Method and apparatus for storing and retrieving profile data for electronic devices

ABSTRACT

A method and system for archiving and restoring data in a portable communication device. A first wireless communication connection is established between the communication device and a remote network capable of storing portable communication device data. The identity of an archival function to be performed is transmitted over the first communication connection. The indicated archival function is performed by transmitting data to or from the communication device. The function can be performed over the first wireless communication connection or a second wireless communication connection can be established for transmitting the information. The data can be converted by an upload converter into a format that is independent of the identity of the communication device. The converted data can be sent to other communication devices and reformatted for use by those devices. The first communication connection can be established by a communication device user or automatically.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 10/409,332, filed on Apr. 7, 2003 now U.S. Pat. No. 7,340,244,which claims the benefit of provisional application Ser. No. 60/370,640,filed Apr. 5, 2002 and provisional application Ser. No. 60/419,290 filedOct. 15, 2002, all of which is incorporated herein by reference inentirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to methods and apparatus for achieving andretrieving data from electronic devices.

2. Description of the Related Art

Cellular telephone handsets and PDAs (Personal Data Assistants) have hada similar evolution in that cell phone functions and applications havebeen growing rapidly. Cell phones may be personalized for contact lists,ring tones, text style, initial screen images, date and time display,and many other standard functions. In fact, in GSM phones there are overeighty entries for user-personalized data. In addition, personal data inthe form of phone book entries, stored images, audio files, favoriteradio stations, calendar and appointment books, financial data(electronic wallets), and stocks to watch are now being stored in thecell phone.

With such a wealth of stored data, a problem arises if the phone is lostor stolen, or ceases to function from electronic failure or dropping ofthe phone. In these events, all of the data may be lost and it can beextremely difficult and time consuming, if not impossible, to recreatethe data in a new device.

While some personal devices such as PDAs are routinely backed-up orsynchronized with a personal computer (PC), a PC is not always availablein the time or place where the phone is lost. Most cell phones do nothave a standard synchronization mechanism, and new standards such asSyncML only handle portions of the user data, require an Internetconnection and account, and a synchronization PC. These services alsorequire a high speed data connection, which may be expensive andunderutilized by the average consumer.

Other patents appear to try to make the data stored in mobile devicesmore transportable. Tsai (U.S. Pat. No. 6,128,372) and Baranowski(WO01/43408 A1) appear to describe devices that may be attached totelephones to transfer and store data. Jacobs (WO98/34203) appears todescribe a cell phone that stores financial account numbers and teachesan interface to allow the numbers to be selected for use in transactionsand transmitted to banking systems for verification. Jonsson (U.S. Pat.No. 5,583,917) appears to show how user service profiles, i.e. theprovider's record of services available to the user, can be stored andmoved around a wireless network to provide faster connection times.Kumagai (U.S. Pat. No. 6,075,983) appears to suggest how the personaldata for several operators may be stored within a wireless device andselected. Reference JP-A-21884/1994 appears to describe how a mastermachine connected via a cable channel can download profile settings forindividual operators to a slave machine. Henrick (U.S. Pat. No.5,940,752) appears to describe remote programming of data from a PC to awireless terminal.

The references above fail to provide an archival method for loading andreloading cell phone, PDA, or wireless device wherein:

1) No additional devices, software, or computers are required of theuser.

2) All interaction, user interfaces, and control are supplied by thewireless device.

3) Data is first uploaded out of the wireless device to populate theentries in the database.

4) Data stored in a remote network may be altered and/or downloaded intoanother device.

5) The remote network is independent of the actual wireless terminal,wireless network, or data transport layer used to make the connection.

SUMMARY OF ONE EMBODIMENT OF THE INVENTION Advantages of One or MoreEmbodiments of the Present Invention

The various embodiments of the present invention may, but do notnecessarily, achieve one or more of the following advantages:

the ability to restore data to a wireless device without additionaldevices, software, or computers being required of a user;

the ability to remotely store data associated with a wireless devicewithout additional devices, software, or computers being required of auser;

use data stored in a wireless device to populate entries in a remotedatabase;

alter data stored remotely;

transmit data stored remotely to a device different than the device fromwhich the data originally came;

convert wireless device data into a format independent of the identityof the wireless device;

provide a remote network that is independent of the actual wirelessterminal, wireless network, or data transport lawyer used to make theconnection between the wireless device and the remote network;

provide an archival system where all interaction, user interfaces, andcontrol are supplied by the wireless device;

allow data stored remotely to be transmitted to wireless devices ofmultiple users,

allow archival functions to occur by user action or to occurautomatically; and

allow archival functions to be initiated by a remote network or by thewireless device.

