Systems and methods for controlling mobile device use
First Claim
Patent Images
1. A method for operating a mobile device, comprising:
- establishing by a locking mechanism at the mobile device that the mobile device is owned or controlled by a retail establishment at which an operator of the mobile device is an agent;
searching, by a mobile device, for a signal from a network;
authorizing the mobile device to operate in a vicinity of the network when the signal is detected from the network; and
inactivating the mobile device or displaying information where the mobile device can operate in response to a failure by the mobile device to detect the signal, wherein the vicinity of the network includes a workplace facility, wherein the mobile device is operated by an agent of the workplace facility, and wherein the mobile device is locked if the agent is an hourly wage pay type and the mobile device is not in the vicinity of the network.
2 Assignments
0 Petitions
Accused Products
Abstract
Provided are a system and method for operating a mobile device, comprising: establishing by a locking mechanism at the mobile device that the mobile device is owned or controlled by a retail establishment at which an operator of the mobile device is an agent; searching, by a mobile device, for a signal from a network; authorizing the mobile device to operate in a vicinity of the network when the signal is detected from the network; and inactivating the mobile device or displaying information where the mobile device can operate in response to a failure by the mobile device to detect the signal.
-
Citations
17 Claims
-
1. A method for operating a mobile device, comprising:
-
establishing by a locking mechanism at the mobile device that the mobile device is owned or controlled by a retail establishment at which an operator of the mobile device is an agent; searching, by a mobile device, for a signal from a network; authorizing the mobile device to operate in a vicinity of the network when the signal is detected from the network; and inactivating the mobile device or displaying information where the mobile device can operate in response to a failure by the mobile device to detect the signal, wherein the vicinity of the network includes a workplace facility, wherein the mobile device is operated by an agent of the workplace facility, and wherein the mobile device is locked if the agent is an hourly wage pay type and the mobile device is not in the vicinity of the network. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for operating a mobile device, comprising:
-
providing a profile on the mobile device; identifying by the profile an owner of the mobile device; identifying by the profile rights of a user regarding use of the mobile device; permitting, by the profile, the mobile device to search for a signal from a network for operating in the vicinity of the network, wherein the mobile device is inactivated in a lockout state in response to a determination that the mobile device is store or company owned and that the mobile device does not receive or recognize the signal from the network; identifying applications on the mobile device for use outside of the network; and checking whether an application of the applications outside the network is permitted to operate in response to identifying the owner of the mobile device and the rights of the user regarding the use of the mobile device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for controlling access of a mobile device, comprising:
-
a locking mechanism that determines whether the mobile device is store-owned, company-owned, or user-owned, searches for a signal from a network, and inactivates the mobile device in response to a determination that the mobile device is store-owned, company-owned, or user-owned and the signal is not detected; and a lockout system that establishes conditions under which the mobile device or at least one application of the mobile device are locked, the conditions including mobile device ownership, location of the mobile device relative to the network, user status, and permissible actions outside the network. - View Dependent Claims (15, 16, 17)
-
Specification