Methods, systems and computer program products for controlling usage of a mobile terminal
First Claim
1. A method for controlling usage of a mobile terminal, the method comprising:
- receiving a usage specification including an identification of allowed numbers, an identification of restricted numbers, a usage time limitation, an expiration value and/or a specification of enabled services of the mobile terminal that are restricted; and
limiting usage of the mobile terminal based on the received usage specification responsive to receipt of a valid authorization code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for controlling usage of a mobile terminal are provided. A usage specification including an identification of allowed numbers, an identification of restricted numbers, a usage time limitation, an expiration value and/or a specification of enabled services of the mobile terminal that are restricted is received. Usage of the mobile terminal is limited based on the received usage specification responsive to receipt of a valid authorization code. The authorization code and/or the usage specification may be received from a keypad and/or input screen of the mobile terminal. Alternatively, the authorization code and/or the usage specification are received from a remote user over a wireless communication connection.
98 Citations
30 Claims
-
1. A method for controlling usage of a mobile terminal, the method comprising:
-
receiving a usage specification including an identification of allowed numbers, an identification of restricted numbers, a usage time limitation, an expiration value and/or a specification of enabled services of the mobile terminal that are restricted; and
limiting usage of the mobile terminal based on the received usage specification responsive to receipt of a valid authorization code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A usage control system for a mobile terminal, the system comprising:
-
a user interface circuit for receiving from a user an authorization code and a usage specification including an identification of allowed numbers, an identification of restricted numbers, a usage time limitation, an expiration value and/or a specification of enabled services of the mobile terminal that are restricted; and
an access circuit configured to limit usage of the mobile terminal based on the received usage specification responsive to receipt of a valid authorization code. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer program product for controlling usage of a mobile terminal, the computer program product comprising:
-
a computer-readable storage medium having computer-readable program code embodied in said medium, said computer-readable program code comprising;
computer-readable program code that receives a usage specification including an identification of allowed numbers, an identification of restricted numbers, a usage time limitation, an expiration value and/or a specification of enabled services of the mobile terminal that are restricted; and
computer-readable program code that limits usage of the mobile terminal based on the received usage specification responsive to receipt of a valid authorization code.
-
Specification