Mobile device management
First Claim
1. A slave mobile device comprising:
- a processor configured to implement a user-accessible communications feature and a two way electronic messaging capability; and
a non-transitory computer-readable medium having computer-readable instructions stored thereon for execution by the processor, the instructions for implementing a slave manager module capable of;
decrypting a message received through the electronic messaging capability, the message including a request, andmanaging access to the user-accessible communications feature in accordance with the request by permitting user access to the user-accessible communications feature for the purpose of communication with authorized persons, notwithstanding the presence of at least one access restriction preventing user access to the user-accessible communications feature.
4 Assignments
0 Petitions
Accused Products
Abstract
A device management method, is disclosed in which available features on a slave mobile device are managed (monitored or controlled) by a slave manager module commanded by a master device through secure messages exchanged between the two devices using respective electronic messaging capabilities on the two devices. Selection of the features of the slave mobile device to be controlled or monitored is facilitated on the master device through a master manager module resident thereon. The features that are controlled or monitored may comprise any user-accessible feature incorporated or installed on the slave mobile device and user access to the feature may be prevented according to at least one criterion, such as date of use, time of day of use, number of times of use, originator and recipient. User access to the feature may be prevented access to the user-accessible feature when usage limitations for the feature have been reached.
-
Citations
20 Claims
-
1. A slave mobile device comprising:
-
a processor configured to implement a user-accessible communications feature and a two way electronic messaging capability; and a non-transitory computer-readable medium having computer-readable instructions stored thereon for execution by the processor, the instructions for implementing a slave manager module capable of; decrypting a message received through the electronic messaging capability, the message including a request, and managing access to the user-accessible communications feature in accordance with the request by permitting user access to the user-accessible communications feature for the purpose of communication with authorized persons, notwithstanding the presence of at least one access restriction preventing user access to the user-accessible communications feature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A master device comprising:
-
a processor configured to implement a two way electronic messaging capability; and a non-transitory computer-readable medium having computer-readable instructions stored thereon for execution by the processor, the instructions for implementing a master management module capable of generating, encrypting, and transmitting an electronic message to a paired slave mobile device, the message being transmitted through the electronic messaging capability and including a request to manage access to a user-accessible communications feature of the slave mobile device in accordance with the request by allowing user access to the user-accessible communications feature for the purpose of communication with authorized persons, notwithstanding the presence of at least one access restriction preventing user access to the user-accessible communications feature. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of managing a slave mobile device comprising:
-
decrypting an electronic message received through a two-way electronic messaging capability of the slave mobile device, the message including a request; and managing access to a user-accessible communications feature of the slave mobile device in accordance with the request by permitting user access to the user-accessible communications feature for the purpose of communication with authorized persons, notwithstanding the presence of at least one access restriction preventing user access to the user-accessible communications feature. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification