Chain Mail – Hacker Tool to Harvest email addresses for Spam
~James Dunn

Apparently hackers use chain mail to harvest email addresses to sell to Spam companies.

http://hoaxbusters.ciac.org/

http://hoaxbusters.ciac.org/cgi-bin/mfs/www/hoaxbusters/archive?link=http://h…

Forward chain mail, incur more spam;

for yourself, your friends, and family as well.

Wingman development proposed to Dave Mallot – American Inventor contestant
~James Dunn

The Wingman development is significant because it provides the world with a means of meeting strangers and promoting friendships.

Entry for June 28, 2007 0756 MST

Dave,

Since you only have $50k for total development, the stand-alone Wingman device could simply be developed on a bluetooth enabled PDA like the Dell Axim. Hire a professional programmer to fully develop the software. $50k probably won’t be enough to both develop the hardware and software. Hardware development is very expensive. The PDA provides a touch screen and back lit color display to provide easy user interface.

If you make the program universal, it can be made to work with any bluetooth enabled PDA or bluetooth enabled cell phone; increasing market reach.

You are selling a service. The user can purchase hardware from you, but the service is the main source of revenue.

Optionally, your concept can be completely developed on an internet ready cell phone.

The internal GPS of the cell phone can place you in the vacinity ( +/- 25 feet) before entering the bar so the website server software knows who to couple up (GPS commonly loses signal in Urban environments).

Also, bluetooth enabled software can be used identically as your proposed stand-alone Wingman hardware device.

The additional advantage of using a cell phone over the Wingman stand-alone is that everyone already has a cell phone, they just need to pay the service fees. That puts your service immediately into the hands of millions of users instantly. By mentioning the website on American Inventor, you win whether or not you win the million dollars. You may choose to withdraw from the competition to CEO your own development.

Internet ready cell phones already have access to the internet. So a user would need to do no more than access your website using their cell phone. The monthly internet service fees may be more than they want to pay (quite expensive on some cell phones).

Optionally, the user could call a phone number (long distance calls are free on many cell phone plans) and a small program in the cell phone would be updated with the information regarding the people who are planning to attend a proposed social activity (bar, wedding, church, beach, concert, …) during the users proposed time span. This might be done by text messaging.

Using Text Messaging, you would type in the address of the event and the time span you intend to be there, for each event on your schedule. A text message would return with a list of possible matches. Providing the user with the knowledge of how fruitful attending the event might be.

Upon arriving, the cell phone uses bluetooth to find other users of the service.

Your website would grab the user’s GPS location, and any other bluetooth enabled users in the area and attempt to coordinate a match. A small program running on the users cell phone would look for other users with a similar program scanning for bluetooth. When all of the available bluetooth users have been polled, the cell phone automatically calls the website server to coordinate matches. Upon the matches being made, the user cell phone is updated with everyones matches and the matches are broadcast via bluetooth to all participating users. This helps to reduce the number of cell phone calls made to the server.

As people walk around, new bluetooth connections are made, and information is shared.

The small program in the cell phone then notifies the user when a match has been made.

The users use text messages sent to the server to enter their precise chosen location to meet others at the event. The user may optionally use the internet interface to browse more detailed match statistics (pictures, essays about themselves and what they are looking for, …) and choose whom they want to meet.

A text message would otherwise be sent to each cell phone with shorthand information about each potential match.

The user selects all the people they want to match with (ID numbers) and sends a text message to the server. A list of quick notes is generated by the small program which are the match ID numbers.

* Anyone mutually picking each other has priority.
* The next match is based upon proximity.
* The next match is based upon a person openly making themselves available.
* Persons may option to only be contacted if there is a mutual match.
* Persons may option not to be contacted at all (changed their mind after arriving).

A text message is sent to each person of a match and the location provided by the female is used as a meeting place.

Either user can decline the meeting at any time.

Each user can provide feedback as to the quality of the match up. If a person lied about themselves, then multiple similar comments from different users at different times would flag the questionable profile attributes. Repeated updates by the user and having similar discrepancies would automatically lower the reliablility rating of that user.

Persons leaving desparaging remarks about other users and having no other user at different times leaving similar remarks, lowers the persons reliability rating who made the remarks.

This provides a mechanism to encourage people to act responsibly.

Respectfully,

James Dunn
Engineer
Businessman

Some of my own inventive ideas
http://blog.360.yahoo.com/jamesbdunn?p=207

—————————-

Addendum:

Of course there are other issues related to making the software functional and user friendly.

