Method and System for Remotely Operating and Viewing a Wireless Telephone Device

ABSTRACT

A method, system, and program product enable a user of one wireless telephone device to remotely view or operate another wireless telephone device. The method includes a first wireless device that receives a remote control command from a second wireless device, wherein the remote control command requests authorization for the second wireless device to operate the first wireless device. If the first wireless device authorizes the second wireless device to operate the first wireless device, both enter a remote control mode, wherein operations entered on the second wireless device are transmitted to the first wireless device for operation by the first wireless device. Also, if the first wireless device authorizes the second wireless device to view the operations of first wireless device, both enter a remote viewing mode, wherein operations entered on the first wireless device are transmitted to the second wireless device for viewing by the second wireless device.

TECHNICAL FIELD OF THE INVENTION

The present invention relates to wireless telephone devices in a callingnetwork and, more particularly, to a method and apparatus for remotelyoperating and viewing a wireless telephone device by another wirelesstelephone device.

BACKGROUND

Developers are constantly incorporating more and more features andtechnology into wireless telecommunication systems. In fact, wirelessbased phones have advanced tremendously in recent years. For example,wireless phones use a variety of digital modulation techniques, such asTime Division Multiple Access (TDMA) and Code Division Multiple Access(CDMA). Regardless of modulation technique, wireless devices have amyriad of features, such as electronic phonebooks, speed dialing, singlebutton voicemail access, and messaging capabilities. These are only asample of features that are capable of, or have already been implementedinto wireless devices. A particularly useful feature provides messagingcapability between wireless devices. The Short Message Services (SMS)feature used in CDMA, for example, allows a user of one wireless deviceto transmit alphanumeric messages to another wireless device. To do so,a digital processing section within the mobile phone's hardwaretransmits, receives, and processes the SMS messages, which are typicallyalphanumeric display messages. However, as described in U.S. Pat. No.6,301,484, service providers may also use SMS messages to remotelyactivate or update a mobile phone's software functions, such asvoicemail, caller ID, and configuration settings. The generalspecification for SMS in CDMA can be found in TelecommunicationsIndustry Association and Electronic Industries Association specificationTIS/EIA/IS-637, SHORT MESSAGE SERVICES FOR WIDEBAND SPREAD SPECTRUMCELLULAR SYSTEMS. The general specification for the CDMA phone systemcan be found in TIA/EIA/IS-95, MOBILE STATION-BASE STATION COMPATIBILITYSTANDARD FOR DUAL-MODE WIDEBAND SPREAD SPECTRUM CELLULAR SYSTEM.However, the implementation of SMS is not limited to CDMA.

Needless to say, given their increasing power and complexity, operatingmodern wireless telephones can be confusing if not difficult, especiallyfor new, non-computer savvy, or disabled users. Some users havedifficulty operating their mobile phones, even turning them on. Thus, itwould be advantageous for a caregiver, such as a parent or guardian, tobe able to temporarily and remotely activate, operate, configure, andview operations on a dependent's wireless telephone, using thecaregiver's wireless telephone, to assist the dependent. This would beparticularly useful when the caregiver is attempting to call thedependent, but the dependent has inadvertently turned off his phone oris having trouble operating it. Accordingly, it would be advantageous toprovide a system and method whereby a user of one wireless phone maycontrol, operate, configure, and view the operations of a secondwireless phone.

SUMMARY

Accordingly, an embodiment of the present invention provides a method,system, and program product whereby a user of one wireless telephonedevice can remotely view or operate another wireless telephone device.The method includes a first wireless device that receives a remotecontrol message from a second wireless device or remote computer,wherein the remote control message requests authorization for the secondwireless device to operate the first wireless device. In a secondembodiment, a remote viewing message requests authorization for thesecond wireless device to view the operations of the first wirelessdevice.

If the first wireless device authorizes the second wireless device tooperate the first wireless device, both enter a remote control mode,wherein operations entered on the second wireless device are transmittedto the first wireless device for operation by the first wireless device.Similarly, if the first wireless device authorizes the second wirelessdevice to view the first wireless device, both enter a remote viewingmode, wherein operations entered on the first wireless device aretransmitted to the second wireless device for viewing by the secondwireless device.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. However, the present invention will bebetter understood and its numerous objects and advantages will becomemore apparent to those skilled in the art by reference to the followingdrawings, in conjunction with the accompanying specification, in which:

FIG. 1 is an illustrative conventional wireless cellulartelecommunications network.

FIG. 2 is a pictorial representation of a wireless cellulartelecommunications system that may be used in an embodiment of thepresent invention.

FIGS. 3A and 3B illustrate a wireless telephone device that may be usedin an embodiment of the present invention.

FIG. 4 is a flowchart illustrating the operation and steps performed bya controlling wireless telephone device in accordance with an embodimentof the present invention.

FIG. 5 is a pictorial representation of a remote control window inaccordance with an embodiment of the present invention.

FIG. 6 is a flowchart illustrating the operation of the controllingwireless telephone device after it has received a remote control commandfrom a user.

FIG. 7 is a flowchart illustrating the operation of the controlledwireless device after it has received a remote control message inaccordance with an embodiment of the invention.

FIG. 8 is a follow-on flowchart to FIG. 7 illustrating the operation ofthe controlled wireless device after it has entered the remote controlmode in accordance with an embodiment of the invention.

FIG. 9 is a flowchart illustrating the process to enter a remote viewingmode by a “viewing” device in accordance with an embodiment of thepresent invention.

FIG. 10 is a pictorial representation of a remote viewing windowdisplayed on a “viewing” device in accordance with an embodiment of thepresent invention

FIG. 11 is a flowchart illustrating the operation of a “viewing” deviceafter it has received a remote viewing command from a user.

FIG. 12 is a block diagram depicting a computer system in which anaspect of the present method and system may be implemented.

DETAILED DESCRIPTION

FIG. 1 provides some background information on conventional cellulartechnology to be used in accordance with an embodiment of the presentinvention. Illustrative cellular telecommunication system 151 showsmultiple cells 152 and base stations 153 that a mobile telephonecustomer may encounter while traveling. Each cell 152 typically rangesin diameter from 2 to 10 miles. Each also has a base station 153 thatincludes one or more antenna towers and a radio transceiver (not shown).Each carrier in each city or region also operates a central officecalled the Mobile Telephone Switching Office (MTSO) 160. This officehandles all phone connections to other mobiles and to the normalland-based phone system (local office 162) and controls all of the basestations in the region. For example, MTSO 160 gathers traffic fromdozens of cells 152 and passes it on to local office 162. MTSO 160 alsoplaces calls to and from land based telephones to wireless customers,switches calls between cells 152 as mobile users travel across cellboundaries, and authenticates wireless customers before they make calls.For more information on conventional cellular layout and technology, seeCellular Telephone Basics: AMPS and Beyond, by Tom Farley with Mark vander Hoek, which is incorporated by reference herein.

Mobile phones communicate with each other using base stations 153 ondedicated paired frequencies called channels, which are typically in the800 MHz range and assigned by MTSO 160. Each call uses two channels, onefor voice and one for control. There are four frequency paths: “forwardcontrol path” from base station to mobile for control, “reverse controlpath” from mobile to base station for control, “forward voice path” frombase station to mobile for voice, and “reverse voice path” from mobileto base station for voice. Base stations 153 may use SMS messages totransmit identifying information or overhead on their respective forwardcontrol paths. Similarly, mobile phones may use SMS messages tocommunicate with each other and base stations 153 using their respectivereverse control paths. Each formats the SMS messages as Data BurstMessages (defined in TIA/EIA/IS-95), which may be directed to individualwireless devices as point-to-point messages or to many units asbroadcast messages.

FIG. 2 is a pictorial representation of a wireless cellulartelecommunications system 200 in which the illustrative embodiment maybe practiced. However, one skilled in the art will readily recognizethat other wireless configurations and networks, such as a mobilesatellite network, may be implemented without departing from the scopeand spirit of the invention. System 200 includes mobile telephonenetwork 210 and communications network 220 for providing communicationlinks between various devices and computers connected in system 200.Both may include various connection types such as, for example, wire,wireless, or fiber optic cable communication links. Further, system 200may include: two or more wireless devices 212 and 214 (also referred toas “mobiles”, “mobile phones”, “wireless telephones”, and other commonlyused terms), each having a basic display and user input mechanisms (seeFIG. 3 for more detail); at least one cellular base stationcommunications tower 216 (a “base station” includes a tower and atransceiver located at the center of a cell, whose primary purpose is tohandle all incoming and outgoing calls within the cell); one or moremobile telephone switching offices (MTSOs) 218, which communicate withbase station communication towers in a city or region for a particularcarrier and further control connections to a conventional land-basedpublic switched telephone network (PSTN) 226 via mobile telephonenetwork 210; and, optionally, one or more conventional computers 222having a processor, memory, and database storage (see FIG. 12). In thedepicted example, mobile telephone network 210 connects MTSO 218 withtower 216, which in turn communicates with various wireless devices,such as wireless devices 212 and 214.

Additionally, system 200 may include other servers, clients, and devicesnot shown. For example, other computers may communicate withcommunications network 220. In the depicted example, system 200 may beimplemented within the Internet with communications network 220representing a worldwide collection of networks and gateways that usethe Transmission Control Protocol/Internet Protocol (TCP/IP) suite ofprotocols to communicate with one another. At the heart of the Internetis a backbone of high-speed data communication lines between major nodesor host computers, consisting of thousands of commercial, government,educational and other computer systems that route data and messages. Ofcourse, system 200 may also be implemented using a number of differenttypes of networks, such as for example, an intranet, a local areanetwork, or a wide area network. FIG. 2 is intended as an example andnot as an architectural limitation for the present invention.

FIGS. 3A and 3B illustrate a wireless device that may be used as the“controlling”, “controlled”, “viewing” or “viewed” devices inembodiments according to the present invention. FIG. 3A shows wirelessdevice 300 having speaker 302, microphone 304, display 306, and keypad316, which allows the user to dial numbers or letters. Wireless device300 also includes antenna 320 for communication with the nearest basestation. Wireless device 300 may include other components common toconventional mobile telephones, such as: function buttons 308, whichallow the user to change telephone settings and perform and/or selectdifferent functions (e.g., retrieval of messages, view a call log, viewor change telephone book); scroll buttons (not shown), which allow theuser to scroll through a displayed list or menu; and call and receivebuttons 310, which allow the user to place and receive calls. Moreover,other wireless devices may be used that can dial into the cellulartelecommunications system 200 and transmit/receive SMS-type messages,such as some personal digital assistants (PDAs) and notebook computers.

FIG. 3B is a block diagram of an internal hardware configuration ofwireless device 300. Specifically, wireless device 300 includesprocessor 352, which is a general-purpose microprocessor operating underthe control of program instructions stored in memory 354. Thoseinstructions program processor 352 to control or view the operation ofanother wireless device (or vice versa), as described in more detailherein. System bus 356 connects processor 352 to transmitter 358,receiver 360, keypad 364, display 366, and audio processor 368. Keypad364 may be keypad 316 in FIG. 3A, and display 366 may be display 306,which may be liquid crystal or other known displays such as activematrix. Coupler 374 couples signals from transmitter 358 and receiver360 to/from a telephone signal to provide full duplex communication. Anantenna provides the telephone signal, such as antenna 320 in FIG. 3A.Audio processing circuit 368 provides basic analog audio outputs tospeaker 370 (which corresponds to speaker 302 in FIG. 3A) and acceptsanalog audio inputs from microphone 372 (which corresponds to microphone304 in FIG. 3A). Receiver 360 demodulates and decodes signals receivedfrom coupler 374. Transmitter 358 codes and modulates signals passed toit by processor 352, audio processor 368, keypad 364, and display 366.Power amplifier 362 amplifies the output of transmitter 358 to controlthe power level at which wireless device 300 transmits signals.

