METHOD AND SYSTEM FOR MONITORING AND RESTRICTING USE OF MOBILE DEVICES
First Claim
1. A computer-implemented method for managing and restricting usage of a managed mobile device, comprising the steps of:
- receiving, by at least one of a server, a master device and the managed mobile device, a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device;
storing in a database the first administrator credential and the restriction policy;
implementing a user events controller at the managed mobile device for monitoring and acting on a user event at the managed mobile device; and
implementing an execution module at the at least one of the managed mobile device, the server, and the master device for enforcing the restriction policy, evaluating the user event and determining whether the user event prevents or disrupts enforcement of the restriction policy.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for promoting safe usage of a mobile device. The system allows one or more administrators (or patents) to transparently and automatically implement preconfigured use restriction policies (e.g., restricted time periods, restricted features of the device, restricted vehicle speed) on multiple managed devices. The restriction policies may be stored locally at a managed mobile device and/or remotely at a remote server and database. The mobile device can be controlled locally by a client application or remotely by the remote server based on the restriction policies.
-
Citations
75 Claims
-
1. A computer-implemented method for managing and restricting usage of a managed mobile device, comprising the steps of:
-
receiving, by at least one of a server, a master device and the managed mobile device, a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device; storing in a database the first administrator credential and the restriction policy; implementing a user events controller at the managed mobile device for monitoring and acting on a user event at the managed mobile device; and implementing an execution module at the at least one of the managed mobile device, the server, and the master device for enforcing the restriction policy, evaluating the user event and determining whether the user event prevents or disrupts enforcement of the restriction policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method for managing and restricting usage of a managed mobile device, comprising the steps of:
-
receiving, by a server a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device; storing in a database the first administrator credential and the restriction policy; and implementing an execution module at the server for enforcing the restriction policy - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A managed mobile device, comprising:
-
an interface for receiving a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device; a database for storing the first administrator credential and the restriction policy; a user events controller for monitoring and identifying a user event at the managed mobile device; and an execution module for enforcing the restriction policy, evaluating the user event and determining whether the user event prevents or disrupts enforcement of the restriction policy. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A system for managing and restricting usage of a managed mobile device, comprising the steps of:
-
receiving, by at least one of a server, a master device and the managed mobile device, a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device; storing in a database the first administrator credential and the restriction policy; implementing a user events controller at the managed mobile device for monitoring and acting on a user event at the managed mobile device; and implementing an execution module at the at least one of the managed mobile device, the server, and the master device for enforcing the restriction policy, evaluating the user event and determining whether the user event prevents or disrupts enforcement of the restriction policy. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
Specification