Systems, devices, software, and methods for location based device and application management
First Claim
1. A system comprising:
- an administrator device including at least one processor running a device management system administrator application to;
communicate with a user device;
detect when the user device attempts to access a controlled area or controlled network by receiving a connection request or message from the user device including a MAC address or other device identifier; and
determining location information associated with the user device indicating the user device is in or near the controlled area or on the controlled network;
perform an inventory of applications on the user device;
identify restrictions for each application when the user device is in the controlled area or on the controlled network,the restrictions associated witha white list for applications with unrestricted use, and at least one ofa black list for applications that are not allowed to be used,a gray list for applications that have some restrictions on use, anda banned list for applications that are deleted upon detection;
assign each application to a list based on the identified restrictions;
impose the identified restrictions for each application on the user device when the user device accesses the controlled area or network; and
remove the identified restrictions on the applications on the user device when the user device is no longer accessing the controlled area or network.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, devices, software, and methods of the present invention enable users and owners/operators, such as employers, vendors, and other administrators to restrict the accessibility and use of applications residing on mobile and portable user devices, when those user devices are near or within a controlled area, such as non-residential and residential properties, and/or access a controlled network, either locally or remotely. The device management system may impose restrictions on one or more user devices that may include, for example, one or more of disabling applications, preventing applications from being enabled, deleting applications, limiting or preventing applications from being downloaded, and/or performing application inventories on the user device. When the user device is no longer in, on, and/or around their facilities and/or networks, the device management system may remove or impose the restrictions on the user device.
25 Citations
16 Claims
-
1. A system comprising:
an administrator device including at least one processor running a device management system administrator application to; communicate with a user device; detect when the user device attempts to access a controlled area or controlled network by receiving a connection request or message from the user device including a MAC address or other device identifier; and determining location information associated with the user device indicating the user device is in or near the controlled area or on the controlled network; perform an inventory of applications on the user device; identify restrictions for each application when the user device is in the controlled area or on the controlled network, the restrictions associated with a white list for applications with unrestricted use, and at least one of a black list for applications that are not allowed to be used, a gray list for applications that have some restrictions on use, and a banned list for applications that are deleted upon detection; assign each application to a list based on the identified restrictions; impose the identified restrictions for each application on the user device when the user device accesses the controlled area or network; and remove the identified restrictions on the applications on the user device when the user device is no longer accessing the controlled area or network. - View Dependent Claims (2, 3, 4, 5)
-
6. A method comprising:
-
communicating, via an administrator device including at least one process executing a device management system administrator application, with a user device; detecting, by device management system administrator application, when the user device attempts to access a controlled area or network; detecting the user device includes one or more of; receiving a connection request or message from the user device including a MAC address or other device identifier; receiving, by the user device, a controlled network or area identifier; and
,determining location information associated with the user device indicating the user device is in or near the controlled area or on the controlled network; performing, by device management system administrator application, an inventory of applications on the user device; identifying, by device management system administrator application, restrictions for each application when the user device is in the controlled area or on the controlled network; the restrictions associated with a white list for applications with unrestricted use, and at least one of a black list for applications that are not allowed to be used, a gray list for applications that have some restrictions on use, and a banned list for applications that are deleted upon detection; assigning, by device management system administrator application, each application to a list based on the identified restrictions; imposing, by device management system administrator application, the identified restrictions for each application on the user device when the user device accesses the controlled area or network; and removing, by device management system administrator application, the identified restrictions on the applications on the user device when the user device is no longer accessing the controlled area or network. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium storing instructions, the instructions comprising:
-
one or more instructions which, when executed by at least one processor, cause the at least one processor to; communicate with a user device; detect when the user device attempts to access a controlled area or controlled network by receiving a connection request or message from the user device including a MAC address or other device identifier; determining location information associated with the user device indicating the user device is in or near the controlled area or on the controlled network; perform an inventory of applications on the user device; identify restrictions for each application when the user device is in the controlled area or on the controlled network; the restrictions associated with a white list for applications with unrestricted use, and at least one of a black list for applications that are not allowed to be used, a gray list for applications that have some restrictions on use, and a banned list for applications that are deleted upon detection; assign each application to a list based on the identified restrictions; impose the identified restrictions for each application on the user device when the user device accesses the controlled area or network; and remove the identified restrictions on the applications on the user device when the user device is no longer accessing the controlled area or network. - View Dependent Claims (13, 14, 15)
-
-
16. A non-transitory computer readable medium storing instructions, the instructions comprising:
-
one or more instructions which, when executed by at least one processor, cause the at least one processor to; communicate with a user device; detect when the user device attempts to access a controlled area or network; perform an inventory of applications on the user device; compare the inventory of applications to an application restriction database; identify applications not in the application restriction database; assign default restrictions to applications not in the application restriction database; identify restrictions for each application when the user device is in the controlled area or on the controlled network; the restrictions associated with a white list for applications with unrestricted use, and at least one of a black list for applications that are not allowed to be used, a gray list for applications that have some restrictions on use, and a banned list for applications that are deleted upon detection; assign each application to a list based on the identified restrictions; impose the identified restrictions for each application on the user device when the user device accesses the controlled area or network; and remove the identified restrictions on the applications on the user device when the user device is no longer accessing the controlled area or network.
-
Specification