`
`(12) United States Patent
`Lotter et a1.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,996,005 B2
`*Aug. 9, 2011
`
`(54)
`
`(75)
`
`MOBILE COMMUNICATION DEVICE
`MONITORING SYSTEMS AND METHODS
`
`Inventors: Robert A. Lotter, Newport Beach, CA
`(US); Timothy S. Allard, Tustin, CA
`(Us)
`
`(73)
`
`Assignee: eAgency, Inc., Newport Beach, CA (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 747 days.
`This patent is subject to a terminal dis
`claimer.
`
`(21)
`
`Appl. N0.: 11/695,500
`
`(22)
`
`Filed:
`
`Apr. 2, 2007
`
`(65)
`
`(60)
`
`(51)
`
`(52)
`
`(58)
`
`Prior Publication Data
`
`US 2008/0172746 A1
`
`Jul. 17, 2008
`
`Related US. Application Data
`
`Provisional application No. 60/885,384, ?led on Jan.
`17, 2007.
`
`Int. Cl.
`(2009.01)
`H04W4/00
`US. Cl. ................... .. 455/432.3; 455/418; 455/428;
`455/407; 455/408; 455/419; 726/26
`Field of Classi?cation Search ................ .. 455/410,
`455/411, 414.1, 414.2, 418, 419, 428, 432.3,
`455/445, 560, 567, 405, 407, 408; 713/168*170;
`348/14.01*14.05; 726/26
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,282,275 B1
`8/2001 Gurbani et 31.
`6,345,361 B1 *
`2/2002 Jerger et a1. ..................... .. 726/3
`6,785,515 B1
`8/2004 Sommer et a1.
`6,959,182 B2 * 10/2005 Lingafeldt et a1. .......... .. 455/405
`7,046,782 B2
`5/2006 Miller
`7,076,041 B2
`7/2006 Brown et a1.
`7,139,553 B2 11/2006 Alston
`7,231,218 B2
`6/2007 Diacakis et :11.
`7,327,837 B1
`2/2008 Harlow et 31.
`7,814,163 B2 10/2010 Lee et a1.
`2002/0143934 A1 * 10/2002 Barker et a1. ............... .. 709/224
`2004/0208304 A1 * 10/2004 Miller .................... .. 379/210.02
`2005/0113113 A1
`5/2005 Reed
`2005/0282559 A1 12/2005 Erskine et a1.
`2006/0181411 A1
`8/2006 Fast et a1.
`2006/0209809 A1 *
`9/2006 Ellingham et a1. .......... .. 370/356
`2008/0009268 A1 *
`l/2008 Ramer et a1. ............. .. 455/412.1
`2008/0134282 A1
`6/2008 Fridman et a1.
`2008/0168135 A1 *
`7/2008 Redlich et a1. .............. .. 709/204
`2009/0132718 A1
`5/2009 Groll et a1.
`* cited by examiner
`
`Primary Examiner * Kamran Afshar
`Assistant Examiner * Mong-Thuy Tran
`(74) Attorney, Agent, or Firm * Haynes and Boone, LLP
`(57)
`ABSTRACT
`Systems and methods are directed to monitoring the commu
`nications to and from a mobile communication device in
`accordance with some embodiments of the present invention.
`For example in accordance with an embodiment, each of the
`data services on a mobile communication device may be
`monitored against rules stored in a central data center reposi
`tory. The data services may include all forms of communica
`tions between the mobile communication device and a third
`party along with changes to application or data within the
`mobile communication device. An alert may be provided to
`an administrator when unauthorized data service activity and/
`or a message may be sent to the mobile communication
`device to prevent the unauthorized data service activity.
`38 Claims, 23 Drawing Sheets
`
`Cell Phone
`10
`FJeta Monitor g‘
`
`Smart Phone
`12
`
`‘Data Monitor E ‘Data Honing‘
`
`Cellular Service Provider E
`
`Cell Phone
`g
`
`Email g <-q 632:?“
`gig
`
`Data Center 1!
`
`Alert
`Monitor Q Permissions
`Q
`
`BLACKBERRY EX. 1005, pg. 1
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 1 0123
`
`US 7,996,005 B2
`
`Fig. 1
`
`Cell Phone
`lg
`
`Smart Phone
`12
`
`PDA 1_4
`
`Data Monitor 11
`
`Data Monitor 1;
`
`Data Monitor 1_5
`
`@lar Service Pro@
`
`Cell Phone /
`1__8_
`
`-
`Ema" ‘La 4
`
`Data
`Gateway
`1Q
`
`Data Center 11
`
`__—’ Activity Log
`____,
`59
`
`N,“
`Monitor 12
`
`ermézslons
`
`BLACKBERRY EX. 1005, pg. 2
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 2 0f 23
`
`US 7,996,005 B2
`
`Fig. 2
`
`Mobile Communications Device 20
`
`L
`
`
`
`
`
`0mg 505:9. ~|._
`
`
`
`
`
`2_ 2_ 2_ M. 2_ n. 9 d
`
`o m S S W 10 m s O
`A A .?. t B s m a M
`P S A C P
`e .0. p. n b a d .u.. N n a hm e r n t .w
`
`n n m 6_ p p 2 e
`H i a .m r A p H.
`a .m .m 9 e k B A m H .l n. s 5 w 0 S n I
`
`8
`
`BLACKBERRY EX. 1005, pg. 3
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 3 0f 23
`
`US 7,996,005 B2
`
`Fig. 3A
`
`100
`\
`1 0
`l,
`i
`PM?“ ca“ '5
`recelved on_the
`moblle devlce
`120
`
`)
`
`Data Monitor
`records Device
`ID, start and
`end date/time
`stamp,
`originating
`telephone
`number, and
`any contextual
`data.
`
`110
`Activity record
`is received by
`the Data
`Gateway
`
`'
`
`1 §0
`)
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`.
`
`1%0
`
`Activity Log
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`‘to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 4
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 4 of 23
`
`US 7,996,005 B2
`
`Fig. 3B
`
`_
`
`100
`
`1
`
`.
`
`Phone can '5
`placed from_the
`moblle devlce
`
`8
`‘
`Data Monitor
`records Device
`ID, start and
`end date/time
`stamp,
`destination
`telephone
`number, and
`any contextual
`data.
`
`11,’.0
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`'
`
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`1520
`)
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`‘
`
`Activity Log
`42
`
`BLACKBERRY EX. 1005, pg. 5
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 5 0f 23
`
`US 7,996,005 B2
`
`100x
`
`Fig. 3C
`
`_
`
`_
`
`’
`
`140
`Act'v'ty record
`is received by
`the Data
`Gateway
`
`‘
`
`W0
`I
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`9-D
`
`messa e is
`
`1 12
`‘
`)
`An email
`receivedgat the
`-
`-
`mobile device
`122
`(
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`originating
`email address,
`and any
`contextual
`data.
`
`Q0
`‘
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 6
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 6 0f 23
`
`US 7,996,005 B2
`
`100x
`
`Fig. 3D
`
`_
`
`_
`
`14,0
`l
`Actlvlty record
`is received by
`the Data
`Gateway
`
`‘
`
`1§0
`)
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`09.
`
`:
`
`113
`‘
`)
`An email
`messa e is sent
`from "?le mobne
`device
`
`123
`(
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`email address,
`and any
`contextual
`data.
`
`1;}0
`
`‘
`l
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 7
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 7 of 23
`
`US 7,996,005 B2
`
`1o0\v
`
`Fig. 3E
`
`14(l0
`_
`_
`’
`Activity record
`IS recelved by
`the Data
`Gateway
`
`>
`
`1530
`»
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`ig
`
`V
`1 1 4
`)
`A text message
`is received at
`the mobile
`device
`
`1 24
`
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`origination
`phone number,
`and any
`contextual
`data.
`
`Q0
`‘
`,
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 8
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 8 0f 23
`
`US 7,996,005 B2
`
`100
`1
`
`Start
`
`Fig. 3F
`
`140
`3
`Activity record
`is received by
`the Data
`Gateway
`
`,
`15o .
`7
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`i9.
`
`v
`115
`I
`A text message
`is sent from the
`mobile device
`
`1¥5
`‘
`I
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`phone number,
`and any
`contextual
`data.
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 9
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 9 0f 23
`
`US 7,996,005 B2
`
`100
`x
`
`Start
`
`Fig. 36
`
`110
`’
`Activity record
`_
`_
`IS recelved by
`the Data
`Gateway
`
`4
`
`1?‘)
`»
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`4.0.
`
`11:6
`,
`An instant
`message is
`received at the
`mobile device
`1 g6
`
`)
`Data Monitor
`- records Device
`ID, date/time
`stamp,
`originating
`username, and
`any contextual
`data.
`
`1;}0
`»
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 10
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 10 0f 23
`
`US 7,996,005 B2
`
`100
`x
`
`Start
`
`Fig. 3H
`
`1?"
`_
`_
`’
`MW"! record
`IS recelved by
`the Data
`Gateway
`
`k
`
`1§0
`1
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`.4.—0'
`
`1'(l7
`,
`)
`An instant
`message is sent
`from the mobile
`device
`
`V
`
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`username, and
`any contextual
`data.
`
`130
`f
`‘
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 11
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 11 0123
`
`US 7,996,005 B2
`
`Fig. 3|
`
`11210
`_
`_
`’
`Achy“! record
`IS received by
`the Data
`Gateway
`
`7
`
`1%0
`1
`‘
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity LOg
`
`10°
`‘
`1 '(l) 8
`‘
`An http(s)
`request is sent
`from the mobile
`device
`
`1 23
`l
`)
`
`1
`
`Data Monitor
`records Device
`ID, date/time
`stamp,
`destination
`URL, and any
`contextual
`data.
`
`13%0
`
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 12
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 12 0f 23
`
`US 7,996,005 B2
`
`100
`
`Fig. SJ
`
`119 )
`An address
`book entry is
`added, modified
`or deleted from
`the mobile
`device
`
`1g9
`
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`
`1220 )
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`140
`3
`Activity record
`is received by
`the Data
`Gateway
`
`1?"
`‘
`)
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Address Book
`§_(_)_
`
`Activity Log
`i9
`
`BLACKBERRY EX. 1005, pg. 13
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 13 0f 23
`
`US 7,996,005 B2
`
`1°"
`\'
`1;}1 )
`A calendar entry
`rézggiizdér
`deleted from the
`mobile device
`
`'
`
`Fig. 3K
`
`)
`
`140
`Activity. record
`'5 rt‘laqceg'etd by
`9 a a
`Gateway
`
`‘
`1§0
`l
`Data Gateway
`writes Activity
`record 10 the
`central data
`repository
`
`132
`1‘
`‘
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data. -
`130
`Calendar 1Q
`
`‘
`
`)
`
`Data Monitor
`formats a data
`
`packet and
`sends the
`Activity record
`to the central
`data repository
`
`_
`
`_
`
`Activity Log
`it)
`
`End
`
`BLACKBERRY EX. 1005, pg. 14
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 14 0f 23
`
`US 7,996,005 B2
`
`100
`
`Fig. 3L
`
`1%
`,
`I
`A task entry is
`added, modified
`or deleted from
`the mobile
`device
`
`1554 )
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`
`I
`Data Monitor
`formats a data
`packet and
`sends the
`Activity record
`to the central
`data repository
`
`140
`(
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Tasks 5Q
`
`Activity Log
`gg
`
`BLACKBERRY EX. 1005, pg. 15
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 15 0f 23
`
`US 7,996,005 B2
`
`100 @1 ‘
`
`1§5
`)
`An application is
`added, modified
`or deleted from
`the mobile
`device
`
`1§6
`)
`Data Monitor
`records Device
`ID, date/time
`stamp and any
`contextual
`data.
`l
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`1%0 )
`
`Fig. 3M
`
`140
`(
`)
`
`Activity record
`is received by
`the Data
`Gateway
`
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`£1
`
`BLACKBERRY EX. 1005, pg. 16
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 16 0f 23
`
`US 7,996,005 B2
`
`1001
`
`Fig. 3N
`
`140
`)
`Activity record
`is received by
`the Data
`Gateway
`
`,
`
`150
`1
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`4:9
`
`‘
`1;?
`A photo, video,
`or multimedia
`file is received at
`the mobile
`device
`‘
`1 §8
`)
`
`Data Monitor
`records Device
`ID, date/time
`stamp, and any
`contextual
`data
`
`‘
`
`11”
`)
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 17
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 17 0123
`
`US 7,996,005 B2
`
`10°}
`
`Start
`
`Fig. 30
`
`1%0
`1—
`Activity record
`is received by
`the Data
`Gateway
`
`1150 )
`Data Gateway
`writes Activity
`record to the
`central data
`repository
`
`Activity Log
`5Q
`
`1i"
`i
`A photo, video,
`or multimedia
`file is sent from
`the mobile
`device
`1112 T
`Data Monitor
`records Device
`ID, date/time
`stamp, and any
`contextual
`data.
`
`‘
`
`.
`
`100 )
`Data Monitor
`formats a data
`packet and
`sendsthe
`Activity record
`to the central
`data repository
`
`BLACKBERRY EX. 1005, pg. 18
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 18 0f 23
`
`US 7,996,005 B2
`
`F I9. 4
`
`Actlvlty Log 40
`
`Record
`ID
`
`Acct
`ID
`
`Msg
`Type
`
`ln/Out
`
`Start
`Time
`
`End
`Time
`
`CaIIerID
`
`Log
`
`100
`
`200
`
`
`In
`
`23:51:01
`1/1/2007
`
`buddy@abc.com Did you find...
`
`101
`
`200
`
`Phone
`
`Out
`
`22:42:01
`1/1/2007
`
`22:45:56
`1/1/2007
`
`213-555-1212
`
`102
`
`201
`
`SMS
`
`In
`
`103
`
`200
`
`
`Out
`
`104
`
`202
`
`IM
`
`Out
`
`22:35:26
`1/1/2007
`
`18:15:21
`1/1/2007
`
`16:12:09
`1/1/2007
`
`909-123-1234
`
`Meet me at 4...
`
`john@acme.com Want a better...
`
`mypa112
`
`Hey John...
`
`105
`
`202
`
`Phone
`
`106
`
`203
`
`
`In
`
`In
`
`14:20:12
`1/1/2007
`
`14:36:41
`1/1/2007
`
`605-852-9797
`
`10:51 :32
`111/2007
`
`alice@mx.com
`
`Thanks for
`calling...
`
`BLACKBERRY EX. 1005, pg. 19
`
`
`
`US. Patent
`
`Aug. 9, 2011
`
`Sheet 19 0123
`
`US 7,996,005 B2
`
`Fig. 5
`
`Permissions _5__Q
`
`Record
`ID
`
`Acct
`ID
`
`Data
`Service
`
`Allow
`
`Deny
`
`Alert
`Type
`
`Alert Number
`
`100
`
`101
`
`102
`
`103
`
`104
`
`105
`
`106
`
`200
`
`
`True
`
`False
`
`
`alice@acme.com
`
`200
`
`200
`
`201
`
`201
`
`201
`
`Phone
`
`True
`
`False
`
`SMS
`
`909-123-1234
`
`SMS
`
`False
`
`True
`
`
`alice@acme.com
`
`
`True
`
`False
`
`
`joe@abc.com
`
`
`True
`
`False
`
`SMS
`
`605-852-9797
`
`IM
`
`True
`
`False
`
`SMS
`
`605-852-9797
`
`201
`
`SMS
`
`True
`
`False
`
`
`john@mx.com
`
`BLACKBERRY EX. 1005, pg. 20
`
`
`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 20 of 23
`
`US 7,996,005 B2
`
`Fig. 6A
`
`A data service is
`
`140
`
`Activity record
`is received by
`the Data
`
`Gateway
`
`Data Gateway
`checksthe
`
`Permissions
`
`database
`
`initiated from
`
`the mobile
`
`device (either
`inbound or
`
`outbound
`
`request)
`
`Data Monitor
`
`records Device
`
`ID, dateltime
`stamp and any
`contextual
`
`data.
`
`Data Monitor
`
`formats a data
`
`packet and
`sendsthe
`
`Activity record
`to the central
`
`data repository
`
`
`
`Permissions §_Q
`
`BLACKBERRY EX. 1005, pg. 21
`
`BLACKBERRY EX. 1005, pg. 21
`
`
`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 21 of 23
`
`US 7,996,005 B2
`
`Permissions QQ
`
`Fig. 6B
`Passed
`
`163
`
`
`Data Request Yes
`
`
`
`Authorized
`
`N0 164
`
`
`
`Data Gateway
`Notifies Data
`Service of Auth
`
`Data Gateway
`Notifies Data
`Service of Auth
`
`.
`Cellular Service
`Pr°‘"d°r 15
`
`Failed 20
`
`service
`
`Data Device
`
`
`
`Data Monitor ;1
`
`
`Data Device
`
`Data Monitor Q
`
`Data Monitor
`
`cancels data
`
`request
`
`Data Monitor
`
`passes data
`request to data
`
`BLACKBERRY EX. 1005, pg. 22
`
`BLACKBERRY EX. 1005, pg. 22
`
`
`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 22 of 23
`
`US 7,996,005 B2
`
`Fig. 7A
`
`
`
`
`
`
`
`
`
`
`Permissions Q1
`
`Activity Log it)
`
`Alert Monitor
`
`checks all new
`
`log activity
`against
`Permissions
`
`database
`
`
`
`
`
`Notifies of
`
`Unauthorized
`
`Activity
`
`Cellular Service
`
`Provider _1_§
`
`BLACKBERRY EX. 1005, pg. 23
`
`Log Activity
`
`Authorized
`
`
`Data Gateway
`looks up the
`
`primary and
`secondary
`delivery
`methods and
`
`
`
`
`
`
`
`
`BLACKBERRY EX. 1005, pg. 23
`
`
`
`U.S. Patent
`
`Aug. 9, 2011
`
`Sheet 23 of 23
`
`US 7,996,005 B2
`
`Fig. 7B
`
`Cellular Service
`
`Provider j_6_
`
`
`SMS message
`
`sent over
`secondary
`delivery
`method to one
`
`accounts
`or more
`accounts
`
`
`
`
`
`
`Email sent
`over primary
`delivery
`method to one
`or more
`
`
`
`
`
`
`BLACKBERRY EX. 1005, pg. 24
`
`BLACKBERRY EX. 1005, pg. 24
`
`
`
`US 7,996,005 B2
`
`1
`MOBILE COMMUNICATION DEVICE
`MONITORING SYSTEMS AND METHODS
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is related to and claims priority to U.S.
`Provisional Patent Application No. 60/885,384, filed Jan. 17,
`2007, which is incorporated herein by reference in its entirety.
`
`TECHNICAL FIELD
`
`The present invention relates generally to communication
`systems and, more particularly, to mobile communication
`devices and systems and methods for monitoring the commu-
`nication devices.
`
`BACKGROUND
`
`A 2006 report from the National Center for Missing and
`Exploited Children (NCMEC) showed that more parents and
`guardians were using filtering, blocking, and monitoring soft-
`ware on the home computers that their children used most
`often, but even so, youth exposure to unwanted sexual mate-
`rial increased substantially from the report conducted five
`years earlier. In the study, thirty four percent of the youth
`communicated with people online that they did not know. One
`in seven received unwanted sexual solicitations or approaches
`in the past year, while fifty six percent of the youths who
`received an unwanted solicitation did not report the incident
`to anyone. Almost one third (approximately thirty one per-
`cent) of the solicitations were aggressive, meaning the solici-
`tors made or attempted to contact the youth offline, and of the
`aggressive solicitations, thirty four percent called the youth
`on the telephone.
`The report recommended broader efforts to reduce the risks
`to youth, but the recommendations were still directed mainly
`to limiting Internet access from within the home. However,
`approximately twenty five percent of all teens and pre-teens
`in the U.S. carry a cell phone and this number is expected to
`grow significantly over the next several years. All of the
`Internet services, such as email, instant messaging, text mes-
`saging, etc., mentioned in the NCMEC study, are also avail-
`able on the child’s cell phone. In addition, the child is more
`likely to assume his cell phone activities are private when
`away from the monitoring software installed on the home
`computer. Currently, there is no means for parents to monitor
`their child’s Internet and cell phone activities outside of the
`home.
`
`As a result there is a need for systems and methods that
`allow parents, guardians, and/or employers to effectively
`monitor these activities as well as provide additional security,
`location tracking, and/or prosecution, for example, against
`unlawful predator activities or other undesirable activities.
`
`SUMMARY
`
`Systems, methods, and program products are disclosed, in
`accordance with one or more embodiments of the present
`invention, which are directed to monitoring the communica-
`tions to and from a wireless data device. For example in
`accordance with an embodiment, each ofthe data services on
`a wireless device, such as a cell phone, a Smartphone, or a
`personal digital assistant (PDA), may be monitored against
`the permissions (e.g., rules) stored in a central repository.
`Data services may include all forms of communications
`between the device and a third party including, for example,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`cellular voice calls, short message service (SMS) text mes-
`sages, email, instant messaging sessions, and/or the applica-
`tions used by the data services including, for example, the
`address book, calendar, and tasks maintained on the wireless
`device. In accordance with some embodiments, monitoring
`may be performed for a multitude of communication proto-
`cols for sending or receiving data including, for example,
`protocols associated with cellular networks, personal identi-
`fication number (PIN)-to-PIN messaging, Wi-Fi standards,
`Bluetooth standards, Personal Area Networks, Local Area
`Networks, and/or Public Networks.
`According to some embodiments of the present invention,
`a user may specify the permissions for each data service
`associated with a wireless device. The user may specify
`whether use of the service is allowed or denied for any iden-
`tity that is not currently in the address book of the device. In
`addition to the forensic information collected and stored
`
`regarding the communication transaction, an embodiment of
`the present invention collects, stores, and analyzes the con-
`textual information contained within the data including text,
`files, pictures, audio, and/or all other manner of digital and
`analog content transmitted between a mobile communica-
`tions device and a third party.
`In accordance with some embodiments of the present
`invention, systems, methods, and program products are dis-
`closed that alerts the user whenever an unauthorized activity
`is detected. For example, the user may specify one or more
`methods of notification including email, SMS text message,
`voice call, and/or any other publicly accepted machine-to-
`machine communications protocol to alert the user whenever
`an unauthorized activity is detected. In general in accordance
`with some embodiments, the type of unauthorized activity
`being monitored may include any form of information trans-
`mission and/or reception (e.g., of audio, photo, video, textual
`data, or multimedia information) or any type of change to the
`wireless data device. Similarly in accordance with some
`embodiments, the user notification of unauthorized activity
`may be provided in any form ofcommunication, including for
`example audio, photo, video, textual data, and/or multimedia
`information.
`
`More specifically in accordance with one or more embodi-
`ments of the present invention, a client application installed
`on a mobile communications device, such as for example a
`cell phone or PDA, transmits detailed device usage informa-
`tion using a wireless data connection from the device to a
`central repository accessible from a network (e.g., the Inter-
`net). For example, monitoring of device usage may include
`such things as inbound or outbound phone calls, inbound or
`outbound SMS Text Messages, inbound or outbound Instant
`Messages, Web BrowserAccess,Address Book changes (e.g.,
`Adds, Modifications, and/or Deletions), Calendar Appoint-
`ment changes (e.g., Adds, Modifications, and/or Deletions),
`Tasks changes (e.g., Adds, Modifications, and/or Deletions),
`changes to the installed applications on the device (e.g.,Adds,
`Modifications, and/or Deletions), and/or inbound or out-
`bound multimedia files.
`
`In addition to the client application in accordance with one
`or more embodiments of the present invention, a web-based
`monitoring application, which is controlled by an adminis-
`trative user such as for example a parent or manager, monitors
`the contents of the central repository. For example, based on
`rules selected by the administrative user, the device usage is
`allowed, denied, and/or an alert is sent to the administrative
`user notifying them of an unauthorized event. In accordance
`with some embodiments of the present invention, existing
`location services (e.g., GPS, cell-based location applications,
`
`BLACKBERRY EX. 1005, pg. 25
`
`BLACKBERRY EX. 1005, pg. 25
`
`
`
`US 7,996,005 B2
`
`3
`or network-based location applications) may be employed to
`include the monitoring and alerting ofthe physical location of
`the device.
`
`In accordance with one embodiment of the present inven-
`tion, a system includes memory configured to store programs
`and database information; a processor, coupled to the
`memory, configured to access the database information and
`run the programs; and a communication gateway, coupled to
`the processor and the memory, configured to receive infor-
`mation on data service use from a mobile, wireless, commu-
`nication device being monitored by the system. The database
`information may include an activity log database configured
`to store an entry for each data service use received from the
`mobile, wireless, communication device; and a permissions
`database configured to store rules as to whether the data
`service use is allowed for the mobile, wireless, communica-
`tion device. The programs may include an alert monitor pro-
`gram configured to compare the entry for each of the data
`service uses stored in the activity log database to the rules
`stored in the permissions database and provide an alert if the
`data service use of the mobile, wireless, communication
`device is not allowed.
`
`In accordance with another embodiment of the present
`invention, a mobile communications device includes a
`memory configured to store programs and data; a processor,
`coupled to the memory, configured to run the programs stored
`in the memory; a communications port configured to wire-
`lessly communicate with a data center; and wherein the pro-
`grams include a data monitor program configured to monitor
`data service uses of the mobile communications device and
`
`compile information ofthe data service uses for transmission
`to the data center via the communications port, wherein the
`data service uses comprise inbound and outbound activity
`between the mobile communications device and a third party
`and changes to the data stored in the memory.
`In accordance with another embodiment of the present
`invention, a method of monitoring a mobile communication
`device includes storing rules associated with data service uses
`for the mobile communication device; receiving information
`for one of the data service uses from the mobile communica-
`
`tion device; storing the information for the data service use;
`checking the data service use to the corresponding rule asso-
`ciated with the data service use; and providing an alert if the
`data service use is unauthorized based on the corresponding
`rule.
`
`In accordance with another embodiment of the present
`invention, a method of monitoring a mobile communication
`device includes monitoring data service uses of the mobile
`communication device; compiling information of one of the
`data service uses; and transmitting the information ofthe data
`service use to a data center, wherein the data service uses
`comprise inbound and outbound activity between the mobile
`communications device and a third party and changes to data
`stored in the mobile communication device.
`
`In accordance with another embodiment of the present
`invention, a computer-readable medium is disclosed on
`which is stored a computer program for performing a method
`of monitoring a mobile communication device, the method
`includes storing rules associated with data service uses for the
`mobile communication device; receiving information for one
`of the data service uses from the mobile communication
`
`device; storing the information for the data service use;
`checking the data service use to the corresponding rule asso-
`ciated with the data service use; and providing an alert if the
`data service use is unauthorized based on the corresponding
`rule.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`In accordance with another embodiment of the present
`invention, a computer-readable medium is disclosed on
`which is stored a computer program for performing a method
`of monitoring a mobile communication device, the method
`includes monitoring data service uses of the mobile commu-
`nication device; compiling information of one of the data
`service uses; and transmitting the information of the data
`service use to a data center, wherein the data service uses
`comprise inbound and outbound activity between the mobile
`communications device and a third party and changes to data
`stored in the mobile communication device.
`
`The scope of the invention is defined by the claims, which
`are incorporated into this section by reference. A more com-
`plete understanding of embodiments of the present invention
`will be afforded to those skilled in the art, as well as a real-
`ization ofadditional advantages thereof, by a consideration of
`the following detailed description of one or more embodi-
`ments. Reference will be made to the appended sheets of
`drawings that will first be described briefly.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of a system including a Data
`Monitor tool to monitor the activities on a wireless device, a
`Data Gateway for collecting the activity on a wireless device,
`and an Alert Monitor in accordance with an embodiment of
`
`the present invention.
`FIG. 2 is a block diagram of a system including a monitor-
`ing tool associated with a mobile communications device in
`accordance with an embodiment of the present invention.
`FIGS. 3A-3O illustrate exemplary flowcharts of the moni-
`toring and collecting (logging) of event activity in FIG. 1 for
`each of the data services of FIG. 2 in accordance with one or
`
`more embodiments of the present invention.