These and other advantages may be realized by reference to the remainingportions of the specification, claims, and abstract.

BRIEF DESCRIPTION OF AT LEAST ONE EMBODIMENT OF THE PRESENT INVENTION

In one embodiment, the present invention relates to a method of storingand retrieving information in a portable wireless device. Theinformation in the portable wireless device can be stored in a remotenetwork. Information can be transferred between the portable wirelessdevice and the remote network over a wireless communication connection.Preferably, an indicator is transmitted over the wireless communicationconnection; the indicator indicates the identity of an archival functionto be performed. For example, the indictor may direct information to bebacked up from the portable wireless to the remote network, or maydirect information to be restored to the portable wireless device fromthe remote network. The indicated archival process is then performed.The communication connection is preferably terminated when no longerneeded.

In another embodiment, the invention relates to backing-up and restoringpersonal data to and from a wireless telephone. According to thismethod, a wireless telephone is provided and a first wirelesscommunication connection is established between the wireless telephoneand a remote computer network. The identity of an archival function tobe performed is transmitted over the first wireless communicationconnection. Preferably, the first communication connection is thenterminated. A second wireless communication connection is establishedbetween the wireless telephone and the remote computer network.Preferably, the second wireless communication connection uses aback-channel communication protocol. The indicated archival function isperformed using the second wireless communication connection.

The archival function can include backing up data from the wirelesstelephone to the remote computer network. Preferably, personalinformation is transmitted and converted into a format that is notspecific to the wireless telephone prior to storage in the remotecomputer network. The archival function can also include restoring tothe wireless telephone from the remote network. Preferably, theinformation is passed through a style sheet prior to storage of theinformation in the wireless telephone. The style sheet is configured toformat the transmitted data into a format useable by the wirelesstelephone. The information is then stored in the wireless telephone and,preferably, the second communication connection is terminated.

In a presently preferred embodiment, the personal informationtransmitted between the wireless telephone and the remote network caninclude items such as phone book entries, stored images, audio files,favorite radio stations, calendars, appointment books, financial data,stocks to watch, and profile data.

In another embodiment, the present invention relates to a system forarchiving and restoring information in a portable communication device.The system includes a portable communication device. The portablecommunication device is configured to transmit and receive informationover a wireless connection. The portable communication device is alsoconfigured to store information.

The system also includes a remote network. The remote network isconfigured to transmit and receive information over a wirelessconnection. The remote network is also configured to store information.Preferably, the remote network stores information in a format that isnot specific to a particular wireless device.

The system also comprises personal information. The personal informationis stored in the remote network and/or the portable communicationdevice.

The system also includes a style sheet. The style sheet is configured toformat personal information into a format useable by the portablecommunication device.

The above description sets forth, rather broadly, a summary of at leastone embodiment of the present invention so that the detailed descriptionthat follows may be better understood and contributions of the presentinvention to the art may be better appreciated. Some of the embodimentsof the present invention may not include all of the features orcharacteristics listed in the above summary. There are, of course,additional features of the invention that will be described below andwill form the subject matter of claims. In this respect, beforeexplaining at least one preferred embodiment of the invention in detail,it is to be understood that the invention is not limited in itsapplication to the details of the construction and to the arrangement ofthe components set forth in the following description or as illustratedin the drawings. The invention is capable of other embodiments and ofbeing practiced and carried out in various ways. Also, it is to beunderstood that the phraseology and terminology employed herein are forthe purpose of description and should not be regarded as limiting.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is substantially a block diagram of the server/applicationsoftware of the invention.

FIG. 2 is substantially the sequence of events experienced by the userin normal operation.

FIG. 3 is substantially a flowchart of the system functions for the userto initiate the service and operation thereof.

FIG. 4 is substantially a schematic diagram of one embodiment of theinvention.

DESCRIPTION OF AN EMBODIMENT OF THE PRESENT INVENTION

In the following detailed description of the preferred embodiments,reference is made to the accompanying drawings, which form a part ofthis application. The drawings show, by way of illustration, specificembodiments in which the invention may be practiced. It is to beunderstood that other embodiments may be utilized and structural changesmay be made without departing from the scope of the present invention.

The present invention comprises a method whereby a user can make a callto a predefined telephone number, either a toll free (800 number) or aservice fee (900 number) service. The method may also be initiatedthrough a number shortcut (Short Number) or a menu entry stored in awireless device, such as a phone. If no service has been established forthat phone, the user may be prompted to establish service and supply apersonal identification number (PIN). Once service and personalidentification are established, the application may prompt whether theuser wishes to archive or restore their personal data. Once an option isselected, the call may terminate.

