US20170223174A1 - Method and System for Using a Supervisory Device with a Mobile Device - Google Patents

Method and System for Using a Supervisory Device with a Mobile Device Download PDF

Info

Publication number
US20170223174A1
US20170223174A1 US15/486,179 US201715486179A US2017223174A1 US 20170223174 A1 US20170223174 A1 US 20170223174A1 US 201715486179 A US201715486179 A US 201715486179A US 2017223174 A1 US2017223174 A1 US 2017223174A1
Authority
US
United States
Prior art keywords
mobile device
supervisory
supervisory device
enabled
disable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/486,179
Inventor
David Einzig
Gerald Durand
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kid Case Inc
Original Assignee
Kid Case Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kid Case Inc filed Critical Kid Case Inc
Priority to US15/486,179 priority Critical patent/US20170223174A1/en
Assigned to Kid Case L.L.C. reassignment Kid Case L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EINZIG, David, DURAND, GERALD
Assigned to KID CASE, INC. reassignment KID CASE, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: Kid Case L.L.C.
Publication of US20170223174A1 publication Critical patent/US20170223174A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04M1/72577
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/724092Interfacing with an external cover providing additional functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/72527
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0266Details of the structure or mounting of specific components for a display module assembly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • these mobile devices can, at times, be distracting. For example, young children who like to interact with these mobile devices may be overwhelmed by their level of engagement while doing so. As a result, the children may desire use these mobile devices more often or in ways less appropriate than desired by their parents or caregivers. This overuse, may lead to a diminished participation in other activities that might lead to a more well-rounded upbringing.
  • a particular mobile device e.g., mobile phones, tablet computers, notebook computers, and/or any other type of computing device. It may also be desirable to control the days and/or times that the mobile device can be powered on and/or control what software can be used on the mobile device and at what times.
  • the supervisory device operates in conjunction with the mobile device to monitor an extent of usage of the mobile device.
  • the supervisory device may be external to the mobile device and may be positioned within a protective case that surrounds the mobile device, for instance.
  • the supervisory device may be communicatively coupled to the mobile device via a wired or wireless interface and may operate to communicate with software on the mobile device to measure an extent of usage of the mobile device.
  • the supervisory device may take one or more responsive actions when an extent of usage of the mobile device reaches a threshold extent or an unauthorized change has been made to the mobile device's software. Accordingly, the supervisory device may be useful for parents (or other entities) who want to monitor and/or limit the time their children (or others) spend using the mobile device. The supervisory device may be useful in other circumstances as well.
  • a supervisory device may operate in a non-permissible mode and determine that the mobile device is currently enabled. In response to the supervisory device operating in the non-permissible mode and the supervisory device determining that the mobile device is currently enabled, the supervisory device may disable the mobile device.
  • a supervisory device may include a timer module, a user interface, a button-pressing mechanism, and a computing device coupled to the timer module, user interface, and the button-pressing mechanism.
  • the computing device may be configured to carry out supervisory functions that include receiving via the user interface an indication of a desired operating time of the mobile device, programming the timer module with the desired operating time, decrementing the timer module when the mobile device is in use, and causing the button-pressing mechanism to depress a button on the mobile device when the mobile device is in use and the timer module is fully decremented.
  • FIG. 1 is a flow chart depicting example operations that can be carried out in accordance with the present disclosure.
  • FIG. 2 is a simplified block diagram of a supervisory device and a mobile device arranged to operate in accordance with the present disclosure.
  • FIG. 3 is a simplified block diagram of a solenoid-button interface arranged to operate in accordance with the present disclosure.
  • FIG. 4 is a simplified block diagram of a supervisory device and a mobile device arranged to operate in accordance with the present disclosure.
  • FIG. 5 is a simplified block diagram of an example computing device arranged to operate in accordance with the present disclosure.
  • FIG. 1 is a flowchart depicting an example process that may be carried out by a supervisory device, in accordance with an example embodiment of the present disclosure.
  • the flowchart of FIG. 1 includes several example operations, functions, or actions, as depicted by one or more of blocks 102 , 104 , and/or 106 , each of which may be carried out by any of the systems described herein and by way of FIGS. 2-5 ; however, other configurations could be used as well.
  • each block of the flowchart may represent a module, a segment, or a portion of program code, which includes one or more instructions executable by a processor for implementing specific logical functions or steps in the process.
  • the program code may be stored on any type of computer readable medium, for example, such as a storage device including a disk or hard drive.
  • each block may represent circuitry that is wired to perform the specific logical operations in the process.
  • Alternative implementations are included within the scope of the example embodiments of the present application in which operations may be executed out of order from that shown or discussed, including substantially concurrent or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art.
  • the flowchart begins at block 102 where the supervisory device determines the operation mode of the mobile device.
  • the supervisory device determines whether the mobile device is enabled, that is, whether the mobile device is in use; or whether the mobile device is disabled, that is, whether the mobile device is not in use.
  • flow proceeds to block 104 .
  • the supervisory device determines that the mobile device is disabled, flow proceeds back to block 102 .
  • the supervisory device may receive a signal from the mobile device that indicates whether or not the mobile device is awake and/or in use.
  • some mobile devices may include one or more interface ports that couple to various propriety or non-proprietary cables.
  • these ports may take the form of a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port (such as those that may be found on mobile devices produced by Apple Inc. in Cupertino, Calif.), as well as other types of interface ports. Supplied via these interface ports may be various signal lines that indicate various operating states of the mobile device.
  • one of these signal lines carries a signal that indicates whether the mobile device is in an awake mode or a sleep mode.
  • the supervisory device includes a cable, or built-in docking plug, that couples to this interface port. And in order to determine the operating mode of the when the mobile device (as well as perhaps whether software is operating as intended) the supervisory device may detect the presence (or absence) of the particular signal at the interface port.
  • a signal that indicates the operation mode of the mobile device takes the form of a particular wireless signal transmitted by the mobile device to the supervisory device.
  • supervisory software may be installed on the mobile device that is configured to cause the mobile device to emit a detectable wireless signal indicative of whether the mobile device is currently in use.
  • the supervisory device may be appropriately configured to detect the wireless signal such that when determining the operation mode of the mobile device, the supervisory device operates to detect the presence (or absence) of the particular wireless signal.
  • the signal may be transmitted and received via a BLUETOOTH or a Wi-Fi interface; however, other wireless protocols may be used as well.
  • a signal that indicates the operation mode of the mobile device takes the form of a particular voltage measured at the mobile device's headphone/microphone jack.
  • some mobile devices particularly tablet computers and mobile telephones, but other mobile device as well, may include a jack that accepts a 1 ⁇ 8 inch or 3.5 millimeter diameter, three-conductor headphone/microphone plug.
  • Mobile devices may also include a mechanical switch (or other mechanism) that detects when a headphone/microphone plug is inserted into the jack.
  • a mobile device may disable any built-in speakers as well as supply a voltage to a particular portion of the jack in order to operate a microphone that is coupled to the headphone/microphone plug.
  • the voltage supplied to the microphone portion of the jack may vary based on whether the mobile device is currently in use. For instance, in one example, the voltage supplied to the microphone portion of the jack when the mobile device is currently in use (e.g., when the mobile device is in an awake mode) is 5V, whereas the voltage supplied to the to the microphone portion of the jack when the mobile device is not currently in use (e.g., when the mobile device is in a sleep mode) is 0.5V. However, other voltages are possible in other examples.
  • the supervisory device may include a cable that plugs into the mobile device's headphone/microphone jack.
  • the supervisory device may measure the voltage supplied to the plug by the mobile device and determine that the mobile device is currently enabled when the measured voltage is at or near 5.0V, and determine that the mobile device is currently disabled when the measured voltage is at or near 0.5V.
  • the supervisory device may determine the operation mode of the mobile device based on one or more sensors integrated in or otherwise accessible to the supervisory device.
  • the supervisory device may be embedded within or otherwise comprise a protective case for the mobile device.
  • the protective case may include a cover that contains one or more sensors that serve to indicate whether or not the cover is closed over the mobile device. The cover being closed over the mobile device may indicate that the mobile device is not in use, whereas the cover not being closed over the mobile device may indicate that the mobile device is in use.
  • one of the sensors may be a magnetic sensor that receives a magnetic signal when the cover is closed over the mobile device. Additionally or alternatively, one of the sensors may be a light sensor that detects the absence of light when the cover is closed over the mobile device. Additionally or alternatively, one of the sensors may include a proximity sensor that detects the proximity of the cover to the face of the mobile device when the cover is closed over the mobile device. Other sensors are possible. And other ways to determine whether the mobile device is currently in use are possible as well.
  • the supervisory device determines the operation mode of the supervisory device. In one embodiment, the supervisory device determines whether the supervisory device is in a permissible mode, in which it is permitted that the mobile device be used; or whether the supervisory device is in a non-permissible mode, in which it is not permitted that the mobile device be used. In accordance with this embodiment, when the supervisory device determines that the supervisory device is in a permissible mode, flow proceeds back to block 102 . However, when the supervisory device determines that the supervisory device is in a non-permissible mode, flow continues to block 106 .
