Mobile device monitoring and control system
First Claim
1. A method for unauthorized surreptitiously monitoring and, optionally, surreptitiously controlling, a remote computer controlled wireless communication device, comprising installing without authorization computer program instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized and the user of said device is unaware of said installing without authorization, said computer program instructions including instructions for at least one element selected from the group consisting of:
- a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device;
a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device;
a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device;
a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and
a control component configured to manage surreptitious deployment and operation of the components of said monitored device client.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described. One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.
101 Citations
77 Claims
-
1. A method for unauthorized surreptitiously monitoring and, optionally, surreptitiously controlling, a remote computer controlled wireless communication device, comprising installing without authorization computer program instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized and the user of said device is unaware of said installing without authorization, said computer program instructions including instructions for at least one element selected from the group consisting of:
-
a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said monitored device client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for unauthorized surreptitiously monitoring and, optionally, surreptitiously controlling, a remote computer controlled wireless communication device, comprising a surreptitious installer including computer program instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized and the user of said device is unaware of said unauthorized surreptitious monitoring, controlling, or communications, said computer program instructions including instructions for at least one element selected from the group consisting of:
-
a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said monitored device client. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A non-transitory computer readable medium containing computer readable program code devices thereon, said computer readable program code devices encoding instructions to enable unauthorized surreptitious monitoring and, optionally, unauthorized surreptitious control, of a remote computer controlled wireless communication device, said instructions configured to enable at least one of an unauthorized surreptitious monitoring, unauthorized surreptitious controlling, or unauthorized surreptitious communications function on said remote computer controlled wireless communication device such that said computer program instructions are installed and accepted by said computer controlled wireless communication device as if authorized and the user of said device is unaware of said unauthorized surreptitious monitoring, controlling, or communications, said computer program instructions including instructions for at least one element selected from the group consisting of:
-
a module component configured to surreptitiously monitor at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to surreptitiously control at least one aspect of the operation of said remote wireless computer controlled communication device; a module component configured to store information that has been gathered surreptitiously from said remote computer controlled wireless communication device; a selective router component configured to surreptitiously monitor and manage communications of said remote wireless computer controlled communication device; and a control component configured to manage surreptitious deployment and operation of the components of said monitored device client. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77)
-
Specification