The GPS feature of cell phones could be exploited to provide course and direction from user to user.

The website could provide users with the ability to meet before an event (wedding, party, …) so that they can attend together if they hit it off.

The website could provide a means to coordinate a public event (canoe trip, ethnic feastival, …)

Local bands can effortlessly keep in contact with their fans, allowing them to find their band whenever they are playing

At 5 cents per text message, 10 single people per event, 4 text messages per person, and over 1 million entertainment businesses in the United States, that would be a weekly revenue of about $2 million, or $104 million dollars a year.

Cell Phone Support for Pay-Your-Way Hitch Hiking
~James Dunn

I really like the idea of the cell phone becoming a universal tool. Remote Control, RFID credit card, security camera interface, PDA, …

wizard1961 had an idea of using the cell phone as an interface to provide for and promote paid hitch hiking; though wizard1961 did not provide any insight as to how to go about implementing his idea, it is still a great idea.

Keep in mind all this happens in software. The user simply selects stored destinations or enters one, and the Driver simply sees if the destination corresponds with their own. While the software guides both the Driver and Passenger effortlessly.

I am providing the following as a basis from which to build this proposed system.
_________________________________________________________

Preface:

Imagine living anywhere and being able to quickly get a ride at any time of the day or night with some security, and conversely being able to share the cost of transportation sometimes on your way from place to place. How many of us would simply cancel our car insurance until we were going on a trip. We might develop car pooling relationships more easily. Or maybe get rid of our cars altogether if we lived in a busy city. Single drivers could take advantage of car pool lanes. Traffic congestion could be reduced. The cost of fuel could effectively be reduced. Emissions could be reduced. We could afford to pay more for a car because our operating expenses would be reduced.

A thumb print, iris scan, or potentially a DNA scan security device can easily be incorporated into cell phones. This also provides support for broad categories of other applications. The security scan device would be used to initiate all transactions. Thus securing the cell phone from tempting a thief.

Iris Scan technology update

Current camera equiped cell phones that have a flash could incorporate Iris Scanner software into the cell phone without having to include any other hardware device. The camera in the cell phone would first take a picture of the person looking into the camera lens with the flash output set at a low intensity, then after a short time increase the flash to a higher intensity to dialate the eye a short time later; or vice versa. The average time it takes for a users eye to dialate a specific amount would be recorded by the cell phone software. If someone tried to use pictures to fake the camera, it wouldn’t work. This verifies the identity of the person, and that the person is still alive. Or optionally, the video mode could be used to scan the iris and detect the eye lid opening and closing within normal time frames, an alternate method of verifying that the person is alive and present.

Basic Operation

A Transportation Transaction (TT) service provider could promote the service on the internet interface of the cell phone. The GPS feature of the cell phone would identify the Passenger location, and the Passenger would use the internet interface to enter their desired destination. The TT Service would provide a moving map to guide the Driver to the Passenger, and to the desired destination. The TT Service would either be paid by a periodic flat fee or by a percentage of each transportation transaction. An alternative is that it would become a not for profit public service provided by the Federal Government; like the post office. Both Drivers and Passengers would be given a tax break to encourage using the system.

Rather than haggle over the price, an adjusted base price for the area would be in effect. Those Drivers wanting more (Commercial Taxi Drivers) would enter a base price and price per mile into their preferences. The cell phones would be linked to credit/debit cards and the TT service provider would be the only one with access to that information.

Participating Drivers would enter information about the vehicles they drive. Seating space available in the vehicle, storage space available in the trunk (easily remembered by computer for the make, model, and year of commercial cars and trucks), whether or not it is allowed to put packages in the seating areas, relative cleanliness of vehicle, and vehicle condition.

——————— Beginning of TT Service Sequence ——————-

The Driver would enter their destination into the TT Service before starting their vehicle.

The Passenger would enter their desired destination, number of people (each person would be required to enter their thumb print, iris scan, or DNA scan), and approximate number in grocery bag space needed, on their cell phone interface.

Based upon the Driver and Passenger preferences and current restrictions, the TT Service would automatically calculate the best way to get each Passenger to their destination; taking into account that an extra Passenger could reduce the enroute cost to each Passenger, and potentially provide greater payment to the Driver. If each extra Passenger pays 2/3 full price, the Driver receives more than if only picking up one Passenger. But this would fluctuate based upon the differing Passenger destinations. The TT Service would automatically select the best option for the Passenger and Driver, but would allow the Passenger and Driver to make exceptions (regular carpools for instance).

The TT Service would verify the GPS location of the Passenger is immediately adjacent to a roadway that allows for safe Passenger pickup. Persons more than 50 feet from a roadway would be instructed by the TT Service to stand where a vehicle can pick them up; and not process the transaction until the Passenger is in a location where they can legitimately be picked up. This helps to avoid competition with commercial taxi services where you can call for pickup at specific times from up in a high rise building; this keeps Passengers from causing Drivers to wait.

Commercial Taxi services benefit from this system because more people will stop driving because this service exists. On the occasions where no other Driver is available, the Passenger will have no other reasonable choice accept to use the Commercial Taxi service. Additionally, a Taxi having made a drop off can immediately be notified of another fare in their immediate vicinity and “bid” on the transaction; optioning to lower their fare rate to get a fare from where they are to where they need to go for their next passenger scheduled pickup; thereby reducing their operating expenses.

A notice would be sent by the TT service to all participating cell phones within the Passenger area with their destination displayed and the total amount to be paid to the Driver for the transaction if accepted. All Drivers who respond within 30 seconds are displayed on the Passenger cell phone as a list, sorted by the Driver statistical profile score, price, and estimated time of arrival. The Passenger can quickly look at questionable profile scores and choose the Driver of their choice.

After the Passenger commits their credit card to the transaction, and correspondingly commits the Drivers credit card to the transaction via the TT Service, the TT Service notifies both the Driver and Passenger of the transaction being implemented. The TT Service provides a simplified moving map on the Driver cell phone to guide the Driver to the Passenger location.

The Driver must arrive at the GPS location of the Passenger within 200% of the estimated time enroute, or the Driver is penalized 10% of the transaction and a new request is sent out to surrounding cell phones, and a notice to the Driver that their service is no longer needed, with 5% of the agreed upon transaction deposited into the Passenger credit card.

The TT Service monitors the GPS location of vehicles along the route to determine traffic jams, and either re-routes the Driver to the Passenger and extends the ETA; notifying both Driver and Passenger. Or, if the new ETA will exceed 300% of the original ETA the Passenger is provided the new ETA and is given an option of canceling the transaction at a cost of 10% of the transaction, so that they can choose a different Driver. The original Driver in the transaction receives no portion of the transaction; this discourages Drivers from stopping to pick up other passengers while enroute to the Passenger.

Within 1000 feet of the Driver arriving at the GPS location, the Passenger cell phone is rung by the TT service to notify them of the pending arrival of the Driver. This allows people to stand out of the weather until the Driver gets close. The Driver need only wait at the GPS location of the Passenger for two (2) minutes before departing and receiving the full amount of the transaction, regardless of their final destination unless the Passenger uses the cell phone camera to photograph the license plate number of the Driver vehicle or signals the TT Service of a related problem with the Driver or their vehicle (no place to sit, too dirty, no room for packages agreed upon, agressive nature of Driver, …) within that 2 minutes.

Upon arriving at the GPS location within the time agreed, the Passenger uses the camera built into their cell phone to both capture the license plate of the vehicle and to photograph the Driver of the vehicle. The Driver uses their cell phone camera to photograph the Passenger and their packages, all the pictures are automatically transmitted to the TT service to both document the transaction and provide for both the Driver and Passenger security, the Passenger verbally verifies the destination with the Driver, and boards the vehicle.

If the TT service notes that the vehicle does not match the Driver, the Driver picture does not match the picture on file, the Iris scan does not match the picture on file, or the iris scan identifies a criminal in a database, the transaction is terminated, the Passenger is advised to find alternative transportation, and the Driver is reported to the police. This prevents car theft of vehicles to provide taxi services and helps to capture criminals.

Conversely, if the Passenger picture does not match the iris scan, or the iris scan identifies a criminal in a database, then the Driver is advised not to let the Passenger in the car and to drive away, the police are notified as to the identity and whereabouts of the Passenger.

Optionally, car manufacturers could begin incorporating RFID chips in vehicles that cell phones would scan to allow further automation of this service.

Alternatively, the Passenger can cancel the transaction for any reason at a cost of 10% of the agreed upon rate. The Drivers record is annotated and pushed lower on the priority list and at any time the Passenger can note why they chose to cancel the transaction. If the Passenger does not continue on to their destination, then the notation is removed from the Drivers record and the Driver is awarded 10% of the agreed upon rate. A notation is put in the Passenger record and their priority for pickup is reduced and a standard notation is annotated for “changed their mind”.