  • the supervisory device may determine the operation mode of the supervisory device by referring to a programmable timing unit. For instance, in one implementation, the supervisory device is operable to program a timing unit with a desired usage allotment (e.g., four hours). Accordingly, after programming the timing unit with an allotment of, say, four hours, the supervisory device may decrement the timing unit when the supervisory device determines that the mobile device is enabled. Thus, in this implementation, the supervisory device may determine the operation mode of the supervisory device by referring to the timing unit and determining whether any time remains on the timing unit.
  • a programmable timing unit For instance, in one implementation, the supervisory device is operable to program a timing unit with a desired usage allotment (e.g., four hours). Accordingly, after programming the timing unit with an allotment of, say, four hours, the supervisory device may decrement the timing unit when the supervisory device determines that the mobile device is enabled.
  • the supervisory device may determine the operation mode of
  • the supervisory device may determine that the supervisory device is in the permissible mode, whereas when no time remains on the programmable timing unit, the supervisory device may determine that the supervisory device is in the non-permissible mode.
  • the supervisory device operates the timing unit as a traditional timer and increments the timer, starting from zero, when the supervisory device determines that the mobile device is enabled.
  • the supervisory device may determine the operation mode of the supervisory device by referring to the timing unit and determining whether the elapsed time on the timing unit has reached a threshold amount of time (e.g., four hours). More specifically, when the timing unit has not reached the threshold amount of time, the supervisory device may determine that the supervisory device is in the permissible mode, whereas when the timing unit has reached or exceeded the threshold amount of time, the supervisory device may determine that the supervisory device is in the non-permissible mode.
  • a threshold amount of time e.g., four hours
  • the supervisory device is operable to program the programmable timing unit with certain forbidden time periods of the day during which it is desired that the mobile device not be used (e.g., after 10:00 PM and before 8:00 AM).
  • the supervisory device may determine the operation mode of the supervisory device by referring to a traditional clock and determining whether the current time falls within one of the forbidden time periods. More specifically, when the current time does not fall within one of the forbidden time periods, the supervisory device may determine that the supervisory device is in the permissible mode, whereas when the current time does fall within one of the forbidden time periods, the supervisory device may determine that the supervisory device is in the non-permissible mode.
  • Other mechanisms are possible for keeping track of the extent of usage of a mobile device as well.
  • the supervisory device may determine that the supervisory device is in the permissible mode despite the fact that no time may remain on the programmable timing unit, the timing unit may have reached or exceeded a threshold amount of time, or the current time may fall within one of the forbidden time periods, as the case may be. In one example of this, the supervisory device may determine whether a pre-approved application is running on the mobile device, and if so, determine that the supervisory device is in the permissible mode without referring to the programmable timing unit.
  • a parent may program the supervisory device with a list of pre-approved applications (such applications may be applications the parent or administrator determines to be of an educational nature; however, non-educational applications be designated as pre-approved applications as well).
  • the supervisory device may receive a signal from the mobile device via a wired interface (e.g., a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port) or a wireless interface (e.g., utilizing a BLUETOOTH or Wi-Fi communication protocol) indicating to the supervisory device the name and/or type of application currently running on the mobile device.
  • the supervisory device may refer to the list of pre-approved applications and determine that the supervisory device is in the permissible mode when the application currently running matches one of the pre-approved applications on the list.
  • the supervisory device may also pause the timing unit or otherwise not keep track of the usage of the mobile device so long as the pre-approved application is currently running on the mobile device. In this way, when a child (or other user of the mobile device) uses a pre-approved application, such use may not count towards the usage allotment.
  • Other ways to determine that the supervisory device is in the permissible mode are possible as well.
  • the supervisory device may determine that the supervisory device is in the non-permissible mode despite the fact that some time may remain on the programmable timing unit, the timing unit may not yet have reached or exceeded a threshold amount of time, or the current time may not fall within one of the forbidden time periods, as the case may be.
  • the supervisory device may determine whether a disapproved application is running on the mobile device, and if so, determine that the supervisory device is in the non-permissible mode without referring to the programmable timing unit. In order to carry out such a determination, a parent (or other administrator of the supervisory device) may program the supervisory device with a list of disapproved applications.
  • the supervisory device may receive a signal from the mobile device via a wired interface (e.g., a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port) or a wireless interface (e.g., utilizing a BLUETOOTH or Wi-Fi communication protocol) indicating to the supervisory device the name and/or type of application currently running on the mobile device.
  • a wired interface e.g., a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port
  • a wireless interface e.g., utilizing a BLUETOOTH or Wi-Fi communication protocol
  • the supervisory device may determine that the supervisory device is in the non-permissible mode when an unauthorized change has been made to the settings of the mobile device or to certain software installed on the mobile device.
  • the supervisory device may be pre-programmed to identify particular changes to a software and its settings, or a parent (or other administrator of the supervisory device) may program the supervisory device with a list of mobile device settings that should be “bodyguarded” (such as a system unlock password, a new application installation password, etc.) and/or a list of applications that should not be uninstalled or otherwise changed.
  • the supervisory device may periodically poll the mobile device (e.g., via any of the wired or wireless interfaces described above) to determine whether any of the bodyguarded settings have been changed or whether any listed application has been uninstalled or otherwise had a settings change.
  • the supervisory device may determine that the supervisory device is in the non-permissible mode without also referring to the timing unit. Other ways to determine that the supervisory device is in the non-permissible mode are possible as well.
  • disabling the mobile device includes powering down the mobile device, preventing the mobile device from being turned on, putting the mobile device in a sleep or other low-power mode, turning off the mobile device's screen, or otherwise interfering with the ability to effectively view and/or interact with the mobile device.
  • the supervisory device may disable the mobile device by sending a signal, either wired via a micro USB port, mini USB port, a LIGHTNING or 30-pin serial data port, as well as other types of interface ports, to software on the mobile device initiating an action that will disable the device.
  • a signal may also be sent wirelessly to the mobile device via BLUETOOTH, Wi-Fi, or other wireless communication protocol.
  • the protective case may include a mechanism that operates to mechanically depress a power button on the mobile device.
  • this mechanism may take the form of a lever and gear arrangement powered by an electric motor with a lead screw or other gearing/pulley arrangement (such as the type commonly used in automobile door locks), a pull or push type solenoid, actuator, a NITINOL spring or other long wire pulling device, a wax motor, or any other type of device.
  • the supervisory device may disable the mobile device by actuating this mechanism.
  • an additional or alternative way to disable the mobile device may include manipulating a screen of the protective case so that the protective case's screen interferes with the ability to effectively view and/or interact with the mobile device.
  • the protective case's screen may include a type of electrically-switchable smart glass, such as Electric Frosted Glass, whereby an application of electric current to the protective case's screen may change the opacity of the protective case's screen or otherwise interfere with the visibility of the mobile device.
  • Other ways to manipulate a screen and other ways to disable a mobile device are possible as well.
  • the supervisory device may take one or more additional or alternative actions in response to determining that the supervisory device is in the non-permissible mode and the mobile device is enabled.
  • One of these responsive actions is to actuate some audible or visual alarm, such as a buzzer, an LED, or both.
  • Another responsive action is to cause the mobile device to display via its user interface some customized alert message.
  • Still another responsive action is to transmit a message (e.g., an email message, an SMS message, or some other type of message) to an external device (e.g., a parent's cell phone, tablet, and/or desktop computer) that indicates that there has been a threshold extent of usage of the mobile device, and/or that there has been an unauthorized settings change to the mobile device itself or to a certain application installed on the mobile device.
  • a message e.g., an email message, an SMS message, or some other type of message
  • an external device e.g., a parent's cell phone, tablet, and/or desktop computer
  • the supervisory device may itself transmit the message or the supervisory device may cause the mobile device to transmit the message.
  • the supervisory device may instead just keep track of the usage of mobile device. For instance, the supervisory device may increment a timer when the supervisory determines that the mobile device is currently in use. The supervisory device may display the contents of timer via a user interface on the supervisory device and/or periodically transmit the contents of the timer to the mobile device or an external device (e.g., a parent's cell phone, tablet, and/or desktop computer).
  • an external device e.g., a parent's cell phone, tablet, and/or desktop computer.
  • the supervisory device may include a user interface that enables a user to input a desired operating time limit of the mobile device, specify the forbidden time periods, and/or set or change other ancillary settings of the supervisory device.
  • the user interface may include an LCD touch-screen display, keyboard, a keypad, a computer mouse, a track ball, a joystick, and/or other similar devices, now known or later developed.
  • the user interface may be accessed within an application downloaded to the mobile device and/or a separate mobile device, such as a parent's cell phone or tablet, for example.
  • the user interface may be secured with a password or other locking mechanism. Accordingly, before the desired operating time, or other settings may be changed, a user may be required to enter the correct password via the user interface.
  • settings of the supervisory device may be changed without the use of the supervisory device's user interface.
  • the supervisory device may be communicatively coupled in some way with the mobile device, and as such, the mobile device may be operable to input a settings change to the supervisory device.
  • the supervisory device and/or the mobile device may be operable to communicate over a wired or wireless interface with one or more external devices (e.g., a parent's cell phone or corporate IT department), and as such, the one or more external devices may be operable to input a settings change to the supervisory device.
  • the wireless interface may be a BLUETOOTH or Wi-Fi interface, although others are possible.
  • the supervisory device may be embedded within (or otherwise comprise) a protective case for the mobile device.
  • the protective case may lock onto the mobile device to help prevent the removal of the supervisory device.
  • the protective case may include one or more ramp-type latches (such as the type commonly used to latch doors in a house).
  • ramp-type latches such as the type commonly used to latch doors in a house.
  • a spring-loaded latch may engage and lock the case closed, perhaps producing an audible “click.”
  • a motive force may retract the latch springs or rotate/slide them out of contact with the protective case's cover.
  • Other designs may include more latches, or even other locking mechanisms altogether.
  • the supervisory device may also include one or more of an external power interface to couple to an external power source and charge the supervisory device's (and possibly also the mobile device's) battery; a user interface and external display in order to facilitate the programming of the supervisory device and display of a remaining permissible operating time of the mobile device; external speakers and/or a microphone for outputting and inputting sound, respectively; shielding material to block the emission of potentially harmful extremely low frequency (ELF) and radio frequency (RF) electromagnetic radiation (EMR); and a kickstand that enables upright positioning of the mobile device on a flat surface.
  • an external power interface to couple to an external power source and charge the supervisory device's (and possibly also the mobile device's) battery
  • a user interface and external display in order to facilitate the programming of the supervisory device and display of a remaining permissible operating time of the mobile device
  • external speakers and/or a microphone for outputting and inputting sound, respectively
  • shielding material to block the emission of potentially harmful extremely low frequency (ELF) and radio frequency (RF)
  • FIG. 2 is a block diagram that depicts an example arrangement of a supervisory device 202 and a mobile device 204 .
  • FIG. 1 may depict a rear view of the mobile device 204 and the supervisory device 202 , in which the supervisory device 202 comprises a protective case for the mobile device 204 .
  • the supervisory device 202 includes a printed circuit board (PCB) 206 that includes LCD display 208 , which may function to display an amount of remaining permitted operating time, buttons 210 , and one or more computing devices ( FIG. 5 ).
  • buttons 210 are used to set a new permissible operating time or otherwise interact with the supervisory device 202 and the PCB 206 , in particular.
  • other user input devices such as a touch screen, are possible as well.
  • the PCB 206 may include a USB interface 212 and a USB interface 214 .
  • USB interface 214 may be configured to couple to an external device (such as a laptop or a parent's cell phone) or an external power source. Via the USB interface 214 , power may be supplied to PCB 206 and to recharge battery 218 . Additionally, power supplied by USB 214 may be routed to the mobile device 204 via USB interface 212 and interface 216 . In this manner, the mobile device 204 may receive power and/or recharge its battery when the supervisory device is coupled to the external power source.
  • the PCB 206 may include program logic that monitors the current draw of the mobile device in order to determine whether it is recharging the battery or whether the battery is fully charged. Such program logic may operate to allow the supervisory device's battery 218 to charge only after the mobile device's battery is fully charged. Other implementations are possible as well.
  • the coupling between USB interface 212 and interface 216 is also a communicative coupling.
  • the PCB 206 may be operable to receive signals from the mobile device 204 that are indicative of various operating states of the mobile device 204 .
  • supervisory device 202 Also included with supervisory device 202 is a headphone/microphone jack 220 that is communicatively coupled to PCB 206 , headphone/microphone jack 224 of mobile device 204 , and a speaker/microphone unit 222 of supervisory device 202 .
  • supervisory device 202 may also include a solenoid 228 that is communicatively coupled to PCB 206 .
  • a solenoid is a device that has a metal shaft encased in an electrical coil. Upon application of power, the metal shaft is pulled to the center of the coil. Depending on which extensions are added to the shaft, the solenoid can be configured for either a pulling or a pushing operation.
  • the PCB 206 may actuate the solenoid 228 such that a moveable portion 232 depresses an on/off button of mobile device 204 in response to determining that the mobile device 204 is currently in use (e.g., via the headphone/microphone jack 224 ).
  • Supervisory device 202 may also include a second solenoid 226 which is configured to physically couple with a lock 234 .
  • the PCB 206 may actuate the solenoid 226 in order to release the lock 234 and allow the supervisory device 202 to be removed from the mobile device 204 .
  • other ways to lock supervisory device 202 to mobile device 204 are possible as well.
  • FIG. 3 depicts an alternate implementation of the solenoid-button interface.
  • the top edge of the supervisory device 202 includes a button 302 that, when depressed, operates to compress a lever 304 and an on/off button 230 of mobile device 204 in order to turn on or off the mobile device 204 .
  • the supervisory device 202 may include a solenoid 306 and lever 304 .
  • the solenoid 306 includes a body 308 and a movable portion 310 . Coupled to the movable portion 310 is a cable 312 , which is coupled to the level 304 .
  • solenoid 306 In operation, power is supplied to solenoid 306 , which operates to force the movable portion 310 of solenoid 306 downward.
  • the PCB 206 may store a charge in a capacitor (not shown) and then release this charge suddenly into the solenoid.
  • the moveable portion 310 retracts downward, it pulls the right portion of the lever 304 via cable 312 and extends a spring 314 . This downward motion operates to bring the lever 304 in contact with the on/off button 230 as the lever 304 pivots at its left-most point.
  • the spring 314 may assist in returning the lever 304 and solenoid 306 to a resting position.
  • the capacitor (not shown) may charge again after a short time period and enable an additional operation of the solenoid.
  • FIG. 4 depicts select portions of the supervisory device 202 and mobile device 204 , in accordance with another implementation.
  • the supervisory device 202 is in the form of a protective case and a dock for the mobile device 204 .
  • the mobile device 204 may be inserted into the protective case of the supervisory device 202 and couple to a plug 402 of the supervisory device 202 via the interface port 216 of the mobile device 204 .
  • PCB 206 may be coupled to this plug 402 and thus mobile device 204 via one or more signal lines 404 .
  • PCB 206 may receive via the interface port 216 various signals that are indicative of the operating state of the mobile device 204 .
  • PCB 206 may also operate to control various portions of software running on mobile device 204 via the interface port 216 .
  • PCB 206 may operate to provide power to mobile device 204 (and a battery (not shown) of mobile device 204 ) via the interface port 216 and plug 402 .
  • FIG. 5 is a block diagram of a computing device 500 that may be included as a part of PCB 206 , in accordance with one example implementation.
  • the computing device 500 may include a user interface module 501 , a communication interface module 502 , one or more processors 503 , and data storage 504 , all of which can be linked together via a system bus, network, or other connection mechanism 505 .
  • the user interface module 501 can be operable to send data to and/or receive data from external user input/output devices.
  • the user interface module 501 can be configured to send/receive data to/from user input devices such as a keyboard, a keypad, a touch screen, a computer mouse, a track ball, a joystick, and/or other similar devices, now known or later developed.
  • the user interface module 501 can also be configured to provide output to user display devices, such as one or more cathode ray tubes (CRT), liquid crystal displays (LCD), light emitting diodes (LEDs), displays using digital light processing (DLP) technology, printers, light bulbs, and/or other similar devices, now known or later developed.
  • the user interface module 501 can also be configured to generate audible output(s), such as a speaker, speaker jack, audio output port, audio output device, earphones, and/or other similar devices, now known or later developed.
  • the user interface module 501 may be used to enter data for use with the methods and systems disclosed herein.
  • a user may manipulate portions of user interface module 501 in order to program the supervisory device with the desired operating time of the mobile device and/or certain time period in which it is desired that the mobile device not be used.
  • the user interface module 501 may include some form of access prevention so that unauthorized users, such as children, are prevented from accessing the user interface and thereby perhaps modifying the desired operating time or adding new time once the desired operating time has elapsed.
  • the access prevention takes the form of a password or key code that is required in order to access the user interface; however, other forms of access prevention are possible.
  • the network-communications interface module 502 can include one or more wireless interfaces 506 and/or wired interfaces 508 that are configurable to communicate via a network.
  • the wireless interfaces 506 can include one or more wireless transceivers, such as a Bluetooth transceiver, a Wi-Fi transceiver, or other wireless transceiver.
  • the wired interfaces 508 can include one or more wired transceivers, such as an Ethernet transceiver, a Universal Serial Bus (USB) transceiver, or similar transceiver configurable to communicate via a wire, a twisted pair of wires, a coaxial cable, an optical link, a fiber-optic link, or other physical connection to a wired network.
  • USB Universal Serial Bus
  • the one or more processors 503 can include one or more general purpose processors and/or one or more special purpose processors (e.g., digital signal processors, application specific integrated circuits, etc.).
  • the one or more processors 503 can be configured to execute computer-readable program instructions 506 that are contained in the data storage 504 and/or other instructions as described herein.
  • the data storage 504 can include one or more computer-readable storage media that can be read or accessed by at least one of the processors 503 .
  • the one or more computer-readable storage media can include volatile and/or non-volatile storage components, such as optical, magnetic, organic or other memory or disc storage, which can be integrated in whole or in part with at least one of the one or more processors 503 .
  • the data storage 504 can be implemented using a single physical device (e.g., one optical, magnetic, organic or other memory or disc storage unit), while in other embodiments, the data storage 504 can be implemented using two or more physical devices.
  • Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also include non-transitory computer-readable media such as computer-readable media that stores data for short periods of time like register memory, processor cache, and random access memory (RAM).
  • Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also include non-transitory computer readable media that stores program code and/or data for longer periods of time, such as secondary or persistent long term storage, like read only memory (ROM), optical or magnetic disks, compact-disc read only memory (CD-ROM), for example.
  • Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also be any other volatile or non-volatile storage systems.
  • Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can be considered computer readable storage media for example, or a tangible storage device.
  • the data storage 504 can include computer-readable program instructions 506 and perhaps additional data.
  • the data storage 504 can additionally include storage required to perform at least part of the herein-described techniques, methods, and/or at least part of the functionality of the herein-described devices and networks.

