throbber
US007996005B2
`
`(12) United States Patent
`Lotter et a1.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,996,005 B2
`*Aug. 9, 2011
`
`(54)
`
`(75)
`
`MOBILE COMMUNICATION DEVICE
`MONITORING SYSTEMS AND METHODS
`
`Inventors: Robert A. Lotter, Newport Beach, CA
`(US); Timothy S. Allard, Tustin, CA
`(Us)
`
`(73)
`
`Assignee: eAgency, Inc., Newport Beach, CA (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 747 days.
`This patent is subject to a terminal dis
`claimer.
`
`(21)
`
`Appl. N0.: 11/695,500
`
`(22)
`
`Filed:
`
`Apr. 2, 2007
`
`(65)
`
`(60)
`
`(51)
`
`(52)
`
`(58)
`
`Prior Publication Data
`
`US 2008/0172746 A1
`
`Jul. 17, 2008
`
`Related US. Application Data
`
`Provisional application No. 60/885,384, ?led on Jan.
`17, 2007.
`
`Int. Cl.
`(2009.01)
`H04W4/00
`US. Cl. ................... .. 455/432.3; 455/418; 455/428;
`455/407; 455/408; 455/419; 726/26
`Field of Classi?cation Search ................ .. 455/410,
`455/411, 414.1, 414.2, 418, 419, 428, 432.3,
`455/445, 560, 567, 405, 407, 408; 713/168*170;
`348/14.01*14.05; 726/26
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,282,275 B1
`8/2001 Gurbani et 31.
`6,345,361 B1 *
`2/2002 Jerger et a1. ..................... .. 726/3
`6,785,515 B1
`8/2004 Sommer et a1.
`6,959,182 B2 * 10/2005 Lingafeldt et a1. .......... .. 455/405
`7,046,782 B2
`5/2006 Miller
`7,076,041 B2
`7/2006 Brown et a1.
`7,139,553 B2 11/2006 Alston
`7,231,218 B2
`6/2007 Diacakis et :11.
`7,327,837 B1
`2/2008 Harlow et 31.
`7,814,163 B2 10/2010 Lee et a1.
`2002/0143934 A1 * 10/2002 Barker et a1. ............... .. 709/224
`2004/0208304 A1 * 10/2004 Miller .................... .. 379/210.02
`2005/0113113 A1
`5/2005 Reed
`2005/0282559 A1 12/2005 Erskine et a1.
`2006/0181411 A1
`8/2006 Fast et a1.
`2006/0209809 A1 *
`9/2006 Ellingham et a1. .......... .. 370/356
`2008/0009268 A1 *
`l/2008 Ramer et a1. ............. .. 455/412.1
`2008/0134282 A1
`6/2008 Fridman et a1.
`2008/0168135 A1 *
`7/2008 Redlich et a1. .............. .. 709/204
`2009/0132718 A1
`5/2009 Groll et a1.
`* cited by examiner
`
`Primary Examiner * Kamran Afshar
`Assistant Examiner * Mong-Thuy Tran
`(74) Attorney, Agent, or Firm * Haynes and Boone, LLP
`(57)
`ABSTRACT
`Systems and methods are directed to monitoring the commu
`nications to and from a mobile communication device in
`accordance with some embodiments of the present invention.
`For example in accordance with an embodiment, each of the
`data services on a mobile communication device may be
`monitored against rules stored in a central data center reposi
`tory. The data services may include all forms of communica
`tions between the mobile communication device and a third
`party along with changes to application or data within the
`mobile communication device. An alert may be provided to
`an administrator when unauthorized data service activity and/
`or a message may be sent to the mobile communication
`device to prevent the unauthorized data service activity.
`38 Claims, 23 Drawing Sheets
`
`Cell Phone
`10
`FJeta Monitor g‘
`
`Smart Phone
`12
`
`‘Data Monitor E ‘Data Honing‘
`
`Cellular Service Provider E
`
`Cell Phone
`g
`
`Email g <-q 632:?“
`gig
`
`Data Center 1!
`
`Alert
`Monitor Q Permissions
`Q
`
`BLACKBERRY EX. 1005, pg. 1
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 1 0123
`
`US 7,996,005 B2
`
`Fig. 1
`
`Cell Phone
`lg
`
`Smart Phone
`12
`
`PDA 1_4
`
`Data Monitor 11
`
`Data Monitor 1;
`
`Data Monitor 1_5
`
`@lar Service Pro@
`
`Cell Phone /
`1__8_
`
`-
`Ema" ‘La 4
`
`Data
`Gateway
`1Q
`
`Data Center 11
`
`__—’ Activity Log
`____,
`59
`
`N,“
`Monitor 12
`
`ermézslons
`
`BLACKBERRY EX. 1005, pg. 2
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 2 0f 23
`
`US 7,996,005 B2
`
`Fig. 2
`
`Mobile Communications Device 20
`
`L
`
`
`
`
`
`0mg 505:9. ~|._
`
`
`
`
`
`2_ 2_ 2_ M. 2_ n. 9 d
`
`o m S S W 10 m s O
`A A .?. t B s m a M
`P S A C P
`e .0. p. n b a d .u.. N n a hm e r n t .w
`
`n n m 6_ p p 2 e
`H i a .m r A p H.
`a .m .m 9 e k B A m H .l n. s 5 w 0 S n I
`
`8
`
`BLACKBERRY EX. 1005, pg. 3
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 3 0f 23
`
`US 7,996,005 B2
`
`Fig. 3A
`
`100
`\
`1 0
`l,
`i
`PM?“ ca“ '5
`recelved on_the
`moblle devlce
`120
`
`)
`
`Data Monitor
`records Device
`ID, start and
`end date/time
`stamp,
`originating
`telephone
`number, and
`any contextual
`data.
`
`110
`Activity record
`is received by
`the Data
`Gateway
`
`'
`
`1 §0
`)
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`.
`
`1%0
`
`Activity Log
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`‘to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 4
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 4 of 23
`
`US 7,996,005 B2
`
`Fig. 3B
`
`_
`
`100
`
`1
`
`.
`
`Phone can '5
`placed from_the
`moblle devlce
`
`8
`‘
`Data Monitor
`records Device
`ID, start and
`end date/time
`stamp,
`destination
`telephone
`number, and
`any contextual
`data.
`
`11,’.0
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`'
`
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`1520
`)
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`‘
`
`Activity Log
`42
`
`BLACKBERRY EX. 1005, pg. 5
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 5 0f 23
`
`US 7,996,005 B2
`
`100x
`
`Fig. 3C
`
`_
`
`_
`
`’
`
`140
`Act'v'ty record
`is received by
`the Data
`Gateway
`
`‘
`
`W0
`I
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`9-D
`
`messa e is
`
`1 12
`‘
`)
`An email
`receivedgat the
`-
`-
`mobile device
`122
`(
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`originating
`email address,
`and any
`contextual
`data.
`
`Q0
`‘
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 6
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 6 0f 23
`
`US 7,996,005 B2
`
`100x
`
`Fig. 3D
`
`_
`
`_
`
`14,0
`l
`Actlvlty record
`is received by
`the Data
`Gateway
`
`‘
`
`1§0
`)
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`09.
`
`:
`
`113
`‘
`)
`An email
`messa e is sent
`from "?le mobne
`device
`
`123
`(
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`email address,
`and any
`contextual
`data.
`
`1;}0
`
`‘
`l
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 7
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 7 of 23
`
`US 7,996,005 B2
`
`1o0\v
`
`Fig. 3E
`
`14(l0
`_
`_
`’
`Activity record
`IS recelved by
`the Data
`Gateway
`
`>
`
`1530

`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`ig
`
`V
`1 1 4
`)
`A text message
`is received at
`the mobile
`device
`
`1 24
`
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`origination
`phone number,
`and any
`contextual
`data.
`
`Q0
`‘
`,
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 8
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 8 0f 23
`
`US 7,996,005 B2
`
`100
`1
`
`Start
`
`Fig. 3F
`
`140
`3
`Activity record
`is received by
`the Data
`Gateway
`
`,
`15o .