A statistical profile is kept for each Passenger and Driver so that within one minute of a Passenger request for pickup, and the Drivers responding, the Passenger can select which Driver suits them based on the profile statistics, price, and ETA.

After the Passenger and Driver get on the road, a moving map guides the Driver to the Passenger desired location.

If the Driver deviates from the route by more than one missed turn, then the TT Service calls the Driver AND Passenger to verify their safety. Remember the thumb print initiates all transactions, so the identity of each person involved is known. If the Driver or Passenger fails to respond to the TT Service questions, then the Driver is notified to stop, the Passenger is notified to exit the vehicle, and each party is charged 50% of the transaction until the specifics are sorted out. If the Driver fails to stop or the Passenger fails to get out of the vehicle, the police are notified and vectored to the Drivers vehicle. If the Driver AND Passenger verify that a detour was required for road construction or additional passenger pickup, then the TT Service follows up periodically to ensure Passenger and Driver safety.

Correspondingly, Drivers can select whom they choose to pickup based upon Passenger profile statistics.

Upon arriving at the Passenger desired destination, the TT Service would prompt both the Driver and Passenger to take cell phone photos of each other, the packages, as necessary to document complaints, and enter the following information:

* Rate Your Experience with this Driver (0 – 9, 9 strongest)
o Friendly Nature of Driver
o Vehicle Cleanliness
o Vehicle Comfort
o Vehicle Mechanical Condition
o Vehicle Space Provided
o Overall Experience
o TT Service

* Rate Your Experience with this Passenger (0 – 9, 9 strongest)
o Friendly Nature of Passenger
o Passenger Cleanliness
o Passenger Destructive Nature
o Overall Experience
o TT Service

——————– End of TT Service Sequence ——————-

A separate TT Service webpage would allow Drivers to post their intentions to take city to city trips. Passengers desiring to make the trip with them would bid on the pricing and establish a pickup point. The TT Service would send reminder messages before the trip was to commence. Other coordinating issues would be incorporated as well.

Normal Sequence of Events for Passenger and Driver

Keep in mind all this happens in software. The user simply selects stored destinations or enters one, and the Driver simply sees if the destination corresponds with their own. While the software guides both the Driver and Passenger effortlessly.

From the Normal Passenger point of view:

1. Go to edge of roadway.
2. Access TT Service on cell phone.
1. Enter Destination.
1. If there are mulitple Drivers going near your destination, select one or more Drivers and prioritize them.
2. Do security scan (provide credit card info).
3. Wait for Pickup.
4. Photograph car and Driver.
5. Arrive at Destination.
1. Photograph Driver and rate the experience.

From the Normal Driver point of view:

1. Enter your destination before starting your vehicle.
2. Receive notice from TT Service of potential Pay-Your-Way Passenger.
1. See if desired Passenger destination coincides somewhat with Driver destination.
1. If there are multiple Passengers wanting to go your direction, select one or more.
2. Wait to see if one or more Passengers choose you
3. If selected, Accept Transaction.
4. Pull over momentarily to do security scan (enter credit card info).
3. Follow moving map directions to Passenger.
4. Photograph Passenger and packages.
5. Follow moving map to Passenger destination.
6. Arrive at destination.
1. Photograph Passenger and packages; rate the experience.

Alternative Uses for the Same System

This same system could be expanded to freight services so that truck loads are maximized and people with small trucks can provide shipping for people without trucks.

* The elderly and handicapped could have groceries, medications, and other vendor supplied materials delivered to their residence by pre-approved participating Drivers
o Federal and State programs could fund part of the transportation costs based on savings associated with current programs

The same system could be used by the police to automatically enforce restraining orders. If the two cell phones associated with the two people involved in a restraining order came within a certain distance, each would be asked to identify themselves, and directions would be given to avoid one another.

The same system could be used for parents to use to track who their kids associate with.

Employers could use the same system to track their employees and to look for ways to promote productivity.

* Maybe a group of employees interact on legitimate business so much that they should be grouped together.
* Employees making illegitimate trips for excessive socializing.
* Helping to keep employees with known personality conflicts away from each other.
* Establishing and controlling restricted areas to control excessive traffic or confidential materials.
* …

The same system could help employees coordinate complex tasking that requires different people with specific expertise to perform a function, in a particular sequence, with specific data, in more than one location at the same time.