FIG. 4 is a flowchart illustrating the initial operation and programmedsteps performed by a “controlling” wireless device in accordance with anembodiment of the present invention. The controlling wireless device, orsimply controlling device, controls or attempts to control the operationof another wireless device (which, in turn, is referred to as the“controlled” device). Referring to FIGS. 3, 4, and 5, processing beginsat 402, where the controlling device (e.g., wireless device 214 in FIG.2) is programmed to determine if it has received a remote controlcommand from its user, wherein the remote control command initiates theprocess of remotely controlling another wireless device. A user mayinvoke this remote control command when, for example, he presses rightfunction button 308 on the controlling device (see FIG. 3A).Alternatively, any other suitable combination of user input buttonsmight be used to invoke the command. If the controlling device does notreceive the remote control command, control moves to step C in FIG. 9,where the controlling device determines if it has received a remoteviewing command (described herein). Returning to 402, if the controllingdevice received the remote control command from its user, at 408, thecontrolling device displays a remote control window (see Remote ControlWindow 500 in FIG. 5) on its display 306. Remote Control Window 500allows the controlling device's user to input and/or select one of aplurality of wireless devices to operate, each identified by itstelephone number in menu 504 (e.g., wireless device 506, 508, or 510).Moreover, in an alternative embodiment, a user of computer 222 (see FIG.2) may invoke the remote control command in substitution for thecontrolling device by making a selection on Remote Control Window 500,which computer 222 displays on display 1238 (see FIG. 12, describedherein). In turn, computer 222 sends a remote control message (describedherein) to the selected wireless device via communications network 220,MTSO 218, mobile telephone network 210, and tower 216 using SMSmessaging. Thus, computer 222 makes a remote control request for thecontrolling device.

At 410, the controlling device determines if its user would like toenter another telephone number into its graphical user interface (GUI).The user does this by checking box 518 and OK box 520 using thecontrolling device's scroll buttons (not shown). However, one skilled inthe art readily recognizes that user selections and input may be madeusing one or more of keypad buttons 316, function buttons 308, call andreceive buttons 310, and scroll buttons (not shown). If checked, theuser enters the telephone number using keypad 316 into a displayed menu(not shown), wherein processor 352 saves the number in memory 354 andadds it to menu 504 at 412. At 414, the controlling device determines ifits user has selected a displayed telephone number in menu 504. The userdoes this by checking box 506, 508, or 510, for example. Then, the usermay attempt to remotely operate the wireless device associated with theselected number by selecting OK box 512, cancel his selection byselecting “cancel” 514, or delete the number by selecting “delete” 516.If the user selects a telephone number and OK box 512, at 416, thecontrolling device enters a “remote control mode” and, at 418,processing moves to A in FIG. 6 (described herein). In one embodiment,upon entering the remote control mode, the controlling device'sprocessor 352 sets a “lock out” bit in its memory 354 such that all newattempted local operations, except for the remote control command,entered by its user through keypad 316 or other buttons are programmablylocked out for local operation until the controlling device exits theremote control mode. Otherwise, if the user did not select a number, at420, the controlling device determines if its user would like to exitthe remote control mode (or, if not currently in the remote controlmode, exit window 500). The user does this by checking box 524 and thenOK box 526 and, if so, the process terminates at 422. Cancel button 528allows the user to back out of the exit operation and return to 410.

FIG. 6 is a flowchart illustrating the programmed operation of thecontrolling device (e.g., wireless device 214) after it has received aremote control command from its user. Referring to FIGS. 3A, 3B and 6,processing begins at 602, where processor 352 of the controlling deviceconstructs, according to programmed instructions in memory 354, aninitial SMS remote control message to be transmitted on its reversecontrol path via transmitter 358, amplifier 362, coupler 374, andantenna 320 to the selected wireless device (herein “controlled device”,which may be wireless device 212) using, for example, wireless cellulartelecommunications system 200. One function of the initial SMS remotecontrol message is to request authorization from the controlled deviceto remotely operate and activate it. The first characters of the SMSremote control message are a predetermined start delimiter, defined as aseries of characters that normally do not occur at the start of amessage. For example, the start delimiter may be $$ZG, but the numberand sequence of characters are not limited and should be chosen tominimize false indications of SMS remote control messages. Apredetermined delimiter, such as a “$”, denotes the end of the currentfield and the beginning of the next. The next data field may identifythe model ID number of the intended controlling device, which will becompared with a list of acceptable model ID numbers stored in thecontrolled device's memory 354 to determine if the devices arecompatible. For example, it is possible that some older versions ofphones may not be able to control newer versions. Nevertheless, thecontrolled device can compare the intended controlling device's model IDnumber with acceptable model ID numbers stored in its memory to makethat determination. The next data field identifies the sender'stelephone number, followed by the next field, which may identify aminimum software version required to perform the process. Finally, thenext field may include a predetermined code that may be processed by thecontrolled device to perform certain features or functions (described infurther detail herein). Accordingly, an illustrative initial SMS remotecontrol message may be:

-   -   $$ZG$200A?4044441234$303$1000$$        where $$ZG indicates a remote control message, 200A indicates        the model ID number of the intended controlling device,        4044441234 is the telephone number of the controlling device,        303 indicates the minimum software version, 1000 indicates a        function to be performed, such as activate the controlled        device, and $$ indicates the end of the SMS remote control        message.

After the controlling device transmits the initial SMS remote controlmessage on its reverse control path to the controlled device, at 604,the controlling device determines if it has received an SMS rejectionmessage on its forward control path at receiver 360 from the controlleddevice (via cellular telecommunications system 200) before apredetermined amount of time has elapsed. The controlling deviceidentifies a message as being a rejection message by noting the presenceof a predetermined delimiter, followed by a telephone number of thecontrolled device. For example, the rejection message may be$$56$5121234567$$, where $$56 indicates a rejection, $ is the separationdelimiter between the data fields, 5121234567 is the telephone number ofthe controlled device, and the final $$ indicates the end of the lastdata field. The controlling device's processor 352 parses the messageaccording to the field delimiters within the message. If the controllingdevice receives a rejection message, at 606, the controlling deviceterminates the remote control process because it does not haveauthorization from the controlled device to remotely operate it. Thismay be because, for example, the controlled device does not havesuitable software to support remote control, the handsets areincompatible, and/or the controlling device simply does not havepermission. If the controlling device does not receive a rejectionmessage, at 608, in one embodiment, the controlling device determines ifit has received a busy message from the controlled device. For example,the busy message may be $$23$5121234567$$, where $$23 indicates thecontrolled device is busy, $ is the separation delimiter between thedata fields, 5121234567 indicates the telephone number of the controlleddevice, and the final $$ indicates the end of the last data field. Ifthe controlled device is busy, at 612, the controlling device determinesif its user wants to override the conversation of the controlled device.The controlling device's user does so by selecting an override box in amenu (not shown) displayed by the controlling device on display 306 inresponse to receiving the busy message. If selected, control moves to614, where the controlling device waits for its user to enter operationson its keypad 316 and other buttons to be sent to the controlled device(in turn, the controlled device will override and terminate its localconversation if it receives an operation from the controlling device).If not selected, at 610, the controlling device's processor 352 sets atimer and control returns to 602 after expiration of the timer, where itsends another initial SMS remote control message to the selected“controlled” device.

Returning to 614, the controlling device is in the remote control mode(see step 416 in FIG. 4), now has control of the controlled device, andwaits for an operation from its user via keypad 316 and function buttons308. As previously described, upon entering the remote control mode, thecontrolling device's processor sets a “lock out” bit in its memory 354such that all new local operations, except for the remote controlcommand, entered through its keypad 316 or other buttons areprogrammably locked out for local operation until the controlling deviceexits the remote control mode. Similarly, the controlled device is alsoin the remote control mode (described herein) and waits to receiveoperations, in the form of SMS remote control messages, while all localoperations entered through its keypad 316 and other buttons areprogrammably locked out. If an operation is received, at 616, thecontrolling device determines if the operation is a remote controlcommand (see step 402 in FIG. 4 above) from its user and, if so, controlmoves to B in FIG. 4 at 620. For example, if the user of the controllingdevice desires to exit the remote control mode, he inputs the remotecontrol command using a pre-determined combination of keypad 316 and/orfunction buttons 308. Otherwise, if the received operation is not aremote control command, at 618, the controlling phone sends theoperation to the controlled device via an SMS remote control message onantenna 320 to be processed by the controlled phone. Control returns to614, where the controlling device waits for another operation from itsuser via keypad 316 and function buttons 308. Thus, the controllingdevice functions, in essence, as if it were the other phone. Forexample, if a user dials a number on the controlling device, thecontrolling device transmits that number via an SMS remote controlmessage to the controlled device, whereupon the controlled device dialsit. In an optional embodiment, the user of the controlling device mayselectively toggle between operating the controlled device and thecontrolling device using a menu selection (not shown).

FIG. 7 is a flowchart illustrating operation of the controlled device(e.g., wireless device 212) in accordance with an embodiment of theinvention. At 702, the processor 352 of the controlled device isprogrammed to monitor its forward control path to determine if receiver360 has received an initial SMS remote control message, which willcontain a start delimiter (e.g., $$ZG). If a received SMS message doesnot contain the start delimiter, at 704, the controlled device processesthe SMS message as a conventional SMS message. If a received SMS messagedoes contain the start delimiter, at 706, the processor 352 of thecontrolled device parses the initial SMS remote control message andexamines the next field to determine if the retrieved model ID matchesits own. If no match, the hardware of the controlled device (i.e.,handset) may not be compatible with the controlling device. To make thatdetermination, the controlled device's processor 352 scans a databaselist (not shown) of compatible model ID numbers (stored in memory 354)for the received model ID. If not found, at 708, the controlled device'sprocessor 352 deletes the message based on non-compatibility between thehandsets and sends a rejection message to the controlling device.However, if there is compatibility, at 710, the controlled device'sprocessor 352 examines the next field of the remote control message,which is the telephone number of the controlling device, to determine ifthe controlled device has authorized the controlling device to remotelycontrol it. To make that determination, the controlled device'sprocessor 352 scans a standard database authorization list (not shown)in memory 354 for the controlling device's telephone number. If notfound, at 714, the controlled device may determine that the controllingdevice is not authorized, send a rejection to the sender, and delete themessage. However, if not found, in an alternative embodiment, the userof the controlled device may selectively authorize the controllingdevice to control the controlled device by selecting an “OK toAuthorize” box (not shown) displayed in a display window on thecontrolled device. If selected, the controlled device adds thecontrolling device's telephone number to the database authorization listand control moves to 712. Returning to 710, if the controlled devicelocates the controlling device's telephone number in the databaseauthorization list, at 712, the controlled device examines the nextfield (software version) to determine if it has at least the minimumsoftware version required to perform the process. To make thatdetermination, the controlled device's processor 352 scans a softwareversion list (not shown) of compatible software versions (stored inmemory 354) for the received software version. If not found, at 714, thecontrolled device determines that the message is not valid, sends arejection message to the sender, and deletes the message. If found, at716, in one optional embodiment, the controlled device determines if itis busy (i.e., its user is engaged in a local conversation). If notbusy, control moves to 720. If busy, at 718, in one optional embodiment,the controlled device sends a busy message to the controlling device andcontrol moves to 720. The controlled device's processor 352 determinesif it is busy by checking a “busy” bit in memory 354, which thecontrolled device sets during the time it uses transmitter 358. In turn,upon receipt of the busy message, the controlling device may choose tooverride the busy state of the controlled device (see 612 in FIG. 6).Returning to 720, whether busy or not, the controlled device enters theremote control mode, wherein it processes the last field of the initialSMS remote control message, waits for a remote operation (i.e., SMSremote control message) from the controlling device and, upon receipt,terminates any existing local operation. The last field of the initialSMS remote control message (e.g., code 1000) instructs the controlleddevice to: i) turn on (if it was turned off) by setting an “on” bit inmemory 354, resulting in power being applied to all components; ii) seta “lock out” bit in memory 354 so that any new local operations enteredthrough its keypad 364 and other buttons are locked out (however, anexisting “busy” operation may continue until it receives SMS remotecontrol messages from the controlling device); and iii) optionally senda SMS confirmation message to the controlling device. Again, forpurposes of remote control processing, the controlled device monitorsits forward control path for commands/messages (also referred to asoperations), from the controlling device, which will be in the form ofSMS remote control messages. As noted, if the controlled device is busywith a local operation when it receives an SMS remote control messagefrom the controlling device, it terminates the local operation (e.g.,telephone call) and processes the received message. At 722, processingcontinues at D of FIG. 8.