Abstract

A method and system are provided for monitoring and controlling a mobile device using a supervisory device. In some embodiments, the supervisory device operates in conjunction with the mobile device to monitor an extent of usage of the mobile device as well as to ensure that certain software is being used appropriately. The supervisory device may take one or more responsive actions when an extent of usage of the mobile device reaches a threshold extent of usage, when certain software on the mobile device is not being used appropriately, and/or when certain settings of the mobile device have been changed. The supervisory device may operate in a non-permissible mode and determine that the mobile device is currently enabled. In response to this operation and determination, the supervisory device may disable the mobile device and/or transmit to an external device a notification message.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of U.S. application Ser. No. 14/449,826, filed on Aug. 1, 2014, which claims priority to U.S. provisional application No. 61/861,850 filed on Aug. 2, 2013 and U.S. provisional application No. 61/936,662 filed on Feb. 6, 2014, the entire contents of each of which are incorporated by reference herein.
  • BACKGROUND
  • The ubiquity of mobile computing devices, such as tablet computers, cellular telephones, portable music players, and others, seems to be increasing every day. What is more, the functionality of these mobile devices continue to grow. Today, for instance, many mobile devices feature the ability to play games, take pictures, watch TV and movies, browse the Internet, as well as do many other things.
  • Given this wide array of features, these mobile devices can, at times, be distracting. For example, young children who like to interact with these mobile devices may be overwhelmed by their level of engagement while doing so. As a result, the children may desire use these mobile devices more often or in ways less appropriate than desired by their parents or caregivers. This overuse, may lead to a diminished participation in other activities that might lead to a more well-rounded upbringing.
  • It may be desirable for parents, caregivers, schools, universities, companies, municipalities, government agencies and/or other entities to monitor and control the usage of a particular mobile device (e.g., mobile phones, tablet computers, notebook computers, and/or any other type of computing device). It may also be desirable to control the days and/or times that the mobile device can be powered on and/or control what software can be used on the mobile device and at what times.
  • SUMMARY
  • To this end, disclosed herein are methods and systems for monitoring and controlling a mobile device using a supervisory device. In some embodiments, the supervisory device operates in conjunction with the mobile device to monitor an extent of usage of the mobile device. The supervisory device may be external to the mobile device and may be positioned within a protective case that surrounds the mobile device, for instance. The supervisory device may be communicatively coupled to the mobile device via a wired or wireless interface and may operate to communicate with software on the mobile device to measure an extent of usage of the mobile device. In accordance with some of the embodiments of the present disclosure, the supervisory device may take one or more responsive actions when an extent of usage of the mobile device reaches a threshold extent or an unauthorized change has been made to the mobile device's software. Accordingly, the supervisory device may be useful for parents (or other entities) who want to monitor and/or limit the time their children (or others) spend using the mobile device. The supervisory device may be useful in other circumstances as well.
  • More specifically, but still by way of example, in one embodiment of the disclosed method, a supervisory device may operate in a non-permissible mode and determine that the mobile device is currently enabled. In response to the supervisory device operating in the non-permissible mode and the supervisory device determining that the mobile device is currently enabled, the supervisory device may disable the mobile device.
  • In one embodiment of the system disclosed herein, a supervisory device may include a timer module, a user interface, a button-pressing mechanism, and a computing device coupled to the timer module, user interface, and the button-pressing mechanism. The computing device may be configured to carry out supervisory functions that include receiving via the user interface an indication of a desired operating time of the mobile device, programming the timer module with the desired operating time, decrementing the timer module when the mobile device is in use, and causing the button-pressing mechanism to depress a button on the mobile device when the mobile device is in use and the timer module is fully decremented.
  • These as well as other aspects, advantages, and alternatives will become apparent to those of ordinary skill in the art by reading the following detailed description with reference where appropriate to the accompanying drawings. Further, it should be understood that the description in this overview section and elsewhere in this document is not intended to be limiting but is merely provided to illustrate the concept by way of example.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a flow chart depicting example operations that can be carried out in accordance with the present disclosure.
  • FIG. 2 is a simplified block diagram of a supervisory device and a mobile device arranged to operate in accordance with the present disclosure.
  • FIG. 3 is a simplified block diagram of a solenoid-button interface arranged to operate in accordance with the present disclosure.
  • FIG. 4 is a simplified block diagram of a supervisory device and a mobile device arranged to operate in accordance with the present disclosure.
  • FIG. 5 is a simplified block diagram of an example computing device arranged to operate in accordance with the present disclosure.
  • DETAILED DESCRIPTION
  • In the following detailed description, reference is made to the accompanying figures, which form a part hereof. In the figures, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, figures, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the scope of the subject matter presented herein. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
  • 1. Example Operation of a Supervisory Device
  • Referring to the drawings, FIG. 1 is a flowchart depicting an example process that may be carried out by a supervisory device, in accordance with an example embodiment of the present disclosure. As depicted, the flowchart of FIG. 1 includes several example operations, functions, or actions, as depicted by one or more of blocks 102, 104, and/or 106, each of which may be carried out by any of the systems described herein and by way of FIGS. 2-5; however, other configurations could be used as well.
  • Furthermore, those skilled in the art will understand that the flowchart set forth herein illustrates functionality and operation of certain implementations of example embodiments. In this regard, each block of the flowchart may represent a module, a segment, or a portion of program code, which includes one or more instructions executable by a processor for implementing specific logical functions or steps in the process. The program code may be stored on any type of computer readable medium, for example, such as a storage device including a disk or hard drive. In addition, each block may represent circuitry that is wired to perform the specific logical operations in the process. Alternative implementations are included within the scope of the example embodiments of the present application in which operations may be executed out of order from that shown or discussed, including substantially concurrent or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art.
  • As depicted in FIG. 1, the flowchart begins at block 102 where the supervisory device determines the operation mode of the mobile device. In one embodiment, the supervisory device determines whether the mobile device is enabled, that is, whether the mobile device is in use; or whether the mobile device is disabled, that is, whether the mobile device is not in use. In accordance with this embodiment, when the supervisory device determines that the mobile device is enabled, flow proceeds to block 104. However, when the supervisory device determines that the mobile device is disabled, flow proceeds back to block 102.
  • In order to determine whether the mobile device is enabled the supervisory device may receive a signal from the mobile device that indicates whether or not the mobile device is awake and/or in use. For instance, some mobile devices may include one or more interface ports that couple to various propriety or non-proprietary cables. In some examples, depending on the type of mobile device, these ports may take the form of a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port (such as those that may be found on mobile devices produced by Apple Inc. in Cupertino, Calif.), as well as other types of interface ports. Supplied via these interface ports may be various signal lines that indicate various operating states of the mobile device. In some implementations, one of these signal lines carries a signal that indicates whether the mobile device is in an awake mode or a sleep mode. Accordingly, in this implementation, the supervisory device includes a cable, or built-in docking plug, that couples to this interface port. And in order to determine the operating mode of the when the mobile device (as well as perhaps whether software is operating as intended) the supervisory device may detect the presence (or absence) of the particular signal at the interface port.
  • According to another implementation, a signal that indicates the operation mode of the mobile device takes the form of a particular wireless signal transmitted by the mobile device to the supervisory device. For instance, supervisory software may be installed on the mobile device that is configured to cause the mobile device to emit a detectable wireless signal indicative of whether the mobile device is currently in use. The supervisory device may be appropriately configured to detect the wireless signal such that when determining the operation mode of the mobile device, the supervisory device operates to detect the presence (or absence) of the particular wireless signal. By way of example, the signal may be transmitted and received via a BLUETOOTH or a Wi-Fi interface; however, other wireless protocols may be used as well.
  • According to still another implementation, a signal that indicates the operation mode of the mobile device takes the form of a particular voltage measured at the mobile device's headphone/microphone jack. For instance, some mobile devices, particularly tablet computers and mobile telephones, but other mobile device as well, may include a jack that accepts a ⅛ inch or 3.5 millimeter diameter, three-conductor headphone/microphone plug. Mobile devices may also include a mechanical switch (or other mechanism) that detects when a headphone/microphone plug is inserted into the jack. In response to detecting that a headphone/microphone plug is inserted into the jack, a mobile device may disable any built-in speakers as well as supply a voltage to a particular portion of the jack in order to operate a microphone that is coupled to the headphone/microphone plug. The voltage supplied to the microphone portion of the jack may vary based on whether the mobile device is currently in use. For instance, in one example, the voltage supplied to the microphone portion of the jack when the mobile device is currently in use (e.g., when the mobile device is in an awake mode) is 5V, whereas the voltage supplied to the to the microphone portion of the jack when the mobile device is not currently in use (e.g., when the mobile device is in a sleep mode) is 0.5V. However, other voltages are possible in other examples.
  • Accordingly, in this implementation, the supervisory device may include a cable that plugs into the mobile device's headphone/microphone jack. Thus, when determining the operation mode of the mobile device, the supervisory device may measure the voltage supplied to the plug by the mobile device and determine that the mobile device is currently enabled when the measured voltage is at or near 5.0V, and determine that the mobile device is currently disabled when the measured voltage is at or near 0.5V.
  • In still other implementations, the supervisory device may determine the operation mode of the mobile device based on one or more sensors integrated in or otherwise accessible to the supervisory device. In one example, the supervisory device may be embedded within or otherwise comprise a protective case for the mobile device. The protective case may include a cover that contains one or more sensors that serve to indicate whether or not the cover is closed over the mobile device. The cover being closed over the mobile device may indicate that the mobile device is not in use, whereas the cover not being closed over the mobile device may indicate that the mobile device is in use.
  • Depending on the implementation, one of the sensors may be a magnetic sensor that receives a magnetic signal when the cover is closed over the mobile device. Additionally or alternatively, one of the sensors may be a light sensor that detects the absence of light when the cover is closed over the mobile device. Additionally or alternatively, one of the sensors may include a proximity sensor that detects the proximity of the cover to the face of the mobile device when the cover is closed over the mobile device. Other sensors are possible. And other ways to determine whether the mobile device is currently in use are possible as well.
