throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`AddIESSI COMLHSSIOIVER FOR PATENTS
`PO Box I450
`Alexandria, Vilgim'z 22313-1450
`www.usplo.gov
`
`APPLICATION NUMBER
`
`F'L'NSAOTrEsmc) GRP ART UNIT
`
`FIL FEE REC'D
`
`ATTY.DOCKET.NO
`
`DRAWINGS
`
`TOT CLAIMS
`
`IND CLAIMS
`
`60/885,384
`
`01/17/2007
`
`100
`
`M-16796-V1
`US
`
`23
`
`32605
`MACPHERSON KWOK CHEN & HEID LLP
`2033 GATEWAY PLACE
`SUITE 400
`SAN JOSE, CA95110
`
`CONFIRMATION NO. 6151
`
`FILING RECEIPT
`
`Date Mailed: 02/01/2007
`
`It will not be examined for patentability and
`Receipt is acknowledged of this provisional Patent Application.
`will become abandoned not
`later than twelve months after its filing date. Be sure to provide the US.
`APPLICATION NUMBER, FILING DATE, NAME OF APPLICANT, and TITLE OF INVENTION when inquiring
`about this application. Fees transmitted by check or draft are subject to collection. Please verify the accuracy
`of the data presented on this receipt.
`If an error is noted on this Filing Receipt, please mail to the
`Commissioner for Patents P.O. Box 1450 Alexandria Va 22313-1450. Please provide a copy of this
`Filing Receipt with the changes noted thereon. If you received a "Notice to File Missing Parts" for this
`application, please submit any corrections to this Filing Receipt with your reply to the Notice. When
`the USPTO processes the reply to the Notice,
`the USPTO will generate another Filing Receipt
`incorporating the requested corrections (if appropriate).
`
`Applicant(s)
`
`Robert A. Lotter, Newport Beach, CA;
`Timothy S. Allard, Tustin, CA;
`
`Power of Attorney:
`Gregory Michelson--44940
`
`If Required, Foreign Filing License Granted: 01/31/2007
`
`The country code and number of your priority application, to be used for filing abroad under the Paris Convention, is
`U860/885,384
`
`Projected Publication Date: None, application is not eligible for pre-grant publication
`
`Non-Publication Request: No
`
`Early Publication Request: No
`
`** SMALL ENTITY **
`
`Title
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`PROTECTING YOUR INVENTION OUTSIDE THE UNITED STATES
`
`Since the rights granted by a US. patent extend only throughout the territory of the United States and have
`no effect in a foreign country, an inventor who wishes patent protection in another country must apply for a
`patent in a specific country or in regional patent offices. Applicants may wish to consider the filing of an
`
`BLACKBERRY EX. 1009, pg. 1
`
`BLACKBERRY EX. 1009, pg. 1
`
`

