EP2764713A2 - Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles - Google Patents
Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobilesInfo
- Publication number
- EP2764713A2 EP2764713A2 EP12783539.5A EP12783539A EP2764713A2 EP 2764713 A2 EP2764713 A2 EP 2764713A2 EP 12783539 A EP12783539 A EP 12783539A EP 2764713 A2 EP2764713 A2 EP 2764713A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- mobile device
- user equipment
- mobile user
- usage
- consequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 122
- 238000012544 monitoring process Methods 0.000 title claims abstract description 36
- 230000015654 memory Effects 0.000 claims description 41
- 230000000694 effects Effects 0.000 claims description 39
- 230000008569 process Effects 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 14
- 230000009471 action Effects 0.000 claims description 12
- 238000013507 mapping Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 abstract description 18
- 238000004891 communication Methods 0.000 description 57
- 238000011084 recovery Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 10
- 230000007613 environmental effect Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 230000006399 behavior Effects 0.000 description 8
- 230000001413 cellular effect Effects 0.000 description 8
- 230000000977 initiatory effect Effects 0.000 description 7
- 238000009434 installation Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004224 protection Effects 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 4
- 230000001066 destructive effect Effects 0.000 description 4
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 4
- 238000005286 illumination Methods 0.000 description 4
- 238000005259 measurement Methods 0.000 description 4
- 230000005055 memory storage Effects 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 230000033001 locomotion Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- KJLPSBMDOIVXSN-UHFFFAOYSA-N 4-[4-[2-[4-(3,4-dicarboxyphenoxy)phenyl]propan-2-yl]phenoxy]phthalic acid Chemical compound C=1C=C(OC=2C=C(C(C(O)=O)=CC=2)C(O)=O)C=CC=1C(C)(C)C(C=C1)=CC=C1OC1=CC=C(C(O)=O)C(C(O)=O)=C1 KJLPSBMDOIVXSN-UHFFFAOYSA-N 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000013481 data capture Methods 0.000 description 2
- 230000000994 depressogenic effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 206010016275 Fear Diseases 0.000 description 1
- 101100521334 Mus musculus Prom1 gene Proteins 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000009118 appropriate response Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000000981 bystander Effects 0.000 description 1
- 238000003490 calendering Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 235000015243 ice cream Nutrition 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000002574 poison Substances 0.000 description 1
- 231100000614 poison Toxicity 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000001012 protector Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
- H04M1/724634—With partially locked states, e.g. when some telephonic functional locked states or applications remain accessible in the locked states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/58—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on statistics of usage or network monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/88—Provision for limiting connection, or expenditure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
- H04W4/027—Services making use of location information using location based information parameters using movement velocity, acceleration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- Certain embodiments relate to systems and methods for altering the function of an electronic device in response a user of the device violating or adhering to a rule or set of rules.
- the altered functionality could facilitate behavior modification, such as negative consequences for rule-breakers or positive consequences for rule-followers.
- Figure 6 is a diagram showing various functionalities of the certain embodiments, one or more of which may be included in step 140.
- a wireless system such as a wireless mobile telephony network, General Packet Radio Service (GPRS) network, wireless Local Area Network (WLAN), BlueTooth®, Global System for Mobile Communications (GSM) network, Personal Communication Service (PCS) network, Advanced Mobile Phone System (AMPS) network, Infrared (IR), Near Field Communication (NFC), Wi-Fi®, IEEE 102.1 1 network, a Worldwide Interoperability for Microwave Access (WiMax) network, a microwave network, and/or a satellite communication network.
- GPRS General Packet Radio Service
- WLAN Wireless Local Area Network
- GSM Global System for Mobile Communications
- PCS Personal Communication Service
- AMPS Advanced Mobile Phone System
- IR Infrared
- NFC Near Field Communication
- Wi-Fi® IEEE 102.1 1 network
- WiMax Worldwide Interoperability for Microwave Access
- the security authority may communicate with the mobile device in any desired manner, such as through software operating on a host server in communication with a database.
- a security threat i.e., the user believes the mobile device has been lost, stolen, or may otherwise be subject to unauthorized access.
- the functionality of the mobile device can then be altered as a result (140), as discussed further below.
- a combination of events may be weighted such that the occurrence of a security compromise event is based on a predetermined voting threshold.
- Individual events may be given more significance than other events, such that only a repeated occurrence of a particular event deviates from the predetermined threshold, while a single occurrence of another event deviates from the threshold. For example, a call outside the usage profile's normal time range may need to occur a total of four times before the predetermined threshold is exceeded, while the entering of an incorrect password two times in succession deviates from the threshold. Similarly, an incorrect password entry in combination with two calls outside the normal time range in the usage profile can deviate from the predetermined threshold. Events may be weighted or scored for the predetermined voting threshold in any desired manner.
- a security compromise event may be determined based on the failure of a user to provide the proper biometric data.
- a biometric measurement of a current user of the mobile device is obtained, and the biometric
- a security compromise event can then be determined where the biometric measurement exceeds a predetermined threshold variance from the previously stored reference value.
- the security compromise event may be based on any number of biometric measurements from the current user of a mobile device, such as a fingerprint scan, an iris scan, a retina scan, a voice sample, a breath sample, and/or a photograph of a portion of the body of the current user of the mobile device.
- An environmental parameter may also include information from or about systems and devices in communication with the mobile device.
- a wireless receiver in communication with the mobile device can be activated and used to sense one or more wireless network addresses from one or more signals received by the mobile device at different points in time. The network addresses sensed at different points in time can be compared to determine whether the sensed network addresses differ, and thus determine if the mobile device has moved.
- the mobile device comprises a mobile telephone
- telephone numbers dialed by the unauthorized user can be logged and transmitted to the security authority and/or authorized user, and authorized user and/or security authority can be alerted as the mobile device is engaging in a telephone call.
- a third party (such as a security authority) may request to access the telephone call, and then establish a conference connection to the telephone call. The third party may actively participate in the conversation or listen to the conversation surreptitiously.
- the microphone or camera may be activated upon any desired condition being satisfied, such as: the mobile device receiving a call from a predetermined phone number; when the mobile device receives a call during which a predetermined pattern of DTMF tones is received by the mobile device; or during a call received by the mobile device, an utterance received by the mobile device matches within a predetermined threshold a security enablement utterance stored within the mobile device.
- the mobile device receiving a call from a predetermined phone number; when the mobile device receives a call during which a predetermined pattern of DTMF tones is received by the mobile device; or during a call received by the mobile device, an utterance received by the mobile device matches within a predetermined threshold a security enablement utterance stored within the mobile device.
- the software application may be configured to operate with minimal underlying hardware functionality.
- the application may be initiated before the mobile device establishes a network connection.
- Such a situation may be provided, for instance, when the software application is installed on a SIM card in the mobile device, and the application launches before other software in the mobile device operating system.
- Figures 9-64 depict various aspects of the operation of certain embodiments.
- Figures 9-16 depict example notification measures that can be provided on a mobile computing device such as a laptop computer in accordance with certain embodiments.
- a notification icon or graphic is provided in proximity to input fields where users normally log in to access the mobile computing device.
- the notification icon or graphic is accompanied by text providing information regarding returning of the device.
- the various notification messages allow a finder of the mobile device to see that the device is protected by an application operating in conjunction with certain embodiments as well as to provide information to allow the user to return the device.
- screen 1300 provides a link to a website that an innocent finder can click on to return the device.
- monitoring or management individuals may include a nurse, doctor, or other healthcare or assistance worker. Other examples of such individuals also include employers.
- alerts from the mobile device may sent to parents of a child, others may be sent to a security service, and a further set of alerts may be sent to a law enforcement agency, such as a police station, or other emergency services provider, such as a fire station or poison control center.
- a law enforcement agency such as a police station, or other emergency services provider, such as a fire station or poison control center.
- Figure 65 illustrates a method according to certain embodiments.
- the method shown in Figure 65 can be performed by one or more devices.
- the method can be performed in a mobile user equipment or in one or more servers.
- the method may be useful for assisting in behavioral control of a user of a mobile device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Operations Research (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Probability & Statistics with Applications (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Testing And Monitoring For Control Systems (AREA)
- Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16198216.0A EP3166294B1 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161544182P | 2011-10-06 | 2011-10-06 | |
US13/333,392 US11864051B2 (en) | 2008-04-01 | 2011-12-21 | Systems and methods for monitoring and managing use of mobile electronic devices |
PCT/EP2012/069826 WO2013050586A2 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16198216.0A Division EP3166294B1 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2764713A2 true EP2764713A2 (fr) | 2014-08-13 |
Family
ID=47146343
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16198216.0A Active EP3166294B1 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
EP12783539.5A Ceased EP2764713A2 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16198216.0A Active EP3166294B1 (fr) | 2011-10-06 | 2012-10-08 | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles |
Country Status (4)
Country | Link |
---|---|
EP (2) | EP3166294B1 (fr) |
BR (1) | BR112014008385A2 (fr) |
CA (1) | CA2851311A1 (fr) |
WO (1) | WO2013050586A2 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10674375B2 (en) | 2014-05-28 | 2020-06-02 | Corning Optical Communications LLC | Multiple application modules (MAMs) for monitoring signals in components in wireless distribution systems, including distributed antenna systems (DASs), and related systems and methods |
US11032687B2 (en) | 2015-01-09 | 2021-06-08 | Corning Optical Communications LLC | Multiple application module or unit |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9413707B2 (en) | 2014-04-11 | 2016-08-09 | ACR Development, Inc. | Automated user task management |
US8942727B1 (en) | 2014-04-11 | 2015-01-27 | ACR Development, Inc. | User Location Tracking |
EP3449650A1 (fr) | 2016-04-27 | 2019-03-06 | Corning Optical Communications LLC | Modules d'application multiples (mam) et/ou unités d'application multiples (mau) permettant de fournir des services dans des systèmes de distribution sans fil (wds) et comprenant des systèmes d'antenne distribués (das), et systèmes et procédés associés |
WO2017210186A1 (fr) | 2016-05-31 | 2017-12-07 | Corning Optical Communications LLC | Dispositifs d'applications multiples pour fournir des services dans des systèmes de distribution sans fil (wds), notamment des systèmes d'antennes réparties (das), et systèmes et procédés associés |
CN114338915B (zh) * | 2021-12-24 | 2024-07-30 | 中国联合网络通信集团有限公司 | 来电号码风险识别方法、装置、设备及存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
GB2348777B (en) * | 1999-04-06 | 2003-11-12 | Motorola Ltd | Service via a cellular communications system |
WO2004077797A2 (fr) * | 2003-02-25 | 2004-09-10 | Boston Communications Group, Inc. | Procede et systeme destines au controle de l'utilisation de telephones mobiles |
US20110065375A1 (en) * | 2009-04-29 | 2011-03-17 | Boulder Cellular Labs, Inc. | System for limiting mobile device functionality in designated environments |
-
2012
- 2012-10-08 BR BR112014008385A patent/BR112014008385A2/pt not_active IP Right Cessation
- 2012-10-08 WO PCT/EP2012/069826 patent/WO2013050586A2/fr active Application Filing
- 2012-10-08 CA CA2851311A patent/CA2851311A1/fr not_active Abandoned
- 2012-10-08 EP EP16198216.0A patent/EP3166294B1/fr active Active
- 2012-10-08 EP EP12783539.5A patent/EP2764713A2/fr not_active Ceased
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10674375B2 (en) | 2014-05-28 | 2020-06-02 | Corning Optical Communications LLC | Multiple application modules (MAMs) for monitoring signals in components in wireless distribution systems, including distributed antenna systems (DASs), and related systems and methods |
US11032687B2 (en) | 2015-01-09 | 2021-06-08 | Corning Optical Communications LLC | Multiple application module or unit |
US11910290B2 (en) | 2015-01-09 | 2024-02-20 | Corning Optical Communications LLC | Multiple application module or unit |
Also Published As
Publication number | Publication date |
---|---|
WO2013050586A2 (fr) | 2013-04-11 |
BR112014008385A2 (pt) | 2017-04-04 |
CA2851311A1 (fr) | 2013-04-11 |
EP3166294A1 (fr) | 2017-05-10 |
WO2013050586A3 (fr) | 2013-05-30 |
EP3166294B1 (fr) | 2020-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11864051B2 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
CA2842782C (fr) | Systemes et procedes pour evaluer et attenuer dynamiquement le risque d'une entite assuree | |
EP2266070B1 (fr) | Système permettant d'enrayer l'utilisation non autorisée d'un dispositif | |
US8248237B2 (en) | System for mitigating the unauthorized use of a device | |
US9916481B2 (en) | Systems and methods for mitigating the unauthorized use of a device | |
US9576157B2 (en) | Method for mitigating the unauthorized use of a device | |
US9258326B2 (en) | API for auxiliary interface | |
US9886599B2 (en) | Display of information through auxiliary user interface | |
US20090253408A1 (en) | Method for mitigating the unauthorized use of a device | |
US20100138298A1 (en) | System for advertising integration with auxiliary interface | |
EP3166294B1 (fr) | Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles | |
EP2321761B1 (fr) | Invocation de services systèmes via une interface auxiliaire | |
EP2321757B1 (fr) | Api pour interface auxiliaire | |
EP2321951B1 (fr) | Système pour l intégration de publicité avec interface auxiliaire | |
WO2014027242A1 (fr) | Systèmes et procédés permettant de réduire l'utilisation non autorisée d'un dispositif | |
EP2321758A2 (fr) | Visualisation d informations par l intermédiaire d une interface utilisateur auxiliaire |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140506 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20150219 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20161201 |