`7
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`i9.
`
`v
`115
`I
`A text message
`is sent from the
`mobile device
`
`1¥5
`‘
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`phone number,
`and any
`contextual
`data.
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 9
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 9 0f 23
`
`US 7,996,005 B2
`
`100
`x
`
`Start
`
`Fig. 36
`
`110
`’
`Activity record
`_
`_
`IS recelved by
`the Data
`Gateway
`
`4
`
`1?‘)

`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`4.0.
`
`11:6
`,
`An instant
`message is
`received at the
`mobile device
`1 g6
`
`)
`Data Monitor
`- records Device
`ID, date/time
`stamp,
`originating
`username, and
`any contextual
`data.
`
`1;}0

`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 10
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 10 0f 23
`
`US 7,996,005 B2
`
`100
`x
`
`Start
`
`Fig. 3H
`
`1?"
`_
`_
`’
`MW"! record
`IS recelved by
`the Data
`Gateway
`
`k
`
`1§0
`1
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`.4.—0'
`
`1'(l7
`,
`)
`An instant
`message is sent
`from the mobile
`device
`
`V
`
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`username, and
`any contextual
`data.
`
`130
`f
`‘
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 11
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 11 0123
`
`US 7,996,005 B2
`
`Fig. 3|
`
`11210
`_
`_
`’
`Achy“! record
`IS received by
`the Data
`Gateway
`
`7
`
`1%0
`1
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity LOg
`
`10°
`‘
`1 '(l) 8
`‘
`An http(s)
`request is sent
`from the mobile
`device
`
`1 23
`l
`)
`
`1
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`URL, and any
`contextual
`data.
`
`13%0
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 12
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 12 0f 23
`
`US 7,996,005 B2
`
`100
`
`Fig. SJ
`
`119 )
`An address
`book entry is
`added, modified
`or deleted from
`the mobile
`device
`
`1g9
`
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`
`1220 )
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`140
`3
`Activity record
`is received by
`the Data
`Gateway
`
`1?"
`‘
`)
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Address Book
`§_(_)_
`
`Activity Log
`i9
`
`BLACKBERRY EX. 1005, pg. 13
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 13 0f 23
`
`US 7,996,005 B2
`
`1°"
`\'
`1;}1 )
`A calendar entry
`rézggiizdér
`deleted from the
`mobile device
`
`'
`
`Fig. 3K
`
`)
`
`140
`Activity. record
`'5 rt‘laqceg'etd by
`9 a a
`Gateway
`
`‘
`1§0
`l
`Data Gateway
`writes Activity
`record 10 the
`central data
`repository
`
`132
`1‘
`‘
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data. -
`130
`Calendar 1Q
`
`‘
`
`)
`
`Data Monitor
`formats a data
`
`packet and
`sends the
`Activity record
`to the central
`data repository
`
`_
`
`_
`
`Activity Log
`it)
`
`End
`
`BLACKBERRY EX. 1005, pg. 14
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 14 0f 23
`
`US 7,996,005 B2
`
`100
`
`Fig. 3L
`
`1%
`,
`I
`A task entry is
`added, modified
`or deleted from
`the mobile
`device
`
`1554 )
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`
`I
`Data Monitor
`formats a data
`packet and
`sends the
`Activity record
`to the central
`data repository
`
`140
`(
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Tasks 5Q
`
`Activity Log
`gg
`
`BLACKBERRY EX. 1005, pg. 15
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 15 0f 23
`
`US 7,996,005 B2
`
`100 @1 ‘
`
`1§5
`)
`An application is
`added, modified
`or deleted from
`the mobile
`device
`
`1§6
`)
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`l
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`1%0 )
`
`Fig. 3M
`
`140
`(
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`£1
`
`BLACKBERRY EX. 1005, pg. 16
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 16 0f 23
`
`US 7,996,005 B2
`
`1001
`
`Fig. 3N
`
`140
`)
`Activity record
`is received by
`the Data
`Gateway
`
`,
`
`150
`1
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`4:9
`
`‘
`1;?
`A photo, video,
`or multimedia
`file is received at
`the mobile
`device
`‘
`1 §8
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp, and any
`contextual
`data
`
`‘
`
`11”
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 17
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 17 0123
`
`US 7,996,005 B2
`
`10°}
`
`Start
`
`Fig. 30
`
`1%0
`1—
`Activity record
`is received by
`the Data
`Gateway
`
`1150 )
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`5Q
`
`1i"
`i
`A photo, video,
`or multimedia
`file is sent from
`the mobile
`device
`1112 T
`Data Monitor
`records Device
`ID, date/time
`stamp, and any
`contextual
`data.
`
`‘
`
`.
`
`100 )
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 18
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 18 0f 23
`
`US 7,996,005 B2
`
`F I9. 4
`
`Actlvlty Log 40
`
`Record
`ID
`
`Acct
`ID
`
`Msg
`Type
`
`ln/Out
`
`Start
`Time
`
`End
`Time
`
`CaIIerID
`
`Log
`
`100
`
`200
`
`Email
`
`In
`
`23:51:01
`1/1/2007
`
`buddy@abc.com Did you find...
`
`101
`
`200
`
`Phone
`
`Out
`
`22:42:01
`1/1/2007
`
`22:45:56
`1/1/2007
`
`213-555-1212
`
`102
`
`201
`
`SMS
`
`In
`
`103
`
`200
`
`Email
`
`Out
`
`104
`
`202
`
`IM
`
`Out
`
`22:35:26
`1/1/2007
`
`18:15:21
`1/1/2007
`
`16:12:09
`1/1/2007
`
`909-123-1234
`
`Meet me at 4...
`
`john@acme.com Want a better...
`
`mypa112
`
`Hey John...
`
`105
`
`202
`
`Phone
`
`106
`
`203
`
`Email
`
`In
`
`In
`
`14:20:12
`1/1/2007
`
`14:36:41
`1/1/2007
`
`605-852-9797
`
`10:51 :32
`111/2007
`
`alice@mx.com
`
`Thanks for
`calling...
`
`BLACKBERRY EX. 1005, pg. 19
`
`

`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 19 0123
`
`US 7,996,005 B2
`
`Fig. 5
`
`Permissions _5__Q
`
`Record
`ID
`
`Acct
`ID
`
`Data
`Service
`
`Allow
`
`Deny
`
`Alert
`Type
`
`Alert Number
`
`100
`
`101
`
`102
`
`103
`
`104
`
`105
`
`106
`
`200
`
`Email
`
`True
`
`False
`
`Email
`
`alice@acme.com
`
`200
`
`200
`
`201
`
`201
`
`201
`
`Phone
`
`True
`
`False
`
`SMS
`
`909-123-1234
`
`SMS
`
`False
`
`True
`
`Email
`
`alice@acme.com
`
`Email
`
`True
`
`False
`
`Email
`
`joe@abc.com
`
`Email
`
`True
`
`False
`
`SMS
`
`605-852-9797
`
`IM
`
`True
`
`False
`
`SMS
`
`605-852-9797
`
`201
`
`SMS
`
`True
`
`False
`
`Email
`
`john@mx.com
`
`BLACKBERRY EX. 1005, pg. 20
`
`

`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 20 of 23
`
`US 7,996,005 B2
`
`Fig. 6A
`
`A data service is
`
`140
`
`Activity record
`is received by
`the Data
`
`Gateway
`
`Data Gateway
`checksthe
`
`Permissions
`
`database
`
`initiated from
`
`the mobile
`
`device (either
`inbound or
`
`outbound
`
`request)
`
`Data Monitor
`
`records Device
`
`ID, dateltime
`stamp and any
`contextual
`
`data.