FIG. 8 is a follow-on flowchart to FIG. 7 illustrating the programmedoperation of the controlled device after it has entered the remotecontrol mode in accordance with an embodiment of the invention. At 802,the controlled device determines if it has received on its forwardcontrol path an SMS remote control message, which it will recognize ifthe first and second fields of a message are the start delimiter ($$ZG)and sender's telephone number, respectively. An optional encryptedsecurity code or password may be added in a third field for security. Ifnot, control returns to 802. If so, at 804, the controlled device parsesthe next field of the message. At 806, the controlled device determinesif the next field is one of numerous set feature codes, which are usedto change, select, or view standard mobile telephone features such asone touch dialing, telephone book entries, message retrieval andplayback, and call log. As an example, when the user of the controllingdevice selects the “Menu” button on his phone (e.g., by pressing theleft function button 308), the controlling device transmits, on itsreverse control path via antenna 320, an SMS remote control messagecontaining set feature code 100 to the controlled device. In response,at 808, the controlled device looks up code 100 in a database table (seeTable 1 below) in its memory 354, determines that it corresponds to theMenu feature, displays on its display 306 the results of selecting Menu(e.g., display “Messages”), and transmits those results (e.g.,“Messages”) on its reverse control path via antenna 320 using an SMSremote control message (e.g., $$ZG$5125551234$100$Messages$$, where5125551234 is the telephone number of the controlled device) to thecontrolling device. In turn, the controlling device recognizes thatmessage as an SMS remote control message from parsing the first twofields, recognizes code 100 as the Menu function, and then displays theresults of the Menu function (e.g., Messages) on its display 306.Similarly, if the user of the controlling device selects “Messages” onhis phone (e.g., by again pressing left function button 308), thecontrolling device transmits an SMS remote control message containingset feature code 110 to the controlled device. In response, at 808, thecontrolled device looks up code 110 in Table 1, determines that itcorresponds to the Messages feature, displays on its display 306 theresults of selecting “Messages” (e.g., display “Write messages”), andtransmits those results to the controlling device, which will alsodisplay them on its display 306. If the user of the controlling deviceselects “Add Entry” on his phone by pressing right function button 308and then enters “Jane Doe” using keypad 316, the controlling devicetransmits an SMS remote control message containing set feature code 120in one field, followed by the name of the entry in the next field, tothe controlled device. In response, the controlled device recognizescode 120 as an “Add Entry” feature by examining Table 1 and sets thename of the new entry to the value in the next field (e.g., Jane Doe).In this case, there are no results to send back to the controllingdevice. Returning to 806, if the next field of the SMS message is not aset feature code, the controlled device determines if it is a dialednumber. As an example, if the user of the controlling device dials anumber and selects call button 310, the controlling device transmits anSMS remote control message containing code 130 in one field, followed bythe dialed number in the next field, to the controlled device. Inresponse, at 810, the controlled device recognizes code 130 as a “dialnumber” function by examining Table 1, dials the number at 812 in thenumber field (e.g., 5124441234), and control returns to 804. One skilledin the art will readily recognize that the controlling device canreceive numerous functions and features (collectively referred to asoperations) from its user, associate a code with each of thoseoperations, and transmit those codes to the controlled device to beperformed by the controlled device. If the next field of the SMS remotecontrol message is not a dialed number, at 814, the controlled devicedetermines if the next field is an end-of-message delimiter (e.g., $$)and, if so, at 816, waits for a new SMS remote control message from thecontrolling device and control returns to D. If not an end-of-messagedelimiter, at 818, the controlled device determines if the next field isan end-of-remote control delimiter (e.g., $$$). If so, at 822, thecontrolled device exits the remote control mode and resumes localcontrol of the mobile phone handset. If not, at 820, control returns to804, where the controlled device parses the next field. Using thisprocess, the controlling device operates the controlled device. TABLE 1REMOTE CONTROL MODE Code Function/Operation Next Field 100 “Menu”Function; Display “Messages”; Send N/A results 110 “Messages” Function;Display “Write messages”, N/A Send Results 120 “Add Entry” Function; Setentry to next field Jane Doe 130 “Dial Number” Function; Dial number innext 5124441234 field 1000  Turn on mobile phone; set “on” bit to 1; N/Aset “lock out” bit to 1; $$ZG Indicates Remote Control Message N/A $$56Indicates a Rejection Message N/A $$23 Indicates a Busy Message N/A $$76Indicates a Confirmation Message N/A $$ Indicates end of message N/A $$$Indicates end of remote control mode N/A

FIG. 9 is a flowchart illustrating the initial operation and stepsperformed by a “viewing” wireless device in a remote viewing mode inaccordance with an embodiment of the present invention. Unlike theremote control mode, in one embodiment, the remote viewing mode allowseach user of a viewed device and a viewing device, respectively, tolocally operate their phone. However, when in the remote viewing mode,the user of the viewing device views or, alternatively, listens to theoperations of the viewed device. In another embodiment, when in theremote viewing mode, the viewing device locks out all local operations,except the remote viewing command (described herein), while the user ofthe viewed device can locally operate the viewed device. At 902, theviewing device (e.g., wireless device 214) determines if it has receiveda remote viewing command from its user. This command may be invoked, forexample, when the user presses the left function button 308 on theviewing device. Alternatively, any other suitable combination of userinput buttons might be used to invoke the command. Moreover, in anotherembodiment, the remote viewing command may be sent to the viewing deviceby computer 222, or any device capable of communicating with MTSO 218.In any event, if the viewing device did not receive the remote viewingcommand, processing terminates at 904. If received, at 903, the viewingdevice displays a remote viewing window (see window 1000 in FIG. 10) onits display 306. Window 1000 allows the user to input and/or select oneof a plurality of wireless devices, each identified by its telephonenumber in menu 1004, that he would like to view (e.g., wireless device1006,1008, or 1010).

