer has accessto (is enabled) to control a particular remotely controllable object orparticular aspect of a remotely controllable object. Many otherembodiments of systems and methods of the invention, including theirrespective benefits to users, are possible and anticipated by theinvention.

Control authentication relates, in general, to the pairing of a device(or a remote control implemented on a wireless communication device,such as by means of a remote control user interface displayed orotherwise presented on the device) with a remotely controllable object(or multiple remotely controllable objects) in order to enable thecontrol of the object(s) by means of the device (e.g., a remote controlthat is implemented on the device). In certain embodiments of theinvention, control authentication involves the communication of a codethrough various elements of a system of the invention, such as from aremote server (where the code may be generated and associated with anobject to which it is then communicated), to the object, then to adevice, and back to the remote server, in order to associate the codeoriginally associated with the object, for example, with the codepresented back to the remote server by the device (along withinformation specific to the device), for example. This enables a systemof the invention to pair a device and an object, for example, to enablea remote control implemented on a particular device to control aparticular object with which it has been paired. Embodiments of theinvention may use a database to, for example, store information aboutthe association of a code and an object (or a device or other element ofa system of the invention) in order to determine how to routecommunications between specific devices and objects, such as byreferencing IP address or other similar means. For example, following aninitiation event (e.g., a determination of proximity between a deviceand an object, which may be receipt of a code in certain embodiments) acode may be sent from a remote server to the object, then the object maycommunicate the code to a device, and the device may then communicatethe code back to the remote server (along with information relating tothe device, such as its identity or address, for example) such that theremote server now knows to communicate any commands (e.g., inputsprovided by a user to a remote control user interface implemented on thedevice) received from the particular device to the object that it hasbeen paired with (e.g., the object to which the remote server first sentthe code). Embodiments of control authentication concepts of theinvention enable different unique codes to be issued to elements of theinvention so that a particular element does not need to use a singlecode (or identifier), which may diminish the security (or secureconnections) of elements of a system of the present invention, forexample. Similar to the concept of control authority, controlauthentication may be used together with proximity-enabled remotecontrol concepts of the invention, and also with as with remote controlsmore generally (e.g., remote controls that are not proximity enabled).Control authentication is useful, in general, to associate specificremote controls of the invention with specific objects of the invention,to thereby enable a particular remote control (or group of remotecontrols) to control a particular object (or group of objects). Whileseveral representative embodiments are described herein, many variationsof these embodiments are possible and anticipated by the invention.

