Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20050113130 A1
Publication typeApplication
Application numberUS 10/962,158
Publication dateMay 26, 2005
Filing dateOct 8, 2004
Priority dateOct 10, 2003
Also published asCA2542352A1, EP1678937A2, EP1678937A4, US8204494, US8655342, US20100151849, US20130023263, WO2005036899A2, WO2005036899A3, WO2005036899B1
Publication number10962158, 962158, US 2005/0113130 A1, US 2005/113130 A1, US 20050113130 A1, US 20050113130A1, US 2005113130 A1, US 2005113130A1, US-A1-20050113130, US-A1-2005113130, US2005/0113130A1, US2005/113130A1, US20050113130 A1, US20050113130A1, US2005113130 A1, US2005113130A1
InventorsMark Weinzierl
Original AssigneeEnfora, L.P.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Controlling the use of a wireless mobile communication device
US 20050113130 A1
Abstract
A controlling party can set limitations on a controlled party's access to applications operating on the controlled party's wireless mobile communication device. The controlling party can effectuate these limitations via various different mechanisms. In one instance, the controlling party uses another wireless communication device to effectuate the limitations. In another instance, the limitations are effectuated by the controlling party's operation of a data processing apparatus connected by a wired data communication bus to the controlled party's wireless mobile communication device. In a still further instance, the controlling party effectuates the limitations by accessing a website supported by a web server.
Images(6)
Previous page
Next page
Claims(33)
1. canceled.
2. canceled.
3. A wireless mobile communication apparatus, comprising:
a data processor for supporting a user application that is controllably accessible to a user of said wireless mobile communication apparatus;
an input for receiving from an external communication source information indicative of a limitation that a controlling party desires to impose on the user's access to the user application; and wherein
said data processor is coupled to said input and responsive to said limitation information for automatically limiting the user's access to the user application in accordance with said limitation information.
4. The apparatus of claim 3, wherein said limitation information defines the user's ability to access the user application during selected times or under selected conditions.
5. The apparatus of claim 3, wherein said limitation information includes information indicative of one of a denial of the user's access to the user application, a time period during which the user's access to the user application is prohibited, a limit on a total amount of time permitted for the user's cumulative access of the user application, and a limit on the user's ability to access the user application for other than actions permitted by the controlling party.
6. The apparatus of claim 3, provided as one of a telephone, a personal digital assistant, and a portable computer, each equipped for wireless communication.
7. The apparatus of claim 3, wherein said data processor is responsive to receipt of said limitation information for providing an acknowledgement of said receipt, and including an output coupled to said data processor for outputting said acknowledgement for transmission to the external communication source.
8. The apparatus of claim 3, wherein said data processor is responsive to receipt of said limitation information for performing checksum verification of said limitation information.
9. The apparatus of claim 3, wherein said input is for receiving said limitation information via one of a wired communication channel and a wireless communication channel.
10. The apparatus of claim 9, wherein said wired communication channel includes one of a Universal Serial Bus (USB) and an RS-232 bus, and wherein said wireless communication channel includes a GSM/GPRS channel.
11. An apparatus for controlling the use of a wireless mobile communication device, comprising:
a controlling party interface for enabling a controlling party to input first information indicative of a user application running on the wireless mobile communication device and controllably accessible to a user, and second information indicative of a limitation that the controlling party desires to impose on the user's access to the user application;
a data processor having an input coupled to said controlling party interface, said data processor for associating said first information to said second information and for producing third information indicative of an association between said first information and said second information; and
an output coupled to said data processor for outputting said third information for transmission to the wireless mobile communication device.
12. The apparatus of claim 11, wherein said output is for outputting said third information for transmission on one of a wired communication channel and a wireless communication channel.
13. The apparatus of claim 12, wherein said wired communication channel includes one of a Universal Serial Bus (USB) and an RS-232 bus, and wherein said wireless communication channel includes a GSM/GPRS channel.
14. The apparatus of claim 11, wherein said data processor supports a text messaging application for providing said third information in a text message.
15. The apparatus of claim 11, wherein said data processor is provided in a web server.
16. The apparatus of claim 15, wherein said controlling party interface includes a website implemented by said web server.
17. The apparatus of claim 16, wherein said website is accessible through the Internet.
18. The apparatus of claim 11, wherein said wireless mobile communication device is provided as one of a telephone, a personal digital assistant, and a portable computer, each equipped for wireless communication.
19. The apparatus of claim 11, provided as one of a telephone, a desktop computer, a portable computer and a personal digital assistant.
20. A method of controlling the use of a wireless mobile communication apparatus, comprising:
transmitting, from a communication source apparatus to a communication destination apparatus that is physically separate from the communication source apparatus, information indicative of a limitation that a controlling party desires to impose on a user's access to a user application running on the wireless mobile communication apparatus and controllably accessible to the user;
in response to receipt of the limitation information at the communication destination apparatus, transferring the limitation information to the wireless mobile communication apparatus; and
in response to receipt of the limitation information at the wireless mobile communication apparatus, automatically limiting the user's access to the user application in accordance with the limitation information.
21. The method of claim 20, wherein said transmitting step includes transmitting the limitation information on one of a wired communication channel and a wireless communication channel.
