System and Method for Providing Information Access on a Portable Device

ABSTRACT

A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation.

This non-provisional application claims the benefit of U.S. ProvisionalApplication No. 60/792,918 filed Apr. 18, 2005.

This patent document relates generally to portable devices, and inparticular to a system and method of providing information access onsuch devices.

BACKGROUND

The world presents many hazardous situations to its human inhabitants.Some of these are natural disasters, for example tsunamis, hurricanes,tornadoes, floods and landslides. Others are of man-made origin, forexample transportation accidents, acts of wax and terrorism. One commondenominator in all of these events is a need to help victims in astimely and effective fashion possible under the circumstances. Whenimpersonal events happen and individuals are injured, the event becomesvery personal with access to personal medical information and emergencycontacts becomes of paramount importance. In Case of Emergency (ICE)information is crucial to the treatment of disaster and accidentvictims. Obtaining this information is particularly difficult when thedisasters are also responsible for damaging local infrastructure, suchas communications systems. Ironically systems most needed during,widespread disasters may also be compromised by those same disasters.

Consequently, there is a need to provide ICE information for individualsthat is not dependent upon real-time access to communicationsinfrastructure.

BRIEF DESCRIPTION OF THE DRAWINGS

An embodiment of the patent disclosure will now be described by way ofexample only with reference to the following drawings in which:

FIG. 1 illustrates an example of a generic portable electronic device;

FIG. 2 illustrates in a block diagram an example of an informationaccess system for storing and providing information, in accordance withan embodiment of the present patent disclosure;

FIG. 3 illustrates in an information flow diagram an example of loadingICE information, in accordance with an embodiment of the informationaccess system;

FIGS. 4 a and 4 b illustrate various display screens, in accordance withan embodiment of the information access system;

FIG. 5 illustrates an ICE data storage chart for various portabledevices, in accordance with an embodiment of the information accesssystem;

FIG. 6 illustrates in a network diagram a wireless network environmentin which exemplary wireless devices can be operated, in accordance withan embodiment of the information access system;

FIG. 7 illustrates an example of mobile communications device forproviding ICE information, in accordance with an embodiment of theinformation access system;

FIG. 8 illustrates another example of a mobile communications device forproviding ICE information, in accordance with an embodiment of theinformation access system;

FIG. 9 illustrates a more detailed example of the mobile communicationsdevice for providing ICE, in accordance with an embodiment of theinformation access system;

FIG. 10 illustrates in a flowchart an example of obtaining informationfrom a locked mobile device, in accordance with an embodiment of theinformation access system;

FIG. 11 illustrates in a flowchart an example of a method of unlocking awireless device for providing ICE, in accordance with an embodiment ofthe information access system;

FIG. 12 illustrates in a graph diagram a typical Mealy graph 200 of auser equipment access procedure;

FIG. 13 illustrates in a graph diagram an amendment that can be added tothe Mealy graph of FIG. 12, in accordance with an embodiment of theinformation access system; and

FIG. 14 illustrates in a flowchart an example of a method ofsynchronizing a handset and SIM, in accordance with an embodiment of theinformation access system.

DETAILED DESCRIPTION

The patent disclosure describes a solution to one or more of theproblems described above. Accordingly, the present disclosure teaches asystem and method of providing information access on portable devices.

One thing a great many individuals have, in common is carrying portableelectronic devices. For example, there are personal music players, suchas Motion Picture Experts Group, Audio Layer 3 (MP3) players, personaldata assistants (PDAs), and various wireless devices such as cell phonesand electronic mail (email) devices. On any given day, an individual mayearly several of these devices.

Increasingly manufacturers of portable electronic devices are combiningfunctions of several different devices into a single device. Most recentexamples of this are cell phones that include digital camera or MP3player functions. This trend is expected to continue, with furtherintegration anticipated with each new generation of devices. This trendenhances the likelihood that individuals carry such a device. Thisintegration of features is possible because the current generation ofdevices have a large number of common components. Such common componentsinclude a display screen, an input/output port, a central processor(CPU), a memory, a power module and a tactile man-machine interface.

In accordance with an embodiment of the patent disclosure, there isprovided an information access system for providing information. Theinformation access system comprises an information repository forstoring information and an access module for providing access to theinformation.

In accordance with an embodiment of the patent disclosure, there isprovided a portable device comprising a display for displaying in caseof emergency information, a man-machine interface for receiving requestsfor the in case of emergency information, a processor coupled to thedisplay and to the man-machine interface and including the access modulefor accessing in case of emergency information in dependence upon apredetermined operation, and a memory including in case of emergencyinformation.

In accordance with another embodiment of the patent disclosure, there isprovided a method of providing information access on a portable devicecomprising the steps of storing information in a memory and providingaccess to the information in dependence upon at least one predeterminedkeystroke.

A system and method of the patent disclosure is now described withreference to various examples of how the embodiments can best be madeand used. For convenience, like reference numerals are used throughoutthe description and several views of the drawings to indicate like orcorresponding parts, wherein the various elements are not necessarilydrawn to scale.