`FIG. 4 is an exemplary table representation of the Activity
`Log database of FIG. 1 in accordance with an embodiment of
`the present invention.
`FIG. 5 is an exemplary table representation of the Permis-
`sions database of FIG. 1 in accordance with an embodiment
`
`of the present invention.
`FIGS. 6A-6B illustrate exemplary flowcharts where the
`data service on a wireless device is processed or blocked
`based on the contextual information being passed through the
`data service in accordance with an embodiment ofthe present
`invention.
`
`FIGS. 7A-7B illustrate exemplary flowcharts of the Alert
`Monitor tool of FIG. 1 in accordance with an embodiment of
`
`the present invention.
`Embodiments ofthe present invention and their advantages
`are best understood by referring to the detailed description
`that follows. It should be appreciated that like reference
`numerals are used to identify like elements illustrated in one
`or more of the figures.
`
`DETAILED DESCRIPTION
`
`FIG. 1 illustrates a Data Gateway program tool 30 and
`wireless devices 10, 12, and 14 represent users whose activi-
`ties are monitored according to an embodiment ofthe present
`invention. Each of the devices 10, 12, and 14 may include a
`respective Data Monitoring program tool 11, 13, and 15
`which communicates with the Data Gateway 30. For
`example, wireless devices 10, 12, and 14 include memory and
`a processor configured to run various programs (e.g., soft-
`ware applications) stored in the memory, including respective
`Data Monitoring program tools 11, 13, and 15.
`
`BLACKBERRY EX. 1005, pg. 26
`
`BLACKBERRY EX. 1005, pg. 26
`
`
`
`US 7,996,005 B2
`
`5
`Data services used on the wireless devices 10, 12, and 14
`are monitored for activity by their respective Data Monitoring
`program tool 11, 13, and 15 which communicates (e.g., via a
`communication port such as through a wireless communica-
`tion gateway having an antenna) to the Data Gateway 30 via
`a wireless data connection such as provided by a cellular
`service provider 16. Alternatively, the devices 10, 12, and 14
`may send their activity information through any available
`communications network (e.g., any standards or protocols)
`including for example PIN-to-PIN, Wi-Fi, Bluetooth, Per-
`sonal Area Networks, Local Area Networks, and/or Public
`Networks (e.g., cellular networks, satellite networks, and/or
`the Internet).
`As described in more detail below, the Data Gateway 30
`maintains an Activity Log 40 database in a Data Center 17.
`Activity Log 40 contains an entry for each use of a data
`service on wireless devices 10, 12, and 14. As described in
`more detail below, Data Center 17 also contains a Permissions
`50 database that lists the wireless devices to be monitored
`
`(e.g., wireless devices 10, 12, and 14) and the rules to apply to
`allow, deny, and/or alert of data service activity occurring on
`the wireless devices being monitored.
`An Alert Monitor 70 program waits for new entries to be
`made into Activity Log 40. Each new entry is checked against
`the Permissions 50 database. Whenever unauthorized activity
`is detected, Alert Monitor 70 sends an alert to one or more
`users via Data Gateway 30, such as for example to a cell
`phone 18 using SMS Text Messaging or an Email 19 account.
`The preferred method of notification may be maintained in
`the Permissions 50 database which can support many forms
`of data communications including voice messages, SMS Text
`Messages, email, and/or any other publicly accepted
`machine-to-machine communications protocol.
`Data Gateway 30 andAlert Monitor 70, in accordance with
`one or more embodiments of the present invention, may rep-
`resent one or more computers (e.g., servers or other proces-
`sor-based systems) for performing the operations described
`herein (e.g., by executing software and communicating
`through a gateway or other communication interface), includ-
`ing communicating with Activity Log 40 and Permissions 50
`databases (e.g., memory such as server-based storage). Data
`Monitoring program tools 11, 13, and 15 may represent, for
`example, software run by corresponding processors of wire-
`less devices 10, 12, and 14 or may represent hardware-based
`systems (e.g., separate processors) for performing the desired
`operations described herein.
`Furthermore,