After termination, a second background transaction may begin with thephone, usually without any indication to the user. In most phones, thiswould occur over the Small Messaging Service (SMS) channel of the phone,but the service may be independent of the data transport layer used by aparticular service provider. Other channels may be available dependingon the phone service and type, for example GPRS, SyncML, and 3GPPservices. These back-channel communication applications may perform thearchive or restore function (collectively referred to as archivalfunctions), and a text message may be sent to the user at the completionof the process with notification of successful completion or errors.

The use of the same number for restore operations may allow a new phone(wireless phone, such cellular phones) or portable device to bepurchased anywhere in the world, and the profiles and data restored atany time. As a consequence of being able to restore any user profilebased on a phone number and a PIN, multiple people may share a singlephone, such as can happen when employees share an “on-call” cellular, orfamily members share a single phone, and each may restore his or herpersonal settings when in use.

As shown in FIG. 1, a server system 1 exists with a connection towireless service providers, Small Message Service Centers (SMSC), and/orthe Internet. Other connections may be required depending on thetechnology used by the service provider. The user's primary interface tothe system is through the user's wireless device 2. Wireless device 2may be a cellular phone, wireless phone, PDA, palm or laptop computer,and other similar devices known in the art. The wireless device maydrive contact to the system through the Initiator 3. Again, depending onthe preferred method of the service provider, the initiator sequence maybe an SMS message, a voice connection (800, 900, or local call, etc.), awireless Web browser, or JAVA/WAP application, for example.

In another preferred embodiment, a small application program may beinstalled on the cell phone (or other device) itself to provide a menuentry for the archive/restore operation, rather than dialing a storednumber. The method of contact initiation and the data carrier can be anysupported technology. Preferably, the originating phone number (andoptionally, PIN number) is supplied in the message. This part of theuser interaction is also detailed in FIG. 3 user initiate message 16 andas time sequence T0 in the timeline depicted in FIG. 2.

With continued reference to FIGS. 1 and 2, in T1, initiator 3 forwardsthe information in the contact message to the application server 1.

The server then begins communication with the wireless device. In FIG.3, the first operation 17 may be to determine if the phone numberforwarded by the initiator matches an existing account. If so, then theserver checks the message to see if the PIN number was automaticallytransmitted in the original message. This is optional to simplify theuser interface and remove one interaction step required of the user. Ifno account exists for this user, one may be established in step 19.Depending on the network provider, billing may be automaticallyestablished in the user account, or a credit card account number may berequired to establish service. In either case, two messages arepreferably sent to the user to (A) provide a final confirmation toestablish a new billing account, and (B) to establish a PIN number forthe account. If the user has changed phone numbers, the old phone numberused for the account may be entered in 27.

If the account exists and no PIN number was supplied, the user may beprompted to enter the identification number 18. If the number is invalidor the request times out, the user may be allowed a certain number oftimes, for example three tries, 20 to enter the correct PIN. If allattempts fail, an error message may be transmitted to the device, thecall may be terminated, and security may be notified 21.

With a valid account and PIN number, the system can now transmit a menuto the user, who can select the function to be performed. In anotherembodiment, the interface can be simplified by providing differentinitiator messages, menus, or numbers for each function.

The interface next establishes which archival function—usually Archiveor Restore—the user desires, 22. In order to support a number ofdifferent devices, a set of Style Sheets 7 (FIG. 1) may be read by theMenu Layer 8 to format the messages of the server and initiatorappropriately for a given wireless device. The system may also allowmultiple sets of data to be stored for each account.

With reference to FIG. 3, at 23, if the user has selected the Archivefunction, and if a data set already exists, an additional menu mayprompt the user to determine if the original data should be overwrittenor a new set established. If multiple sets already exists, the user mayselect to overwrite one of the existing sets or establish a new one.

For the Restore function 25, if no data sets exist an error message maybe initiated. If exactly one set exists, the system preferably proceedsdirectly to the Restore function. If multiple sets exist, the user maybe prompted through a menu to select which data set to restore. Once thefunction and all parameters are established, the initial call may beterminated.

In a presently preferred embodiment, the server then initiates abackground data communications channel with the wireless device,represented at T3 in FIG. 2. The backround communications channel may bethrough SMS messaging, GPRS data packets, SyncML protocol, or any othermeans as dictated by the wireless network provider. If an Archivefunction is selected (illustrated in FIG. 3 at 24), data from the devicemay be uploaded to the server and stored in the user's account.