`

`international application under the Patent Cooperation Treaty (PCT). An international (PCT) application
`generally has the same effect as a regular national patent application in each PCT-member country. The
`PCT process simplifies the filing of patent applications on the same invention in member countries, but
`does not result in a grant of "an international patent" and does not eliminate the need of applicants to file
`additional documents and fees in countries where patent protection is desired.
`
`Almost every country has its own patent law, and a person desiring a patent in a particular country must
`make an application for patent in that country in accordance with its particular laws. Since the laws of many
`countries differ in various respects from the patent law of the United States, applicants are advised to seek
`guidance from specific foreign countries to ensure that patent rights are not lost prematurely.
`
`Applicants also are advised that in the case of inventions made in the United States, the Director of the
`USPTO must issue a license before applicants can apply for a patent in a foreign country. The filing of a US.
`patent application serves as a request for a foreign filing license. The application's filing receipt contains
`further information and guidance as to the status of applicant's license for foreign filing.
`
`Applicants may wish to consult the USPTO booklet, "General Information Concerning Patents" (specifically,
`the section entitled "Treaties and Foreign Patents") for more information on timeframes and deadlines for
`filing foreign patent applications. The guide is available either by contacting the USPTO Contact Center at
`800-786-9199, or it can be viewed on the USPTO website at
`http://www.uspto.gov/web/offices/pac/doc/generaI/index.html.
`
`For information on preventing theft of your intellectual property (patents, trademarks and copyrights), you
`may wish to consult the US. Government website, http://www.stopfakes.gov. Part of a Department of
`Commerce initiative, this website includes self-help "toolkits" giving innovators guidance on how to protect
`intellectual property in specific countries such as China, Korea and Mexico. For questions regarding patent
`enforcement issues, applicants may call the US. Government hotline at 1-866-999-HALT (1-866-999-4158).
`
`LICENSE FOR FOREIGN FILING UNDER
`
`Title 35, United States Code, Section 184
`
`Title 37, Code of Federal Regulations, 5.11 & 5.15
`
`m T
`
`if the phrase "IF REQUIRED, FOREIGN
`he applicant has been granted a license under 35 U.S.C. 184,
`FILING LICENSE GRANTED" followed by a date appears on this form. Such licenses are issued in all
`applications where the conditions for issuance of a license have been met, regardless of whether or not a
`license may be required as set forth in 37 CFR 5.15. The scope and limitations of this license are set forth in
`37 CFR 5.15(a) unless an earlier license has been issued under 37 CFR 5.15(b). The license is subject to
`revocation upon written notification. The date indicated is the effective date of the license, unless an earlier
`license of similar scope has been granted under 37 CFR 5.13 or 5.14.
`
`This license is to be retained by the licensee and may be used at any time on or after the effective date
`thereof unless it is revoked. This license is automatically transferred to any related applications(s) filed under
`37 CFR 1.53(d). This license is not retroactive.
`
`The grant of a license does not in any way lessen the responsibility of a licensee for the security of the
`subject matter as imposed by any Government contract or the provisions of existing laws relating to
`espionage and the national security or the export of technical data. Licensees should apprise themselves of
`current regulations especially with respect to certain countries, of other agencies, particularly the Office of
`Defense Trade Controls, Department of State (with respect to Arms, Munitions and Implements of War (22
`CFR 121-128)); the Bureau of Industry and Security, Department of Commerce (15 CFR parts 730-774); the
`Office of Foreign AssetsControl, Department of Treasury (31 CFR Parts 500+) and the Department of
`Energy.
`
`BLACKBERRY EX. 1009, pg. 2
`
`BLACKBERRY EX. 1009, pg. 2
`
`

`

`W N
`
`if the phrase "IF REQUIRED, FOREIGN
`o license under 35 U.S.C. 184 has been granted at this time,
`FILING LICENSE GRANTED" DOES NOT appear on this form. Applicant may still petition for a license
`under 37 CFR 5.12,
`if a license is desired before the expiration of 6 months from the filing date of the
`application.
`If 6 months has lapsed from the filing date of this application and the licensee has not received
`any indication of a secrecy order under 35 U.S.C. 181, the licensee may foreign file the application pursuant
`to 37 CFR 5.15(b).
`
`BLACKBERRY EX. 1009, pg. 3
`
`BLACKBERRY EX. 1009, pg. 3
`
`

`

`PTO/SB/1 6 (12—04)
`Approved for use through 07/31/2006. 0MB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53(c).
`
`Express Mail Label No.
`ELECTRONICALLY FlLED JANUARY 17, 2007
`
`Given Name (first and middle [if any])
`
`INVENTOR(S)
`Family Name or Surname
`
`Robert A.
`
`Letter
`
`Residence
`Cit and either State or Forei- n Count
`
`Newport Beach, CA
`
`
`
`
`
`
`
`Tustin, CA
`imothy S.
`separately numbered sheets attached hereto
`Additional inventors are being named on the
`'
`TITLE OF THE INVENTION (500 characters max):
`
`Allard
`
`
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`
`
`Direct all correspondence to:
`
`
` CORRESPONDENCE ADDRESS
`
`The address corresponding to Customer Number:
`
`32605
`
`OR
`
`
`
`
`
`Firm or
`lndIVIdual Name
`
`
`
`
`
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`
`I:I CD(s), Number of CDs E] Application Data Sheet. See 37 CFR 1.76
`
`Specification Number of Pages 21
`I:I Other (specify)
`
`
`
`
`
`
`23
`Drawing(s) Number of Sheets
`Application Size Fee: If the specification and drawings exceed 100 sheets of paper. the application size fee due is $250 ($125 for
`small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41 (a)(1)(G) and 37 CFR 1.16(s).
`
`METHOD OF PAYMENT OF FILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`TOTAL FEE AMOUNT $)
`100.00
`
`Applicant claims small entity status. See 37 CFR 1.27.
`I::I A check or money order is enclosed to cover the filing fee and application size fee (if applicable).
`I:I Payment by credit card. Form PTO—2038 is attached
`The Director is hereby authorized to charge the filing fee and application size fee (if applicable) or credit any overpayment to Deposit
`50-2257
`Account Number:
`
`The invention was made by an agency of the United States Government or under a contract with an agency of the United States Government.
`No.
`
`A duplicative copy of this form is enclosed for fee processing.
`
`
`
`
`
`
`
`
`I: Yes, the name of the US. Government agency and the Government contract number are:
`
`
`
`I”! Z/fl 2
`Date
`SIGNATURE
`
`REGISTRATION NO. 44 940
`TYPED or PRINTED NAMGreg J- Michelson
`
`(if appropriate)
`
`TELEPHONE 949 752-7040 Docket Number:
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments
`on the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, US. Patent
`and Trademark Office. US. Department of Commerce. Po. Box 1450. Alexandria. VA 22313—1450. DO NOT SEND FEES OR COMPLETED FORMS To THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`If you need assistance in completing the form, call 1-800—PTO—9199 and select option 2.
`
`
`
`BLACKBERRY EX. 1009, pg. 4
`
`BLACKBERRY EX. 1009, pg. 4
`
`

`

`M—16796-V1 US
`
`ELECTRONICALLY FILED
`
`JANUARY 17, 2007
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`Robert A. Lotter & Timothy S. Allard
`
`TECHNICAL FIELD
`
`The present invention relates generally to communication
`
`systems and, more particularly,
`
`to mobile communication devices
`
`and systems and methods for monitoring the communication
`
`devices.
`
`BACKGROUND
`
`A 2006 report from the National Center for Missing and
`
`Exploited Children showed that more parents and guardians were
`
`using filtering, blocking, and monitoring software on the home
`
`computers their children used most often, but even so youth
`
`exposure to unwanted sexual material increased substantially
`
`from the report conducted 5 years earlier.
`
`In the study,
`
`34% of
`
`the youth communicated with people online that they didn’t know.
`
`1 in 7 received unwanted sexual solicitations or approaches in
`
`the past year.
`
`56% of the youths who received an unwanted
`
`solicitation did not report the incident to anyone. Close to
`
`one third (31%) of the solicitations were aggressive meaning the
`
`solicitors made or attempted to contact the youth offline. Of
`
`the aggressive solicitations,
`
`34% called the youth on the
`
`telephone.
`
`The report recommends broader efforts to reduce the risks
`
`to youth yet it is still limited to Internet access from within
`
`the home. Approximately 25% of all teens and pre—teens in the
`
`U.S. carry a cell phone and this number is expected to grow
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 5
`
`BLACKBERRY EX. 1009, pg. 5
`
`

`

`M-16796-V1 US
`
`significantly over the next several years. All of the Internet
`
`services, such as email,
`
`instant messaging,
`
`text messaging,
`
`etc., mentioned in the NCMEC study are also available on the
`
`child’s cell phone.
`
`In addition,
`
`the child is more likely to
`
`assume his cell phone activities are private when away from the
`
`monitoring software installed on the home computer. Currently,
`
`there is no means for parents to monitor their child’s Internet
`
`and cell phone activities outside of the home.
`
`As a result there is a need for systems and methods that
`
`allow parents, guardians, and employers to effectively monitor
`
`these activities as well as for example provide additional
`
`security,
`
`location tracking and prosecution against unlawful
`
`predator activities.
`
`SUMMARY
`
`Systems, methods, and program products are disclosed,
`
`in
`
`accordance with one or more embodiments of the present
`
`invention, for monitoring the communications to and from a
`
`wireless data device.
`
`For example in accordance with an
`
`embodiment, each of the data services on a wireless device such
`
`as a cell phone, SmartPhone, or PDA can be monitored against the
`
`permissions stored in a central repository. Data services may
`
`include all forms of communications between the device and a
`
`third party including cellular voice calls, SMS text messages,
`
`email,
`
`instant messaging sessions and the applications used by
`
`the data services including the address book, calendar, and
`
`tasks maintained on the wireless device.
`
`In accordance with
`
`some embodiments, monitoring may be performed for a multitude of
`
`communication protocols for sending or receiving data including
`
`cellular networks, PIN to PIN, Wi—Fi, Bluetooth, Personal Area
`
`Networks, Local Area Networks, and Public Networks.
`
`According to some embodiments of the present
`
`invention, a
`
`user may specify the permissions for each data service
`
`10
`
`15
`
`20
`
`25
`
`30
`
`2
`
`BLACKBERRY EX. 1009, pg. 6
`
`BLACKBERRY EX. 1009, pg. 6
`
`

`

`M-16796-V1 US
`
`associated with a wireless device.
`
`The user may specify whether
`
`use of the service is allowed or denied for any identity that is
`
`not currently in the address book of the device.
`
`In addition to
`
`the forensic information collected and stored regarding the
`
`5
`
`communication transaction, an embodiment of the present
`
`invention collects, stores and analyzes the contextual
`
`information contained within the data including text, files,
`
`pictures, audio and all manner of digital and analog content
`
`transmitted between a mobile communications device and a third
`
`10
`
`party.
`
`In accordance with some embodiments of the present
`
`invention, systems, methods, and program products are disclosed
`
`that alerts the user whenever an unauthorized activity is
`
`detected.
`
`For example,
`
`the user may specify one or more methods
`
`15
`
`of notification including email,
`
`SMS text message, voice call or
`
`any other publicly accepted machine to machine communications
`
`protocol to alert the user whenever an unauthorized activity is
`
`detected.
`
`In general
`
`in accordance with some embodiments,
`
`the
`
`type of unauthorized activity being monitored may include any
`
`20
`
`form of information transmission and/or reception (e.g., of
`
`audio, photo, video,
`
`textual data, or multimedia information) or
`
`any type of change to the wireless data device. Similarly in
`
`accordance with some embodiments,
`
`the user notification of
`
`unauthorized activity may be provided in any form of
`
`25
`
`communication,
`
`including for example audio, photo, video,
`
`textual data, or multimedia information.
`
`More specifically in accordance with one or more
`
`embodiments of the present invention, a client application
`
`installed on a mobile communications device, such as a cell
`
`30
`
`phone or Personal Digital Assistant
`
`(PDA),
`
`transmits detailed
`
`device usage information using a wireless data connection from
`
`the device to a central repository accessible from a network
`
`(e 9., Internet).
`
`For example, monitoring of device usage may
`
`BLACKBERRY EX. 1009, pg. 7
`
`BLACKBERRY EX. 1009, pg. 7
`
`

`

`M-16796-Vl US
`
`include such things as inbound or outbound phone calls,
`
`inbound
`
`or outbound SMS Text Messages,
`
`inbound or outbound Instant
`
`Messages, Web Browser Access, Adds, Modifications or Deletions
`
`to the Address Book, Adds, Modifications or Deletions to
`
`Calendar Appointments, Adds, Modifications or Deletions to
`
`Tasks, and Adds, Modifications or Deletions of the installed
`
`applications on the device.
`
`In addition to the client application in accordance with
`
`one or more embodiments of the present
`
`invention, a web-based
`
`10
`
`monitoring application, which is controlled by an administrative
`
`user such as a parent or manager, monitors the contents of the
`
`central repository.
`
`For example, based on rules selected by the
`
`administrative user,
`
`the device usage is allowed, denied, or an
`
`alert is sent
`
`to the administrative user notifying them of an
`
`15
`
`unauthorized event.
`
`In accordance with some embodiments of the
`
`present
`
`invention, existing location services (e.g., GPS, cell—
`
`based, or network—based location applications) may be employed
`
`to include the monitoring and alerting of the physical location
`
`of the device.
`
`20
`
`25
`
`3O
`
`A more complete understanding of embodiments of the present
`
`invention will be afforded to those skilled in the art, as well
`
`as a realization of additional advantages thereof, by a
`
`consideration of the following detailed description of one or
`
`more embodiments. Reference will be made to the appended sheets
`
`of drawings that will first be described briefly.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Fig.
`
`l is a block diagram of a system including a Data
`
`Monitor tool to monitor the activities on a wireless device, a
`
`Data Gateway for collecting the activity on a wireless device,
`
`BLACKBERRY EX. 1009, pg. 8
`
`BLACKBERRY EX. 1009, pg. 8
`
`

`

`M-16796-V1 US
`
`and an Alert Monitor in accordance with an embodiment of the
`
`present invention.
`
`Fig.
`
`2 is a block diagram of a system including a
`
`monitoring tool associated with a mobile communications device
`
`in accordance with an embodiment of the present
`
`invention.
`
`Figs.
`
`3A—3O illustrate exemplary flowcharts of the
`
`monitoring and collecting (logging) of event activity in Fig.
`
`l
`
`for each of the data services of Fig.
`
`2 in accordance with one
`
`or more embodiments of the present
`
`invention.
`
`10
`
`Fig.
`
`4 is an exemplary table representation of the Activity
`
`Log database of Fig.
`
`l in accordance with an embodiment of the
`
`present invention.
`
`Fig.
`
`5 is an exemplary table representation of the
`
`Permissions database of Fig.
`
`1 in accordance with an embodiment
`
`15
`
`of the present invention.
`
`Figs.
`
`6A—6B illustrate exemplary flowcharts where the data
`
`service on a wireless device is processed or blocked based on
`
`the contextual information being passed through the data service
`
`in accordance with an embodiment of the present
`
`invention.
`
`20
`
`25
`
`Figs.
`
`7A—7B illustrate exemplary flowcharts of the Alert
`
`Monitor tool of Fig.
`
`l in accordance with an embodiment of the
`
`present invention.
`
`Embodiments of the present
`
`invention and their advantages
`
`are best understood by referring to the detailed description
`
`that follows.
`
`It should be appreciated that like reference
`
`numerals are used to identify like elements illustrated in one
`
`or more of the figures.
`
`DETAILED DESCRIPTION
`
`BLACKBERRY EX. 1009, pg. 9
`
`BLACKBERRY EX. 1009, pg. 9
`
`

`

`M-16796-Vl US
`
`Fig.
`
`1 illustrates a Data Gateway program tool 30 and
`
`wireless devices 10, 12, and 14 representing users whose
`
`activities are monitored according to an embodiment of the
`
`present
`
`invention.
`
`Each of the devices 10, 12 and 14 may
`
`include a respective Data Monitoring program tool 11, 13, and 15
`
`which communicates with the Data Gateway 30. Data services used
`
`on the wireless devices 10, 12 and 14 are monitored for activity
`
`by their respective Data Monitoring program tool 11, 13, and 15
`
`which communicates to the Data Gateway 30 via a wireless data
`
`connection such as a cellular service provider 16.
`
`Alternatively,
`
`the devices 10, 12, and 14 may send their
`
`activity information through any available communications
`
`network including PIN to PIN, Wi-Fi, Bluetooth, Personal Area
`
`Networks, Local Area Networks, and Public Networks such as
`
`cellular networks, satellite networks and the Internet.
`
`As described in more detail below,
`
`the Data Gateway 3O
`
`maintains an Activity Log 40 database in Data Center 17.
`
`The
`
`Activity Log 40 contains an entry for each use of_a data service
`
`on wireless devices 10, 12, and 14. Also described in more
`
`detail below,
`
`the Data Center 17 also contains a Permissions 50
`
`database which includes the wireless devices to be monitored and
`
`the rules to allow, deny or alert of data service activity
`
`occurring on the wireless devices being monitored.
`
`The Alert Monitor 70 program waits for new entries to be
`
`made into the Activity Log 40.
`
`Each new entry is checked
`
`against the Permissions 50 database. Whenever unauthorized
`
`activity is detected,
`
`the Alert Monitor 70 sends an alert to one
`
`or more users via the Data Gateway 30, such as for example to a
`
`cell phone 18 using SMS Text Messaging or an Email 19 account.
`
`The preferred method of notification is maintained in the
`
`Permissions 50 database which can support many forms of data
`
`communications including voice messages,
`
`SMS Text Messages,
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 10
`
`BLACKBERRY EX. 1009, pg. 10
`
`

