Mobile device monitoring and control system
First Claim
1. A monitored device client for surreptitious unauthorized instantiation and surreptitious unauthorized operation on a remote computer controlled wireless communication device, comprising:
- a remote device communications interface, said remote device communications interface configured to enable surreptitious unauthorized wireless communications between said remote computer controlled wireless communication device and a control system for surreptitiously communicating unauthorized programming instructions and exchanging data with said remote computer controlled wireless communication device, such that said programming instructions and data are accepted by said remote computer controlled wireless device as if authorized and the user of said device is unaware of said unauthorized communicating and exchanging;
a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device;
a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device;
a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device;
a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and
a control component configured to manage surreptitious deployment and operation of the components of said monitored device client.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described. One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.
74 Citations
33 Claims
-
1. A monitored device client for surreptitious unauthorized instantiation and surreptitious unauthorized operation on a remote computer controlled wireless communication device, comprising:
-
a remote device communications interface, said remote device communications interface configured to enable surreptitious unauthorized wireless communications between said remote computer controlled wireless communication device and a control system for surreptitiously communicating unauthorized programming instructions and exchanging data with said remote computer controlled wireless communication device, such that said programming instructions and data are accepted by said remote computer controlled wireless device as if authorized and the user of said device is unaware of said unauthorized communicating and exchanging; a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said monitored device client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for surreptitiously instantiating and surreptitiously operating unauthorized software on a remote computer controlled wireless communication device, comprising:
- surreptitiously installing an unauthorized remote device communications interface on said remote computer controlled wireless communications device, said unauthorized remote device communications interface being configured to enable surreptitious unauthorized wireless communications between said remote computer controlled wireless communication device and a control system for surreptitious unauthorized communication of programming instructions and exchange of exchanging data with said remote computer controlled wireless communication device, said installation being performed under conditions effective to substantially suppress detection of said installing, such that said programming instructions and data are accepted by said remote computer controlled wireless device as if authorized and the user of said device is unaware of said unauthorized communicating and exchanging;
a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said method. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27)
- surreptitiously installing an unauthorized remote device communications interface on said remote computer controlled wireless communications device, said unauthorized remote device communications interface being configured to enable surreptitious unauthorized wireless communications between said remote computer controlled wireless communication device and a control system for surreptitious unauthorized communication of programming instructions and exchange of exchanging data with said remote computer controlled wireless communication device, said installation being performed under conditions effective to substantially suppress detection of said installing, such that said programming instructions and data are accepted by said remote computer controlled wireless device as if authorized and the user of said device is unaware of said unauthorized communicating and exchanging;
-
24. A non-transitory computer readable medium containing a computer program product, said computer program product being configured to encode a monitored device client for surreptitious unauthorized instantiation and surreptitious unauthorized operation on a remote computer controlled wireless communication device, said monitored device client including:
-
a remote device communications interface, said remote device communications interface configured to enable surreptitious unauthorized wireless communications between said remote computer controlled wireless communication device and a control system for surreptitiously communicating unauthorized programming instructions and unauthorized exchange of data with said remote computer controlled wireless communication device, such that said programming instructions and data are accepted by said remote computer controlled wireless device as if authorized and the user of said device is unaware of said unauthorized communicating and exchanging; a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said computer readable medium. - View Dependent Claims (28, 29, 30, 31, 32, 33)
-
Specification