Referring to FIG. 1 there is illustrated in a component diagram anexample a generic portable electronic device 10, in which an embodimentof the present patent disclosure may be implemented. The genericportable device 10 includes a display screen 12, an input/output port14, a processor 16, a memory 18, a power module 20 and a tactileman-machine interface 22. These components are common to portableelectronic devices individuals carry with them on a daily basis.Advantageously, the ubiquitous nature of such devices is used by thepresent system and method to store ICE information on such devices.Examples of portable devices suitable for storing ICE information arecell phones, wireless data/email devices, PDAs and MP3 players.

Referring to FIG. 2 there is illustrated in a block diagram an exampleof an information access system 25 for storing and providinginformation, in accordance with an embodiment of the present patentdisclosure. The information access system 25 comprises an informationrepository 26 for storing information, and an access module 28 forproviding access to the information. Other components may be added tothe information access system 25. The components of the informationaccess system 25 may be implemented in components of a portable device10. Information stored in a device may be locked. Such locking ofinformation may include user access to specific information beingsecured and/or the entire device being secured to all users.Advantageously, a predetermined key stroke may be used to unlock theinformation. I.e., a locked device may be unlocked to provided theinformation, or access to information that is secured in an unlockeddevice may be provided. Examples of locking conditions are furtherdescribed below.

Preferably, the information access system 25 is used to store andprovide access to in case of emergency (ICE) information. The remainderof this disclosure will discuss the invention with respect to ICEinformation. However, other information may be used in place of ICEinformation.

The repository 26 can be implemented in memory 18 for ICE informationstorage on the device 10. Examples of memory in various portable devicesinclude subscriber information module (SIM) cards for wireless terminalswith a removable SIM, and mobile equipment (ME) for wireless terminalswithout a removable SIM or equivalent. The term subscriber informationmodule in this disclosure encompasses SIM, Universal SIM (USIM),Internet Protocol Multimedia Services Identity Module (ISIM), RemovableUser Identity Module (RUIM) and other removable subscriber informationmodules. ICE information may also be stored in the ME even when thedevice uses a SIM card. Such storage in the ME enables the user tochange the SIM (for example, when roaming) without loss of ICEinformation and without the need to immediately download the informationto the SIM card. Such storage in the ME also enables the user to haveICE information available if the operator providing the new SIM has notimplemented ICE.

Referring to FIG. 3 there is illustrated in an information flow diagraman example of loading ICE information (30), in accordance with anembodiment of the ICE system. In the method 30 of FIG. 3 variousportable devices are considered for loading ICE information. A user 32may use any one of a number of different approaches depending upon thetype of device and the resources available to the user. In a directapproach, the user 32 takes the device to a retail device store 34 whereany device (for example, a data device 36, a cell phone 38, a PDA device40 or an MP3 device 42) can be directly loaded with ICE information bycable, infrared or Bluetooth™ connection to a computer in the retaildevice store 34. Similarly the user 32 can add, delete, change or updateICE information on their portable electronics devices 36, 38, 40 or 42.

If the user 32 has a personal computer 44, a connect to the devices viacable, infrared or Bluetooth can be used to load, add, delete, change orupdate ICE information on their portable electronics devices 36, 38, 40or 42. A program downloaded from the manufacturer or from the wirelessoperator to the user's personal computer (PC) enables the user to enterthe data and view it, likely in its entirety, on the PC screen. Changescan be made to the data and the ICE information can then be directlydownloaded over a cable or Bluetooth from the PC to the device.

In addition to a direct link, a computer 44 can use a web browser 45 toaccess device manufacturer systems 46, 48, 50 or 52 to load, add,delete, change or update ICE information and have that informationstored centrally on a database(s) 54 and on their portable electronicsdevices 36, 38, 40 or 42. For portable devices with or without a QWERTYkeyboard, the use of a computer terminal linked to the operator ormanufacturer's computer system provides a very user-friendly way ofeasily entering the information, and of having the data stored forrestoration of ICE information when required. The operator ormanufacturer may provide means of adapting the information to otherdevices with different display characteristics or of assisting the userin adapting the information to other formats.

For portable devices having wireless communication capability, the webbrowser 45 can be used to access a wireless operator computer to loadadd, delete, change or update ICE information for the portableelectronics devices 36, 38 or 40. Such changes can be stored in adatabase 58, and then transferred via a wireless network 60 to theportable electronics devices 36, 38 or 40.

Finally, portable devices 36, 38, 40 or 42 having user input interfacessuch as keypads, keyboards, touch pads and stylus devices can have ICEinformation directly input 62. Examples of different terminal keyboard(man-machine interface 22 of FIG. 1) entry include TAP or iTAP method ona cell phone or similar keypad, SureType™ on some BlackBerry™ models,and typing on a QWERTY keyboard.

Synchronizing the ICE information with a central database could then beaccomplished using the input/output port that allows them to be linkedto a personal computer or wireless interfaces such as Bluetooth thatprovide a local communications link to the portable device and softwareresident on the computer 44. Alternatively, for wireless devices,synchronization can be completed via the wireless network 60.

In some cases, for example devices used by children, the individualresponsible for the loading of the ICE information could be a parent orguardian rather than the actual device user (child). This could belinked to credit card billing information, for example with musicdownloading on MP3 players.

An example of an implementation is a program in the user's PC 44 with alocal connection for independent input of the ICE data, together withaccess to the operator's or manufacturer's database (54 or 58). Thisarchiving of the data allows it to be restored quickly when areplacement or additional device is used or is desired.

FIGS. 4 a and 4 h illustrate various display screens 70, 80 inaccordance with an embodiment of the information access system 25.Referring to FIG. 4 a various forms of idle screens 71, 72, 73, 74, 75and 76 are illustrated for various portable devices. Preferably, the ICEidle screens are tailored to the size of the display and the devicecapability. A small display may only allow the display of theinstructions to view the ICE information, as in 71. A display that isslightly wider 72 and/or larger 73 may allow the primary ICE contact tobe displayed. An even larger display 74 or 75 allows for ICE informationto be displayed together with instructions on viewing the ICEinformation. As the screen becomes larger, the amount of displayedinformation, if desired, may be increased. Alternately, should thedevice user prefer, the ICE idle screen may be set to only displayinstructions on how to access the ICE information as in 71 or 76. Inidle screen 76 the screen cycles through ICE entry 1 through ICE entryN, where N is an integer greater than 1, and allows an ICE entry withfull details.

Should the emergency medical team or first responders need additionalICE information (in the case where the first ICE contact is displayed onthe ICE Idle screen), they could then follow the instructions and accessthe ICE information. Referring to FIG. 4 b various forms of ICE displayscreens 81 a and 81 b, and 82 a and 82 b are illustrated for variousportable devices. In display screen 81 a and 81 b, the screen cyclesthrough ICE entry 1 through ICE entry N. The ICE 1 screen of 81 a and 81b may cycle through alternate telephones of the person displayed, forexample showing the cellular number of the wife Abigail 81 a, thenshowing her work phone number, and then going to the second ICE contact81 b, ICE 2, and similarly cycling through that contact's phone numbers.

A more complex situation is illustrated in 82 a and 82 b, where thescreen first lists ICE entry selections as shown in 82 a and allows theselection of an ICE entry with full details as shown in 82 b. Forexample, a device owner is on an Alaskan tour. He prefers that his wifebe contacted first, the tour guide next, and a friend on the tour third.The device owner may have chosen the ICE idle display of 76, or couldhave simply chosen the screen of 82 a as the ICE idle screen. In eitherevent, when the medical or emergency responders reach the screen shownin 82 b after they have tried his wife, they may be able to concludebased on the location of the emergency (for example, if it occurs in theLos Angeles airport) that he has either completed or not yet started histour, and look for additional ICE contacts near Los Angeles. They couldalso see if he has his own contact information stored in ICE and takethat into account in their next steps. If, alternately, the emergencyoccurred in Alaska, they could try and contact the tour guide if theywere unable to contact his wife. All of these options that are providedby way of example, illustrate the versatility of the information accesssystem 25.

Referring to FIG. 5 there is illustrated an ICE data storage chart 90for various portable devices, in accordance with an embodiment of theinformation access system 25. Storage of ICE information is dependentupon the type of portable device. Examples are shown for wireless andnon-wireless devices. The ICE database may be operated by one or more ofa cellular or wireless system operator, a PDA or MP3 manufacturer, theBlackBerry infrastructure, and/or an individual user on user's computer(for backup).

A prime source of ICE data fir emergency responders is the user'sportable electronic device. FIG. 5 demonstrates that ICE data may bereadily stored in a database, providing both backup (for example, rapidloading of ICE information into a replacement device when the originaldevice fails or is lost) and an alternate source of the data foremergency responders. Devices with keyboard and communicationscapabilities are also capable of updating the ICE data in thesedatabases.

For a cell phone user, that user's ICE data is associated with(retrievable through) their cellular subscription. Preferably, thesubscription information is located in the home location register (HLR)or mobile switching center (MSC). The user of a Wi-Fi™ phone that isregistered with a Wi-Fi provider may similarly have their ICE datastored by the service provider and accessible through that registration.

Portable devices that do not have a cellular or similar subscription,such as a PDA or MP3 player or other portable device, may be in thedevice manufacturer's registry of users. Thus the device manufacture'sregistry could permit ICE data to be similarly stored in themanufacturer database which would enable the same backup and access foruse in replacement devices, etc., as described above for cellulardevices.

In a similar manner, BlackBerry devices are identified by a personalidentification number (PIN) (and in most cases, also by an InternationalMobile Equipment Identity (IMEI) or Electronic Serial Number (ESN)). Theuse of the PIN enables the BlackBerry infrastructure to associate auser's ICE data with the PIN of the user's BlackBerry. Note also thatfor BlackBerry users, their ICE data may be stored both by the wirelessoperator and by the BlackBerry service, or by one of them through acoordinated service arrangement.

Referring to FIG. 6 there is illustrated in a network diagram a wirelessnetwork environment in which exemplary wireless devices can be operated,in accordance with an embodiment of the information access system 25. InFIG. 6, the exemplary wireless communication system 100 includes aplurality of host services (three shown, 102, 104, and 106), each ofwhich may have a plurality of services such as, but not limited to,email, calendar, Internet web browser, and other applications, availableto their subscribers. In this particular example, the host services 102,104, and 106 are typically configured as servers, each containing atleast one processor and a storage means, and each using a networkinterface over which communication with a communication network 108 suchas the Internet can be effectuated. The host services 102, 104 and 106send and receive messages over communications network 108 to and fromwireless router system 110 allowing communication between the hostservices 102, 104, and 106 and the wireless router system 110.

The wireless router system 110 is connected to a plurality of wirelessnetworks (three shown, 114, 116, and 118), each of which may support aplurality of mobile devices (one in each wireless network is shown, 120,122, and 124). The wireless networks 114, 116, and 118 may be a cellulartelephone network, such as a global system for mobile communication(GSM) network, or a code division multiple access (CDMA) network, atwo-way paging network, a short range wireless network such as Bluetoothand IEEE 802.11 compliant network, and others. The mobile devices 120,122, and 124 are devices compatible with the corresponding wirelessnetwork.

Mobile communications devices 120, 122 and 124 are two-way communicationdevices with advanced data communication capabilities having thecapability to communicate with other mobile devices or computer systems,such as host services 102, 104, 106, through a network of transceiverstations, including wireless router 111 and communication network 108.The mobile communication devices 120, 122 and 124 may also have thecapability to allow voice communication. Depending on the functionalityprovided, it may be referred to as a data messaging device, a two-waypager, a cellular telephone with data messaging capabilities, a wirelessInternet appliance, or a data communication device (with or withouttelephony capabilities). The preceding list is not meant to beexhaustive the embodiments described herein can be practised with anytype of mobile device, whether listed above or not.

One of the primary purposes of host services 102, 104 and 106 is toprocess information received from other sources, such as mail servers(not shown) and mobile communications devices 120, 122, 124, and sendthe information on to the appropriate recipient, typically a differenthost service 102, 104, 106, mail server or mobile communications device120, 122 or 124. Host services 102, 104 and 106 are configured to sendand receive email, messages and as such typically communicate with amail server. Mail servers could include for example a Microsoft™Exchange™ server, a Lotus™ Domino™ server, a Novell™ GroupWise™ server,an Internet Message Access Protocol (IMAP) Server, a Post OfficeProtocol (POP) Server or a webmail server or any other mail server aswould be understood by those in the art. The host services 102, 104 and106 also contain a software module, which executes in their processor toachieve the desired sending and receiving of messages as well as theappropriate processing of information. In one embodiment, the softwaremodule of each host service 102, 104, 106 is a messaging module, themessaging module is adapted to receive messages from at least oneexternal mail server, send messages to mobile communications devices,120, 122, 124, receive messages from the same mobile communicationsdevices and send messages to the at least one external mail server(s).The at least one external mail server(s) could also be at least onemobile data server(s) for example. The wireless router system 110 mayalso be directly connected to a host service, such as a local service112, without the communication network 108. In another embodiment, it ispossible for host services 102, 104 and 106 to communicate directly withmobile communications devices 120, 122 and 124. In this embodiment, hostservices 102, 104 and 106 are capable of addressing communications tomobile communications devices 120, 122 and 124 without the aid of thewireless router system 110.

Referring to FIG. 7 there is illustrated an example of mobilecommunications device 126 for providing ICE information, in accordancewith an embodiment of the information access system 25. The mobilecommunications device 126 may be a cell phone and includes a displayscreen 128 and a keyboard 130. The keyboard 130 includes a key 132bearing an ICE indicia. In the present example the ICE indicia is shownas a asterisk having squared points, representative of the “Star ofLife” certification mark of the National Highway Traffic SafetyAdministration (NHTSA) of the United States of America. This symbol hasbeen adopted by emergency medical services organizations around theworld, with the star portion being added to other design components invarious countries.

In operation, in the event of an emergency, with the owner of the mobilecommunications device 126 in an unconscious or semi-conscious state, themobile communications device 126 may be in a locked condition, therebypreventing third parties from accessing phone lists of friends orrelatives. When the key 132 hearing a stylized indicia is depressed, ICEinformation 134 is displayed. The locked display 128 could indicateexistence of ‘ICE’ info by displaying ‘ICE’ 134 and any symbol chosen torepresent the availability of ICE information.

Referring to FIG. 8 there is illustrated another example of a mobilecommunications device 140 for providing ICE information, in accordancewith an embodiment of the information access system 25. The mobilecommunications device 140 may be an electronic mail device and includesa display screen 142 and a keyboard 144, both of which are larger thanthe mobile communications device 126 of FIG. 7. The keyboard 144includes a key 146 hearing a stylized indicia. Such devices with largerdisplays could provide further information, including directions todisplay the ‘ICE’ information.

Referring to FIG. 9 there is illustrated a more detailed example of themobile communications device 140 for providing ICE, in accordance withan embodiment of the information access system 25. The mobilecommunications device 140 includes a display screen 142 for displayingICE information 148, a man-machine interface (MM I/F) 149, a processor150, a transceiver 151 and a SIM card 152. The SIM card 152 includes ICEdata 154. For devices without a SIM card 152, but having a memory 156,ICE data 158 is stored therein for access by the processor 150. The ICEinformation can be stored in different ways. For example, the ICEinformation may be stored as a separate list for ICE, or as a portion ofa standard phone list with an ICE field added.

Information in portable devices are often locked for security reasons.Preferably, once ICE information is loaded into a portable device, a)there is an indication that the device may be ICE-capable, b) there isease of access by first responders and emergency personnel, c) there isease of use (of ICE information), d) there is protection of non-ICE PAB(personal address book) and other information if the device was locked,e) there is separation of the device-locking and the ICE accessfunctions, so that access to ICE does not compromise the basic deviceand SIM of there is one security.

Man-machine user interface events may be designated to unlock ICEinformation. For example, pressing a “*” key (asterisk or ‘star oflife’) three or four times, or holding a “*” key (asterisk or ‘start oflife’) for two seconds. Preferably, one of these examples may be used asa standard for all portable devices.

Advantageously, the asterisk has some similar characteristics as the‘star of life’, and is common to many keyboards the asterisk is arequired key according to 3GPP specification. Pressing four times is apreferred implementation since pressing three times could be used forsupplementary service codes according to the 3GPP specifications. It ispreferred that there be no adverse effect on the device by use of theICE access method. To provide an increased ease of use, it is furthersuggested that, when the device is a cell phone and is in the lockedstate or idle state (and not accepting supplementary service codes),three “*” (asterisks) or ‘star of life’ presses also opens the device tothe ICE information: such shortened code does not interfere with thepotential use of three asterisks for supplementary service codes sincethese codes can only be entered when the cell phone is in an unlockedstate.

As some devices do not have a keypad, there may not be the “*” keyavailable. Examples of such devices include MP3 players and otherportable music devices, and cell phones for children that do not have acell phone keypad but use a specially-adapted user interface. Suchdevices typically have some form of man-machine interface (for examplean iPod™ has a thumb wheel and select button) that allows access tomenus. In those cases ICE information can be positioned as a menu item.

FIG. 10 shows in a flowchart an example of obtaining information from alocked mobile device (160), in accordance with an embodiment of theinformation access system 25. The method (160) begins with receiving adesignated man-machine event (162) (such as pressing the asterisk fourtimes). Next, information is displayed in response to the man-machineevent (164). The information is displayed despite the portable devicebeing locked. The method (160) is done. Other steps may be added to thismethod, including obtaining information from a local or remoterepository. The method (160) may be implemented in the processor of theportable device 16 or the man-machine interface module 22.Advantageously, this method may be used to obtain ICE information fromthe locked device. This method may be used to obtain other informationas well. Subsequent examples of embodiments of methods described belowrecite the term “ICE information”. Other information may be suitablyused in place of “ICE information”.

While most cellular wireless devices now use a SIM or equivalent, somedo not. An example of cell phone without a SIM or like module is a CDMAcell phone. (Note that some device models may have a RUIM). An exampleof a non-cellular wireless device that the user may carry with them is aWi-Fi phone.

The information access system 25 and method (160) may be implemented inportable devices, including wireless devices, that the user would oftencarry with them, whether or not a SIM or equivalent is used. Forexample, the information access system 25 and method (160) may beimplemented in cell phones, unlicensed Wi-Fi (wireless LAN) phones,satellite phones (Iridium and others), iPods, PDAs and other portableelectronic devices without wireless communications.

Referring to FIG. 11 there is illustrated in a flowchart an example of amethod of unlocking a wireless device for providing ICE, in accordancewith an embodiment of the information access system 25. A wirelessdevice is locked, as represented by block 170. Keystrokes are detectedat decision block 172 and stored at process block 174. The keystrokesare compared to the device users password at process block 176, ifmatched 178 the device is unlocked as represented by process block 180.If not matched 178, the stored keystrokes are compared to ICE access atdecision block 182. If matched 182, access to the ‘ICE’ information isallowed 184.

Depending upon the portable device age various keystrokes could be usedfor accessing the information. Preferably, one could use ICE or 423 asthe ‘unlock’ code to display the ‘ICE’ information, or use ‘*’ key,either repeatedly (say, four times), or holding for an extended period.‘*’ The indicia may or may not be replaced with a representation of the“Star of Life” as described above.

The locked display would indicate the existence of ‘ICE’ info bydisplaying ‘ICE’ and any symbol chosen to represent it. For example, the‘Star of Life’ may be displayed or the representation of ‘Star of Life’may be used instead of the on the asterisk key. This could be asix-pointed star, with square ends on the six points or the actual ‘Starof Life’.

Devices with larger displays, such as the one shown in FIG. 8 couldprovide further information, including directions to display the ‘ICE’information. Preferably, for new devices, and for those legacy deviceswhere it is possible, the ICE indicia indicates whether there is ICEinformation in the device. For example, a bold symbol (indicia) wouldshow that there is ICE information, a “greyed-out” symbol would showabsence of information. An alert to the user after the end of a trip(date has been reached) can also be displayed. This could be done ateach turn-on, or by some other selected algorithm. Preferably, includedinformation that is displayed could include more than a name and phonenumber according to user preferences.

FIG. 12 illustrates in a graph diagram a typical Mealy graph 200 of auser equipment (UE) access procedure. The Mealy graph 200 comprises 7states that are known in the portable device communication industry:MS-Off (1); Wait (2); Enter-card (3); Enter-PIN (4); Failure-Treatment(5); Enter-PLMN (6); and Serv-AV (7).

FIG. 13 illustrates in a graph diagram an amendment that can be added tothe Mealy graph 200 of FIG. 12, in accordance with an embodiment of theinformation access system 25. An ICE state (8) can be added. A sequenceof key strokes (such as 4 ‘*’s) unlocks the system from the wait (2)state and places the system in the ICE (8) state. Preferably an “end”key is used to exit the ICE state (8) and go back to the wait state (2).

The following is a description of the states of the UE access procedure:

-   -   1) UE-OFF: The UE is in OFF-condition. This means that the        equipment is not active as an UE in a PLMN.    -   2) WAIT: Waiting for the completion of the UE access conditions,        which are related to the type of UE and to the PLMN, where in        the UE is roaming (e.g. location updating).    -   3) ENTER CARD: Request for entering of the subscriber card,        (e.g. when no built in SIM module is available).    -   4) ENTER PIN: Request for entering of the correct PIN.    -   5) FAILURE TREATMENT: Waiting for removal the actual failure        condition.    -   6) ENTER PLMN: Request for selection of PLMN.    -   7) SERV-AV: The UE is in a ready state. PLMN services are        available to the user.    -   8) In case of emergency (ICE) The UE is unlocked and ICE        information is available. If the UE had been locked in the        previous state, then only the ICE information is available

The following is a description of the transitions between UE accessstates

-   -   ON: The equipment becomes active as an UE in a PLMN.    -   REQ: A request for user activity.    -   IOC: Insertion of a subscriber card with SIM/USIM-module.    -   COMPLETE: The PIN has been entered.    -   ENTERED: A PLMN choice has been done.    -   FAILURE; A failure condition has occurred in any other state        during the UE access procedures.    -   CONDITIONAL: One of the conditions the UE is waiting for in WAIT        state has been lost. The UE goes back to the WAIT state.    -   “DONE”: The UE access failure condition has been corrected.    -   OK: All the conditions the UE is waiting for in the WAIT state        are accomplished.    -   ICE unlock: The UE enters the in case of emergency (ICE) state.    -   “Off” key: The UE goes back to the WAIT state.

Preferably, FIGS. 12 and 13, and the above descriptions of states andtransitions define the requirements for a preferred standard for theMan-Machine Interface (MMI) of the user equipment incorporating ICEaccess procedures. The preferred standard allows anyone to access theICE information stored on the (U)SIM or on the UE. The use of theprocedures in the preferred standard does not make other information(for example, non-ICE entries in the phonebook) visible. The procedureof the preferred standard operate whether or not the SIM PIN is lockedand whether or not the handset is locked. In the preferred standard, theunlocking of the mobile device storing ICE information occurs when themobile device is in an idle state and any alphanumeric key is pressedthree times or any alphanumeric key is depressed for two seconds.

The following description describes an example of the storage of ICEinformation on a SIM card.

Preferably, ICE information is placed on the SIM card. This enables theuser (through the operator) to download the information to the SIM (orISIM). The device may or may not make a copy of the ICE information.Preferably, the device makes a copy of the ICE information and retainsthe copy on the device. New files may be added to the SIM card. Forexample, an existing phone address book may have a limited number offields. Preferably, one or more new files containing the ICE informationis used, that has the information and fields to be tailored to ICE use.Preferably, the ICE files alone are unlocked through the use of amechanism available to emergency responders, and this use of separatefiles (rather than files or records within existing, general addressbooks) ensures that the ICE unlocking does not unlock or otherwiseaffect the main address book. Further, this use of separate ICEinformation files allows the ICE files to evolve. Furthermore, a singlestandardized approach for new devices can be used.

Although, as implied above, ICE information, can be placed in anewer-style address book file (where ICE information or entries is“integrated” with other conventional address hook entries such that theICE information can be accessed from a locked or unlocked state whileother non ICE-related information in the address book file remain lockedwhen the device is in a locked state), such storage does not provide thebasis of a standardized approach where the ICE information is maintainedseparately from the address hook file. Moreover, having ICE informationcontinue to be identified only by “ICE” in front of the name in theaddress book entry would prevent the advantages of the separate ICEfiles from being achieved. Without a standard, each cell phone [orportable device] manufacturer could use different formats andtechniques, thereby limiting or preventing easy transfer of a user's ICEinformation from one handset or device to another handset or device.Advantageously, maintaining ICE information separately from the addresshook file and in a standardized form allows for the transfer of theuser's ICE information by moving the user's SIM card to the new wirelessdevice. Preferably, a standard is set for ICE information for SIM cardsso that the files are placed in a new dedicated file (DF), for example,DF_(ICE). Preferably, this DF would have two elemental files (EFs): a)EF_(IU) (ICE User) and b) EF_(IC) (ICE Contacts).

The ICE User file would provide the [cell phone] user's information:

Name Address Country Time Zone Language(s) For emergency personnel Phonenumber Number split (space) so that the country code is clearlyidentified Mobile number Number split (space) so that the country codeis clearly identified Traveller's Identifies the User as travelling witha group. group info Provides the starting and ending date of the tour,so that emergency personnel will know whether it is current. Blood typeComment User may wish to add information on medical condition or otherinstruction for emergency personnel. User may also leave blank.The user who travels presents additional issues regarding ICEinformation. The location that the user visits may have a differentlanguage, or both a different language and a different alphabet [forexample, Western alphabet vs Japanese, Chinese or other scripts]. Theissues may be addressed in several steps.

For travel within countries using a Western alphabet, the field headingsmay be provided in multiple languages, i.e., user's language andEnglish, or user's language, English, and language of frequently-visitedcountries. The use of multiple languages in the headers allows theemergency responders to determine which telephone numbers are for work(business), home and mobile. The use of multiple languages in theheaders also indicates to the emergency responders the relationship ofthe ICE contact, i.e., spouse, brother, friend, physician, tour guide.The headings would preferably be pre-programmed in at least the user'slanguage and English with the ability for the emergency responder tochoose which language is most useful to them. In this example, theuser's ICE information and the contacts' ICE information is entered inthe user's native language. With the field headings and the telephonenumbers available to, and understood by, the emergency responders, mostor all of the goal of ICE information is achieved.

A more difficult situation occurs when the user with a Western languagetravels to a country with a different alphabet or script. English (andlikely to as lesser degree other Western languages) may enable emergencyresponders to have access to at least the field headings (if a personconversant in that Western language is available) and the telephonenumbers. For a user (with a Western language) that will be in a countryusing a non-Western language for an extended time, it is preferable tohave both the field headings and the information within the fieldstranslated to the language of the country so that emergency respondershave access to all of the information without the need for a translator.Similarly, a user (with a non-Western language) that will be in acountry that uses a Western language would need to have both the fieldheadings and the information within those field translated to English orother appropriate Western language.

Preferably, the provision of field headings in several languages (usingboth Western and non-Western languages) is available to the user whenthe ICE information is initially input and when the user's itinerarycalls for additional languages. This may be accomplished without knowingthe name and details of the user and the user's ICE contacts. Thelanguages that are available are preferably indicated so that theemergency responders may select the most useful language. The case wherethe names and other details must be translated between Western andnon-Western languages can be handled individually.

The user may choose not to provide all information, for example,excluding the street address and city from the address. Preferably, theTraveler's group info dates use an alphabetic abbreviation for themonth, so as to prevent misunderstandings. When the Traveler's groupinfo date has expired, the user will be alerted, and asked whether thetour or travel has been completed or has been extended, i.e., (a) deletethe traveler's group info for that trip and delete the association withthe travel in the contacts entry (and whether that contact should bedeleted), or (b) extend the date of the tour or trip in the Traveler'sgroup information.

The ICE Contact file would provide information on the people or groupsthat emergency personnel may wish to contact.

Name Relationship Relationship to user. Mom, spouse, brother, friend,physician, travel-group member, tour director, . . . Address (optional)Time Zone If different from User Country Language(s) For emergencypersonnel Phone number h Number split (space) so that the country codeis clearly identified w Number split (space) so that the country code isclearly identified Mobile number Number split (space) so that thecountry code is clearly identified Comments: Could be used for IM, orfor other comments. Could also be used to indicate additional fieldshave been added. Travelling with Indicates that this contact istravelling with the user user?Headings (when displayed) would preferably be in user's language andEnglish or possibly other second language. The user may choose not toprovide all information. Preferably, organizations, such as MedicAlert,would also be included in the contacts. Preferably, the user is able toprioritize the order of the contacts.