At 906, the viewing device determines if its user would like to enteranother telephone number. The user does so by checking box 1018 usingscroll buttons (not shown) and left function button 308, and thenselecting OK 1020. The user may also cancel his selection by selectingcancel 1022. One skilled in the art readily recognizes that userselections and input may be made using one or more of keypad buttons316, function buttons 308, call and receive buttons 310, and scrollbuttons (not shown). If so, the user enters the telephone number usingkeypad 316 into a displayed menu (not shown), wherein the viewing devicesaves the number in memory 354 and adds it to menu 1004 at 908. At 910,the viewing device determines if its user would like to select adisplayed telephone number in menu 1004. To do so, the user selects box1006, 1008, or 1010, for example. Then, the user may attempt to view theoperation of the wireless device associated with the selected number byselecting OK button 1012, cancel his selection by selecting “cancel”1014, or delete the number by selecting “delete” 1016. If the userselects a telephone number and OK button 1012, at 912, the viewingdevice attempts to place itself in a “remote viewing mode” andprocessing moves to E in FIG. 11 (described herein). Otherwise, at 914,the viewing device determines if its user would like to exit the remoteviewing mode (or, alternatively, exit window 1000). The user does so byselecting box 1024 and OK 1026 and, if so, the process terminates at922. Cancel button 1028 allows the user to back out of the exitoperation.

FIG. 11 is a flowchart illustrating the operation of a viewing deviceafter it has received a remote viewing command from its user. Referringto FIGS. 3A and 11, processing begins at 1102, where processor 352 ofthe viewing device is programmed to construct an initial SMS remoteviewing message to be transmitted on its reverse control path viaantenna 320 to the selected wireless device (herein viewed device, whichmay be wireless device 212). One function of the initial SMS remoteviewing message is to request authorization from the viewed device toremotely view (or, alternatively, listen to) its operation. The firstcharacters of the initial SMS remote viewing request message are apredetermined start delimiter, defined as a series of characters thatnormally do not occur at the start of a message. For example, the startdelimiter may be $$AB, but the number and sequence of characters are notlimited and should be chosen to minimize false indications of remoteviewing messages. A predetermined delimiter, such as a “$”, denotes theend of the current field and the beginning of the next. The next datafield identifies the model ID number of the intended viewing device,wherein the viewed device looks up that model ID number in a databaselist (not shown) of compatible hardware devices (i.e., handsets). If theviewed device does not find the model ID number, then the two devicesare incompatible and the viewed device will send a rejection message tothe viewing device. The next data field identifies the viewing device'stelephone number, followed by the next field, which identifies a minimumsoftware version required by the viewed device to perform the process.Finally, the next field includes a predetermined code that may beprocessed by the viewed device to perform certain features or functions(described in further detail herein). Accordingly, an illustrativeinitial remote viewing message may be:

-   -   $$AB$200A?4044441234$303$1000$$        where $$AB indicates an SMS remote viewing message, 200A        indicates the model ID number of the viewing device, 4044441234        is the telephone number of the viewing device, 303 indicates the        minimum software version, and 1000 indicates a function to be        performed by the viewed device, such as activate the handset. $$        indicates the end of the message.

After the viewing device transmits the above initial SMS remote viewingmessage on its reverse control path, at 1104, it determines if it hasreceived an SMS rejection message on its forward control path from theviewed device before a predetermined amount of time has elasped. Therejection message may contain a predetermined delimiter indicating thatit is a rejection message, followed by the telephone number of theviewed device. For example, the rejection message may be$$56$5121234567$$, where $$56 indicates a rejection, $ is the separationdelimiter between the data fields, 5121234567 is the telephone number ofthe viewed device, and the final $$ indicates the end of the message.Optionally, the viewing device may determine if it has received an SMSconfirmation message from the viewed device, which may contain apredetermined delimiter indicating that it is a confirmation message(e.g., $$99), followed by the viewed device's telephone number. If theviewing device receives a rejection message, at 1106, it terminatesremote viewing processing because it does not have authorization fromthe viewed device to remotely view. This may be because, for example,the handsets are incompatible, the viewed device does not have softwareto support remote viewing, or the viewing device is simply notauthorized to perform such operations. If the viewing device does notreceive a rejection message (or optionally receives a confirmationmessage from the viewed device), it enters a remote viewing mode (alongwith the viewed device), whereby the viewing device will display (orplay) the operations entered on the viewed device. Accordingly, at 1108,for purposes of remote viewing, the viewing device determines if an SMSremote viewing message has been received from the viewed device (itdetermines if a message is a SMS remote viewing message by examining thefirst and second fields, which will be the start delimiter ($$AB) andviewed device's telephone number, respectively). If not, the user of theviewing device may exit the remote viewing mode at 1109 by inputting theremote viewing command. If so, at 1110, the viewing device parses thenext field of the message. At 1112, the viewing device determines if thenext field is a set feature code, which is used to change, select, orview standard mobile telephone features like one touch dialing,telephone book entries, and call log. As an example, when the user ofthe viewed device selects the “menu” button on his phone (e.g., leftfunction button 308), the viewed device transmits on its reverse controlpath an SMS remote viewing message including code 100 to the viewingdevice (see Table 2 below). In response, at 1114, the viewing devicelooks up the code in a database located in memory 354 (see databaseshown in Table 2) to determine the corresponding function or operation(e.g., Menu) and displays (or alternatively audibly plays on its speaker370) that function or operation on its display 306. In an embodiment, ifthe viewing device is currently busy handling a local operation when itreceives the SMS remote viewing message, it terminates that localoperation (not shown) and displays the remote operation. Control returnsto 1110, where the viewed device parses the next field of the SMS remoteviewing message.