* Production facility online calibration procedures to avoid shutting down the system and incurring great losses (this happens frequently in industry)
* Contractor coordination of multi-disciplines for managing Project Management timelines
o Real Estate Brokers
o Attorney’s
o Suppliers
o Surveyors
o Engineers & Architects
o Shippers
o Heavy equipment and crews
o Cement forms builders & foundation crew
o Plumbers
o Electricians
o Carpenters
o Hotshot Trucks and Drivers
o Landscapers
o …
* Networking Analyst procedures for installing complex networks
* Government employees can be tracked and coordinated to support public works without excessive waste
o Productivity issues
o Tracking theft
o Productivity Based Wage metrics
o Similar Project Management relationships as with contractors noted above
* Coordinating any meeting
* Coordinating any party
* Weddings
* Public Events
o this would allow people that didn’t even know an event was coming up to get involved based upon their preferences
o promoters could easily find people to volunteer to support an event
* Professionals could list themselves, expertise, and prices to support spur of the moment or planned needs by anyone
* Medical Centers would always know what expertise they had in-house at any moment
* Mass Casualty teams could form up and communicate more readily by knowing where all their resources are, and which people with cell phones were likely involved in the mass casualty.
o All medical, vendor, fire, police, as well as the government of local, state, adjacent state, and federal resources would be known and under control of the NSA
o The NSA would coordinate with FEMA, the FCC, FAA, CIA, FBI, and all the other government agencies to mitigate impact during mass casulty events.
* Emergency vehicle coordination to allow stop light timing modifications so that emergency response is more expeditious.
o During high speed chases, traffic is stopped in all directions to force fleeing vehicle off of roadway to stop weaving in and out around cars at high speed
o Drivers signaled to move right or left to clear a specific lane for an ambulance or police
o …

Call Back instead of On-Hold

November 27, 2008

Call Back instead of On-Hold
~James Dunn

Whether it is a cell phone, a land line, or voice over IP (internet phone), being put on hold is a major waste of time for all involved.

All telephone companies can easily provide a service to allow the called party to return your telephone call, without having to reveal their phone number (for those that want privacy), after coming back online from an On-Hold status.

How it would work:

  • You call someone and for some reason information needs to be looked up
  • The calling party puts you On-Hold
  • You press *2w8 and the phone system hangs up your phone
  • The calling party phone is still active
  • When the phone company computer hears the calling party pick up the phone
    • then the phone company calls you
    • and the calling party is told to “wait one moment please”
  • When you answer your phone you continue your conversation.

No more having to wait for long periods of time in a phone quque.

No more burning up needless cell phone minutes.

Practical Telepathy – Electronic Interface
~James Dunn

I read somewhere that every thought you have that you mentally vocalize, that you stress your vocal cords accordingly; subvocalization.

So if we were to monitor the electrical impluses going to the vocal cords with an EMG Array we could deduce much of what we cognitively are thinking. We would have to train the device by speaking normally into a microphone over time and then correlate the impulses from vocalizing our thoughts.

The intent is that in a public setting, a person can talk without being heard by anyone else.

Cell phone users could have a computer generated voice talk for them when when they are in a movie theatre and answering their cell phone.

Physicians have to dictate their experiences with patients and usually have to do it at the end of the day because there is no time during the day where they have privacy. They can not share patient information in any form, so they can not dictate their notes when other patients are around.

In engineering, cubicals are only 6′ x 8′ and that usually means you can hear everything that goes on around you. If you are dictating a manual or generating specs, you are going to be a little bothersome to the other engineers around you. Everyone does it, so everyone lives with it. But with a practical electronic telepathy device, it is unnecessary.

On aircraft, business people want to take notes using a dictaphone, but don’t out of consideration for the people around them.

In industry, an operator could direct, or be directed to perform, certain operations to be done in extremely noisy environments.

Command and control centers could monitor the mental health of their soldiers, and situational awareness of their environment.

The point isn’t that the user can not hear their own voice, the point is that your thoughts can be translated into words and operations that others can not detect.

~~~~~~~~~~~~~~~~

I’ve contacted an EMG Array manufacturer and this seems to be a very doable project.

In my concept, there is no need for speech to text conversion. The only thing the interface is supposed to do is to correlate phonics. A computer holds a dictionary of phonics (so to speak), a DSP processor, an audio amp, and a microphone. The microphone would feed a DSP processor and the computer would compare the spoken word phonic representations of the DSP with the phonic dictionary and create matches.

In parallel, the EMG Array would feed signals to one or more DSP processors and extract unique and differentiable information from the EMG signals, it wouldn’t matter much what the signal combinations were, just so long as they can repeatedly within a certain probability identify a particular phonic. Genetic algorithms come to mind.

The DSP processed signals from the EMG Array(s) would then create a weighted value in a neural network and associate the phonics identified by the microphone for phonic dictionary comparison.

Over time, the neural network would isolate the dominant signals from the DSP system monitoring the EMG Array to create a relatively high level of probability for producing the correct phonic.

Learning could be transparent, the person carries on their conversations and ignores the interface. Once the probabilities of EMG matches that of the Microphone interface for producing the correct phonics, the user is notified and can begin using the “telepathic” interface by simply setting up a bluetooth connection with a cell phone, or a mini plug connection to a dictaphone, …

Thus providing a telepathic interface for anyone to use.

Subsequently, if textual data or control outputs are desired, a computer can process the EMG generated voice files (mp3). “Dragon Naturally Speaking”, or some other voice to control program, could then produce the desired text and/or control outputs.

This is relatively easy to implement, so I am surprised it isn’t on the market already.

Cell Phone Universal Anything Remote Control
~James Dunn

All cell phones should have an additional menu added for turning the cell phone into a standardized remote control. With a 2D rocker for analog control; or better yet, install a MEMS chip to provide position and rotation tracking of the cell phone. A MEMS chip is a very small integrated circuit that houses multiple mechanical sensors. This same package can hold gyroscopes, accelerometers, atmospheric pressure sensor, temperature sensor, …

http://www.bosch-sensortec.com/content/language1/html/3474.htm

The intent of this remote control is to be effortless, highly secure, and universally applicable. The cell phone has a much broader area of coverage than any media we individually control. So we can potentially operate many of the things we have in our lives more effortlessly; and from almost anywhere.

  • television
  • stereo
  • garage door
  • security system
  • sprinkler system
  • start the car
  • lock and unlock the car
  • close/open the car windows
  • pop the trunk lid
  • check on the kids with a remote camera and microphone
  • turn on a plug for the coffee maker
  • interface with all of the stuff from X-10 Home Automation
  • start the microwave
  • turn lights on/off in the house
  • check on the status of a fax
  • turn on/off the front porch light
  • view security system breaches (history of which sensors tripped)
  • upload the content of a fax from your fax machine
  • open and close curtains/blinds
  • raise/lower thermostat
  • control the sprinklers
  • guide standardized servo equipment like lawnmowers carts, industrial tools and equipment
  • beep car horn remotely (find your car)
  • get GPS vector to your car (direction & distance)

  • video games

  • office equipment

Under the directives of Future Combat Systems the JAUS communications standards specifically detail the required data formats required for remote control and/or robotic interfacing. See Joint Architecture for Unmanned Systems

JAUS compliant equipment includes heavy equipment built by Caterpillar, programmable logic controllers (PLC) built by Allen-Bradley. Even John Deere tractors has an interest in the JAUS interface for its equipment.

See Family of Integrated Rapid Response Equipment

Soldiers commonly use military cell phones for communications. Add encryption and the menu overlay for each piece of military equipment and any soldier can remote that gear. Imagine a mobile stretcher pulling wounded off a field while under fire. Not dreaming, they already have prototypes.

Type the keywords ( jaus equipment robotic ) in any search engine and you can see some of the equipment that already uses the JAUS standard for remote control.

JAUS is mostly used for military and government related systems.

Whether or not a manufacturer chooses to use a data transfer standard is up to the manufacturer. JAUS does not specify the hardware requirements, only how the data package is setup. So if you want to use RF, infrared, sound, wired phone, cell phone, or any other form of telecommunication, you can. Yes, almost any control that you can think of can be setup to use the JAUS standards.

“The JAUS Working Group (made up of members from the U.S. government, industry and academia) defines methods for message passing and standards for component behaviors in order to be independent of technology, computer hardware, operator use, vehicle platform, and mission. SSC San Diego is an active member of the Working Group and has developed a JAUS interface for INL’s Robotic Control Architecture so that any JAUS-compliant Operator Control Unit (OCU) can control any robot using the INL on-board architecture.” See Transitioning Unmanned Ground Vehicle Research Technologies

This provides anyone with a cell phone, secure access to thousands of future remotely controlled devices.

Google Android

Google Android is an open architecture to be used on all Google compliant cell phones. Adding a JAUS configured Universal Remote Control to cell phones provides a free service for everyone to simplify their lives.

http://groups.google.com/group/android-challenge/browse_thread/thread/9b11ed0…

Other JAUS Resources

Open JAUS (active forum to promote JAUS as an open source)

http://www.openjaus.com/