System and Method for Controlling a Mobile
First Claim
Patent Images
1. A system, comprising:
- a controlling module for controlling a mobile device remotely.
13 Assignments
0 Petitions
Accused Products
Abstract
A system includes a controlling module for controlling a mobile device remotely A system includes a controlling module for controlling a mobile device remotely, wherein the controlling module includes a parental control module for controlling a mobile device used by a child. A system includes a controlling module for controlling a mobile device remotely, wherein the controlling module includes a parental control module for controlling a mobile device used by a child, wherein the parental control module includes a monitoring module for monitoring a use of the mobile device, and a filtering module for filtering an inappropriate content
333 Citations
372 Claims
-
1. A system, comprising:
a controlling module for controlling a mobile device remotely. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124)
-
2. The system of claim 1, wherein the controlling module comprises a parental control module for controlling a mobile device used by a child.
-
3. The system of claim 2, wherein the parental control module comprises:
-
a monitoring module for monitoring a use of the mobile device; and a filtering module for filtering an inappropriate content.
-
-
4. The system of claim 3, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
5. The system of claim 4, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
6. The system of claim 5, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
7. The system of claim 5, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
8. The system of claim 3, further comprising:
an application control module for controlling an application allowed to run on the mobile device.
-
9. The system of claim 8, wherein the application control module comprises:
-
an application blocking module for blocking an installation of an unauthorized application; and an application authorization policy module for authorizing an installation of an application according to a predetermined policy.
-
-
10. The system of claim 9, wherein the application control module runs on the mobile device.
-
11. The system of claim 10, wherein the application control module runs silently on the mobile device and cannot be disabled.
-
12. The system of claim 11, further comprising:
a password protected uninstall module for preventing an uninstalling of the application control module with password protection.
-
13. The system of claim 12, further comprising:
a heartbeat monitoring module for automatically restarting the application control module if the application control module terminates.
-
14. The system of claim 13, further comprising:
an uninstall notification module for notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control module.
-
15. The system of claim 9, wherein the application authorization policy module comprises:
-
a time-of-day restricting module for restricting a communication of the mobile device to a predetermined time period; a communicating party authorizing module for enabling a communication with an authorized communicating party; and a selective communication blocking module for blocking a communication having a predetermined communication characteristic.
-
-
16. The system of claim 15, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
17. The system of claim 9, wherein the application authorization policy module comprises:
-
a detected action notification module for notifying an occurrence of a notification triggering action; an attachment scanning module for scanning an attachment to a communication; an attachment notifying module for notifying an occurrence of an attachment scanned by the attachment scanning module; a software identifying module for identifying a software running on the mobile device; a software time-of-day restricting module for allowing a use of a software during a predetermined time period; a communicating party time-of-day authorizing module for controlling communication with a party during a predetermined time period; a software-specific authorizing module for controlling a running of a predetermined specific software on the mobile device; a list-specific software authorizing module for controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; a call-specific software authorizing module for controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; a software connection configuring module for configuring a connection that a software is authorized to utilize; a mobile device camera controlling module for controlling a use of a camera of the mobile device; a lock down module for locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; a backup module for backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; a restoring module for restoring the stored information on the mobile device; a stored information wiping module for wiping at least a portion of the stored information; a mobile device locating module for locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and a training mode module for pre-configuring an application right during initial setup of the mobile device.
-
-
18. The system of claim 17, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
19. The system of claim 17, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
20. The system of claim 18, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
21. The system of claim 9, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
22. The system of claim 21, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
23. The system of claim 22, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
24. The system of claim 22, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
25. The system of claim 3, further comprising:
an image filtering module for filtering an image on the mobile device.
-
26. The system of claim 25, wherein the image filtering module communicates with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
27. The system of claim 26, wherein the image filtering module blocks an image if the image matches an image in the inappropriate image database.
-
28. The system of claim 26, wherein the image filtering module further comprises:
an image blocking module for blocking an image that matches an image in the inappropriate image database.
-
29. The system of claim 28, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
30. The system of claim 29, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
31. The system of claim 28, wherein the image filtering module runs on at least one of a mobile device or a network.
-
32. The system of claim 31, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
33. The system of claim 27, wherein the image filtering module runs on the mobile device.
-
34. The system of claim 33, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
35. The system of claim 33, wherein the image filtering module blocks an image based on at least one of a filtering category or a predetermined setting.
-
36. The system of claim 27, wherein the image filtering module runs on a network.
-
37. The system of claim 36, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
38. The system of claim 36, wherein the image filtering module blocks an image based on at least one of a filtering category or a predetermined setting.
-
39. The system of claim 38, wherein the image filtering module further comprises:
-
a session terminating module for terminating a session containing an image filtered by the image filtering module; an inappropriate image logging module for logging an occurrence of an image being filtered by the image filtering module; an inappropriate image alerting module for alerting an occurrence of an image being filtered by the image filtering module; an illegal image alerting module for alerting an occurrence of an image being filtered by the image filtering module which is illegal; and a forensic analysis information module for providing information relating to an image filtered by the image filtering module, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
40. The system of claim 25, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
41. The system of claim 40, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
42. The system of claim 41, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
43. The system of claim 41, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
44. The system of claim 3, further comprising:
a Uniform Resource Locator filtering module for preventing access to information associated with a Uniform Resource Locator.
