Methods and apparatus for automatically causing a mobile device to download a file

ABSTRACT

Disclosed methods and apparatus automatically cause a mobile communication device to download a file using a designated remote device. A user interface enables selection of the designated remote device and of a designated code corresponding to downloading the file to the mobile communication device from the designated remote device. A processor: receives a coded electronic communication (CEC), identifies origination of the CEC, determines whether the identified originator of the CEC is the designated remote device, identifies a code included in the CEC, upon determining that the identified originator of the CEC is the designated remote device, determines whether the identified code included in the CEC is the designated code, and provides an instruction to cause the mobile communication device to download the file, upon determining that the identified code included in the CEC is the designated code.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation (and claims the benefit of priorityunder 35 USC 120) of U.S. application Ser. No. 13/285,205, filed Oct.31, 2011, which is a continuation of U.S. application Ser. No.12/137,920, filed Jun. 12, 2008, now U.S. Pat. No. 8,049,611, issuedNov. 1, 2011, which claims the benefit to U.S. Provisional ApplicationNo. 60/943,630, filed on Jun. 13, 2007, and entitled “Audible LocationMechanism for Mobile Device.” All of these applications are incorporatedby reference in their entirety.

FIELD

The present disclosure generally relates to facilitating location ofmobile devices.

BACKGROUND

The portable nature and small size of mobile devices makes misplacingmobile devices common. Once misplaced, mobile devices may be difficultto locate.

SUMMARY

Implementations of the described techniques may include hardware, amethod or process, or computer software on a computer-accessible medium.

The details of one or more implementations are set forth in theaccompanying drawings and the description below. Other features will beapparent from the description and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIG. 1 is a contextual diagram demonstrating location mechanisms for amobile device.

FIG. 2 is a block diagram of a communications system configured toexchange electronic communications.

FIG. 3 is a flow chart of a process for invoking an audible alert of amobile device.

FIG. 4 is a flow chart of a process for initiating a mobile device tosend a message that includes information related to the location of themobile device.

FIG. 5 illustrates an exemplary user interface for entering informationrelated to coded messages that initiate processes that facilitatelocation of a mobile device.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION

Techniques are described for initiating processes that facilitatelocation of a mobile device. A remote user of a misplaced mobile devicemay send a text message with a particular code to the misplaced mobiledevice to initiate one or more processes that facilitate location of themisplaced mobile device. For instance, receipt of the text message withthe particular code may cause the misplaced mobile device to invoke anaudible alert (e.g., invoke a ringer) or cause the mobile device to senda return text message that includes information related to a currentlocation of the mobile device (e.g., Global Positioning System (GPS)data).

In some examples, techniques are provided for invoking an audible alertof a mobile device. The mobile device is configured to receiveelectronic communications and may be configured in a mode in which theaudible alert is disabled (e.g., a silent mode or a vibrate mode). Themobile device receives an electronic communication and determineswhether the electronic communication is a coded electronic communication(e.g., an electronic communication that includes a particular message oran electronic communication that is encrypted with a particular key). Ifthe electronic communication is a coded electronic communication, themobile device invokes an audible alert of the mobile device (e.g.,causes a ringer associated with the mobile device to ring). Receipt of acoded electronic communication may cause invocation of the audible alertof the mobile device even when the mobile device is configured in a modein which the audible alert is disabled (e.g., a silent mode or a vibratemode). For example, receipt of a coded electronic communication mayoverride volume control settings at the mobile device if the volumecontrol settings of the mobile device are configured for a silentsetting.

In some implementations, a cellular telephone, set in silent mode,receives a coded text or Short Message Service (“SMS”) message andinvokes a ringer of the cellular telephone in response to receiving thecoded text or SMS message. By invoking the ringer in response toreceiving the coded text message, a user may be able to locate thecellular telephone more easily when misplaced or be alerted to animportant event. For example, if the cellular telephone is misplacedwhen the volume control settings of the cellular telephone are set in asilent mode, receipt the coded text message may override the silent modesetting and cause the ringer to ring.

Implementations may assist a user in locating a mobile device that hasbeen misplaced when the volume control settings of the mobile device areconfigured for a silent setting. In one example, a user/owner of amobile telephone may call the mobile telephone to invoke a ringer of themobile telephone to assist the user in locating the mobile telephone. Inthis example, the mobile telephone may receive the call placed by theuser/owner and identify that the call is from the user/owner. Inresponse to identifying that the call is from the user/owner, the mobiletelephone may override or disregard the silent setting of the mobiletelephone and invoke the ringer of the mobile telephone, therebyassisting the user/owner in locating the mobile telephone. Further, inthis example, if the mobile telephone receives a call from a personother than the user/owner of the mobile telephone, the mobile telephonemay not override or disregard the silent setting of the mobile telephoneand not invoke the ringer. In other implementations, a telephone serviceprovider may be configured to identify that the call to the mobiletelephone is from the user/owner and send a coded electroniccommunication (e.g., a coded text message) or other type of controlsignal to invoke the ringer of the mobile telephone.

In another example, the user/owner of a mobile device may send a text orSMS message to the mobile device that includes a specific code in thetext portion of the message. In this example, the mobile device mayreceive the text message including the specific code and parse the textportion of the text message to identify the specific code. In responseto identifying the specific code, the mobile device may override ordisregard the silent setting of the mobile device and invoke the ringerof the mobile device, thereby assisting the user/owner in locating themobile device. Further, in this example, if the mobile device receives atext message that does not include the specific code from the user/ownerof the mobile device (or another sender), the mobile device may notoverride or disregard the silent setting of the mobile telephone and notinvoke the ringer. In other examples, the sender of the text messageincluding the specific code may be used in addition to or instead of thecode to determine whether to invoke the ringer of the mobile device.

