Mobile communication device monitoring systems and methods
First Claim
1. A system, comprising:
- a service provider for a mobile communications device;
a network data monitor associated with the service provider and configured to generate monitoring information to provide to a data center, the monitoring information comprising an activity log of data usage by the mobile communication device, wherein the data usage is generated in part by a data service use performed by a user of the mobile communications device using the mobile communication device; and
wherein the network data monitor comprises an alert monitor program configured to determine whether the data service use is allowed based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the data service use is found in a database comprising permission rules for allowed activities using the mobile communication device, wherein the third party comprises a recipient associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the recipient of the financial transaction, and wherein the alert monitor programs determines whether the data service use is allowed by determining whether the identity is found in the database comprising the permission rules.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services such as a mobile wallet on a mobile communication device may be monitored against rules stored in a central data center repository. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. An alert may be provided to an administrator when unauthorized mobile wallet activity is detected and/or a message may be sent to the mobile communication device to prevent the unauthorized mobile wallet activity.
-
Citations
25 Claims
-
1. A system, comprising:
-
a service provider for a mobile communications device; a network data monitor associated with the service provider and configured to generate monitoring information to provide to a data center, the monitoring information comprising an activity log of data usage by the mobile communication device, wherein the data usage is generated in part by a data service use performed by a user of the mobile communications device using the mobile communication device; and wherein the network data monitor comprises an alert monitor program configured to determine whether the data service use is allowed based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the data service use is found in a database comprising permission rules for allowed activities using the mobile communication device, wherein the third party comprises a recipient associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the recipient of the financial transaction, and wherein the alert monitor programs determines whether the data service use is allowed by determining whether the identity is found in the database comprising the permission rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a data center, comprising; a memory configured to store programs and database information; a processor, coupled to the memory and configured to access the database information and execute the programs; a communication gateway coupled to the processor and configured via a service provider to receive information on a data service use performed by a user of the mobile communications device using the mobile communication device and being monitored by the data center, the service provider having a network data monitor configured to; monitor the data service use for the mobile communications device; and compile monitoring information comprising an activity log of data usage by the mobile communication device, wherein the data usage are generated in part by the data service use; wherein the programs comprise an alert monitor program configured to determine whether the data service use is allowed based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the data service use is found in a database comprising permission rules for allowed activities using the mobile communication device, wherein the third party comprises an initiator associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the initiator of the financial transaction, and wherein the alert monitor programs determines whether the data service use is allowed by determining whether the identity is found in the database comprising the permission rules. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A mobile communications device, comprising:
-
a memory configured to store mobile programs and mobile data; a processor, coupled to the memory and configured to execute the mobile programs stored in the memory; a communications port configured to wirelessly communicate with a data center via a service provider; and wherein the mobile programs comprise a data monitor program configured to; monitor data service uses of the mobile communications device; compile information comprising an activity log of data usage by the mobile communication device, wherein the data usage are generated in part by the data service uses; and transmit the information to the data center via the communications port and the service provider; wherein the data monitor program comprises an alert monitor program configured to determine whether at least one of the data service uses is allowed based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the at least one of the data service uses is found in a database comprising permission rules for allowed activities using the mobile communication device, wherein the third party comprises a recipient associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the recipient of the financial transaction, and wherein the alert monitor programs determines whether the data service use is allowed by determining whether the identity is found in the database comprising the permission rules. - View Dependent Claims (17, 18)
-
-
19. A method of monitoring a mobile communications device, the method comprising:
-
storing, at a data center, permission rules associated with a data service use performed by a user of the mobile communications device using the mobile communication device; receiving monitoring information comprising an activity log of data usage by the mobile communication device, wherein the data usage are generated in part by the data service use of the mobile communications device; checking the data service use based on comparing the monitoring information to a corresponding one of the permission rules associated with the data service use, wherein the checking is based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the data service use is an authorized entry within a database associated with the mobile communications device, wherein the third party comprises an initiator associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the initiator of the financial transaction, and wherein the checking the data service use comprises determining whether the identity is found in the database comprising the permission rules; and providing an alert if the financial transaction is unauthorized based on the corresponding one of the permission rules. - View Dependent Claims (20, 21, 22)
-
-
23. A method of monitoring communications of a mobile communications device, comprising:
-
storing mobile programs and mobile data with a memory of the mobile communications device, wherein the mobile programs comprise a data monitor program; wirelessly communicating with a data center via a service provider using a communications port of the mobile communications device; and executing the data monitor program with a processor of the mobile communications device by; monitoring data service uses of the mobile communications device, compiling information comprising an activity log of data usage by the mobile communication device, wherein the data usage are generated in part by the data service uses, transmitting the information to the data center via the communications port and the service provider, and determining, by executing an alert monitor program of the data monitor program, whether at least one of the financial transactions is allowed based at least in part on whether a third party in the activity log that is in communication with the mobile communications device and associated with the at least one of the data service uses is found in a database comprising permission rules for allowed activities using the mobile communication device, wherein the third party comprises a recipient associated with a financial transaction, wherein the permission rules are set by an administrator of the mobile device prior to the financial transaction, wherein the activity log comprises an identity of the third party as the recipient of the financial transaction, and wherein determining, by the alert monitor programs, whether the at least one data service use is allowed comprises determining whether the identity is found in the database comprising the permission rules. - View Dependent Claims (24, 25)
-
Specification