`

`M-16796-V1 US
`
`email or any other publicly accepted machine to machine
`
`communications protocol.
`
`Fig.
`
`2 illustrates in more detail a Data Monitor 21 program
`
`tool which captures the data service activity on a Mobile
`
`Communications Device 20 in accordance with an embodiment of the
`
`present
`
`invention.
`
`For example, data monitor 21 program tool
`
`may be an exemplary representation of data monitor 11, 13,
`
`and/or 15 and similarly mobile communications device 20 may be
`
`an exemplary representation of device 10, 12, and/or 14. Each
`
`10
`
`Mobile Communications Device 20 contains one or more
`
`applications that use a well known communication protocol to
`
`send or receive digital data packets (communications) or provide
`
`supporting applications to facilitate the communications process
`
`such as an Address Book which contains an email address used to
`
`15
`
`send an email communication.
`
`In accordance with an embodiment
`
`of the present invention,
`
`these communication applications and
`
`their supporting applications are defined as a data service.
`
`These data services may include one or more of a Phone
`
`Application 22 for sending or receiving voice communications, an
`
`Email Application 23 for sending or receiving email
`
`communications, a SMS Text Application 24 for sending or
`
`receiving SMS text messages, an Instant Messaging Application 25
`
`for sending or receiving instant messages, a Web Browser
`
`Application 26 for sending or receiving HTTP requests and
`
`responses, an Address Book 27 for storing contact
`
`information, a
`
`Calendar/Task Application 28 for storing appointment
`
`information, an Installation Application 29 for storing
`
`information regarding the installed applications on the device,
`
`and a Photo/Video/Multimedia Application 31 for sending or
`
`receiving multimedia files. As described in more detail below,
`
`the Data Monitor 21 program tool monitors the inbound and
`
`outbound activity for each of these data services and sends a
`
`detailed log of these activities to a central repository using a
`
`2O
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 11
`
`BLACKBERRY EX. 1009, pg. 11
`
`

`

`M-16796-Vl US
`
`Cellular Service Provider 16. Alternatively,
`
`the Data Monitor
`
`21 may send their activity information through any available
`
`communications network, such as the Internet, a company network,
`
`or public cellular network.
`
`As would be understood by one skilled in the art,
`
`embodiments of the present invention provide certain advantages
`
`over conventional approaches.
`
`For example, a conventional
`
`approach may simply provide parental controls which monitor and
`
`block Internet and email access from a desktop and which
`
`primarily prevent access to unwanted content or block the
`
`transmission of personally identifiable information. Blocking
`
`usually results in the child finding an unmonitored computer to
`
`access the blocked content.
`
`For example, most gaming consoles
`
`today are enabled with Internet access and do not inherently
`
`include parental controls. Parental control applications
`
`generally do not log the blocked content and none pro—actively
`
`notify the parent or administrative user of the event.
`
`Additionally, none are capable of.monitoring a cell phone or
`
`other mobile communications device which today have comparable
`
`communication capabilities as a desktop computer.
`
`As another example of a conventional approach, child and
`
`employee monitoring of geographic location may be provided from
`
`a cell phone, but this approach typically requires an active
`
`search by the parent or manager to locate the device.
`
`Perimeter
`
`boundaries or virtual fencing could be deployed using existing
`
`location technology, but again all of these location approaches
`
`are after—the—fact of direct contact with a predator or after a
`
`potentially life threatening event is in progress.
`
`In contrast
`
`in accordance with one or more embodiments of the present
`
`invention, systems and methods are disclosed for example to
`
`detect the potentially life threatening event before physical
`
`contact is made with the user of a monitored wireless device.
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 12
`
`BLACKBERRY EX. 1009, pg. 12
`
`

`

`M-16796-V1 US
`
`For example, Fig. 3A illustrates a data flowchart for the
`
`capturing of an inbound voice call using the Phone Application
`
`22 on a Mobile Communications Device 20 in accordance with an
`
`embodiment of the present
`
`invention.
`
`Initially,
`
`in step 110, a
`
`5
`
`phone call is received on the Mobile Communications Device 20.
`
`In step 120,
`
`the Data Monitor 21 recognizes that the Phone
`
`Application 22 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`10
`
`Device 20,
`
`the start and end date/time stamp of the call, and
`
`the originating phone number. Once the call has been terminated
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`one or more data packets to the central repository located in
`
`15
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`20
`
`25
`
`3O
`
`Fig.
`
`3B illustrates a data flowchart for the capturing of
`
`an outbound voice call using the Phone Application 22 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 111, a phone call
`
`is placed from the Mobile Communications Device 20.
`
`In step
`
`121,
`
`the Data Monitor 21 recognizes that the Phone Application
`
`22 data service has been initiated and begins to capture
`
`information regarding the use of the data service including the
`
`unique Device ID of the Mobile Communications Device 20,
`
`the
`
`start and end date/time stamp of the call, and the destination
`
`phone number. Once the call has been terminated (Step 130),
`
`the
`
`Data Monitor 21 formats a data packet which includes the
`
`collected information (Activity Record) and sends one or more
`
`data packets to the central repository located in Data Center
`
`BLACKBERRY EX. 1009, pg. 13
`
`BLACKBERRY EX. 1009, pg. 13
`
`

`

`M-16796-V1 US
`
`17.
`
`In step 140,
`
`the Data Gateway 30 located in the Data
`
`Center 17 receives the data packet(s) and then writes the data
`
`packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`Fig. 3C illustrates a data flowchart for the capturing of
`
`an inbound email message using the Email Application 23 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 112, an email
`
`message is received on the Mobile Communications Device 20.
`
`In
`
`step 122,
`
`the Data Monitor 21 recognizes that the Email
`
`Application 23 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`originating email address. Once the message has been received
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`one or more data packets to the central repository located in
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`Fig.
`
`3D illustrates a data flowchart for the capturing of
`
`an outbound email message using the Email Application 23 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 113, an email
`
`message is sent from the Mobile Communications Device 20.
`
`In
`
`step 123,
`
`the Data Monitor 21 recognizes that the Email
`
`Application 23 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`10
`
`BLACKBERRY EX. 1009, pg. 14
`
`BLACKBERRY EX. 1009, pg. 14
`
`

`

`M-16796-Vl US
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`destination email address. Once the message has been sent
`
`(Step
`
`130),
`
`the Data Monitor 21 formats a data packet which includes
`
`the collected information (Activity Record) and sends one or
`
`more data packets to the central repository located in Data
`
`Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in the
`
`Data Center 17 receives the data packet(s) and then writes the
`
`data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`10
`
`Device 20.
`
`Fig. 3E illustrates a data flowchart for the capturing of
`
`an inbound text message using the SMS Text Application 24 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 114, a text
`
`message is received on the Mobile Communications Device 20.
`
`In
`
`step 124,
`
`the Data Monitor 21 recognizes that the SMS Text
`
`Application 24 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`originating phone number. Once the message has been received
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`15
`
`20
`
`one or more data packets to the central repository located in
`
`25
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`3O
`
`Fig. 3F illustrates a data flowchart for the capturing of
`
`an outbound text message using the SMS Text Application 24 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 115, a text
`
`11
`
`BLACKBERRY EX. 1009, pg. 15
`
`BLACKBERRY EX. 1009, pg. 15
`
`

`

`M—16796—V1 US
`
`message is sent
`
`from the Mobile Communications Device 20.
`
`In
`
`step 125,
`
`the Data Monitor 21 recognizes that the SMS Text
`
`Application 24 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`destination phone number. Once the message has been sent
`
`(Step
`
`130),
`
`the Data Monitor 21 formats a data packet which includes
`
`the collected

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket