`
`
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`AddIESSI COMLHSSIOIVER FOR PATENTS
`PO Box I450
`Alexandria, Vilgim'z 22313-1450
`www.usplo.gov
`
`APPLICATION NUMBER
`
`F'L'NSAOTrEsmc) GRP ART UNIT
`
`FIL FEE REC'D
`
`ATTY.DOCKET.NO
`
`DRAWINGS
`
`TOT CLAIMS
`
`IND CLAIMS
`
`60/885,384
`
`01/17/2007
`
`100
`
`M-16796-V1
`US
`
`23
`
`32605
`MACPHERSON KWOK CHEN & HEID LLP
`2033 GATEWAY PLACE
`SUITE 400
`SAN JOSE, CA95110
`
`CONFIRMATION NO. 6151
`
`FILING RECEIPT
`
`Date Mailed: 02/01/2007
`
`It will not be examined for patentability and
`Receipt is acknowledged of this provisional Patent Application.
`will become abandoned not
`later than twelve months after its filing date. Be sure to provide the US.
`APPLICATION NUMBER, FILING DATE, NAME OF APPLICANT, and TITLE OF INVENTION when inquiring
`about this application. Fees transmitted by check or draft are subject to collection. Please verify the accuracy
`of the data presented on this receipt.
`If an error is noted on this Filing Receipt, please mail to the
`Commissioner for Patents P.O. Box 1450 Alexandria Va 22313-1450. Please provide a copy of this
`Filing Receipt with the changes noted thereon. If you received a "Notice to File Missing Parts" for this
`application, please submit any corrections to this Filing Receipt with your reply to the Notice. When
`the USPTO processes the reply to the Notice,
`the USPTO will generate another Filing Receipt
`incorporating the requested corrections (if appropriate).
`
`Applicant(s)
`
`Robert A. Lotter, Newport Beach, CA;
`Timothy S. Allard, Tustin, CA;
`
`Power of Attorney:
`Gregory Michelson--44940
`
`If Required, Foreign Filing License Granted: 01/31/2007
`
`The country code and number of your priority application, to be used for filing abroad under the Paris Convention, is
`U860/885,384
`
`Projected Publication Date: None, application is not eligible for pre-grant publication
`
`Non-Publication Request: No
`
`Early Publication Request: No
`
`** SMALL ENTITY **
`
`Title
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`PROTECTING YOUR INVENTION OUTSIDE THE UNITED STATES
`
`Since the rights granted by a US. patent extend only throughout the territory of the United States and have
`no effect in a foreign country, an inventor who wishes patent protection in another country must apply for a
`patent in a specific country or in regional patent offices. Applicants may wish to consider the filing of an
`
`BLACKBERRY EX. 1009, pg. 1
`
`BLACKBERRY EX. 1009, pg. 1
`
`
`
`international application under the Patent Cooperation Treaty (PCT). An international (PCT) application
`generally has the same effect as a regular national patent application in each PCT-member country. The
`PCT process simplifies the filing of patent applications on the same invention in member countries, but
`does not result in a grant of "an international patent" and does not eliminate the need of applicants to file
`additional documents and fees in countries where patent protection is desired.
`
`Almost every country has its own patent law, and a person desiring a patent in a particular country must
`make an application for patent in that country in accordance with its particular laws. Since the laws of many
`countries differ in various respects from the patent law of the United States, applicants are advised to seek
`guidance from specific foreign countries to ensure that patent rights are not lost prematurely.
`
`Applicants also are advised that in the case of inventions made in the United States, the Director of the
`USPTO must issue a license before applicants can apply for a patent in a foreign country. The filing of a US.
`patent application serves as a request for a foreign filing license. The application's filing receipt contains
`further information and guidance as to the status of applicant's license for foreign filing.
`
`Applicants may wish to consult the USPTO booklet, "General Information Concerning Patents" (specifically,
`the section entitled "Treaties and Foreign Patents") for more information on timeframes and deadlines for
`filing foreign patent applications. The guide is available either by contacting the USPTO Contact Center at
`800-786-9199, or it can be viewed on the USPTO website at
`http://www.uspto.gov/web/offices/pac/doc/generaI/index.html.