22. The method of claim 20, wherein said transmitting step includes transmitting the limitation information across a data communication network.
23. The method of claim 20, wherein said transmitting step includes transmitting the limitation information on a wired communication channel, and said transferring step includes transmitting the limitation information on a wireless communication channel.
24. The method of claim 23, wherein the limitation information is stored on a server prior to being transferred on the wireless communication channel.
25. The method of claim 20, wherein said transmitting step includes entering the limitation information at a website.
26. The method of claim 20, wherein said limiting step includes limiting the user's ability to access the user application during selected times or under selected conditions.
27. The method of claim 20, including transmitting from the wireless mobile communication apparatus to a website server an indication that the user has accessed the user application.
28. A method for controlling the use of a wireless communication device that provides a plurality of user applications, the method comprising:
configuring said wireless communication device to process parameters for controlling the use of at least one of said applications;
setting at a separate device the value(s) of at least one of said control parameters;
communicating said parameter value(s) from said separate device to said wireless communication device; and
processing said parameter value(s) at said wireless communication device to control the use of at least one of said applications.
29. The method of claim 28, wherein said wireless communication device is a cellular telephone.
30. The method of claim 28, wherein said wireless communication device is a personal digital assistant (PDA) with wireless communication capability.
31. The method of claim 28, wherein said separate device is another wireless communication device that communicates with said wireless communication device through a wireless communication network.
32. The method of claim 28, wherein said separate device is a computing device that communicates with said wireless communication device through a direct link.
33. The method of claim 28, wherein said separate device is a computing device that communicates with said wireless communication device through a data communication network coupled to a wireless communication network.
Description
    PRIORITY CLAIM
  • [0001]
    This application claims the priority under 35 U.S.C. 119(e) of co-pending U.S. Provisional Application No. 60/510,705, filed on Oct. 10, 2003 and incorporated herein by reference.
  • FIELD OF THE INVENTION
  • [0002]
    The invention relates generally to wireless mobile communication devices and, more particularly to controlling the use of a wireless mobile communication device.
  • BACKGROUND OF THE INVENTION
  • [0003]
    The usefulness and practicality of providing children with access to wireless mobile telecommunications technology is evident. Wireless communication devices such as mobile telephones are particularly useful and practical as a means of maintaining contact with children for purposes of safety, security and general peace of mind. However, although wireless telephones such as cell phones provide many obvious advantages for children, there are also several areas of concern. These areas of concern include the possibility of excessively large monthly telephone bills, unwanted callers, and general irresponsibility associated with children and young adults. This irresponsibility can manifest itself, for example, in excessive game playing on the wireless device, excessive time spent on telephone chats (whether or not they result in an increased bill), and poor management of the audible ringer function (for example, the phone rings in the middle of a child's math class).
  • [0004]
    It is therefore desirable to provide for parental control of the use of a wireless mobile communication device, such as a mobile telephone, that is made available by a parent to a child.
  • SUMMARY OF THE INVENTION
  • [0005]
    The present invention overcomes the limitations of the prior art and provides additional benefits. A brief summary of some embodiments and aspects of the invention are first presented. Some simplifications and omissions may be made in the following summary. The summary is intended to highlight and introduce some aspects of the disclosed embodiments, but not to limit the scope of the invention. The summary does not provide an exhaustive list of embodiments of the invention.
  • [0006]
    The present invention permits a controlling party to set limitations on a controlled party's access to applications operating on the controlled party's wireless mobile communication device. The controlling party can effectuate these limitations via various different mechanisms. For example, in some embodiments, the controlling party uses another wireless communication device to effectuate the limitations. In other embodiments, the limitations are effectuated by the controlling party operating a data processing apparatus connected by a wired data communication bus to the controlled party's wireless mobile communication device. In still further embodiments, the controlling party effectuates the limitations by accessing a website supported by a web server.
  • [0007]
    The foregoing has outlined rather broadly the features and technical advantages of the present invention so that those skilled in the art may better understand the detailed description of the invention that follows. Additional features and advantages of the invention will be described hereinafter that form the subject of the claims of the invention. Those skilled in the art will appreciate that they may readily use the conception and the specific embodiment disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. Those skilled in the art will also realize that such equivalent constructions do not depart from the spirit and scope of the invention in its broadest form.
  • [0008]
    Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words or phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, whether such a device is implemented in hardware, firmware, software or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0009]
    For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, wherein like numbers designate like objects, and in which:
  • [0010]
    FIG. 1 diagrammatically illustrates exemplary embodiments of communication systems according to of the invention.
  • [0011]
    FIG. 2 diagrammatically illustrates a portion of FIG. 1 in more detail.
  • [0012]
    FIG. 3 illustrates exemplary communication applications and filter parameters according to the invention.
  • [0013]
    FIG. 4 illustrates exemplary filter provisioning operations according to the invention.
  • [0014]
    FIG. 5 diagrammatically illustrates a portion of FIG. 1 in more detail.
  • [0015]
    FIG. 6 diagrammatically illustrates a portion of FIG. 1 in more detail.
  • [0016]
    FIG. 7 diagrammatically illustrates a portion of FIG. 1 in more detail.
  • [0017]
    FIG. 8 diagrammatically illustrates a portion of FIGS. 1 and 2 in more detail.
  • [0018]
    FIG. 9 illustrates exemplary filter configuration operations according to the invention.
  • [0019]
    FIG. 10 illustrates further exemplary filter configuration operations according to the invention.
  • [0020]
    FIG. 11 illustrates exemplary filtering operations according to the invention.
  • [0021]
    FIG. 12 illustrates exemplary dynamic IP update operations according to the invention.
  • [0022]
    FIG. 13 illustrates further exemplary dynamic IP update operations according to the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • [0023]
    FIGS. 1 through 13, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment.
  • [0024]
    The invention will now be described with respect to various embodiments. The following description provides specific details for a thorough understanding of, and enabling description for, these embodiments of the invention. However, one skilled in the art will understand that the invention may be practiced without these details. In other instances, well known structures and functions have not been shown or described in detail to avoid unnecessarily obscuring the description of the embodiments of the invention.
  • [0025]
    Exemplary embodiments of the invention permit a controlling party, for example a parent, to set limitations on a controlled party's, for example a child's, access to and use of communication and other applications operating on the controlled party's wireless mobile communication device. The controlling party can effectuate these limitations via several different mechanisms, for example by using another wireless communication device, by operating a data processing apparatus connected by a wired data communication bus to the controlled party's wireless mobile communication device, or by accessing a website supported by a web server which can communicate with the controlled party's wireless mobile communication device.
  • [0026]
    FIG. 1 diagrammatically illustrates exemplary embodiments of communication systems according to the invention. FIG. 1 illustrates a child's wireless mobile communication station MS1 (e.g., a phone, a PDA, a laptop computer, etc.) which supports various communication applications. A parent can limit the child's access to (or use of) these communication applications via three different control mechanisms according to the examples of FIG. 1. In one example, the parent can use another wireless communication station, for example the mobile wireless communication station MS2 to communicate the desired limitations to the child's communication device MS1. The actual wireless communication of the limitation information from MS2 to MS1 can be performed using conventional wireless communication techniques, for example the techniques described in the well known GSM/GPRS standards. Some embodiments use suitably customized text messaging to communicate the limitation information from MS2 to MS1.
  • [0027]
    In another example, the parent can communicate the desired limitation information to MS1 via a data processing apparatus connected to MS1 via a wired data communication bus 110, for example a Universal Serial Bus (USB) or an RS-232 bus. The data processing apparatus of FIG. 1, designated PC1, can be any data processing apparatus capable of data communication via the wired data communication bus 110. Examples of the data processing apparatus PC1 include a desktop computer, a laptop computer, a notebook computer, a personal digital assistant, etc.
  • [0028]
    In another example, the parent can communicate the desired limitation information to MS1 by using a suitable data processing apparatus PC2 to access, via a data network 124 (such as the internet), a web server 120 that supports a website (password protected in some embodiments) designed to process, store and transmit (to MS1) the limitation information. The server 120 includes a database 121 for storing the limitation information. In the example of FIG. 1, the server 120 utilizes conventional cellular infrastructure (shown by broken line at 122) to gain access to a conventional cellular base station 123. The base station 123 communicates with MS1 using any suitable conventional wireless communication techniques, for example the techniques defined in the GSM/GPRS standards. The limitation information provided by the parent to the server 120 can thus be communicated from the server 120 to the child's communication device MS1 via the cellular infrastructure 122 and the cellular base station 123. The data processing apparatus PC2 that the parent utilizes to access the web server 120 via the data network 124 can be any suitable data processing apparatus capable of data communication over a data network such as the internet. Examples of PC2 include a desktop computer, a laptop computer, a notebook computer, a personal digital assistant, etc.
  • [0029]
    FIG. 2 illustrates in more detail an exemplary embodiment of the child's communication device MS1 of FIG. 1. In the example of FIG. 2, the communication device MS1 includes a GSM/GPRS module 201 that is provided with a data processing apparatus 202, for example a microprocessor, a microcontroller, or a digital signal processor. Various user interface components are coupled to the module 201. In the example of FIG. 2, these user interface components include a handsfree speaker 203, a visual display 204, a keypad and/or push button component 205, a microphone 206, an alert vibrator/motor 207 and an interface jack 208. The interface jack 208 can give the various illustrated external devices access to the module 201. In particular, the data processing apparatus PC1 of FIG. 1 can access the module 201 via the data communication bus 110 (see also FIG. 1) and the interface jack 208 of FIG. 2, thus permitting the data processor 202 to receive the controlling party's limitation information. The communication device MS1 also includes an antenna apparatus 209 coupled to the module 201 for supporting wireless communication according to the GSM/GPRS standards. Thus, the antenna apparatus 209 and the GSM/GPRS module 201 permit the data processor 202 to receive the controlling party's limitation information via the air interface.
  • [0030]
    In some embodiments, the data processor 202 of communication device MS1 implements the controlling party's limitations in the form of corresponding filtering functions. For example, if the controlling party places a limitation on the controlled party's use of a given application running on the data processor 202, then the data processor 202 implements that limitation in the form of a filter which filters input and/or output information associated with that application.
  • [0031]
    FIG. 3 illustrates examples of various applications and corresponding limitation information, or filter parameters, which filter parameters can be defined by the controlling party and transmitted to the controlled party's device MS1. FIG. 3 specifies filter parameters for a mobile telephony application by specifying at 310 telephone numbers (and corresponding parties) with which the controlled party is allowed to establish a telephone call. Separate lists of approved parties can be provided for incoming calls and outgoing calls. The filter parameters at 320 specify the call duration permitted for the various allowed parties specified at 310. The call duration parameter can be defined in any manner desired, for example, no restrictions, or restricted to a specified total amount of time per month, etc. The filter parameters at 330 specify a time of day filter corresponding to each of the permitted parties at 310. Thus, the controlled party can carry on telephone conversations with the various parties permitted at 310 only during the permitted times specified at 330. Considering one example of a filter defined by the filter parameters at 310, 320 and 330, and assuming, for example, that these filter parameters pertain to incoming calls, the controlled party can receive incoming calls from John (e.g., John's telephone number), but only during the hours of 7 to 9 p.m., and for no more than a total of 60 minutes in a month.
  • [0032]
    Referring still to the examples of FIG. 3, general phone settings are designated at 340. For example, the controlling party can specify at 340 the time period(s) during the day or night when MS1 will be on or off, the time period(s) during the day or night when MS1 will ring to announce an incoming call, the type of ring that will occur during specific time periods during the day or night, etc. One parameter at 340 can specify that the telephone would not ring during the hours that a child would have the device in school. This parameter may also specify that the vibration announcement is to be utilized instead of the audible ring during the time period that the child will be in school. Various exemplary applications normally available to the controlled party (user of MS1) are designated generally at 350. Limitations (filter parameters) can be programmed to permit or prevent (e.g., at all times or during selected time periods) the controlled party from accessing one or more of the applications at 350, namely the current date and time, the calendar of events, the to-do list, countdown timers, incoming and outgoing messaging, and games. Thus, the applications at 350 can have associated therewith filter parameters of the same general type shown at 330 in FIG. 3. Preventing access to the date and time application can, for example, prevent the controlled party from modifying the date and time in order to avoid the restrictions at 320 and/or 330. The countdown timer application could provide information such as, for example, “24 days and 6 hours until Dad's birthday”. The rest of the exemplary applications illustrated at 350 are self-explanatory.
  • [0033]
    FIG. 4 illustrates exemplary filter provisioning operations which can be performed at the direction of the controlling party to impose limitations or filters on the available applications (also referred to as user applications) of the controlled party's communication device MS1. In some exemplary embodiments, the operations of FIG. 4 can be performed by the controlling party via any of the above-described mechanisms associated with MS2, PC1 and PC2 of FIG. 1. After selecting a given user application at 410, the desired filter parameter(s) can be associated to the selected user application at 420, thereby producing completed filter information for the currently selected user application. As indicated at 430, the operations at 410 and 420 can be repeated for as many user applications as desired before proceeding to 440. As illustrated at 440, and depending upon the particular embodiment, the completed filter information produced at 420 can be stored without transmitting it to MS1 at that time (for example, if MS1 is known to be turned off at that time), or it can be transmitted to MS1 without storing it, or it can be both stored and transmitted to MS1. Referring again to the operation at 430 above, it can be seen that the operations at 440 can be performed with respect to as many or as few user applications as desired. After the desired operation is performed at 440, the operations at 410, 420 and 440 can be performed with respect to another user application, as indicated generally at 450. The operations at 430 and 450 are thus provided to illustrate that the operation selected at 440 can, in various embodiments, be performed with respect to one user application at a time (for example when 430 is answered “no” and 450 is answered “yes”), or can be performed with respect to as many user applications as desired (for example when 430 is answered “yes”).
  • [0034]
    FIG. 5 diagrammatically illustrates pertinent portions of exemplary embodiments of the data processing apparatus PC1 of FIG. 1. A user interface 510 (e.g., tactile, visual, etc.) provides a user with access to a filter provisioning application 520 running on a data processor. The filter provisioning application 520 receives from the user interface 510 controlling party input information indicative of selected user applications and corresponding filter parameters. The filter provisioning application 520 associates the user applications to the filter parameters to produce completed filter information (see also 420 of FIG. 4). The filter provisioning application 520 can then transmit the completed filter information to the controlled party's device MS1 via the wired data communication bus 110 (see also FIG. 1) and the interface jack 208 of MS1 (see also FIG. 2). In some embodiments, indicated by broken line in FIG. 5, the filter provisioning application 520 can also store the completed filter information in a database 530. In other embodiments, the filter provisioning application 520 can store the completed filter information in the database 530 without transmitting the completed filter information to MS1 at that time.
  • [0035]
    FIG. 6 diagrammatically illustrates pertinent portions of exemplary embodiments of a wireless communication device operated by the controlling party (such as MS2 in FIG. 1). A user interface 610 (e.g., tactile, visual, etc.) provides the controlling party with access to a filter provisioning application 620 running on a data processor. In response to controlling party input information indicative of selected applications and corresponding filter parameters, the filter provisioning application 620 associates the selected applications to the corresponding filter parameters to thereby produce completed filter information (see also 420 in FIG. 4). The filter provisioning application 620 then provides the completed filter information to a wireless communication interface for conventional wireless transmission of the completed filter information to the controlled party's device MS1. In some embodiments, the filter provisioning application 620 implements a conventional text messaging application to construct text messages that each include the aforementioned completed filter information.
  • [0036]
    FIG. 7 diagrammatically illustrates pertinent portions of exemplary embodiments of the web server 120 of FIG. 1. As shown in FIG. 7, the server 120 implements a web application 710 which provides a HTML based user interface. The controlling party accesses the web application 710 via the data processing apparatus PC2 and the data network 124 (see also FIG. 1), and is thereby able to provide to a provisioning application 720 controlling party input information indicative of selected communication applications and corresponding filter parameters. The provisioning application 720 associates the communication applications to the corresponding filter parameters in order to produce completed filter information (see also 420 in FIG. 4). The provisioning application 720 can then provide the completed filter information to a synchronous application 740 which provides a communication interface (via the cellular infrastructure) toward the controlled party's device MS1. In some exemplary embodiments, the provisioning application 720 provides the completed filter information to the synchronization application 740 for transmission to MS1. In other exemplary embodiments, the provisioning application provides the completed filter information to the database 121 (see also FIG. 1) for storage, without providing the completed information to the synchronization application 740 for transmission to MS1. In further embodiments, the provisioning application 720 provides the completed filter information to the database 121 for storage therein, and also to the synchronization application 740 for transmission to MS1. In some exemplary embodiments, the applications at 710, 720 and 740 are JAVA (J2EE) based applications. In some exemplary embodiments, the database 121 is provided as an SQL-based database.
  • [0037]
    FIG. 8 diagrammatically illustrates pertinent portions of exemplary embodiments of the controlled party's wireless mobile communication device MS1 of FIGS. 1 and 2. A filter provisioning interface application 810, running on the data processor 202, can receive input information from the controlling party via either the interface jack 208 of FIG. 2 or via a wireless communication interface (including antenna apparatus 209 of FIG. 2). The controlling party's input information includes the completed filter information for the communication (user) applications 820. The filter provisioning interface 810 provides the completed filter information at 840 to configure a filter logic application 830 running on the data processor 202. This filter logic implements the filters with respect to the user applications 820. The filter logic 830 is interposed in the data path between the user applications 820 and the user interface 850 (which can include for example, some, all or any combination of the user interface components described above relative to FIG. 2), and can thereby filter information provided by or intended for the user applications 820, thereby implementing the limitations embodied in the completed filter information 840. In the example of FIG. 8, some of the user applications 820 are coupled for communication with the wireless communication interface and others of the user applications 820 are coupled for communication with the interface jack 208.
  • [0038]
    FIG. 9 illustrates exemplary filter configuration operations which can be performed by the controlled party's wireless mobile communication device according to exemplary embodiments of the invention. The operations of FIG. 9 can be performed by the exemplary embodiments of FIG. 8. After power-up at 910, completed filter information is awaited at 920. After the completed filter information has been received from the controlling party at 920, the filter logic is configured at 930 to reflect the currently received completed filter information. After configuring the filter logic with the currently received completed filter information, the next completed filter information is awaited at 920.
  • [0039]
    FIG. 10 illustrates further exemplary filter configuration operations which can be performed by the controlled party's wireless mobile communication station according to exemplary embodiments of the invention. The exemplary operations of FIG. 10 can be performed by the exemplary embodiments of FIG. 8. After power-up at 1010, the communication device accesses the website on the web server (see also FIG. 1) to obtain the completed filter information as stored in the web server database. This is illustrated generally at 1020. After the completed filter information has been obtained at 1020, the filter logic is configured at 1030 to implement the newly obtained completed filter information. As illustrated generally at 1040, the website can be accessed periodically to obtain therefrom any new completed filter information. In some embodiments, the filter provisioning interface 810 of FIG. 8 uses conventional techniques to access the website of FIG. 7 (see also FIG. 1).
  • [0040]
    FIG. 11 illustrates exemplary communication application filtering operations which can be performed according to the invention. The exemplary operations of FIG. 11 can be performed by the exemplary embodiments of FIG. 8. If an attempted communication between the user interface and a user application is detected at 1110, the corresponding filter is applied at 1120 with respect to communications between the user interface and that user application. Thereafter, the next attempted communication is awaited at 1110.
  • [0041]
    Referring again to FIGS. 1, 7 and 8, in GSM/GPRS embodiments, the GSM/GPRS operation utilizes a dynamic IP environment. Accordingly, in embodiments where the controlling party utilizes the web server 120 to access the controlled party's communication device MS1, the device MS1 utilizes a scheme to transmit the dynamic IP to the web server 120, so the web server 120 can maintain contact with the controlled party's device MS1. The filter provisioning interface 810 of FIG. 8 includes a dynamic IP input which receives information indicative of the dynamic IP. The filter provisioning interface 810 forwards this information to the web server 120 (see also FIG. 1) via the air interface and cellular infrastructure. The synchronization application 740 receives the updated dynamic IP information, and stores it in the database 121. In this manner, the web server can remain abreast of the changing IP environment of the controlled party's device MS1.
  • [0042]
    FIGS. 12 and 13 illustrate exemplary operations in support of the above-described dynamic IP update scheme. FIG. 12 illustrates exemplary operations which can be performed by the controlled party's device. It is first determined at 1210 whether or not it is time to transmit the dynamic IP information. For example, this can be done periodically, or whenever a change in the dynamic IP environment occurs. When it is determined at 1210 that it is time to transmit the dynamic IP information, this information is transmitted to the web server at 1220. Thereafter, operations return to 1210 to await the occurrence of the next occasion of transmitting dynamic IP.
  • [0043]
    FIG. 13 illustrates exemplary operations which can be performed by the synchronization application 740 of the web server of FIG. 7. At 1310, the synchronization application awaits the dynamic IP information update. When the dynamic IP information update has been received at 1310, the synchronization application then stores the dynamic IP information update at 1320. Thereafter, the synchronization application awaits the next dynamic IP update at 1310.
  • [0044]
    In some embodiments, the synchronization application 740 utilizes an acknowledgement verification protocol in order to confirm delivery of the completed filter information to the controlled party's device MS1. In such embodiments, the filter provisioning interface 810 of FIG. 8 transmits an acknowledgement to the synchronization application 740 upon receipt of the completed filter information. In various embodiments, the filter provisioning interface 810 provides acknowledgements to any of the sources (e.g., 120, PC1 and MS2 in FIG. 1) from which it receives completed filter information.
  • [0045]
    In some exemplary embodiments, the synchronization application 740 and the filter provisioning interface 810 utilize checksum verifications in conjunction with transmission of the completed filter information. In other exemplary embodiments, checksum verification is used in conjunction with transmission of the completed filter information from any of the sources of FIG. 1 to the controlled party's device MS1. In some embodiments, the aforementioned acknowledgement and checksum verification techniques are combined with respect to the transmission of the completed filter information to the controlled party's device.
  • [0046]
    In some embodiments which utilize the aforementioned acknowledgement protocol, the synchronization application 740 can implement a retry algorithm wherein the server attempts a predetermined number of retries in the absence of an acknowledgement, for example 3 retries, the first retry at 30 seconds after the initial transmission, the second retry at one minute after the initial transmission, and the third retry at 5 minutes after the initial transmission.
  • [0047]
    In some embodiments, the controlling party defines the filter operation such that the filter examines information associated with the user application and provides to the web server an update regarding the status of the examined information. For example, the filter operation can detect whether the controlled party is, via the user interface, removing a task from a “to-do” list, and the filter provisioning interface 810 can forward to the web server 120 a message indicating that this task of the “to-do” list has been completed. The controlling party can thus monitor the completion of activities by simply visiting the website on the server 120.
  • [0048]
    In some exemplary embodiments, the filter operation can be defined to perform an addition of an item to a given “to-do” list. For example, if the controlled party already has a list of things to do when she arrives home from school, the controlling party can add an item to that “to-do” list, for example “take out the dog when you get home”.
  • [0049]
    In some exemplary embodiments, the identifier of the conventional, non-removable modem hardware in the module 201 of FIG. 2 is used instead of the removable SIM as the identification information for the controlled party's device MS1. This identification information is used to verify communication between the controlled party's device MS1 and the source from which the controlling party's completed filter information is received.
  • [0050]
    Although exemplary embodiments of the invention have been described above in detail, this does not limit the scope of the invention, which can be practiced in a variety of embodiments.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4908848 *Apr 12, 1988Mar 13, 1990Fujitsu LimitedApparatus for controlling calls in a mobile communication system
US4945556 *Nov 9, 1988Jul 31, 1990Alpine Electronics Inc.Method of locking function of mobile telephone system
US5046125 *Jul 26, 1990Sep 3, 1991Nec CorporationLock control method for on-board terminal equipment of a mobile telecommunications system
US5325418 *Sep 27, 1991Jun 28, 1994Telemac Cellular CorporationCellular phone accounting system
US5600708 *Aug 4, 1995Feb 4, 1997Nokia Mobile Phones LimitedOver the air locking of user identity modules for mobile telephones
US5625669 *Jun 23, 1994Apr 29, 1997Telemac Cellular CorporationMobile phone with internal call accounting controls
US5887259 *Jun 22, 1994Mar 23, 1999Gte Mobile Communications Service CorporationMultiple mode personal wireless communications system
US6023044 *Apr 14, 1997Feb 8, 2000Fanuc Ltd.Control method in multi-layer welding
US6032044 *Aug 16, 1996Feb 29, 2000Nortel Networks CorporationCellular communications system with screening of unauthorized services
US6073010 *Oct 22, 1997Jun 6, 2000Telefonaktiebolaget Lm Ericsson (Publ)System and method for restricting mobility of subscribers assigned to fixed subscription areas in a cellular telecommunications network
US6243574 *May 16, 1996Jun 5, 2001Telemac CorporationMobile phone distribution system having programming and tracking
US6674403 *Sep 5, 2002Jan 6, 2004Newbury Networks, Inc.Position detection and location tracking in a wireless network
US6785387 *Jan 3, 2000Aug 31, 2004Siemens AktiengesellschaftTelephone for children
US6799052 *Feb 8, 2001Sep 28, 2004Michael K. AgnessHand-held cellular telephone system with location transmission inhibit
US6801765 *Dec 27, 1999Oct 5, 2004Samsung Electronics Co., Ltd.Locking and unlocking method in mobile telephone
US6826762 *Feb 16, 2001Nov 30, 2004Microsoft CorporationRadio interface layer in a cell phone with a set of APIs having a hardware-independent proxy layer and a hardware-specific driver layer
US7218912 *Mar 9, 2006May 15, 2007Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US7277726 *May 3, 2004Oct 2, 2007Motorola, Inc.Controlling wireless mobile devices from a remote device
US20020025799 *Dec 28, 2000Feb 28, 2002Naohito TakaeCellular phone managing method, managing apparatus, record medium and cellular phone apparatus
US20020029252 *Dec 21, 2000Mar 7, 2002M.H. Segan Limited PartnershipSystem for viewing content over a network and method therefor
US20020039479 *Oct 4, 2001Apr 4, 2002Mikio WatanabeRecording apparatus, communications apparatus, recording system, communications system, and methods therefor
US20020082002 *Dec 19, 2001Jun 27, 2002Kenichi FujiiSystem for regulating entrance/exit of person and communication of wireless communication terminal, entrance/exit regulating apparatus to be used for the system, and wireless communication apparatus whose communication is to be restricted
US20030076941 *Oct 24, 2001Apr 24, 2003Sbc Technology Resources, Inc.System and method for restricting and monitoring telephone calls
US20030078979 *Oct 22, 2001Apr 24, 2003Motorola, Inc.Method and apparatus for controlling an intelligent device through an instant messaging protocol over a communication network
US20030100290 *Sep 20, 2002May 29, 2003Telemac CorporationMobile phone distribution system
US20030139175 *Sep 20, 2002Jul 24, 2003Samsung Electronics Co., Ltd.System and method for remotely controlling a mobile terminal
US20030144025 *Jan 28, 2003Jul 31, 2003Hewlett-Packard CompanyRestricting usage of digital objects associated with a wireless LAN
US20030224803 *Feb 27, 2003Dec 4, 2003Kazuya KonnoWireless communication method, wireless communication system, and mode switching method
US20040082322 *Oct 23, 2003Apr 29, 2004Yukiko TaniCellular telephone set, dial lock releasing method used in the same and program therefor
US20040103295 *Nov 25, 2002May 27, 2004Patrik GustafssonCreation of local usage rights voucher
US20040147255 *Jan 12, 2004Jul 29, 2004Samsung Electronics Co., Ltd.Method for restricting additional function of multifunctional mobile communication terminal
US20040155969 *Feb 4, 2004Aug 12, 2004Nec CorporationOperation limiting technique for a camera-equipped mobile communication terminal
US20040198335 *Sep 26, 2002Oct 7, 2004Campen Kenneth BrianRemotely controllable wireless device
US20040203601 *Dec 19, 2002Oct 14, 2004Morriss Matthew JamesMethod and apparatus for activating a restrictive operating mode of a wireless communication device
US20040208304 *Apr 18, 2003Oct 21, 2004Larry MillerTelephone call control system and methods
US20040228460 *May 15, 2003Nov 18, 2004Cherif KeramanePortable communications devices providing selective inhibition of functionalities and related control devices and methods
US20050027794 *Jul 29, 2003Feb 3, 2005Far Touch Inc.Remote control of a wireless device using a web browser
US20050032510 *Jun 15, 2004Feb 10, 2005Pantech Co., Ltd.System and a method of controlling mobile communication terminals using global positioning system
US20050037732 *Aug 12, 2003Feb 17, 2005Motorola, Inc.Method and apparatus for locking a wireless communication unit to a selected network
US20050096009 *Sep 27, 2004May 5, 2005Jonathan AckleyCell phone parental control
US20050099314 *Apr 3, 2001May 12, 2005Valerio AisaSystem and device for monitoring at least one houehold electric user, in particular a household appliance
US20050164687 *Nov 30, 2004Jul 28, 2005Interdigital Technology CorporationImplementation of controls by use of customer programmable portal
US20050181808 *Feb 12, 2004Aug 18, 2005Lucent Technologies Inc.Location based service restrictions for mobile applications
US20050201362 *Feb 16, 2005Sep 15, 2005Klein Mark D.Call management
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7197321Feb 23, 2004Mar 27, 2007Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US7206569Mar 9, 2006Apr 17, 2007Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US7218912Mar 9, 2006May 15, 2007Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US7412228 *Jul 1, 2004Aug 12, 2008Lucent Technologies Inc.Method for notifying a primary wireless unit of group calling plan activity
US7516219Jan 22, 2008Apr 7, 2009Ventraq CorporationConsumer configurable mobile communication web filtering solution
US7647047Dec 21, 2007Jan 12, 2010Ventraq CorporationConsumer configurable mobile communication solution
US7664083Oct 20, 2005Feb 16, 2010Verizon Laboratories Inc.Monitoring portal systems and methods
US8107944 *Oct 14, 2008Jan 31, 2012Todd Michael CohanSystem and method for automatic data security, back-up and control for mobile devices
US8588735 *Mar 6, 2013Nov 19, 2013Kajeet, Inc.Feature management of a communication device
US8594619Mar 6, 2013Nov 26, 2013Kajeet, Inc.Feature management of a communication device
US8600348Mar 6, 2013Dec 3, 2013Kajeet, Inc.Feature management of a communication device
US8611885Mar 6, 2013Dec 17, 2013Kajeet, Inc.Feature management of a communication device
US8630612Mar 6, 2013Jan 14, 2014Kajeet, Inc.Feature management of a communication device
US8634801Feb 8, 2013Jan 21, 2014Kajeet, Inc.Feature management of a communication device
US8634802Mar 6, 2013Jan 21, 2014Kajeet, Inc.Feature management of a communication device
US8634803Mar 6, 2013Jan 21, 2014Kajeet, Inc.Feature management of a communication device
US8639216Mar 6, 2013Jan 28, 2014Kajeet, Inc.Feature management of a communication device
US8644796Mar 6, 2013Feb 4, 2014Kajeet, Inc.Feature management of a communication device
US8667559Mar 6, 2013Mar 4, 2014Kajeet, Inc.Feature management of a communication device
US8706079Mar 6, 2013Apr 22, 2014Kajeet, Inc.Feature management of a communication device
US8712371Sep 4, 2012Apr 29, 2014Kajeet, Inc.Feature management of a communication device
US8725109Mar 6, 2013May 13, 2014Kajeet, Inc.Feature management of a communication device
US8731517Mar 6, 2013May 20, 2014Kajeet, Inc.Feature management of a communication device
US8755768Mar 6, 2013Jun 17, 2014Kajeet, Inc.Feature management of a communication device
US8774754Mar 6, 2013Jul 8, 2014Kajeet, Inc.Feature management of a communication device
US8774755Mar 6, 2013Jul 8, 2014Kajeet, Inc.Feature management of a communication device
US8811965 *Nov 2, 2011Aug 19, 2014Todd Michael CohanSystem and method for automatic data security back-up and control for mobile devices
US8918080Jan 17, 2013Dec 23, 2014Kajeet, Inc.Mobile device management
US8929857Nov 8, 2012Jan 6, 2015Kajeet, Inc.Policy management of electronic devices
US8995952Mar 6, 2013Mar 31, 2015Kajeet, Inc.Feature management of a communication device
US9125057Dec 19, 2014Sep 1, 2015Kajeet, Inc.Mobile device management
US9137386Nov 8, 2013Sep 15, 2015Kajeet, Inc.Feature management of a communication device
US9137389Aug 29, 2013Sep 15, 2015Kajeet, Inc.Master limits and filters for electronic devices
US9237433Mar 6, 2013Jan 12, 2016Kajeet, Inc.Feature management of a communication device
US20040166878 *Feb 23, 2004Aug 26, 2004Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US20040180648 *Mar 11, 2003Sep 16, 2004Motorola, Inc.Method and apparatus for constraining services for a communication device
US20050282559 *Jun 15, 2005Dec 22, 2005Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone data usage
US20060003748 *Jul 1, 2004Jan 5, 2006Barclay Deborah LMethod for notifying a primary wireless unit of group calling plan activity
US20060154644 *Mar 9, 2006Jul 13, 2006Boston Communications Group, Inc.Method and system for providing supervisory control over wireless phone usage
US20060160523 *Mar 9, 2006Jul 20, 2006Thomas ErskineMethod and system for providing supervisory control over wireless phone usage
US20080020803 *Jul 18, 2006Jan 24, 2008Motorola, Inc.Methods and devices for restricting access to mobile communication device functionality
US20080114862 *Jan 22, 2008May 15, 2008Ace*Comm CorporationConsumer configurable mobile communication web filtering solution
US20080132175 *Oct 30, 2007Jun 5, 2008Loeb Shoshana KMethod and system to support scalable application level communication between mobile device and a centralized application server
US20100093308 *Oct 14, 2008Apr 15, 2010Todd Michael CohanSystem and method for automatic data security, back-up and control for mobile devices
US20100121744 *Nov 7, 2008May 13, 2010At&T Intellectual Property I, L.P.Usage data monitoring and communication between multiple devices
US20110059731 *Sep 3, 2010Mar 10, 2011George Gregory SchivleyTechniques for discouraging cell phone usage while driving a vehicle
US20120066738 *Nov 2, 2011Mar 15, 2012Todd Michael CohanSystem and Method for automatic Data Security Back-up and control for Mobile Devices
Classifications
U.S. Classification455/550.1
International ClassificationH04Q, H04M3/00, H04M11/00
Cooperative ClassificationH04W48/08, H04M3/436, H04M3/38, H04M2017/24, H04M17/204
European ClassificationH04M3/38, H04W48/08, H04M17/20C
Legal Events
DateCodeEventDescription
Aug 8, 2006ASAssignment
Owner name: ENFORA, L.P., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WEINZIERL, MARK A.;REEL/FRAME:018084/0919
Effective date: 20060727
Nov 1, 2006ASAssignment
Owner name: TIC TALK, INC., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ENFORA, L.P.;REEL/FRAME:018465/0123
Effective date: 20051231
Nov 27, 2006ASAssignment
Owner name: SILICON VALLEY BANK, CALIFORNIA
Free format text: SECURITY INTEREST;ASSIGNOR:TIC TALK, INC.;REEL/FRAME:018624/0771
Effective date: 20061020
Jan 14, 2011ASAssignment
Owner name: TIC TALK INC., TEXAS
Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:025643/0235
Effective date: 20110112