In another example, if the user of the viewed device selects “Messages”on his phone (e.g., left function button 308), the viewed devicetransmits an SMS remote viewing message that includes code 110 to theviewing device (e.g., $$AB$5121234567$110$$, where 5121234567 is thetelephone number of the viewed device). In response, the viewing devicelooks up code 110 in Table 2, determines that the corresponding functionis “Messages”, and displays (or alternatively plays via audio processor368 and speaker 370) “Messages” on its display 366. If the user of theviewed device selects “Add Entry”, it transmits an SMS remote viewingmessage containing code 120 in one field, followed by the value (e.g.,name) of the entry in the next field, to the viewing device (e.g.,$$AB$5121234567$120$JaneDoe$$). In response, the viewing devicerecognizes code 120 as an “Add Entry” function by examining Table 2,displays it, and then displays (or plays) the value found in the nextfield (e.g., Jane Doe). Using this process, the viewing device displaysor plays the operation of the viewed device. TABLE 2 REMOTE VIEWING MODECode Function Next Field 100 “Menu” Function; Display “Menu” N/A 110“Messages” Function; Display “Messages” N/A 120 “Add Entry” Function;Display “Add Entry”; Jane Doe Display value in next field 130 “DialNumber” Function; Display value in next 5124441234 field 1000  Turn onmobile phone; set “on” bit to 1 N/A $$AB Indicates Remote ViewingMessage N/A $$56 Indicates a Rejection Message N/A $$99 Indicates aConfirmation Message N/A $$ Indicates end of message N/A $$$ Indicatesend of remote viewing mode N/A

If the next field was not a set feature code, at 1116, the viewingdevice determines if the next field is a dialed number. For example, ifthe user of the viewed device enters a number and selects call button310, in addition to dialing the number, the viewed device transmits anSMS remote viewing message containing code 130 in one field, followed bythe dialed number in the next field, to the viewing device (e.g.,$$AB$5121234567$130$5124441234$$). In response, the viewing devicedetermines that code 130 is a “dial number” function by examining Table2 and, at 1118, displays (or plays) the number in the next field (e.g.,5124441234). Again, if the viewing device is busy with a local operationwhen it receives the SMS remote viewing message, it terminates thatlocal operation and displays the remote feature. Control returns to1110, where the viewing device parses the next field. On the other hand,returning to 1116, if the next field was not a dialed number, at 1120,the viewing device determines if the next field is an end-of-messagedelimiter (e.g., $$) and, if so, control returns to 1108, where theviewing device waits for another SMS remote viewing message. If the nextfield is not an end-of message delimiter, control returns to 20 1110,where the viewing device parses the next field of the message.

FIG. 12 is a block diagram depicting a computer system 1200 for use inan embodiment of the present invention. A central processing unit (CPU)1210 connects to various other components by system bus 1212. Anoperating system 1241 runs on CPU 1210, provides control, andcoordinates the functions of the various components. Operating system1241 may be one of the commercially available operating systems, such asMicrosoft Windows Mobile or Palm OS, as well as UNIX, AIX, or LINUXoperating systems, and typically resides within RAM 1214 and diskstorage device 1220. Application programs 1240, controlled by thesystem, are moved into and out of the main memory, RAM 1214, from diskstorage device 1220. These programs include steps for transmittingcommands and operations to and from wireless devices 214 and 212 suchthat one may be capable of operating or viewing the other as describedabove.

ROM 1216 connects to CPU 1210 via bus 1212 and includes the basicinput/output system (BIOS) that controls the basic computer functions.RAM 1214, I/O adapter 1218, and communications adapter 1234 are alsointerconnected to system bus 1212. I/O adapter 1218 communicates withthe disk storage device 1220, which may be used to store databaseinformation (e.g., database storage). Communications adapter 1234interconnects bus 1212 with an outside network enabling the dataprocessing system to communicate as respectively described above throughthe Web, Internet, Telco wireless network, or intranet. I/O devices alsoconnect to system bus 1212 via user interface adapter 1222 and displayadapter 1236. Keyboard 1224 and mouse 1226 connect to bus 1212 throughuser interface adapter 1222. It is through such input devices that thevendor may interactively receive or control E-Mail messages or otherinformation. Display adapter 1236 includes a frame buffer 1239, which isa storage device that holds a representation of each pixel on display1238. Images may be stored in frame buffer 1239 for display on monitor1238 through various components, such as a digital to analog converter(not shown) and the like. By using the aforementioned I/O devices, theuser is capable of inputting information to the system through keyboard1224 or mouse 1226 and receiving output information from the system viadisplay 1238.

While the invention has been particularly shown and described withreference to various embodiments, it will be understood by those skilledin the art that various changes in form and detail may be made hereinwithout departing from the spirit and scope of the invention.

1. In a wireless telecommunications network, a method of remotelyoperating a first wireless telephone device by a second wirelesstelephone device, comprising: receiving a remote control message by thefirst wireless telephone device; in response to receiving the remotecontrol message, entering by the first and second wireless telephonedevices, a remote control mode, wherein all local operations, except foran end of remote control command used to exit the remote control mode,entered on a keypad or buttons of the second wireless telephone deviceare transmitted to the first wireless telephone device for operation bythe first wireless telephone device; and in response to entering theremote control mode by the first and second wireless telephone devicesperforming the following steps; locking out, by the first wirelesstelephone device, all local operations entered on a keypad or buttons ofthe first wireless telephone device, such that the first wirelesstelephone device is solely operated by the second wireless telephonedevice; locking out, by the second wireless telephone device, all localoperations entered on the keypad or buttons of the second wirelesstelephone device, except for the end of remote control command;operating, by the first and second wireless telephone devices, in theremote control mode until the end of remote control command is enteredon the second wireless telephone device; and in response to the remotecontrol command being entered on the second wireless telephone device,exiting, by the first and second wireless telephone devices, the remotecontrol mode and resuming local operation by each of the first andsecond wireless telephone devices.
 2. The method of claim 1, wherein theremote control message requests authorization for the second wirelesstelephone device to operate the first wireless telephone device, and thefirst and second wireless telephone devices enter the remote controlmode in response to the first wireless telephone device authorizing thesecond wireless telephone device to operate the first wireless telephonedevice.
 3. The method of claim 1, wherein the receiving step furthercomprises receiving, by the first wireless telephone device, the remotecontrol message from one of the second wireless telephone device or acomputer; and wherein the exiting step further comprises receiving, bythe first wireless telephone device, a second remote control messagefrom the second wireless telephone device or the computer, therebyresuming local operations by the first wireless telephone device.
 4. Themethod of claim 2, wherein the remote control message comprises a SMSmessage having a delimiter to indicate a beginning of the remote controlmessage and one or more of a hardware identification of the secondwireless telephone device and a minimum software version.
 5. The methodof claim 4, further comprising: comparing by the first wirelesstelephone device at least one of the hardware identification of thesecond wireless telephone device and the minimum software version with ahardware identification list and software version of the first wirelesstelephone device, respectively; and in response to locating the hardwareidentification in the list and determining that the software version ofthe first wireless telephone device is equal to or greater than theminimum software version, authorizing by the first wireless telephonedevice the second wireless telephone device to operate the firstwireless telephone device.
 6. The method of claim 1, wherein the remotecontrol message comprises a turn-on code, wherein the first wirelesstelephone device turns on if in an off state in response to processingthe turn-on code.
 7. The method of claim 2, wherein the first wirelesstelephone device determines whether the second wireless telephone deviceis authorized by comparing an identification of the second wirelesstelephone device contained in the remote control message with anauthorization list.
 8. The method of claim 1, further comprising: inresponse to the first wireless telephone device receiving the remotecontrol message and in response to the first wireless telephone devicebeing busy, sending by the first wireless telephone device, a busycommand to the second wireless telephone device; in response toreceiving the busy command, determining, by the second wirelesstelephone device, whether the second wireless telephone device shouldoverride the first wireless telephone device; in response to determiningthat the second wireless telephone device should override the firstwireless telephone device, overriding, by the second wireless telephonedevice, the busy command and proceeding to the entering step; inresponse to determining that the second wireless telephone device shouldnot override the first wireless telephone device, setting a timer; andin response to expiration of the timer, transmitting, by the secondwireless telephone device, the remote control message to the firstwireless telephone device and returning to the receiving step.
 9. Themethod of claim 1, further comprising: receiving, by the first wirelesstelephone device, a message having two or more fields from the secondwireless telephone device; determining, by the first wireless telephonedevice, whether the message includes a set feature code in a firstfield; in response to receiving the set feature code, setting a functionassociated with the set feature code to a value in the next field orperforming the function; determining, by the first wireless telephonedevice, whether the message includes a telephone number to be dialed;and in response to the message including a telephone number to bedialed, dialing, by the first wireless telephone device, the telephonenumber.
 10. In a wireless telecommunications network, a method forremotely observing operations entered on a first wireless telephonedevice by a second wireless telephone device, comprising: receiving aremote viewing message by the first wireless telephone device, whereinthe remote viewing message requests authorization for the secondwireless telephone device to remotely observe operations of the firstwireless telephone device; in response to the first wireless telephonedevice authorizing the second wireless telephone device, entering, bythe first and second wireless telephone devices, a remote viewing mode;in response to entering by the first and second wireless telephonedevices, the remote viewing mode, performing the following steps:locally operating, by the first wireless telephone device, a first localoperation entered on the first wireless telephone device andsimultaneously transmitting, by the first wireless telephone device, asecond remote viewing message corresponding to the first local operationto the second wireless telephone device for audible or visual display,but not operation, of the first local operation by the second wirelesstelephone device; and locking out, by the second wireless telephonedevice, all local operations entered on a keypad or buttons of thesecond wireless telephone device, except for a remote viewing commandused to exit the remote viewing mode, such that the second wirelesstelephone device remotely observes all operations entered on the firstwireless telephone device; operating, by the first and second wirelesstelephone devices, in the remote viewing mode until the remote viewingcommand is entered on the second wireless telephone device; and inresponse to the remote viewing command being entered on the secondwireless telephone device, exiting by the first and second wirelesstelephone devices, the remote viewing mode and resuming local operationby the second wireless telephone device.
 11. The method of claim 10,wherein the receiving step further comprises receiving by the firstwireless telephone device the remote viewing message from one of thesecond wireless telephone device or a computer.
 12. The method of claim10, wherein the remote viewing message comprises a SMS message having adelimiter to indicate a beginning of the remote viewing message and oneor more of a hardware identification of the second wireless telephonedevice and a minimum software version.
 13. The method of claim 12,further comprising: comparing by the first wireless telephone device thehardware identification of the second wireless telephone device andminimum software version with a hardware identification list andsoftware version of the first wireless telephone device, respectively;in response to locating the hardware identification on the list anddetermining that the software version of the first wireless telephonedevice is equal to or greater than the minimum software version,authorizing by the first wireless telephone device the second wirelesstelephone device to view or play operations on the first wirelesstelephone device.
 14. The method of claim 10, wherein the remote viewingmessage comprises a turn-on code, wherein the first wireless telephonedevice turns on in response to processing the turn-on code.
 15. Themethod of claim 10, wherein the first wireless telephone devicedetermines whether the second wireless telephone device is authorized bycomparing an identification of the second wireless telephone devicecontained in the remote viewing message with an authorization liststored in the first wireless telephone device.
 16. The method of claim10, further comprising: receiving, by the second wireless telephonedevice, the second remote viewing message having two or more fieldscorresponding to at least the first local operation, from the firstwireless telephone device; determining by the second wireless telephonedevice, whether the second remote viewing message includes a set featurecode in a first field; in response to receiving the set feature code,audibly or visually outputting, but not operating, by the secondwireless telephone device, a feature associated with the set featurecode; in response to a value being received in the second field that isassociated with the set feature code, audibly or visually outputting bythe second wireless telephone device the value in the second field;determining, by the second wireless telephone device, whether the secondremote viewing message includes a telephone number to be dialed by thefirst wireless telephone device; and in response to the second remoteviewing message including a telephone number to be dialed, audibly orvisually outputting, but not dialing, by the second wireless telephonedevice, the telephone number.
 17. The method of claim 10, wherein thewireless telecommunications network is cellular. 18-27. (canceled)