-
45. The system of claim 44, wherein the Uniform Resource Locator filtering module comprises:
a blacklist enabling module for controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
46. The system of claim 45, wherein the blacklist enabling module prevents the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
47. The system of claim 45, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
48. The system of claim 47, further comprising:
-
a blacklist updating module for performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; anda white list updating module for adding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
49. The system of claim 48, wherein an entry in the blacklist is hashed.
-
50. The system of claim 44, wherein the Uniform Resource Locator filtering module runs on the mobile device.
-
51. The system of claim 50, wherein a Uniform Resource Locator filtering module further comprises:
an access controlling module for controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
52. The system of claim 50, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
53. The system of claim 44, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
54. The system of claim 53, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
55. The system of claim 54, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
56. The system of claim 54, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
57. The system of claim 3, further comprising:
a centralized monitoring module for monitoring information from at least one of a mobile device or a network.
-
58. The system of claim 57, wherein the centralized monitoring module comprises:
-
an information providing module for providing information related to the mobile device to a user of the controlling module; a notification providing module for providing a notification to a user of the controlling module; a report collecting module for collecting a report from a mobile device; a security warning providing module for providing a security warning; an instruction providing module for providing an instruction; a update providing module for providing an update; and a user interface module for allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
59. The system of claim 57, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
60. The system of claim 59, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
61. The system of claim 60, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
62. The system of claim 60, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
63. The system of claim 3, further comprising:
-
a virus detecting module for detecting a virus; an anti-spam module for protecting against spam; and a malware monitoring module for protecting against malware.
-
-
64. The system of claim 1, wherein the controlling module comprises:
-
a monitoring module for monitoring a use of the mobile device; and a filtering module for filtering an inappropriate content.
-
-
65. The system of claim 64, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
66. The system of claim 65, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
67. The system of claim 66, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
68. The system of claim 66, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
69. The system of claim 64, further comprising:
an application control module for controlling an application allowed to run on the mobile device.
-
70. The system of claim 69, wherein the application control module comprises:
-
an application blocking module for blocking an installation of an unauthorized application; and an application authorization policy module for authorizing an installation of an application according to a predetermined policy.
-
-
71. The system of claim 70, wherein the application control module runs on the mobile device.
-
72. The system of claim 71, wherein the application control module runs silently on the mobile device and cannot be disabled.
-
73. The system of claim 72, further comprising:
a password protected uninstall module for preventing an uninstalling of the application control module with password protection.
-
74. The system of claim 73, further comprising:
a heartbeat monitoring module for automatically restarting the application control module if the application control module terminates.
-
75. The system of claim 74, further comprising:
an uninstall notification module for notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control module.
-
76. The system of claim 70, wherein the application authorization policy module comprises:
-
a time-of-day restricting module for restricting a communication of the mobile device to a predetermined time period; a communicating party authorizing module for enabling a communication with an authorized communicating party; and a selective communication blocking module for blocking a communication having a predetermined communication characteristic.
-
-
77. The system of claim 76, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
78. The system of claim 70, wherein the application authorization policy module comprises:
-
a detected action notification module for notifying an occurrence of a notification triggering action; an attachment scanning module for scanning an attachment to a communication; an attachment notifying module for notifying an occurrence of an attachment scanned by the attachment scanning module; a software identifying module for identifying a software running on the mobile device; a software time-of-day restricting module for allowing a use of a software during a predetermined time period; a communicating party time-of-day authorizing module for controlling communication with a party during a predetermined time period; a software-specific authorizing module for controlling a running of a predetermined specific software on the mobile device; a list-specific software authorizing module for controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; a call-specific software authorizing module for controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; a software connection configuring module for configuring a connection that a software is authorized to utilize; a mobile device camera controlling module for controlling a use of a camera of the mobile device; a lock down module for locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; a backup module for backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; a restoring module for restoring the stored information on the mobile device; a stored information wiping module for wiping at least a portion of the stored information; a mobile device locating module for locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and a training mode module for pre-configuring an application right during initial setup of the mobile device.
-
-
79. The system of claim 78, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
80. The system of claim 78, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
81. The system of claim 79, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
82. The system of claim 70, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
83. The system of claim 82, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
84. The system of claim 83, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
85. The system of claim 83, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
86. The system of claim 64, further comprising:
an image filtering module for filtering an image on the mobile device.
-
87. The system of claim 86, wherein the image filtering module communicates with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
88. The system of claim 87, wherein the image filtering module blocks an image if the image matches an image in the inappropriate image database.
-
89. The system of claim 87, wherein the image filtering module further comprises:
an image blocking module for blocking an image that matches an image in the inappropriate image database.
-
90. The system of claim 89, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
91. The system of claim 90, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
92. The system of claim 89, wherein the image filtering module runs on at least one of a mobile device or a network.
-
93. The system of claim 92, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
94. The system of claim 88, wherein the image filtering module runs on the mobile device.
-
95. The system of claim 94, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
96. The system of claim 94, wherein the image filtering module blocks an image based on at least one of a filtering category or a predetermined setting.
-
97. The system of claim 88, wherein the image filtering module runs on a network.
-
98. The system of claim 97, wherein the image filtering module filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
99. The system of claim 97, wherein the image filtering module blocks an image based on at least one of a filtering category or a predetermined setting.
-
100. The system of claim 99, wherein the image filtering module further comprises:
-
a session terminating module for terminating a session containing an image filtered by the image filtering module; an inappropriate image logging module for logging an occurrence of an image being filtered by the image filtering module; an inappropriate image alerting module for alerting an occurrence of an image being filtered by the image filtering module; an illegal image alerting module for alerting an occurrence of an image being filtered by the image filtering module which is illegal; and a forensic analysis information module for providing information relating to an image filtered by the image filtering module, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
101. The system of claim 86, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
102. The system of claim 101, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
103. The system of claim 102, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
104. The system of claim 102, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
105. The system of claim 64, further comprising:
a Uniform Resource Locator filtering module for preventing access to information associated with a Uniform Resource Locator.
