Cell phone parental control
First Claim
1. A time-based method of remotely controlling a particular use of a wireless device, the method comprising:
- providing a first software to a controlling entity wherein the first software allows to schedule a usage time restriction by identifying periods of time when a particular usage of the controlled wireless device is allowed;
communicating the usage time restriction from the controlling entity to a networked permission database via the communications network;
storing the usage time restriction at the networked permission database; and
providing a second software to the wireless device wherein the second software is configured to;
retrieve the usage time restriction from the networked permission database to assess if the particular use of the wireless device is permitted; and
allow the particular use only during the usage time restriction.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for allowing remote control of the usage of a networked wireless device including incoming communications, outgoing communications, and application launching. Controlling entities, such as parent cellular telephones or web sites, are provided with the ability to select a list of approved anytime incoming communications, or approved incoming and outgoing communications based on time and day. Incoming communications include text messaging and telephone calls. Further, the controlling entity is provided with the ability to reroute to the controlling entity any usage of the wireless device such as incoming communications, outgoing communications, and application launching. Access to usage logs of the wireless device is provided to the controlling entity.
-
Citations
69 Claims
-
1. A time-based method of remotely controlling a particular use of a wireless device, the method comprising:
-
providing a first software to a controlling entity wherein the first software allows to schedule a usage time restriction by identifying periods of time when a particular usage of the controlled wireless device is allowed;
communicating the usage time restriction from the controlling entity to a networked permission database via the communications network;
storing the usage time restriction at the networked permission database; and
providing a second software to the wireless device wherein the second software is configured to;
retrieve the usage time restriction from the networked permission database to assess if the particular use of the wireless device is permitted; and
allow the particular use only during the usage time restriction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A permission-based method of remotely controlling the use of a wireless device, the method comprising:
-
transmitting via a communications network a request from the wireless device to a controlling entity to permit an incoming communication from an incoming communication source;
providing a first software to a controlling entity wherein the first software is configured to;
formulating a response to the request; and
transmitting the response to a networked permission database via the communications network; and
providing a second software to the wireless device wherein the second software is configured to;
retrieve a permission from the networked permission database to communicate with the incoming communication source; and
communicate with the incoming communication source only after receiving the permission. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of remotely controlling communications to a wireless device, the method comprising:
-
providing a first software to a controlling entity wherein the first software allows to determine an identifier for a forbidden incoming communication source;
transmitting the identifier from the controlling entity to a networked permission database via a communications network;
storing the identifier at the networked permission database; and
providing a second software to the wireless device wherein the second software is configured to;
retrieve from the networked permission database the identifier corresponding to the forbidden incoming communication source; and
reject communication attempts from the forbidden incoming communication source based on the identifier retrieved. - View Dependent Claims (34, 35, 36, 37, 38, 40, 41, 42, 43, 44)
-
-
45. A method of remotely controlling a particular use of a wireless device, the method comprising:
-
providing a first software to a controlling entity wherein the first software allows to place a usage restriction on the wireless device;
communicating the usage time restriction from the controlling entity to a networked permission database via the communications network;
storing the usage time restrictions at the networked permission database; and
providing a second software to the wireless device wherein the second software is configured to;
retrieve the usage restriction from the networked permission database to assess if the particular use of the wireless device is permitted; and
allow the particular use only in compliance with the usage restrictions; and
forward the usage request from the wireless device to the controlling entity. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
Specification