`
`For information on preventing theft of your intellectual property (patents, trademarks and copyrights), you
`may wish to consult the US. Government website, http://www.stopfakes.gov. Part of a Department of
`Commerce initiative, this website includes self-help "toolkits" giving innovators guidance on how to protect
`intellectual property in specific countries such as China, Korea and Mexico. For questions regarding patent
`enforcement issues, applicants may call the US. Government hotline at 1-866-999-HALT (1-866-999-4158).
`
`LICENSE FOR FOREIGN FILING UNDER
`
`Title 35, United States Code, Section 184
`
`Title 37, Code of Federal Regulations, 5.11 & 5.15
`
`m T
`
`if the phrase "IF REQUIRED, FOREIGN
`he applicant has been granted a license under 35 U.S.C. 184,
`FILING LICENSE GRANTED" followed by a date appears on this form. Such licenses are issued in all
`applications where the conditions for issuance of a license have been met, regardless of whether or not a
`license may be required as set forth in 37 CFR 5.15. The scope and limitations of this license are set forth in
`37 CFR 5.15(a) unless an earlier license has been issued under 37 CFR 5.15(b). The license is subject to
`revocation upon written notification. The date indicated is the effective date of the license, unless an earlier
`license of similar scope has been granted under 37 CFR 5.13 or 5.14.
`
`This license is to be retained by the licensee and may be used at any time on or after the effective date
`thereof unless it is revoked. This license is automatically transferred to any related applications(s) filed under
`37 CFR 1.53(d). This license is not retroactive.
`
`The grant of a license does not in any way lessen the responsibility of a licensee for the security of the
`subject matter as imposed by any Government contract or the provisions of existing laws relating to
`espionage and the national security or the export of technical data. Licensees should apprise themselves of
`current regulations especially with respect to certain countries, of other agencies, particularly the Office of
`Defense Trade Controls, Department of State (with respect to Arms, Munitions and Implements of War (22
`CFR 121-128)); the Bureau of Industry and Security, Department of Commerce (15 CFR parts 730-774); the
`Office of Foreign AssetsControl, Department of Treasury (31 CFR Parts 500+) and the Department of
`Energy.
`
`BLACKBERRY EX. 1009, pg. 2
`
`BLACKBERRY EX. 1009, pg. 2
`
`
`
`W N
`
`if the phrase "IF REQUIRED, FOREIGN
`o license under 35 U.S.C. 184 has been granted at this time,
`FILING LICENSE GRANTED" DOES NOT appear on this form. Applicant may still petition for a license
`under 37 CFR 5.12,
`if a license is desired before the expiration of 6 months from the filing date of the
`application.
`If 6 months has lapsed from the filing date of this application and the licensee has not received
`any indication of a secrecy order under 35 U.S.C. 181, the licensee may foreign file the application pursuant
`to 37 CFR 5.15(b).
`
`BLACKBERRY EX. 1009, pg. 3
`
`BLACKBERRY EX. 1009, pg. 3
`
`
`
`PTO/SB/1 6 (12—04)
`Approved for use through 07/31/2006. 0MB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53(c).
`
`Express Mail Label No.
`ELECTRONICALLY FlLED JANUARY 17, 2007
`
`Given Name (first and middle [if any])
`
`INVENTOR(S)
`Family Name or Surname
`
`Robert A.
`
`Letter
`
`Residence
`Cit and either State or Forei- n Count
`
`Newport Beach, CA
`
`
`
`
`
`
`
`Tustin, CA
`imothy S.
`separately numbered sheets attached hereto
`Additional inventors are being named on the
`'
`TITLE OF THE INVENTION (500 characters max):
`
`Allard
`
`
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`
`
`Direct all correspondence to:
`
`
` CORRESPONDENCE ADDRESS
`
`The address corresponding to Customer Number:
`
`32605
`
`OR
`
`
`
`
`
`Firm or
`lndIVIdual Name
`
`
`
`
`
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`
`I:I CD(s), Number of CDs E] Application Data Sheet. See 37 CFR 1.76
`
`Specification Number of Pages 21
`I:I Other (specify)
`
`
`
`
`
`
`23
`Drawing(s) Number of Sheets
`Application Size Fee: If the specification and drawings exceed 100 sheets of paper. the application size fee due is $250 ($125 for
`small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41 (a)(1)(G) and 37 CFR 1.16(s).
`
`METHOD OF PAYMENT OF FILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`TOTAL FEE AMOUNT $)
`100.00
`
`Applicant claims small entity status. See 37 CFR 1.27.
`I::I A check or money order is enclosed to cover the filing fee and application size fee (if applicable).
`I:I Payment by credit card. Form PTO—2038 is attached
`The Director is hereby authorized to charge the filing fee and application size fee (if applicable) or credit any overpayment to Deposit
`50-2257
`Account Number:
`
`The invention was made by an agency of the United States Government or under a contract with an agency of the United States Government.
`No.
`
`A duplicative copy of this form is enclosed for fee processing.
`
`
`
`
`
`
`
`
`I: Yes, the name of the US. Government agency and the Government contract number are:
`
`
`
`I”! Z/fl 2
`Date
`SIGNATURE
`
`REGISTRATION NO. 44 940
`TYPED or PRINTED NAMGreg J- Michelson
`
`(if appropriate)
`
`TELEPHONE 949 752-7040 Docket Number:
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments
`on the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, US. Patent
`and Trademark Office. US. Department of Commerce. Po. Box 1450. Alexandria. VA 22313—1450. DO NOT SEND FEES OR COMPLETED FORMS To THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`If you need assistance in completing the form, call 1-800—PTO—9199 and select option 2.
`
`
`
`BLACKBERRY EX. 1009, pg. 4
`
`BLACKBERRY EX. 1009, pg. 4
`
`
`
`M—16796-V1 US
`
`ELECTRONICALLY FILED
`
`JANUARY 17, 2007
`
`MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
`
`Robert A. Lotter & Timothy S. Allard
`
`TECHNICAL FIELD
`
`The present invention relates generally to communication
`
`systems and, more particularly,
`
`to mobile communication devices
`
`and systems and methods for monitoring the communication
`
`devices.
`
`BACKGROUND
`
`A 2006 report from the National Center for Missing and
`
`Exploited Children showed that more parents and guardians were
`
`using filtering, blocking, and monitoring software on the home
`
`computers their children used most often, but even so youth
`
`exposure to unwanted sexual material increased substantially
`
`from the report conducted 5 years earlier.
`
`In the study,
`
`34% of
`
`the youth communicated with people online that they didn’t know.
`
`1 in 7 received unwanted sexual solicitations or approaches in
`
`the past year.
`
`56% of the youths who received an unwanted
`
`solicitation did not report the incident to anyone. Close to
`
`one third (31%) of the solicitations were aggressive meaning the
`
`solicitors made or attempted to contact the youth offline. Of
`
`the aggressive solicitations,
`
`34% called the youth on the
`
`telephone.
`
`The report recommends broader efforts to reduce the risks
`
`to youth yet it is still limited to Internet access from within
`
`the home. Approximately 25% of all teens and pre—teens in the
`
`U.S. carry a cell phone and this number is expected to grow
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 5
`
`BLACKBERRY EX. 1009, pg. 5
`
`
`
`M-16796-V1 US
`
`significantly over the next several years. All of the Internet
`
`services, such as email,
`
`instant messaging,
`
`text messaging,
`
`etc., mentioned in the NCMEC study are also available on the
`
`child’s cell phone.
`
`In addition,
`
`the child is more likely to
`
`assume his cell phone activities are private when away from the
`
`monitoring software installed on the home computer. Currently,
`
`there is no means for parents to monitor their child’s Internet
`
`and cell phone activities outside of the home.
`
`As a result there is a need for systems and methods that
`
`allow parents, guardians, and employers to effectively monitor
`
`these activities as well as for example provide additional
`
`security,
`
`location tracking and prosecution against unlawful
`
`predator activities.
`
`SUMMARY
`
`Systems, methods, and program products are disclosed,
`
`in
`
`accordance with one or more embodiments of the present
`
`invention, for monitoring the communications to and from a
`
`wireless data device.
`
`For example in accordance with an
`
`embodiment, each of the data services on a wireless device such
`
`as a cell phone, SmartPhone, or PDA can be monitored against the
`
`permissions stored in a central repository. Data services may
`
`include all forms of communications between the device and a
`
`third party including cellular voice calls, SMS text messages,
`
`email,
`
`instant messaging sessions and the applications used by
`
`the data services including the address book, calendar, and
`
`tasks maintained on the wireless device.
`
`In accordance with
`
`some embodiments, monitoring may be performed for a multitude of
`
`communication protocols for sending or receiving data including
`
`cellular networks, PIN to PIN, Wi—Fi, Bluetooth, Personal Area
`
`Networks, Local Area Networks, and Public Networks.
`
`According to some embodiments of the present
`
`invention, a
`
`user may specify the permissions for each data service
`
`10
`
`15
`
`20
`
`25
`
`30
`
`2
`
`BLACKBERRY EX. 1009, pg. 6
`
`BLACKBERRY EX. 1009, pg. 6
`
`
`
`M-16796-V1 US
`
`associated with a wireless device.
`
`The user may specify whether
`
`use of the service is allowed or denied for any identity that is
`
`not currently in the address book of the device.
`
`In addition to
`
`the forensic information collected and stored regarding the
`
`5
`
`communication transaction, an embodiment of the present
`
`invention collects, stores and analyzes the contextual
`
`information contained within the data including text, files,
`
`pictures, audio and all manner of digital and analog content
`
`transmitted between a mobile communications device and a third
`
`10
`
`party.
`
`In accordance with some embodiments of the present
`
`invention, systems, methods, and program products are disclosed
`
`that alerts the user whenever an unauthorized activity is
`
`detected.
`
`For example,
`
`the user may specify one or more methods
`
`15
`
`of notification including email,
`
`SMS text message, voice call or
`
`any other publicly accepted machine to machine communications
`
`protocol to alert the user whenever an unauthorized activity is
`
`detected.
`
`In general
`
`in accordance with some embodiments,
`
`the
`
`type of unauthorized activity being monitored may include any
`
`20
`
`form of information transmission and/or reception (e.g., of
`
`audio, photo, video,
`
`textual data, or multimedia information) or
`
`any type of change to the wireless data device. Similarly in
`
`accordance with some embodiments,
`
`the user notification of
`
`unauthorized activity may be provided in any form of
`
`25
`
`communication,
`
`including for example audio, photo, video,
`
`textual data, or multimedia information.
`
`More specifically in accordance with one or more
`
`embodiments of the present invention, a client application
`
`installed on a mobile communications device, such as a cell
`
`30
`
`phone or Personal Digital Assistant
`
`(PDA),
`
`transmits detailed
`
`device usage information using a wireless data connection from
`
`the device to a central repository accessible from a network
`
`(e 9., Internet).
`
`For example, monitoring of device usage may
`
`BLACKBERRY EX. 1009, pg. 7
`
`BLACKBERRY EX. 1009, pg. 7
`
`
`
`M-16796-Vl US
`
`include such things as inbound or outbound phone calls,
`
`inbound
`
`or outbound SMS Text Messages,
`
`inbound or outbound Instant
`
`Messages, Web Browser Access, Adds, Modifications or Deletions
`
`to the Address Book, Adds, Modifications or Deletions to
`
`Calendar Appointments, Adds, Modifications or Deletions to
`
`Tasks, and Adds, Modifications or Deletions of the installed
`
`applications on the device.
`
`In addition to the client application in accordance with
`
`one or more embodiments of the present
`
`invention, a web-based
`
`10
`
`monitoring application, which is controlled by an administrative
`
`user such as a parent or manager, monitors the contents of the
`
`central repository.
`
`For example, based on rules selected by the
`
`administrative user,
`
`the device usage is allowed, denied, or an
`
`alert is sent
`
`to the administrative user notifying them of an
`
`15
`
`unauthorized event.
`
`In accordance with some embodiments of the
`
`present
`
`invention, existing location services (e.g., GPS, cell—
`
`based, or network—based location applications) may be employed
`
`to include the monitoring and alerting of the physical location
`
`of the device.
`
`20
`
`25
`
`3O
`
`A more complete understanding of embodiments of the present
`
`invention will be afforded to those skilled in the art, as well
`
`as a realization of additional advantages thereof, by a
`
`consideration of the following detailed description of one or
`
`more embodiments. Reference will be made to the appended sheets
`
`of drawings that will first be described briefly.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Fig.
`
`l is a block diagram of a system including a Data
`
`Monitor tool to monitor the activities on a wireless device, a
`
`Data Gateway for collecting the activity on a wireless device,
`
`BLACKBERRY EX. 1009, pg. 8
`
`BLACKBERRY EX. 1009, pg. 8
`
`
`
`M-16796-V1 US
`
`and an Alert Monitor in accordance with an embodiment of the
`
`present invention.
`
`Fig.
`
`2 is a block diagram of a system including a
`
`monitoring tool associated with a mobile communications device
`
`in accordance with an embodiment of the present
`
`invention.
`
`Figs.
`
`3A—3O illustrate exemplary flowcharts of the
`
`monitoring and collecting (logging) of event activity in Fig.
`
`l
`
`for each of the data services of Fig.
`
`2 in accordance with one
`
`or more embodiments of the present
`
`invention.
`
`10
`
`Fig.
`
`4 is an exemplary table representation of the Activity
`
`Log database of Fig.
`
`l in accordance with an embodiment of the
`
`present invention.
`
`Fig.
`
`5 is an exemplary table representation of the
`
`Permissions database of Fig.
`
`1 in accordance with an embodiment
`
`15
`
`of the present invention.
`
`Figs.
`
`6A—6B illustrate exemplary flowcharts where the data
`
`service on a wireless device is processed or blocked based on
`
`the contextual information being passed through the data service
`
`in accordance with an embodiment of the present
`
`invention.
`
`20
`
`25
`
`Figs.
`
`7A—7B illustrate exemplary flowcharts of the Alert
`
`Monitor tool of Fig.
`
`l in accordance with an embodiment of the
`
`present invention.
`
`Embodiments of the present
`
`invention and their advantages
`
`are best understood by referring to the detailed description
`
`that follows.
`
`It should be appreciated that like reference
`
`numerals are used to identify like elements illustrated in one
`
`or more of the figures.
`
`DETAILED DESCRIPTION
`
`BLACKBERRY EX. 1009, pg. 9
`
`BLACKBERRY EX. 1009, pg. 9
`
`
`
`M-16796-Vl US
`
`Fig.
`
`1 illustrates a Data Gateway program tool 30 and
`
`wireless devices 10, 12, and 14 representing users whose
`
`activities are monitored according to an embodiment of the
`
`present
`
`invention.
`
`Each of the devices 10, 12 and 14 may
`
`include a respective Data Monitoring program tool 11, 13, and 15
`
`which communicates with the Data Gateway 30. Data services used
`
`on the wireless devices 10, 12 and 14 are monitored for activity
`
`by their respective Data Monitoring program tool 11, 13, and 15
`
`which communicates to the Data Gateway 30 via a wireless data
`
`connection such as a cellular service provider 16.
`
`Alternatively,
`
`the devices 10, 12, and 14 may send their
`
`activity information through any available communications
`
`network including PIN to PIN, Wi-Fi, Bluetooth, Personal Area
`
`Networks, Local Area Networks, and Public Networks such as
`
`cellular networks, satellite networks and the Internet.
`
`As described in more detail below,
`
`the Data Gateway 3O
`
`maintains an Activity Log 40 database in Data Center 17.
`
`The
`
`Activity Log 40 contains an entry for each use of_a data service
`
`on wireless devices 10, 12, and 14. Also described in more
`
`detail below,
`
`the Data Center 17 also contains a Permissions 50
`
`database which includes the wireless devices to be monitored and
`
`the rules to allow, deny or alert of data service activity
`
`occurring on the wireless devices being monitored.
`
`The Alert Monitor 70 program waits for new entries to be
`
`made into the Activity Log 40.
`
`Each new entry is checked
`
`against the Permissions 50 database. Whenever unauthorized
`
`activity is detected,
`
`the Alert Monitor 70 sends an alert to one
`
`or more users via the Data Gateway 30, such as for example to a
`
`cell phone 18 using SMS Text Messaging or an Email 19 account.
`
`The preferred method of notification is maintained in the
`
`Permissions 50 database which can support many forms of data
`
`communications including voice messages,
`
`SMS Text Messages,
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 10
`
`BLACKBERRY EX. 1009, pg. 10
`
`
`
`M-16796-V1 US
`
`email or any other publicly accepted machine to machine
`
`communications protocol.
`
`Fig.
`
`2 illustrates in more detail a Data Monitor 21 program
`
`tool which captures the data service activity on a Mobile
`
`Communications Device 20 in accordance with an embodiment of the
`
`present
`
`invention.
`
`For example, data monitor 21 program tool
`
`may be an exemplary representation of data monitor 11, 13,
`
`and/or 15 and similarly mobile communications device 20 may be
`
`an exemplary representation of device 10, 12, and/or 14. Each
`
`10
`
`Mobile Communications Device 20 contains one or more
`
`applications that use a well known communication protocol to
`
`send or receive digital data packets (communications) or provide
`
`supporting applications to facilitate the communications process
`
`such as an Address Book which contains an email address used to
`
`15
`
`send an email communication.
`
`In accordance with an embodiment
`
`of the present invention,
`
`these communication applications and
`
`their supporting applications are defined as a data service.
`
`These data services may include one or more of a Phone
`
`Application 22 for sending or receiving voice communications, an
`
`Email Application 23 for sending or receiving email
`
`communications, a SMS Text Application 24 for sending or
`
`receiving SMS text messages, an Instant Messaging Application 25
`
`for sending or receiving instant messages, a Web Browser
`
`Application 26 for sending or receiving HTTP requests and
`
`responses, an Address Book 27 for storing contact
`
`information, a
`
`Calendar/Task Application 28 for storing appointment
`
`information, an Installation Application 29 for storing
`
`information regarding the installed applications on the device,
`
`and a Photo/Video/Multimedia Application 31 for sending or
`
`receiving multimedia files. As described in more detail below,
`
`the Data Monitor 21 program tool monitors the inbound and
`
`outbound activity for each of these data services and sends a
`
`detailed log of these activities to a central repository using a
`
`2O
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 11
`
`BLACKBERRY EX. 1009, pg. 11
`
`
`
`M-16796-Vl US
`
`Cellular Service Provider 16. Alternatively,
`
`the Data Monitor
`
`21 may send their activity information through any available
`
`communications network, such as the Internet, a company network,
`
`or public cellular network.
`
`As would be understood by one skilled in the art,
`
`embodiments of the present invention provide certain advantages
`
`over conventional approaches.
`
`For example, a conventional
`
`approach may simply provide parental controls which monitor and
`
`block Internet and email access from a desktop and which
`
`primarily prevent access to unwanted content or block the
`
`transmission of personally identifiable information. Blocking
`
`usually results in the child finding an unmonitored computer to
`
`access the blocked content.
`
`For example, most gaming consoles
`
`today are enabled with Internet access and do not inherently
`
`include parental controls. Parental control applications
`
`generally do not log the blocked content and none pro—actively
`
`notify the parent or administrative user of the event.
`
`Additionally, none are capable of.monitoring a cell phone or
`
`other mobile communications device which today have comparable
`
`communication capabilities as a desktop computer.
`
`As another example of a conventional approach, child and
`
`employee monitoring of geographic location may be provided from
`
`a cell phone, but this approach typically requires an active
`
`search by the parent or manager to locate the device.
`
`Perimeter
`
`boundaries or virtual fencing could be deployed using existing
`
`location technology, but again all of these location approaches
`
`are after—the—fact of direct contact with a predator or after a
`
`potentially life threatening event is in progress.
`
`In contrast
`
`in accordance with one or more embodiments of the present
`
`invention, systems and methods are disclosed for example to
`
`detect the potentially life threatening event before physical
`
`contact is made with the user of a monitored wireless device.
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`BLACKBERRY EX. 1009, pg. 12
`
`BLACKBERRY EX. 1009, pg. 12
`
`
`
`M-16796-V1 US
`
`For example, Fig. 3A illustrates a data flowchart for the
`
`capturing of an inbound voice call using the Phone Application
`
`22 on a Mobile Communications Device 20 in accordance with an
`
`embodiment of the present
`
`invention.
`
`Initially,
`
`in step 110, a
`
`5
`
`phone call is received on the Mobile Communications Device 20.
`
`In step 120,
`
`the Data Monitor 21 recognizes that the Phone
`
`Application 22 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`10
`
`Device 20,
`
`the start and end date/time stamp of the call, and
`
`the originating phone number. Once the call has been terminated
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`one or more data packets to the central repository located in
`
`15
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`20
`
`25
`
`3O
`
`Fig.
`
`3B illustrates a data flowchart for the capturing of
`
`an outbound voice call using the Phone Application 22 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 111, a phone call
`
`is placed from the Mobile Communications Device 20.
`
`In step
`
`121,
`
`the Data Monitor 21 recognizes that the Phone Application
`
`22 data service has been initiated and begins to capture
`
`information regarding the use of the data service including the
`
`unique Device ID of the Mobile Communications Device 20,
`
`the
`
`start and end date/time stamp of the call, and the destination
`
`phone number. Once the call has been terminated (Step 130),
`
`the
`
`Data Monitor 21 formats a data packet which includes the
`
`collected information (Activity Record) and sends one or more
`
`data packets to the central repository located in Data Center
`
`BLACKBERRY EX. 1009, pg. 13
`
`BLACKBERRY EX. 1009, pg. 13
`
`
`
`M-16796-V1 US
`
`17.
`
`In step 140,
`
`the Data Gateway 30 located in the Data
`
`Center 17 receives the data packet(s) and then writes the data
`
`packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`Fig. 3C illustrates a data flowchart for the capturing of
`
`an inbound email message using the Email Application 23 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 112, an email
`
`message is received on the Mobile Communications Device 20.
`
`In
`
`step 122,
`
`the Data Monitor 21 recognizes that the Email
`
`Application 23 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`originating email address. Once the message has been received
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`one or more data packets to the central repository located in
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`Fig.
`
`3D illustrates a data flowchart for the capturing of
`
`an outbound email message using the Email Application 23 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 113, an email
`
`message is sent from the Mobile Communications Device 20.
`
`In
`
`step 123,
`
`the Data Monitor 21 recognizes that the Email
`
`Application 23 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`10
`
`BLACKBERRY EX. 1009, pg. 14
`
`BLACKBERRY EX. 1009, pg. 14
`
`
`
`M-16796-Vl US
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`destination email address. Once the message has been sent
`
`(Step
`
`130),
`
`the Data Monitor 21 formats a data packet which includes
`
`the collected information (Activity Record) and sends one or
`
`more data packets to the central repository located in Data
`
`Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in the
`
`Data Center 17 receives the data packet(s) and then writes the
`
`data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`10
`
`Device 20.
`
`Fig. 3E illustrates a data flowchart for the capturing of
`
`an inbound text message using the SMS Text Application 24 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 114, a text
`
`message is received on the Mobile Communications Device 20.
`
`In
`
`step 124,
`
`the Data Monitor 21 recognizes that the SMS Text
`
`Application 24 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`originating phone number. Once the message has been received
`
`(Step 130),
`
`the Data Monitor 21 formats a data packet which
`
`includes the collected information (Activity Record) and sends
`
`15
`
`20
`
`one or more data packets to the central repository located in
`
`25
`
`Data Center 17.
`
`In step 140,
`
`the Data Gateway 30 located in
`
`the Data Center 17 receives the data packet(s) and then writes
`
`the data packet(s)
`
`in step 150 to the Activity Log 40, a central
`
`repository for all data collected from the Mobile Communications
`
`Device 20.
`
`3O
`
`Fig. 3F illustrates a data flowchart for the capturing of
`
`an outbound text message using the SMS Text Application 24 on a
`
`Mobile Communications Device 20 in accordance with an embodiment
`
`of the present invention.
`
`Initially,
`
`in step 115, a text
`
`11
`
`BLACKBERRY EX. 1009, pg. 15
`
`BLACKBERRY EX. 1009, pg. 15
`
`
`
`M—16796—V1 US
`
`message is sent
`
`from the Mobile Communications Device 20.
`
`In
`
`step 125,
`
`the Data Monitor 21 recognizes that the SMS Text
`
`Application 24 data service has been initiated and begins to
`
`capture information regarding the use of the data service
`
`including the unique Device ID of the Mobile Communications
`
`Device 20,
`
`the date/time stamp of the message, and the
`
`destination phone number. Once the message has been sent
`
`(Step
`
`130),
`
`the Data Monitor 21 formats a data packet which includes
`
`the collected