Implementations may enable a first user to alert a second user ofimportant events (e.g., emergencies) when the second user is inpossession of a mobile device in which the volume control settings ofthe mobile device are configured for a silent setting. In one example,the first user may place a call to the mobile device of the second userto alert the first user of an important event. In this example, themobile device may receive the call and identify that the call is fromthe first user. In response to identifying that the call is from thefirst user, the mobile device may override or disregard the silentsetting of the mobile device and invoke a ringer of the mobile device,thereby alerting the second user of the call from the first user.Further, in this example, if the mobile device receives a call from athird user that is not authorized to override settings of the mobiledevice to alert the user of important events, the mobile device may notoverride or disregard the silent setting of the mobile telephone and notinvoke the ringer.

In another example, the first user may send a text or SMS message to themobile device of the second user that includes a specific code in thetext portion of the message. In this example, the mobile device mayreceive the text message including the specific code and parse the textportion of the text message to identify the specific code. In responseto identifying the specific code, the mobile device may override ordisregard the silent setting of the mobile device and invoke the ringerof the mobile device, thereby alerting the second user that the firstuser is attempting to contact the second user. Further, in this example,if the mobile device receives a text message that does not include thespecific code from the first user (or another user), the mobile devicemay not override or disregard the silent setting of the mobile telephoneand not invoke the ringer. In other examples, the user identity of thesender of the text message including the specific code may be used inaddition to the code to determine whether to invoke the ringer of themobile device.

Implementations also may include overriding other settings of a device.For example, a user of a telephone may turn off a call waiting featurewhen the user is on an important telephone call. In this example,receipt of a call from a particular user and/or receipt of a codedelectronic communication may override this setting and provide anaudible alert (or other call waiting feature) to the user while the useris on the important telephone call.

In some implementations, different levels of codes may exist such thatassociating a first code with an electronic communication may enable auser to override a first set of one or more settings and associating asecond code with an electronic communication may enable the user tooverride a second set of one or more settings. For example, a mobiledevice may be configured to override a silent setting of the mobiledevice, but not a disabled call waiting setting of the mobile device inresponse to receiving an electronic communication that includes a firstcode. Further, the mobile device may be configured to override both asilent setting of the mobile device and a disabled call waiting settingof the mobile device in response to receiving an electroniccommunication that includes a second code. In this example, when thesettings of the mobile device are configured to disable call waiting andthe user of the mobile device is currently engaged in a telephone call,the mobile device will override the disabled call waiting setting inresponse to receiving an electronic communication including the secondcode, but will not override the disabled call waiting setting inresponse to receiving an electronic communication including the firstcode.

FIG. 1 is a contextual diagram 100 demonstrating location mechanisms fora mobile device. As shown, the contextual diagram 100 illustrates anexample of sending a coded text message to a mobile device to initiateprocesses that facilitate location of the mobile device. The contextualdiagram 100 shows a user 110 using a mobile device 120 to send a codedtext message 140 to a mobile device 130 to cause the mobile device 130to initiate, without human intervention, one or more processes thatfacilitate location of the mobile device 130.

The user 110 may be a person that owns or uses the mobile device 130.The user 110 may have misplaced the mobile device 130 and may beattempting to locate the mobile device 130. To assist in the locationprocess, the user 110 may use the mobile device 120 to send a coded textmessage 140 to the mobile device 130. The coded text message 140 mayinclude a particular passcode or password that represents a command thatcauses the mobile device 130 to initiate one or more processes thatfacilitate location of the mobile device 130. The mobile device 120 maybe a second mobile device owned or used by the user 110 or may be amobile device the user 110 borrowed from another user.

The user 110 uses the mobile device 120 to send a coded text message 140to the mobile device 130. For example, the user 110 may enter the text“Locate Code” using a keypad of the mobile device 120 and send theentered text to the mobile device 130 as an SMS message. The coded textmessage 140 is sent from the mobile device 120 to the mobile device 130over a network (e.g., a cellular telephone network).

When the mobile device 130 receives the coded text message 140, themobile device 130 processes the coded text message without humanintervention. For instance, the mobile device 130 may parse the textfrom the coded text message 140 (i.e., “Locate Code”) and compare theparsed text to a list of one or more recognized codes. The list ofrecognized codes may have one or more functions associated with each ofthe recognized codes included in the list. Accordingly, when the parsedtext from the coded text message 140 matches a recognized code, themobile device 130 automatically, without human intervention, performsthe one or more functions associated with the recognized code thatmatches the parsed text from the coded text message 140. When the parsedtext from the coded text message 140 does not match a recognized code,the mobile device 130 processes the text message as an ordinary textmessage (e.g., placing the text message in an inbox of text messages)without performing any additional function.

In the example illustrated in FIG. 1, the text “Locate Code” included inthe coded text message 140 matches a recognized code that is associatedwith two functions that facilitate location of the mobile device 130.The two functions cause the mobile device 130 to automatically, withouthuman intervention, invoke an audible alert 150 and send a response textmessage 160 that includes GPS location data captured by the mobiledevice 130. As such, when a text message with the text “Locate Code” isreceived, the mobile device 130 automatically, without humanintervention, invokes an audible alert 150 and sends a response textmessage 160 that includes GPS location data captured by the mobiledevice 130, thereby assisting the user 110 in locating the mobile device130.

In invoking the audible alert 150, the mobile device 130 may bypassvolume control settings on the mobile device 130. For example, when themobile device 130 was misplaced, a silent or vibrate setting of themobile device 130 may have been set such that a speaker of the mobiledevice 130 is disabled and the mobile device 130 would not emit anaudible alert (e.g., ring) when a typical call or text message isreceived by the mobile device 130. Because the coded text message 140matches a recognized code, the volume control settings may be bypassedto invoke the audible alert 150. Bypassing the volume control settingsmay enable invocation of the audible alert to assist in locating themobile device 130, even when the mobile device 130 is configured in amode that otherwise would prevent invocation of audible alerts.

In sending the response text message 160, the mobile device 130 maydetermine a return communication address (e.g., a telephone number,email address, etc.) associated with the mobile device that sent thecoded text message 140. The return communication address may bedetermined using a caller identification process on the coded textmessage 140 received from the mobile device 120. In some examples, themobile device 130 may send the response text message to one or morecommunication addresses (which may or may not include a communicationaddress for the mobile device 120) previously stored on the mobiledevice 130 and designated to receive a text message including locationinformation upon receipt of a text message with the text “Locate Code.”

The location information included in the response text message 160 maybe based on GPS data obtained by the mobile device 130 in response toreceipt of the coded text message 140. For instance, longitude andlatitude coordinates obtained from GPS data for a current position ofthe mobile device 130 may be included in the response text message 160.The GPS data also may be used to identify a current street address forthe mobile device and the current street address may be sent in theresponse text message 160.

The mobile device 120 receives the response text message 160 and rendersa display of the location information included in the response textmessage. The displayed location information may include longitude andlatitude coordinates obtained from GPS data or a street address. Thedisplayed location information also may, automatically, without humanintervention, include a map of an area surrounding the current locationof the mobile device 130 and/or directions from a current location ofthe mobile device 120 to the current location of the mobile device 130.Receipt and display of the location information may assist the user 110in locating the mobile device 130.

In some implementations, a tariff or other fee may be used to preventabuse of sending coded electronic communications to a mobile device. Forinstance, a sender of a coded electronic communication may be chargedone dollar each time the sender sends a coded electronic communicationto a mobile device. By charging a fee to the sender of coded electroniccommunications, abuse of the system may be deterred and use of thedescribed location mechanisms may be limited to situations in which thelocation mechanisms are necessary. The user/owner the electronic devicethat received the coded electronic communication may be charged inaddition to the sender or instead of the sender.

In some examples, the mobile device 130 may be configured to analyzecharacteristics of an invoked audible alert and send a responseelectronic communication based on the analysis. For instance, the mobiledevice 130 may include a microphone that captures an electricalrepresentation of an invoked audible alert. The mobile device 130 mayanalyze the captured electrical representation of the invoked audiblealert to determine characteristics of the environment in which themobile device is located. For example, the mobile device 130 maydetermine whether acoustic characteristics of the invoked audible alertare compressed (e.g., the mobile device is placed in a bag) or exhibitan echo (e.g., the mobile device is positioned an open room). Based onthe acoustic characteristics of the invoked audible alert, the mobiledevice 130 may send a response electronic communication that identifiesa characteristic of the location of the mobile device 130 that mayassist the user 110 in finding the mobile device 130 (e.g., “The mobiledevice appears to be in a confined space, such as a purse”).

The location mechanisms described throughout this application also maybe used in contexts other than locating a mobile device. For instance,the location mechanisms may be used for social purposes. In one example,sending a coded electronic communication to a mobile device to invoke anaudible alert may be used when another user needs to inform theuser/owner of the mobile device of an emergency or other important eventand the user/owner of the mobile device is not responding to traditionalmechanisms for contacting the mobile device (e.g., placing a call to themobile device or sending a regular text message to the mobile device).

Implementations in which the mobile device is configured to send anelectronic communication in response to a coded electronic communicationmay be used for social purposes. In this regard, the mobile device maybe configured to provide location information in a response electroniccommunication to another user trying to reach the user/owner of themobile device when the user/owner of the mobile device is not respondingto traditional mechanisms for contacting the mobile device. Forinstance, when the user/owner of the mobile device is driving home fromwork and taking an important conference call during the drive home, themobile device may be configured to provide location information of theuser/owner of the mobile device in a response electronic communicationwhen the spouse of the user/owner of the mobile device sends a codedelectronic communication to the mobile device. The response electroniccommunication may include specific information regarding the location ofthe mobile device (e.g., longitude/latitude coordinates or a streetaddress) or may include a more general statement of the location of theuser/owner of the mobile device (e.g., the user/owner appears to bedriving home from work, the user/owner appears to be at work, etc.).

The mobile device also may be configured to access an electroniccalendar for the user/owner of the mobile device and provide calendarinformation in a response electronic communication. For instance, in theexample discussed above in which the user/owner of the mobile device isdriving home from work and taking an important conference call duringthe drive home, the mobile device may access electronic calendarinformation that indicates that the user/owner of the mobile device isscheduled to take an important call with a client when the codedelectronic communication is received. The response electroniccommunication initiated by the coded electronic communication mayinclude the accessed calendar information in addition to the locationinformation. For example, the response electronic communication may be“The user/owner appears to be driving home from work and is currentlyscheduled to take an important call with a client.”

Referring to FIG. 2, a communications system 200 is configured toexchange electronic communications. The communications system 200includes a mobile device 220, a service provider 230, and acommunication device 240. The service provider 230 facilitatescommunications between the mobile device 220 and the communicationdevice 240 over network 210.

The network 210 is configured to enable exchange of electroniccommunications between devices connected to the network 210. Forexample, the network 210 may be configured to enable exchange ofelectronic communications between the mobile device 220, the serviceprovider 230, and the communication device 240. The network 210 mayinclude, for example, one or more of the Internet, Wide Area Networks(WANs), Local Area Networks (LANs), analog or digital wired and wirelesstelephone networks (e.g., a PSTN, Integrated Services Digital Network(ISDN), a cellular network, and Digital Subscriber Line (xDSL)), radio,television, cable, satellite, and/or any other delivery or tunnelingmechanism for carrying data. Network 210 may include multiple networksor subnetworks, each of which may include, for example, a wired orwireless data pathway. The network 210 may include a circuit-switchedvoice network, a packet-switched data network, or any other network ableto carry electronic communications. For example, the network 210 mayinclude networks based on the Internet protocol (IP) or asynchronoustransfer mode (ATM), and may support voice using, for example, VoIP,Voice-over-ATM, or other comparable protocols used for voice datacommunications. In one implementation, the network 210 includes acellular telephone network configured to enable exchange of text or SMSmessages.

The mobile device 220 is configured to exchange electroniccommunications with the communication device 240 through serviceprovider 230. The mobile device 220 may be any mobile device configuredto exchange electronic communications over a network. For example, themobile device 220 may be a wireless phone, a cellular phone, a mobilepersonal digital assistant (PDA) with embedded cellular phonetechnology, or a smart phone.

The service provider 230 is configured to facilitate electroniccommunications between the mobile device 220 and the communicationdevice 240. For example, the mobile device 220 may establish aconnection with service provider 230 through network 210 and the serviceprovider 230 may establish a connection with the communication device240. The service provider 230 may arrange a connection between themobile device 220 and the communication device 240 through the network210 such that the mobile device 220 and the communication device 240 mayexchange communications directly after the connection is arranged.Alternatively or additionally, the service provider 230 may receiveelectronic communications from mobile device 220 or communication device240 and route the electronic communications to the appropriate device.For example, the service provider 230 may receive, from thecommunication device 240, a text or SMS message addressed to the mobiledevice 220. Upon receipt of the message, the service provider 230 routesthe message to mobile device 220. In one implementation, the serviceprovider 230 is a cellular telephone service provider configured tofacilitate exchange of voice and/or data communications. In anotherimplementation, the service provider 230 is a electronic systemconfigured to provide services to users, including data and/or voiceservices. The services may include communications services, such as, forexample, one or more of e-mail services, instant messaging services,chat services, VoIP services, text or SMS messaging services, andtraditional telephony services, and content provisioning services, suchas, for example, Internet access (e.g., access to the World Wide Web)and/or access to online content (e.g., access to otherwise restricted orproprietary content).

The communication device 240 is configured to exchange electroniccommunications with the mobile device 220. For example, thecommunication device 240 may be configured to receive communicationsfrom and/or send communications to the mobile device 220. For example,the communication device 240 may be configured to send text or SMSmessages to the mobile device 220 and/or receive text or SMS messagesfrom the mobile device 220. In another example, the communication device240 may be configured to place calls to the mobile device 220 and/orreceive calls from the mobile device 220. The communication device 240may be any device configured to exchange electronic communications overa network. For example, the communication device 240 may be a wirelessphone, a cellular phone, a mobile personal digital assistant (PDA) withembedded cellular phone technology, a smart phone, or a soft phone,which is a telephone integrated into a computer system. Alternatively oradditionally, the communication device 240 may be integrated into aclient computer system.

In one implementation, the mobile device 220 may be configured toreceive an electronic communication and determine whether the electroniccommunication is a coded electronic communication. A coded electroniccommunication may include a particular message identifiable by themobile device 220 and/or may be encrypted with a particular methodand/or key. The mobile device 220 may determine whether the electroniccommunication is a coded electronic communication by comparing a messageincluded in the electronic communication with one or more codedelectronic messages stored on the mobile device 220 or by processing theelectronic communication with a particular computational processconfigured to detect coded electronic communications. When the mobiledevice 220 identifies an electronic communication received as a codedelectronic communication, the mobile device 220 may perform a functionassociated with the coded electronic communication. For example, themobile device 220 may invoke an audible alert when the mobile device 220receives a particular coded text message. The communication device 240may be configured to send coded electronic communications to the mobiledevice 220.

In another implementation, processing of coded electronic communicationsis performed by the service provider 230. For example, the serviceprovider 230 may receive an electronic communication addressed to themobile device 220. The service provider 230 may access informationrelated to coded electronic communications associated with the mobiledevice 220 (e.g., one or more coded messages set by the mobile device220 and/or a computational process specific to the mobile device 220 fordetermining whether an electronic communication is coded) and determinewhether the electronic communication is a coded electronic communicationfor the mobile device 220 based on the information. When the serviceprovider 230 determines that the electronic communication is a codedelectronic communication, the service provider may send a signal orother form of communication, other than or in addition to the codedelectronic communication, to the mobile device 220. The mobile device220 may be configured to perform a function in response to receiving thesignal from the service provider 230.

In other implementations, identity of a sender of an electroniccommunication may impact performance of a function when the mobiledevice 220 (or service provider 230) determines that the electroniccommunication is a coded electronic communication. For example, when themobile device 220 receives a coded electronic communication, the mobiledevice 220 may perform a function if a sender of the coded electroniccommunication is a first sender and may not perform the function if thesender of the coded electronic communication is a second, differentsender. In another example, when the mobile device 220 receives a codedelectronic communication the mobile device 220 may perform a firstfunction if a sender of the coded electronic communication is a firstsender and may perform a second function if the sender of the codedelectronic communication is a second, different sender. In otherexamples, the mobile device 220 may determine whether to bypass devicesettings based on a sender of a coded electronic communication (e.g.,the device will bypass a setting of silent mode if the coded electroniccommunication was sent from a first sender, but will not bypass asetting of silent mode if the coded electronic communication was sentfrom a second sender).

FIG. 3 is a flow chart of a process 300 for invoking an audible alert ofa mobile device. For convenience, particular components described withrespect to FIG. 2 are referenced as performing the process 300. However,similar methodologies may be applied in other implementations wheredifferent components are used to define the structure of the system, orwhere the functionality is distributed differently among the componentsshown by FIG. 2.

The mobile device 220 disables an audible alert of the mobile device(310). For example, the mobile device 220 may receive user inputindicating a desire to disable the audible alert of the mobile device220 and, in response to the user input, the mobile device 220 disablesthe audible alert. In one implementation, the mobile device 220 may be acellular telephone and the user input may indicate a desire to place thecellular telephone in silent mode.

The communication device 240 sends a coded text message addressed to themobile device 220 (320). For example, the communication device 240 maysend an SMS message to a telephone number associated with the mobiledevice 220. The coded text message may include a particular message(e.g., a password), may be encrypted with a particular method and/orkey, or may include other information sufficient to indicate that themessage is a coded message. The service provider 230 receives the textmessage addressed to the mobile device 220 sent from the communicationdevice 240 (330) and transmits the text message to the mobile device 220(340). For example, the service provider 230, upon receipt of the textmessage, processes the text message to determine the recipient of themessage and forwards the message to the recipient. The service provider230 may temporarily store the text message prior to transmitting and mayperform other formatting and/or transformation operations necessary toproperly transmit the text message to the mobile device 220. The serviceprovider 230 may wait until the mobile device 220 has established aconnection with the service provider 230 prior to transmitting themessage or may wait until the mobile device 220 requests the message.

The mobile device 220 receives the text message from the serviceprovider 230 (350). For example, the mobile device 220 receives an SMSmessage originated by the communication device 240. The mobile device220 determines that the text message is a coded text message (360). Inone example, the mobile device 220 may determine that the text messageis a coded text message by comparing at least a portion of the textmessage with one or more coded text messages previously stored on themobile device 220. The mobile device 220 may determine that the textmessage is a coded text message when the portion of the text messagematches one of the one or more coded text messages. In another example,the mobile device 220 may determine that the text message is a codedtext message by processing the text message with a particularcomputational process configured to detect coded text messages (e.g., byobtaining a particular result after decrypting the text message with aparticular key).

The mobile device 220 may, optionally, determine that the device sendingthe coded text message is an authorized device (370). For example, themobile device 220 may process the coded text message to determineinformation related to the identity of the device that sent the message.In one implementation, the mobile device 220 may determine a deviceidentifier for the communication device 240 and compare the deviceidentifier to a list of authorized device identifiers. In anotherimplementation, the mobile device 220 may determine a telephone numberfor the communication device 240 and compare the telephone number to alist of authorized telephone numbers. In yet another implementation, themobile device 220 may determine an identity of a user operating thecommunication device 240 and compare the identity of the user to a listof authorized users. The determination that the device (or user) sendingthe coded text is authorized may impact performance of the remainingsteps. For example, if the device (or user) sending the coded text isnot authorized, the mobile device may not override or disregard thedisabled audible alert setting. In other examples, the identity of theuser sending an electronic communication may be used instead ofdetermining whether the electronic communication includes a code.

The mobile device 220 overrides or disregards the audible alert settingafter determining that the text message is a coded text message and,optionally, after determining that the device sending the coded textmessage is authorized (380). For example, the mobile device 220 mayoverride or disregard a setting that the mobile device 220 is in silentmode. Disregarding the disabled audible alert setting may allow a userto invoke the audible alert of the mobile device 220 by sending a codedtext message to the mobile device 220. Being able to invoke the audiblealert when the audible alert has been disabled, may allow the user toinvoke the audible alert of the mobile device 220 if the mobile device220 becomes misplaced when the audible alert of the mobile device 220has been disabled. In addition, disregarding the disabled audible alertsetting may allow another user to notify the user of the mobile deviceof an emergency when the audible alert of the mobile device 220 has beendisabled. In some implementations, the audible alert may remain disabledafter overriding or disregarding the disabled audible alert in responseto receiving the coded text message (e.g., volume control settings of acommunications device as configured for a silent setting may bemaintained after overriding the volume control settings at thecommunications device).

The mobile device 220 invokes the audible alert (390). For example, themobile device 220 may invoke a ringer included in the mobile device 220.In another example, the mobile device 220 may output a message through aspeaker included in the mobile device 220. The audible alert invoked inresponse to receiving a coded text message may be different than anormal audible alert.

In some implementations, the mobile device 220 invokes an audible alertthat represents an alarm condition. The alarm condition may be an alertthat is louder or at a different pitch than a typical ring of the mobiledevice 220. The alarm condition may be configured to attract attentionto a location of the mobile device 220. The alarm condition also may beassociated with a vibrate feature or one or more illumination sources ofthe mobile device 220. In this regard, the mobile device 220 may beconfigured to vibrate and flash one or more illumination sources, inaddition to invoking an audible alert, to facilitate location of themobile device 220 in response to receipt of a coded electroniccommunication.

The audible alert invoked also may be an audible alert that is furtherconfigured to assist a user in locating the mobile device 220. Theaudible alert may be a series of audible alerts invoked at apredetermined frequency. For instance, in response to receiving a codedelectronic communication, the audible alert may be invoked every 30seconds. Repeatedly invoking an audible alert may assist a user inlocating a misplaced mobile device. In the event that the user does notfind the misplaced mobile device after invocation of a single audiblealert, the repeated audible alerts continue to facilitate location ofthe mobile device without requiring the user to send additional codedelectronic communications to the mobile device.

FIG. 4 is a flow chart of a process 400 for initiating a mobile deviceto send a message that includes information related to the location ofthe mobile device. For convenience, particular components described withrespect to FIG. 2 are referenced as performing the process 400. However,similar methodologies may be applied in other implementations wheredifferent components are used to define the structure of the system, orwhere the functionality is distributed differently among the componentsshown by FIG. 2.

The communication device 240 sends a coded text message addressed to themobile device 220 (410). For example, the communication device 240 sendsa coded text message addressed to the mobile device 220 using techniquesdescribed above with respect to step 320 shown in FIG. 3.

The service provider 230 receives the text message addressed to themobile device 220 sent from the communication device 240 (415) andtransmits the text message to the mobile device 220 (420). For example,the service provider 230 receives the text message addressed to themobile device 220 sent from the communication device 240 and transmitsthe text message to the mobile device 220 using techniques describedabove with respect to steps 330 and 340 shown in FIG. 3.

The mobile device 220 receives the text message from the serviceprovider 230 (425) and determines that the text message is a coded textmessage (430). For example, the mobile device 220 receives the textmessage from the service provider 230 and determines that the textmessage is a coded text message using techniques described above withrespect to steps 350 and 360 shown in FIG. 3.

The mobile device 220 may, optionally, determine that the device sendingthe coded text message is an authorized device (435). For example,mobile device 220 determines that the device sending the coded textmessage is an authorized device using techniques described above withrespect to step 370 shown in FIG. 3.

The mobile device 220 determines a location of the mobile device 220(440). For example, the mobile device 220 may include a GPS receiverthat is configured to receive GPS data from one or more satellites. Inthis example, the mobile device 220 may determine a location of themobile device using GPS data received by the GPS receiver. The mobiledevice 220 also may determine a location of the mobile device 220 basedon signals received from one or more network access points (e.g.,cellular towers) that the mobile device 220 uses to connect to anetwork. The mobile device 220 may determine the location as longitudeand latitude coordinates, a street address, or another type of locationmeasurement.

The mobile device 220 determines a communication address (e.g., anumber) of the communication device 240 (445). For instance, the mobiledevice 220 may perform an identification process on the text messagereceived from the communication device 240 to determine a telephonenumber of the communication device 240. The mobile device 220 also mayaccess a telephone number of the communication device 240 fromelectronic storage. The telephone number of the communication device 240may be stored in electronic storage of the mobile device 220 in advanceand designated as a telephone number to which to send a text messagewith location information upon receipt of a coded text message.

The mobile device 220 sends a text message with location informationaddressed to the communication device 240 (450). For example, the mobiledevice 220 may send an SMS message to a telephone number associated withthe communication device 240. The text message may include locationinformation indicative of the determined location of the mobile device220.

The service provider 230 receives the text message with locationinformation addressed to the communication device 240 and sent from themobile device 220 (455) and transmits the text message to thecommunication device 240 (460). For example, the service provider 230,upon receipt of the text message, processes the text message todetermine the recipient of the message and forwards the message to therecipient. The service provider 230 may temporarily store the textmessage prior to transmitting and may perform other formatting and/ortransformation operations necessary to properly transmit the textmessage to the communication device 240. The service provider 230 maywait until the communication device 240 has established a connectionwith the service provider 230 prior to transmitting the message or maywait until the communication device 240 requests the message.

The communication device 240 receives the text message from the serviceprovider 230 and displays the location of the mobile device 220 (465).For example, the communication device 240 receives an SMS message thatincludes information indicative of the location of the mobile device220. The communication device 240 may derive the location of the mobiledevice 220 from the text message and automatically, without humanintervention, perform operations that assist in locating the mobiledevice 220. For instance, the communication device 240 mayelectronically generate a map of an area surrounding the location of themobile device 220 or may determine a current location of thecommunication device 240 and determine directions from the currentlocation of the communication device 240 to the location of the mobiledevice 220. Display of the location of the mobile device 220 using thecommunication device 240 may facilitate location of the mobile device220 by a person using the communication device 240.

FIG. 5 illustrates an exemplary user interface 500 for enteringinformation related to coded messages that invoke an audible alert of amobile device. The user interface 500 may be presented to a user wishingto change settings of coded messages that invoke the audible alert ofthe mobile device when received. The user interface 500 may be generatedby a mobile device or a service provider providing service to the mobiledevice. The user interface may be presented to a user on the mobiledevice or on another device configured to manage settings of the mobiledevice.

The user interface 500 includes a device identification portion 510identifying a device identifier for the mobile device associated withthe coded messages settings and a telephone number portion 520identifying a telephone number for the mobile device associated with thecoded messages settings. The device identification portion 510 andtelephone number portion 520 may include static information that a usercannot modify or may include a text field with which a user may modifythe device identifier or the telephone number.

The user interface 500 also includes a coded messages portion 530 thatenables a user to modify coded messages settings associated with themobile device. The coded messages portion 530 includes a first codedmessage portion 540, a second coded message portion 550, an add codedmessage actionable item 560, and a delete coded message actionable item570. Although the coded messages portion 530, as shown, includes a firstcoded message portion 540 and a second coded message portion 550, thecoded messages portion 530 may include any number of coded messageportions. The add coded message actionable item 560 and the delete codedmessage actionable item 570 enable a user to manage the number of codedmessages included in the coded messages portion 530. For example, theadd coded message actionable item 560, when activated, adds a new codedmessage portion to the coded messages portion 530 and the delete codedmessage actionable item 570, when activated, deletes a coded messageportion included in the coded messages portion 530.

The first coded message portion 540 includes a text field 541, a bypasssettings check box portion 542, an authorize all users check box 543, afirst user text field 544, a second user text field 545, an add useractionable item 546, and a delete user actionable item 547. The textfield 541 identifies text of the first coded message and enables a userto modify the text of the first coded message. The bypass settings checkbox portion 542 includes a “Yes” check box and a “No” checkbox that aremutually exclusive. The bypass settings check box portion 542 enables auser to indicate whether current settings of the mobile device should bebypassed when the mobile device receives the first coded message. Theuser may indicate that the current settings of the mobile device shouldbe bypassed by checking the “Yes” check box or may indicate that thecurrent settings of the mobile device should not be bypassed by checkingthe “No” check box.

The authorize all users check box 543 enables a user to authorize allusers to send the first coded message. When the authorize all userscheck box 543 is checked, the first user text field 544, the second usertext field 545, the add user actionable item 546, and the delete useractionable item 547 are not necessary and may be hidden or disabled. Thefirst user text field 544 identifies the first authorized user andenables a user to modify the first authorized user. The first authorizeduser may be identified by a username, a device identifier, a telephonenumber (as shown), and/or any other identifying information. The seconduser text field 545 identifies the second authorized user and is similarto the first user text field. The add user actionable item 546, whenactivated, adds another user text field for the first coded messageportion 540 and the delete user actionable item 547, when activated,deletes a user text field (e.g., the first user text field 544 or thesecond user text field 545) included in the first coded message portion540.

The second coded message portion 550 includes a text field 551, a bypasssettings check box portion 552, and an authorize all users check box553. The text field 551, the bypass settings check box portion 552, andthe authorize all users check box 553 operate in a manner similar to thetext field 541, the bypass settings check box portion 542, and theauthorize all users check box 543, respectively, except that the textfield 551, the bypass settings check box portion 552, and the authorizeall users check box 553 are associated with the second coded message.

The user interface 500 further includes a save actionable item 580 and acancel actionable item 590. The save actionable item 580, whenactivated, saves the coded messages settings currently displayed by theuser interface 500. The cancel actionable item 590, when activated,cancels the changes made in the user interface 500 and does not storeany changes made to the coded messages settings.

As shown in FIG. 5, a user may specify a variety of coded messagessettings. As shown, when a mobile device identified by device identifierCP9876 (510) and telephone number 123-123-1234 (520) receives a textmessage that includes the text FindLostPhone (541), the mobile devicebypasses current settings of the device (542) and invokes an audiblealert of the mobile device, but only if the message was sent fromtelephone number 123-321-4321 (544) or telephone number 123-123-4321(545). In addition, in another example, when a mobile device identifiedby device identifier CP9876 (510) and telephone number 123-123-1234(520) receives a text message that includes the text CallMe (551), themobile device does not bypass current settings (552) and invokes anaudible alert only if the audible alert is not disabled. In thisexample, all users sending the text message are treated in the samemanner (553).

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus embodying these techniquesmay include appropriate input and output devices, a computer processor,and a computer program product tangibly embodied in a machine-readablestorage device for execution by a programmable processor. A processembodying these techniques may be performed by a programmable processorexecuting a program of instructions to perform desired functions byoperating on input data and generating appropriate output. Thetechniques may be implemented in one or more computer programs that areexecutable on a programmable system including at least one programmableprocessor coupled to receive data and instructions from, and to transmitdata and instructions to, a data storage system, at least one inputdevice, and at least one output device. Each computer program may beimplemented in a high-level procedural or object-oriented programminglanguage, or in assembly or machine language if desired; and in anycase, the language may be a compiled or interpreted language. Suitableprocessors include, by way of example, both general and special purposemicroprocessors. Generally, a processor will receive instructions anddata from a read-only memory and/or a random access memory. Storagedevices suitable for tangibly embodying computer program instructionsand data include all forms of non-volatile memory, including by way ofexample semiconductor memory devices, such as Erasable ProgrammableRead-Only Memory (EPROM), Electrically Erasable Programmable Read-OnlyMemory (EEPROM), and flash memory devices; magnetic disks such asinternal hard disks and removable disks; magneto-optical disks; andCompact Disc Read-Only Memory (CD-ROM). Any of the foregoing may besupplemented by, or incorporated in, specially-designed ASICs(application-specific integrated circuits).

It will be understood that various modifications may be made withoutdeparting from the spirit and scope. For example, advantageous resultsstill could be achieved if steps of the disclosed techniques wereperformed in a different order and/or if components in the disclosedsystems were combined in a different manner and/or replaced orsupplemented by other components. As another example, the techniquesdescribed are not limited to invoking an audible alert and may initiateperformance of any function of the mobile device upon receipt of a codedelectronic communication. In one implementation, receipt of a codedelectronic communication may cause the mobile device to display amessage. The message may be, for example, a message offering a serviceto a user of the mobile device or a message suggesting the user of themobile device take a particular action. In another implementation,receipt of a coded electronic communication may cause the mobile deviceto download a file from a network. For example, a service provider maysend the mobile device a coded electronic communication to indicate thata software update is available and the mobile device may automaticallydownload and install the software update in response to the codedelectronic communication. In another example, a friend may send the userof a mobile device a coded electronic communication indicating that thefriend has obtained a new electronic media file (e.g., a picture, song,video, etc.) and the mobile device may automatically download the mediafile in response to receiving the coded electronic communication. Otherimplementations are within the scope of the description.

What is claimed is:
 1. An apparatus for automatically causing a mobilecommunication device to download a file using a designated remotedevice, comprising: a user interface configured to enable selection ofthe designated remote device and selection of a designated codecorresponding to downloading the file to the mobile communication devicefrom the designated remote device; a processor that is separate from thedesignated remote device and configured to: receive a coded electroniccommunication subsequent to selection of the designated remote deviceand the designated code; identify origination of the coded electroniccommunication; determine whether the identified originator of the codedelectronic communication is the designated remote device; identify acode included in the coded electronic communication, upon determiningthat the identified originator of the coded electronic communication isthe designated remote device; determine whether the identified codeincluded in the coded electronic communication is the designated code;and provide an instruction to cause the mobile communication device todownload the file, upon determining that the identified code included inthe coded electronic communication is the designated code.
 2. Theapparatus according to claim 1, wherein the processor is configured toidentify a code included in a coded electronic communication that is inthe form of one of a text message, a short message service message, aphone call, and an Internet Protocol (IP) communication.
 3. Theapparatus according to claim 1, wherein the processor is configured toidentify origination of a coded electronic communication from thedesignated remote device over a network as facilitated by a serviceprovider.
 4. The apparatus according to claim 3, wherein the serviceprovider facilitates direct communication between the designated remotedevice and the processor, and direct communication between the mobilecommunication device and the designated remote device, such that thedesignated remote device sends the coded electronic communicationdirectly to the processor, the mobile communication device directlydownloads the file from the designated remote device, and the mobilecommunication device includes the user interface and the processor. 5.The apparatus according to claim 3, wherein the service providerfacilitates indirect communication between the mobile communicationdevice and the designated remote device, such that the designated remotedevice downloads the file to the service provider, the service providerdownloads the file to the mobile communication device, and the serviceprovider includes the processor.
 6. The apparatus according to claim 1,wherein the user interface is configured to enable selection of multipledesignated codes corresponding to different types of files to bedownloaded to the mobile communication device, and the processordetermines whether the identified code included in the coded electroniccommunication is one of the designated codes, and downloads thecorresponding file to the mobile communication device, upon determiningthat the identified code included in the coded electronic communicationis one of the designated codes.
 7. The apparatus according to claim 6,wherein the user interface is configured to enable selection of multipledesignated remote devices, the user interface is configured to enableselection of different of the multiple codes for each of the multipledesignated remote devices; and the processor downloads the correspondingfile to the mobile communication device, upon determining that theidentified code included in the coded electronic communication is one ofthe designated codes for the corresponding designated remote device. 8.The apparatus according to claim 1, wherein the file for downloading tothe mobile communication device is a software update for the mobilecommunication device.
 9. The apparatus according to claim 1, wherein thefile for downloading to the mobile communication device is an electronicmedia file.
 10. The apparatus according to claim 9, wherein theelectronic media file includes data relating to at least one of apicture, a song, and a video.
 11. A non-transitory recording medium thatstores a program for automatically causing a mobile communication deviceto download a file using a designated remote device via a userinterface, the user interface being configured to enable selection ofthe designated remote device and selection of a designated codecorresponding to downloading the file to the mobile communication devicefrom the designated remote device, the program causing a computer toperform the following via a processor that is separate from thedesignated remote device: receiving a coded electronic communicationsubsequent to selection of the designated remote device and thedesignated code; identifying origination of the coded electroniccommunication; determining whether the identified originator of thecoded electronic communication is the designated remote device;identifying a code included in the coded electronic communication, upondetermining that the identified originator of the coded electroniccommunication is the designated remote device; determining whether theidentified code included in the coded electronic communication is thedesignated code; and providing an instruction to cause the mobilecommunication device to download the file, upon determining that theidentified code included in the coded electronic communication is thedesignated code.
 12. The non-transitory recording medium according toclaim 11, wherein the program causes the computer to identify a codeincluded in a coded electronic communication that is in the form of oneof a text message, a short message service message, a phone call, and anInternet Protocol (IP) communication.
 13. The non-transitory recordingmedium according to claim 11, wherein the program causes the computer toidentify origination of a coded electronic communication from thedesignated remote device over a network as facilitated by a serviceprovider.
 14. The non-transitory recording medium according to claim 13,wherein the service provider facilitates direct communication betweenthe designated remote device and the processor, and direct communicationbetween the mobile communication device and the designated remotedevice, such that the designated remote device sends the codedelectronic communication directly to the processor, the mobilecommunication device directly downloads the file from the designatedremote device, and the mobile communication device includes the userinterface and the program.
 15. The non-transitory recording mediumaccording to claim 13, wherein the service provider facilitates indirectcommunication between the mobile communication device and the designatedremote device, such that the designated remote device downloads the fileto the service provider, the service provider downloads the file to themobile communication device, and the service provider includes theprogram.
 16. The non-transitory recording medium according to claim 11,wherein the user interface is configured to enable selection of multipledesignated codes corresponding to different types of files to bedownloaded to the mobile communication device, and the program causesthe computer to determine whether the identified code included in thecoded electronic communication is one of the designated codes, anddownload the corresponding file to the mobile communication device, upondetermining that the identified code included in the coded electroniccommunication is one of the designated codes.
 17. The non-transitoryrecording medium according to claim 16, wherein the user interface isconfigured to enable selection of multiple designated remote devices,the user interface is configured to enable selection of different of themultiple codes for each of the multiple designated remote devices, andthe program causes the computer to download the corresponding file tothe mobile communication device, upon determining that the identifiedcode included in the coded electronic communication is one of thedesignated codes for the corresponding designated remote device.
 18. Thenon-transitory recording medium according to claim 11, wherein the filefor downloading to the mobile communication device is a software updatefor the mobile communication device.
 19. The non-transitory recordingmedium according to claim 11, wherein the file for downloading to themobile communication device is an electronic media file.
 20. Thenon-transitory recording medium according to claim 19, wherein theelectronic media file includes data relating to at least one of apicture, a song, and a video.
 21. An apparatus for automatically causinga mobile communication device to download a file using a designatedremote device, comprising: a user interface configured to enableselection of the designated remote device and selection of a designatedcode corresponding to downloading the file to the mobile communicationdevice from the designated remote device; means for receiving a codedelectronic communication that is transmitted subsequent to selection ofthe designated remote device and the designated code, the means forreceiving being separate from the designated remote device; means foridentifying origination of the coded electronic communication; means fordetermining whether the identified originator of the coded electroniccommunication is the designated remote device; means for identifying acode included in the coded electronic communication, upon determiningthat the identified originator of the coded electronic communication isthe designated remote device; means for determining whether theidentified code included in the coded electronic communication is thedesignated code; and means for providing an instruction to cause themobile communication device to download the file, upon determining thatthe identified code included in the coded electronic communication isthe designated code.
 22. A method for automatically causing a mobilecommunication device to download a file using a designated remote devicevia a user interface, the user interface configured to enable selectionof the designated remote device and selection of a designated codecorresponding to downloading the file to the mobile communication devicefrom the designated remote device, the method comprising: receiving acoded electronic communication, subsequent to selection of thedesignated remote device and the designated code, with a processor thatis separate from the designated remote device; identifying originationof the coded electronic communication; determining whether theidentified originator of the coded electronic communication is thedesignated remote device; identifying a code included in the codedelectronic communication, upon determining that the identifiedoriginator of the coded electronic communication is the designatedremote device; determining whether the identified code included in thecoded electronic communication is the designated code; and providing aninstruction to cause the mobile communication device to download thefile, upon determining that the identified code included in the codedelectronic communication is the designated code.