  • As mentioned above, when the supervisory device determines that the mobile device is enabled, flow continues to block 104 where the supervisory device determines the operation mode of the supervisory device. In one embodiment, the supervisory device determines whether the supervisory device is in a permissible mode, in which it is permitted that the mobile device be used; or whether the supervisory device is in a non-permissible mode, in which it is not permitted that the mobile device be used. In accordance with this embodiment, when the supervisory device determines that the supervisory device is in a permissible mode, flow proceeds back to block 102. However, when the supervisory device determines that the supervisory device is in a non-permissible mode, flow continues to block 106.
  • In one embodiment, the supervisory device may determine the operation mode of the supervisory device by referring to a programmable timing unit. For instance, in one implementation, the supervisory device is operable to program a timing unit with a desired usage allotment (e.g., four hours). Accordingly, after programming the timing unit with an allotment of, say, four hours, the supervisory device may decrement the timing unit when the supervisory device determines that the mobile device is enabled. Thus, in this implementation, the supervisory device may determine the operation mode of the supervisory device by referring to the timing unit and determining whether any time remains on the timing unit. More specifically, when time remains on the programmable timing unit, the supervisory device may determine that the supervisory device is in the permissible mode, whereas when no time remains on the programmable timing unit, the supervisory device may determine that the supervisory device is in the non-permissible mode.
  • In another implementation, the supervisory device operates the timing unit as a traditional timer and increments the timer, starting from zero, when the supervisory device determines that the mobile device is enabled. Thus, in this implementation, the supervisory device may determine the operation mode of the supervisory device by referring to the timing unit and determining whether the elapsed time on the timing unit has reached a threshold amount of time (e.g., four hours). More specifically, when the timing unit has not reached the threshold amount of time, the supervisory device may determine that the supervisory device is in the permissible mode, whereas when the timing unit has reached or exceeded the threshold amount of time, the supervisory device may determine that the supervisory device is in the non-permissible mode.
  • In yet another implementation, the supervisory device is operable to program the programmable timing unit with certain forbidden time periods of the day during which it is desired that the mobile device not be used (e.g., after 10:00 PM and before 8:00 AM). Thus, in this implementation, the supervisory device may determine the operation mode of the supervisory device by referring to a traditional clock and determining whether the current time falls within one of the forbidden time periods. More specifically, when the current time does not fall within one of the forbidden time periods, the supervisory device may determine that the supervisory device is in the permissible mode, whereas when the current time does fall within one of the forbidden time periods, the supervisory device may determine that the supervisory device is in the non-permissible mode. Other mechanisms are possible for keeping track of the extent of usage of a mobile device as well.
  • In some embodiments, the supervisory device may determine that the supervisory device is in the permissible mode despite the fact that no time may remain on the programmable timing unit, the timing unit may have reached or exceeded a threshold amount of time, or the current time may fall within one of the forbidden time periods, as the case may be. In one example of this, the supervisory device may determine whether a pre-approved application is running on the mobile device, and if so, determine that the supervisory device is in the permissible mode without referring to the programmable timing unit. In order to carry out such a determination, a parent (or other administrator of the supervisory device) may program the supervisory device with a list of pre-approved applications (such applications may be applications the parent or administrator determines to be of an educational nature; however, non-educational applications be designated as pre-approved applications as well). In operation, the supervisory device may receive a signal from the mobile device via a wired interface (e.g., a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port) or a wireless interface (e.g., utilizing a BLUETOOTH or Wi-Fi communication protocol) indicating to the supervisory device the name and/or type of application currently running on the mobile device. The supervisory device may refer to the list of pre-approved applications and determine that the supervisory device is in the permissible mode when the application currently running matches one of the pre-approved applications on the list.
  • In addition to determining that the supervisory device is in the permissible mode when a pre-approved application is currently running on the mobile device, the supervisory device may also pause the timing unit or otherwise not keep track of the usage of the mobile device so long as the pre-approved application is currently running on the mobile device. In this way, when a child (or other user of the mobile device) uses a pre-approved application, such use may not count towards the usage allotment. Other ways to determine that the supervisory device is in the permissible mode are possible as well.
  • In a contrasting way, the supervisory device may determine that the supervisory device is in the non-permissible mode despite the fact that some time may remain on the programmable timing unit, the timing unit may not yet have reached or exceeded a threshold amount of time, or the current time may not fall within one of the forbidden time periods, as the case may be. In one example of this, the supervisory device may determine whether a disapproved application is running on the mobile device, and if so, determine that the supervisory device is in the non-permissible mode without referring to the programmable timing unit. In order to carry out such a determination, a parent (or other administrator of the supervisory device) may program the supervisory device with a list of disapproved applications. In operation as described above, in the supervisory device may receive a signal from the mobile device via a wired interface (e.g., a micro USB port, a mini USB port, a LIGHTNING or 30-pin serial data port) or a wireless interface (e.g., utilizing a BLUETOOTH or Wi-Fi communication protocol) indicating to the supervisory device the name and/or type of application currently running on the mobile device. The supervisory device may refer to the list of disapproved applications and determine that the supervisory device is in the non-permissible mode when the application currently running matches one of the disapproved applications on the list.
  • In another example, the supervisory device may determine that the supervisory device is in the non-permissible mode when an unauthorized change has been made to the settings of the mobile device or to certain software installed on the mobile device. In order to carry out such a determination, the supervisory device may be pre-programmed to identify particular changes to a software and its settings, or a parent (or other administrator of the supervisory device) may program the supervisory device with a list of mobile device settings that should be “bodyguarded” (such as a system unlock password, a new application installation password, etc.) and/or a list of applications that should not be uninstalled or otherwise changed. In operation, the supervisory device may periodically poll the mobile device (e.g., via any of the wired or wireless interfaces described above) to determine whether any of the bodyguarded settings have been changed or whether any listed application has been uninstalled or otherwise had a settings change. When the supervisory device determines that a bodyguarded setting or a listed application has been changed, the supervisory device may determine that the supervisory device is in the non-permissible mode without also referring to the timing unit. Other ways to determine that the supervisory device is in the non-permissible mode are possible as well.
  • As mentioned above, when the supervisory device determines that the supervisory device is in the non-permissible mode, flow continues to block 106 where the supervisory device disables the mobile device and, perhaps, carries out one or more additional responsive actions. In one embodiment, disabling the mobile device includes powering down the mobile device, preventing the mobile device from being turned on, putting the mobile device in a sleep or other low-power mode, turning off the mobile device's screen, or otherwise interfering with the ability to effectively view and/or interact with the mobile device. In one implementation of this, the supervisory device may disable the mobile device by sending a signal, either wired via a micro USB port, mini USB port, a LIGHTNING or 30-pin serial data port, as well as other types of interface ports, to software on the mobile device initiating an action that will disable the device. Such a signal may also be sent wirelessly to the mobile device via BLUETOOTH, Wi-Fi, or other wireless communication protocol.
  • In embodiments in which the supervisory device is embedded within (or otherwise comprises) a protective case for the mobile device, the protective case may include a mechanism that operates to mechanically depress a power button on the mobile device. For instance, this mechanism may take the form of a lever and gear arrangement powered by an electric motor with a lead screw or other gearing/pulley arrangement (such as the type commonly used in automobile door locks), a pull or push type solenoid, actuator, a NITINOL spring or other long wire pulling device, a wax motor, or any other type of device. Thus, in these embodiments, the supervisory device may disable the mobile device by actuating this mechanism.
  • In embodiments in which the supervisory device is embedded within (or otherwise comprises) a protective case for the mobile device, an additional or alternative way to disable the mobile device may include manipulating a screen of the protective case so that the protective case's screen interferes with the ability to effectively view and/or interact with the mobile device. In one example of this, the protective case's screen may include a type of electrically-switchable smart glass, such as Electric Frosted Glass, whereby an application of electric current to the protective case's screen may change the opacity of the protective case's screen or otherwise interfere with the visibility of the mobile device. Other ways to manipulate a screen and other ways to disable a mobile device are possible as well.
  • Although not shown in the flowchart of FIG. 1, the supervisory device may take one or more additional or alternative actions in response to determining that the supervisory device is in the non-permissible mode and the mobile device is enabled. One of these responsive actions is to actuate some audible or visual alarm, such as a buzzer, an LED, or both. Another responsive action is to cause the mobile device to display via its user interface some customized alert message. Still another responsive action is to transmit a message (e.g., an email message, an SMS message, or some other type of message) to an external device (e.g., a parent's cell phone, tablet, and/or desktop computer) that indicates that there has been a threshold extent of usage of the mobile device, and/or that there has been an unauthorized settings change to the mobile device itself or to a certain application installed on the mobile device. The supervisory device may itself transmit the message or the supervisory device may cause the mobile device to transmit the message.
  • In an alternative implementation, rather than disabling the mobile device at block 106, the supervisory device may instead just keep track of the usage of mobile device. For instance, the supervisory device may increment a timer when the supervisory determines that the mobile device is currently in use. The supervisory device may display the contents of timer via a user interface on the supervisory device and/or periodically transmit the contents of the timer to the mobile device or an external device (e.g., a parent's cell phone, tablet, and/or desktop computer).
  • In order to facilitate the aforementioned operations, the supervisory device may include a user interface that enables a user to input a desired operating time limit of the mobile device, specify the forbidden time periods, and/or set or change other ancillary settings of the supervisory device. The user interface may include an LCD touch-screen display, keyboard, a keypad, a computer mouse, a track ball, a joystick, and/or other similar devices, now known or later developed. In one embodiment, the user interface may be accessed within an application downloaded to the mobile device and/or a separate mobile device, such as a parent's cell phone or tablet, for example. To help prevent the unauthorized changing of certain supervisory settings (e.g., the desired operating time of the mobile device), the user interface may be secured with a password or other locking mechanism. Accordingly, before the desired operating time, or other settings may be changed, a user may be required to enter the correct password via the user interface.
