×

Method and system for monitoring and restricting use of mobile devices

  • US 9,942,753 B2
  • Filed: 10/22/2013
  • Issued: 04/10/2018
  • Est. Priority Date: 10/22/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for preventing tampering of a managed mobile device, comprising the steps of:

  • receiving, by at least one of a server device, a master device and the managed mobile device, a first administrator credential for identifying an administrator and a restriction policy for restricting usage of the managed mobile device;

    storing in a database the first administrator credential and the restriction policy;

    monitoring a user event at the managed mobile device by a user events controller in the managed mobile device, wherein the user event is one of termination or change of settings of a software application at the managed mobile device, modification of operational parameters of the managed mobile device, power on/off, and screen on/off of the managed mobile device;

    enforcing the restriction policy by an execution module at the at least one of the managed mobile device, the server device, and the master device by blocking or preventing the managed mobile device from installation or deletion or launching of a software application and/or accessing at least one of web browser, a camera, a phone dialer for making calls, a messaging application for communicating messages, an app store, and contents including music, video, and apps based on ratings of these contents;

    determining by the execution module whether the user event is a tampering user event that tampers with enforcement of the restriction policy by (i) deleting configuration and/or policy data from the managed mobile device;

    (ii) changing the operational parameters of the managed mobile device;

    (iii) stopping one or more system software processes of the managed mobile device that are required for the enforcement of the restriction policy;

    (iv) placing mobile device into an inactive state;

    or (v) launching an application that can terminate or circumvent the enforcement of the restriction policy; and

    disrupting by the user events controller the tampering user event if the tampering user event tampers with enforcement of the restriction policy, and allowing the tampering user event to continue if the tampering user event does not tamper with enforcement of the restriction policy.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×