SYSTEMS AND METHODS FOR RESTRICTING SERVICE IN MOBILE DEVICES
First Claim
1. A method for restricting a mobile device, comprising:
- receiving a request for connection of the mobile device;
determining if the request is for connection with a preauthorized contact;
establishing the connection if the request relates to a preauthorized contact; and
denying the connection if the request does not relate to a preauthorized contact, wherein the determining is performed using a list of contacts provided by a business administrator.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are described that enable remote restriction of workforce mobile phones, media players, computers and other devices. In particular, systems, apparatus and methods are described that deny or allow connections involving the mobile device based on the content of a preauthorized contact list provided by a business administrator. The connection may be any combination of incoming connection, outgoing connection, voice connection, data connection. The list of preauthorized contacts maybe updated upon receipt of a synchronization command from a business administrator. Access to the list of contacts can be blocked upon receiving a lockdown command from the business administrator. The list of contacts can be destroyed upon receiving a poison pill command from the business administrator. A client is described for controlling use of the mobile device.
43 Citations
22 Claims
-
1. A method for restricting a mobile device, comprising:
-
receiving a request for connection of the mobile device; determining if the request is for connection with a preauthorized contact; establishing the connection if the request relates to a preauthorized contact; and denying the connection if the request does not relate to a preauthorized contact, wherein the determining is performed using a list of contacts provided by a business administrator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. A restriction facility for a mobile device, comprising a client for processing commands received from a system controller wherein the commands include a lockdown command and, responsive to receiving the lockdown command, the client prevents access to a list of authorized contacts identifying a plurality of network nodes.
-
18. A computer-readable medium that stores instructions executable by one or more processing devices to perform a method for restricting a mobile device, the method comprising:
-
receiving a request for connection of the mobile device; determining if the request is for connection with a preauthorized contact; establishing the connection if the request relates to a preauthorized contact; and denying the connection if the request does not relate to a preauthorized contact, wherein the determining is performed using a list of contacts provided by a business administrator. - View Dependent Claims (19, 20, 21, 22)
-
Specification