The following input techniques can be used for ease of use, insertionand updating of information within the wireless device:

-   -   A. A user enters information online into operator web page. In        this scenario the operator maintains database and forwards        information OTA (over-the-air) to the SIM.    -   B. Optionally, a user may enter information via personal        computer (PC)-UE connection and cable.    -   C. A user enters information via PC-UE using Bluetooth or other        wireless connection.    -   D. A user enters information via keyboard (TAP).

To display ICE information on a locked device such as a locked phone,separate DFs and EFs in the SIM are used to store. ICE relatedinformation such as the user's home information, contacts, traveler'sinformation and related information separately from the usual addressbook entries. This segregation of ICE information in specificICE-oriented files enables the ICE information to be unlocked while theusual address book entries and other data remain locked andinaccessible.

To deal with limited space in each SIM address book entry, ‘ICE’information is transferred from SIM/USIM to a mobile equipment (ME).

For the updating of information, the ME manages access to theinformation.

When a user obtains a new cell phone, the registration or enablingprocess will alert the user that ICE information should be entered.Should the user place an already registered SIM in the wireless device,the user would preferably be asked if that ICE info (already on the SIM)is accurate and up-to-date.

When a user obtains another SIM, the handset and SIM are synchronized.The SIM may not have the DF and EF ‘ICE’ files, or it may have the OFand EP ‘ICE’ files without any information in them. Further, the anotherSIM may be a permanent SIM for the user (at least for a period of time),or the SIM may be a temporary loan for a (possibly brief) period from anassociate or from the user's enterprise. If the SIM does not have any‘ICE’ information contained in it, then presumably the information fromthe handset could be used, and the question “Keep ‘ICE’ information on<name of user, from ICE info> from the handset, and write to the SIM?”could be prompted to the user. If the user selects ‘No’, then the usercould be prompted to insert ‘ICE’ information which would be placed inthe SIM files and then copied to the handset overwriting the previousinformation.

FIG. 14 shows in a flowchart an example of a method of synchronizing ahandset and a replacement SIM (200), in accordance with an embodiment ofthe information access system 25. If the replacement SIM does not havethe DF and EF ICE file (202), or if the SIM's DF and EF ICE files do nothave any information in them (202), then a message is displayedprompting a user to select if the user wishes to update the replacementSIM to reflect the ICE information on the handset (204). If so (204),then the SIM is updated with the information (206). If not (204), thenthe a message is displayed prompting a user input ICE information to bestored in the SIM (208).

Legacy wireless devices that do not have special indicia can beprogrammed to access the information via other key strokes. For, exampleby typing use ICE or 423 as the ‘unlock’ code to display the ‘ICE’information, or by using a ‘*’ key, either repeatedly (e.g., three orfour times), or pressing for extended period. The ‘*’ indicia may or maynot be replaced with the stylized indicia as described above.

New Devices and new SIMs, USIMs, ISIMs, RUIMs can be produced with theICE capability built in.

If a legacy SIM is not ICE-enabled, the legacy SIM may have the DF andEFs added via an OTA (over-the-air) command from the operator. Manyrecent legacy devices are capable of loading games and otherapplications onto the handset (device). Many handsets are being producedthat use Binary Runtime Environment for Wireless (BREW) or Java (orother “standardized” languages) as the programming language for suchapplications. Thus, operators and manufacturers could produce BREW orJava applications that would enable use of ICE (as described herein) onthe device. It is further noted that, with the standardization of BREW,and the industry work towards standardization of Java for many handsets,that a single, e.g., Java ICE, application may be installable on manydifferent models of handsets. The device, once the BREW or Java ICEapplication is installed, would then operate with the same capability asa handset manufactured with the ICE capability fully installed.

Devices such as the RIM BlackBerry™, having a mode where information isstored on the infrastructure thus enabling change to a new wirelessdevice with the information (from the previous device) downloaded, tothe new device, may store the ICE information via the OTA backup. Thisenables change to a new wireless device even in the case where a SIMcard is not used.

The system and methods according to the present disclosure may beimplemented by any hardware, software or a combination of hardware andsoftware having the above described functions. The software code, eitherin its entirety or a part thereof, may be stored in a computer readablememory. Further, a computer data signal representing the software codewhich may be embedded in a carrier wave may be transmitted via acommunication network. Such a computer readable memory and a computerdata signal are also within the scope of the present disclosure, as wellas the hardware, software and the combination thereof.

While particular embodiments of the patent disclosure have been shownand described, changes and modifications may be made to such embodimentswithout departing from the true scope of the patent disclosure.

1-42. (canceled)
 43. A portable device capable of storing In Case ofEmergency (ICE) information comprising a number of ICE entries and whichmay be placed in a locked condition, the portable device comprising: aman-machine interface; a display; and a processor coupled to the displayand to the man-machine interface, wherein the processor is adapted tocause the display, in response to a predetermined operation associatedwith the man-machine interface, to display at least one ICE entry; andwherein the display displays the at least one ICE entry even when theportable device is in the locked condition, and when the at least oneICE entry is displayed when the portable device is in the lockedcondition, at least some other information stored on the portable deviceremains protected.