`
`Data Monitor
`
`formats a data
`
`packet and
`sendsthe
`
`Activity record
`to the central
`
`data repository
`
`
`
`Permissions §_Q
`
`BLACKBERRY EX. 1005, pg. 21
`
`BLACKBERRY EX. 1005, pg. 21
`
`

`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 21 of 23
`
`US 7,996,005 B2
`
`Permissions QQ
`
`Fig. 6B
`Passed
`
`163
`
`
`Data Request Yes
`
`
`
`Authorized
`
`N0 164
`
`
`
`Data Gateway
`Notifies Data
`Service of Auth
`
`Data Gateway
`Notifies Data
`Service of Auth
`
`.
`Cellular Service
`Pr°‘"d°r 15
`
`Failed 20
`
`service
`
`Data Device
`
`
`
`Data Monitor ;1
`
`
`Data Device
`
`Data Monitor Q
`
`Data Monitor
`
`cancels data
`
`request
`
`Data Monitor
`
`passes data
`request to data
`
`BLACKBERRY EX. 1005, pg. 22
`
`BLACKBERRY EX. 1005, pg. 22
`
`

`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 22 of 23
`
`US 7,996,005 B2
`
`Fig. 7A
`
`
`
`
`
`
`
`
`
`
`Permissions Q1
`
`Activity Log it)
`
`Alert Monitor
`
`checks all new
`
`log activity
`against
`Permissions
`
`database
`
`
`
`
`
`Notifies of
`
`Unauthorized
`
`Activity
`
`Cellular Service
`
`Provider _1_§
`
`BLACKBERRY EX. 1005, pg. 23
`
`Log Activity
`
`Authorized
`
`
`Data Gateway
`looks up the
`
`primary and
`secondary
`delivery
`methods and
`
`
`
`
`
`
`
`
`BLACKBERRY EX. 1005, pg. 23
`
`

`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 23 of 23
`
`US 7,996,005 B2
`
`Fig. 7B
`
`Cellular Service
`
`Provider j_6_
`
`
`SMS message
`
`sent over
`secondary
`delivery
`method to one
`
`accounts
`or more
`accounts
`
`
`
`
`
`
`Email sent
`over primary
`delivery
`method to one
`or more
`
`
`
`
`
`
`BLACKBERRY EX. 1005, pg. 24
`
`BLACKBERRY EX. 1005, pg. 24
`
`

`
`US 7,996,005 B2
`
`1
`MOBILE COMMUNICATION DEVICE
`MONITORING SYSTEMS AND METHODS
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is related to and claims priority to U.S.
`Provisional Patent Application No. 60/885,384, filed Jan. 17,
`2007, which is incorporated herein by reference in its entirety.
`
`TECHNICAL FIELD
`
`The present invention relates generally to communication
`systems and, more particularly, to mobile communication
`devices and systems and methods for monitoring the commu-
`nication devices.
`
`BACKGROUND
`
`A 2006 report from the National Center for Missing and
`Exploited Children (NCMEC) showed that more parents and
`guardians were using filtering, blocking, and monitoring soft-
`ware on the home computers that their children used most
`often, but even so, youth exposure to unwanted sexual mate-
`rial increased substantially from the report conducted five
`years earlier. In the study, thirty four percent of the youth
`communicated with people online that they did not know. One
`in seven received unwanted sexual solicitations or approaches
`in the past year, while fifty six percent of the youths who
`received an unwanted solicitation did not report the incident
`to anyone. Almost one third (approximately thirty one per-
`cent) of the solicitations were aggressive, meaning the solici-
`tors made or attempted to contact the youth offline, and of the
`aggressive solicitations, thirty four percent called the youth
`on the telephone.
`The report recommended broader efforts to reduce the risks
`to youth, but the recommendations were still directed mainly
`to limiting Internet access from within the home. However,
`approximately twenty five percent of all teens and pre-teens
`in the U.S. carry a cell phone and this number is expected to
`grow significantly over the next several years. All of the
`Internet services, such as email, instant messaging, text mes-
`saging, etc., mentioned in the NCMEC study, are also avail-
`able on the child’s cell phone. In addition, the child is more
`likely to assume his cell phone activities are private when
`away from the monitoring software installed on the home
`computer. Currently, there is no means for parents to monitor
`their child’s Internet and cell phone activities outside of the
`home.
`
`As a result there is a need for systems and methods that
`allow parents, guardians, and/or employers to effectively
`monitor these activities as well as provide additional security,
`location tracking, and/or prosecution, for example, against
`unlawful predator activities or other undesirable activities.
`
`SUMMARY
`
`Systems, methods, and program products are disclosed, in
`accordance with one or more embodiments of the present
`invention, which are directed to monitoring the communica-
`tions to and from a wireless data device. For example in
`accordance with an embodiment, each ofthe data services on
`a wireless device, such as a cell phone, a Smartphone, or a
`personal digital assistant (PDA), may be monitored against
`the permissions (e.g., rules) stored in a central repository.
`Data services may include all forms of communications
`between the device and a third party including, for example,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`cellular voice calls, short message service (SMS) text mes-
`sages, email, instant messaging sessions, and/or the applica-
`tions used by the data services including, for example, the
`address book, calendar, and tasks maintained on the wireless
`device. In accordance with some embodiments, monitoring
`may be performed for a multitude of communication proto-
`cols for sending or receiving data including, for example,
`protocols associated with cellular networks, personal identi-
`fication number (PIN)-to-PIN messaging, Wi-Fi standards,
`Bluetooth standards, Personal Area Networks, Local Area
`Networks, and/or Public Networks.
`According to some embodiments of the present invention,
`a user may specify the permissions for each data service
`associated with a wireless device. The user may specify
`whether use of the service is allowed or denied for any iden-
`tity that is not currently in the address book of the device. In
`addition to the forensic information collected and stored
`
`regarding the communication transaction, an embodiment of
`the present invention collects, stores, and analyzes the con-
`textual information contained within the data including text,
`files, pictures, audio, and/or all other manner of digital and
`analog content transmitted between a mobile communica-
`tions device and a third party.
`In accordance with some embodiments of the present
`invention, systems, methods, and program products are dis-
`closed that alerts the user whenever an unauthorized activity
`is detected. For example, the user may specify one or more
`methods of notification including email, SMS text message,
`voice call, and/or any other publicly accepted machine-to-
`machine communications protocol to alert the user whenever
`an unauthorized activity is detected. In general in accordance
`with some embodiments, the type of unauthorized activity
`being monitored may include any form of information trans-
`mission and/or reception (e.g., of audio, photo, video, textual
`data, or multimedia information) or any type of change to the
`wireless data device. Similarly in accordance with some
`embodiments, the user notification of unauthorized activity
`may be provided in any form ofcommunication, including for
`example audio, photo, video, textual data, and/or multimedia
`information.
`
`More specifically in accordance with one or more embodi-
`ments of the present invention, a client application installed
`on a mobile communications device, such as for example a
`cell phone or PDA, transmits detailed device usage informa-
`tion using a wireless data connection from the device to a
`central repository accessible from a network (e.g., the Inter-
`net). For example, monitoring of device usage may include
`such things as inbound or outbound phone calls, inbound or
`outbound SMS Text Messages, inbound or outbound Instant
`Messages, Web BrowserAccess,Address Book changes (e.g.,
`Adds, Modifications, and/or Deletions), Calendar Appoint-
`ment changes (e.g., Adds, Modifications, and/or Deletions),
`Tasks changes (e.g., Adds, Modifications, and/or Deletions),
`changes to the installed applications on the device (e.g.,Adds,
`Modifications, and/or Deletions), and/or inbound or out-
`bound multimedia files.
`
`In addition to the client application in accordance with one
`or more embodiments of the present invention, a web-based
`monitoring application, which is controlled by an adminis-
`trative user such as for example a parent or manager, monitors
`the contents of the central repository. For example, based on
`rules selected by the administrative user, the device usage is
`allowed, denied, and/or an alert is sent to the administrative
`user notifying them of an unauthorized event. In accordance
`with some embodiments of the present invention, existing
`location services (e.g., GPS, cell-based location applications,
`
`BLACKBERRY EX. 1005, pg. 25
`
`BLACKBERRY EX. 1005, pg. 25
`
`

`
`US 7,996,005 B2
`
`3
`or network-based location applications) may be employed to
`include the monitoring and alerting ofthe physical location of
`the device.