  • Additionally, settings of the supervisory device, such as the desired operating time limit, or particular applications or software that are permitted to be used, may be changed without the use of the supervisory device's user interface. For instance, the supervisory device may be communicatively coupled in some way with the mobile device, and as such, the mobile device may be operable to input a settings change to the supervisory device. Alternatively, the supervisory device and/or the mobile device may be operable to communicate over a wired or wireless interface with one or more external devices (e.g., a parent's cell phone or corporate IT department), and as such, the one or more external devices may be operable to input a settings change to the supervisory device. By way of example, the wireless interface may be a BLUETOOTH or Wi-Fi interface, although others are possible.
  • As indicated, in some embodiments, the supervisory device may be embedded within (or otherwise comprise) a protective case for the mobile device. As such, the protective case may lock onto the mobile device to help prevent the removal of the supervisory device. Accordingly, in one implementation, the protective case may include one or more ramp-type latches (such as the type commonly used to latch doors in a house). When the protective case is closed, a spring-loaded latch may engage and lock the case closed, perhaps producing an audible “click.” To open the protective case, a motive force may retract the latch springs or rotate/slide them out of contact with the protective case's cover. Other designs may include more latches, or even other locking mechanisms altogether.
  • In addition to the features and functionality described above, the supervisory device may also include one or more of an external power interface to couple to an external power source and charge the supervisory device's (and possibly also the mobile device's) battery; a user interface and external display in order to facilitate the programming of the supervisory device and display of a remaining permissible operating time of the mobile device; external speakers and/or a microphone for outputting and inputting sound, respectively; shielding material to block the emission of potentially harmful extremely low frequency (ELF) and radio frequency (RF) electromagnetic radiation (EMR); and a kickstand that enables upright positioning of the mobile device on a flat surface.
  • 2. Example Supervisory Device Architecture
  • FIG. 2 is a block diagram that depicts an example arrangement of a supervisory device 202 and a mobile device 204. In particular, FIG. 1 may depict a rear view of the mobile device 204 and the supervisory device 202, in which the supervisory device 202 comprises a protective case for the mobile device 204. As depicted, the supervisory device 202 includes a printed circuit board (PCB) 206 that includes LCD display 208, which may function to display an amount of remaining permitted operating time, buttons 210, and one or more computing devices (FIG. 5). In one implementation, buttons 210 are used to set a new permissible operating time or otherwise interact with the supervisory device 202 and the PCB 206, in particular. However, other user input devices, such as a touch screen, are possible as well.
  • Additionally, the PCB 206 may include a USB interface 212 and a USB interface 214. USB interface 214 may be configured to couple to an external device (such as a laptop or a parent's cell phone) or an external power source. Via the USB interface 214, power may be supplied to PCB 206 and to recharge battery 218. Additionally, power supplied by USB 214 may be routed to the mobile device 204 via USB interface 212 and interface 216. In this manner, the mobile device 204 may receive power and/or recharge its battery when the supervisory device is coupled to the external power source. The PCB 206 may include program logic that monitors the current draw of the mobile device in order to determine whether it is recharging the battery or whether the battery is fully charged. Such program logic may operate to allow the supervisory device's battery 218 to charge only after the mobile device's battery is fully charged. Other implementations are possible as well.
  • Furthermore, in some implementations, the coupling between USB interface 212 and interface 216 is also a communicative coupling. In such implementations, the PCB 206 may be operable to receive signals from the mobile device 204 that are indicative of various operating states of the mobile device 204.
  • Also included with supervisory device 202 is a headphone/microphone jack 220 that is communicatively coupled to PCB 206, headphone/microphone jack 224 of mobile device 204, and a speaker/microphone unit 222 of supervisory device 202. As described above, supervisory device 202 may also include a solenoid 228 that is communicatively coupled to PCB 206. As a general matter, a solenoid is a device that has a metal shaft encased in an electrical coil. Upon application of power, the metal shaft is pulled to the center of the coil. Depending on which extensions are added to the shaft, the solenoid can be configured for either a pulling or a pushing operation.
  • For instance, in operation according to one implementation, the PCB 206 may actuate the solenoid 228 such that a moveable portion 232 depresses an on/off button of mobile device 204 in response to determining that the mobile device 204 is currently in use (e.g., via the headphone/microphone jack 224). However, other functions are possible as well. Supervisory device 202 may also include a second solenoid 226 which is configured to physically couple with a lock 234. In one implementation, the PCB 206 may actuate the solenoid 226 in order to release the lock 234 and allow the supervisory device 202 to be removed from the mobile device 204. However, other ways to lock supervisory device 202 to mobile device 204 are possible as well.
  • FIG. 3 depicts an alternate implementation of the solenoid-button interface. As depicted, the top edge of the supervisory device 202 includes a button 302 that, when depressed, operates to compress a lever 304 and an on/off button 230 of mobile device 204 in order to turn on or off the mobile device 204. As an alternative and perhaps autonomous way to turn off mobile device 204, the supervisory device 202 may include a solenoid 306 and lever 304. As depicted, the solenoid 306 includes a body 308 and a movable portion 310. Coupled to the movable portion 310 is a cable 312, which is coupled to the level 304.
  • In operation, power is supplied to solenoid 306, which operates to force the movable portion 310 of solenoid 306 downward. In order to provide a short burst of high current and voltage to operate the solenoid, the PCB 206 may store a charge in a capacitor (not shown) and then release this charge suddenly into the solenoid. As the moveable portion 310 retracts downward, it pulls the right portion of the lever 304 via cable 312 and extends a spring 314. This downward motion operates to bring the lever 304 in contact with the on/off button 230 as the lever 304 pivots at its left-most point. After power is removed from the solenoid 306, the spring 314 may assist in returning the lever 304 and solenoid 306 to a resting position. The capacitor (not shown) may charge again after a short time period and enable an additional operation of the solenoid.
  • FIG. 4 depicts select portions of the supervisory device 202 and mobile device 204, in accordance with another implementation. In this implementation, the supervisory device 202 is in the form of a protective case and a dock for the mobile device 204. As depicted, the mobile device 204 may be inserted into the protective case of the supervisory device 202 and couple to a plug 402 of the supervisory device 202 via the interface port 216 of the mobile device 204. PCB 206 may be coupled to this plug 402 and thus mobile device 204 via one or more signal lines 404. As mentioned above, PCB 206 may receive via the interface port 216 various signals that are indicative of the operating state of the mobile device 204. PCB 206 may also operate to control various portions of software running on mobile device 204 via the interface port 216. In addition, PCB 206 may operate to provide power to mobile device 204 (and a battery (not shown) of mobile device 204) via the interface port 216 and plug 402.
  • FIG. 5 is a block diagram of a computing device 500 that may be included as a part of PCB 206, in accordance with one example implementation. The computing device 500 may include a user interface module 501, a communication interface module 502, one or more processors 503, and data storage 504, all of which can be linked together via a system bus, network, or other connection mechanism 505.
  • The user interface module 501 can be operable to send data to and/or receive data from external user input/output devices. For example, the user interface module 501 can be configured to send/receive data to/from user input devices such as a keyboard, a keypad, a touch screen, a computer mouse, a track ball, a joystick, and/or other similar devices, now known or later developed. The user interface module 501 can also be configured to provide output to user display devices, such as one or more cathode ray tubes (CRT), liquid crystal displays (LCD), light emitting diodes (LEDs), displays using digital light processing (DLP) technology, printers, light bulbs, and/or other similar devices, now known or later developed. The user interface module 501 can also be configured to generate audible output(s), such as a speaker, speaker jack, audio output port, audio output device, earphones, and/or other similar devices, now known or later developed.
  • The user interface module 501 may be used to enter data for use with the methods and systems disclosed herein. Thus, in one implementation, a user may manipulate portions of user interface module 501 in order to program the supervisory device with the desired operating time of the mobile device and/or certain time period in which it is desired that the mobile device not be used.
  • Additionally, the user interface module 501 may include some form of access prevention so that unauthorized users, such as children, are prevented from accessing the user interface and thereby perhaps modifying the desired operating time or adding new time once the desired operating time has elapsed. In some examples, the access prevention takes the form of a password or key code that is required in order to access the user interface; however, other forms of access prevention are possible.
  • The network-communications interface module 502 can include one or more wireless interfaces 506 and/or wired interfaces 508 that are configurable to communicate via a network. The wireless interfaces 506 can include one or more wireless transceivers, such as a Bluetooth transceiver, a Wi-Fi transceiver, or other wireless transceiver. The wired interfaces 508 can include one or more wired transceivers, such as an Ethernet transceiver, a Universal Serial Bus (USB) transceiver, or similar transceiver configurable to communicate via a wire, a twisted pair of wires, a coaxial cable, an optical link, a fiber-optic link, or other physical connection to a wired network.
  • The one or more processors 503 can include one or more general purpose processors and/or one or more special purpose processors (e.g., digital signal processors, application specific integrated circuits, etc.). The one or more processors 503 can be configured to execute computer-readable program instructions 506 that are contained in the data storage 504 and/or other instructions as described herein.
  • The data storage 504 can include one or more computer-readable storage media that can be read or accessed by at least one of the processors 503. The one or more computer-readable storage media can include volatile and/or non-volatile storage components, such as optical, magnetic, organic or other memory or disc storage, which can be integrated in whole or in part with at least one of the one or more processors 503. In some embodiments, the data storage 504 can be implemented using a single physical device (e.g., one optical, magnetic, organic or other memory or disc storage unit), while in other embodiments, the data storage 504 can be implemented using two or more physical devices.
  • Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also include non-transitory computer-readable media such as computer-readable media that stores data for short periods of time like register memory, processor cache, and random access memory (RAM). Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also include non-transitory computer readable media that stores program code and/or data for longer periods of time, such as secondary or persistent long term storage, like read only memory (ROM), optical or magnetic disks, compact-disc read only memory (CD-ROM), for example. Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can also be any other volatile or non-volatile storage systems. Computer-readable storage media associated with data storage 504 and/or other computer-readable media described herein can be considered computer readable storage media for example, or a tangible storage device.
  • The data storage 504 can include computer-readable program instructions 506 and perhaps additional data. In some embodiments, the data storage 504 can additionally include storage required to perform at least part of the herein-described techniques, methods, and/or at least part of the functionality of the herein-described devices and networks.
  • The particular arrangements shown in the Figures should not be viewed as limiting. It should be understood that other embodiments may include more or less of each element shown in a given Figure. Further, some of the illustrated elements may be combined or omitted. Yet further, an exemplary embodiment may include elements that are not illustrated in the Figures. Additionally, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims (25)

What is claimed is:
1. A method comprising:
receiving, at a supervisory device, an indication that a mobile device is enabled, the supervisory device being communicatively coupled to the mobile device;
making a determination, via the supervisory device, whether to disable the mobile device; and
when the determination is to disable the mobile device, disabling the mobile device via the supervisory device.
2. The method of claim 1, wherein the supervisory device is communicatively coupled to the mobile device via a headphone jack on the mobile device, and wherein receiving, at the supervisory device, an indication that a mobile device is enabled comprises the supervisory device measuring a voltage at the headphone jack and determining that the measured voltage exceeds a threshold voltage level.
3. The method of claim 1, wherein receiving, at the supervisory device, an indication that the mobile device is enabled comprises receiving, at the supervisory device, an indication through a wired connection that the mobile device is enabled.
4. The method of claim 1, wherein disabling the mobile device via the supervisory device comprises the supervisory device transmitting through a wired connection a signal that causes the mobile device to be disabled.
5. The method of claim 1, wherein receiving, at the supervisory device, an indication that the mobile device is enabled comprises receiving, at the supervisory device, an indication through a wireless connection that the mobile device is enabled.
6. The method of claim 1, wherein disabling the mobile device via the supervisory device comprises the supervisory device transmitting through a wireless connection a signal that causes the mobile device to be disabled.
7. The method of claim 1, further comprising:
measuring, via the supervisory device, an amount of time the mobile device has been enabled; and
when the amount of time the mobile device has been enabled exceeds a threshold, disabling the mobile device via the supervisory device.
8. The method of claim 1, wherein making a determination, via the supervisory device, whether to disable the mobile device comprises making a determination, via the supervisory device, whether the mobile device is enabled during a forbidden time of day.
9. The method of claim 1,
wherein making a determination, via the supervisory device, whether to disable the mobile device comprises determining that at least one pre-approved application is in-use on the mobile device, and
wherein the method further comprises: in response to determining that at least one pre-approved application is in-use on the mobile device, operating the supervisory device so as to not disable the mobile device so long as the at least one pre-approved application is in-use on the mobile device.
10. The method of claim 1,
wherein the supervisory device is disposed within a case that substantially surrounds the mobile device, the case including a screen, and
wherein disabling the mobile device via the supervisory device comprises manipulating the screen such that viewing of the mobile device through the screen is inhibited.
11. The method of claim 1, further comprising:
establishing operating conditions on the supervisory device by manipulating a graphical user interface (GUI) accessible via the mobile device, and
wherein making a determination, via the supervisory device, whether to disable the mobile device comprises making a determination, via the supervisory device based on the operating conditions established via the GUI, whether to disable the mobile device.
12. A supervisory device comprising:
a case adapted to substantially surround a mobile device; and
one or more computing devices coupled to or disposed within the case, the one or more computing devices being configured to carry out operations including;
being communicatively coupled to the mobile device;
receiving an indication that the mobile device is enabled;
making a determination whether to disable the mobile device; and
when the determination is to disable the mobile device, disabling the mobile device.
13. The supervisory device of claim 12, wherein the one or more computing devices are communicatively coupled to the mobile device via a headphone jack on the mobile device, and wherein receiving an indication that the mobile device is enabled comprises measuring a voltage at the headphone jack and determining that the measured voltage exceeds a threshold voltage level.
14. The supervisory device of claim 12,
wherein receiving an indication that the mobile device is enabled comprises receiving an indication through a wired connection that the mobile device is enabled, and
wherein disabling the mobile device comprises transmitting through a wired connection a signal that causes the mobile device to be disabled.
15. The supervisory device of claim 12,
wherein making a determination whether to disable the mobile device comprises determining that at least one pre-approved application is in-use on the mobile device, and
wherein the operations further comprise: in response to determining that at least one pre-approved application is in-use on the mobile device, operating so as to not disable the mobile device so long as the at least one pre-approved application is in-use on the mobile device.
16. The supervisory device of claim 12,
wherein the case comprises a screen, and
wherein disabling the mobile device comprises manipulating the screen such that viewing of the mobile device through the screen is inhibited.
17. A non-transitory computer-readable medium (CRM) having program instructions stored thereon, which, when executed by a processor, causes the processor to carry out functions comprising:
receiving, at a supervisory device, an indication that a mobile device is enabled;
making a determination, via the supervisory device, whether to disable the mobile device; and
when the determination is to disable the mobile device, disabling the mobile device via the supervisory device.
18. The CRM of claim 17, wherein the supervisory device is communicatively coupled to the mobile device via a headphone jack on the mobile device, and wherein receiving, at the supervisory device, an indication that a mobile device is enabled comprises the supervisory device measuring a voltage at the headphone jack and determining that the measured voltage exceeds a threshold voltage level.
19. The CRM of claim 17,
wherein receiving, at the supervisory device, an indication that the mobile device is enabled comprises receiving, at the supervisory device, an indication through a wired connection that the mobile device is enabled, and
wherein disabling the mobile device via the supervisory device comprises the supervisory device transmitting through a wired connection a signal that causes the mobile device to be disabled.
20. The CRM of claim 17,
wherein receiving, at the supervisory device, an indication that the mobile device is enabled comprises receiving, at the supervisory device, an indication through a wireless connection that the mobile device is enabled, and
wherein disabling the mobile device via the supervisory device comprises the supervisory device transmitting through a wireless connection a signal that causes the mobile device to be disabled.
21. The CRM of claim 17, wherein the functions further comprise:
measuring, via the supervisory device, an amount of time the mobile device has been enabled; and
when the amount of time the mobile device has been enabled exceeds a threshold, disabling the mobile device via the supervisory device.
22. The CRM of claim 17, wherein making a determination, via the supervisory device, whether to disable the mobile device comprises making a determination, via the supervisory device, whether the mobile device is enabled during a forbidden time of day.
23. The CRM of claim 17,
wherein making a determination, via the supervisory device, whether to disable the mobile device comprises determining that at least one pre-approved application is in-use on the mobile device, and
wherein the functions further comprise: in response to determining that at least one pre-approved application is in-use on the mobile device, operating the supervisory device so as to not disable the mobile device so long as the at least one pre-approved application is in-use on the mobile device.
24. The CRM of claim 17,
wherein disabling the mobile device via the supervisory device comprises manipulating a screen associated with a case that is adapted to substantially surround the mobile device such that viewing of the mobile device through the screen is inhibited.
25. The CRM of claim 17, wherein the functions further comprise:
establishing operating conditions on the supervisory device by manipulating a graphical user interface (GUI) accessible via the mobile device, and
wherein making a determination, via the supervisory device, whether to disable the mobile device comprises making a determination, via the supervisory device based on the operating conditions established via the GUI, whether to disable the mobile device.
US15/486,179 2013-08-02 2017-04-12 Method and System for Using a Supervisory Device with a Mobile Device Abandoned US20170223174A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/486,179 US20170223174A1 (en) 2013-08-02 2017-04-12 Method and System for Using a Supervisory Device with a Mobile Device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361861850P 2013-08-02 2013-08-02
US201461936662P 2014-02-06 2014-02-06
US14/449,826 US9699645B2 (en) 2013-08-02 2014-08-01 Method and system for using a supervisory device with a mobile device
US15/486,179 US20170223174A1 (en) 2013-08-02 2017-04-12 Method and System for Using a Supervisory Device with a Mobile Device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/449,826 Continuation US9699645B2 (en) 2013-08-02 2014-08-01 Method and system for using a supervisory device with a mobile device

Publications (1)

Publication Number Publication Date
US20170223174A1 true US20170223174A1 (en) 2017-08-03

Family

ID=52428120

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/449,826 Active 2034-10-22 US9699645B2 (en) 2013-08-02 2014-08-01 Method and system for using a supervisory device with a mobile device
US15/486,179 Abandoned US20170223174A1 (en) 2013-08-02 2017-04-12 Method and System for Using a Supervisory Device with a Mobile Device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/449,826 Active 2034-10-22 US9699645B2 (en) 2013-08-02 2014-08-01 Method and system for using a supervisory device with a mobile device

Country Status (3)

Country Link
US (2) US9699645B2 (en)
EP (1) EP3028058A4 (en)
WO (1) WO2015017797A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147657A (en) * 2019-03-04 2020-05-12 广东小天才科技有限公司 Bluetooth accompanying starting method of wearable device and wearable device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8954290B2 (en) * 2010-09-30 2015-02-10 Fitbit, Inc. Motion-activated display of messages on an activity monitoring device
EP3142382B1 (en) * 2014-05-30 2019-12-04 Huawei Technologies Co., Ltd. Method, apparatus and system for supplying power to active noise cancelling earphone
US20160335424A1 (en) * 2015-05-13 2016-11-17 Google Inc. Unlocking Time to Non-Educational Content
KR102512403B1 (en) * 2016-08-19 2023-03-22 삼성전자 주식회사 Electronic device and a method for reducing a noise of audio signal using the same
WO2018183375A1 (en) * 2017-03-29 2018-10-04 MobileIron, Inc. Correlating mobile device and app usage with cloud service usage to provide security

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040136522A1 (en) * 2002-07-22 2004-07-15 Wurtz Michael J. Headset with auxiliary input jack(s) for cell phone and/or other devices
US20060030955A1 (en) * 2004-08-04 2006-02-09 Lindsay Jonathan M Method and apparatus for controlling power through a power cord
US20070201705A1 (en) * 2006-02-27 2007-08-30 Apple Computer, Inc. Media delivery system with improved interaction
US20100289737A1 (en) * 2006-08-25 2010-11-18 Kyocera Corporation Portable electronic apparatus, operation detecting method for the portable electronic apparatus, and control method for the portable electronic apparatus
US20120327615A1 (en) * 2011-06-27 2012-12-27 Eric Waters Protective casing
US20130069768A1 (en) * 2011-07-20 2013-03-21 Maitreya Visweswara Madhyastha Systems, devices, methods and computer-readable storage media that facilitate control of battery-powered devices
US20130143512A1 (en) * 2011-12-03 2013-06-06 Wavemarket, Inc. System and method for disabling and enabling mobile device functional components

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4032983A (en) * 1973-04-10 1977-06-28 Masaaki Sato Adapter for use in transcribers
US6442106B1 (en) * 1994-12-14 2002-08-27 Jimmy F. Newby Curfew timer apparatus
US5938767A (en) * 1996-08-19 1999-08-17 Horn; Douglas Electronic information lockout system
US8289132B2 (en) 1997-10-27 2012-10-16 Direct Source International, Inc. Locking system for electronic equipment
US7394347B2 (en) * 1997-10-27 2008-07-01 World Wide Innovations, Llc Locking device for electronic equipment
IL140624A (en) 2000-12-28 2003-12-10 David Katzir Method and system for parental internet control
US6726062B2 (en) * 2002-03-11 2004-04-27 Bunn-O-Matic Corporation System for producing beverages
JP2004102743A (en) * 2002-09-11 2004-04-02 Nec Corp Monitoring control system
US20050015612A1 (en) 2003-07-14 2005-01-20 Jing-Lung You Parent-children interactive intelligent management system
US7310740B2 (en) * 2004-08-30 2007-12-18 Dell Products L.P. System and method for a configurable portable information handling system cover switch delay
US20060229108A1 (en) 2005-02-04 2006-10-12 Cehelnik Thomas G Mobile phone extension and data interface via an audio headset connection
EP1798659A1 (en) 2005-12-19 2007-06-20 Axalto SA Personal token with parental control
US8050657B2 (en) 2006-03-28 2011-11-01 Texas Instruments Incorporated Tamper resistant circuitry and portable electronic devices
US20080141293A1 (en) 2006-12-08 2008-06-12 Sony Corporation Convenient parental restriction control of video output
US7853535B2 (en) 2006-12-27 2010-12-14 Colella Brian A System for secure internet access for children
US7912501B2 (en) * 2007-01-05 2011-03-22 Apple Inc. Audio I/O headset plug and plug detection circuitry
KR20100136649A (en) 2009-06-19 2010-12-29 삼성전자주식회사 Method for embodying user interface using a proximity sensor in potable terminal and apparatus thereof
US8385982B2 (en) 2009-12-21 2013-02-26 At&T Intellectual Property I, L.P. Controlling use of a communications device in accordance with motion of the device
US9002272B2 (en) 2010-02-08 2015-04-07 Daniel Friedlaender Method, apparatus, and use of presence detection to control a function of a device requiring a pairing security level
US20110193539A1 (en) * 2010-02-10 2011-08-11 Texas Instruments Incorporated Switching Regulator with Offset Correction
FR2976497A1 (en) 2011-06-15 2012-12-21 Bigben Interactive Sa Accessory for limiting time of play session for user in portable game console, has control unit to limit maximum time of play and time of total play during predetermined period of time at another maximum time of play
US8699998B2 (en) 2011-08-10 2014-04-15 Qualcomm Incorporated Controlling text messages on a mobile device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040136522A1 (en) * 2002-07-22 2004-07-15 Wurtz Michael J. Headset with auxiliary input jack(s) for cell phone and/or other devices
US20060030955A1 (en) * 2004-08-04 2006-02-09 Lindsay Jonathan M Method and apparatus for controlling power through a power cord
US20070201705A1 (en) * 2006-02-27 2007-08-30 Apple Computer, Inc. Media delivery system with improved interaction
US20100289737A1 (en) * 2006-08-25 2010-11-18 Kyocera Corporation Portable electronic apparatus, operation detecting method for the portable electronic apparatus, and control method for the portable electronic apparatus
US20120327615A1 (en) * 2011-06-27 2012-12-27 Eric Waters Protective casing
US20130069768A1 (en) * 2011-07-20 2013-03-21 Maitreya Visweswara Madhyastha Systems, devices, methods and computer-readable storage media that facilitate control of battery-powered devices
US20130143512A1 (en) * 2011-12-03 2013-06-06 Wavemarket, Inc. System and method for disabling and enabling mobile device functional components

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147657A (en) * 2019-03-04 2020-05-12 广东小天才科技有限公司 Bluetooth accompanying starting method of wearable device and wearable device

Also Published As

Publication number Publication date
EP3028058A4 (en) 2017-04-05
WO2015017797A1 (en) 2015-02-05
US9699645B2 (en) 2017-07-04
US20150038133A1 (en) 2015-02-05
EP3028058A1 (en) 2016-06-08

Similar Documents

Publication Publication Date Title
US20170223174A1 (en) Method and System for Using a Supervisory Device with a Mobile Device
US8552856B2 (en) Low battery remote display system
AU2015347444B2 (en) Electronic device and battery charge/discharge control method thereof
US9398456B2 (en) Electronic device with accessory-based transmit power control
CN108574775A (en) Detect the method for the expansion of battery and the electronic equipment using this method
CN108235754B (en) Method and device for prompting user to update application version
US20150070190A1 (en) Sensor Apparatus and Related Methods
US20070130399A1 (en) Controlling an auxiliary display user interface based on usage context
US20170155523A1 (en) Method and apparatus for identifying type of electronic device on smart socket, and storage medium
JP2019506765A (en) Wireless accessory bus for electronic devices
US10345879B2 (en) Capacitance based accessory connection detection for a battery powered unit
KR101411809B1 (en) Method and apparatus for using a portable terminal
US9723408B2 (en) Electronic device and method of preventing erroneous recognizing inserting connector into earphone jack
CN104169856A (en) Sidebar menu display method and apparatus, and terminal
WO2014201863A1 (en) Volume adjusting method, volume adjusting apparatus and electronic device using the same
CN105186232A (en) Interface For Connecting Hardware Components
US20130264998A1 (en) Smart charger for personal media devices
US20150113301A1 (en) Charging method and mobile electronic device
CN103699373A (en) Interface color display method, device and system
WO2016061771A1 (en) Power-on circuit and electronic device
JP2013258478A (en) Portable electronic apparatus, input operation control method, and program
CN108834206B (en) Control method of electronic device and electronic device
US9768816B2 (en) Device cradle and management system
CN203480681U (en) Mobile equipment with remote control function
CN104410900A (en) A method and apparatus for controlling an indicator light installed on an intelligent apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: KID CASE L.L.C., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EINZIG, DAVID;DURAND, GERALD;SIGNING DATES FROM 20140731 TO 20140801;REEL/FRAME:041987/0661

Owner name: KID CASE, INC., NEW JERSEY

Free format text: CHANGE OF NAME;ASSIGNOR:KID CASE L.L.C.;REEL/FRAME:042241/0776

Effective date: 20160930

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION