MOBILE DEVICE MONITORING AND CONTROL SYSTEM
First Claim
1. A method for unauthorized surreptitious monitoring and, optionally, surreptitious control of, a remote computer controlled wireless communication device, comprising surreptitiously receiving at said remote computer controlled wireless communication device and surreptitiously installing without authorization on said remote computer controlled wireless communication device computer program instructions from a control system, said computer program instructions being configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device, said computer program instructions being constructed according to characteristics of said computer controlled wireless communications device such that said computer program instructions are surreptitiously installed and accepted by said computer controlled wireless communication device as if authorized;
- andthe user of said device is unaware of said surreptitious installing without authorization and said establishing surreptitious communications between said computer controlled wireless communications device and said control system without the knowledge of said user.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described. One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.
260 Citations
15 Claims
-
1. A method for unauthorized surreptitious monitoring and, optionally, surreptitious control of, a remote computer controlled wireless communication device, comprising surreptitiously receiving at said remote computer controlled wireless communication device and surreptitiously installing without authorization on said remote computer controlled wireless communication device computer program instructions from a control system, said computer program instructions being configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device, said computer program instructions being constructed according to characteristics of said computer controlled wireless communications device such that said computer program instructions are surreptitiously installed and accepted by said computer controlled wireless communication device as if authorized;
- and
the user of said device is unaware of said surreptitious installing without authorization and said establishing surreptitious communications between said computer controlled wireless communications device and said control system without the knowledge of said user. - View Dependent Claims (2, 3, 4, 5)
- and
-
6. A method for unauthorized surreptitious monitoring and, optionally, surreptitious control of, a remote computer controlled wireless communication device, comprising surreptitiously sending from a control system to said remote computer controlled wireless communication device and surreptitiously installing without authorization on said remote computer controlled wireless computer program instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device, said computer program instructions being constructed according to characteristics of said computer controlled wireless communications device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized;
- and
the user of said device is unaware of said surreptitious installing without authorization and establishing surreptitiously communications between said computer controlled wireless communications device and said control system without the knowledge of said user. - View Dependent Claims (7, 8, 9, 10)
- and
-
11. A system for unauthorized surreptitious monitoring and, optionally, surreptitious control of, a remote computer controlled wireless communication device, comprising:
- a control system configured to surreptitiously establish communication with said device and to surreptitiously relay unauthorized programming instructions and data to said device;
a surreptitious installer including computer program instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized and the user of said device is unaware of said unauthorized surreptitious monitoring, said surreptitious controlling, or said surreptitious communications. - View Dependent Claims (12, 13, 14, 15)
- a control system configured to surreptitiously establish communication with said device and to surreptitiously relay unauthorized programming instructions and data to said device;
Specification