-
106. The system of claim 105, wherein the Uniform Resource Locator filtering module comprises:
a blacklist enabling module for controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
107. The system of claim 106, wherein the blacklist enabling module prevents the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
108. The system of claim 106, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
109. The system of claim 108, further comprising:
-
a blacklist updating module for performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; anda white list updating module for adding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
110. The system of claim 109, wherein an entry in the blacklist is hashed.
-
111. The system of claim 105, wherein the Uniform Resource Locator filtering module runs on the mobile device.
-
112. The system of claim 111, wherein a Uniform Resource Locator filtering module further comprises:
an access controlling module for controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
113. The system of claim 111, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
114. The system of claim 105, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
115. The system of claim 114, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
116. The system of claim 115, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
117. The system of claim 115, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
118. The system of claim 64, further comprising:
a centralized monitoring module for monitoring information from at least one of a mobile device or a network.
-
119. The system of claim 118, wherein the centralized monitoring module comprises:
-
an information providing module for providing information related to the mobile device to a user of the controlling module; a notification providing module for providing a notification to a user of the controlling module; a report collecting module for collecting a report from a mobile device; a security warning providing module for providing a security warning; an instruction providing module for providing an instruction; a update providing module for providing an update; and a user interface module for allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
120. The system of claim 118, wherein the monitoring module comprises:
a web-based monitoring dashboard for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
121. The system of claim 120, wherein the monitoring module further comprises:
a policy setting module for determining a use policy for what use is permitted on the mobile device.
-
122. The system of claim 121, wherein the monitoring module further comprises:
-
a communication monitoring module for viewing a communication with the mobile device; a contact monitoring module for viewing information relating to a party communicating with the mobile device; a call log monitoring module for viewing a log of a call on the mobile device; a text message monitoring module for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring module for viewing an email transferred to and from the mobile device; a website monitoring module for viewing a website visited on the mobile device; an image file monitoring module for viewing an image transferred to and from the mobile device; a location monitoring module for viewing a location of the mobile device; and an application monitoring module for viewing an application on the mobile device.
-
-
123. The system of claim 121, wherein the policy setting module further comprises:
-
a locking module for initiating a locking of the mobile device; a wiping module for initiating a wiping of at least one file on the mobile device; a backing up module for backing up data of the mobile device; a porting module for porting a file in the mobile device to another mobile device; a virus protecting module for initiating an update of a virus protection on the mobile device; and a use policy updating module for at least one of amending, adding or deleting an existing use policy.
-
-
124. The system of claim 64, further comprising:
-
a virus detecting module for detecting a virus; an anti-spam module for protecting against spam; and a malware monitoring module for protecting against malware.
-
-
2. The system of claim 1, wherein the controlling module comprises a parental control module for controlling a mobile device used by a child.
-
125. A system, comprising:
a controlling means for controlling a mobile device remotely. - View Dependent Claims (126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, 241, 242, 243, 244, 245, 246, 247, 248)
-
126. The system of claim 125, wherein the controlling means comprises a parental control means for controlling a mobile device used by a child.
-
127. The system of claim 126, wherein the parental control means comprises:
-
a monitoring means for monitoring a use of the mobile device; and a filtering means for filtering an inappropriate content.
-
-
128. The system of claim 127, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
129. The system of claim 128, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
130. The system of claim 129, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
131. The system of claim 129, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
132. The system of claim 127, further comprising:
an application control means for controlling an application allowed to run on the mobile device.
-
133. The system of claim 132, wherein the application control means comprises:
-
an application blocking means for blocking an installation of an unauthorized application; and an application authorization policy means for authorizing an installation of an application according to a predetermined policy.
-
-
134. The system of claim 133, wherein the application control means runs on the mobile device.
-
135. The system of claim 134, wherein the application control means runs silently on the mobile device and cannot be disabled.
-
136. The system of claim 135, further comprising:
a password protected uninstall means for preventing an uninstalling of the application control means with password protection.
-
137. The system of claim 136, further comprising:
a heartbeat monitoring means for automatically restarting the application control means if the application control means terminates.
-
138. The system of claim 137, further comprising:
an uninstall notification means for notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control means.
-
139. The system of claim 133, wherein the application authorization policy means comprises:
-
a time-of-day restricting means for restricting a communication of the mobile device to a predetermined time period; a communicating party authorizing means for enabling a communication with an authorized communicating party; and a selective communication blocking means for blocking a communication having a predetermined communication characteristic.
-
-
140. The system of claim 139, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
141. The system of claim 133, wherein the application authorization policy means comprises:
-
a detected action notification means for notifying an occurrence of a notification triggering action; an attachment scanning means for scanning an attachment to a communication; an attachment notifying means for notifying an occurrence of an attachment scanned by the attachment scanning means; a software identifying means for identifying a software running on the mobile device; a software time-of-day restricting means for allowing a use of a software during a predetermined time period; a communicating party time-of-day authorizing means for controlling communication with a party during a predetermined time period; a software-specific authorizing means for controlling a running of a predetermined specific software on the mobile device; a list-specific software authorizing means for controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; a call-specific software authorizing means for controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; a software connection configuring means for configuring a connection that a software is authorized to utilize; a mobile device camera controlling means for controlling a use of a camera of the mobile device; a lock down means for locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; a backup means for backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; a restoring means for restoring the stored information on the mobile device; a stored information wiping means for wiping at least a portion of the stored information; a mobile device locating means for locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and a training mode means for pre-configuring an application right during initial setup of the mobile device.
-
-
142. The system of claim 141, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
143. The system of claim 141, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
144. The system of claim 142, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
145. The system of claim 133, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
146. The system of claim 145, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
147. The system of claim 146, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
148. The system of claim 146, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
149. The system of claim 127, further comprising:
an image filtering means for filtering an image on the mobile device.
-
150. The system of claim 149, wherein the image filtering means communicates with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
151. The system of claim 150, wherein the image filtering means blocks an image if the image matches an image in the inappropriate image database.
-
152. The system of claim 150, wherein the image filtering means further comprises:
an image blocking means for blocking an image that matches an image in the inappropriate image database.
-
153. The system of claim 152, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
154. The system of claim 153, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
155. The system of claim 152, wherein the image filtering means runs on at least one of a mobile device or a network.
-
156. The system of claim 155, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
157. The system of claim 151, wherein the image filtering means runs on the mobile device.
-
158. The system of claim 157, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
159. The system of claim 157, wherein the image filtering means blocks an image based on at least one of a filtering category or a predetermined setting.
-
160. The system of claim 151, wherein the image filtering means runs on a network.
-
161. The system of claim 160, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
162. The system of claim 160, wherein the image filtering means blocks an image based on at least one of a filtering category or a predetermined setting.
-
163. The system of claim 162, wherein the image filtering means further comprises:
-
a session terminating means for terminating a session containing an image filtered by the image filtering means; an inappropriate image logging means for logging an occurrence of an image being filtered by the image filtering means; an inappropriate image alerting means for alerting an occurrence of an image being filtered by the image filtering means; an illegal image alerting means for alerting an occurrence of an image being filtered by the image filtering means which is illegal; and a forensic analysis information means for providing information relating to an image filtered by the image filtering means, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
164. The system of claim 149, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
165. The system of claim 164, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
166. The system of claim 165, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
167. The system of claim 165, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
168. The system of claim 127, further comprising:
a Uniform Resource Locator filtering means for preventing access to information associated with a Uniform Resource Locator.
-
169. The system of claim 168, wherein the Uniform Resource Locator filtering means comprises:
a blacklist enabling means for controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
170. The system of claim 169, wherein the blacklist enabling means prevents the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
171. The system of claim 169, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
172. The system of claim 171, further comprising:
-
a blacklist updating means for performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; anda white list updating means for adding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
173. The system of claim 172, wherein an entry in the blacklist is hashed.
-
174. The system of claim 168, wherein the Uniform Resource Locator filtering means runs on the mobile device.
-
175. The system of claim 174, wherein a Uniform Resource Locator filtering means further comprises:
an access controlling means for controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
176. The system of claim 174, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
177. The system of claim 168, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
178. The system of claim 177, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
179. The system of claim 178, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
180. The system of claim 178, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
181. The system of claim 127, further comprising:
a centralized monitoring means for monitoring information from at least one of a mobile device or a network.
-
182. The system of claim 181, wherein the centralized monitoring means comprises:
-
an information providing means for providing information related to the mobile device to a user of the controlling means; a notification providing means for providing a notification to a user of the controlling means; a report collecting means for collecting a report from a mobile device; a security warning providing means for providing a security warning; an instruction providing means for providing an instruction; a update providing means for providing an update; and a user interface means for allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
183. The system of claim 181, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
184. The system of claim 183, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
185. The system of claim 184, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
186. The system of claim 184, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
187. The system of claim 127, further comprising:
-
a virus detecting means for detecting a virus; an anti-spam means for protecting against spam; and a malware monitoring means for protecting against malware.
-
-
188. The system of claim 125, wherein the controlling means comprises:
-
a monitoring means for monitoring a use of the mobile device; and a filtering means for filtering an inappropriate content.
-
-
189. The system of claim 188, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
190. The system of claim 189, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
191. The system of claim 190, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
192. The system of claim 190, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
193. The system of claim 188, further comprising:
an application control means for controlling an application allowed to run on the mobile device.
-
194. The system of claim 193, wherein the application control means comprises:
-
an application blocking means for blocking an installation of an unauthorized application; and an application authorization policy means for authorizing an installation of an application according to a predetermined policy.
-
-
195. The system of claim 194, wherein the application control means runs on the mobile device.
-
196. The system of claim 195, wherein the application control means runs silently on the mobile device and cannot be disabled.
-
197. The system of claim 196, further comprising:
a password protected uninstall means for preventing an uninstalling of the application control means with password protection.
-
198. The system of claim 197, further comprising:
a heartbeat monitoring means for automatically restarting the application control means if the application control means terminates.
-
199. The system of claim 198, further comprising:
an uninstall notification means for notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control means.
-
200. The system of claim 194, wherein the application authorization policy means comprises:
-
a time-of-day restricting means for restricting a communication of the mobile device to a predetermined time period; a communicating party authorizing means for enabling a communication with an authorized communicating party; and a selective communication blocking means for blocking a communication having a predetermined communication characteristic.
-
-
201. The system of claim 200, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
202. The system of claim 194, wherein the application authorization policy means comprises:
-
a detected action notification means for notifying an occurrence of a notification triggering action; an attachment scanning means for scanning an attachment to a communication; an attachment notifying means for notifying an occurrence of an attachment scanned by the attachment scanning means; a software identifying means for identifying a software running on the mobile device; a software time-of-day restricting means for allowing a use of a software during a predetermined time period; a communicating party time-of-day authorizing means for controlling communication with a party during a predetermined time period; a software-specific authorizing means for controlling a running of a predetermined specific software on the mobile device; a list-specific software authorizing means for controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; a call-specific software authorizing means for controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; a software connection configuring means for configuring a connection that a software is authorized to utilize; a mobile device camera controlling means for controlling a use of a camera of the mobile device; a lock down means for locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; a backup means for backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; a restoring means for restoring the stored information on the mobile device; a stored information wiping means for wiping at least a portion of the stored information; a mobile device locating means for locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and a training mode means for pre-configuring an application right during initial setup of the mobile device.
-
-
203. The system of claim 202, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
204. The system of claim 202, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
205. The system of claim 203, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
206. The system of claim 194, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
207. The system of claim 206, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
208. The system of claim 207, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
209. The system of claim 207, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
210. The system of claim 188, further comprising:
an image filtering means for filtering an image on the mobile device.
-
211. The system of claim 210, wherein the image filtering means communicates with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
212. The system of claim 211, wherein the image filtering means blocks an image if the image matches an image in the inappropriate image database.
-
213. The system of claim 211, wherein the image filtering means further comprises:
an image blocking means for blocking an image that matches an image in the inappropriate image database.
-
214. The system of claim 213, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
215. The system of claim 214, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
216. The system of claim 213, wherein the image filtering means runs on at least one of a mobile device or a network.
-
217. The system of claim 216, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
218. The system of claim 212, wherein the image filtering means runs on the mobile device.
-
219. The system of claim 218, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
220. The system of claim 218, wherein the image filtering means blocks an image based on at least one of a filtering category or a predetermined setting.
-
221. The system of claim 212, wherein the image filtering means runs on a network.
-
222. The system of claim 221, wherein the image filtering means filters an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
223. The system of claim 221, wherein the image filtering means blocks an image based on at least one of a filtering category or a predetermined setting.
-
224. The system of claim 223, wherein the image filtering means further comprises:
-
a session terminating means for terminating a session containing an image filtered by the image filtering means; an inappropriate image logging means for logging an occurrence of an image being filtered by the image filtering means; an inappropriate image alerting means for alerting an occurrence of an image being filtered by the image filtering means; an illegal image alerting means for alerting an occurrence of an image being filtered by the image filtering means which is illegal; and a forensic analysis information means for providing information relating to an image filtered by the image filtering means, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
225. The system of claim 210, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
226. The system of claim 225, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
227. The system of claim 226, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
228. The system of claim 226, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
229. The system of claim 188, further comprising:
a Uniform Resource Locator filtering means for preventing access to information associated with a Uniform Resource Locator.
-
230. The system of claim 229, wherein the Uniform Resource Locator filtering means comprises:
a blacklist enabling means for controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
231. The system of claim 230, wherein the blacklist enabling means prevents the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
232. The system of claim 230, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
233. The system of claim 232, further comprising:
-
a blacklist updating means for performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; anda white list updating means for adding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
234. The system of claim 233, wherein an entry in the blacklist is hashed.
-
235. The system of claim 229, wherein the Uniform Resource Locator filtering means runs on the mobile device.
-
236. The system of claim 235, wherein a Uniform Resource Locator filtering means further comprises:
an access controlling means for controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
237. The system of claim 235, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
238. The system of claim 229, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
239. The system of claim 238, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
240. The system of claim 239, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
241. The system of claim 239, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
242. The system of claim 125, further comprising:
a centralized monitoring means for monitoring information from at least one of a mobile device or a network.
-
243. The system of claim 242, wherein the centralized monitoring means comprises:
-
an information providing means for providing information related to the mobile device to a user of the controlling means; a notification providing means for providing a notification to a user of the controlling means; a report collecting means for collecting a report from a mobile device; a security warning providing means for providing a security warning; an instruction providing means for providing an instruction; a update providing means for providing an update; and a user interface means for allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
244. The system of claim 242, wherein the monitoring means comprises:
a web-based monitoring means for monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
245. The system of claim 244, wherein the monitoring means further comprises:
a policy setting means for determining a use policy for what use is permitted on the mobile device.
-
246. The system of claim 245, wherein the monitoring means further comprises:
-
a communication monitoring means for viewing a communication with the mobile device; a contact monitoring means for viewing information relating to a party communicating with the mobile device; a call log monitoring means for viewing a log of a call on the mobile device; a text message monitoring means for viewing at least one of a text message and a text message attachment transferred to and from the mobile device; an email monitoring means for viewing an email transferred to and from the mobile device; a website monitoring means for viewing a website visited on the mobile device; an image file monitoring means for viewing an image transferred to and from the mobile device; a location monitoring means for viewing a location of the mobile device; and an application monitoring means for viewing an application on the mobile device.
-
-
247. The system of claim 245, wherein the policy setting means further comprises:
-
a locking means for initiating a locking of the mobile device; a wiping means for initiating a wiping of at least one file on the mobile device; a backing up means for backing up data of the mobile device; a porting means for porting a file in the mobile device to another mobile device; a virus protecting means for initiating an update of a virus protection on the mobile device; and a use policy updating means for at least one of amending, adding or deleting an existing use policy.
-
-
248. The system of claim 188, further comprising:
-
a virus detecting means for detecting a virus; an anti-spam means for protecting against spam; and a malware monitoring means for protecting against malware.
-
-
126. The system of claim 125, wherein the controlling means comprises a parental control means for controlling a mobile device used by a child.
-
249. A method, comprising:
controlling a mobile device remotely. - View Dependent Claims (250, 251, 252, 253, 254, 255, 256, 257, 258, 259, 260, 261, 262, 263, 264, 265, 266, 267, 268, 269, 270, 271, 272, 273, 274, 275, 276, 277, 278, 279, 280, 281, 282, 283, 284, 285, 286, 287, 288, 289, 290, 291, 292, 293, 294, 295, 296, 297, 298, 299, 300, 301, 302, 303, 304, 305, 306, 307, 308, 309, 310, 311, 312, 313, 314, 315, 316, 317, 318, 319, 320, 321, 322, 323, 324, 325, 326, 327, 328, 329, 330, 331, 332, 333, 334, 335, 336, 337, 338, 339, 342, 343, 345, 346, 347, 348, 349, 350, 351, 352, 353, 354, 355, 356, 357, 358, 359, 360, 361, 362, 363, 364, 365, 366, 367, 368, 369, 370, 371, 372)
-
250. The method of claim 249, wherein the controlling step comprises parental controlling a mobile device used by a child.
-
251. The method of claim 250, wherein the parental controlling step comprises:
-
monitoring a use of the mobile device; and filtering an inappropriate content.
-
-
252. The method of claim 251, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
253. The method of claim 252, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
254. The method of claim 253, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
255. The method of claim 253, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
256. The method of claim 251, further comprising:
controlling an application allowed to run on the mobile device.
-
257. The method of claim 256, wherein the application controlling step comprises:
-
blocking an installation of an unauthorized application; and authorizing an installation of an application according to a predetermined policy.
-
-
258. The method of claim 257, wherein the application controlling step runs on the mobile device.
-
259. The method of claim 258, wherein the application controlling step runs silently on the mobile device and cannot be disabled.
-
260. The method of claim 259, further comprising:
preventing an uninstalling of the application control means with password protection.
-
261. The method of claim 260, further comprising:
automatically restarting the application control means if the application controlling step terminates without authorization.
-
262. The method of claim 261, further comprising:
notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control means.
-
263. The method of claim 257, wherein the authorizing an installation of an application step comprises:
-
restricting a communication of the mobile device to a predetermined time period; enabling a communication with an authorized communicating party; and blocking a communication having a predetermined communication characteristic.
-
-
264. The method of claim 263, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
265. The method of claim 257, wherein the authorizing an installation of an application step comprises:
-
notifying an occurrence of a notification triggering action; scanning an attachment to a communication; notifying an occurrence of an attachment scanned by the attachment scanning means; identifying a software running on the mobile device; allowing a use of a software during a predetermined time period; controlling communication with a party during a predetermined time period; controlling a running of a predetermined specific software on the mobile device; controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; configuring a connection that a software is authorized to utilize; controlling a use of a camera of the mobile device; locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; restoring the stored information on the mobile device; wiping at least a portion of the stored information; locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and pre-configuring an application right during initial setup of the mobile device.
-
-
266. The method of claim 265, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
267. The method of claim 265, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
268. The method of claim 266, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
269. The method of claim 257, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
270. The method of claim 269, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
271. The method of claim 270, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
272. The method of claim 270, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
273. The method of claim 251, further comprising:
filtering an image on the mobile device.
-
274. The method of claim 273, wherein the filtering an image step comprises communicating with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
275. The method of claim 274, wherein the filtering an image step comprises blocking an image if the image matches an image in the inappropriate image database.
-
276. The method of claim 274, wherein the filtering an image step further comprises:
blocking an image that matches an image in the inappropriate image database.
-
277. The method of claim 276, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
278. The method of claim 277, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
279. The method of claim 276, wherein the filtering an image step runs on at least one of a mobile device or a network.
-
280. The method of claim 279, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
281. The method of claim 275, wherein the filtering an image step runs on the mobile device.
-
282. The method of claim 281, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
283. The method of claim 281, wherein the filtering an image step comprises blocking an image based on at least one of a filtering category or a predetermined setting.
-
284. The method of claim 271, wherein the filtering an image step runs on a network.
-
285. The method of claim 284, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
286. The method of claim 284, wherein the filtering an image step comprises blocking an image based on at least one of a filtering category or a predetermined setting.
-
287. The method of claim 286, wherein the filtering an image step further comprises:
-
terminating a session containing an image filtered by the filtering an image step; logging an occurrence of an image being filtered by the filtering an image step; alerting an occurrence of an image being filtered by the filtering an image step; alerting an occurrence of an image being filtered by the filtering an image step which is illegal; and providing information relating to an image filtered by the filtering an image step, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
288. The method of claim 273, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
289. The method of claim 288, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
290. The method of claim 289, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
291. The method of claim 289, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
292. The method of claim 251, further comprising:
preventing access to information associated with a Uniform Resource Locator.
-
293. The method of claim 292, wherein the Uniform Resource Locator preventing access step comprises:
controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
294. The method of claim 293, wherein the controlling a blacklist step comprises preventing the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
295. The method of claim 293, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
296. The method of claim 295, further comprising:
-
performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; andadding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
297. The method of claim 296, wherein an entry in the blacklist is hashed.
-
298. The method of claim 292, wherein the Uniform Resource Locator preventing access step runs on the mobile device.
-
299. The method of claim 298, wherein the Uniform Resource Locator preventing access step further comprises:
controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
300. The method of claim 298, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
301. The method of claim 292, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
302. The method of claim 301, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
303. The method of claim 302, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
304. The method of claim 302, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
305. The method of claim 251, further comprising:
monitoring centrally information from at least one of a mobile device or a network.
-
306. The method of claim 305, wherein the monitoring centrally step comprises:
-
providing information related to the mobile device to a user of the controlling means; providing a notification to a user of the controlling means; collecting a report from a mobile device; providing a security warning; providing an instruction; providing an update; and allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
307. The method of claim 305, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
308. The method of claim 307, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
309. The method of claim 308, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
310. The method of claim 308, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
311. The method of claim 251, further comprising:
-
detecting a virus; protecting against spam; and protecting against malware.
-
-
312. The method of claim 249, wherein the controlling step comprises:
-
monitoring a use of the mobile device; and filtering an inappropriate content.
-
-
313. The method of claim 312, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
314. The method of claim 313, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
315. The method of claim 314, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
316. The method of claim 314, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
317. The method of claim 312, further comprising:
controlling an application allowed to run on the mobile device.
-
318. The method of claim 317, wherein the application controlling step comprises:
-
blocking an installation of an unauthorized application; and authorizing an installation of an application according to a predetermined policy.
-
-
319. The method of claim 318, wherein the application controlling step runs on the mobile device.
-
320. The method of claim 319, wherein the application controlling step runs silently on the mobile device and cannot be disabled.
-
321. The method of claim 320, further comprising:
preventing an uninstalling of the application control means with password protection.
-
322. The method of claim 321, further comprising:
automatically restarting the application control means if the application controlling step terminates without authorization.
-
323. The method of claim 322, further comprising:
notifying an occurrence of at least one of an attempted uninstall or an attempted modification of the application control means.
-
324. The method of claim 318, wherein the authorizing an installation of an application step comprises:
-
restricting a communication of the mobile device to a predetermined time period; enabling a communication with an authorized communicating party; and blocking a communication having a predetermined communication characteristic.
-
-
325. The method of claim 324, wherein the predetermined communication characteristic comprises whether a communication includes a communication attachment, wherein the communication attachment comprises at least one of an image file, a music file, or an executable file.
-
326. The method of claim 318, wherein the authorizing an installation of an application step comprises:
-
notifying an occurrence of a notification triggering action; scanning an attachment to a communication; notifying an occurrence of an attachment scanned by the attachment scanning means; identifying a software running on the mobile device; allowing a use of a software during a predetermined time period; controlling communication with a party during a predetermined time period; controlling a running of a predetermined specific software on the mobile device; controlling a running of a software based on a list, wherein the list comprises at least one of a whitelist and a blacklist; controlling a running of a software based on a call-type, wherein the call-type comprises at least one of a type of system call or a type of function call; configuring a connection that a software is authorized to utilize; controlling a use of a camera of the mobile device; locking down the mobile phone, wherein locking down comprises at least one of locking down connectivity, locking down installation activity, or powering down; backing up stored information on the mobile device, wherein stored information comprises at least one of an application or a data; restoring the stored information on the mobile device; wiping at least a portion of the stored information; locating the mobile device, wherein the locating may be accomplished via at least one of network triangulation or an internal Global Positioning System device; and pre-configuring an application right during initial setup of the mobile device.
-
-
327. The method of claim 326, wherein a communication comprises at least one of instant messaging, P2P file sharing, telephony, conferencing, fax, VoIP, email, or web browsing.
-
328. The method of claim 326, wherein a software comprises at least one of media player software, media recorder software, proxy avoidance software for enabling a bypassing of proxy server features, remote access software for accessing at least one of a computing device or a network, device auditing software for auditing activity on the mobile device, or gambling software.
-
329. The method of claim 327, wherein the web browsing comprises an access to at least one of an adult site, a gambling site, or a game site.
-
330. The method of claim 318, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
331. The method of claim 330, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
332. The method of claim 331, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
333. The method of claim 331, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
334. The method of claim 312, further comprising:
filtering an image on the mobile device.
-
335. The method of claim 334, wherein the filtering an image step comprises communicating with an inappropriate image database, wherein the inappropriate image database comprises at least one inappropriate image, wherein the inappropriate image comprises at least one of an illegal child image, a highly illicit image, a pornographic image, or a predetermined inappropriate image.
-
336. The method of claim 335, wherein the filtering an image step comprises blocking an image if the image matches an image in the inappropriate image database.
-
337. The method of claim 335, wherein the filtering an image step further comprises:
blocking an image that matches an image in the inappropriate image database.
-
338. The method of claim 337, wherein the inappropriate image database comprises at least one of a third party database, a local cache of names, or a local cache of hashes.
-
339. The method of claim 338, wherein an image in the inappropriate image database is associated with at least one of an age-appropriateness rating, a maturity rating system, or a letter based system, wherein the letter based system comprises a rating from at least one of G, PG, PG-13, R, NC-17, or X.
-
342. The method of claim 336, wherein the filtering an image step runs on the mobile device.
-
343. The method of claim 342, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication;
- or a P2P communication.
-
345. The method of claim 332, wherein the filtering an image step runs on a network.
-
346. The method of claim 345, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, an email attachment, a Bluetooth communication, a web browser communication, or a P2P communication.
-
347. The method of claim 345, wherein the filtering an image step comprises blocking an image based on at least one of a filtering category or a predetermined setting.
-
348. The method of claim 347, wherein the filtering an image step further comprises:
-
terminating a session containing an image filtered by the filtering an image step; logging an occurrence of an image being filtered by the filtering an image step; alerting an occurrence of an image being filtered by the filtering an image step; alerting an occurrence of an image being filtered by the filtering an image step which is illegal; and providing information relating to an image filtered by the filtering an image step, wherein the information comprises at least one of an identity of a camera associated with the image;
a software associated with the image;
a serial number of a camera associated with the image;
a serial number of a software associated with the image;
an owner name of a camera associated with the image;
a creation date of the image;
a modification date of the image;
a save date of the image;
or an attribute of the image.
-
-
349. The method of claim 334, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
350. The method of claim 349, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
351. The method of claim 350, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
352. The method of claim 350, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
353. The method of claim 312, further comprising:
preventing access to information associated with a Uniform Resource Locator.
-
354. The method of claim 353, wherein the Uniform Resource Locator preventing access step comprises:
controlling a blacklist of information associated with a list of blacklisted Uniform Resource Locators.
-
355. The method of claim 354, wherein the controlling a blacklist step comprises preventing the mobile device from accessing at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, or a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user.
-
356. The method of claim 354, wherein the blacklist of information comprises at least one of a fee-based provider list or an open provider list.
-
357. The method of claim 356, further comprising:
-
performing at least one of adding to the blacklist a Uniform Resource Locator for a website containing a link to an illegal image;
adding to the blacklist an IP address associated with the website containing a link to an illegal image;
adding to the blacklist a domain associated with the website containing a link to an illegal image; andadding a Uniform Resource Locator for a website not containing a link to at least one of an inappropriate image or an illegal image.
-
-
358. The method of claim 357, wherein an entry in the blacklist is hashed.
-
359. The method of claim 353, wherein the Uniform Resource Locator preventing access step runs on the mobile device.
-
360. The method of claim 359, wherein the Uniform Resource Locator preventing access step further comprises:
controlling access by the mobile device to a website, wherein the website is checked against a local cache of a blacklist, wherein the blacklist comprises information relating to a Uniform Resource Locator containing information predetermined to be not accessible.
-
361. The method of claim 359, wherein the blacklist comprises at least one of an adult Uniform Resource Locator, a pornographic Uniform Resource Locator, an adult domain, a pornographic domain, a Uniform Resource Locator for a website containing a link to an illegal image, a Uniform Resource Locator for a website containing a link to a pornographic image, a Uniform Resource Locator for a website containing content associated with a rating higher than allowed for a user, a website rated at a predetermined level under an age-specific rating system, or a website contained in third party database of adult sites.
-
362. The method of claim 353, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
363. The method of claim 362, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
364. The method of claim 363, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
365. The method of claim 363, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
366. The method of claim 312, further comprising:
monitoring centrally information from at least one of a mobile device or a network.
-
367. The method of claim 366, wherein the monitoring centrally step comprises:
-
providing information related to the mobile device to a user of the controlling means; providing a notification to a user of the controlling means; collecting a report from a mobile device; providing a security warning; providing an instruction; providing an update; and allowing at least one of monitoring network activity or analyzing a report associated with at least one of a mobile device or a network.
-
-
368. The method of claim 366, wherein the monitoring step comprises:
monitoring at least one of a text message, voice data, video data, and online activity of the mobile device.
-
369. The method of claim 368, wherein the monitoring step further comprises:
determining a use policy for what use is permitted on the mobile device.
-
370. The method of claim 369, wherein the monitoring step further comprises:
-
viewing a communication with the mobile device; viewing information relating to a party communicating with the mobile device; viewing a log of a call on the mobile device; viewing at least one of a text message and a text message attachment transferred to and from the mobile device; viewing an email transferred to and from the mobile device; viewing a website visited on the mobile device; viewing an image transferred to and from the mobile device; viewing a location of the mobile device; and viewing an application on the mobile device.
-
-
371. The method of claim 369, wherein the use policy determining step further comprises:
-
initiating a locking of the mobile device; initiating a wiping of at least one file on the mobile device; backing up data of the mobile device; porting a file in the mobile device to another mobile device; initiating an update of a virus protection on the mobile device; and updating a use policy for at least one of amending, adding or deleting an existing use policy.
-
-
372. The method of claim 312, further comprising:
-
detecting a virus; protecting against spam; and protecting against malware.
-
-
250. The method of claim 249, wherein the controlling step comprises parental controlling a mobile device used by a child.
-
340. The method of claim 340, wherein the filtering an image step runs on at least one of a mobile device or a network.
- View Dependent Claims (341)
-
341. The method of claim 340, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
341. The method of claim 340, wherein the filtering an image step comprises filtering an image associated with at least one of an internet communication, a text message, an email message, or an email attachment.
-
344. The method of claim 234281, wherein the filtering an image step comprises blocking an image based on at least one of a filtering category or a predetermined setting.
Specification
- Resources
Thank you for your request. You will receive a custom alert email when the Litigation Campaign Assessment is available.
×
-
Current AssigneePulse Secure, LLC (Ivanti Software, Inc.)
-
Original AssigneeJuniper Networks Incorporated
-
InventorsBOOK, Neil, Hoffman, Daniel V.
-
Granted Patent
-
Time in Patent OfficeDays
-
Field of Search
-
US Class Current455/411
-
CPC Class CodesG06F 21/305 by remotely controlling dev...G06F 21/552 involving long-term monitor...G06F 21/6218 to a system of files or obj...G06F 2221/2141 Access rights, e.g. capabil...G06F 2221/2149 Restricted operating enviro...H04L 63/102 Entity profilesH04M 2203/6081 Service authorization mecha...H04M 3/38 Graded-service arrangements...H04M 3/42161 via computer interfaceH04M 3/436 Arrangements for screening ...H04W 12/12 Detection or prevention of ...H04W 12/37 Managing security policies ...