Mobile communication device monitoring systems and methods
First Claim
1. A mobile communication device, comprising:
- a memory configured to store mobile programs and program data associated with mobile applications;
a processor, coupled to the memory and configured to execute the mobile programs stored in the memory;
a communications port configured to wirelessly communicate with a wireless communication device; and
wherein the mobile applications comprise a monitoring program configured to;
receive permission rules on connection to the wireless communication device, wherein the permission rules comprise data services uses allowed using the mobile communication device based on activities of the mobile communication device, and wherein the permission rules are set by an administrator of the wireless communication device prior to the connection to the wireless communication device;
monitor device activity of the mobile communication device, wherein the device activity comprises at least one data services use for the mobile communication device based on at least one activity performed by the mobile communication device, and wherein the at least one activity comprises identification of the at least one data services use; and
determine whether the at least one data services use is allowed based at least in part on whether the identification of the at least one data services use is found in the permission rules for the data services uses allowed based on the activities of the mobile communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services on a mobile communication device, such as communications, application use, functionality, operability, and/or presence, may be monitored against rules available from a central data center repository. The rules may be enforced on the mobile communication device through a token device in short range wireless communications with the mobile communication device. Thus, the token device may prevent certain data services of the mobile communication device within a local area to the token device. An alert may be provided to an administrator when unauthorized data services are detected and/or a message may be sent to a third party to prevent the unauthorized activity.
-
Citations
38 Claims
-
1. A mobile communication device, comprising:
-
a memory configured to store mobile programs and program data associated with mobile applications; a processor, coupled to the memory and configured to execute the mobile programs stored in the memory; a communications port configured to wirelessly communicate with a wireless communication device; and wherein the mobile applications comprise a monitoring program configured to; receive permission rules on connection to the wireless communication device, wherein the permission rules comprise data services uses allowed using the mobile communication device based on activities of the mobile communication device, and wherein the permission rules are set by an administrator of the wireless communication device prior to the connection to the wireless communication device; monitor device activity of the mobile communication device, wherein the device activity comprises at least one data services use for the mobile communication device based on at least one activity performed by the mobile communication device, and wherein the at least one activity comprises identification of the at least one data services use; and determine whether the at least one data services use is allowed based at least in part on whether the identification of the at least one data services use is found in the permission rules for the data services uses allowed based on the activities of the mobile communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A wireless device comprising:
-
a non-transitory memory configured to store information associated with permission rules for data services uses allowed on a mobile communication device based on activities of the mobile communication device, wherein the permission rules are set by an administrator of the wireless device prior to connection with the mobile communication device by the wireless device; a communications port configured to wirelessly communicate with the mobile communication device; and a hardware processor coupled to the non-transitory memory and configured to read the non-transitory memory to; detect the mobile communication device is in a proximity to the wireless device; wirelessly connect to the mobile communication device through the communications port; and configure the mobile communication device using the permission rules through the communications port, wherein at least one data services use is allowed or restricted based at least in part on whether an identification of the at least one data services use from at least one activity performed by the mobile communication device is found in the permission rules for the data services uses allowed based on the activities of the mobile communication device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method, comprising:
-
receiving an identifier (ID) for a wireless device, wherein a mobile communication device connects to the wireless device based on device activity of the mobile communication device, wherein the device activity comprises at least one data services use for the mobile communication device based on at least one activity performed by the mobile communication device, and wherein the at least one activity comprises identification of the at least one data services use; retrieving the device activity from the mobile communication device; accessing permission rules for at least one of the mobile communication device and the wireless device, wherein the permission rules comprise data services uses allowed using the mobile communication device based on activities of the mobile communication device; and
wherein the permission rules are set by an administrator of the wireless device prior to connecting with the mobile communication device by the wireless device; anddetermining whether the at least one data services use is allowed based at least in part on whether the identification of the at least one data services use is found in the permission rules for the data services uses allowed based on the activities of the mobile communication device. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A method comprising:
-
receiving input from an administrator for a wireless device, wherein the input comprises rules data for use of a mobile communication device in a proximity to the wireless device, and wherein the input is received by the wireless device from the administrator of the wireless device prior to the wireless device connecting with the mobile communication device; establishing permission rules for the wireless device based on the input, wherein the permission rules comprise data services uses allowed using the mobile communication device based on activities of the mobile communication device; connecting to the wireless device; and configuring the wireless device with the permission rules, wherein the wireless device configures the mobile communication device to allow or restrict at least one data services use of the mobile communication device based at least in part on whether an identification of the at least one data services use from at least one activity performed by the mobile communication device is found in the permission rules for the data services uses allowed based on the activities of the mobile communication device. - View Dependent Claims (36, 37, 38)
-
Specification