MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
First Claim
1. A system, comprising:
- a service provider for a mobile communications device;
a network data monitor associated with the service provider and configured to generate monitoring information to provide to a data center, the monitoring information including information on a financial transaction of the mobile communications device; and
wherein the network data monitor comprises an alert monitor program configured to determine whether the financial transaction is allowed based at least in part on whether an identity that is in communication with the mobile communications device and associated with the financial transaction is found in a database.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services such as a mobile wallet on a mobile communication device may be monitored against rules stored in a central data center repository. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. An alert may be provided to an administrator when unauthorized mobile wallet activity is detected and/or a message may be sent to the mobile communication device to prevent the unauthorized mobile wallet activity.
-
Citations
27 Claims
-
1. A system, comprising:
-
a service provider for a mobile communications device; a network data monitor associated with the service provider and configured to generate monitoring information to provide to a data center, the monitoring information including information on a financial transaction of the mobile communications device; and wherein the network data monitor comprises an alert monitor program configured to determine whether the financial transaction is allowed based at least in part on whether an identity that is in communication with the mobile communications device and associated with the financial transaction is found in a database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a data center, comprising; a memory configured to store programs and database information; a processor, coupled to the memory and configured to access the database information and execute the programs; a communication gateway coupled to the processor and configured via a service provider to receive information on a financial transaction of a mobile communications device being monitored by the data center, the service provider having a network data monitor configured to; monitor the financial transaction for the mobile communications device; and compile monitoring information associated the financial transaction; wherein the programs comprise an alert monitor program configured to provide an alert if the financial transaction is not allowed, wherein the alert monitor program is configured to determine whether the financial transaction is allowed based at least in part on whether an identity that is in communication with the mobile communications device and associated with the financial transaction is found in a database. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A mobile communications device, comprising:
-
a memory configured to store mobile programs and mobile data; a processor, coupled to the memory and configured to execute the mobile programs stored in the memory; a communications port configured to wirelessly communicate with a data center via a service provider; and wherein the mobile programs comprise a data monitor program configured to; monitor financial transactions of the mobile communications device; compile information associated with the financial transactions; and transmit the information to the data center via the communications port and the service provider; wherein the data monitor program comprises an alert monitor program configured to determine whether at least one of the financial transactions is allowed based at least in part on whether an identity that is in communication with the mobile communications device and associated with the at least one of the financial transactions is found in a database. - View Dependent Claims (19, 20)
-
-
21. A method of monitoring a mobile communications device, the method comprising:
-
storing rules associated with a financial transaction for the mobile communications device at a data center; receiving monitoring information for the financial transaction of the mobile communications device; checking the financial transaction based on comparing the monitoring information to a corresponding one of the rules associated with the financial transaction, wherein the checking is based at least in part on whether an identity that is in communication with the mobile communications device and associated with the financial transaction is an authorized entry within a database associated with the mobile communications device; and providing an alert if the financial transaction is unauthorized based on the corresponding one of the rules. - View Dependent Claims (22, 23, 24)
-
-
25. A method of monitoring communications of a mobile communications device, comprising:
-
storing mobile programs and mobile data with a memory of the mobile communications device, wherein the mobile programs comprise a data monitor program; wirelessly communicating with a data center via a service provider using a communications port of the mobile communications device; and executing the data monitor program with a processor of the mobile communications device by; monitoring financial transactions of the mobile communications device, compiling information associated with the financial transactions, transmitting the information to the data center via the communications port and the service provider, and determining, by executing an alert monitor program of the data monitor program, whether at least one of the financial transactions is allowed based at least in part on whether an identity that is in communication with the mobile communications device and associated with the at least one of the financial transactions is found in a database. - View Dependent Claims (26, 27)
-
Specification