With reference to FIG. 1, Upload Converter 4 may convert the data to ahardware-independent format before storage. Security in the form ofencryption of the data may be applied within the wireless device and inthe server system 5. In some cases the encryption function may be builtinto the wireless device, and in some cases additional software may needto be downloaded to the device before the data transfer. The purpose ofthe security is preferably to protect the user's data from eavesdroppingwhen traversing the wireless network.

If the Restore function is selected (FIG. 3, 26), the user's data may bedownloaded to the device. As with the Archive function, security may beapplied to encrypt the data stream. The Download Converter 10 may checkthe exact type of hardware that is receiving the data stream, and mayneed to reformat the stored data to be compliant with the device. Thisfunction may allow the user to change devices within the Archive/Restoresequence. This is often required in the case of uploading data from acellular phone and then restoring to a PDA, or if the user decides toupgrade to a new phone model after loss of the original phone.

Internet access over the World Wide Web 9 may also be supported,allowing the user the option to set up accounts, alter stored data, orinitiate services from their personal computer, as well as theirwireless device.

In another embodiment, a stored application program may automaticallyperform the archive procedure periodically, or whenever changes are madeto stored files.

In another embodiment, the archive service provider may work with adatabase supplied by the user, or a group of users, to upload, modify,and then download changes to the shared data. For example, a sharedcontact database for a company may be stored by the archive serviceprovider, and when the user's archive is completed it may be compared tothe company database and new numbers added to the user's phone list, andsubsequently downloaded, to automatically update his or her list.

In another preferred embodiment, personalization and user data from aportable device capable of being synchronized with a personal computermay be uploaded from the PC to the service provider to make that dataavailable for restoration at any time or place.

In another preferred embodiment, global or local changes to existingcontact data, such as an area code change or the change of a user'stelephone number, could be automatically propagated to all users whosecontacts database matches the change.

In another embodiment, the service could select the data transport layermost appropriate for each device. For example, most phones have theability to send and receive SMS messages, but only a few users actuallyrequest/pay for GPRS or World Wide Web access. The application mayselect the fastest/most appropriate carrier available on the givendevice.

In another embodiment, the archive and restore applications, and/or theaccess numbers associated with the applications, could be split suchthat a different application or a different access number are utilizedfor each.

In another embodiment, the handset application might not disconnect, butprovide a visible user interface and progress indication to the userthroughout the backup or restore operation.

In another embodiment, a voice-activated dialup service might be used toinitiate the application, or to establish accounts or initiate thedownload of the application software to the handset.

In another embodiment, an Internet browser, either on a personalcomputer or the wireless handset, could be used to initiate theapplication, establish or modify accounts, or download the applicationsoftware.

In another embodiment, security software could encrypt the data streamto prevent unauthorized interception of the user's data.

Computer source code (in the C++ programming language) illustratingvarious embodiments of the invention is provided in a concurrently filed(Apr. 7, 2003) provisional patent application. The entirety of thisprovisional application is hereby expressly incorporated by referenceinto the present application.

As seen in FIG. 4, the present invention also comprises a system 40 fortransferring information between personal devices. System 40 comprisesstorage device 42 that is used to store information from one or morepersonal device 44. Storage device 42 may be accessed by personal device44 via communication device 46 and many different communicationprotocols and methods of communication may be used, such as thosepreviously discussed. Storage device 42 may be a computer server incommunication with one or more hard drives or other mass storagedevices. The user of personal device 44 may indicate some or all ofinformation stored on storage device 42 as being available for download.This information may include any class or kind of information, such astext, pictures, videos, web site addresses, phone numbers, sound, music,locations, device preferences, programs and lists.

Once information is stored on storage device 42, it may be madeavailable for others to access. A user using personal device 50 may beable to use or download the information from storage device 42.

Various fees may be charged for allowing users to store or accessinformation. For example, a user may be charged a fee each time the useraccesses storage device 42 or downloads information from the device. Inthe alternative, information storage and access may be included as partof the normal service by a communication provider.

In another embodiment storage device 42 does not store the information,but only stores the location of the information. The information mayhave a unique address that is capable of directing users to theinformation. For example, a user of personal device 44 may indicate thatcertain information is to be made available to others. This may be doneby checking a box or putting a file with the information in a designatedfolder. The information may be available to various groups of people.For example, only designated people or devices may have access to theinformation and the accessing party may need a pass word or code toobtain access to the information.

The information may be assigned a unique name or address. Identifyinginformation is then transmitted to storage device 42. The identifyinginformation may include descriptive material that can be used by othersto locate the information. The descriptive material may include title,author, date, an abstract, etc. The descriptive material may begenerated by a user or it may be generated automatically by softwarethat is capable of searching for the appropriate information. A user ofpersonal device 50 may then become aware of the information by searchingthrough the device. Searching may be performed using key words. Inanother embodiment, the user of personal device 50 may become aware ofthe availability of the information through a text message, email orother notification.

Once personal device 50 obtains the address or location of theinformation, personal device 50 may initiate contact with personaldevice 44 directly through communication device 52 and the informationmay be accessed. In this way, storage device 42 is not used to providedirect access to the information.

System 40 may use proprietary communication networks that are notdirectly part of other well known communication networks, such as theInternet. This may provide greater security and privacy to users.

CONCLUSION

Although the description above contains many specifications, theseshould not be construed as limiting the scope of the invention but asmerely providing illustrations of some of presently preferredembodiments of this invention. Thus, the scope of the invention shouldbe determined by the appended claims and their legal equivalents ratherthan by the examples given.

What is claimed is:
 1. A method for backing up and restoring personaldata, comprising, but not necessarily in the order shown: if changes aremade to personal data stored in a first communication device,automatically establishing a first communication connection between thefirst communication device and a remote computer network, communicatingbetween the first communication device and the remote computer network,over the first communication connection, an identity of an archivalfunction to be performed, wherein the archival function to be performedcomprises backing up or restoring the personal data, and automaticallyperforming a backup function by receiving the changed personal data fromthe first communication device; automatically establishing a secondcommunication connection between a second communication device and theremote computer network; and automatically performing a restore functionusing the second communication connection by transmitting the changedpersonal data from the remote computer network to the secondcommunication device.
 2. The method of claim 1, wherein the personaldata is selected from a group consisting of phone book entries, storedimages, audio files, calendars, and appointment books.
 3. The method ofclaim 1, wherein each of the first and second communication connectionis established using a back-channel communication protocol, where theback-channel communication protocol is selected from the groupconsisting of Small Messaging Service, General Packet Radio Service(GPRS), Synchronization Markup Language (SyncML), and 3r^(d) GenerationPartnership Project (3GPP).
 4. The method of claim 3, further comprisingautomatically selecting a most efficient back-channel communicationprotocol, from a plurality of available back-channel communicatingprotocols available for use in communicating between the remote computernetwork and each of the first and second communication devices, forconducting the intended archival function.
 5. A system for archiving andrestoring personal data, the system comprising: a server beingconfigured to, when changes are made to personal data stored in a firstcommunication device: automatically establish a first communicationconnection performed between the first communication device and a remotecomputer network, and communicate between the first communication deviceand the remote computer network entity, over the first communicationconnection, an identity of an archival function to be performed, whereinthe archival function to be performed comprises backing up or restoringthe personal data, automatically perform a backup function by receivingthe changed personal data from the first communication device,automatically establishing a second communication connection between asecond communication device and the remote computer network, andautomatically performing a restore function using the secondcommunication connection by transmitting the changed personal data fromthe remote computer network to the second communication device; and astorage device for storing the changed personal data.
 6. The system ofclaim 5, wherein the first communication device is a wireless telephone.7. The system of claim 5, wherein the personal data is selected from agroup consisting of phone book entries, stored images, audio files,calendars, and appointment books.
 8. The system of claim 5, wherein thestorage device stores at least one data set, and wherein a plurality ofcommunication devices are associated with the data set and are capableof receiving a transmission of the data set transmitted from the storagedevice.
 9. The system of claim 5 further, comprising a remoteworkstation in communication with the remote network, wherein the remoteworkstation may be used to alter personal data stored in the storagedevice.
 10. The system of claim 9, wherein the remote workstation isconnected to the remote network by the internet.
 11. The system of claim5, further comprising an upload converter, the upload converterconfigured to convert personal data transmitted from the firstcommunication device from a first format to a second format prior to thepersonal data being stored on the storage device.
 12. The method ofclaim 1, wherein each of the backup function and the restore function isperformed without any indication to a user.
 13. The method of claim 1,wherein the changed personal data is stored in a user's account in astorage device.
 14. The method of claim 1, wherein the restore functionis performed periodically, or whenever changes are made to the personaldata of the first communication device.
 15. The system of claim 5,wherein each of the backup function and the restore function isperformed without any indication to a user.
 16. The system of claim 5,wherein the changed personal data is stored in a user's account in thestorage device.
 17. The system of claim 5, wherein the restore functionis performed periodically, or whenever changes are made to the personaldata of the first communication device.