BROKER-BASED MANAGEMENT OF MOBILE DEVICES
First Claim
1. A method, comprising:
- receiving, by a network device and from a user device, a list of applications installed on the user device;
receiving, by the network device and from a customer terminal, configuration settings including usage restrictions for at least one application from the list of applications;
receiving, by the network device and from the user device, application usage data for the at least one application from the list of applications;
comparing, by the network device, the configuration settings and the application usage data; and
sending, by the network device and to the user device, a blocking instruction to prevent use, by a user of the user device, of the at least one application when the application usage data includes times exceeding the configurations settings.
1 Assignment
0 Petitions
Accused Products
Abstract
An authorized blocker application is installed on a user device to monitor application usage and enforce usage restrictions. A network device receives, from the user device, information identifying a list of applications installed on the user device and receives from a customer terminal, configuration settings including usage restrictions for at least one application from the list of applications. The network device receives, from the user device, application usage data for the at least one application from the list of applications and compares the configuration settings received from the customer terminal and the application usage data received from the user device. When the application usage data includes times exceeding the configurations settings, the network device sends, to the user device, a blocking instruction to prevent use of the at least one application.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a network device and from a user device, a list of applications installed on the user device; receiving, by the network device and from a customer terminal, configuration settings including usage restrictions for at least one application from the list of applications; receiving, by the network device and from the user device, application usage data for the at least one application from the list of applications; comparing, by the network device, the configuration settings and the application usage data; and sending, by the network device and to the user device, a blocking instruction to prevent use, by a user of the user device, of the at least one application when the application usage data includes times exceeding the configurations settings. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network device, comprising:
-
a memory to store a plurality of instructions; and a processor configured to execute instructions in the memory to; receive, from a user device, information identifying a list of applications installed on the user device, receive, from a customer terminal, configuration settings including usage restrictions for at least one application from the list of applications, receive, from the user device, application usage data for the at least one application from the list of applications, monitor the application usage data received from the user device against the configuration settings received from the customer terminal, format the application usage data for presentation to a customer, and provide the formatted application usage data to the customer terminal. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A user device, comprising:
-
a memory to store a plurality of instructions; and a processor configured to execute instructions in the memory to; identify applications residing on the memory of the user device, send, to a network device, a list of the identified applications, record usage times of applications in the list of applications, send, to the network device, usage data based on the recorded usage times, generating, from the network device, an instruction to block access to a particular application in the list of applications, and blocking, based on the instruction, access to the particular application. - View Dependent Claims (17, 18)
-
-
19. A method, comprising:
-
receiving, by a user device, a blocker application that includes a higher level of privilege than other applications residing on a memory the user device; identifying, by the user device, the other applications residing on the memory of the user device; sending, by the user device and to a network device, a list of the identified other applications; recording, by the user device, usage times of the other applications in the list of applications; sending, by the user device and to the network device, usage data based on the recorded usage times, wherein the usage data is sent without requiring authorization from a user of the user device; receiving, by the user device and from the network device, an instruction to block access to a particular application of the other applications; and blocking, by the user device and based on the instruction, access to the particular application. - View Dependent Claims (20)
-
Specification