`
`In accordance with one embodiment of the present inven-
`tion, a system includes memory configured to store programs
`and database information; a processor, coupled to the
`memory, configured to access the database information and
`run the programs; and a communication gateway, coupled to
`the processor and the memory, configured to receive infor-
`mation on data service use from a mobile, wireless, commu-
`nication device being monitored by the system. The database
`information may include an activity log database configured
`to store an entry for each data service use received from the
`mobile, wireless, communication device; and a permissions
`database configured to store rules as to whether the data
`service use is allowed for the mobile, wireless, communica-
`tion device. The programs may include an alert monitor pro-
`gram configured to compare the entry for each of the data
`service uses stored in the activity log database to the rules
`stored in the permissions database and provide an alert if the
`data service use of the mobile, wireless, communication
`device is not allowed.
`
`In accordance with another embodiment of the present
`invention, a mobile communications device includes a
`memory configured to store programs and data; a processor,
`coupled to the memory, configured to run the programs stored
`in the memory; a communications port configured to wire-
`lessly communicate with a data center; and wherein the pro-
`grams include a data monitor program configured to monitor
`data service uses of the mobile communications device and
`
`compile information ofthe data service uses for transmission
`to the data center via the communications port, wherein the
`data service uses comprise inbound and outbound activity
`between the mobile communications device and a third party
`and changes to the data stored in the memory.
`In accordance with another embodiment of the present
`invention, a method of monitoring a mobile communication
`device includes storing rules associated with data service uses
`for the mobile communication device; receiving information
`for one of the data service uses from the mobile communica-
`
`tion device; storing the information for the data service use;
`checking the data service use to the corresponding rule asso-
`ciated with the data service use; and providing an alert if the
`data service use is unauthorized based on the corresponding
`rule.
`
`In accordance with another embodiment of the present
`invention, a method of monitoring a mobile communication
`device includes monitoring data service uses of the mobile
`communication device; compiling information of one of the
`data service uses; and transmitting the information ofthe data
`service use to a data center, wherein the data service uses
`comprise inbound and outbound activity between the mobile
`communications device and a third party and changes to data
`stored in the mobile communication device.
`
`In accordance with another embodiment of the present
`invention, a computer-readable medium is disclosed on
`which is stored a computer program for performing a method
`of monitoring a mobile communication device, the method
`includes storing rules associated with data service uses for the
`mobile communication device; receiving information for one
`of the data service uses from the mobile communication
`
`device; storing the information for the data service use;
`checking the data service use to the corresponding rule asso-
`ciated with the data service use; and providing an alert if the
`data service use is unauthorized based on the corresponding
`rule.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`In accordance with another embodiment of the present
`invention, a computer-readable medium is disclosed on
`which is stored a computer program for performing a method
`of monitoring a mobile communication device, the method
`includes monitoring data service uses of the mobile commu-
`nication device; compiling information of one of the data
`service uses; and transmitting the information of the data
`service use to a data center, wherein the data service uses
`comprise inbound and outbound activity between the mobile
`communications device and a third party and changes to data
`stored in the mobile communication device.
`
`The scope of the invention is defined by the claims, which
`are incorporated into this section by reference. A more com-
`plete understanding of embodiments of the present invention
`will be afforded to those skilled in the art, as well as a real-
`ization ofadditional advantages thereof, by a consideration of
`the following detailed description of one or more embodi-
`ments. Reference will be made to the appended sheets of
`drawings that will first be described briefly.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of a system including a Data
`Monitor tool to monitor the activities on a wireless device, a
`Data Gateway for collecting the activity on a wireless device,
`and an Alert Monitor in accordance with an embodiment of
`
`the present invention.
`FIG. 2 is a block diagram of a system including a monitor-
`ing tool associated with a mobile communications device in
`accordance with an embodiment of the present invention.
`FIGS. 3A-3O illustrate exemplary flowcharts of the moni-
`toring and collecting (logging) of event activity in FIG. 1 for
`each of the data services of FIG. 2 in accordance with one or
`
`more embodiments of the present invention.
`FIG. 4 is an exemplary table representation of the Activity
`Log database of FIG. 1 in accordance with an embodiment of
`the present invention.
`FIG. 5 is an exemplary table representation of the Permis-
`sions database of FIG. 1 in accordance with an embodiment
`
`of the present invention.
`FIGS. 6A-6B illustrate exemplary flowcharts where the
`data service on a wireless device is processed or blocked
`based on the contextual information being passed through the
`data service in accordance with an embodiment ofthe present
`invention.
`
`FIGS. 7A-7B illustrate exemplary flowcharts of the Alert
`Monitor tool of FIG. 1 in accordance with an embodiment of
`
`the present invention.
`Embodiments ofthe present invention and their advantages
`are best understood by referring to the detailed description
`that follows. It should be appreciated that like reference
`numerals are used to identify like elements illustrated in one
`or more of the figures.
`
`DETAILED DESCRIPTION
`
`FIG. 1 illustrates a Data Gateway program tool 30 and
`wireless devices 10, 12, and 14 represent users whose activi-
`ties are monitored according to an embodiment ofthe present
`invention. Each of the devices 10, 12, and 14 may include a
`respective Data Monitoring program tool 11, 13, and 15
`which communicates with the Data Gateway 30. For
`example, wireless devices 10, 12, and 14 include memory and
`a processor configured to run various programs (e.g., soft-
`ware applications) stored in the memory, including respective
`Data Monitoring program tools 11, 13, and 15.
`
`BLACKBERRY EX. 1005, pg. 26
`
`BLACKBERRY EX. 1005, pg. 26
`
`

`
`US 7,996,005 B2
`
`5
`Data services used on the wireless devices 10, 12, and 14
`are monitored for activity by their respective Data Monitoring
`program tool 11, 13, and 15 which communicates (e.g., via a
`communication port such as through a wireless communica-
`tion gateway having an antenna) to the Data Gateway 30 via
`a wireless data connection such as provided by a cellular
`service provider 16. Alternatively, the devices 10, 12, and 14
`may send their activity information through any available
`communications network (e.g., any standards or protocols)
`including for example PIN-to-PIN, Wi-Fi, Bluetooth, Per-
`sonal Area Networks, Local Area Networks, and/or Public
`Networks (e.g., cellular networks, satellite networks, and/or
`the Internet).
`As described in more detail below, the Data Gateway 30
`maintains an Activity Log 40 database in a Data Center 17.
`Activity Log 40 contains an entry for each use of a data
`service on wireless devices 10, 12, and 14. As described in
`more detail below, Data Center 17 also contains a Permissions
`50 database that lists the wireless devices to be monitored
`
`(e.g., wireless devices 10, 12, and 14) and the rules to apply to
`allow, deny, and/or alert of data service activity occurring on
`the wireless devices being monitored.
`An Alert Monitor 70 program waits for new entries to be
`made into Activity Log 40. Each new entry is checked against
`the Permissions 50 database. Whenever unauthorized activity
`is detected, Alert Monitor 70 sends an alert to one or more
`users via Data Gateway 30, such as for example to a cell
`phone 18 using SMS Text Messaging or an Email 19 account.
`The preferred method of notification may be maintained in
`the Permissions 50 database which can support many forms
`of data communications including voice messages, SMS Text
`Messages, email, and/or any other publicly accepted
`machine-to-machine communications protocol.
`Data Gateway 30 andAlert Monitor 70, in accordance with
`one or more embodiments of the present invention, may rep-
`resent one or more computers (e.g., servers or other proces-
`sor-based systems) for performing the operations described
`herein (e.g., by executing software and communicating
`through a gateway or other communication interface), includ-
`ing communicating with Activity Log 40 and Permissions 50
`databases (e.g., memory such as server-based storage). Data
`Monitoring program tools 11, 13, and 15 may represent, for
`example, software run by corresponding processors of wire-
`less devices 10, 12, and 14 or may represent hardware-based
`systems (e.g., separate processors) for performing the desired
`operations described herein.
`Furthermore,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket