Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone
First Claim
1. A system comprising:
- a plurality of mobile phones, each phone to be identified as one of either a master phone or a child phone, each master phone configured to control at least one child phone, wherein each child phone to be configured to be controlled by at least one master phone, wherein each phone further comprising;
a user interface of a parental control application to allow a master user on a master phone to interactively manage and control the at least one child phone, wherein a set-up phase is to identify whether a phone is to act as a master phone or child phone;
an authentication agent configured to enable the phone to authenticate a data connection session between a master phone and child phone, and between more than one master phone, the authentication to utilize a security engine coupled to the phone for encrypting and decrypting messages and/or certificates;
a policy management and enforcement agent to initiate changes in a control policy in a child phone and record the changes in the master phone, wherein (i) the control policy defines control and management of at least one feature of the child phone and (ii) the policy management and enforcement agent restricts, redirects, and/or monitors the at least one feature of the child phone, according to the control policy;
a communication agent configured to send requests and control policy changes from the master phone to the child phone, and perform a handshake communication between phones to initiate the data connection session is by a series of short message service (SMS) messages between a master phone and child phone, wherein the master hone and child shone communicate via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; and
secure storage for storing at least one control policy, the at least one control policy being associated with one of the at least one child phones.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed.
-
Citations
29 Claims
-
1. A system comprising:
a plurality of mobile phones, each phone to be identified as one of either a master phone or a child phone, each master phone configured to control at least one child phone, wherein each child phone to be configured to be controlled by at least one master phone, wherein each phone further comprising; a user interface of a parental control application to allow a master user on a master phone to interactively manage and control the at least one child phone, wherein a set-up phase is to identify whether a phone is to act as a master phone or child phone; an authentication agent configured to enable the phone to authenticate a data connection session between a master phone and child phone, and between more than one master phone, the authentication to utilize a security engine coupled to the phone for encrypting and decrypting messages and/or certificates; a policy management and enforcement agent to initiate changes in a control policy in a child phone and record the changes in the master phone, wherein (i) the control policy defines control and management of at least one feature of the child phone and (ii) the policy management and enforcement agent restricts, redirects, and/or monitors the at least one feature of the child phone, according to the control policy; a communication agent configured to send requests and control policy changes from the master phone to the child phone, and perform a handshake communication between phones to initiate the data connection session is by a series of short message service (SMS) messages between a master phone and child phone, wherein the master hone and child shone communicate via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; and secure storage for storing at least one control policy, the at least one control policy being associated with one of the at least one child phones. - View Dependent Claims (2, 3, 4)
-
5. A child mobile phone, comprising:
-
a plurality of communication features of the child phone to be controlled by at least one authenticated master phone, wherein control of the communication features is transparent to a user of the child phone; an authentication agent configured to enable the child phone to authenticate a data connection session between a master phone and the child phone, the authentication to utilize a security engine coupled to the child phone for encrypting and decrypting messages and/or certificates; a policy management and enforcement agent to initiate changes in a control policy in the child phone and record the changes in a secure storage coupled to the child phone, wherein (i) the control policy defines control and management of at least one feature of the child phone and (ii) the policy management and enforcement agent restricts, redirects, and/or monitors the at least one feature of the child phone, according to the control policy; a communication agent configured to receive requests and control policy changes from the master phone, and perform a handshake communication between the child phone and the master phone to initiate the data connection session by a series of short message service (SMS) messages between the master phone and the child phone, wherein the master phone and the child phone communicate via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages. - View Dependent Claims (6, 7)
-
-
8. A master mobile phone, comprising:
-
a user interface of a parental control application to allow a master user on the master phone to interactively manage and control at least one child phone, wherein a set-up phase is to identify whether a phone is to act as a master phone or child phone; an authentication agent configured to enable the master phone to authenticate a data connection session between the master phone and the at least one child phone, the authentication to utilize a security engine coupled to the master phone for encrypting and decrypting messages and/or certificates; a policy management and enforcement agent to initiate changes in a control policy in the at least one child phone and record the changes in a secure storage coupled to the master phone, wherein (i) the control policy defines control and management of at least one feature of the child phone and (ii) the child phone restricts, redirects, and/or monitors the at least one feature of the child phone, according to the control policy; a communication agent configured to send requests and control policy changes to the at least one child phone, and perform a handshake communication between the at least one child phone and the master phone to initiate the data connection session by a series of short message service (SMS) messages between the master phone and the at least one child phone, wherein the master phone and the child phone communicate via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages. - View Dependent Claims (9, 10, 11)
-
-
12. A method for controlling at least one child mobile phone by at least on master mobile phone, comprising:
-
identifying whether a phone is to be a master or child phone, by a master user; initiating a message handshake protocol between a master phone and a child phone; initiating a data connection session between the master phone and the child phone by a series of short message service (SMS) messages between the master phone and the child phone; communicating between the master phone and the child phone via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; requesting authentication of the master phone to the child phone; controlling features of the child phone by the master phone, after authentication by sending a control policy to the child phone; defining control and management of at least one feature of the child phone in the control policy; and restricting, redirecting, and/or monitoring the at least one feature of the child phone, according to the control policy. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for enabling control in a child phone by at least one master phone, comprising:
-
identifying whether a phone is to be a master or child phone, by a master user; defining control and management of at least one feature of the child phone in a control policy; responding to a message handshake protocol initiation between a master phone and a child phone; initiating a data connection session between the master phone and the child phone by a series of short message service (SMS) messages between the master phone and the child phone; communicating between the master phone and the child phone via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; receiving a request for authentication of the master phone by the child phone; authenticating the master phone by the child phone; receiving a request from the master phone, by the child phone, wherein the request received by the child phone comprises a control policy change; and restricting, redirecting, and/or monitoring the at least one feature of the child phone, according to the control policy as updated by the control policy change. - View Dependent Claims (18, 19, 20)
-
-
21. A non-transitory, machine readable storage medium having instructions stored thereon for controlling at least one child mobile phone, the instructions when executed by a machine cause the machine to:
-
categorize that a phone is to be a master phone or a child phone based on a selection by a master user; initiate a message handshake protocol between a master phone and a child phone; initiate a data connection session between the master phone and the child phone by a series of short message service (SMS) messages between the master phone and the child phone; communicate between the master phone and the child phone via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; request authenticating of the master phone to the child phone; control features of the child phone by the master phone, after authentication by sending a control policy to the child phone; define control and management of at least one feature of the child phone in the control policy; and restrict, redirect, and/or monitor the at least one feature of the child phone, according to the control policy. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A non-transitory, machine readable storage medium having instructions stored thereon for enabling controlling of a child mobile phone, the instructions when executed by a machine cause the machine to:
-
categorize that a phone is to be a master phone or a child phone based on a selection by a master user; define control and management of at least one feature of the child phone in a control policy; respond to a message handshake protocol initiation between a master phone and a child phone; initiate a data connection session between the master phone and the child phone by a series of short message service (SMS) messages between the master phone and the child phone; communicate between the master phone and the child phone via a TCP/IP protocol after the data connection session is initiated by the series of SMS messages; receive a request for authentication of the master phone by the child phone; authenticate the master phone by the child phone; receive a request from the master phone, by the child phone, wherein the request received by the child phone comprises a control policy change; and restrict, redirect, and/or monitor the at least one feature of the child phone, according to the control policy as updated by the control policy change. - View Dependent Claims (27, 28, 29)
-
Specification