FIG. 6a shows a first embodiment 600 relating to control authentication.As a first step, initiation event 602 is a signal communicated to theremote server 604. The initiation event 602 may be a signal (e.g., ping,query, communication), which may be wirelessly transmitted or otherwisecommunicated to the remote server 604 in this and other embodiments ofthe present invention. Initiation event 602 may originate from a firstdevice 616 or a first object 610, or other element of a system of theinvention. An initiation event 602 may be triggered (in any of theembodiments of control authorization methods of the present invention)by a determination of proximity between an object and a device, or by adetermination that a device is in (or near) a particular location, or bya clock or other timing device, or manually by means of a user input ata device or object, as a few examples. In this embodiment, initiationevent 602 signals the remote server 604 to generate a first code 606.The first code is associated with a first object 608 a, and suchassociation between the first code and the first object may be recordedin a database 608 b (possibly with other information relating to thefirst object), for example. The first code is also transmitted to thefirst object 608 c by means of a remote server transmission module. Inembodiments of the invention, the first code is a unique code that maybe communicated securely by means of encryption or other securecommunication means during its transmission from the remote server 604to the first object 610 (and such secure communication means, such asencryption, may be employed for communication of any signals that arecommunicated between various elements of the invention). At the firstobject 610, the first code is received 612 by means of an objectreceiver module and then the first code is transmitted from the firstobject to the first device 614 by means of an object transmitter module(the object receiver module and the object transmitter module togethermay be referred to as an object communication module). Wirelesscommunications (transmissions and receptions) between various elementsof the invention may be performed in any of a variety of ways and usingany of a variety of means (e.g., modules). Such communication may beperformed using electronic or electromagnetic transmission and receptionsystems and methods, e.g., wireless radio communication, using anyfrequency capable of being used for wireless communication and anystandards or protocols capable of transmitting information using suchmeans. Communication may also be achieved using sound (e.g., emission ofan audible sound), etc. Such communications may communicate any of awide range of information, including but not limited to codes, deviceidentity information (e.g., a device identifier), object identityinformation (e.g., an object identifier), device location (e.g., aphysical or geographic location, such as by means of providing latitude,longitude and altitude), object location, device address (e.g., an IPaddress), object address, metadata, and other information. At the firstdevice 616, the first code is received 618 by a device receiver module.Then the first code is transmitted back to the remote server 620 by adevice transmitter module (the device receiver module and the devicetransmitter module together may be referred to as a device communicationmodule). Information relating to a user may also be shared with theremote server, directly or indirectly, such as by the first device 616.Information communicated from a device may be used, for example, todetermine if the first device (or a remote control being implemented onthe device), or a user of the device, has permission to access the firstobject. Notably, in this and other embodiments of the invention theremote server may be a single physical unit or a system of connected ordistributed servers that are located in one or more geographic orphysical locations. At the remote server 604, the first code and firstdevice information are received 622 by means of a remote server receivermodule (note the remote server receiver module and the remote servertransmitter module together may be referred to as a remote servercommunication module). After the first code and the first deviceinformation are received back at the remote server in step 622, thefirst device is then associated with the first object by means of thefirst code 624, by referencing the association between the first codeand the first object in the database 608 b, for example. Thisassociation or ‘pairing’ of the first device and the first object nowtriggers systems and methods of the invention to allow communicationbetween the first device and the first object, via the remote server,for example, including but not limited to communication of commands,instructions or other information from the first device to the firstobject, as well as feedback or other information from the first objectback to the first device. From a user perspective, pairing enables auser to input a command (e.g., to increase the volume of a television)by means of a remote control user interface implemented at the firstdevice (being used by the user) to be performed at the first object(e.g., the television volume increases), and also for the user toreceive feedback by means of the remote control user interface (e.g.,there is an indication that the volume has been increased shown on theremote control user interface), for example. Control of the first objectby the first device is enabled 628. A user of the first device 616 maynow control the first object 610 using a remote control user interfaceimplemented at the first device, by means of systems and methods of theinvention. Such control may continue until control is disabled, whichmay, for example, follow a trigger such as a determination ofnon-proximity, or the end of a predetermined amount of time, or adeadline, or other condition or determination. Variations of theembodiment 600 shown in FIG. 6a of a method of the invention arepossible and anticipated by the invention.

FIG. 6b shows a second embodiment 650 relating to controlauthentication. As a first step, initiation event 652 is a signalcommunicated to the remote server 654. The initiation event 652 may be asignal (e.g., ping, query, communication), which may be wirelesslytransmitted or otherwise communicated to the remote server 654 in thisand other embodiments of the present invention. Initiation event 652 mayoriginate from a first device 660 or a first object 666, or otherelement of a system of the invention. An initiation event 652 may betriggered (in any of the embodiments of control authorization methods ofthe present invention) by a determination of proximity between an objectand a device, or by a determination that a device is in (or near) aparticular location, or by a clock or other timing device, or manuallyby means of a user input at a device or object, as a few examples. Inthis embodiment, initiation event 652 signals the remote server 654 togenerate a first code 656. The first code is associated with a firstdevice 658 a, and such association between the first code and the firstdevice may be recorded in a database 658 b (possibly with otherinformation relating to the first device), for example. The first codeis also transmitted to the first device 658 c by means of a remoteserver transmission module. In embodiments of the invention, the firstcode is a unique code that may be communicated securely by means ofencryption or other secure communication means during its transmissionfrom the remote server 654 to the first device 660 (and such securecommunication means, such as encryption, may be employed forcommunication of any signals that are communicated between variouselements of the invention). At the first device 660, the first code isreceived 662 by means of a device receiver module and then the firstcode is transmitted from the first device to the first object 664 bymeans of a device transmitter module (the device receiver module and thedevice transmitter module together may be referred to as a devicecommunication module). Wireless communications (transmissions andreceptions) between various elements of the invention may be performedin any of a variety of ways and using any of a variety of means (e.g.,modules). Such communication may be performed using electronic orelectromagnetic transmission and reception systems and methods, e.g.,wireless radio communication, using any frequency capable of being usedfor wireless communication and any standards or protocols capable oftransmitting information using such means. Communication may also beachieved using sound (e.g., emission of an audible sound), etc. Suchcommunications may communicate any of a wide range of information,including but not limited to codes, device identity information (e.g., adevice identifier), object identity information (e.g., an objectidentifier), device location (e.g., a physical or geographic location,such as by means of providing latitude, longitude and altitude), objectlocation, device address (e.g., an IP address), object address,metadata, and other information. At the first object 666, the first codeis received 668 by an object receiver module. Then the first code istransmitted back to the remote server 670 by an object transmittermodule (the object receiver module and the object transmitter moduletogether may be referred to as an object communication module).Information relating to the object (e.g., an ambient temperature) mayalso be shared with the remote server, directly or indirectly, such asby the first object 666. Information from the first device 660 may alsobe communicated via the first object 666 to the remote server 654 inembodiment 650. Such information might be used to determine if the firstdevice (or a remote control being implemented on the device), or a userof the device, has permission to access the first object. Notably, inthis and other embodiments of the invention the remote server may be asingle physical unit or a system of connected or distributed serversthat are located in one or more geographic or physical locations. At theremote server 654, the first code and first object information arereceived 672 by means of a remote server receiver module (note theremote server receiver module and the remote server transmitter moduletogether may be referred to as a remote server communication module).After the first code and the first object information are received backat the remote server in step 672, the first object is then associatedwith the first device by means of the first code 674, by referencing theassociation between the first code and the first device in the database658 b, for example. This association or ‘pairing’ of the first objectand the first device now causes systems and methods of the invention tofacilitate communication between the first object and the first device,by means of the remote server, for example, including but not limited tocommunication of commands, instructions or other information from thefirst device to the first object, as well as feedback or otherinformation from the first object back to the first device. From a userperspective, pairing enables a user to input a command (e.g., toincrease the volume of a television) by means of a remote control userinterface implemented at the first device (being used by the user) to beperformed at the first object (e.g., the television volume increases),and also for the user to receive feedback by means of the remote controluser interface (e.g., there is an indication that the volume has beenincreased shown on the remote control user interface), for example.Control of the first object by the first device is enabled 678. A userof the first device 660 may now control the first object 666 using aremote control user interface implemented at the first device, by meansof systems and methods of the invention. Such control may continue untilcontrol is disabled, which may, for example, follow a trigger such as adetermination of non-proximity, or the end of a predetermined amount oftime, or a deadline, or other condition or determination. Variations ofthe embodiment 650 shown in FIG. 6b of a method of the invention arepossible and anticipated by the invention.

Many variations of control authentication schemes are possible andanticipated by the invention. For example, in the embodiments describedabove, a remote server generates a code. In other possible embodiments,other elements of a system of the invention may generate a code,including but not limited a device or an object. In such embodiments,the same element that generates to code may transmit the code to (andthrough) other elements of a system of the invention, such that the codereturns to the element that generated it, for pairing purposes, forexample. A code is an identifier that may correlate (or be associated)with the identity of an object or other element of the invention, forexample. In certain embodiments, codes are unique to an object or otherelement of the invention. In certain other embodiments, codes may berandomly generated. A code may also identify a class or group of objectsor other elements of the invention (e.g., object having similarattributes, objects of a particular brand, objects associated with aparticular owner). A code may be communicated from one element toanother element of an embodiment of the invention (e.g., from an objector object associated tag, to a device) in any of a variety of ways,including but not limited to wireless transmission, use of passive oractive RFID tags and reader means, near-field communication (NFC) means,optical codes (e.g., bar code, quick-response code) and reader means,optical recognition means, auditory (sound) recognition means, chemicalscent recognition means, and more. In certain embodiments, a code mayalso simply be displayed on one element of the invention (e.g., anobject) and manually entered by a user at another element of theinvention (e.g., a device). Codes, in addition to being generatedidentifiers (e.g., a randomly generated or unique alphanumericidentifier), may also be natural attributes of an object (whether or notunique to a specific object or class of objects) that may be determinedby a device or other sensor of the invention, for example. Suchidentifying attributes may be visual, audible, olfactory or mechanical(e.g., relating to operation or movement) in nature, as examples. A codeassociated with an object may also be generated, or an objectidentified, in whole or in part, based on the location of the object (ortag associated with the object). As may be seen by these examples,embodiments of the invention may use codes that are created and used ina variety of ways, and these are anticipated by the invention.

Another possible variation relates to the generation of a code or otherinvolvement of a user. For example, a user may be (by means of theuser's device) prompted to originate and enter a code, which may then becommunicated through elements of a system of the invention, or a usermay be prompted to verify or confirm a code that is presented to theuser. Other means and methods for user involvement in controlauthentication are possible and anticipated by embodiments of theinvention.

It is also possible and anticipated that a code may be transformed as itis handled by an element of the invention, such as a device or object ofa system or method of the invention, and such code transformation (whichmay be known to the remote server or other component of the inventionthat is matching the originally generated code and the code that isultimately received back at the component that originated it, forexample) may still be used for matching purposes in order to determineif a device and an object of the invention should be paired, forexample. A simple example of this relating to the embodiment 600 shownin FIG. 6a is that a code of “1234” may be generated in step 606.Following receipt of the original code at the first object 610, the codeis transformed by adding 1 to it, to thereby create a code of “1235.”The same transformation occurs at the first device 616, and the codethen becomes “1236.” This code is communicated back to the remote server604 for matching up with the original code generated in step 606. Since(in this example), the remote server ‘knows’ that the original code willbe transformed (by adding 2 to the original number), a match can bedetermined if the code received at the remote server in step 622 is“1236” while the original code is “1234.” If a number other than “1236”is received at the remote server for matching purposes, then (in thisexample) a match is not made and pairing (control authentication) is notenabled, thereby preventing the first device 616 from being paired withthe remotely controllable first object 610. The remote server may haveprior knowledge of a transformation, or may be notified that atransformation will take (or has taken) place by means of acommunication for an element of the invention, such as the elements thatis making the transformation. The concept of transformation of a code(between its point of origination and point of comparison) may beapplied to any of the representative embodiments of controlauthentication described, as well as to other embodiments and variationsof the presently described embodiments. As may be imagined, much morecomplex code transformation protocols (and schemes) may also be used,including the use of fixed or dynamic algorithms to transform codes atone or more element(s) of the present invention, including but notlimited to transformations that may take place at a remote server,object and/or device of the invention. User interaction (or informationrelating to a user) may also be used to transform or confirm a code. Inaddition, a match may be determined by an algorithm, and does notnecessarily need to be an exact match, e.g., a match may occur when areceived code belongs to a set of expected or acceptable results. Any ofa variety of code generation, security, communication and tracking meansmay be used with any of the embodiments of the invention, whetherdisclosed or anticipated, including but not limited to encryption andthe use of blockchain or similar records.

The sequence of steps in embodiments of control authentication may alsovary. For example, while some steps need to occur in a particularsequence (e.g., the receipt of a code before the transmission of thereceived code), other steps may be sequenced in an order different fromone described in the embodiments above. Steps may also be repeated. Forexample, multiple codes may be communicated from the same or differentelements of an embodiment of control authentication, at the same or atdifferent times. This may be useful for periodic pairing verification,for example. Different codes may also be communicated through elementsof the invention via different pathways, for example. This may enableembodiments of the invention to provide added layers of controlauthentication and security by enabling the pairing process to takeplace at different elements at different times, for example.

As noted, communication of information within and between elements ofthe invention may be achieved using any of a variety of means.Embodiments of the present invention may use wireless communicationmeans, such as radiofrequency transmission and reception. Otherelectromagnetic and non-electromagnetic (e.g., mechanical) means oftransmission are also possible for communication of signals or codes.Information may be communicated using any of a variety of standards andprotocols. Certain embodiments of the present invention may useencryption to secure the transfer of information. Other embodiments myutilize blockchain or similar records and associated methods.

An example use case that combines proximity-enabled remote control andcontrol authentication may be represented by a user of a mobilecommunication device who enters an office environment. The userapproximates her device to a tag located on a wall of a conference room,thereby establishing proximity (as determined by the invention, asdescribed) and enabling the user to control one or more objects in theconference room by means of a remote control user interface enabled onher device. In this example, control authentication may be achieved bycommunicating a code, generated by one element of the system, throughother elements of the system, and ultimately back to the originalelement of the system that generated the code, to ensure that theinitially generated code and ultimately received code are a match, orare otherwise consistent with expectations or a group of possibleresponses (the code being received at the end of the processrepresenting a response, for example). In this particular example, theuser may approximate her mobile device to a RFID tag located on a wallnear the entrance to the conference room (or near the entrance oranywhere in the room). Based on such approximation, the invention mayenable access to a remote control user interface on the user's device.This enablement may be in the form of presenting (or making apresentation possible) of a remote control user interface specific tothe one or more controllable object(s) in the conference room, or may beby means of simply connecting the device and the object in a way thatpermits the user to control the object by means of her device. In eitherinstance, remote control authentication may be a part of the process.For example, following a determination of proximity, a code may begenerated by a remote server (called the “generated code”), then thecode can be communicated to the RFID tag (such as an intelligent‘active’ tag, for example), and then the RFID tag may then communicatethe code to the user's mobile device, and then the user's mobile devicemay finally communicate the code back to the remote server (the“ultimately received code”). If the remote server determines that thegenerated code and the ultimately received code are a match (or thatthey meet criteria or expectations of an algorithm, for example), thenthe user is granted control of the object(s) in the conference room bymeans of the user's mobile communication device and associated remotecontrol user interface. Although this example follows the representativemethod shown in FIG. 6a , it is easy to envision another embodiment of amethod of the invention to be implemented in order to provide controlauthentication in this example, as well as in other similar examples.Control authentication may be applied in order to either enable (e.g.,initiate) control between a device and an object (or multiple objectsassociated with a single tag or single determination of proximity), ormay otherwise be applied to periodically confirm that a device's controlof one or more objects should be continued. The latter may be achievedthrough single or periodic control authentication checks (applicationsof a control authentication method) following an initial connection thatenables a user to control an object by means of a device.

FIGS. 7a-7c show what various possible embodiments of a remote controluser interface of the invention may look like (as a visualpresentation). FIG. 7a shows a first possible embodiment of a remotecontrol user interface having three control modules, one relating toroom lights (enabling the lights to be turned on or off, or placed into“night mode”), a second relating to a television (enabling control ofthe television's channel and volume), and a third that relates tocontrol of a room temperature (enabling the room temperature to beincreased or decreased). While the embodiment of a remote control userinterface shown in FIG. 7a may be stand-alone, in the sense that itenables critical remotely controllable operations of various objects,such an embodiment may also be the first screen (presentation) that canlead a user to finer controls. FIG. 7b shows a more detailed remotecontrol user interface for a television, for example. In thisembodiment, a user is offered several controls above and beyond channelselection and volume control, such as the ability to horizontally scrollthrough channels (with images) as shown at the top of the display, theability to control channel and volume, the ability to turn on (or turnoff) a sleep timer, the ability to access a ‘last’ channel, the abilityto access closed captioning, the ability to manage other device inputs,and the ability to access a keypad (perhaps for scrolling around ascreen or additional control). While FIG. 7b shows a particularselection of remote control user interface elements, many otherelements, presentations of elements, combinations of elements,arrangements of elements, and more, are possible and anticipated by theinvention. For example, FIG. 7c shows yet another possible embodiment ofa remote control user interface design for possible use by a user toenable instant selection of a particular channel or content item to bedisplayed on a remotely controllable television or display. As shown inFIG. 7c , various images (such as logos) and information may be shown.As a further example (not shown) even actual real-time video (with orwithout audio) of a particular broadcast channel (or other type ofcontent) may be displayed, e.g., the CNN portion (which may be aselectable element of the remote control user interface) of the displaymay actually show real-time video that is the same (or possibly delayedor otherwise altered) content as is being broadcast on CNN live. Thisgives a user the ability to select actual stories or content inreal-time, for example. Any of the remote control user interfaces may bepresented to a user in any of a variety of ways, including as apresentation by a device operating system, as a standalone applicationor ‘app’ or other software running on a device, as an element of another(not exclusively remote control) application or ‘app’ (e.g., within abranded hotel app, for example), or even within a chat or social medialapplication. Presentation or availability of a remote control userinterface or remote control user interface elements may be triggered byor based on a determination of proximity between a device and an object(or set of objects, or a tag associated with one or more object), forexample. The remote control user interface examples shown in FIGS. 7a-7care representative only; many other presentations and designs of remotecontrol user interfaces and remote control user interface elements arepossible and anticipated by the invention. For example, remote controluser interface elements may control one or multiple features of one ormore objects. Another example is the control of a ‘user experience’ thatis performed by the coordinated control of one or more aspects of one ormore objects.

FIG. 8 represents how proximity-enabled remote control systems andmethods may be useful in a particular environment, such as a hotel orresort where many different users arrive and depart (using the samerooms, for example) at different times—and require access to remotecontrol user interfaces for the same objects (or sets of objects, suchas the objects in a particular room in a hotel or resort) at certaintimes (such as when staying at the hotel or resort) but not at othertimes (such as when not staying at the hotel or resort). As FIG. 8shows, a user may step into a hotel room, for example, and then based onproximity/location (location being one possible proxy for proximitybetween a mobile device and a fixed-location object or set of objects,for example) lead to instant control of “everything” (in this drawingthe word “everything” references a set of items that make up ‘everythingremotely controllable’ in a hotel room, for example). As may be readilyimagined, many other embodiments of remote control user interfaces arepossible and anticipated by the present invention. While such remotecontrol user interfaces may be visual in nature (e.g., presented on anelectronic display), they may also be auditory (e.g., sound-based, suchas spoken interaction), movement-based (e.g., a vibration indicating aprompt followed by a movement of a device to indicate a selection orother input of a command to be implemented at an object), or enableremote control of a remotely controllable object by other possiblemeans.

Systems and methods of the present invention may benefit from brandedtags, e.g., a RFID or other type of physical tag (with which a devicemay be approximated) that enables a remote control user interfaced for aremotely controllable service (or even multiple services) that areassociated with the brand appearing on the branded tag. For example, aNetflix branded tag (such as a physical structure housing a RFID tag andhaving the brand's color(s) and logos or other brand-identifyingcharacteristics appear on a surface of the physical housing of the tag,for example) would be located on a wall in a hotel room. When a userapproximates his or her mobile device near the branded tag, a remotecontrol user interface for a service of the brand is enabled on theuser's mobile device. Continuing with the Netflix brand example above, auser whose device comes into proximity with a Netflix branded tag wouldreceive access to a Netflix controller, meaning a remote control userinterface associated with (and enabling control of) a Netflix service,such as the ability for the user to be able to select and watch a movieor other content on the service by means of using the remote controluser interface. The user may, in one possible embodiment, watch thecontent on a separate device, such as a hotel room's television display.Alternatively, in another possible embodiment, a user may watch thecontent on the same device as the remote control, e.g., the user'smobile device. Such proximity-based access to (and control of) a servicesuch as Netflix provides many possible benefits to the brand and alsothe user, including but not limited to convenient access to a brandedservice, as well as possible goodwill or promotional attributes. Forexample, access to Netflix service by means of a branded tag andproximity-enablement in a hotel room setting may encourage users tosubscribe to the Netflix service, or purchase additional services,including but not limited to movies and other content. As may beimagined, branded tags with proximity enablement of branded services(meaning services of the brand represented on the tag, for example) maybenefit many types of brands where proximity enablement is valuable.This may include, without any limitations, brands that deliverelectronic content or services (via mobile devices or otherwise), brandsthat deliver physical products to locations that are determinable byproximity enablement (e.g., room service or the delivery of a product byAmazon to a user who shares his or her current location viaapproximation of the user's device and a tag of the invention, forexample) such as by means of approximation of a device and a RFID tag(or by other means, such as GPS location-based enablement of a remotecontrol user interface implemented on a mobile device and used forcommanding the delivery of physical products), and more.

Systems and methods of the invention may also handle consolidatedcommands. A consolidated command is an input, instruction or command bya user (e.g., by means of input to a remote control user interfaceimplemented on a mobile device) that results in the implementation ofthe command (or performance of activities related to the command) at oneor more objects, either simultaneously or sequentially. An example of aconsolidated command is a user input to a remote control indicating theuser's desire for a residential room to be reconfigured to watch amovie. In this example, following such a consolidated command, which maybe communicated from the device via a remote server to the multipletarget objects, the room may be reconfigured by having the lights dim toa preselected level for movie viewing, turning on the television,commanding the television controller to set itself up to play theselected movie (or displaying a screen with the possible movieselections, for example), turning on the popcorn maker, having thefamily robot deliver the popcorn to the popcorn maker, adjusting thethermostat, closing the blinds, and more. These activities or events maybe initiated simultaneously or following some predetermined sequence.The triggering or sequencing of such activities and events may bedetermined by user-defined setting (predefined or otherwise determined,such as according to user preferences, for example), or by means of analgorithm that may exist centrally (e.g., programmed at the remoteserver) or operating on software running at any of the elements of asystem of the invention, e.g., device, object, remote server.Consolidated commands may represent experiences (e.g., “movie time”), aswell as more traditional actions (e.g., turn the television on).Consolidates commands may take a range of forms and may be implementedin a variety of ways. Such variations are possible and anticipated bythe invention.

Another example of a consolidated command is represented by an examplewhereby a user of a mobile device receives a menu of options (e.g., menuof food items, list of products) based (at least in part) on thegeographic location of the user (e.g., user's location at a specificgeographic location, a specific hotel room, a specific office). Forexample, the menu of options may be a subset of all possible options(e.g., food items or physical products, or services) available to allusers of such a system or method of the invention. For example, if themenu of options is a menu of food items, then only certain items (asubset of all of the items) may be available to the user based on theuser's location, or possibly other factors (e.g., time of day, deliverylimitations). For example, only certain items may be available in a foodpreparation center or warehouse that is tasked with (or even justcapable of) delivering an item to a user. The user is able to review themenu of available options and make a selection, such as by seeing themenu of options on a mobile device display and providing an input toindicate a selection of one (or more) of the items or products listed inthe menu of options. Following such input, the user's selection iscommunicated via a remote server, to one or more objects in order toimplement the user's input and deliver the user's selected item(s) tothe user at the user's specific location, as determined by location ofthe user's mobile device, for example (notably, in some embodiments, auser's initial location may be different from a user's later location,to where the item will be delivered). This is another example ofconsolidated control, whereby a user indicates a simple desire (e.g.,the desire to have a selected item delivered to the user at the user'slocation) and multiple objects are put into action—possibly by means ofalgorithms running on a remote server—to physically prepare, move,transport, distribute or otherwise deliver the item to the user. Inembodiments of the invention, the user may even be in a moving location,such as a self-driving car, and the item is delivered to the user at theuser's present (updated) location. In such embodiments of the invention,a user is presented with a remote control based on the user's proximityto a tag, object or location, and the user's remote control thendisplays a menu of options (also based on the user's proximity), toenable the user to make a selection from the menu of options, whichinitiates a series of actions or events that cause the user's selecteditem (or items) to be delivered to the user. Such delivery may, inembodiments of the present invention, be physical items such as food,beverages, consumer products, or other tangible items. In otherembodiments, such items may be intangible in nature. Delivery may befacilitated by a human, or be performed by a robot or autonomoustransportation or delivery system (e.g., a robot, self-drivingautomobile, drone). In some embodiments, delivery may be made to theuser at the user's original location. In other embodiments, delivery maybe made to another user location, possibly even a moving location, whichwould be projected or determined by algorithms associated with a remoteserver or other element of the invention. Many variations of suchproximity-based consolidated control embodiments are possible andanticipated by the invention.

It is to be understood that although the invention has been describedabove in terms of particular embodiments, the foregoing embodiments areprovided as illustrative only, and do not limit or define the scope ofthe invention. For example, while NFC is used to describe embodimentsthroughout this disclosure, other types and forms of proximity-basedidentification means are within the scope of the present invention, suchas those involving the presentation and reading of bar codes. Variousother embodiments, including but not limited to the following, are alsowithin the scope of the claims. For example, elements and componentsdescribed herein may be further divided into additional components orjoined together to form fewer components for performing the samefunctions. The techniques described above may be implemented, forexample, in hardware, software, firmware, or any combination thereof.The techniques described above may be implemented in one or morecomputer programs executing on a programmable computer including aprocessor, a storage medium readable by the processor (including, forexample, volatile and non-volatile memory and/or storage elements), atleast one input device, and at least one output device. Program code maybe applied to input entered using the input device to perform thefunctions described and to generate output. The output may be providedto one or more output devices. Each computer program within the scope ofthe claims below may be implemented in any programming language, such asassembly language, machine language, a high-level procedural programminglanguage, or an object-oriented programming language. The programminglanguage may, for example, be a compiled or interpreted programminglanguage. Each such computer program may be implemented in a computerprogram product tangibly embodied in a machine-readable storage devicefor execution by a computer processor. Method steps of the invention maybe performed by a computer processor executing a program tangiblyembodied on a computer-readable medium to perform functions of theinvention by operating on input and generating output. Suitableprocessors include, by way of example, both general and special purposemicroprocessors. Generally, the processor receives instructions and datafrom a read-only memory and/or a random access memory. Storage devicessuitable for tangibly embodying computer program instructions include,for example, all forms of non-volatile memory, such as semiconductormemory devices, including EPROM, EEPROM, and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD-ROMs. Any of the foregoing may besupplemented by, or incorporated in, specially-designed ASICs(application-specific integrated circuits) or FPGAs (Field-ProgrammableGate Arrays). A computer can generally also receive programs and datafrom a storage medium such as an internal disk (not shown) or aremovable disk. These elements will also be found in a conventionaldesktop or workstation computer as well as other computers suitable forexecuting computer programs implementing the methods described herein,which may be used in conjunction with any digital print engine ormarking engine, display monitor, or other raster output device capableof producing color or gray scale pixels on paper, film, display screen,interactive display, or other output medium.

1. A method performed by a first mobile device, the method comprising:(1) receiving a first communication that identifies a first object; (2)based on the first communication that identifies the first object,presenting a first remote control user interface capable of controllingthe first object; (3) at the first mobile device, receiving a firstinput from a user via the first remote control user interface, the firstinput indicating a first action to be performed at the first object; (4)in response to receiving the first input, wirelessly transmitting afirst communication relating to the first action; (5) at the firstmobile device, receiving a second input from the user via the firstremote control user interface, the second input indicating a secondaction to be performed at the first object; (6) in response to receivingthe second input, wirelessly transmitting a second communicationrelating to the second action; (7) wirelessly receiving a thirdcommunication comprising first information relating to first feedbackrelating to the first action; and (8) presenting second informationrelating to the first action at the first remote control user interface.