System and method for controlling the use of a wireless device
First Claim
Patent Images
1. A system for controlling the use of a first device, the system comprising:
- a first device; and
a computer connected to the first device, wherein the computer is configured with software to enable a user to program and reprogram the first device with at least one telephone number of a second device such that the first device restricts the initiation of communications to the at least one telephone number of the second device;
wherein the software is configured to program the first device to prevent an operator of the first device from adding the at least one telephone number of the second device to the first device except through the software, such that the operator may not add the at least one telephone number of the second device through manipulation of the first device.
1 Assignment
0 Petitions
Accused Products
Abstract
Preferred embodiments of the present invention provide for enabling a user to select telephone numbers to which a wireless device may place calls and from which the wireless device may receive calls. One preferred embodiment of the present invention includes software for use on a general purpose computer allowing the user to input into the memory of a wireless device desired telephone numbers that may not be changed by the operator of the wireless device. The computer software also programs the wireless device to only place calls to, or receives calls from, the telephone numbers entered into the memory of the wireless device by the owner.
36 Citations
50 Claims
-
1. A system for controlling the use of a first device, the system comprising:
-
a first device; and a computer connected to the first device, wherein the computer is configured with software to enable a user to program and reprogram the first device with at least one telephone number of a second device such that the first device restricts the initiation of communications to the at least one telephone number of the second device; wherein the software is configured to program the first device to prevent an operator of the first device from adding the at least one telephone number of the second device to the first device except through the software, such that the operator may not add the at least one telephone number of the second device through manipulation of the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for controlling the use of a first device, the method comprising:
-
selecting at least one telephone number of a second device; storing the at least one telephone number of the second device into an acceptable number memory of the first device; programming the first device to restrict the initiation of communications only to a telephone having the at least one telephone number of the second device associated therewith; and programming the first device to only allow alteration of the acceptable number memory by the programming software, such that an operator of the first device may not alter the acceptable number memory through manipulation of the first device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for controlling the use of a first device, the method comprising:
-
providing programming software configured to operate on a computer, the software comprising; an interface; and programming the first device to only allow alteration of a set of telephone numbers by the programming software, the interface configured to accept information comprising the set of telephone numbers; and logic, the logic configured to transmit the information to the first device, the logic further configured to program the first device to use the information to restrict the initiation of communications; and implementing the software on the computer; wherein the software is configured to program the first device to prevent an operator of the first device from adding telephone numbers to the set of telephone numbers except through the software, such that the operator may not alter the set of telephone numbers through manipulation of the first device. - View Dependent Claims (27, 28, 29)
-
-
30. A first device comprising:
-
an acceptable number memory containing at least one telephone number of a second device; and programming logic configured to use the at least one telephone number of the second device to restrict communications to communications involving the at least one telephone number of the second device in the acceptable number memory; wherein a plurality of telephone numbers of the second device contained in the acceptable number memory may only be altered by a computer in communication with the first device, such that an operator of the first device may not alter the plurality of telephone numbers through manipulation of the first device. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
-
38. A computer-readable medium including logic for performing:
-
receiving a set of at least one telephone number of the second device from a user; programming a first device to use the at least one telephone number of a second device to restrict communications involving the first device; restricting the reception of the at least one telephone number of the second device to a reception from a particular user; and restricting the updating of the set of at least one telephone number of the second device to a computer in communication with the first device, such that an operator of the first device may not alter the plurality of telephone numbers through manipulation of the first device. - View Dependent Claims (39, 40, 41, 42, 43)
-
-
44. A device for controlling the use of a first device, the device comprising:
-
an interface connected to the first device; and software configured for enabling a user to program the first device with at least one telephone number of a second device such that the first device restricts initiation of communications to the at least one telephone number of the second device; wherein the software is further configured to program and reprogram the first device to prevent an operator of the first device from adding telephone numbers of the second device to the first device except through the software, such that the operator of the first device may not alter the telephone numbers through manipulation of the first device. - View Dependent Claims (45, 46, 47, 48, 49, 50)
-
Specification