US20200053099A1 - Management and control of mobile computing device using local and remote software agents - Google Patents
Management and control of mobile computing device using local and remote software agents Download PDFInfo
- Publication number
- US20200053099A1 US20200053099A1 US16/355,367 US201916355367A US2020053099A1 US 20200053099 A1 US20200053099 A1 US 20200053099A1 US 201916355367 A US201916355367 A US 201916355367A US 2020053099 A1 US2020053099 A1 US 2020053099A1
- Authority
- US
- United States
- Prior art keywords
- child
- data
- user
- safety system
- parent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H04L67/22—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- Example embodiments described herein have several features, no single one of which is indispensable or solely responsible for their desirable attributes. Without limiting the scope of the claims, some of the advantageous features will now be summarized. Methods and systems are disclosed for controlling and monitoring aspects of user systems, which may include mobile electronic devices.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can include one or more child software modules.
- the module can be installed on each child's smart phone.
- the module can access and extract data from or about more than one of the smart phone's other software applications, including at least two of the following: a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application.
- the module can further send the extracted data to an analysis server.
- the system can include an analysis server that can identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications.
- the system can include a parent portal. The parent portal can receive results from the analysis server.
- the parent portion can display the results organized by child.
- the parent portal can also provide both generalized smart phone usage data for each child and visual warnings when harmful results have been found by the analysis server, along with the specific underlying data that triggered the warning.
- the parent portal can provide an interface for receiving input from a parent. The input can include selections of which child's data to view and/or selections of which types and how much of the data and analysis results to view for each child.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be configured to access and extract data sufficient to allow the analysis server to report which new applications are downloaded to each child's smart phone, and that information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be configured to access and extract data sufficient to allow the analysis server to report each of the following: which websites were visited using each child's smart phone; and content and timing of each child's posts to social networks. That information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be further configured to access and extract data sufficient to allow the analysis server to report each of the following: the location of the smart phone at periodic intervals throughout the day; and usage of the smart phone that occurs outside of geographic constraints that can be set through the parent portal. That location and usage information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be further configured to access and extract data sufficient to allow the analysis server to report usage of the smart phone that occurs during curfew periods, and that information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following information on the same daily feed screen: identities of people with whom that child communicates most often, including a visual indication ranking those people by frequency or amount of communication; and a daily feed of the child's activities, organized to be sortable chronologically.
- the child's activities can comprise: any smart phone applications downloaded; content of any SMS text messages sent or received; identity of any websites visited; content of any social network posts created, viewed, or sent; and a visual warning incorporated into the daily feed.
- the visual warning can include one or more (or each) of the following: cursing or bullying terms; questionable website visits; and breaking curfew.
- the system can include the following features: for each child, the parent portal can be further configured to display the following information on the same current applications screen: a list of all applications currently installed on that child's phone, a visual warning identifying applications that are identified as potentially harmful based on information in the analysis server, and a description of the functions of each of the applications in the list.
- the system can also include the following features: for each child, the parent portal can be configured to display the following information on the same usage screen: a color chart indicating which applications were used by the child that day, and how much time was spent using those applications.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following: text messages sent and received, with curse words and bullying terms highlighted; a list of most commonly used curse words and bullying terms; and an interface allowing a user of the parent portal to control if text conversations should be flagged automatically, and how many curse words or bullying terms should be allowed before a flag is automatically applied.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following web access information and controls: a whitelist mode that triggers warnings if the child visits any website domain that is not listed as specifically allowed; or a blacklist mode that triggers warnings for only website domains that that are flagged by a user of the parent portal or by the existing database of harmful websites accessible from the analysis server.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include an embedded map feature visible in the parent portal that indicates where each child has traveled during the day and provides a warning if the child leaves a given geographical radius.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include a curfew feature comprising: a control interface in the parent portal configured to allow a user of the parent portal to select restricted times that a child's smart phone may not be used; and an active restriction feature in the child software module configured to completely disable the child smart phone during the restricted times, except for emergency phone calls.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: the parent portal can be further configured provide an interface for receiving input from a parent, the input comprising selections of which types of harmful material should be identified, and what level of scrutiny to apply in determining harmful material.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: a computer that periodically analyzes the selections from many parents regarding types of harmful material and level of scrutiny, analyzes those selections statistically, and incorporates the statistical results in setting default settings and recommendations for future users.
- a system and apparatus for allowing parents to view and track smart phone activities of their children can also include an analysis server configured to automatically identify patterns of harmful content for which helpful works of authorship have previously been created and stored in an electronic library, and provide immediate access to those works of authorship to parents by transmitting an electronic copy thereof or a link thereto to the parent portal for display adjacent to a warning based on harmful content that underlies those patterns of harmful content.
- a computing device can comprise: a communications module; a location determining module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions. Implementation can occur by at least accomplishing the following: retrieve computing device data from the computing device; send computing device data to a control system; and receive a command from the control system based in part on analysis of the sent computing device data.
- Computing device data can comprise at least one of the following: receiving incoming messages using the communications module of the computing device; retrieving outgoing messages sent using the communications module of the computing device; and determining a location of the computing device using the location determining module.
- Computing can comprise one or more of the following: activating the location determining module; disabling the location determining module; disabling the communications module; activating the communications module; and selectively deactivating one or more features of the computing device for a predetermined time period.
- a system for monitoring one or more computing devices can comprise: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions. These can be executed to at least: receive communications data from one or more controlled computing devices; analyze received communications data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- a system for monitoring one or more computing devices can comprise: a memory device comprising a controller module stored thereon as computer-executable instructions; and a hardware processor configured to implement the controller module by executing the computer-executable instructions.
- This implementation can at least: receive location data from one or more controlled computing devices; analyze received location data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- a computing device can comprise: a communications module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions.
- Implementation can at least: select notification settings; receive notification data based on the selected notification settings; and send command data to control an operation of a controlled computing device.
- a computing system can access one or more databases in substantially real-time in response to input from a parent provided in an interactive user interface in order to determine information related to a user system and provide the determined information to the parent in the interactive user interface.
- the computing system can include a network interface coupled to a data network for receiving and transmitting one or more packet flows, a computer processor, and a computer readable storage medium storing program instructions configured for execution by the computer processor in order to cause the computing system to generate user interface data for rendering the interactive user interface on a computing device, the interactive user interface including an indication of a first controlled device associated with a first child of the parent, wherein the indication of the first controlled device is selectable by the parent in order to initiate analysis of usage pattern of the first controlled device and provide results of the analysis to the parent in substantially real-time.
- the programmed instructions can further include transmit the user interface data to the computing device.
- the programmed instructions can include receiving an identification of a selection by the parent of a second controlled device associated with a second child of the parent in the interactive user interface.
- the programmed instructions can also include accessing a database storing analysis data for the second controlled device associated with the second child of the parent.
- the programmed instructions can include updating the user interface data such that the interactive user interface includes indications of at least a subset of determined high frequency contacts.
- the program instructions can include transmitting the updated user interface data to the computing device.
- FIG. 1 illustrates a computing environment including a safety system that can help deter cyberbullying.
- FIG. 2 illustrates a communications monitoring process
- FIG. 3A shows views of a mobile application as it may appear running on a smart phone device.
- FIG. 3B shows three views of a mobile application initiating and sign in process.
- FIG. 3C shows four views of a mobile application sign in and settings process.
- FIG. 3D shows three views of a mobile application activation and device administration process.
- FIG. 3E shows four views of a mobile application setup process.
- FIG. 3F shows two views of a mobile application protected status.
- FIG. 3G shows two views that include a mobile application monitoring status.
- FIG. 4 shows a view of a curfew lockout screen.
- FIG. 5 shows a view of a website that can include a login screen for a system user to access his or her account.
- FIGS. 6A and 6B show a view of a web page that can provide subscription and pricing information.
- FIG. 7 shows a view of a webpage that can assist a user in creating an account and providing name, e-mail, and password information.
- FIG. 8 shows a view of a webpage that can assist a user in creating an account and providing billing information.
- FIG. 9 shows a view of a webpage that can assist a user in preparing to use a safety system by downloading and installing the components.
- FIG. 10A shows a dashboard view with a map.
- FIG. 10B shows an explanation of some of the icons in FIG. 10A .
- FIG. 11 shows a dashboard view with notifications information.
- FIG. 12 shows a view of a notifications screen.
- FIG. 13 shows a view of a device status screen.
- FIG. 14 shows a view of an “Apps” screen.
- FIG. 15 shows a Filters view of a set of SMS (or short message service) screens.
- FIG. 16 shows an Activity view of a set of SMS screens.
- FIG. 17 shows a WWW (or world-wide web) screen.
- FIG. 18 shows a location screen
- FIG. 19 shows a curfew settings screen.
- FIG. 20 shows an account information screen.
- FIG. 21 shows a notification preferences screen.
- FIG. 22 shows a devices screen listing the devices being tracked.
- FIG. 23 shows a log-in screen.
- FIG. 24 shows a user system including a notification (emphasized) received from the safety system over a network.
- FIG. 25 illustrates a user interface including active links for parents to access community features discussed above.
- FIG. 26 illustrates user interfaces that enable users of the systems described herein to ask technical questions about the software including some or all modules of a safety system.
- FIG. 27 illustrates an example a blog user interface generated by a safety system 110 to provide community features discussed above.
- FIG. 28 shows a second portion of the user interface including additional articles.
- FIG. 29 illustrates an embodiment of a user interface including an article or a blog.
- FIG. 30 illustrates an example user interface showing a more detailed overview of a professional listed in the blog roll.
- FIGS. 31 and 32 illustrate example embodiments of a process for enabling systems described herein on one or more user systems
- FIG. 33 illustrates an embodiment of a maps user interface generated by a safety system to show location information of a child's user system on a map 3302 .
- FIG. 34 illustrates an embodiment of a notification administration user interface 3400 generated by a safety system.
- FIG. 35A illustrate an example user interface for activating a safety system on the computing device.
- FIG. 35B illustrates an example user interface generated by a safety system 110 indicating status of a safety system on a particular user system 130 .
- FIG. 36 illustrates an example user interface generated by a safety system indicating that the user system is in curfew mode.
- FIG. 37 illustrates an embodiment of a dashboard user interface generated by a safety system.
- FIG. 38 illustrates an embodiment of a process for generating a dashboard user interface.
- FIG. 39 illustrates another example view of a dashboard user interface.
- FIG. 40 illustrates a photo/video summary user interface.
- FIG. 41 illustrates a dashboard user interface that includes a contacts summary bar.
- FIG. 42 includes a notification summary user interface generated by a safety system.
- FIG. 43 illustrates an application usage interface
- FIG. 44 illustrates a current applications interface
- FIG. 45 illustrates an application installations interface
- FIG. 46 illustrates an embodiment of an SMS activity interface.
- FIG. 47A illustrates an embodiment of an SMS filters interface.
- FIG. 47B illustrates another embodiment of an SMS filters interface.
- FIG. 47C illustrates search filters in the embodiment of SMS filters interface shown in FIG. 47B .
- FIG. 47D illustrates an embodiment of an SMS analytics interface.
- FIG. 48 illustrates a web access interface
- FIG. 49A illustrates an embodiment of a location interface.
- FIG. 49B illustrates an embodiment of a location history interface.
- FIGS. 49C-49I illustrate embodiments of location tracking interfaces.
- FIG. 50A illustrates an embodiment of a curfew interface.
- FIG. 50B illustrates another embodiment of a curfew interface.
- FIG. 51 illustrates an embodiment of a master account user interface.
- FIG. 52 illustrates another embodiment of an account user interface.
- FIG. 53 illustrates another embodiment of an account user interface.
- FIG. 54 illustrates a user system that can implement some functions of a safety system.
- FIG. 55 illustrates using a remote computing system to track activities of a mobile device.
- FIG. 56 illustrates an example sequence for detecting and listing installed applications on a device.
- FIG. 57 illustrates an example sequence for web/browser filtering and application purchase restrictions.
- FIG. 58 illustrates an example sequence for curfew or other time-based blocking.
- FIG. 59 illustrates a computing environment for monitoring activities of a mobile device.
- FIG. 60 illustrates an example process for flagging activities on a person's mobile device.
- FIGS. 61A, 61B, 62A, 62B, 63-65, 66A, 66B, and 67-72 depict example user interfaces for a safety system.
- FIG. 73 shows a generalized structure for a computer system that can perform functions described herein.
- FIGS. 74-79 show example code excerpts.
- the system and method described herein can advantageously be implemented using computer software, hardware, firmware, or any combination of software, hardware, and firmware.
- the system is implemented as a number of software modules that comprise computer executable code for performing the functions described herein.
- the computer-executable code is executed on one or more general purpose or specialized computers.
- any module that can be implemented using software to be executed on a general purpose or specialized computer can also be implemented using a different combination of hardware, software, or firmware.
- such a module can be implemented completely in hardware using a combination of integrated circuits.
- such a module can be implemented completely or partially using specialized computers designed to perform the particular functions described herein rather than by general purpose computers.
- any two or more databases can be combined into one database and that any one database can be divided into multiple databases.
- Multiple distributed computing devices can be substituted for any one computing device illustrated herein. In such distributed embodiments, the functions of the one computing device are distributed such that some functions are performed on each of the distributed computing devices.
- Cyberbullying is generally defined as bullying that takes place using electronic technology.
- Electronic technology can include devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat services, and websites.
- Phone safety can also include reducing or preventing use of a phone while driving.
- Safety systems can assist parents in monitoring and controlling their children's mobile devices, including, for example, the content stored on them or accessed by them, messages received and transmitted by them, etc. Parents can track location of the their children through mobile devices and set up virtual location “fences” as described more in detail below.
- Safety systems can mine data in text messages (or other communications), filter, and send reports to parents. In some embodiments, a report may be sent to a law enforcement agency or other services, depending on the nature of the messages. Safety systems can also analyze non-written communications, including pictures and videos.
- Web safety systems can include the following components that can work together or independently.
- an analysis engine that uses filters and search logic.
- This can comprise a web based crawler and back-end logic designed to continuously or periodically search, filter, or “crawl” social network accounts and flag conversations with illicit content (for example, undesirable content as may be defined or determined by a user).
- a crawler or back-end logic can be located on a server and accessible through the web or a network 102 , and the analysis engine can be part of or accessible by the analysis module 112 of the safety system 110 .
- Such an analysis engine may also be at least partially included in a safety system plugin 132 that may be located on or close to a user system 130 .
- the analysis engine or analysis module 112 can be distributed between various processors, including one or more of the following: a processor in a user system 130 , a processor in the “cloud” or accessible from the network 102 , a third party system 104 , and/or a processor in a computer or device having access to a parent portal.
- a parent can input user parameters 140 using a user system control module 118 to help select and determine what the back-end logic or crawler delivers to the parent through a user interface module 116 .
- a system can include a mobile application with various social monitoring and safety related features such as GPS/geolocation-based monitoring (for example, monitoring a child's location for safety purposes), mobile web filtering/blocking, parental notification (for example, alerts regarding keywords, new application installation, application usage, etc.), and SMS/Text message monitoring or blocking, call blocking, and/or phone lockout (for example, inhibition of functionality while driving).
- GPS/geolocation-based monitoring for example, monitoring a child's location for safety purposes
- mobile web filtering/blocking for example, mobile web filtering/blocking
- parental notification for example, alerts regarding keywords, new application installation, application usage, etc.
- SMS/Text message monitoring or blocking for example, call blocking, and/or phone lockout
- raw data can be gathered locally at a user system 130 (e.g., using a camera, a GPS, a microphone, an accelerometer, from its memory, from other software applications, etc.) and either partially processed by a safety system plugin 132 or sent directly over the network using a communications module for analysis (or further analysis) by an analysis module 112 of a safety system 110 .
- a safety system plugin 132 can be especially helpful in controlling the local functionality of a user system 130 .
- a website interface for example, an administration portal, user community, etc. to allow users (for example, parents) to review reports and details of protected individual's (for example, their children's) activities, subscribe or contribute to services such as crowd-sourced website black lists or white lists, and/or modify various parameters of the monitoring software.
- this website interface can be a user interface module 116 and/or an account management module 120 , and it can be accessible via the network 102 , for example.
- this back-end can be included in the analysis module 112 ; it can be located remotely and accessible through the network 102 ; it may contribute the system parameters 150 and be administered by a system administrator 108 .
- FIG. 1 illustrates an embodiment of a computing environment 100 including a safety system 110 that can monitor and control a user system 130 .
- a safety system is not limited to those items in the box 110 but also includes one or more of the other illustrated elements in the environment 100 .
- a server, a home computer, and a mobile device can act in concert, each having some locally-installed software and communicating with each other through the web or a network.
- User system 130 is illustrated as a single item for convenience but represents one or more user systems 130 .
- the user systems 130 can include any type of computing device capable of executing one or more applications and/or accessing network resources.
- the user systems 130 can be one or more desktops, laptops, netbooks, tablet computers, smartphones, PDAs (personal digital assistants), servers, smartwatches, computerized eyewear, smart augmented-reality wear, e-book readers, video game platforms, television set-top boxes (or simply a television with computing capability), a kiosk, combinations of the same, or the like.
- the user systems 130 can include software and/or hardware 132 for accessing the safety system 110 , such as a browser or other client software (including an “app”).
- some or all of the modules of the safety system 110 can be installed as application software on the user system 130 .
- the safety system 110 can control and/or monitor user systems 130 via one or more modules of the user system 130 .
- the user systems 130 can include a communication module (not shown) having an antenna for receiving and sending communications data.
- the user system control module 118 of the safety system 110 can block access to or disable the communications module. Accordingly, the user system control module 118 can prevent user systems 130 from transmitting or receiving communications.
- the user system control module 118 can also control the user system 130 through various other technical channels. For example, even though the control module 118 may monitor a communication module (e.g., as radio frequency transmissions are prepared or transferred to or from an antenna within the user system 130 ), the control module 118 may use a separate channel to exert control over the system 130 . Thus, as a result of monitored communications, a user interface may be controlled, locked, blocked, etc. Thus, passive monitoring and active control can be relatively independent as a technical matter, but the two functions can be related through logic or programming within the safety system 110 . This can allow greater flexibility in effectuating control and control can be asserted through multiple channels simultaneously or in a contingency arrangement.
- a communication module e.g., as radio frequency transmissions are prepared or transferred to or from an antenna within the user system 130
- the control module 118 may use a separate channel to exert control over the system 130 .
- a user interface may be controlled, locked, blocked, etc.
- passive monitoring and active control can be relatively independent as
- control module 118 can revert to a mode that instead controls an interface of the system 130 , thereby achieving the same ultimate goal through a different technical channel.
- This control redundancy can make the safety system 110 more robust because it can defeat efforts to circumvent its controls. That is, if a child attempts to avoid parental controls in one channel, another channel may allow the parental controls to nevertheless prevail. Moreover, some operating systems may be more difficult to interface with.
- a safety system 110 may work through multiple channels to control user systems 130 , one or more of those channels may be more feasible to implement as the safety system 110 is configured to work with a more closely-guarded underlying operating system.
- Monitoring and control directed by a user system control module 118 can occur at one or more of the root level, a middle level, or a superficial level of a user system 130 .
- the user system control module 118 can intercept or otherwise access and analyze image or video feeds from or to the camera module of the user systems 130 .
- the analysis module 112 of the safety system 110 can intercept and analyze live capture of images or a video feed and determine whether it is appropriate for storage in the memory of the user system 130 or for transmission. Based on the determination, the user system control module 118 can block storage or transmission of the images or video feed. Thus, it can prevent, inhibit, deter, or monitor the taking or receiving inappropriate pictures.
- the user system control module 118 can, in some circumstances, turn on the camera module of the user system 110 . This may be useful to identify the location of the user system 110 or determine if the child is in danger.
- the safety system 110 can use a microphone of the user system 130 to receive an audio signal and further determine safety of the child based on parsing the audio.
- the safety system 110 can monitor for certain words (like “help”) or sounds (like “crying” or “screaming”).
- the safety system 110 can use the communications module of the user system 130 to send alerts (for example, to parents or authorities) based on analyzed image, video, or audio.
- the safety system 110 can use the speaker of the user system 130 to output an alarm in an event of danger.
- the user system control module 118 can receive information from a GPS module and/or an accelerometer module of the user system 130 . Based on the received information, the user system control module 118 can identify the location and/or calculate speed of the user system 130 .
- the analysis module 112 can supplement with accelerometer data when the GPS data is not available to determine motion of the user system 130 .
- speed, acceleration, and/or relative location data can be collected, analyzed and/or used using the information in U.S. Pat. No.
- the safety system 110 can measure heart rate of a user and track speed of the user device concurrently to avoid false positives such as when the user is exercising or walking.
- the safety system 110 can also access accelerometer data from the user system 130 to determine that a person is running instead of driving.
- the third and fourth examples provided above are examples of how a safety system 110 can control and/or monitor user systems 130 . These demonstrate how a mobile device can become a valuable tool to gather and potentially transmitting information, acting as like an airliner's “black box,” a homing beacon, a child tracking device, and/or as a distress signal in various situations.
- software on a mobile phone can allow a child, for example, to activate a distress signal that will record and/or transmit location information, sounds, pictures, etc. without alerting a would-be kidnapper to the transmissions.
- some embodiments may transmit such emergency information in periodic spurts, for short amounts of time, to enable a longer emergency operation mode.
- Such an emergency mode can be activated readily, or it can require a password or other verification to avoid improper or inadvertent uses.
- the systems described herein can deter or assist in resolving not only cyber-bullying, but also help remediate other more drastic and immediate physical dangers such as kidnapping.
- one or more software portions of the safety system 110 can be installed locally on the user system 130 .
- the safety system can comprise an application that accomplishes many monitoring and control functions locally, while still accepting input and control from a separate user system.
- a parent may be able to log in to a user system control module 118 or account management module 120 and configure settings for the safety system 110 , but those settings can be implemented through software or other modules that are locally present on a child's mobile device, which can be a user system 130 .
- the safety system 110 can facilitate safe communication (e.g., through encryption) between the locally-installed software and the web-accessible account management module 110 (which can act as a parental settings/monitoring portal).
- a parent may be able to select and input user parameters 140 , to decide levels of scrutiny and filtering that should be applied to a child's device (which can be a user system 130 ).
- the safety system 110 can be integrated with the third party tools through a plug-in or an API (application programming interface).
- the third party tools may come pre-installed with a plug-in to the safety system 110 .
- a plugin to the safety system 110 may be installed on to a third party tool.
- a third party tool can include text/SMS client, an email client, a web browser, a social networking client (for example Facebook, Twitter, etc.), an image capture client, etc.
- the safety system 110 can be implemented in computer hardware and/or software.
- the safety system 110 can execute on one or more computing devices, such as one or more physical server computers. In implementations where the safety system 110 is implemented on multiple servers, these servers can be co-located or can be geographically separate (such as in separate data centers).
- the safety system 110 can be implemented in one or more virtual machines that execute on a physical server or group of servers. Further, the safety system 110 can be hosted in a cloud computing environment, such as in the Amazon Web Services (AWS) Elastic Computer Cloud (EC2) or the Microsoft® Windows® Azure Platform.
- AWS Amazon Web Services
- EC2 Elastic Computer Cloud
- Azure Platform Microsoft® Windows® Azure Platform
- the user systems 130 can remotely access some or all of the safety system 110 on these servers through the network 102 .
- the user systems 130 can include thick or thin client software that can access the safety system 110 on the one or more servers through the network 102 .
- the network 102 may be a local area network (LAN), a wide area network (WAN), such as the Internet, combinations of the same, or the like.
- the network 102 can include any combination of associated computer hardware, switches, etc. (for example, an organization's private intranet, the public Internet, and/or a combination of the same).
- the user software on the user system 130 can be browser software or other application software.
- the user system 130 can access the safety system 110 through the browser software.
- some or all of the safety system 110 's functionality can be implemented on the user systems 130 .
- a safety system plugin 132 can be part of a user system 130 .
- This plugin 132 can periodically communicate through a network 102 with a safety system 110 using, for example, a communications module of a user system 130 .
- This arrangement can allow for a safety system 110 to offload intensive processing to a server rather than a user system 130 if that system 130 is a smart phone, for example.
- any filtering algorithms, image analysis, etc. would tend to bog down a mobile processor or make the safety system 110 less transparent or more intrusive to operation of a user system 130 , this can be mitigated by instead feeding raw data to a server or a home computer that is also part of or accessible by the safety system 110 .
- FIG. 1 shows various components of a computing environment 100 .
- a network 102 can facilitate communication between components of the system.
- a system administrator 108 can use the network 102 to confirm that safety systems 110 (e.g., as used and overseen by parents) are properly monitoring and controlling user systems 130 (e.g., as used by their children).
- a system administrator 108 can also provide system parameters 150 to the safety system 110 .
- a safety system 110 can effectively interpose its filters between a user system 130 and various ways in which that user system interacts with the world, whether through any network 102 (including the world wide web) or otherwise.
- a safety system in conjunction with parental interactions can form a protective shield for transmissions to or from a camera, a communications module, a memory, a microphone, and/or a speaker of the user system 130 . Even the user systems 130 attempts to access third party sites 106 or third party systems 104 can be monitored and/or controlled.
- the safety system 110 can control and/or monitor the user systems 130 .
- the safety system 110 can monitor, filter, and/or block communications.
- FIG. 2 illustrates an embodiment of a communication monitoring process 200 for monitoring, filtering, and/or blocking communications sent or received at user systems 130 .
- the communications monitoring process 200 can be implemented by any of the system described above. For illustrative purposes, the process 200 will be described as being implemented by components of the computing environment 100 of FIG. 1 .
- the process 200 depicts an example overview of monitoring and filtering communications. In some embodiments, communications monitoring may also be implemented as described herein with respect to SMS Agent.
- the process 200 begins at block 202 when the communications module of the user system 130 receives or is in the process of sending a communication.
- the communication may include, without limitation, a text/SMS message, a chat message, an audio message, a video message, a multi-media message (MMS), an e-mail, etc.
- the user systems controls module 118 can intercept the communications.
- the communications can be intercepted using the following hardware and technical protocols, for example.
- the safety system 110 can capture packets received at the communications module of the user system 130 .
- the safety system 110 can detect whether these packets include messages, for example, Whatsapp message, SnapChat messages, Facebook messages, etc.
- the intercepted messages can be stored in a data store 140 and analyzed as described herein.
- These communications can then be analyzed by the analysis module 112 at step 204 . Some or all of this analysis can occur either onboard a user system 130 , on a server accessible through the network 102 , and/or within a safety system 110 that may be installed on a personal computer of a parent for example.
- the analysis module 112 can review the content and source of the communications and determine, for example, whether the communications contain content that should be blocked or filtered, as indicated at step 206 .
- This analysis can use external or internal sources (e.g., a dynamic dictionary of regional terminology, dictionaries of urban slang, a database maintained by a system administrator 108 , one or more databases updatable by a community of users, specific language or country resources, etc.) against which to compare this content.
- the communication may contain illicit content such as profanity or inappropriate images.
- An analysis process can include comparison of words and word groups to identify not only explicit language but also aggressive language, explicit and implicit threats, etc. Analysis can also review frequency (harassing or distracting rapidity of test messages, for example) to determine if a perpetrator is hounding a child with frequent messages or transmissions. Analysis can review metadata for attachments to determine if they are named in a manner that indicates danger or indicates provenance from or association with pornographic websites for example. Communications can also be analyzed to identify moods, such as neutral, or happy or sad or depressing. Mood analysis can be a function of keyword search and/or machine learning.
- the safety system 110 can generate alerts based on the identified mood of the messages (or social media communications) sent or received by the users. Accordingly, the safety system 110 can identify and trigger alerts for depression or suicide. Alerts may be received via postcard notifications on iOS or Android devices.
- intercepted communications can be analyzed—and a safety system 110 can perform SMS filtering and searching to achieve the views shown in FIGS. 15, 16, 46 , and/or 47 , for example—using the following technical protocols.
- the safety system 110 can call operating system hooks to access SMS messages or other social media data. Operating system hooks can include Android App Managers such as SMS Receiver.
- the safety system 110 can call these hooks over a periodic time interval.
- the safety system 110 can continuously monitor the communications, however, that might drain the battery of the user system 110 . Accordingly, the period may be balanced with respect to battery life conditions.
- the safety system 110 can poll for data every 15 minutes.
- the safety system 110 can send polled data to server for storage and analysis.
- the safety system 110 can capture video or snapshots of the display of the user device 130 to track and analyze data.
- the safety system 110 can also modify the user system 130 on the firmware level. Accordingly, in some instances, the safety system 110 can operate at a lower level than the operating systems to interface directly with the hardware modules.
- the user system control module 118 can accordingly block or filter the intercepted communications (or take another alternative or additional action such as alerting a user) at step 208 based on the determination from the analysis module 112 .
- Blocking can include any one of the following operations: not storing the communication in the user system's memory, preventing the communications module from transmitting the communications, not showing the intercepted communications in the user interface of the user system, deleting, responding with a message that indicates the message was not received and the future messages will also be blocked, re-routing the message to another destination (such as a parent portal or school administrator), responding with an automatically-generated kind and conciliatory message, automatically responding with a reference to reporting, potential legal action, etc.
- Alerting a user can include passively recording events or items so that a user can look them up later, or it can include actively sending a notification message to a user.
- Filtering can include removing some or all content of the communication.
- filtering can include substituting some content of the communication such as words (for example substituting the word “shucks” for the word “crap”). Certain images may also be blocked, redacted, censored and/or substituted.
- Filtering can include completely deleting harmful or bullying messages from a user system 130 , and/or filtering can include re-routing those messages to a parent that may access the system through a user interface module 116 .
- communications may be blocked or filtered depending on the sender or recipient.
- Certain senders or recipients may be on a block list.
- the block list may be created by users (for example, parents) through an administrative portal through an account management module, for example.
- the block list may also be automatically created based on number of communications, frequency of communications, or information received from a third party system.
- a system can include a web browser or an add-on to a web browser that includes its own blocking, alerting, and/or filtering functionality. Such functionality can be accomplished through socket or port monitoring, proxy filtering or diversion, etc.
- Block lists can also be created and updated centrally by a system administrator 108 , for example.
- Block lists can be maintained for various categories, allowing a user to subscribe to filtering or blocking of a category of objectionable sites or material, while allowing other material that may be objectionable to some, but not that particular user.
- a multi-level hierarchy of blocking sensitivity can be created to allow a more trusted user to have access to some information (e.g., medical information that may be blocked for younger users due to anatomical references.) All examples of blocking or filtering provided herein can additionally or alternatively comprise sending an alert or notification.
- an alert can be transmitted relating to an intercepted communication.
- the alert can take one or more forms, and can depend on the result of the analysis 204 .
- the alert results in an objectionable word, phrase, or image appearing in a feed viewable by a parent and associated with the child, along with the sender of that word or image.
- a parent can view all communications with his or her child, along with a breakdown of the people communicating with their child and the relative frequencies of those communications.
- a safety system can be used to “trust but verify” (in the case where blocking or filtering may be turned off in favor of active alerts or passive logging).
- an alert relating to the intercepted communications can additionally or alternatively be transmitted to parents or a third party system.
- the safety system can also store intercepted communications in a user data repository 140 . Parents can review all intercepted communications from the user data repository 140 using an administrative portal user interface described more in detail below.
- an analysis and/or filter can be applied at various physical locations—a child's device, a server, a parent's device, etc.—raw data and/or alerts can be sent directly from a child's smart phone to a parent device, they can be sent from a server to a parent device, and/or they can be sent within a parent's device. Timing of alerts is advantageously rapid. Real-time alerts can be helpful to identify harmful behavior rapidly and aid a timely response. Real-time can refer to various relatively short delay periods, including a few seconds, one or a few minutes, one or a few hours, same-day alerts, etc. Factors that affect a delay before an alert (although that delay may not be inconsistent with real-time delivery) can include: internet connection speeds and availability, cell phone provider service, available processor speed for analysis algorithms and technical protocols, and various application-specific factors.
- various aspects of a child's device can be monitored and alerts or notifications can be provided to a parent.
- the general alert process can be accomplished using the following technical protocols.
- alerts can be processed through a push protocol.
- the safety system 110 can analyze the monitored content and make a determination to push messages to the parent device.
- the messages may be pushed according to a priority determination. For example, certain alerts relating to a child leaving a particular geofence may be pushed right away. Other alerts including child's usage of offensive words may be sent in an email report or shown on a dashboard when the parent logs into the system. Accordingly, the safety system 110 can determine priority levels of alerts and push them accordingly.
- parents may also want to filter content from various software applications on the user systems 130 , such as web browser clients, social networking clients, SMS, MMS, etc.
- the techniques, protocols, principles, and approaches described elsewhere in this application with respect to analyzing, filtering and blocking functionality can also apply here.
- the user systems 130 may be blocked from sending messages or posting content in some applications.
- parents may want to be alerted to various activities, or to prohibit their kids from posting pictures with alcohol or drugs on social networking sites.
- Parents may also want to be alerted or to prevent cyberbullying via social networking sites.
- the safety system 110 can crawl through social networking or other accounts of individuals to be protected (for example, children).
- the safety system 110 can also work as a plug-in for these applications.
- the safety system 110 can review the content and determine any content to block or flag for review via the administration portal or user interface module 116 .
- application monitoring, filtering and blocking may also be implemented as described herein with respect to Apps Agent.
- the safety system 130 can alert a user and/or prohibit, inhibit, or block downloading and installation of certain applications.
- the safety system 130 can assess applications to be blocked using an application block list that may be defined by parents or dynamically maintained by a system administrator 108 or a third party system 104 , and be accessible to the safety system 110 , which can access and copy such a block list or comparison database periodically.
- the safety system 130 , a system administrator 108 , or others can dynamically maintain the app block list based on crowd-sourcing, allowing users of the system to give feedback about what applications should or should not be included, or discriminating between various levels of protection in a refined hierarchy of block lists.
- the safety system 130 can use selections, reviews and/or ratings from a plurality of users to dynamically maintain the app block list.
- the safety system 130 can automatically send an alert or prepare a report when new applications are installed on a user system.
- the reports may be sent daily.
- Parents may also see these reports of the user system 130 on an administrative portal.
- the report may include the application name, the description of the application, the date and time of installation, and application rating/reviews.
- the safety system 110 can remove an application from the user system 130 based on an input. For example, parents can remotely via the administrative portal select removal of a particular application from their child's phone.
- a safety system 110 can identify, analyze, uninstall, and/or block installation of software applications on a user system 130 using the following technical protocols.
- the safety system 110 can call an operating system content provider to retrieve status of applications.
- the status of the applications can include which applications are installed or removed.
- the status can also include whether the application is active or running in the background.
- the safety system 110 can call operating system hooks to retrieve status of the applications.
- the data store 140 may partially reside in the memory of the user system 130 .
- the user system 130 may have restrictions on available data space. However, sending data continuously may tax battery and bandwidth.
- data is stored locally for a certain time period before being transferred to a server.
- data may be stored locally for 15 minutes before transfer to an external location.
- the local cache can be deleted after a predetermined time period or once a predetermined capacity is reached.
- the safety system can also block content from certain websites by filtering or substitution. Some websites may be completely prohibited. Some approaches to filtering, blocking, and alerts can include creation, storage, and updating of one or more black lists or white lists. These lists can comprise a look-up table that lists names, URLs, or other identifying indicia of the sites, sources, or content that will trigger the relevant action. For example, a black list of undesirable websites can be downloaded or accessible automatically by an application for a mobile device.
- Black lists can be dynamically maintained by a user-community and various objectionable materials can be classified using a code system (for example, “po” for pornography, “pr” for profanity, “nu” for nudity, “vi” for violence, “dr” for drugs, etc.)
- a code system for example, “po” for pornography, “pr” for profanity, “nu” for nudity, “vi” for violence, “dr” for drugs, etc.
- Existing rating systems can be employed or expanded (for example, motion picture or electronic gaming ratings can be used).
- Content can also be assigned a relative severity on a numeric scale, for example. Users can rate content and an average can be used to automatically include or not include certain content or websites in a black or white list. Users can then determine their desired level of sensitivity and subscribe to one or more sets of black lists or white lists.
- Black lists can also include graphic images, for example of gang symbols, genitalia, other body parts, etc., and these can be used as reference libraries against which to compare unlisted content with graphical algorithms. These concepts relating to user interaction, black lists, white lists, etc. can apply to blocking, filtering, and alerts with respect to both applications and web pages, and message content. In some embodiments, website monitoring may also be implemented as described herein with respect to WWW Agent.
- the monitoring, blocking, filtering, and/or alert functions described herein can be used to combat inefficient behavior by students and/or employees on the job.
- the system can not only improve safety but it can deter time-wasting activities and improve productivity.
- the system can scan stored files (such as website bookmarks, stored favorites, etc.) in order to generate alerts or other blocking or filtering activity. Some embodiments can allow removal of undesirable bookmarks, websites, etc.
- the system can employ key-logging, spy-bots, ad-ware techniques, etc. (techniques pioneered by more subversive enterprises) in the service of the greater causes of improving safety, avoiding or recording evidence of illicit activities, cyber bullying, etc.
- a safety system 110 can identify, analyze, inhibit access to, send alerts related to, and/or block content from websites or other internet sources on a user system 130 using the following technical protocols.
- the safety system 110 can poll content provider of the operation systems to retrieve URLs accessed by users.
- the content providers may access device drivers which may control hardware (such as communications control and GPS) of the user systems 130 .
- the safety system 110 can poll respective content providers for specific information including telephony services, URLs, SMS, application monitoring.
- FIG. 3A illustrates views of an example safety system plugin (e.g., the plugin 132 ) that may be installed as a software application on a mobile device or smartphone (which can be a user system 130 , for example).
- An application can be downloaded to the smartphone, and the introduction view 310 can be shown upon launch of the application.
- Selection of the “how does this app work” button can result in the tutorial view 316 , which can include multiple screens.
- Selection of the login button can result in the log in view 318 .
- Selection of the log in button after user credentials have been entered can result in a current status view 320 .
- a log out control 322 can be provided, allowing entry of a password. Log out can be restricted to a parent or an account holder who installed the mobile application and may not be available to any user of the mobile device.
- FIG. 3B shows three views of an example mobile application initiation and sign in process.
- a subscription reminder screen 332 can remind a user who has downloaded an application to subscribe and/or install additional software that will interact with the mobile application (or plugin 132 ). That additional software can provide analysis and reporting features such as those described herein with respect to safety system 110 .
- An “OK” button control can allow a user to close the reminder screen 332 , and this can allow additional screens to be viewed.
- One of the additional screens can be a sign in screen 334 , which can have a sign in button and also provide information (and access to further information, e.g., through a hyperlink or active control illustrated here to say “How does WebSafety work” thereon) regarding the features and usefulness of a safety system 110 .
- Another additional screen can be a sign up screen 336 , which can be web accessible and allow a user to obtain a subscription.
- FIG. 3C shows four views of a mobile application sign in and settings process.
- a password view 340 can include user accessible fields for accepting and e-mail and password as shown. Alternatively other credential systems can be used. For example, a user can access the system using credentials associated with a social network account. The password view can accomplish functions similar to that of the introduction view 310 , for example. Clicking a sign in button can provide a user access to a bifurcated user choice screen 344 , allowing a user to choose who will use the device: a child or a parent. This can allow a single application software download that can function in either child mode or parent mode, depending on a selection in a process as indicated here in FIG. 3C , and/or in FIGS. 31 and 32 , for example.
- Selection of a “my child” control button can result in the my child view 346 ; selection of a “parent/guardian” button can result in the parent/guardian view 348 .
- Each option allows entry of a name, a save button, and a log out button.
- the my child option initiates a process that protects the device and tracks its activity.
- the parent/guardian option initiates a process that provides notifications to the device of protected services associated with children's devices on the same account.
- FIG. 3D shows three views of a mobile application activation and device administration process.
- a protected view 350 can be seen on a child's device indicating that a plugin 132 is installed and functioning.
- An optional activate button 351 can be selected, resulting in an administrative information screen 354 .
- a lock control 352 can be selected, resulting in a prompt to enter a password or other credential (see the access settings dialogue 374 of FIG. 3F ), which, if provided, can lead to the bifurcated user choice screen 354 .
- the administrative information screen 354 can have an activate button 355 , which, when selected, can result in the curfew disable message screen 358 .
- FIG. 3E shows four views of a mobile application setup process. For example, setting up a child device (after choosing the option of “my child,” see view 346 ) can include the technical process steps illustrated here. These views can result after pressing an OK button as seen in the curfew disable message screen 358 and generally after the sequence shown in the views of FIG. 3D .
- a preparing SMS data view 360 can indicate that the software is accessing, cataloguing, and/or otherwise preparing SMS data to be reported and formatted for a parent portal, for example.
- An uploading messages view 362 can indicated that the prepared data is being transferred to a server over the network 102 .
- a syncing curfews view 364 can indicated that the software is adjusting control functionality on the device shown here, and an uploading apps data view 368 can indicate that the software is reviewing installed applications and transferring that information to a server accessible over a network 102 .
- An analysis step (see analysis module 112 , for example) can then be performed by the server on any data uploaded to the server.
- FIG. 3F shows two views of a mobile application protected status.
- the currently protected view 370 can result after the process shown and described in FIG. 3E .
- the “activate” button 351 is not present in this view.
- the access settings dialogue 374 can appear when a lock control button 372 is selected, allowing a user to enter a password and change the settings, functionality, or role of the device (restarting a process described above, for example).
- FIG. 3G shows two views that include a mobile application monitoring status.
- the parent/guardian view 348 shown again here, can be selected and can result in the monitoring/notifications view 380 .
- This can indicate that the device shown—which can be an example of a controller user system 130 —is configured for use by a parent, because it is “currently providing notifications.”
- the safety system 110 can enable parents to institute electronic curfew or grounding rules. Parents may want to ensure that their children cannot access certain features of the user system 130 during a particular time of the day. Parents may not want their children to text after 9 PM or they may not want children to access any applications on a phone after 10 PM on a school night.
- the safety system 110 can allow selective applications based on curfew settings. The selected applications can be customized by parents. For example, parents can allow certain educations apps during curfew time period.
- curfews may depend on the location of the user systems 130 . For example, schools may require all phones belonging to students to implement a curfew restriction on school property.
- the safety system 110 can identify that the user system 130 is within the property bounds of a school and automatically activate classroom curfew restrictions. Accordingly, the safety system 110 can customize the user system 110 based on locations and/or curfew settings. The safety system 110 can accordingly block access to applications and certain features of the user system 130 based on the curfew or grounding settings. Parents may enter these settings via one of the user interfaces described below. While the examples in this disclosure relate to children, these features may also be used by employers to control aspect of employee's phone usage during work time. Employers may want to disable access to web browsing or social networking links from user systems 130 during work hours. The safety system 110 can block these applications during a set time period or set locations. Employees may be able to access these application when they are away from work site.
- FIG. 4 illustrates views of an example safety system plugin that may be installed as a software application on a mobile device or smartphone (which can be a user system 130 , for example).
- a mobile device or smartphone which can be a user system 130 , for example.
- the plugin When the plugin is installed and running, it can present a curfew lockout view 410 during a designated curfew period. Selecting the “close” button 412 can result in a notification sent to the account holder (which may be a parent).
- a close button or similar functionality may not be provided and a curfew lockout can be more strict and difficult to avoid, without having the password or other credential of the account holder.
- a notification resulting from closure can be announced on the lockout view, or it can happen in the background without including the text as shown.
- a logout control 450 can allow an account holder to stop the software from running on the mobile device, for example.
- Another example curfew lockout screen is illustrated in FIG. 36 .
- Lockout can involve inhibiting functionality of the operating system of a device at a root or core level. Lockout can involve blocking user interface functionality. Lockout can involve intercepting input or output at an intermediate level between these two approaches. In some embodiments, curfew restrictions may also be implemented as described herein with respect to Curfew Agent.
- FIGS. 19, 50A, and 50B Useful interfaces that can allow a parent to set curfew settings are included herewith as FIGS. 19, 50A, and 50B .
- the view can include a calendar background and allow visual blocks to be re-sized, dragged, or otherwise manipulated by the finger, cursor, mouse, or other user input approach.
- the blocks can represent time when usage is allowed, or the blocks can represent time periods when usage is not allowed.
- the size and placement of the blocks on the calendar, as controlled through a parent interface for example, can establish periods where smart phone usage of a child is not allowed.
- the software and system can be configured to actually prevent usage of the smart phone, or it can be configured to report any clandestine usage that is contrary to the curfew restrictions.
- Curfews can be set as systemic, recurring calendar events, or they can be customized as a consequence of specific child behavior or failure to follow other rules or restrictions. Incentives and punishments can be calibrated to correspond to varying curfew settings.
- Software installed on a smart phone can be employed to track attempts to circumvent any curfew settings or restrictions.
- Software installed on the smart phone can continue to report some activities to a parental portal or other interface even when the smart phone itself is locked to prevent a child from using it during a curfew period.
- the safety system 110 can also determine how long a child is on a particular application during the day and/or week and based on the duration, enable some of the curfew restrictions. Also, as discussed herein, the safety system 110 can disable certain apps during curfew time. Further, as a child leave a particular area, the safety system can block some of the functionalities of the user system 130 .
- a safety system 110 can help establish time or curfew restrictions on a user system 130 using the technical protocols described herein.
- the safety system 110 can selectively choose which applications to enable in curfew mode.
- the safety system 110 can also track any attempts at tampering or disabling features of the safety system 110 . Children or employees may try to remove the safety system 110 from the user system 130 .
- the safety system 110 can attempt to block removal or disabling of its features.
- the safety system 110 can be designed to send ping messages that may be encrypted over a network to verify that the safety system 110 is still active on the user system 130 .
- Anti-tampering functionality can also be achieved using redundant and/or parallel control techniques.
- a user system control module 118 may control one or more of the following portions of a user system 130 , for example: a central processor, a communication module, a display, a memory, etc.
- anti-tampering may also be implemented as described herein with respect to Apps Agent and/or Device Status Agent.
- the safety system 110 can integrate or use other third party systems for analytics.
- the safety system 110 can integrate Google Analytics to monitor usage of the mobile applications and website on a user system 130 .
- the safety system 110 can store the usage stats and send a report via the account management module 120 .
- the safety system 110 can intercept data being transferred to and/or from the camera on the phone. During video chatting (FaceTime, Skype, etc.), the system can perform image recognition and block any indecent content in real time or with a small or large time delay. The safety system 110 can also prevent storage of certain types of pictures or drawings in the memory of the device. For example, the system can prevent the phone from storing any naked, violent, suggestive, inappropriate, or pornographic pictures taken via the phone's camera or received via external communications (for example text or data messaging applications like SnapChat, WhatsApp, etc.).
- Objectionable content can be identified using an algorithm that looks for certain colors (flesh tones, etc.). Objectionable content can also be identified algorithmically by searching for or recognizing anatomical features in proportion or relation to others. For example, facial recognition technology can be employed to identify a human face in a given image. If a face is present, the image can then be reviewed to determine the orientation of a human body associated with that face by following common colors (for example, flesh tones) that may represent a neck. Orientation can also be determined by relative positions of features in the face; a body will generally be positioned in the same general direction from the eyes that a mouth and chin are positioned, for example.
- common colors for example, flesh tones
- This analysis can allow the algorithm to scan the area where a related human body is generally expected to be found, thus avoiding wasting computational and processing resources.
- a scan can review images to identify erotic, suggestive, or otherwise inappropriate imagery by searching for contours, colors, lines, and/or shading that may be typically associated with images of breasts, genetalia, gluteal regions, typical clothing that may be associated with only partial or otherwise suggestive coverage thereof, hands forming gang or other crude or inappropriate gestures, etc.
- Images to be blocked, filtered, flagged, or analyzed can also be identified by metadata associated therewith, for example data indicating provenance from a known pornographic website, an “xxx” indication, a title relating to sex acts, a name of a known pornographic actor or actress, a word associated with erotic industries, etc.
- a safety system 110 can perform image analysis to assist with child safety and well-being on a user system 130 using the technical protocols described herein.
- Parents may want to track the location of their children or demarcate a physical area on a map where their children should be or not be for a particular time. As an example, parents may drop off their child at a location such as a friend's house, a mall, or a movie theater. While dropping off a child, parents may select that location and choose a radius outside which a child should not stray. Parents may select the location via the administration module of the safety system 110 . Selection may include checking the current location on a map. Accordingly, parents can create a geofence using the safety system 110 . When the child leaves the area designated by the parent, the safety system 110 can send an alert to the parents.
- the safety system 110 can also block certain features of the child's user system inside (for example, disable Facebook inside of school geofence) or outside (for example, texting outside of school during school time) of the selected geofenced area. Thus, parents may use the safety system 110 to monitor the location of the child with the child's user system 130 .
- Parents can pre-designate location and/or time of where their children should be during the day. For example, parents can set their children's school location. The phone safety system can then track the location of the child and send an alert to the parent when the child makes it to the designated location. An alert can also be sent when the child is moving outside of the designated radius. Thus, if a child leaves the school zone during school time, an alert may be sent to the parents. A history of phone location can also be tracked and recorded for later reference and pattern recognition. In some embodiments, location monitoring may also be implemented as described herein with respect to Location Agent.
- Tracking a moving phone can enable measurement of its speed.
- the safety system 110 can track location using the GPS module and accordingly calculate an average speed of the user system 130 based on measured locations at certain time intervals. Other methods can also be used to measure the speed of a moving phone, such as, accelerometer or triangulation.
- the safety system 110 can then inhibit some of the functionalities of the phone, for example, based on the detected speed. For example, if the phone is moving beyond a threshold speed, the phone safety system can block incoming text messages, e-mails, multi-media messages, phone calls, etc.
- the safety system can also alert parents if their children are driving over the speed limit by automatically identifying the speed limit (for example, based on the location of the user system 130 over time, based on GPS or local cell-tower triangulation, based on independent accelerometer techniques, etc.).
- Such systems can incorporate and expand on the technical information and teachings in U.S. Pat. No. 8,380,176; its entire disclosure is incorporated by reference herein for all that it contains and is made part of this specification.
- Speed tracking may also be used to prevent, deter, or help deal more effectively with abduction.
- the safety system 110 can use various inputs, including video, audio, and speed to identify a possible abduction scenarios and send alerts to parents and authorities.
- the safety system 110 can use variety of parameters to weight and determine an abduction score. Parameters can include screaming or crying sounds, asking for help, unusual geographic location (not in the usual area the person is supposed to be), speed of the user system, or no phone usage for a certain period of time.
- parents can select parameters using the account management module 120 and/or the user interface module 116 of the safety system 110 .
- parents can directly select the settings from the child's phone.
- parents can make the changes remotely (to the child's phone) via one or more user interfaces discussed in more detail below.
- a parent community portal (e.g., accessible through the user interface module 116 or otherwise through a network 102 ) can increase the effectiveness of the safety system 110 by enabling parents to share information with the community. For example, parents can rate (positive/negative) software applications (“apps”), websites, etc. and those ratings can be shared with other parents or users.
- the safety system 110 can look up the ratings and automatically decide whether to allow a child to access a particular application, or it can report the community rating (along with voting percentages, detailed feedback, comments, etc.) to the parent for a final decision.
- Parent portal user interfaces can show blocked messages and pictures to the parents and receive their input, which can be used to adapt the system in blocking/reporting future messages and pictures.
- the account management module 120 can learn parenting style and automatically implement changes based on parent's selection of what is and is not appropriate, or a parent can actively select a level of protection or define their own style using controls provided through a user interface module 116 or an account management module 120 , for example. Such controls can include drop-down menus listing available profiles, available blocking databases, available community standards resources, etc.
- the portal can also use collected data from some or all parents or other users and perform statistical analysis to increase effectiveness of the application. Using appropriate permissions and safeguards (for example, removal of specific personal identifiers), some implementations can allow parents to see other parents' phone preferences for their children as a way to learning options and acceptable community standards in certain cultures and communities.
- the safety system 110 can enable parent to search community information from their user systems 130 . For example, the safety system 110 can provide a search functionality to look-up apps of concerns and/or safety ratings.
- the phone safety system can send alerts to the parents, employers, users, etc. Parents can decide if an alert is a false positive and the system can adapt based on parents' ratings. For example, some parents might be fine with their child using the word ‘stupid’, while other parents may not. Accordingly, technical solutions include allowing a user to blacklist or whitelist their own terminology using a visual interface, dropdown menu, color scheme, machine learning, etc.
- the safety system 110 can store multiple categories of offensive words. Categories may include firearms, sexual innuendos, etc. The safety system 110 can also use context to prevent false positives by analyzing surrounding words and mood.
- pattern may be recognized showing that a parent tending to be more strict regarding some words is also more likely to be more strict with regard to other words.
- User community data can be analyzed in order to save a parent time in designating all objectionable words and instead implementing a predicted level of tolerance based on an initial set of responses to an interactive survey or other settings. Also, in some cases there might be language/cultural misunderstanding. As described above, the safety system 110 can learn parents' responses to the alerts.
- the safety system 110 can include one or more modules described above that can retrieve and analyze messages (including texts and data messages) before a child has an opportunity to delete the messages from their computing devices.
- the safety system 110 can retrieve messages from memory of the phone in real time or in substantial real time with respect to messages sent and/or received. Thus, even if a child is using applications like SnapChat, the safety system 110 can retrieve sent and or received messages before they are deleted from the phone.
- a system can periodically or continuously record screenshots or screen-capture video during the time that a problem website or application is being used on a user system 130 . This recording function can be used as an alternative or additional measure if the website or application is not blocked or removed, for example. This function can also be used to gather evidence against a cyber-bully or other perpetrator who attempts to destroy evidence or mask harmful activities using electronic means.
- a safety system 110 can perform image capture and frequent logging of screenshots to assist with child safety and well-being on a user system 130 using the technical protocols described herein.
- the systems described herein can protect the lives and well-being of children.
- Monitoring of devices for example, Android, iOS, or other devices that are examples of user systems 130
- tablets, laptops or home computers which can provide a parent access to the safety system 110 .
- the systems described herein pay attention to children's behavior on their smartphones and tablets so users can be a parent, even in their world—that is, even when fast-evolving modern technology and social systems are being used by children on a constantly evolving basis.
- These systems can provide simple, real-time notifications that bring vulgar, derogatory and suspicious online behavior to a user's attention so parents have the opportunity to react when it matters.
- An example system can protect one or more devices (e.g., a user system 130 ) using a monitor dashboard (e.g., a user interface module 116 and/or an account management module 120 ) and notifications.
- a monitor dashboard e.g., a user interface module 116 and/or an account management module 120
- Systems and methods such as those presented herein can allow parents (or any users, but generalized users can be referred to as “parents” herein) to protect multiple devices (e.g., user systems 130 ) such as tablets and phones.
- Parents can customize the alerts and other information they wish to receive about their child's social communications and behavior.
- a single responsible user can have a device or web interface that tracks information sent by or received by one or more other devices (e.g., user systems 130 ) that are used by those over whom the responsible user has parental or other authority for safety and well-being.
- a responsible user can have access to a “monitor dashboard,” which is an example of a user interface module 116 and/or an account management module as illustrated with respect to the safety system 110 of FIG. 1 .
- This can be a web portal, accessible from any computer over the world-wide web (see the network 102 of FIG. 1 ); it can be an application accessible on a parent's own mobile device.
- the dashboard (which can be made available via the user interface module 116 of FIG. 1 , for example) can be a window that allows parents to see what is going on in their children's lives in real time, and recognize potentially harmful communications (and/or other activities, location, viewing and usage habits, etc.) before it is too late. Examples of how such a dashboard can be arranged and visually presented are provided herein.
- a dashboard can allow at least some portion of various data resources to be visible at the same time, but allow a single interactive view from which more details can be accessed for any of those data resources.
- the portion viewable in the dashboard view can provide decision-making information that helps a user assess whether the additional details should be accessed.
- a dashboard can include information about how many “alerts” have occurred since the last time details were viewed. Additional disclosure on these and related topics are provided herein with respect to many of the figures. It can be helpful to organize notifications and content according to which child's device is the source of a notification.
- Default presumed threat levels can be established in the system.
- a parent/user may establish their own hierarchy of priorities for notifications. Higher threats or more urgent priorities can be listed or displayed more prominently, and/or they can lead to more drastic notifications.
- a threat of physical harm may cause a monitor dashboard to proactively send a text or other message to a parent's phone, using the audio aspect of a ringing phone to alert a parent to imminent danger for a child.
- receipt of a crude or otherwise inappropriate image, or receipt of anything at all from a designated threat source can give rise to visual, tactile, haptic, audio, or other feedback, either through or facilitated by a monitor dashboard. Notifications can be provided as real-time alerts, giving parents the opportunity to become aware of cyberbullying and inappropriate behavior, in a timely manner.
- a monitor dashboard (e.g., a user interface module 116 ) can depend on information fed to it from sources that continuously or periodically monitor and access content on a child's device. This can be accomplished through software that is installed on a child's device (e.g., a safety system plugin 132 ) or otherwise has access to—for example, through a cellular network or data-provider's servers—information coming to and leaving from a child's device. That software (or a server accessible therefrom via a network 102 ) can automatically translate these communications and parse or otherwise analyze them to identify what portions of these communications involve actual content sent to or from a child.
- a safety system plugin 132 software that is installed on a child's device
- That software or a server accessible therefrom via a network 102
- That software can automatically translate these communications and parse or otherwise analyze them to identify what portions of these communications involve actual content sent to or from a child.
- Such parsing can increase efficiency when transmitted data volume is high by ignoring some aspects of headers or other technical trappings and focusing instead on substantive content (for example, the actual text of an SMS, the actual images attached to an e-mail or delivered through a snap-chat type platform, etc.)
- Monitoring software can be periodically updated to support monitoring of applications deemed to be new threat sources. Thus, periodic updating and interaction with a remote server can be very helpful to improve effectiveness of such monitoring software.
- Beneficial features of a system can include one or more of the following features: (1) a dashboard such as that discussed above. This can be a real-time dashboard that parents can use to stay informed on the mobile phone and tablet usage habits of their children. “Real time” can indicate that updates or notifications can occur on a time scale that is relatively rapid with respect to some other underlying time scale, it can refer to virtually instantaneous updates, or it can refer to updates that occur within seconds or minutes. (2) Ability to monitor applications, or “apps.” Thus, a parent can be notified of installed apps on a child's phone or tablet. To assist users who may not be familiar with the latest applications, detailed descriptions can be provided of the leading applications on a child's phone and why a parent should or should not be concerned.
- SMS short message service
- a parent may have the ability to view all the SMS messages sent and received by their child's device, with the ability to receive notifications when words of concern are used. Parents can also be notified when flagged contacts (that is, contacts of a child that have previously been identified as a potential problem or threat source) send something to the child (for example, an SMS message).
- flagged contacts that is, contacts of a child that have previously been identified as a potential problem or threat source
- SMS message for example, an SMS message.
- WWW world-wide web
- Parents can receive alerts when flagged URLs such as porn and other inappropriate websites are accessed from a child's device.
- WWW world-wide web
- a parent may be able to view photos uploaded to a child's Social Media accounts in one convenient location, and receive alerts when content (for example, words, music, or images) of concern are used on social networks.
- Notifications can be set to real time, hourly, daily, or weekly summary reports. Notifications can be accompanied by icons or particular colors indicating a level of priority or urgency. They can also include icons indicating that the source of a notification is a software program such as those with one or more functions described herein.
- FIGS. 5-23 show example views of hardware running software that can accomplish the goals discussed herein. These views and the included text and graphical placement indicate functionality and features of a web safety system.
- FIG. 5 shows a view of a website that can include a login screen for a system user to access his or her account.
- FIGS. 6A and 6B show a view of a web page that can provide subscription and pricing information.
- FIG. 7 shows a view of a webpage that can assist a user in creating an account and providing name, e-mail, and password information.
- FIG. 8 shows a view of a webpage that can assist a user in creating an account and providing billing information.
- FIG. 9 shows a view of a webpage that can assist a user in preparing to use a safety system by downloading and installing the components.
- three steps for initiating use of a safety system 110 can include downloading a software application (“the App,” or a safety system plugin 132 ) to a mobile device (e.g., a user device 130 ), setting up a parent device (to display or access the user interface module 116 , to receive notifications from the safety system 110 , etc., installing a plugin 132 that may be configured for parental use), and setting up a child device (providing user parameters 140 , installing a plugin 132 that may be configured for a use on a child's device, granting that plugin access to various portions of the user system 130 , etc.)
- FIG. 31 shows a screen indicating example steps, processes, and screen shots for setting up a parental device.
- FIG. 32 shows a screen indicating example steps, processes, and screen shots for setting up a child device.
- FIGS. 10A and 33-53 show various views of a software framework for presenting information and controls to an account holder for a system such as the ones described herein. Many of these views are examples of how a user interface module 116 of FIG. 1 can be implemented.
- a user interface module 116 of FIG. 1 At the left in these figures is a vertical series of tabs with icons that may allow a user to touch, click, or otherwise select them. Each tab causes a different view (or set of views) to be presented to a user, and examples of those views are presented below. Some of these tabs have sub-tabs that may appear, for example, immediately to the right of the left-most series of tabs.
- the tabs shown here are merely examples, but they include (as noted in FIG.
- Dashboard 1010 (which may include Account Info and Notifications sub-tabs, for example), Device Status 1012 , Apps 1014 , SMS 1016 , WWW 1018 , Location 1020 , and/or Curfew 1022 .
- FIG. 10A shows an embodiment of a dashboard user interface 1000 with a map 1002 indicating the current location of devices subject to the system, the names of the children using the devices, a status section 1006 including an SMS status, a world-wide web status, and the time of a last update 1004 .
- This view also shows a list of the latest notifications 1008 .
- the latest notifications can include messages to a user alerting them to the actions of their children with respect to their user systems 130 , for example, and the times at which they occurred.
- FIG. 10A can indicate a view that is provided by user interface module 116 of FIG. 1 . Live hyperlinks can be provided. For example, clicking on the name “Billy” can load a device status screen for Billy. Clicking on “view” in the notification list can load an SMS activity screen with an SMS conversation visible.
- the dashboard view can be accessed, for example, by an account user on a computer or another mobile device.
- FIG. 37 provides another software interface view of a dashboard.
- FIG. 10B shows an explanation of some of the icons in FIG. 10A .
- Icons are provided showing data connection 1030 (when the icon is darker or more prominently displayed, a data connection is available, as indicated by the up and down arrows for uploading and downloading), GPS data 1032 (when the icon is darker or more prominently displayed, GPS data is available for the device), curfew 1034 (when the icon is darker or more prominently displayed, it can indicate that a curfew lockout has or has not been bypassed), and device status 1036 (when the icon is darker or more prominently displayed, it can indicate that device status has or has not changed).
- data connection 1030 when the icon is darker or more prominently displayed, a data connection is available, as indicated by the up and down arrows for uploading and downloading
- GPS data 1032 when the icon is darker or more prominently displayed, GPS data is available for the device
- curfew 1034 when the icon is darker or more prominently displayed, it can indicate that a curfew lockout has or has
- FIG. 11 shows a dashboard view that emphasizes and explains notification functionality of an example system.
- a notifications call-out window 1110 can be displayed after clicking the notification icon 112 .
- a “view all notifications” hyperlink can be selected to show a “notifications” screen.
- Other icons in the notification bar at the top include a gear 1114 that can allow a user to access a settings interactive interface.
- FIGS. 11-22 and 37-53 illustrate how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views.
- the dashboard views of FIG. 11 can show locations of two different children on the same map at the same time in the same view.
- the embodiment of FIG. 11 also aggregates data relating to both of the children and their smart phones—the status of both Billy's phone and Jenny's phone is shown in the same view.
- the notifications listing also assembles events and messages from both children and integrates them chronologically.
- this graphical display allows efficient review by a user of a parent portal.
- the dashboard assembles data in a highly organized and efficient manner.
- FIG. 12 shows a view of an example notifications screen that can provide a continuously scrolling list, where the most recent notifications can be included most prominently (for example, on top of the list or otherwise emphasized).
- These notifications can be accessed from various other interface views in the system—see, e.g., FIGS. 37, 39, and 41 that show “alerts,” which can be notifications—many of which can present a shorter list of only the latest or most relevant notifications, but with the ability to click through to this more extensive list.
- FIG. 42 Another view of a notifications page having similar functionality is provided as FIG. 42 .
- FIG. 13 shows a view of a device status screen that may present a more detailed or dedicated view that is related to or accessible from the device status portion 1006 of the dashboard described in FIG. 10A .
- it is Billy's device status that is displayed, and the table indicates that Billy's device (a user system 130 in the context of FIG. 1 ) has WebSafety software installed (which can fill the role of a safety system plugin 132 in the context of FIG. 1 ), the device Global Positioning System (GPS) is on, the data connection (for example, through a cellular phone network) is on, and that the device itself is powered on.
- GPS Global Positioning System
- Other device status information views are provided as portions of FIGS. 41 and 51 .
- a safety system 110 can identify and report on device status (e.g., installation of a safety application or plugin, GPS status, data connection, and/or whether a user system 130 is powered on) using the technical protocols described herein.
- the safety system 110 can call on operating system modules such as content providers (for Android OS) to access device status.
- device status monitoring may also be implemented as described herein with respect to Device Status Agent.
- FIG. 14 shows a view of an “Apps” screen, including “Apps of Concern”—for example, mobile device applications that can potentially be used in cyberbullying activities.
- a system can block, delete, or otherwise deter use or functionality of one or more of such applications.
- Application usage can be tracked and reported as shown.
- an “Apps of Concern” portion can list software applications that have been identified as presenting potential dangers to children, their installation dates, and when they were uninstalled, if applicable. Columns in the tables can be sorted by each column by clicking the header, then the arrow.
- Uninstalled applications can be shown in a lighter font color, or “grayed out.”
- a calendar 1412 showing application usage organized by date in a table 1414 can initially show the current day as a default view.
- Other views related to software applications are provided as portions of FIGS. 43, 44, 45 and 48 .
- FIG. 15 shows a Filters view of a set of SMS screens.
- a system can identify cyberbullying based on frequency of received communications.
- a system can search for or filter words that may be employed by users of short message service functionality. This view shows a search filter list 1512 , where search results can be shown automatically as a user of this view types in a search term.
- the system can also automatically block senders that may use more than a given number of filtered words, as shown at 1516 . Users can also be unblocked, as indicated by the hyperlinks of the words “Unblock” at 1520 . Word usage frequency can be tracked, as shown under the heading “Usage Top 20” at 1526 .
- FIG. 16 shows an Activity view of a set of SMS screens. This demonstrates how information can be grouped and collected for efficient viewing, through interaction of a user with controls made available through a user interface.
- the “filters” portion 1530 of the user interface illustrated in both FIGS. 15 and 16 can be selected by a user to access the controls and information visible in FIG. 15 .
- Immediately adjacent to the filters portion 1530 is an “activity” portion 1534 of the same toolbar. Selecting the activity portion 1534 can control the view to provide a running timeline view of messages sent and received, as shown.
- a control can be provided (shown here as check-box 1620 ) allowing a user to decide, upon review, that a particular person should be blocked and immediately and conveniently block that person from conversing with their child through texts.
- a hierarchy of selections can include selection of an “SMS” control in a first control area (the left-hand bar), selection of a particular child (here, Billy) in a second control area, selection of filters or activity in a third control area, and, in FIG. 16 , selection of a particular interlocutor (here, Jacob) in a fourth control area. All four control areas can be visible simultaneously to allow rapid changes between the information visible and the controls accessible for selection. Additional control areas can be included (and indeed, various selectable portions of the screens shown in FIGS. 15 and 16 can be characterized as additional control areas, including the tool bar visible across the top of the views shown here.
- Messages with filtered words can be highlighted (e.g., using a different text or background color such as red) or otherwise identified or distinguished in order to draw the attention of a user.
- a “filtered word” can be a word that appears in a black list or a block list, and can be a vulgarity or epithet, for example.
- “filtering” can refer to searching for forbidden or problem words, or it can refer to allowing some words to pass while blocking others. This selection can also reveal further selectable controls specific to various potential SMS interlocutors with whom a child may converse through texts, as shown in the sidebar listing names.
- Various SMS senders can be listed (as shown at 1612 with the example list of names: Jacob, Sophia, Mason, Emma, Ethan, and Isabella).
- search results may be shown (this may be accomplished on the fly as search terms are entered without a user needing to refresh a page). Clicking on the hyperlinked text “go to conversation” can display a message in context in the center of the window.
- FIGS. 46 and 47 Other views related to SMS filtering that may provide similar functionality to that described with respect to FIGS. 15 and 16 are provided as FIGS. 46 and 47 .
- FIG. 17 shows a WWW (or world-wide web) screen, indicating that blocking mode can have a blacklist and a whitelist for URLs to block or allow.
- An “X” can indicate a website is blocked, and a check-mark can indicate that a website is allowed.
- the blacklist and whitelist modes can be selected by the blocking mode user controls 1712 , and particular URLs can be blocked or allowed (or flagged or allowed) by a user toggling between these options using the URL-specific user controls 1716 .
- a user can customize a blacklist or whitelist by typing a URL into the customization field 1720 , which invites input using the faint text “Add site.” Further actions are indicated in the active area 1724 , using an eye icon (which can allow a parent to link directly to a browser view of the URL in question to research whether it should be included), a pencil icon (which can allow a parent to edit the field listing the URL or to add notes annotating when or why a site was included, for example), and a trash can icon (which can allow a URL to be removed from the list, for example).
- eye icon which can allow a parent to link directly to a browser view of the URL in question to research whether it should be included
- a pencil icon which can allow a parent to edit the field listing the URL or to add notes annotating when or why a site was included, for example
- a trash can icon which can allow a URL to be removed from the list, for example.
- FIG. 18 shows a location screen indicating at the location box 1812 example user Billy's location on a map, along with the date and time that the location was recorded.
- the edit device menu 1820 different colors can be used for different devices and users being tracked.
- Billy's device is shown on the map with light blue icons.
- An eye icon can be selected to show or hide a device on the map, or to otherwise view related information, re-orient the map, or otherwise draw attention to or make more accessible some aspect of Billy's location data.
- a frequency can be selected for how often to search for or display device locations, as indicated with the illustrated edit device menu 1820 .
- a location history can also be provided and accessed from this location screen, for example by selecting a data from the calendar 1824 .
- Location information can be graphically or otherwise juxtaposed to aid a parent in recognizing patterns and/or deviations therefrom.
- This location screen or a similar interactive view can be used to establish geographical boundaries and/or other geofencing functionality. For example, a circle can be dynamically drawn or placed on the map indicating an allowed radius of unreported movement within which the phone (or a safety system plugin 132 of a user system 130 ) need not alert a parent.
- Other shapes can be drawn, which can relate to school campus boundaries, allowed neighborhoods, prohibited locations, no-go zones, etc.
- Results of violating borders can be reporting, diminishing smart phone functionality (e.g., limiting to only emergency calls and abduction tracking, etc.)
- Other views related to location tracking that may provide similar functionality to that described with respect to FIG. 18 are provided as one or more portions of FIGS. 33, 37, 39, 41, and 49 .
- FIG. 19 shows a curfew screen indicating Billy's curfews for various days of the week, including start times 1914 , stop times 1915 , and check boxes 1916 for when to apply the curfew, for example.
- the illustrated interface is interactive and provides an array of customizable controls and active fields that can be adjusted and edited by a user. For example, an active field or hyperlink 1912 can be used for adding additional time restrictions.
- Check-boxes 1916 can be selected for which days of the week the curfew time restrictions should be applied.
- a garbage-can icon 1918 can be used for deleting a given restriction, which may result in the delete menu 1920 ; this menu may include a confirmation (for example, typing the word “delete” as indicated, providing some other control input such as a password, etc.).
- a pencil and paper icon 1922 can be selected to edit restrictions, which may result in the edit menu 1924 , as shown, with its additional interactive fields and controls.
- the delete menu 1920 and the edit menu 1924 can be typically not shown, except when one of the icons 1918 or 1922 is selected.
- Other views related to curfew information and controls that may provide similar functionality to that described with respect to FIG. 19 are provided as one or more portions of FIGS. 50A and 50B .
- FIG. 20 shows an account information screen 2010 .
- this screen can be interactive and represent a way of interacting with an account management module 120 (see FIG. 1 ) through a user interface module 116 .
- An initial view of an account information screen 2010 can include information provided during an account setup process (see, e.g., FIGS. 7 and 8 ), but the fields 2020 can allow a user to update the information and save new information relating to billing and so forth.
- FIG. 21 shows a notification preferences screen 2110 .
- An account user can indicate the email address or addresses to be used for notifications as indicated at 2120 ; multiple emails can be listed.
- Other notification approaches can also or alternatively be used, including texts, phone calls, audible notifications, some combination of these options, etc.
- Alerts can be sent to an account user when: an SMS filtered word is sent or received (for example, via SMS or multimedia (MM)), or if the user contacts a selected (“filtered”) number; a user tries to access a filtered URL; a user closes the curfew screen; a GPS functionality of a device is disabled or re-enabled; a data connection to the device is lost; and/or account changes are made.
- SMS filtered word for example, via SMS or multimedia (MM)
- MM multimedia
- the selections made when initially setting up a child's device can be initially displayed here, but interactive controls can be provided allowing a user to update or otherwise change the settings and configuration.
- Another view related to notification preferences and controls that may provide similar functionality to that described with respect to FIG. 21 is provided as one or more portions of FIGS. 34 and 53 .
- FIG. 22 shows a devices screen 2210 listing the devices being tracked in an example account.
- Billy has an HTC One
- Jenny has a Samsung Galaxy S4.
- Installation of software (which can play the role of a safety system plugin 132 of FIG. 1 , for example, “WebSafety,” available from WebSafety, Inc. of Newport Beach, Calif. as of October 2014 and its successors) and logging in to the account from that software on a user system 130 which can be the devices listed above can cause a device to automatically be visible in the list.
- Devices' association with user names for example, Billy is associated with HTC One
- a garbage-can icon 2218 can be used for deleting a given device, which may result in the delete device menu 2220 ; this menu may include a confirmation (for example, typing the word “delete” as indicated, providing some other control input such as a password, etc.).
- a pencil and paper icon 2222 can be selected to edit a device, which may result in the edit device menu 2224 , as shown, with its additional interactive fields and controls.
- the delete device menu 2220 and the edit device menu 2224 can be typically not shown, except when one of the icons 2218 or 2222 is selected.
- Another view related to devices to track and monitor and controls that may provide similar functionality to that described with respect to FIG. 22 is provided as one or more portions of FIG. 51 .
- FIG. 23 shows a log in screen that can be automatically shown after a time-out period has elapsed, to enhance security for the account user.
- This log in screen can be displayed to a user of a user interface module 116 of a safety system 110 , for example, and it can be especially useful when the system 110 is accessed from a web browser over the internet, for example.
- Another view related to account security and controls that may provide similar functionality to that described with respect to FIG. 23 is provided as one or more portions of FIGS. 3A, 3B, 3C, 3F, 5, 31 and 32 .
- FIG. 24 shows an example user system 130 including a notification 2402 (emphasized) received from the safety system 110 over a network 102 .
- Parents can install a software application (e.g., a safety system plugin 132 of FIG. 1 , for example, the “WebSafety” mobile app, available from WebSafety, Inc. of Newport Beach, Calif. as of October 2014 and its successors) on their smart phones to provide features of the safety system 110 .
- the safety system 110 can provide alerts or notifications to the parent.
- the safety system 110 can interrupt the operating system of the user system 130 or any tasks running on the operating systems of the user system 130 to provide the message 2402 .
- the safety system 110 need not be installed on the user system 130 of the parents. Instead, the safety system 110 can send notifications 2402 via SMS or data messaging to any e-mail or other account. Parents may be monitoring more than one of their children. Thus, the notification 2402 can include the identity of the child concerning the alert. In some embodiments, the notification 2402 can also include a full quotation or an excerpt of the content at issue. The content at issue can be a text message, a multimedia message, a URL, etc. For messages, the notification may also identify the sender or the recipient of the message. The safety system 110 can determine the threat level of the content to the child before interrupting the parent's user system. As shown in FIG. 24 , the threat level is very high as the content of the message relates to a possible fight after school. The threat level can be determined based on keyword and/or phrase matching or image recognition.
- the safety system 110 includes technical solutions to assist parents on at least two aspects of parenting—identification of a problem and presenting solutions (or at least identifying resources for learning and finding help leading to potential solutions). For example, parents might find through the safety system 110 that their children are being bullied or harassed, or that they might be considering drinking or trying drugs. This can represent identification of a problem, and it can occur through parental access to the texts, images, applications, or websites to which a child is exposed.
- FIGS. 25 to 30 illustrate community and support features that can be provided by the safety system 110 .
- This can represent resources for finding help or understanding the problem, and it can save time by automatically using the same underlying data or information that gave rise to the parental concern to locate relevant articles, content, or other online resources, and drawing a parent's attention to those items.
- relevant instructional or informational content can be provided and access thereto (both passive and active) can be improved through the systems described.
- a community for users to interact with a software provider and each other can be accessed, for example, through a community portal 2500 that may be an example of a user interface module 115 .
- a WebSafety blog (accessible through a blog access button 2502 ) can include relevant content for users of a WebSafety software system.
- a WebSafety forum (accessible through a forum access button 2504 ) can facilitate dialogues between parents about the best ways to protect their children.
- a WebSafety customer support portal (accessible through a support access button 2506 ) can also be provided as part of this community, and such customer support can be technical and/or content-related. Support may include automatically notifying parents through their computing devices of new applications downloaded by their children and include a description of the new application.
- the safety system 110 can obtain description of new applications from a data repository 150 of the safety system 110 .
- the safety system 110 can update the data repository based on information automatically retrieved from application stores, user comments regarding the application, etc.
- the safety system 110 can determine certain keywords or identify content from the images. For example, the safety system 110 can determine words such as “drink” in messages: “Man, that was a close call at the checkpoint; Told you shouldn't drink and drive.” Other examples are provided in FIGS.
- the safety system 110 can also identify from images (for example sent or received via messages, posted on Facebook, or SnapChat, etc.) that the child is holding a can of beer, for example.
- the safety system 110 can automatically identify specific children using image recognition techniques or based on social network tagging.
- the mobile safety monitor 110 can suggest content—for example, relevant articles from social scientists, therapists, medical professionals or others—based on the keyword and image detection.
- Content may not be unique to a user community for the systems and features described here, and can also be drawn from larger web searches or syndications services.
- Content can be marked as unique to the user community or as drawn from other sources, and may include links to sources so users can assess credibility.
- Content can be sorted by reaction or preference from a user community, such that content giving rise to more comments, longer reading times, more forwards, etc. can be featured, de-emphasized, or removed, depending on the type of feedback involved.
- the safety system 110 can store in the data repository 150 written and audio-visual materials such as articles, books, podcasts, or videos.
- the data repository 150 can also store links to professionals who may be able to assist parents in identifying solutions.
- the safety system 110 can suggest content and/or provide access to professionals based on identification of one or more issues discussed above.
- the safety system 110 can include links to articles dealing with alcohol and teenagers.
- the safety system 110 can also include link to one or more professionals that parents can directly interact with via text, audio, and/or visual communications. Accordingly, the safety system 110 can connect parents with the resources they need to help their children.
- the safety system 110 can also analyze a child's usage pattern of their user system to determine community content. For example, the safety system 110 can collect data on messaging use, application use, social networking use, picture capturing usage by the child, etc. Based on this gathered data, the safety system 110 can determine whether a particular behavior with respect to using a computing device is deviating from the norm. Accordingly, the safety system 110 can suggest to the parents, via one of the user interfaces shown herein, community content that can assist parents. Further, the safety system 110 can be used to implement the solutions identified in the content directly such as setting certain restrictions or curfew on the use of one or more computing devices.
- the safety system 110 can provide parents with an option to disable user system 130 while the child is driving (that is when the user system 130 is moving at a speed over a threshold).
- the safety system 110 can also automatically provide other restriction settings as described below with respect to FIGS. 48 and 50 based on the monitoring described herein.
- a safety system 110 can analyze a child's usage pattern of their user system to determine content recommendations, using one or more of the following technical protocols. For example, the safety system 110 can automatically implement or recommend curfew protocols based on child's usage patterns. For example, if the child is using their phone while in school or driving, the safety system 110 can automatically block the texting functionality of the phone. Further, the safety system 110 can receive input from parents through a survey or questionnaire to automatically recommend phone usage settings for their children.
- FIG. 26 illustrates user interfaces 2600 A and 2600 B that enable users of the systems described herein to ask technical questions about the software including some or all modules of the safety system 110 .
- These interfaces may be used as a WebSafety customer support portal (that may be accessible through a support access button 2506 ), and such customer support can be technical and/or content-related.
- FIGS. 27-29 illustrate example blog user interfaces.
- An interface 2700 generated by the safety system 110 can provide some of the community features discussed above. This interface 2700 may be used as a WebSafety blog (accessible through a blog access button 2502 ). Experts in the community can keep users up to date, informing users of the best ways to protect their children.
- the safety system 110 can customize the blog user interface 2700 based on issues determined automatically through monitoring of their children. As discussed above, the safety system 110 can select content from data repository 150 or external resources for presentation to the parents based on monitoring of children.
- the content 2704 may also be organized according to ratings or reviews of the particle article or media content.
- the blogs user interface 2700 can also include a blog roll 2706 listing some professionals who may have relevant specialty in accordance with the parent's need as automatically determined by the safety system 110 .
- the blogs user interface 2700 can also include articles or other media items 2702 that may be rated highly by the community.
- the community can include other parents using the systems described herein. In some embodiments, the community can also include professionals such as psychologists, doctors, or life coaches.
- FIG. 28 shows a continuation of the user interface 2700 including additional articles. A user can select one of the links corresponding to an article or a blog that can direct them to user interface 2900 (as shown in FIG. 29 ) with a more detailed view of the selected article.
- FIG. 30 illustrates an example user interface 3000 showing a more detailed overview of a professional listed in the blog roll 2706 of FIG. 27 .
- the user interface 3000 shows writings and other resources related to the particular professional selected by the user from the blog roll 2706 .
- the safety system 110 can identify professionals based on monitoring children's user systems 130 .
- FIGS. 31 and 32 illustrate example embodiments of a process for enabling systems described herein on one or more user systems.
- Users can install a software application including some or all the modules of the safety system 110 on their user systems 130 .
- the safety system 110 can require email or other forms of validation to activate the software.
- the safety system 110 can provide parents with options to select whether the computing device with the software installed is to be used by a child or parent. When the computing device is selected as parent, the safety system 110 can send notifications and/or alerts regarding their children to that particular computing device. For example, safety system 110 can interrupt the operations on the user system 130 of the parent to display alerts.
- a particular computing device When a particular computing device is enabled in the parent mode, that computing device can be used to control operations of other computing devices such as those belonging to a parent's children.
- parents can use the safety system 110 on their user system 130 to block some or all functionalities (for example texting, Facebook, etc.) in the children's user system 130 .
- the example process shows registration of a software application including some or all of the modules of the safety system 110 on a user system 130 for a child.
- parents can select that their child will be using the user system 130 .
- the safety system 110 can monitor that user system and control its operations as described herein.
- Setting up a child device can include filling out a profile (e.g., with name, date of birth, and e-mail) for that child.
- An example profile interface page for a child is provided as FIG. 52 .
- a safety system 110 can provide a single application software download that can function in either child mode or parent mode, depending on a selection in a process as indicated in FIGURES, 3 C, 31 and 32 , using one or more of the following technical protocols.
- FIG. 33 illustrates an embodiment of a maps user interface 3300 generated by the safety system 110 to show location information 3304 of a child's user system (e.g., user system 130 of FIG. 1 ) on a map 3302 .
- Other views related to map user interfaces that may provide similar functionality to that described with respect to FIG. 33 are provided as at least a portion of FIGS. 10A, 10B, 18, 33, 37, 38, 41, and 49 .
- the map 3302 can also include additional markers (not shown) for location of school, home, one or more friends' houses, etc.
- a calendar control 3312 can be integrated into or accessible from the interface 3300 . This calendar control 3312 can be used to select the day for which location data to display. More granularity can be provided and movements can be plotted by minute, hour, and/or day and graphically superimposed on a map view.
- location user interfaces may be generated as described herein with respect to Location Agent.
- the safety system 110 can track location data received from the user system of the child over time and identify patterns. For example, the safety system 110 can automatically send an alert when the location of the child's user system has deviated from the norm (for example, more than 100 yards, 500 yards, 1 mile, 5 miles, 25 miles, etc. away from the school during the time when the child should be in school, more than a threshold distance (e.g., 500 yards, 5 miles, 20 miles, etc.) away from home any time of the day). The safety system 110 can also determine if the child has visited a new location or is visiting a particular location with high frequency. The safety system 110 can store locations and location history in data repository 140 . Accordingly, parents can use the user interface 3300 to determine where their child's device was at a particular day and time by using the time bar 3306 .
- the norm for example, more than 100 yards, 500 yards, 1 mile, 5 miles, 25 miles, etc. away from the school during the time when the child should be in school, more than a threshold distance (e.g.
- a child's smart phone can include software that automatically notifies a parent through a parent portal when a child deviates slightly or drastically from a planned schedule. Dangerous or unwanted neighborhoods can be identified geographically and parents alerted when a child ventures within a given distance of such locations.
- the system can track or otherwise receive data from other interactive applications that provide updates relating to neighborhoods that may become more or less dangerous over time, and incorporate this data into automatic or suggested alert functions.
- Location information can also be integrated with other functionality of the system. For example, certain applications may be allowed in some locations, and not in others. Thus, a full curfew-based lock-down of the phone may not occur while Billy is attending his piano lesson at (Miss Jones' house at the corner of first and elm, for example), but certain restrictions may apply, disabling all installed gaming applications but not the phone, camera, and recording functions, for example. Thus, the system can be used to help improve the chances that a child will not only be in the right place at the right time, but also will not be engaged in unwanted activities for that place and time.
- the calendar feature illustrated in FIG. 33 only shows days, some embodiments can include a calendar with a more granular break-down of hours and minutes, for example.
- an interface similar to the ones presented herein with respect to curfew controls can also be used in conjunction with geographic or other location-related controls.
- FIG. 34 illustrates an embodiment of a notification administration user interface 3400 generated by the safety system 110 .
- This interface can include functionality similar to that described herein with respect to FIGS. 21 and 53 , for example.
- Parents can use the administration user interface 3400 to select alerts and notification settings for activity relating to their children.
- parents can input a correspondence address 3402 (for example email), which can be used by the safety system 110 to send alerts and/or notifications.
- parents can select notifications to be pushed directly on to the parent user systems 130 that were enabled with the safety system 110 as discussed above. Notifications may be pushed or pulled via text messages or through an application software installed on parent's user systems. Accordingly, the safety system 110 can interrupt a parent's user system when an alert or notification is generated.
- parents can select which alerts that they would like to receive.
- the safety system 110 can generate alerts based at least on the parent's selection of one or more of the following: text messages 3408 , internet usage 3410 , curfew 3412 , GPS 3414 , data connection 3416 , and user system applications 3418 , etc.
- the safety system 110 can also generate alerts based on detected threat level as discussed above.
- FIG. 34 also shows an add child user control 3430 that can be selected to add an additional child to the tracking and safety system, and an add parent user control 3440 .
- these controls can have hyperlink functionality that immediately switches a user's view to a dialogue that prompts a user to input the information needed and to perform any other steps (such as installing software on a child's mobile device) relevant to the indicated function.
- FIG. 35A illustrates an example user interface 3510 for activating the safety system on the computing device.
- users can activate software including components of the safety system 110 using the active link 3516 .
- the safety system 110 can include one or more authentication mechanisms for enabling and disabling some or all of the features of the safety system 110 on a user system.
- Parents can use password authentication 3512 or fingerprint or any other biometric authentication (not shown) to activate the software on the child's user system 130 .
- Parents can also enable or disable, remotely over a network, some or all of the features of the safety system 110 on their child's user system. Accordingly, in some embodiments, the safety system 110 can require authentication from parents on their user system 130 to ensure safety and privacy protection of children.
- the authentication mechanism provided by the safety system 110 can protect privacy and safety of children. Parents may also be able to remotely disable their own user system 130 which was lost or stolen using the safety system 110 .
- device status user interfaces may be generated as described herein with respect to Device Status Agent.
- FIG. 35B illustrates an example user interface 3520 generated by the safety system 110 indicating status of the safety system 110 on a particular user system 130 .
- the status can indicate that the device is currently providing notifications and/or monitored.
- users can select active link 3518 which may prompt authentication mechanism 3514 .
- FIG. 36 illustrates an example user interface 3630 generated by the safety system 110 indicating that the user system 130 is in curfew mode.
- the safety system 110 can disable all or some of the functionalities of a computer device 130 based on customizable curfew settings including curfew time period selected by parents using the safety system 110 .
- the curfew settings can be stored in the data repository 140 .
- the safety system 110 can access curfew settings over the network 102 . Accordingly, the safety system 110 can automatically enable and disable curfew mode based on the stored curfew settings.
- the safety system 110 enables curfew mode in real time based on a command received from a parent's user system 130 . Thus, parents may use the safety system 110 to enable curfew mode instead of taking the phone away from the children.
- the safety system 110 inhibits all of the functionalities of the user system 130 when curfew mode is activated.
- the safety system 110 can permit voice calls to a preselected group of individuals including emergency numbers using link 3632 in curfew mode.
- the safety system 110 can prevent bypassing the curfew screen 3630 by using authentication processes described above.
- the safety system 110 can block features of the user system by accessing the boot module of the operating system running on the user system 130 .
- the safety system 110 may also generate notifications when a user (for example child) attempts to bypass the curfew screen 3630 .
- the safety system 110 can transmit the notifications to parent's user system 130 .
- the safety system 110 can automatically enable curfew mode when the child is driving.
- the safety system 110 can determine the speed at which the user system 130 is moving and enable curfew mode when the speed exceeds a threshold.
- the threshold can be 25 mph.
- FIG. 37 illustrates an embodiment of a dashboard user interface 3700 generated by the safety system 110 .
- This dashboard interface 3700 can include functionality similar to, in addition to, or as alternative to embodiments described herein with respect to FIGS. 10A, and 11, 39, and 41 , for example.
- the safety system 110 can aggregate monitoring data from multiple sources in one place—a dashboard user interface such as the interface 3700 .
- a dashboard user interface such as the interface 3700 .
- parents can efficiently review data regarding their children's smartphone usage, including messages third parties send to their children, by accessing and viewing the dashboard user interface 3700 .
- the safety system 110 can visually sort data in the dashboard user interface 3700 based on one or more criteria. For example, the safety system 110 can display notifications according to a timeline 3701 as illustrated in FIG. 37 .
- the safety system 110 can also highlight relevant portions (for example words like “drunk” or “pregnant”) of the notifications.
- the safety system 110 can summarize each day's notifications in an alert summary bar 3730 .
- the alert summary bar 3730 may include an indication of how many recent notifications have been generated related to one or more of the following categories, with a number displayed in association with icons representing the source and area of the alerts as follows: application software 3732 , SMS 3734 , internet (www) 3736 , map 3738 , and curfew 3740 .
- Many of the views and interfaces illustrated herewith show numbers representing alerts; it can be helpful to set off the number against a visually contrasting background to make it more likely to be noticed and visible to a user.
- the timeline 3701 of FIG. 37 is particularly data rich, because it integrates information from various aspects of a safety system 110 . It uses icons at the left to identify the source of the various alerts, while still sorting them chronologically.
- the icons include a clock, designating a curfew action, stacked stylized conversation bubbles to designate an alert sourced to a text message, a stylized grid indicating a new potentially harmful software application was installed, and a stylized globe showing a website was visited.
- the icons can be selectable and immediately transform the view visible to a user to a more detailed summary of the relevant aspect of the safety system 110 .
- the timeline can continuously or periodically refresh, allowing the newest alerts and information to remain in the view most immediately available to the user, but allowing a user to scroll down for a more complete history, with downward scrolling taking the user farther and farther back through a recorded history of previous alerts and other information.
- a similar chronological organization can be presented in an image section such as the photos summary 3760 .
- one or more of the portions 3701 , 3742 , 3750 , and 3760 can be virtually untacked from their currently-illustrated positions and their positions and prominence in the view can be interchangeable.
- a similar function can be accomplished by dynamically visually emphasizing one of the four at the left when it is selected, while simultaneously de-emphasizing the other three by displaying them to the right.
- the safety system 110 can also generate a location status 3742 of the child and include it in the dashboard interface 3700 .
- the dashboard interface 3700 can include a map with a location status 3742 of the child's user system.
- parents may use the safety system 110 to activate the GPS module in the child's user system remotely to get a better location of the child's user system.
- the safety system 110 can monitor a status of the child's user system 130 , including status of communications module of the device 130 , as indicated in the device status portion 3750 of the dashboard interface 3700 .
- the communications module of the device can include data connection, GPS, or NFC.
- the safety system 110 can poll the device 130 for status of its modules.
- a module of the safety system 110 resident on the child's user system 130 can monitor the status of the user system 130 by polling the operating system of the user system 130 or by directly accessing particular hardware or software modules of the user system 130 .
- the safety system 110 can include the status 3750 of the child's user system in the dashboard user interface 3700 .
- the dashboard user interface 3700 generated by the safety system 110 can also include a photos summary 3760 related to a child.
- the safety system can mine a child's user system for photos taken, sent or received via the child's user system 130 .
- the safety system 110 can intercept the photos and/or videos taken from the memory of the user system 130 before they are deleted by applications like Snapchat or by users of the user system.
- the safety system 110 can also mine through social networking data repositories to retrieve pictures and/or videos related to the child.
- the safety system 110 can use image recognition or use a child's password to obtain the photos and videos from the child's account.
- the corresponding comments relating to the images are also retrieved by the safety system 110 .
- Selecting the photos summary 3760 can change a view focusing on the photos that may be similar to FIG. 40 , for example. Comments and other information regarding the photos may be available when the photo is selected in that more focused view.
- the safety system 110 can group photos retrieved from various sources described above in the photo summary section 3760 . In some embodiments, the photos may grouped by relevance to child's safety. For example, the safety system 110 may selective display photos that may seem lewd, or is associated with a troublesome comment, or includes pictures of alcohol, etc. The photos may also be arranged in chronological order, arranged by source, etc.
- the dashboard user interface 3700 generated by the safety system 110 can include a contacts summary bar 3720 that can illustrate a group of people who communicate with a user of a user system 130 .
- the safety system 110 can monitor communications from the user system 130 and via social networking platforms as discussed herein. Based on the monitoring, the safety system 110 can determine a group of people that a child communicates with most frequently using various modes of communications.
- the safety system 110 can display this group of people with high communication frequency in the contacts summary bar 3720 as illustrated in FIG. 37 .
- the safety system 110 can automatically remove parents or family members from this group of people, in some embodiments.
- the safety system 110 can retrieve pictures of people in that group for display in the contact summary bar 3720 . The pictures may be retrieved from a person's social networking or phone profile (for example, using a designated contact photo).
- the safety system 110 may also calculate statistics (for example percentage communication) for the group of people as discussed more in detail with respect to FIG. 41 .
- Parents can also navigate between monitoring multiple children.
- the safety system 110 can store monitored data for each of the children using respective computer devices in data repository 140 . Based on the stored data, the safety system 110 can generate the dashboard user interface 3700 .
- the safety system 110 can distinguish notifications based on children. For example, parents can select a link 3702 corresponding to a first child or links 3706 and 3710 for second and third children, respectively, to access monitored data for each child.
- the safety system 110 can indicate new notifications 3708 by superimposing numbers on icons representing particular children as illustrated in FIG. 37 .
- the notification icon 3708 can indicate a number of new notifications since the dashboard was previously viewed, new notifications, in the last day, new notifications in a preceding amount of time designated by (and adjustable by) the user, etc.
- Parents can share information from a dashboard view (or any of the disclosed views) with each other. For example, a screen shot from the parent portal can be automatically e-mailed to a spouse or saved for later reference or proof.
- each child can have a single status indicator showing how the child's current location and activities (for example, phone usage) may or may not currently comply with a comprehensive schedule created by the parent or child, for example. Periods of non-compliance can be tracked and recorded. Children can compete with each other to achieve higher levels of schedule compliance and be rewarded with later curfews or other differences in allowed phone usage.
- the disclosed systems can automatically arrange and administer such beneficial competition because it tracks usage, timing, and location, as well as controls smart-phone lock-out and other curfew options. Thus, obedience and other desired behavior can be incentivized automatically using the system.
- the safety system 110 can also include a sidebar 3770 to access other user interfaces generated by the safety system 110 as discussed with respect to FIG. 10A , for example.
- the safety system 110 can generate a sidebar 3770 including an application summary link 3772 , SMS summary link 3774 ; internet summary link 3776 ; location summary link 3778 ; curfew summary link 3780 ; picture summary link 3782 ; and community features summary link 3784 .
- Parents can select one of the links in the sidebar 3770 to access a user interface corresponding to the selected link.
- FIG. 37 is one of various figures illustrating how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views.
- the dashboard view of FIG. 37 can aggregate highly complex and data-rich information for various children (here, Billy, Jenny, and Johnny), and rapidly switch between views for each of the children.
- This graphical display allows efficient review and further access and information by a user of a parent portal.
- the dashboard assembles data in a highly organized and efficient manner, but also acts as a dashboard organizing active control functionality.
- FIG. 38 illustrates an embodiment of a process for generating or refreshing a dashboard user interface 3700 .
- the safety system 110 can access and extract data from or about more than one of the user system's software application and/or hardware modules.
- the software applications can include a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application.
- Hardware modules can include location module or communications module or battery.
- the extracted data can be sent to an analysis server.
- the analysis server can identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications.
- the generated results from the analysis can be sent to a parent portal for display such as that of FIG. 37 .
- FIG. 39 illustrates another embodiment of a dashboard user interface 3900 generated by the safety system 110 .
- the notifications are limited to Facebook notifications for a particular child (“Billy”).
- the safety system 110 can enable parents to review notifications corresponding to a particular application software or social networking website. For example, parents can select a particular application from a list of applications as described more in detail with respect to FIGS. 14, and 43-45 .
- the safety system 110 can generate the dashboard user interface 3900 including Facebook related notifications.
- the safety system 110 can use aggregated Facebook data for a particular child stored in data repository 140 .
- the icons at the left of the timeline view 3910 e.g., Facebook icon 3912 ) can indicate the source of the information displayed.
- text can be provided indicating how long it has been since the noted event occurred.
- a comment can be shown in a conversation bubble, and a photo or other identifier for a person making the comment can also be shown.
- the safety system 110 can retrieve information from Facebook through an authentication handshake with Facebook servers and/or API.
- FIG. 40 illustrates another embodiment of a photo/video summary user interface 4000 that can be generated by a safety system 110 .
- the safety system 110 can also include photos taken or downloaded on a child's computing devices or received via messaging, or from other social networking sources. Accordingly, parents can quickly browse pictures related to their child in one place.
- the photos can be organized according to threat relevance, or they can be organized chronologically, sortable by source, etc.
- FIG. 41 illustrates an example dashboard user interface 3700 generated by the safety system 110 that includes a contacts summary bar 4102 that can display statistics directly on the user interface.
- the illustrated view of the contacts summary bar 4102 can be selected or otherwise controlled by a user such that the view toggles between that shown here and the more compact view illustrated for the contacts summary bar 3720 in FIG. 37 .
- the bar is expanded to show bar graphs indicating the relative frequency of communication with a set of people. This expansion and reduction—toggling between the versions showing in FIGS. 37 and 41 —can be accomplished with a specific button or control.
- the icon 3716 (which includes a stylized bar graph icon) can be selected to change this view.
- the contacts summary bar 4102 can include a group of people in communication with a user of the computing device 130 .
- the safety system 110 can automatically generate graphs and sort this group of people based on the amount of interaction (calculated by number of communications, number and length of communications, or using other methods), including messaging via SMS, Snapchat, Facebook, WhatsApp, phone calls, etc.
- the safety system 110 can assign weights to certain types of communication to determine a representative amount of interaction for comparison. For example, a child may send 100 messages per day to a first friend, but may spend half an hour on the phone per day with a second friend. The safety system 110 can appropriately weight the messages with the phone time to compare the time spent by the child with the first friend versus the second friend. Accordingly, parents can easily view a snapshot of who their children mostly interact with using their smart phone.
- the user interface 3700 allows a user to select for comparison a subset of communications (for example text messages).
- a visual comparison can be provided indicating with whom a child has the most frequent and/or longest lasting communications by a particular channel—e.g., SMS texts, e-mails, phone calls, etc.
- the safety system 110 can also allow a parent to select a time frame from which to draw the data for the statistical bar graph comparison (e.g., using the “today” button 4112 , the “this week” button 4114 , or the “all time” button 4116 ) as illustrated in FIG. 41 .
- the graphs generated by the safety system 110 can be illustrated in a wide variety of forms.
- the safety system 110 generates a bar graph with each bar 4104 including a face profile of the relevant person (e.g., drawn from one of that person's social networking sites or profiles) and a communication metric (for example 40%, meaning that approximately 40% of Bill's total communications in the relevant time period have been with that person).
- a communication metric for example 40%, meaning that approximately 40% of Bill's total communications in the relevant time period have been with that person.
- the size of the faces can be enlarged proportionally to the number of communications (e.g., as an alternative to including taller bars for the most frequently communicating parties).
- the example contacts summary bars 3720 and 4102 can both include a visual indication of which child's conversations are being summarized.
- a conversation feature 4190 is illustrated as pointing to the photograph of Billy.
- contact summary bar 4102 This causes the contact summary bar 4102 to resemble a stylized conversation bubble, indicating that Billy is conversing with the people shown.
- Billy's photo is also set off by a thicker border, providing an example of how a visual display can provide emphasis and draw attention to indicate which of the children's activities are being summarized in the current view.
- FIG. 41 illustrates how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views.
- FIG. 42 includes a notification summary user interface 4200 generated by the safety system 110 .
- the notification summary user interface 4200 can include a number of notifications sorted according to child and time, with headings for each day as shown.
- FIGS. 43-45 illustrate embodiments of application summary user interfaces generated by the safety system 110 .
- FIG. 43 illustrates an application usage interface 4300 including a graph 4310 showing usage statistics of application software on a child's user system 130 .
- the safety system 110 can retrieve statistics stored in a data repository (e.g., user parameters 140 of FIG. 1 ) based on monitoring as discussed above.
- the graph 4310 can include a pie chart as illustrated in FIG. 43 . This pie chart or an alternative display showing application usage can also be included on a dashboard view (in place of or in addition to the portions 3742 , 3750 , and/or 3760 of FIG. 37 , for example).
- the graph 4310 can also include (or be replaced by) a bar chart or other graphs suitable for displaying percentage usage of different software applications.
- the safety system 110 can monitor application usage based on one or metrics. For instance, the safety system 110 can monitor usage based on tracking the amount of time a particular application is running, open, and/or visible to a user on the display of the user system. Other metrics can include amount of data used or number of messages sent.
- applications running in the background or running while a smartphone is in sleep mode can be not included as “used” during that time period; similarly, use can be defined to require that a child has been either actively viewing or interacting with them to count as being “used.”
- the safety system 110 can also provide a time period selector 4312 for parents to review application usage over a particular time period.
- the safety system 110 can determine an application most frequently used by the child (“Top App” 4328 ) on the user system 130 in the relevant time period and include it in the generated application usage interface 4300 as shown.
- the usage interface 4300 can also include an application usage listing 4320 with a last used time 4322 indicating when an application was last accessed.
- the safety system 110 can retrieve this data stored as part of monitoring the user system 130 in a data repository (e.g., user parameters 140 of FIG. 1 ).
- the safety system 110 can also retrieve a stored description 4326 of an application from a data repository (e.g., system parameters 150 of FIG. 1 ).
- the stored description 4326 may be automatically obtained based on description from other parents or application store.
- FIG. 44 illustrates a current applications interface 4400 generated by the safety system 110 .
- the safety system 110 can identify applications of concern installed on a child's user system 130 .
- the safety system 110 polls the operating system of the user system 130 to identify installed applications.
- the safety system 110 can store the applications in the data repository 140 .
- the safety system 110 can update the list of applications stored in a data repository (e.g., user parameters 140 of FIG. 1 ).
- the safety system 110 can also maintain a list of application software, its ratings, and description in a data repository (e.g., system parameters 150 of FIG. 1 ). The list can be updated based on community feedback.
- the safety system 110 can generate the current applications interface 4400 .
- the current applications interface 4400 includes a list of “applications of concern” 4412 .
- the safety system 110 can also provide a description 4420 for each of the applications of concern in some embodiments, which may be generally hidden until a particular application or related icon is selected, for example.
- the safety system 110 can also sort applications between those of concern and others which are also installed on the user system 130 , but which may not be known for posing potential danger to children.
- FIG. 45 illustrates an application installations interface 4500 generated by the safety system 110 .
- the safety system 110 can track installation and removal of application software on the child's user system 130 . Further, the safety system 110 may store the time an application was installed or removed in a data repository (e.g., user parameters 140 of FIG. 1 ). Based on this stored data, the safety system 110 can generate the application installations interface 4500 including a listing 4512 of applications installed or removed and the corresponding time that the child took that action.
- a data repository e.g., user parameters 140 of FIG. 1
- FIG. 46 illustrates an embodiment of an SMS activity interface 4600 generated by safety system 110 .
- the safety system 110 can monitor and store messaging communications originating from or received at each of the child's user systems 130 .
- the analysis module of the safety system 110 can identify messages of concern as discussed above.
- the safety system 110 can aggregate messages of concern based on the child and the contact person.
- messages from Billy to Jacob are shown as per a user's selection. While all messages related to a contact may be included in the SMS activity interface 4600 , the safety system 110 can sort through the messages to include only messages of concern.
- the safety system 110 can include a blocked indicator 4420 to show whether a particular contact related to the message is blocked. Parents may select a contact for blocking using the indicator 4420 .
- the safety system 110 can intercept messages from blocked contacts and may not show the blocked messages to the child until reviewed by parents.
- the safety system 110 can automatically block messages based on content and display it in the SMS activity interface 4600 for parental review.
- the safety system 110 can automatically block the contact such that messages cannot be received or sent to the contact based on detecting content of concern in messages.
- the safety system 110 can also detect if the number of the blocked contact or a method of communication with the blocked contact has changed.
- the safety system 110 can prevent blocked contacts or users from circumventing the system.
- the safety system 110 can track if a message belongs to the same contact previously blocked based on continuity of conversation, the contact's phone ID (for example mail account, MAC address, etc.).
- the safety system 110 may modify the contact summary bar 4410 included in the SMS activity interface 4600 .
- the safety system 110 may organize and sort contacts in the bar 4410 based solely on SMS instead of other modes of communications discussed above with respect to FIG. 37 .
- the safety system 110 can also include search toolbar 4430 to enable parents to search through messages communicated via the child's user system 130 .
- FIG. 47A illustrates an SMS filters interface 4700 generated by safety system 110 .
- Parents can use the SMS filters interface 4700 to manage messaging communications (for example SMS) from their child's user system 130 .
- the safety system 110 can auto block certain messages and contacts.
- parents can modify auto block settings 4702 and 4704 via the SMS filters interface 4700 .
- parents can select a number of words of concern (or filtered words) 4704 before a contact is automatically blocked.
- the safety system 110 can include a list of blocked senders 4706 in the SMS filters interface 4700 .
- FIG. 47B illustrates another embodiment of an SMS filters interface 4720 generated by safety system 110 .
- the SMS filters interface 4720 can include a search filter list control 4722 to review whether a particular word is being monitored or filtered.
- users can add words to the filtered words list stored in data store 140 .
- FIG. 47C shows that, in one embodiment, when a user begins typing a particular word, the safety system 110 can retrieve words from the filter list similar to the typed word. Accordingly, the user can identify the words in the filter list based on their input. If the word is not in the filtered list, the user can add their inputted word into the filtered list.
- the safety system 110 can store the new word and include it in monitoring past and future communications.
- FIG. 47C illustrates an embodiment of an SMS analytics interface 4730 generated by the safety system 110 .
- the SMS analytics interface 4730 can generate overall summary based on SMS communications sent and/or received by one or more user systems 130 belonging to respective children.
- the SMS analytics interface 4730 can enable parents to visually identify SMS offenders and SMS related issues with respect to their children.
- the safety system 110 can identify word usage frequency from the filtered list.
- the top 20 words that are used in SMS communications from the filtered list are shown in a listing 4738 .
- the listing 4738 is sorted by usage frequency of words in the filter list.
- the listing 4738 may identify a user associated with the word.
- the listing 4738 may identify the user who has received and/or sent the offensive word with the highest frequency compared to other users.
- the listing 4738 may also include an icon identifying the source of the word.
- the icon can include a symbol or color corresponding to one of the applications, such as Facebook, SMS, etc.
- the safety system 110 can show additional details 4740 related to the selected word. A word can be selected based on clicking on it or hovering over it. Additional details 4740 can include a listing of users associated the selected word and the corresponding frequency of usage.
- the safety system 110 can generate a graphical summary 4732 to visually organize SMS summary.
- the graphical summary 4732 is a pie chart illustrating a distribution of offensive word usage frequency.
- “sucks” is the most frequently used offensive word in the SMS communications, which may include sent and/or received SMS messages.
- the safety system 110 can generate additional details 4734 when a particular word or a graphic element corresponding to the word is selected. As discussed above, selection may be a function of a click or a touch input or hovering over the area of interest. As shown, the additional details 4734 can visually show children associated with the selected offensive word.
- the safety system 110 shows a pictorial representation of Billy, Jenny, and Johnny for being associated with the offensive word “frick.”
- the safety system 110 can show a graphic 4736 when Johnny is selected.
- the graphic can indicate that Johnny used the offensive word “frick” 5 times.
- the safety system 110 can enable customized analysis of SMS data. For example, in some embodiments, parents may be able to generate graphs 4732 based on selecting one or more of the following factors: sent messages, received messages, one or more children, time period, etc.
- the safety system 110 can enable parents to define their own custom rules 4708 for filtering messages. For instance, parents can select certain words (for example “drunk”) or terms and connectors (“drunk” near “driving”). The safety system 110 can use these custom rules to filter messages. The safety system 110 can also track word usages and include a listing of most used words in a list 4710 as illustrated. The safety system 110 can employ image recognition or optical character recognition to prevent contacts from using picture in messages to avoid bypassing filters.
- FIG. 48 illustrates a web access interface 4800 generated by safety system 110 .
- the web access interface 4800 can provide parents options to control which websites can be accessed on child's user systems 130 . For example, parents can select a flagging mode 4810 . Based on the selected flagging mode, the safety system 110 can block a list of problem websites and/or flag these list of problem websites. The safety system 110 can allow parents to input the list of problem websites as illustrated at 4820 . In some embodiments, the safety system 110 can automatically suggest problem websites based on collaborative feedback from users.
- FIG. 49A illustrates an embodiment of a location user interface 4900 generated by the safety system 110 .
- the example of FIG. 49 may provide functionality similar to that discussed with respect to FIGS. 18 and 33 .
- the location user interface 4900 can provide parents with a visual notification of where their children's user systems 130 are currently located and where they have been in the past.
- the safety system 110 can generate a map 4910 to display the location information 4912 of the respective user systems.
- the safety system 110 can show all the user systems belonging to each of the children on one map 4910 .
- the safety system 110 can include landmarks on the map 4910 . Landmarks can include school, home, a circle with a radius of preset distance from home or school.
- the safety system 110 can also display most frequently visited locations on the map 4910 .
- the safety system 110 may also include a search bar 4914 that can allow a parent to lookup location history of the child's user system.
- a geographic movement pattern (comprising a tracing of a route, for example) can be graphically disassociated from the underlying map and compared to other movement patterns—e.g., by superposition and/or juxtaposition, holding map size generally constant between data sets, etc.—to assist a user with review and comparison.
- FIG. 49B illustrates location history data 4920 generated by the safety system 110 .
- the location history data 4920 can be included in the dashboard described above.
- the location history data 4920 may also be shown in a separate window or separately from other notifications.
- the location history 4920 shows location updates of Billy's phone.
- the location history 4920 may also show other devices belonging to either Billy or other children.
- the location history 4920 may be sorted according to a chronological order. In some embodiments, the location history 4920 may be sorted according to priority of alert which may depend on a determination by the safety system whether the location might be deviating from the norm.
- Each location notification may identify a child, an event, and a place or geofence associated with the event.
- the illustrated example shows that “Billy left Home”, “Billy arrived at School”, “Billy has entered restricted location ‘The Mall’, and “Billy has left the safe place ‘Our Neighborhood.’”
- the locations identified in the notifications may include places or geofences.
- places may include “home”, “school” and the “mall” while geofences may include “our neighborhood”.
- FIG. 49C illustrates an embodiment of an interface 4930 for selecting and storing places and/or geofences using the safety system 110 .
- the places and geofences created can be unique to a user or applied among multiple users.
- a parent can select a place using control 4936 A as shown more in detail with respect to FIG. 49F .
- a parent can create a geofence using control 4936 B as shown more in detail with respect to FIG. 49G .
- the safety system 110 can provide a map in the interface 4930 . As discussed above, the safety system 110 can visually display a location 4934 of a user system 130 on the map provided in the interface 4930 .
- Billy's phone is located at 4934 on the map which may correspond to an address or a known location or one of the stored places.
- Known locations can include malls, restaurants, schools, friend's houses, dentist, doctor's office, etc.
- the safety system 110 can store known locations based on user input and/or third party data sources.
- the safety system 110 can display an address or known location 4932 along with the location 4934 of Billy's device. Further, the safety system 110 can enable users to save current location as one of the places for future recognition.
- the safety system 110 can also include a timeline search as described with respect to FIG. 49D .
- the safety system 110 can enable parents to track location of children over time using a timeline search control 4942 shown in FIG. 49D .
- the last 7 days are selected for timeline search.
- the active link 4942 can enable parents to select any time period.
- the safety system 110 can retrieve stored location data about a particular user system 130 from the data repository 140 for the selected time period.
- the safety system 110 can generate visual indications 4938 on the map based on the retrieved data.
- the visual indications 4938 may show a path of transit of the user device 130 over the selected time period.
- the visual indications 4938 can show only places of interest and discard transit information.
- the safety system 110 can also highlight certain locations 4946 and 4944 in the visual indication 4938 , as shown in FIG. 49E .
- the safety system 110 can also indicate a period of time that a user system 130 was at a particular location.
- the safety system 110 can automatically identify in the visual indications 4938 , particular locations ( 4944 and 4946 ) where the user system was stationary (with respect to the boundary of that location) for at least a predetermined time period.
- the predetermined time period is 15 minutes.
- the predetermined time period can be more than 15 minutes or less than 15 minutes.
- the predetermined time period can be 30 minutes or 1 hour.
- the safety system 110 can store places like homes and school. Accordingly, the safety system 110 can illustrate on the map stored places.
- the safety system 110 can also show on the map new locations (for example, “Billy was at 251 W 3 rd St for 15 m”). Accordingly, parents can get a visual snapshot of their children's whereabouts over a time period and identify places that their children are frequently visiting. For example, parents can identify trends such as Billy was at school for a shorter duration than normal hours on Wednesday (as shown in the figure). In another example, parents can review a new location—251 W 3 rd St that Billy stopped over for 15 minutes.
- FIG. 49F illustrates an example for using the interface 4930 to identify and store a new place.
- parents can select a control 4952 to add a new place.
- Parents can enter a name of the place, select whether the place is a safe place or a place for concern, or select whether to apply the place for a particular child or all the children.
- parents can select notification settings for safety system 110 for when to generate alerts with respect to the new place. For example, in some embodiments, parents can select to generate notifications when the child's user system 130 enters and/or leaves the newly added place.
- the geographical location of the place can be selected by entering an address in the control 4952 or selecting a location 4950 on the map.
- the safety system 110 can also suggest locations 4946 based on the user's input via text or map. Parents can also select a color 4954 or other identification symbol for the newly added place.
- the safety system 110 can also include in the map predetermined locations such as stores or restaurants or any other places of interest. Parents can select one of these predetermined locations as a stored place.
- FIG. 49G illustrates an example for using the interface 4930 to add or modify geofences.
- a geofence can indicate a bounded area on a map.
- Parents can select a particular shape 4958 based on their desired preferences for a particular geofence. For example, parents may create a neighborhood geofence as a safe place and select alerts for whenever a user device crosses a boundary of the geofence. In some embodiments, parents may draw any shape on the map to create a geofence. In the illustrated embodiment, parents can drag points on a shape 4958 to create the geofence. Further, the safety system 110 can enable parents to drag points of the shape to automatically snap on to streets or intersections displayed on the map.
- the shape 4958 can include eight points that can be dragged to create a geofence. Furthermore, the position of the shape 4958 corresponding to a geofence can also be moved on the map. Parents can assign a name, color, or symbol to identify the geofence. The name, color, or symbol may be used by the safety system 110 in the notifications. Parents can also select when they would like to be notified for the created geofence. For example, the safety system 110 can provide options for parents to enable notifications when the user system 130 enters and/or leaves the geofence. The safety system 110 can also enable parents to apply the geofence to some or all of their children as illustrated in FIG. 49G . Further, the geofence can be associated as a safe place or a place of concern. Based on the selection, the safety system 110 can modify its notifications with respect to the geofence.
- FIG. 49H shows a list of geofences and places 4960 added by parents using the interface 4930 . Further, parents can selectively turn on and off notifications corresponding to the selected geofence or places as shown in the figure.
- the illustrated figure also shows a path of the child's user system 130 for the particular day including stops and the last location. The known stops can be displayed on the map as shown in FIG. 49I .
- parents can select whether to show a particular place or geofence by selecting an active control 4962 . Active controls can include links, hyperlinks, buttons, check box, etc.
- FIG. 50A illustrates an embodiment of a curfew user interface 5000 generated by the safety system 110 .
- the example of FIG. 50A may provide functionality similar to that discussed with respect to FIG. 19 .
- the curfew user interface 5000 can enable parents to select curfew settings for their children's user systems 130 .
- the curfew settings 5010 can include day and time when a particular set of curfew rules may be activated by the safety system 110 .
- the curfew settings rules are preselected to completely disable the user system except for some phone services as discussed above. Accordingly, parents can select times of day to enable and disable curfew to prevent children from using their user systems 130 during school, after bedtime, homework time, etc.
- FIG. 50B illustrates another embodiment of a curfew user interface 5050 generated by the safety system 110 .
- their parents have been using the disclosed systems, resulting in improved attitudes and demeanors in their profile photos.
- parents can select virtual slider control knobs 5014 , displayed above each day column, to enable curfew settings on or off for that day of the week. Further, parents may be able to select time slots of restrictions by clicking anywhere on the calendar to create new boxes. Resizable boxes 5020 are illustrated superimposed on a calendar view 5024 .
- Parents can also move and drag boxes, and/or the borders and edges of boxes, to adjust the timing and/or duration of the restricted use periods or curfews. Parents may find it efficient to use the curfew user interface 5050 in some instances on a touch screen computing device. Similar interfaces can be used for other settings and interactions with a safety system 110 . For example, resizable, moveable shapes, superimposed on a map, for example, can be used for setting geographic restrictions, geo-fencing, etc.
- the safety system 110 can apply curfew settings automatically based on locations, places, or geofences. For example, entry into a safe zone or getting out of curfew time may automatically reactivate some of the functionality of the user system 130 .
- FIG. 51 illustrates an interactive “devices” screen 5100 of an account user interface generated by a safety system 110 .
- This screen can be generated by or associated with the account management module 120 of FIG. 1 .
- Account settings interactive screens can be accessed using a control associated with the “Welcome, Rowland Day” dropdown menu indicator 5101 , which can initiate a menu showing a “log out” control or a “my account” control.
- the “my account” control (not shown) can be selected and result in various settings pages, accessible by the tabs 5103 .
- the “my account” bar 5132 can include a pointer 5136 indicating that the current account is that of the example parent, Rowland Day (protecting children since Feb. 11, 2011).
- An additional parent or guardian can be added using the add parent button 5142 and an additional child can be added using the add child button 5147 .
- the tabs 5103 can include, for example, an “account info” tab, a “profile” tab, a “notifications” tab, and a “devices” tab.
- the devices screen 5100 can be accessed by selecting the device tab, and this screen can include an existing device box 5102 showing details of devices already added (and allowing for their removal), as well as administrative tools to register additional controller user systems 130 (e.g., user systems 130 used by parents) with the safety system 110 .
- the safety system 110 can add a registered controller user system 130 as one of the devices to send notifications to regarding child user systems 130 using the add device control 5104 .
- both parents can receive updates from children's user system 130 once their devices are registered with the safety system.
- Subscription plan information can be included at 5112 , a devices installed and remaining dialogue 5120 can be provided, and an “upgrade” button 5124 can allow a user to increase the number of registered devices.
- the safety system 110 can display a subset of interactive account screens associated with Billy and settings for monitoring and protection of Billy's device, as shown in FIG. 52 .
- the tabs available for an example child, Billy are “profile,” “notifications,” and “devices”—but not “account info.” Similar to the example shown in FIG. 51 , a “devices” tab can be available for initiating a link or viewing an existing link with Billy's device(s).
- setting up a child device can include a snapshot showing devices that have been installed (e.g., by installing on safety system plugin 132 on the devices 130 ). Such a snapshot can indicate the name of the child, the name of their device, whether or not a plugin or app has been installed on the device, whether the device is powered on, whether it has a data connection, and whether a GPS function is on.
- This same snapshot can include a control that allows a parent to remove the device from the parent's account.
- FIG. 52 illustrates an example interactive “profile” screen 5200 for Billy.
- This view can be generated by or associated with the account management module 120 of FIG. 1 .
- the “profile” screen 5200 can enable parents to customize monitoring settings for their children's user systems 130 .
- the settings may include update frequency which can be balanced with battery life of the user system 130 .
- the safety system 110 can send an alert of low battery of one of the child's user system 130 to a parent's user system. Based on the low battery alert, the parents may use safety system 110 to disable some of the modules of child's user system 130 .
- the safety system 110 can activate curfew mode on child's user system 130 with a low battery status.
- the account user interface 5200 may also enable parents to input a child's credentials so that the safety system 110 can use the credentials to monitor social networking portals. As discussed above, the safety system 110 can also monitor social networking portals without requiring credentials by intercepting via the operating system of the user system 130 .
- Setting up a child device can be initiated on that child's mobile device as illustrated in FIG. 32 .
- the process can also include initiating settings for that child (e.g., using a color control 5224 to select a color for items viewed relating to that child in a parent interface, using an update control 5228 to select an “update frequency” for that child, etc.)
- Selecting or designating an update frequency can include interacting with a control 5228 that comprises selecting from a drop-down list comprising various intervals—e.g., 5, 10, 15, or 30 minutes, 1 hour, 2 hours, etc. The more frequent the updates, the more rapid battery resources are used, which can affect battery life of a mobile device.
- Setting up a child device can further include social network settings 5212 associating a child's social networks with a safety system 110 , which can include gathering log in information as a child logs in to a social network site. As indicated at 5212 , settings can be used to selecting which notifications to receive regarding that child from a social network (in this case, Facebook).
- FIG. 53 illustrates an interactive “notifications” screen 5300 . This interactive screen is also associated with Billy, as shown.
- the account user interface 5300 further enables parents to customize what type of alerts they want to receive from safety system 110 related to their child's user systems. As shown in the example of FIG.
- a user interface can include user controls by which a parent can select one or more of the following options for which notifications to receive: SMS (if a filtered word is sent or received via SMS or MM, or if the user contacts a filtered number; WWW (if user tries to access a flagged URL); Curfew (if a user closes the curfew screen); GPS (if GPS is disabled or re-enabled on the device); Device Data (if a data connection to the device is lost or reconnected); Apps (if an app is installed or uninstalled); Account (if any account changes are made via the web admin interface).
- FIGS. 21 and 34 show example interfaces that can be used for these or similar purposes, in particular when a user desires to update or change the settings provided when initially setting up a child device as described here with respect to FIG. 53 .
- the user systems and described herein can generally include any computing device(s), such as desktops, laptops, video game platforms, television set-top boxes, televisions (for example, internet TVs), computerized appliances, and wireless mobile devices (for example smart phones, PDAs, tablets, or the like), to name a few.
- computing device(s) such as desktops, laptops, video game platforms, television set-top boxes, televisions (for example, internet TVs), computerized appliances, and wireless mobile devices (for example smart phones, PDAs, tablets, or the like), to name a few.
- the user systems described herein can be different types of devices, to include different applications, or to otherwise be configured differently.
- the user systems described herein can include any type of operating system (“OS”).
- OS operating system
- the mobile computing systems described herein can implement an AndroidTM OS, a Windows® OS, a Mac® OS, a Linux or Unix-based OS, or the like.
- the safety system 110 described above may operate with mobile computing systems using Android OS.
- the Android OS may provide software libraries to access and/or control the mobile systems.
- the safety system 110 can include an Apps Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve a list of installed apps, retrieve a list of uninstalled apps, and track usage of currently installed apps.
- the Apps Agent may use one or more of the following classes: AppsAgentService, AppsIconService, AppsInstallService, AppsUninstallService, AppsUsageService, AppsUsageSyncService, ProtectedActivity, AppModel, PackageIntentReceiver, or AppsLoader.
- the Apps Agent can run at specific intervals based on a Frequency Agent Service.
- the App Agent can check for the history of apps installation from Android's Package Manager and then check it against the currently synced apps from the server. If it is not synced, (for example) then the App Agent may then check if the app is currently installed to classify it as installed or uninstalled. If an app is already synced to the server, the Apps agent may check for the difference (in time) of the app's launch until it closed.
- the safety system 110 can also include a Curfew Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve current date/time, and lock phone.
- the Curfew Agent may use one or more of the following classes: CurfewAgentService, ProtectedActivity, Curfew, CurfewManager, or StaticCurfewManager.
- the Curfew Agent can retrieve current date and time.
- the Curfew Agent can run at specific intervals based on Frequency Agent Service.
- the Curfew Agent can retrieve a list of pre-identified curfew times from the server and then check it against the current date and time of the device. If the current date and time retrieved from the server matches the device's current date and time, the Curfew Agent can lock the device and set the lock's password the current WebSafety account logged into the device.
- the safety system 110 can also include a Device Status Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve device's power state, retrieve device's connection type (WiFi or cellular) and status, retrieve device's GPS status, and retrieve installation state of the safety system on the mobile device.
- the Device Status Agent may use one or more of the following classes: DeviceStatusAgentService, ProtectedActivity, BootCompleteReceiver, NetworkChangeReceiver, or ShutDownReceiver.
- the safety system 110 can also include a Location Agent, which may use one or more of Android's classes for at least retrieving the device's geographical location.
- the Location Agent can runs at specific intervals based on Frequency Agent Service.
- the Location Agent can check for the current device's location if a location provider is available (GPS or Mobile). If a location provider is available, it can then send the device's current location to the server.
- the Location Agent may use one or more of the following classes: FuseLocationAgentService, LocationAgentService, ProtectedActivity, and GPSLocationChangeReciever.
- the safety system 110 can also include an SMS agent, which may use one or more of Android's classes for at least retrieving the device's SMS threads and messages.
- the SMS agent can run at specific intervals based on Frequency Agent Service.
- the SMS agent can check for unsynced message threads from the last 6 hours. If the message thread is not synced yet, it may flag it as unsynced and send the thread details (message thread id, messages, thread sender, and thread receiver) to the server. Otherwise, if a thread is already synced, the SMS Agent may then check if there are new messages within the thread and sync it to the server per thread accordingly.
- the SMS Agent may use an SMSAgentService class.
- the safety system 110 can also include a WWW Agent, which may use one or more of Android's classes for at least retrieving device's browsing history.
- the WWW Agent can run at specific intervals based on Frequency Agent Service.
- the WWW Agent can retrieve the device's browsing history since the last query and send it to the server.
- the WWW Agent may use one or more of the following classes: WWWAgentService or Bookmark.
- the safety system 110 can also include a Frequency Agent Service, which may use one or more Android's classes for at least retrieving the frequency of services server synchronization rate.
- the Frequency Agent Service can retrieve parent set update frequency from the dashboard.
- the Frequency Agent Service can use UpdateFrequencyAgentService.
- processing of the various components of the illustrated systems can be distributed across multiple machines, networks, and other computing resources.
- two or more components of a system can be combined into fewer components.
- the various systems illustrated can be distributed across multiple computing systems, or combined into a single computing system.
- various components of the illustrated systems can be implemented in one or more virtual machines, rather than in dedicated computer hardware systems.
- the data repositories shown can represent physical and/or logical data storage, including, for example, storage area networks or other distributed storage systems.
- the connections between the components shown represent possible paths of data flow, rather than actual connections between hardware. While some examples of possible connections are shown, any of the subset of the components shown can communicate with any other subset of components in various implementations.
- acts, events, or functions of any of the algorithms, methods, or processes described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms).
- acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, multiple processors or processor cores, or on other parallel architectures, rather than sequentially.
- Each of the various illustrated systems may be implemented as a computing system that is programmed or configured to perform the various functions described herein.
- the computing system may include multiple distinct computers or computing devices (for example, physical servers, workstations, storage arrays, etc.) that communicate and interoperate over a network to perform the described functions.
- Each such computing device typically includes a processor (or multiple processors) that executes program instructions or modules stored in a memory or another non-transitory computer-readable storage medium.
- the various functions disclosed herein may be embodied in such program instructions, although some or all of the disclosed functions may alternatively be implemented in application-specific circuitry (for example, ASICs or FPGAs) of the computer system.
- computing system includes multiple computing devices
- these devices may be, but are not required to be, co-located.
- the results of the disclosed methods and tasks may be persistently stored by transforming physical storage devices, such as solid state memory chips and/or magnetic disks, into a different state.
- Each process described may be implemented by one or more computing devices, such as one or more physical servers programmed with associated server code.
- Embodiments of the disclosed systems and methods may be used and/or implemented with local and/or remote devices, components, and/or modules.
- the term “remote” may include devices, components, and/or modules not stored locally, for example, not accessible via a local bus.
- a remote device may include a device which is physically located in the same room and connected via a device such as a switch or a local area network.
- a remote device may also be located in a separate geographic area, such as, for example, in a different location, building, city, country, and so forth.
- modules refers to logic embodied in hardware and/or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, C or C++.
- a software module may be compiled and linked into an executable program, installed in a dynamically linked library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts.
- firmware such as an erasable programmable read-only memory (EPROM).
- hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays, application specific integrated circuits, and/or processors.
- the modules described herein are preferably implemented as software modules, but may be represented in hardware and/or firmware.
- a module may be separately compiled, in other embodiments a module may represent a subset of instructions of a separately compiled program, and may not have an interface available to other logical program units.
- code modules may be implemented and/or stored in any type of computer-readable medium or other computer storage device (for example, hard disks, RAM, ROM, flash memory, etc.).
- Computer-readable media include non-transitory computer-readable media such as magnetic storage, optical storage (for example, CD-ROMs or DVDs), semiconductor storage, etc.
- data (and/or metadata) input to the system, data generated by the system, and/or data used by the system can be stored in any type of computer data repository, such as a relational database and/or flat file system. Any of the systems, methods, and processes described herein may include an interface configured to permit interaction with other systems, components, programs, and so forth.
- modules may operate as a single unit.
- a single module may comprise one or more subcomponents that are distributed throughout one or more locations.
- the communication between the modules may occur in a variety of ways, such as hardware implementations (for example, over a network, serial interface, parallel interface, or internal bus), software implementations (for example, database, DDE, passing variables), firmware implementations, a combination of hardware and software, etc.
- the modules of the safety system 110 are distributed such that some of the functionality runs locally on the mobile device or the user system 130 and other (e.g., the remaining) functionalities run on remote computer systems (see e.g. the remote computing system 5540 shown in FIG. 55 ).
- the remote computing system can be servers operating the portions of the safety system 110 .
- the remote computing system can also be the user systems 130 .
- the remote computing system can include third party systems 104 or system administrator 108 .
- the remote computing system can be accessed over a network 102 .
- FIG. 54 illustrates an embodiment of a user system which implements some functions of a safety system.
- the user system 130 in FIG. 54 can include hardware such as user system hardware 5440 (e.g., GPS, camera, antenna, and so on), a hardware processor 5450 programmed to execute the various software modules in the logical blocks, and a memory 5460 configured to store activity data of the user system 130 as well as various software instructions in the logical blocks.
- the user system 130 can also include logical blocks such as a safety system application/plug-in 132 , an operating system 5420 , and a local data store 5430 .
- the local data store 5430 can include instructions for storing activity data of the user system 130 .
- the safety system application/plug-in 132 can include instructions which includes instructions to capture and communicate (to a remote computing system) data generated by hardware blocks such as the user system hardware 5440
- the installation process can create one or more agents or services 5410 to run in the background along with the operating system 5420 (such as Android, iOS, Windows, Linux, etc.) of the user system 130 .
- the agents 5410 can collect data, communicate data with remote computing system, and control operations of the user system 130 .
- a safety system plugin 132 can include six agents to implement the functionality of the safety system 110 the monitored user system 130 : an apps agent, a curfew agent, a device status agent, a location agent, a SMS agent, and a WWW agent.
- the mobile safety system 110 can also include a general update frequency agent.
- the App Agents can perform the following functionalities: adding installed apps to the server, removing uninstalled apps from the server, uploading icons for installed apps, and tracking the amount of time a user uses a particular application on the user system 130 .
- Notifying a remote computing system of which apps are installed can be handled by the AppsInstallService class.
- This service can execute once every update cycle, for example.
- the update cycle can be specified by the user.
- the update cycle can also be determined based on the battery life or power management of the user system 130 .
- the AppsInstallService can execute the following steps of a process.
- the AppsInstallService can retrieve a list of all apps currently installed on the device by querying Android's PackageManager service. Next, it can compare this list to the list of apps currently stored in a local sqlite database (db), if any. Any new apps that are not present in the sqlite db are put into a separate list which is then passed into a newly created WSAppsTask object.
- db local sqlite database
- This task object posts the list of new apps to the server.
- the task checks if the new apps have an icon image associated with them, and if not, sets a flag indicating the icon might have to be uploaded (see below).
- the task can then store the newly reported apps in the sqlite db to be used in the list comparison during the next update cycle.
- Notifying the server of which apps have been uninstalled can be handled by the AppsUninstallServices class.
- This service can perform the inverse operation of the AppsInstallService. Every update cycle, it can query the list of currently installed apps from the PackageManager and compare this to the list of apps stored in the sqlite database. If there are any apps in the database that are not reported as being installed by the PackageManager, they can be stored in a list and passed to a new WSAppsTask object. The task posts the uninstalled apps list to the server.
- the uninstall service is notified of the result of the request, and updates the sqlite database to remove the apps that were uninstalled.
- Uploading the app icons for installed apps can be handled by the AppsIconService class.
- This service contains logic to initialize a WSUploadAppsIconTask object every update cycle.
- This task retrieves a list of apps that were previously flagged to upload an icon from the sqlite database. It can then iterate through each app, retrieve the icon image for the app from the PackageManager service, and upload it to a dedicated bucket on the remote computing system. After the upload is complete, the task can send an update request to the remote computing system to store the URL of the newly created icon image.
- the tracking of app usage can be handled by the AppsUsageService and AppsUsageServiceV21 classes. These classes can query app usage data from the system and store that data in the local sqlite database by either updating existing records or inserting new records. The difference between the two classes is in their implementations, as AppsUsageService retrieves the usage data from a service that is deprecated in Android version 21, so AppsUsageServiceV21 fills in that gap by using an alternate method that requires the user to explicitly grant the mobile safety system 130 access to usage data. In other operating systems, similar permission access requests may be required.
- the AppsUsageSyncService class can upload the data. It queries the db for all new usage data then passes that list to a WSAppUsagesTask which posts the data to the remote computing system. The data may be deleted after transmission to the remote computing system.
- the Curfew Agent comprises the following functionality: retrieving curfew settings from the remote computing system, scheduling the locking of the device or user system 130 during curfew, scheduling the unlocking of the device after curfew, and notifying the remote computing system of breaks in curfew. All of these functions can be handled by the CurfewAgentService class.
- the service runs and retrieves an updated list of curfew times from the server by executing a WSUserCurfewTask instance.
- This task can perform the logic for both inserting newly created curfews into the local sqlite db, as well as removing curfews that are no longer present on the server (e.g. the user has deleted or disabled a curfew).
- the curfew service can look up the newly stored curfews from the sqlite db and execute the scheduling logic via a WSScheduleCurfewsTask instance.
- the WSScheduleCurfewsTask instance can iterate through all curfew data it has been given to decide what events to schedule. If there are no active curfews, it can cancel all previously scheduled events and start a new instance of the CurfewAgentService class to unlock the device. The service can then remove or reset the device password using a WSDevicePolicyManager instance to unlock the device. If the WSScheduleCurfewsTask does have curfews, it can schedule an event to happen at the beginning of each curfew. Each of these events can trigger a new instance of the CurfewAgentService. The service can use the WSDevicePolicyManager to set the password of the device and lock the user out based on the curfew time.
- the WSScheduleCurfewTask class can also be initialized via the CurfewBroadcastReceiver. This receiver is notified directly by messages sent by the remote computing system when a new curfew is activated or an old curfew is disabled/deleted. This can prompt the schedule task to run and update the state of the phone appropriately in real time. For example, this service can be advantageous in some embodiments for parents to remotely disable or activate the mobile devices of their children.
- the Curfew Agent can also report non-permitted usage of the device during curfew hours. The Agent can call on the services to check for usage of SMS messages. If the user has sent a text during the curfew hour, the time and violation can be reported to the remote computing system. All time-based or curfew-related descriptions herein can also apply to other geographic or behavior-based restrictions.
- the Device Status agent can update the remote computing system with information about the GPS and internet connectivity of the device as well as the device power and installation status of mobile safety system plugin or application on the device.
- the only data that is collected on the device is the GPS state.
- Internet connectivity, power, and the safety system installation can be evaluated from the remote computing system side based on the time since the last communication with the device because it may not be possible for device itself to send an update if any of those values are false.
- the GPS state can be updated on the device by using the class GPSLocationChangeReceiver.
- This class can receive notification of changes in the location provider configuration sent by the Android system. It then sets a persistent flag depending on whether or not GPS is present in the update location configuration. This flag is then read by the DeviceStatusAgentService class. This service can be executed once every update cycle. The service retrieves the latest device state flags and passes them to a WSSaveDeviceStatusTask instance. This instance then posts the data to the server.
- the Location agent can listen for location device updates from the native (device) location system and can post the updates to the remote computing system periodically.
- the location agent is implemented in the WSLocationServiceV2 class.
- This service registers itself for location updates from the operating system's location service. Whenever it receives an updated location, it checks its accuracy against the previously saved location, if any, and also makes sure it is newer than the previous location and at least two minutes have passed since the last update. The elapsed time can be more than two minutes or less than two minutes since the last location. If all these conditions are met, it can store the new location for future comparisons and start a LocationAgentService instance to update the remote computing system. This LocationAgentService instance then posts the new location to the remote computing system using a WSLocationTask instance. It can also check for any unsynced locations in the sqlite database and post them to the server as well via a WSLocationsTask. Upon completion of these requests, it can update the local sqlite database with the newly saved locations.
- the SMS agent can obtain the SMS messages that the user has received and sent on the device and sends them to the remote computing system with update cycles, for example.
- the SMS content can be separated into messages, threads (collections of messages), and users (senders and recipients of messages).
- the SMS agent can be implemented using the SmsAgentService class. This service can be executed every update cycle, and its function is to initialize a WSSyncSmsTask instance, which can take care of the logic for retrieving messages. This task operates by checking the time since the last update and retrieving any new messages since then, or messages from the past week in the case of the very first update. It retrieves the messages by performing a query against the operating system's content service specifically for the SMS content. It then compares the results of this query against the current data stored in the local sqlite database to find any messages, users, or threads that are new since the last update.
- the WWW agent can run continuously in the background, collecting data from the device's browser and posting it to the server.
- the agent can be implemented by the WWWAgentService class. This service can spawn an internal runnable task with the operating system that runs every second or every minute or hour. When this task executes, it triggers the service to evaluate any new browsing activity on the device. Separate implementations may be required depending on the type of browser that is operating on the device such as the native Android browser, the Chrome app, and the custom browser installed on Samsung phones.
- the class can handle different browsers by retrieving data directly from the operating system.
- the agent can retrieve a list of recent websites from the operating system's content service using a specific URI for each browser. In some embodiments, it will only request browsing data since the last update time. Once it has retrieved this data, it saves it to the local sqlite db and passes it to a new WSUserUrlTask instance. This task can then post the data to the remote computing system.
- the Update Frequency Agent can coordinate the frequency of updates among the agents of the mobile safety system 110 .
- the agent can include a service class for checking new update frequency against the cached value and restart agent services if necessary. If the update frequency has changed, the preferences are updated and all agent services may be restarted to use the new update interval.
- Agents can be implemented, for example, using programming languages such as C, C++, Java, Javascript, etc. Following is an example structure of a package developed using JAVA to implement the agents of the mobile safety system 110 on a user system 130 .
- the machine code generated based on compiling the programmed instructions can be executed by the hardware processor of the user system 130 .
- the ‘service’ classes can run in the background and operate at timed intervals. The timing may be a function of battery management as discussed above. In some embodiments, the interval can be one minute or less, for example.
- the service classes can enable operational functionality for each agent. Their general execution pattern is to retrieve information from a database relevant to their agent (e.g. list of apps, sms agents, etc.) and then spin off a relevant ‘task’ which will then upload this data to one or more remote server computers or data repositories. Each task may correspond to an instantiation of an object of a “task” class described below. The tasks may be added to a queue for execution at a later time.
- the retrieved data may come from the local sqlite database that is managed by the mobile safety system 110 .
- the retrieved data may also come from other resources such as the operating system by the task that is started. For example, the SMS data may be retrieved from the operating system.
- Tasks Classes can be started by the service class of the corresponding agent. Some of the instantiations of the task object can execute immediately upon being created.
- the task class may be instantiated with a list of data that needs to be sent to the server, at which point they will execute a REST call to post that data to the appropriate endpoint.
- REST call relates to Representational State Transfer service to manage states of Web Services. Some of these (such as sms) may not be given data directly by the service and will instead query the operating system directly for the relevant information.
- the AppsLoader class can retrieve a list of installed applications. For instance, the class can import packages from the operating system to retrieve information about the installed applications. For an Android OS, the imported packages can include android.content.Context, android.content.pm.ApplicationInfo, android.content.pm.PackageManager, and android.support.v4.content.AsyncTaskLoader.
- the “Context” class enable interface to global information about an application environment. It can allow access to application-specific resources and classes, as well as up-calls for application-level operations such as launching activities, broadcasting and receiving intents, etc.
- the PackageManager class can be used to retrieve various kinds of information related to the application packages that are currently installed on the user system 130 .
- the AppsLoader class can deliver the result if it already has a list of currently installed Apps.
- the AppsLoader can also attach to a process of the operating system to listen for changes such as when an application is installed or uninstalled. For example, when a user clicks on the uninstall button under the Manage Apps settings of an Android operated user system, the system 130 can listen by calling “com.android.packinstaller.UninstallerActivity”. After the information is transferred to the server, the AppsLoader class can release the resources.
- the ‘request’ classes can be used to send specific types of data to one or more remote computers.
- there is a dedicated request class for each type of data that is handled e.g. one for sms messages, one for websites visited, and location. They are generally instantiated in a task or sometimes a service with a set of data and can then execute a REST call with that data to the server.
- Models Classes These ‘model’ classes can be used to represent different data types or data structures (e.g. an sms message, a location point, and curfew) as JAVA objects. Instances of these models can be constructed from database information when a query is executed by a service or task, and are then sent to the remote computer via request objects.
- data types or data structures e.g. an sms message, a location point, and curfew
- Receiver Classes In some embodiments, most of the agents are executed at timed intervals and collect information at these intervals. However, certain types of data may be collected reactively in response to system-level events. For instance, the location agent may collect data with each significant location change, the timing of which cannot be predicted. These receivers accomplish this by registering with the operating system to be notified by some specific system event. Then, whenever this event happens, they will retrieve the new data and generally store it in the local sqlite database to be retrieved by the relevant service at the next update interval. In some embodiments, the receivers can trigger an update immediately by directly executing the agent's relevant service (such as sms). For example, a SMSBroadcastReceiver class can implement the SMS monitoring service.
- a SMSBroadcastReceiver class can implement the SMS monitoring service.
- the SMSBroadcastReceiver class can import “android.content.BroadcastReceiver”, “android.content.Context”, “android.content.Intent”, “android.telephony.SmsMessage”, and “android.util.Log”.
- the SMSBroadcastReceiver class can register with Android to receive an event in response to the user system sending or receiving SMS messages.
- the sent or received SMS message is stored in the SMSMessage class for to be transferred to the remote computer.
- the curfew agent instead of just collecting information on the device and sending it to the server, the curfew agent also responds to updates sent from the server concerning updated curfew times.
- the receiver class for the curfew agent listens for curfew update events that are broadcasted by the server to the device, and when it is notified of a change, it initiates the curfew agent's service class to appropriately respond to the update. This response can be locking down the phone if an new active curfew has been added, unlocking the phone if an existing active curfew has been disabled, or simply storing the new curfew information for later use.
- the CurfewBroadcastReceiver class can import “android.os.PowerManager” to control the power state of the user system 130 .
- the mobile system 110 used many O/S level functionalities on the device itself to implement its features.
- a remote computing system such as a mobile device management (MDM) server or a backup computer storage system backup for a particular user (such as an iCloud server).
- MDM mobile device management
- iCloud server a backup computer storage system backup for a particular user
- FIG. 55 illustrates an approach to using a remote computing system to track activities of a mobile device.
- a safety application may be installed on the mobile device 5510 , such as a child's iPhone.
- the mobile device 5510 may implement one or more modules of the user system 130 as described with reference to FIG. 1 .
- a person 5530 can sign into the safety application.
- the remote computing system 5540 can authenticate the login credentials to make sure that they are the correct credentials.
- the safety application on the mobile device 5510 may provide a sign-up user interface for the person 5530 to put in the personal information.
- the remote computing system 5540 may trigger the mobile device 5510 to download and install an MDM profile with default configuration.
- the default configuration may include which applications or which types of activities on the mobile device 5510 are tracked.
- the default configuration may also include restrictions on certain applications of the mobile device 5510 .
- the restrictions may be blocking text messaging on the mobile device 5510 after midnight and before 6 am.
- an MDM server is enrolled and a configuration downloaded. A device can then register with the MDM server and provide the device's information. Later, push notifications can be sent from the MDM server to the device.
- MDM can refer to “mobile device management,” or any server that manages one or more mobile devices. A custom implementation of an MDM server approach can accomplish the functions described herein.
- MDM servers may be configured to administer many enterprise devices under common restrictions or parameters. However, a custom configuration allows an MDM server to permit multiple parents to each have control over the parameters for their own childrens' devices. This distributes the decision-making authority and technical oversight to far more than a single enterprise or department administrator.
- the default configuration may be customized by the person 5530 via the web portal 5520 .
- the web portal 5520 may be a part of the safety system 110 described with reference to FIG. 1 .
- the web portal 5520 may be configured to access from a desktop or laptop as well as configured from a mobile device.
- the web portal 5520 may be part of the safety application on the mobile device 5410 .
- the web portal 5520 may also be a webpage accessible via a web browser.
- the person 5530 may log onto the web portal 5520 and customize the MDM profile associated with the device 5510 .
- a parent can sign into the web portal 5520 and select the mobile device 5510 on a user interface of the web portal 5520 . The parent can then change the settings for restrictions and activity tracking for the mobile device 5510 using the web portal 5520 .
- the changes made by the person 5530 on the web portal 5520 can trigger the remote computing system 5540 to generate an updated MDM profile.
- the updated MDM profile may be communicated to the child's device 5510 .
- the updated MDM profile may be pushed to the mobile device 5510 via the push notification service 5550 , although other techniques of communicating the updated MDM profile (such as pulling by the mobile device 5510 ) can also be used.
- the changes to the profile can take effect on the mobile device 5510 after the updated MDM profile is received by the mobile device 5510 .
- push notifications are used frequently as commands are issued from an MDM server to various remote devices. Devices can check in to an MDM server as a result of or independently of such notifications.
- An example of a command is one that initiates a device profile update.
- FIG. 56 shows an example sequence for detecting and listing installed applications on a device.
- the device can be a child's device, and the listing can be accessible by a parent, for example.
- Column 5602 can represent actions performed on, by, or relating to a device.
- Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.
- PPS push notification service
- Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.
- Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal.
- a user such as a parent can enroll a device such as a child device for monitoring.
- Arrows such as the arrow 5613 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally.
- the stage 5612 can cause and/or be followed by the stage 5614 , where a web portal authenticates the device being enrolled and stores the device (or an identifier related thereto) in a database.
- a device can receive the URL of a server such as an MDM server and request an MDM profile.
- an MDM server can send authenticating or identifying information (e.g., a Server Certificate and MDM profile).
- the device can incorporate the information (e.g., by installing the Server Certificate and MDM profile).
- a server can receive a response from the device confirming installation.
- a PNS can send a push notification for the device to check in to the server. (This can be preceded by communication between the server and the PNS that allows the PNS the ability to make such contact; the PNS can be localized on the server, for example.
- the device can receive the push notification and poll for a command—e.g., request or indicate readiness for a command from a server such as the MDM server.
- a server can issue a command such as an “InstalledApplicationList” command.
- the device can execute the command and send the request information (e.g., a list of installed applications present on the device) to the server.
- the server can receive the list of installed applications.
- the server can store the received information (e.g., the list of applications) in a database such as a WebSafety database.
- a web portal can display the list of applications for the device, which can be viewable or otherwise accessible to a user such as a parent or administrator.
- FIG. 56 demonstrates, for example, that multiple devices and services can interact securely, and that multiple layers can improve security if each device and/or service separately stores information relating to timing and content of interactions. Certificates, handshake protocols, unique identifiers, etc. can be used to improve security and create a more definite trail of transactions for later diagnosis or security uses.
- FIG. 56 also shows how a server can be employed to help centralize a control structure and allow easier administration and more efficient use of resources.
- the server may be an embodiment of the remote computing system 5540 shown in FIG. 55 .
- the server can be located one layer removed from a user interface (and can handle security and initialization tasks, for example) to simplify user views and interactions.
- a PNS can be employed to cause a device to actively check in with a server at periodic intervals.
- the PNS may exist in current operating systems and therefore allow a server to take advantage of the existing functionality and exceptions to firewalls or other security safeguards.
- a device 5602 and a portal 5608 can be accessible by a user, whereas PNS 5604 and a server 5606 can comprise intervening, intermediary, or less-accessible layers that provide security and/or administrative controls. These intervening layers can be used to facilitate simplicity of a user experience while simultaneously improving security, facilitating efficient database management, and improving compliance.
- FIG. 57 shows an example sequence for web/browser filtering and application purchase restrictions.
- the filtering and restrictions can be applied to a child's device, and the control or monitoring can be accessible by a parent, for example.
- Column 5602 can represent actions performed on, by, or relating to a device.
- Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.
- PPS push notification service
- Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.
- Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal.
- a parent can set content filters and/or application purchase restrictions using a web portal.
- the web portal can send a push notification or control a PNS to send a push notification.
- Arrows such as the arrow 5713 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally.
- a PNS can send a push notification for the device to check in to a server such as the MDM server.
- a device can receive the push notification and poll for a command—e.g., send a message requesting or indicating readiness for a command to a server such as the MDM server.
- a server can issue a command such as an “InstallProfile” command.
- a device can receive the push notification and execute the command.
- a server can generate an updated profile such as an MDM profile reflecting any changes that may have occurred on the device (e.g., as a result of executing the command).
- the updated profile can also or alternatively include the filters and restrictions initially indicated through a portal at stage 5712 .
- the device can install the updated profile and the content filter restrictions can take effect on the device.
- FIG. 57 illustrates how a server level (e.g., server 5606 ) can act as an intermediary between a portal and a device. This can provide efficiency because a server can be persistently active to accomplish commands or requests initiated through a less persistently active portal.
- a PNS layer ( 5604 ) can be helpful to provide persistent or periodic contact or outreach to a device.
- FIG. 58 shows an example sequence for curfew or other time-based blocking.
- Blocking can include reducing or turning off functionality.
- the blocking can be applied to a child's device, and the control or monitoring can be accessible by a parent, for example.
- Column 5602 can represent actions performed on, by, or relating to a device.
- Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.
- PPS push notification service
- Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.
- Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal.
- a user such as a parent can set curfew or other restrictions (e.g., time, place, behavior status restrictions) using a web portal.
- Curfew or other restrictions e.g., time, place, behavior status restrictions
- Arrows such as the arrow 5813 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally.
- a server such as an MDM server can employ a background process to check for curfew settings for one or more devices that may be associated with that user, that portal, that server, etc.
- behavior status restrictions can include failure to pay a phone bill or failure to pay in accordance with a usury contract. (In such implementations, a user may be a lender or loan administrator).
- a query can be initiated of whether curfew (or other restriction) is found for a device. If not, a recurring process can be employed that periodically checks for curfew settings, and that process can be continuous until a positive result occurs. If the answer is yes, a stage 5824 can be entered with a PNS sending a push notification for the device to check in to a server. The device can receive the push notification in a stage 5830 and can poll for a command (e.g., request or indicate readiness for a command from a server). In a stage 5834 , a server can query whether a relevant curfew is active.
- a command e.g., request or indicate readiness for a command from a server.
- a server can issue a “DeviceLock” command or other restrictive action in a stage 5838 . If not, a server can issue a “ClearPasscode” command in a stage 5836 that lifts or relaxes restrictions, for example.
- a PNS can wake up a device and forward a command from a server.
- a device can receive a push notification and execute a related command by locking or blocking (or controlling other restrictions for or on) a device.
- FIG. 59 illustrates an embodiment of a computing environment for monitoring activities of a mobile device.
- the computing environment 5900 can include a mobile device 5510 , a backup computer storage system 5910 , a web portal 5520 , a database 5930 , and a computing system (such as the remote computing system 5940 shown in FIG. 54 ) executing the background process 5920 .
- the mobile device 5510 can regularly store a backup copy of the files and activity logs to the backup computer storage system 5910 .
- the mobile device 5510 may be set up for regular backup (e.g., via iCloud or other cloud service).
- iCloud is used here for illustrative purposes in the following discussion as an example backup computer storage system 5910 .
- a copy of the device backup such as text messages and social network activities on the mobile device 5510 can be regularly communicated to an iCloud server via the Internet.
- a person 5530 can sign on to the web portal 5520 and add the device 5510 .
- the parent can add the child's iCloud account to the list of monitored devices through the web portal 5520 .
- the parent can add the child's iCloud account by entering the user name and password associated with the account. These credentials may be stored in a secure data store such as the database 5930 .
- the background process 5920 can regularly check for updates of data in backup computer storage system 5910 .
- the background process 5820 can communicate with the iCloud server every day and determine whether there are any new backup data in the iCloud server.
- the background process 5820 may use a time and/or date function on a device for time-based restrictions.
- the background process 5820 can use a universal clock in addition to or in alternative to a device clock.
- the universal clock may be a clock external to the device 5510 , such as a clock associated with a server, PNS, or portal. This implementation can be advantageous because relying on non-device clocks can prevent a child from circumventing restrictions by manually changing time settings.
- An update process can obtain data from a mobile device periodically, for example every eight hours.
- the timing can be configured to correspond to the timing of back-ups or cloud synchronization of a device.
- Some devices typically back up to a cloud service (e.g., iCloud) when they are plugged in and have a wifi connection. Some devices are set to automatically synchronize no more than once/day. If the device waits until certain such conditions are met before synchronizing, a system can strategically time the update process to correspond to recognized patterns of behavior for each device.
- a predictive update can review data showing the average time that charging and wifi begins (or that cloud synchronization occurs) each evening or morning and time updates for approximately this same time or shortly thereafter.
- a na ⁇ ve backup schedule can also be used.
- updates can occur three times per day at regular intervals.
- Cryptographic approaches to prevent security override can also be helpful, including use of blockchain-type technology.
- Crypto-currency concepts can apply for oversight of child devices. For example, a shared server ledger of transactions can help prevent a child device from avoiding technical restrictions as discussed herein.
- the background process 5920 can download the updates from the backup computer storage system 5910 .
- the downloaded files may be stored to the database 5930 .
- the downloaded files may include updates to the device 5510 's SMS, call history, web browsing history, social network usage, and so on.
- the background process 5920 may reformat the data, such as rehashing the data, for storage in the database 5930 , which may provide more efficient storage and hardware utilization.
- the data packet obtained from the backup computer storage system 5910 may be encoded, for example, by an encryption algorithm.
- the background process 5920 can include instructions that decrypt the data packet.
- backups are transmitted in encrypted formats.
- Authentication (which can involve decryption) can occur after an encrypted data packages is received.
- Authentication can occur through iCloud, for example.
- Parsing can involve any and all processes required for reading and analyzing the data that results after authentication and decryption. File types, extensions, or paths can all assist in the parsing process.
- An intermediate step e.g., transmission to and from a third-party provider
- a cloud server e.g., an iCloud server
- Direct connection can be established using decryption. Secure data keys or certificates can be periodically required to enhance security. For some usage of a child phone, a secondary, multi-key, multi-channel and/or expiring password system can be employed.
- the data packet may include data collected by multiple applications and/or software modules.
- the data packet may include data collected by various agents described in the section XXIII
- the background process 5920 can parse the decoded data packet and determine which portions of the data are collected by what applications and/or software modules.
- the background process 5920 can further analyze these data and display to the person 5530 information related to the activities of the device 5510 .
- the background process 5920 can download the data packet including today's updates on the device 5510 from the backup computer storage system 5910 .
- the background process 5920 may communicate to another computing system or the database 5930 to obtain information to decode the data packet.
- the decoded data may include all text messages, phone calls, web browsing history, and so on, occurred on the device 5510 .
- the background process 5920 can decrypt, decode, parse and/or analyze these data to identify any suspicious activities. For example, the background process 5920 can parse the data to identify text messages sent by the mobile device today, and analyze the text messages to determine whether the child has used any inappropriate words or initiated any other actions that merit a warning indicator.
- the background process 5920 can flag these words or actions to the parent via the web portal 5520 , actively, passively, and/or dynamically (e.g., with a sliding scale or relative urgency determined algorithmically, or by a user or an administrator through a survey wizard or other setting interface mechanism).
- parsing can involve sorting data received in a packaged or bundled state. For example, efficiency may be enhanced by grouping data together at a mobile device, then sending the data as a bundle or package without clear differentiation between types or categories of data.
- data relating to texts can be packaged and sent with data relating to browser usage.
- data relating to texts or browser usage during a first time period may be packaged and sent along with data relating to texts or browser usage during a second time period.
- parsing can involve unwinding or reversing the bundling or packaging process. Thus, distinctions between data from first and second time periods can be created and/or restored by parsing.
- This packaging and subsequent parsing process can enable more efficient or otherwise more effective transfer of data. For example, larger packages or bundles can be prioritized in a mobile phone transmissions. In some embodiments, smaller packages or bundles can be created if warranted to take advantage of inherent limitations or features of a phone's transmission protocol, bandwidth, or other processing approaches or limitations. Parsing may be accomplished by recognition of signals or codes that were inserted in the packaging or bundling process. Parsing may also be accomplished by recognition of patterns inherent in different types of data or data from different time periods.
- FIG. 60 illustrates an example process for flagging suspicious activities on a person's mobile device.
- the process 6000 may be part of the background process 5920 described with reference to FIG. 58 .
- the process 6000 may be executed by the remote computing system 5540 as described with reference to FIG. 55 .
- the process 6000 may or may not occur in real-time as the activities on the device take place.
- An advantage of prompt or real-time is that parental users are allowed the opportunity of prompt, prophylactic action.
- the remote computing system 5540 may intermittently receive data with device activities associated with a period of time.
- the device activity data may be communicated to a temporary repository such as a queue or a stack.
- One or more servers can process the device activity data by obtaining the data from the temporary repository.
- a temporary repository can allow the one or more servers to efficiently allocate the computing resources among themselves while processing the data.
- Such repositories can also be archived or saved for later use, and they can have periodic purging if desired.
- the process 6000 may be implemented in real-time and/or in a time-delayed fashion.
- the mobile device may process a portion of the data such as location of the mobile device in real-time, either on the mobile device or on the remote computing system 5540 , while communicate other device activity data to the remote computing system 5540 at a certain time period.
- These embodiments may be advantageous because certain activities may require a parent's immediate attention, such as the child's cellphone appearing to be in an unsafe place, while other activities, such as chatting to friends via text message, may not require the parent's immediate attention.
- the systems described therein can focus the processing powers on data of a high priority.
- the remote computing system 5540 can obtain device activity data associated with a mobile device.
- the mobile device may be programmed to run an android or an iOS operating system.
- the mobile device can record device activity data such as SMS and call history, web browsing activity, location data, application usage history (such as which mobile applications are used at what time period, which files are generated by which mobile applications, activities within the mobile applications, and so on), and other activities, in combination or the like.
- device activity data such as SMS and call history, web browsing activity, location data, application usage history (such as which mobile applications are used at what time period, which files are generated by which mobile applications, activities within the mobile applications, and so on), and other activities, in combination or the like.
- at least a portion of the device activity data may be recorded by a safety application installed on the mobile device.
- the remote computing system 5540 can communicate with the device to directly obtain the device activity data.
- some mobile applications such as social network applications
- the safety application can send the recorded device data to remote computing system 5540 .
- the remote computing system 5540 may not be able to obtain data directly from mobile device.
- mobile applications may be confined to different “sandbox” environments where one mobile application executing in a sandbox may not have access to files of another mobile application executing in another sandbox.
- the safety application installed on the mobile device may not be able to access activity logs of other mobile applications.
- the remote computing system 5540 may communicate with a backup system, such as the backup computer storage system 5910 , and periodically obtain device activity data.
- the remote computing system 5540 can decrypt the device activity data.
- the device activity data may be decrypted with a decryption algorithm.
- the device activity data may be unlocked by entering user credentials (such as a user name or a password) associated with the device.
- the decrypted device activity data may be in one or more formats, such as .html, .msg, or other data formats.
- the remote computing system 6030 can parse and analyze the decrypted device activity data based on the formats of the data. For example, the remote computing system 6030 can identify data associated with a particular application based on the format of the data typically generated by that application, e.g., by file suffixes, extensions or other patterns or clues in the data itself. As an example, the remote computing system 6030 can automatically associate data with .msg format with a texting application because the texting application stores files in the .msg format. The remote computing system 6030 can also analyze the parsed data based the format of the data. For example, the web browsing history may include data in html or xml format. The remote computing system 5540 can use this format information to extract relevant data from the web browsing data. An example format used for some such data is the SQLite database format for storage libraries.
- the remote computing system 5540 can analyze the device activity data and flag suspicious activities. For example, the remote computing system 5540 may flag inappropriate words or websites in the parsed data.
- the remote computing system 5540 can send a notification to another person, such as a parent.
- the notification may include the suspicious activities as flagged by the remote computing system 5540 .
- the remote computing system 6030 can automatically send an instruction to the mobile device blocking certain activities of the mobile device.
- the instruction may include locking the mobile device, blocking access to certain websites, blocking call functions, and so on.
- the mobile device may be programmed to provide limited abilities for external controls.
- the operating system of the mobile device may prevent the mobile device being locked remotely by another computing system.
- the user (such as a child) of the mobile device can override the external controls.
- the mobile device runs an iOS system
- the user of the mobile device may defeat the screen lock, for example, by re-typing the password to unlock the device.
- the remote computing system 5540 alone or in combination with the safety application, can repeatedly lock the mobile device during a short time interval and thereby sabotage the user's continuous use of the mobile device. For example, a child may need to re-type the password every 30 seconds while watching a video, which may prevent the child from enjoying the video.
- FIGS. 61A, 61B, 62A, 62B, 63-65, 66A, 66B, and 67-72 depict example user interfaces for a safety system.
- the example user interfaces may include embodiments of the web portal 5520 described with reference to FIGS. 55 and 59 .
- Each of the user interfaces shown includes one or more user interface controls that can be selected by a user, for example, using a browser, a mobile application, or other application software.
- each of the user interfaces shown may be output for presentation by the safety system, the remote computing system, the user system, and other computing systems described herein, alone or in combination, which may optionally include a browser, a mobile application, or any other application software.
- a user interface can include multiple display screens or multiple webpages.
- the user interface may also refer to a single display screen or web page in some implementations.
- buttons, dropdown boxes, select boxes, text boxes, check boxes, slider controls, and other user interface controls shown may be substituted with other types of user interface controls that provide the same or similar functionality.
- user interface controls may be combined or divided into other sets of user interface controls such that similar functionality or the same functionality may be provided with very different looking user interfaces.
- each of the user interface controls may be selected by a user using one or more input options, such as a mouse, touch screen input, controller, or keyboard input, among other user interface input options.
- input options such as a mouse, touch screen input, controller, or keyboard input, among other user interface input options.
- FIGS. 61A and 61B illustrate example user interfaces when the user is signing-up with and signing-in to a safety application on a parent device.
- the user interface 6110 illustrates an embodiment of a start-up screen.
- the start-up screen may be shown when a user first opens a safety application.
- the start-up screen may include options such as sign-in on parent's device, sign-in on child's device and create an account.
- the safety system 110 may present the user interface 6130 where the parent can input his login credentials.
- the safety system may present the user interface 6120 where the parent can input his personal information.
- the safety system may present one or more of the user interfaces described with reference to FIGS. 62A and 62B , which can allow a parent to configure and view settings of a child's device.
- the user interface 6120 illustrates an embodiment of a sign-up screen.
- a parent named Brian Smith can input his name, email, and password into the user interface element.
- the safety system 110 may show a screen indicating successful registration.
- the parent may need to activate the account.
- the safety system 110 may send the parent a confirmation email based on the inputted email address. The parent can open the confirmation email in his inbox and follow the instructions in the confirmation email (such as clicking on a link) to complete the activation process.
- the parent can sign in using the registered account.
- the user interface 6130 illustrates an embodiment of a sign in screen, where the parent can input his login credentials such as email address and password.
- the safety system can present the user interface 6140 , which may include alerts and summaries of child devices' activities.
- the safety system 110 can detect whether there are child devices associated with the parent's account. If the is no child device, the safety system 110 can present the user interface 6150 shown in FIG. 61B . The user can add a child by selecting the add a child option in the user interface 6150 and in response, the safety system 110 can return the user interface 6160 which provides a reminder for installing the safety application on the child's device.
- FIGS. 62A and 62B illustrate example user interfaces when the user is signing-up with and signing-in to a safety application on a child device.
- the safety system 110 can present the user interface 6110 when the safety application is open. The user can select sign in on child's device on the user interface 6110 . The safety system 110 can then present another user interface for the user to type in the login credentials, which may be the parent's login information.
- the safety system 110 can determine whether the account has already had at least one child associated with it. If the safety system 110 determines that there is at least one child under logged in account, the safety system 110 can present the user interface 6210 to allow the parent to associate the device with a child. In some situations, the child who owns the device may not be on the list of children associated with the account. The user interface 6210 can allow the parent to add a child and associate the child with the current device.
- the safety system 110 can present the user interfaces 6230 and 6240 for adding a child.
- the parent can input the child name at the user interface 6230 and other personal information of the child, such as birthday and email address at the user interface 6240 .
- the parent can also configure how often the parent receives updates of activities on the child device at the user interface 6240 .
- the functionalities of the user interfaces 6230 and 6240 may be presented in a single user interface.
- the safety system 110 can present a user interface which allows the parent to input personal information of the child and to configure the update frequency.
- the safety system 110 can receive the device activity data of a child device by communicating with a backup storage system (see e.g. backup storage system 5910 described in FIG. 59 ).
- the safety system 110 can present user interfaces 6250 and 6260 for associating the backup storage system with the parent's account.
- the user interface 6250 can allow a parent to input the child's iCloud account name and password.
- the safety system 110 can present the user interface 6260 which instructs the parent to turn on the options for backing up data to iCloud.
- the safety system 110 can interface with other applications on the child device and acquire activity data directly from these applications.
- the safety system 110 can output a user interface 6270 which allows the parent to choose which application's activities he would like to monitor. For example, as shown in the user interface 6270 , the parent can choose to connect the child's Facebook account with the safety system 110 , while choose not to monitor the activities on Instagram.
- the safety system 110 may output a notification page such as the user interface 6280 to inform the parent that the device registration is successful.
- the safety system 110 can provide an option for the parent to enroll in the MDM service.
- the MDM service may identify suspicious activities, provide alerts for suspicious activities, disable certain functions of the mobile device based on a set of criteria, as well as provide other functionalities as described herein, alone or in combination.
- the MDM service may implemented on the remote computing system 5540 .
- the user interface 6290 provides a summary on whether the certain safety functionalities are enabled on the child device.
- the child's iCloud is connected to the safety system 110 , and is enrolled in the MDM service.
- the social network applications on the child device are also connected to the safety system 110 .
- the safety system 110 can obtain the child's activity data from the iCloud account and the social network applications.
- the parent can also use the MDM service to monitor the child's activities and instruct the safety system 110 to take an action (such as send notification to parents or disable certain functions of the child device) based on the child's activities on the device.
- FIG. 63 illustrates example user interfaces of dashboard feed on a parent's device.
- the user interface 6310 shows a navigation menu which includes different categories of data.
- the safety system can present the user interface 6320 .
- the user interface 6320 can show notifications of a child's social activities. As an example, it can show the child has become friend with someone on Facebook or the child has uploaded a photo onto a social network site.
- the user interface 6320 can also show the child's comments on the social network site and flag any inappropriate words.
- the flag may include one or more visual indicators showing the word in a different color, font, size, style, and so forth.
- the parent can also choose, from the menu in the user interface 6310 , to view other activity data such as messaging data, web browsing history, location data, curfew information, photos, application usage, contact data, and bad words (for example used in comments).
- activity data such as messaging data, web browsing history, location data, curfew information, photos, application usage, contact data, and bad words (for example used in comments).
- the safety system 110 can also send a notification to the parent phone notifying the child device's activities.
- the safety system 110 can push the notification to the parent's device (such as iPhone) to activate the security application on the parent device.
- the security application can communicate with other modules of the parent device to display the notification on the user interface 6330 .
- FIG. 64 illustrates example user interfaces for viewing the location information of the child device.
- the location data may be acquired by a GPS sensor of the child device.
- User interface 6410 shows waypoint information of the child device.
- the waypoint information may be across multiple days.
- the waypoint information may include, duration of stay at a location, start and/or end time of the duration.
- the user interface 6410 can provide a map which shows the locations of stay.
- the user interface 6410 can also show when the location data was last updated.
- the parent can customize the name of a place, such as school, home, grocery store, and so on.
- User interface 6420 can allow a parent to select among multiple children. For example, the parent may choose to view Jenny's location instead of Billy's location.
- the map can show the location of multiple children. The parent can add or hide the locations of the children on the map.
- the parent can filter the location information. For example, the parent can apply a time filter, such as last 7 days, yesterday, all time, etc. Suppose the parent set the time filter to last 7 days, the user interface can show a map or a list of locations associated with a child device in the past 7 days.
- the safety system 110 can also determine popular locations associated with the child device. The popular locations may be identified based on the duration of stay, frequency of stay, or other factors. For example, as shown in the user interface 6450 , the most popular location associated with Billy's iPhone is home. This may be because Billy spends most of his day at home.
- FIG. 65 illustrates example user interfaces which allow a parent to monitor activities associated with a specific location.
- the parent may be interested in monitoring the child's activity at home and school. Besides these two places, the parent can also add a new place using the user interface 6520 , or delete or edit a place using the user interface 6530 .
- the parent can set when to receive notifications. For example, as shown in the user interface 6520 , the parent chooses to be notified when Billy's iPhone leaves and arrives at the school.
- FIG. 66A illustrates example user interfaces for viewing and searching message history on a child device.
- the user interface 6610 can show a list of messages on the child device.
- the safety system 110 can provide visual indicators for unread activities, group chats, and so on. In some implementations, inappropriate content (such as bad words) may also be flagged using the visual indicators.
- the safety system 110 can also provide a search function as shown in the user interface 6620 .
- the parent can search a name of a person and view a list of conversions with that person.
- FIG. 66B illustrates example user interfaces for flagging inappropriate content.
- the parent can configure which words are allowable and which words should be flagged in the user interface 6630 .
- the parent can also add and delete words in the user interface 6630 .
- the user interface 6640 can display texts and pictures as well as flag inappropriate posts (texts and/or pictures) with one or more visual indicators.
- the safety system 110 can display the content of the message on the user interface 6640 in addition to or in alternative the user interface 6610 .
- FIG. 67 illustrates example user interfaces for viewing photos on a child's social media account.
- the safety system 110 can capture social network usage on the child device by interfacing the safety system 110 with the social media applications.
- the parent can view pictures posted by the child on his social medial network.
- the safety system 110 can also show the comments (by the child or other persons) related to the posted photo.
- the safety system 110 can flag inappropriate comments with one or more visual indicators described herein.
- FIG. 68 illustrates example user interfaces for viewing web browsing history and blocking access to inappropriate websites by the child device.
- the user interface 6810 shows an example of searching whether a child has viewed a certain website.
- the parent can input a portion of the domain name of the website and the safety system 110 can return a list of search results.
- the safety system can also automatically check for inappropriate websites and provide notifications to parents if the child device has accessed one more of the inappropriate websites.
- the safety system may have a default list of inappropriate websites.
- the parents can customize this list by adding or deleting the websites using the user interface 6820 .
- FIG. 69 illustrates example user interfaces for viewing a child's frequent contacts. These user interfaces may be generated based on the child's messaging activity, such as text messages, messages on social network, communication in a messaging application (such as FaceTime or google Hangout), and call history, alone or in combination.
- the safety system 110 can use various factors to determine who the frequent contacts are. For example, the safety system 110 can calculate how frequently a child communicates with a person and/or how long the conversion lasts. As shown in the user interface 6910 , the safety system 110 can also calculate the percentage of the communications with a person among all communications.
- the safety application 110 can also present user interface 6920 to the parent which allows the parent to apply a time filter so that the parent can view the child's frequent contacts within a specified time period.
- FIG. 70 illustrates example user interfaces for viewing application installation activities.
- the user interface 7010 shows a list of current applications installed on the child's iPhone.
- the parents may not want the child to have certain applications on the iPhone, such as social networking applications.
- the parents add these applications to applications of concern.
- the user interface 7020 can show the installation history of the application. For example, the user interface 7020 can flag whether an application of concern has been installed or uninstalled using the visual indicators described herein.
- FIG. 71 illustrates example user interfaces for implementing a curfew feature.
- the safety system 110 can allow a parent to schedule time throughout the week to send a child device into curfew mode.
- Curfew mode can restrict some the smartphone features such as access to the internet and texting while permitting other features such as emergency phone.
- the safety system 110 can transmit a data packet to the child device.
- the data packet may include executable code that causes the safety application to begin executing the instructions for implementing the curfew mode.
- the executable code may activate the safety application and provide instructions to execute the curfew mode.
- the data packet may be sent at the beginning of the timeframe for the curfew mode.
- the data packet may be sent beforehand and stores at a data store of the child device, and cause the safety application to only begin executing the curfew mode at the designated time.
- User interface 7020 shows an example user interface displayed by the child device when the child device is in the curfew mode.
- all the smartphone functionalities are disabled except the call function.
- the system may send a notification to a parent device when the child attempts to bypass the curfew, for example, by attempting to close or minimize the safety application, to force to quit the safety application, or to delete the application.
- the safety system 110 can cause the child's phone to enter lock screen mode repeatedly during the curfew mode.
- the user interface 7130 shows an example of the lock screen mode.
- the child has to repeatedly enter the password to unlock the iPhone, which may disrupt the child's enjoyment of using the iPhone. As a result of this disruption, the child may give up on the attempt to unlock the iPhone and not review the content on the iPhone during the curfew hours.
- FIG. 72 illustrates an example user interface for configuring notification settings.
- the user interface 7110 may be shown in a parent device.
- the parent can select whether to receive push notifications. For example, when the parent chooses to receive push notifications, the safety system 110 can send notifications to the parent device without needing the parent to open the safety application on the parent device.
- An example of push notification is shown in the user interface 6330 in FIG. 63 .
- the parent can also select whether to receive alerts for certain types of data. For example, the parent can select whether to receive alerts based on SMS content, GPS data, web browsing history, etc. The parent can select how often he wants to receive the summary report of a child device. For example, the parent may select to receive a daily summary report, weekly summary report, etc. The reports may be sent to the parent's email address.
- FIG. 73 illustrates a generalized structure for a computer system.
- the computer system 7300 can be part of or used in connection with the computing environment 5500 shown in FIG. 55 and the computing environment 5900 shown in FIG. 59 , for example.
- a load balancer 7310 can interact with web servers 7320 as shown to coordinate data processing by the web servers 7320 and thereby efficiently distribute loads across the web servers 7320 .
- An example device that can serve as a load balancer is an NGINX server (pronounced “engine x”). This can be advantageous because it may not rely on threads to handle requests.
- the web servers 7320 (or the entire structure shown in FIG. 73 ) can be examples of the remote computing system 5540 depicted and described elsewhere herein.
- the web servers 7320 can run API and HTML processes, for example.
- the web servers can queue imports (such as SMS, location, and social media data received from remote computing devices). This can create a job queue 7330 , as shown by the arrow 7322 .
- the job queue 7330 can be an example of the temporary repository discussed elsewhere herein.
- job workers, 7340 can then read from the job queue 7330 and insert information into a logging database, for example.
- the job workers 7340 can be embodiments of the background process 5920 described in FIG. 59 .
- An archive database 7350 is illustrated, which can play the role of the logging database, and the arrow 7342 indicates how the job workers 7340 can interact with the archive database 7350 .
- the archive database 7350 can be a Dynamo database.
- the job workers 7340 can also perform additional processing, which can include the analysis, flagging, and notification processes described elsewhere herein.
- the job workers 7340 can run from the same codebase, which can allow access to the same backend data such as Loopback models. Additionally, the job workers 7340 can run on a common stack (or share other data structures).
- a web server and application server having support for Ruby, Python, and or Node.js can be used.
- One example of such a server is Phusion Passenger.
- job workers 7340 can rely on such a web server and application server to act as a process watchdog and launcher.
- the job workers 7340 are example embodiments of background processes 5920 described elsewhere herein.
- a direct path is illustrated by the arrow 7352 ; this path can represent API read requests that run synchronously.
- An indirect path is illustrated by the arrow 7322 , the job queue 7330 , the arrow 7332 , the job workers 7340 , and the arrow 7342 . This path can represent API requests that write to the archive database 7350 and occur asynchronously.
- the load balancer 7310 can help control, coordinate, schedule, smooth, throttle, and/or accelerate such processes.
- Web servers 7320 can include those having functions similar to NGINX, Phusion Passenger, Loopback, and/or Angular, for example.
- An event-driven, input/output server-side JavaScript environment based on V8 can be used, such as one having functionality similar to node.js.
- a node.js framework having functions similar to that of LoopBack and other Express-based tools can be used.
- JavaScript frameworks can be used to extend HTML functionality.
- a web server having functions similar to Angular can host frontend pages, for example.
- FIG. 73 also illustrates an operational database 7360 and a working data store 7370 .
- the operational database 7360 can be a Postgres database.
- Each of the databases 7350 , 7360 , and the working data store 7370 can be part of (or interact with) the database 5930 described elsewhere herein. They are illustrated separately here to assist in describing different functionality, and in some embodiments separate databases can be created and used, for convenience.
- an archive database 7350 can interact with the web servers 7320 as indicated with the arrow 7352 . These servers can read data from a logging database (which can be the archive database 7350 ) and use that information for a dashboard (e.g., the various user interfaces described herein).
- the operational database 7360 can interact with the web servers 7320 , as indicated by the arrow 7362 , to manage user account information and other non-logging related data. Many common API interactions result in direct communications between the web servers 7320 and the operational database 7360 .
- the working data store 7370 can be a Redis database or other advanced key-value store. It can be referred to as a data structure, for example. Keys can contain strings, hashes, lists, sets, and stored sets.
- the working data store 7370 can interact with the web servers 7320 (as shown by the arrow 7372 ). In some embodiments, the working data store 7370 may also be a cache. The working data store 7370 can be accessed by the job workers as indicated with the arrow 7374 . It can also interact with the web servers 7320 as shown by the arrow 7372 .
- the technology includes not only monitoring but also controlling remote systems so that a user such as a parent can disable or otherwise diminish functionality of a child's device, for example, in response to movement, location, behavior, violation of curfew, etc.
- Potential users of such systems and functionality include parents who may need to discipline or otherwise monitor or control a wayward child through mobile phone approaches.
- Such users can also include lenders who desire to influence repayment on a loan—for example, lenders—that may provide college students with funding for expensive mobile devices.
- Device functionality can be conditioned on timely or sufficient repayment under the terms of a loan contract. Companies may use similar functionality to cut costs for company hardware, data streaming, or non-business usage, for example.
- functionality can be customized in real time or otherwise based on a remote portal access by an active user, or it can be scaled automatically according to programmable time, location, behavioral, incentive-related, or other restrictions.
- restriction can remove, reduce, disable, lock or otherwise affect: phone call functions, or all but phone call functions; web access and/or other data usage; texting or SMS functions; social media access; camera or other hardware, internally installed applications, regular phone functionality, emergency phone functionality, etc.
- a system can prioritize or otherwise sort an order for reducing functionality, and this can be based on functionality used by a child, lessor, or borrower.
- an algorithm and monitoring functionality can be used to determine the most used applications and use that information to order the functionality to be inhibited if there is a missed payment, violated curfew, behavioral breach, etc.
- Emergency phone access can be granted as a matter of course even when other restrictions are in place, for example.
- functionality can be reduced in a binary, all-or-nothing manner, it can also be advantageous to throttle down some functionality: for example, by reducing a data flow rate, reducing available memory, partially obstructing or delaying certain web access. Connection speed can be reduced, number of allowed SMS texts can be reduced, etc.
- Combinations of the above techniques can also be helpful—for example a deadbeat phone borrower can have his or her access or functionality of some kind first throttled down, then removed altogether, or initially turned off, only to be restored but at a slower or less functional level than was available previously.
- Control for such reduction of functionality can be achieved automatically, remotely, gradually, suddenly, specifically, or generally.
- a parent/lender/administrator or someone else with a legitimate need for access and control
- This interface can allow, for example, a parent or lender to review past usage and select which functional reduction would likely be most persuasive (or tuned to the correct level of persuasiveness) for a particular user.
- a pre-determined order can be provided for loss of and/or reduction in functionality (e.g., for non-payment, rule violations, etc.)
- a lender contract can provide that functions will be turned off in order of average time used per day (e.g., SMS, social apps, other apps, camera, then phone).
- a user may be able to pre-set parameters, thresholds, or other criteria that customize this process for a particular provider, parent, lender, business administrator, or information technology department. These parameters can correspond with contract terms or organizational (e.g., family) policies or rules.
- Control systems and interfaces can include active monitoring, active alerts (e.g., e-mail or text to parent or lender when something happens, such as when a rule is violated, a deadline is missed, a geographic boundary is breached, etc.). This can allow a lender, administrator, parent, etc. (collectively, user) to defer action, track compliance history, provide a warning to the device holder, etc.
- Device holders or other restriction subjects can have various levels of visibility (at varying levels of time delay) to this process of restriction.
- a message to a device user can be sent informing them of the restriction and the potential future restrictions, along with information about how to remove the restrictions. This can provide a virtuous cycle of improved behavior as users learn from past mistakes and comply more readily with relevant rules.
- a stealthy mode can be employed, to increase persuasive power by sudden and unexpected changes that may be more disruptive and troubling to an offending user.
- code for a system can be included in root directors, in firmware, or in other places more difficult to locate or remove or requiring system passwords for modification. Code can also be distributed in a difficult-to-trace manner, such that the code is difficult to locate as a single package for ready deletion, isolation, or modification.
- One approach is to provide for ongoing authorization by a valid user.
- Information periodically delivered to a user can be a list of ongoing blockades or restrictions, and authorization can be requested at periodic intervals such as daily, hourly, etc. The default can be to remove restrictions after a certain time, or to leave them in place until otherwise instructed.
- These functions can be automated and/or accomplished remotely or on-site using an administrator computer or portal, the device itself, a parental device, etc. as described herein.
- An ongoing confirmation can be allowed or required (such as through a ping restricted approach) to make sure they relevant functions and/or hardware are still disabled.
- a server or PNS can send texts from various sources and make sure they bounce back as undelivered if an SMS functionality is purportedly disabled during a curfew period.
- data backup may be warranted when restricting functionality (E.g., older texts may be archived before turning off text service).
- Functionality can be reduced in a systematic fashion that can be programmed into a mobile device, the sequence activated upon receipt of an efficient or short command having few data characters. This can be the equivalent of a green light for a previously-programmed package for execution.
- a remote system e.g., a server
- An existing program kernel can be activated within a texting program or within memory of a phone, and this can invoke a restrictive SMS process.
- an approach is to initiate a small-scale, legitimate, “DNS”-style process, where large data amounts or frequent messages are sent to a mobile phone, flooding an inbox or text interface with messages that effectively reduces functionality.
- the messages can include encouragement to pay a bill or reduce anti-social or otherwise dangerous or rule-breaking behavior.
- a control interface can be visually viewable and accessible through more than one computing device platform.
- Such an interface can juxtapose usage reports (or other types of monitoring reports such as payment reports) with related functionality cut-off controls to simplify usage for a parent or user.
- an interface can assess a contract or policy to determine which actions or lack of actions are to be accompanied by functionality reductions. If a restriction on SMS or MMS is imposed, for example, a text usage report can be juxtaposed with a control for the functionality (e.g., a texting functionality) that has been linked by contract or otherwise with the monitored activity.
- a shotdown sequence can be drafted into a lending contract so a user knows and agrees to what is coming, and then that same shutdown sequence can be hard-wired or included in protected software, thereby preventing an administrative override to help avoid breaching a contract and make the process seem less objectionable and personal to a potential lender or other customer.
- a computer system for distributing management of a parent-controllable safety monitoring system, the computer system comprising: one or more child mobile devices, each having an operating system and a plurality of applications installed thereon; at least one mobile safety application installed on each of the one or more child mobile devices, the mobile safety application configured to: run in the background along with the operating system of the child mobile device; collect child data from other applications of the plurality of applications installed on the same child mobile device; communicate the child data to a remote computing system; and control operations of the child mobile device; the at least one mobile safety application further comprising the following local agents: an apps agent configured to periodically review a memory of the child mobile device to identify one or more installed applications and usage times for those installed applications; a curfew agent configured to retrieve curfew settings from the remote computing system, schedule and implement curfew actions on the child mobile device based on the curfew settings, and notify the remote computing system of attempted curfew violations; an SMS agent configured to periodically review the memory of the child mobile device to
- the computer system of aspect 1 wherein the remote database comprises a backup storage system associated with an iOS operating system.
- the computer system of any one of the aspects 1-4 wherein the remote computing system is further configured to: identify the child mobile device associated with the flagged inappropriate activity and cause the mobile safety application to inhibit a function of the child mobile device.
- control operations of the child device comprises: accessing a list of restricted applications; identifying whether the plurality of applications includes one or more applications on the list of restricted applications; in response to a determination that the plurality of applications includes the one or more applications on the list of restricted applications, inhibiting one or more interactions with identified applications on the child mobile device.
- the computer system of any one of the aspects 1-7, wherein the curfew actions comprise one or more of the following: blocking access to one or more applications on the child mobile device; inhibiting interactions with one or more applications on the child mobile device; or locking the child mobile device periodically thereby requiring repeated logins on the child mobile device.
- the computer system of any one of the aspects 1-8 wherein the local agents further comprises one or more of the following: a device status agent configured to update the remote computing system with at least one of the following information of the child device: GPS data, internet connectivity, device power and installation status of one or more applications on the child device; a location agent configured to acquire location data from the child mobile device and transmit the location data to the remote computing system periodically; or an update frequency agent configured to coordinate frequency of updates for agents of the local agents.
- a device status agent configured to update the remote computing system with at least one of the following information of the child device: GPS data, internet connectivity, device power and installation status of one or more applications on the child device
- a location agent configured to acquire location data from the child mobile device and transmit the location data to the remote computing system periodically
- an update frequency agent configured to coordinate frequency of updates for agents of the local agents.
- the computer system of any one of the aspects 1-9 wherein the collected information comprises encoded information, and wherein the remote computing system is further configured to decode the collected information and parse the collected information.
- a method for using a remote computing system to monitor one or more child computing devices comprising: identifying a child computing device, the child computing device comprising a plurality of applications including a mobile safety application programmed to monitor and control the child computing device; generating a default configuration file for monitoring and controlling the child computing device; transmitting the default configuration file to the child computing device; receiving device activity data associated with the child computing device, wherein the device activity data is encoded; decrypting and parsing the device activity data to obtain information on usage of one or more applications of the plurality of applications on the mobile device; analyzing the information to identify one or more inappropriate activities; flagging the inappropriate activities; and transmitting at least the flagged inappropriate activities to a parent computing device.
- the mobile safety application comprises at least one of the following agents: an apps agent configured to periodically review a memory of the child mobile device to identify one or more installed applications among the plurality of applications and usage times for those installed applications; a curfew agent configured to access curfew settings, schedule and implement curfew actions on the child mobile device based on the curfew settings, and notify the parent computing device attempted curfew violations; an SMS agent configured to periodically review the memory of the child mobile device to identify content of sent and received texts; a WWW agent configured to collect browser data; a device status agent configured to monitor at least one of the following information of the child device: GPS data, internet connectivity, device power and installation status of one or more applications of the plurality of applications on the child device; a location agent configured to acquire location data from the child mobile device and transmit the acquired location data; or an update frequency agent configured to coordinate frequency of updates among the agents.
- an apps agent configured to periodically review a memory of the child mobile device to identify one or more installed applications among the plurality of applications and usage times for those installed
- device activity data comprise at least one of the following: device location, browsing history, content of social network posts, or application installation status.
- the method of any one of the aspects 11-14 further comprises: accessing criteria associated with inappropriate activities and flagging the inappropriate activities based on the accessed criteria.
- the method of any one of the aspects 11-16, wherein transmitting at least the flagged inappropriate activities to the parent computing device comprises generating user interface data comprising: visual indicators associated with the flagged inappropriate activities and descriptions of the flagged inappropriate activities.
- receiving device activity data is performed by communicating with at least one of the following: one or more applications of the plurality of applications or a backup data storage configured to regularly receive device activity data from the child mobile device.
- a system for improving processing efficiency to allow parents to reduce delay in tracking smart phone activities of their children comprising: one or more child software modules, a module installed on each child's smart phone, each child software module configured to: obtain device activity data from or about more than one of the smart phone's other software applications; and package the device activity data to avoid parsing and analysis on a local smart phone processor; send the device activity data to an analysis server; the analysis server, configured to: decrypt the device activity data; parse the decrypted device activity data to determine a data type and select an appropriate flagging algorithm and database; perform at least one analysis algorithm on the parsed, decrypted device activity data by comparison to the selected database; and a parent interface on a mobile device configured to: receive and display results of the analysis algorithm; provide visual warnings when harmful results have been found by the analysis algorithm, along with access to more details relating to the specific underlying data that triggered the warning; provide an interface for receiving input from a parent, the input comprising: selections of which child
- the system of aspect 19 wherein the analysis server is configured to parse the decrypted device activity data to associate at least one child software modules with the decrypted device activity data.
- a computer system for distributing management of a parent-controllable safety monitoring system comprising: a non-transitory computer memory; and a processor programmed to: identify a child computing device, the child computing device comprising a plurality of applications including a mobile safety application programmed to monitor and control the child computing device by at least collecting device activity data from one or more applications of the plurality of applications on that device for analysis; generate a default configuration file that comprises settings for monitoring and controlling the child computing device; transmit the default configuration file to the child computing device, thereby imposing the settings on the child computing device; receive the collected device activity data associated with the child computing device, wherein the device activity data is encoded; decrypt and parse the device activity data to obtain information on usage of the one or more applications on the mobile device; analyze the information to identify one or more inappropriate activities based at least partly on the decrypted and parsed device activity data; flag the inappropriate activities; generate user interface data comprising information identifying the inappropriate activity; and transmit the user interface data to
- a computer system for distributing management of a parent-controllable safety monitoring system comprising: a first control system configured to be executed on one or more hardware processors of a child mobile device and further configured to: run in the background along with an operating system; collect device activity data associated with a plurality of applications on the child mobile device; and communicate the device activity data to a second control system; the second control system configured to be executed on one or more hardware processors on a network computing system remote from the child mobile device and a parent computing device and further configured to: receive the device activity data associated with a plurality of applications on the child mobile device; access parent parameters, the parent parameters comprising settings for monitoring content of communications on the child mobile device, frequency of the child mobile device updates, and warnings associated with content of the device activity data; analyze the device activity data based at least partly on the parent parameters; flag an inappropriate child activity based at least partly on the analysis of the device activity; generate user interface data comprising: information identifying the inappropriate activity; and transmit the user interface data to a
- a computer system of aspect 22, wherein the data packet comprising the update is configured to control the child mobile device by decreasing or increasing at least one of functionality and child access to the child mobile device features.
- a system and apparatus for allowing parents to view and track smart phone activities of their children comprising: one or more child software modules, a module installed on each child's smart phone, each child software module configured to: access and extract data from or about more than one of the smart phone's other software applications, including at least two of the following: a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application; and send the extracted data to an analysis server; the analysis server, configured to identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications; a parent portal configured to: receive results from the analysis server; display the results organized by child; provide both generalized smart phone usage data for each child and visual warnings when harmful results have been found by the analysis server, along with the specific underlying data that triggered the warning; provide an interface for receiving input from a parent, the input comprising: selections of which child's data
- each child software module is further configured to access and extract data sufficient to allow the analysis server to report which new applications are downloaded to each child's smart phone, and that information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- each child software module is further configured to access and extract data sufficient to allow the analysis server to report each of the following: which websites were visited using each child's smart phone; and content and timing of each child's posts to social networks; and that information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- each child software module is further configured to access and extract data sufficient to allow the analysis server to report each of the following: the location of the smart phone at periodic intervals throughout the day; and usage of the smart phone that occurs outside of geographic constraints that can be set through the parent portal; and that location and usage information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- each child software module is further configured to access and extract data sufficient to allow the analysis server to report usage of the smart phone that occurs during curfew periods, and that information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- the parent portal is configured to display the following information on the same daily feed screen: identities of people with whom that child communicates most often, including a visual indication ranking those people by frequency or amount of communication; a daily feed of the child's activities, organized chronologically, the child's activities comprising: any smart phone applications downloaded; content of any SMS text messages sent or received; identity of any websites visited; content of any social network posts created, viewed, or sent; and a visual warning of each of the following, incorporated into the daily feed: cursing or bullying terms; questionable website visits; and breaking curfew.
- the parent portal is further configured to display the following information on the same current applications screen: a list of all applications currently installed on that child's phone, a visual warning identifying applications that are identified as potentially harmful based on information in the analysis server, and a description of the functions of each of the applications in the list.
- the parent portal is further configured to display the following information on the same usage screen: a color chart indicating which applications were used by the child that day, and how much time was spent using those applications.
- the parent portal is further configured to display the following: text messages sent and received, with curse words and bullying terms highlighted; a list of most commonly used curse words and bullying terms; and an interface allowing a user of the parent portal to control if text conversations should be flagged automatically, and how many curse words or bullying terms should be allowed before a flag is automatically applied.
- the parent portal is further configured to display the following web access information and controls: a whitelist mode that triggers warnings if the child visits any website domain that is not listed as specifically allowed; or a blacklist mode that triggers warnings for only website domains that that are flagged by a user of the parent portal or by the existing database of harmful websites accessible from the analysis server.
- an embedded map feature visible in the parent portal indicates where each child has traveled during the day and provides a warning if the child leaves a given geographical radius.
- a curfew feature comprising: a control interface in the parent portal configured to allow a user of the parent portal to select restricted times that a child's smart phone may not be used; an active restriction feature in the child software module configured to completely disable the child smart phone during the restricted times, except for emergency phone calls.
- the parent portal is further configured provide an interface for receiving input from a parent, the input comprising selections of which types of harmful material should be identified, and what level of scrutiny to apply in determining harmful material.
- system and apparatus of aspect 36 further comprising a computer that periodically analyzes the selections from many parents regarding types of harmful material and level of scrutiny, analyzes those selections statistically, and incorporates the statistical results in setting default settings and recommendations for future users.
- the analysis server is configured to automatically identify patterns of harmful content for which helpful works of authorship have previously been created and stored in an electronic library, and provide immediate access to those works of authorship to parents by transmitting an electronic copy thereof or a link thereto to the parent portal for display adjacent to a warning based on harmful content that underlies those patterns of harmful content.
- a computing device comprising: a communications module; a location determining module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions to at least: retrieve computing device data from the computing device; send computing device data to a control system; and receives a command from the control system based in part on analysis of the sent computing device data.
- the computing device of aspect 39 wherein the computing device data comprises at least one of the following: incoming messages received using the communications module of the computing device; retrieve outgoing messages sent using the communications module of the computing device; or determine a location of the computing device using the location determining module
- the computing device of any one of the aspects 39 and 40 wherein said command comprises one or more of the following: activate the location determining module; disable the location determining module; disable the communications module; activate the communications module; or selectively deactivate one or features of the computing device for a predetermined time period.
- a system for monitoring one or more computing devices comprising: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions to at least: receive communications data from one or more controlled computing devices; analyze received communications data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- a system for monitoring one or more computing devices comprising: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions to at least: receive location data from one or more controlled computing devices; analyze received location data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- a computing device comprising: a communications module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions to at least: select notification settings; receive notification data based on the selected notification settings; and send command data to control an operation of a controlled computing device.
- a computing system configured to access one or more databases in substantially real-time in response to input from a parent provided in an interactive user interface in order to determine information related to a user system and provide the determined information to the parent in the interactive user interface
- the computing system comprising: a network interface coupled to a data network for receiving and transmitting one or more packet flows; a computer processor; and a computer readable storage medium storing program instructions configured for execution by the computer processor in order to cause the computing system to: generate user interface data for rendering the interactive user interface on a computing device, the interactive user interface including an indication of a first controlled device associated with a first child of the parent, wherein the indication of the first controlled device is selectable by the parent in order to initiate analysis of usage pattern of the first controlled device and provide results of the analysis to the parent in substantially real-time; transmit the user interface data to the computing device; receive an identification of a selection by the parent of a second controlled device associated with a second child of the parent in the interactive user interface; access a database storing analysis data for the
- the terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth.
- the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Cardiology (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
- Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57. In particular, the present application is a continuation of application Ser. No. 15/192,619, filed Jun. 24, 2016, titled MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS which claims priority benefit under 35 U.S.C. § 119(e) to: U.S. Provisional Patent Application Ser. No. 62/184,797, filed Jun. 25, 2015, titled MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS; and to U.S. Provisional Patent Application Ser. No. 62/354,054, filed on Jun. 23, 2016. The entire disclosure of each of the above items—including any appendix thereof—is hereby made part of this specification as if set forth fully herein and incorporated by reference for all purposes, for all that they contain.
- As technology and web access becomes more pervasive and accessible to younger users, it can sometimes affect child safety and well-being. For example, smart phones and other devices can expose children to content unapproved by parents. Moreover, the historical problem of physical bullying in the schoolyard is increasingly being eclipsed by social and physical threats, vulgarity, and similar problems perpetrated by the cyber bully. Impressive new electronic devices and social media platforms can unfortunately amplify the harmful actions of the cyber bully. Cyberbullying can include tormenting, threatening, harassing, humiliating, embarrassing or otherwise targeting an individual using information or communication devices. It can be particularly pervasive among juveniles.
- Example embodiments described herein have several features, no single one of which is indispensable or solely responsible for their desirable attributes. Without limiting the scope of the claims, some of the advantageous features will now be summarized. Methods and systems are disclosed for controlling and monitoring aspects of user systems, which may include mobile electronic devices.
- In some embodiments, a system and apparatus for allowing parents to view and track smart phone activities of their children can include one or more child software modules. The module can be installed on each child's smart phone. The module can access and extract data from or about more than one of the smart phone's other software applications, including at least two of the following: a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application. The module can further send the extracted data to an analysis server. Moreover, the system can include an analysis server that can identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications. Further, the system can include a parent portal. The parent portal can receive results from the analysis server. In some embodiments, the parent portion can display the results organized by child. The parent portal can also provide both generalized smart phone usage data for each child and visual warnings when harmful results have been found by the analysis server, along with the specific underlying data that triggered the warning. Furthermore, the parent portal can provide an interface for receiving input from a parent. The input can include selections of which child's data to view and/or selections of which types and how much of the data and analysis results to view for each child.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be configured to access and extract data sufficient to allow the analysis server to report which new applications are downloaded to each child's smart phone, and that information can be automatically recorded in a computer memory and displayed promptly through the parent portal. A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be configured to access and extract data sufficient to allow the analysis server to report each of the following: which websites were visited using each child's smart phone; and content and timing of each child's posts to social networks. That information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be further configured to access and extract data sufficient to allow the analysis server to report each of the following: the location of the smart phone at periodic intervals throughout the day; and usage of the smart phone that occurs outside of geographic constraints that can be set through the parent portal. That location and usage information can be automatically recorded in a computer memory and displayed promptly through the parent portal. A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: each child software module can be further configured to access and extract data sufficient to allow the analysis server to report usage of the smart phone that occurs during curfew periods, and that information can be automatically recorded in a computer memory and displayed promptly through the parent portal.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following information on the same daily feed screen: identities of people with whom that child communicates most often, including a visual indication ranking those people by frequency or amount of communication; and a daily feed of the child's activities, organized to be sortable chronologically. The child's activities can comprise: any smart phone applications downloaded; content of any SMS text messages sent or received; identity of any websites visited; content of any social network posts created, viewed, or sent; and a visual warning incorporated into the daily feed. The visual warning can include one or more (or each) of the following: cursing or bullying terms; questionable website visits; and breaking curfew. The system can include the following features: for each child, the parent portal can be further configured to display the following information on the same current applications screen: a list of all applications currently installed on that child's phone, a visual warning identifying applications that are identified as potentially harmful based on information in the analysis server, and a description of the functions of each of the applications in the list. The system can also include the following features: for each child, the parent portal can be configured to display the following information on the same usage screen: a color chart indicating which applications were used by the child that day, and how much time was spent using those applications. A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following: text messages sent and received, with curse words and bullying terms highlighted; a list of most commonly used curse words and bullying terms; and an interface allowing a user of the parent portal to control if text conversations should be flagged automatically, and how many curse words or bullying terms should be allowed before a flag is automatically applied.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: for each child, the parent portal can be configured to display the following web access information and controls: a whitelist mode that triggers warnings if the child visits any website domain that is not listed as specifically allowed; or a blacklist mode that triggers warnings for only website domains that that are flagged by a user of the parent portal or by the existing database of harmful websites accessible from the analysis server. A system and apparatus for allowing parents to view and track smart phone activities of their children can also include an embedded map feature visible in the parent portal that indicates where each child has traveled during the day and provides a warning if the child leaves a given geographical radius.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include a curfew feature comprising: a control interface in the parent portal configured to allow a user of the parent portal to select restricted times that a child's smart phone may not be used; and an active restriction feature in the child software module configured to completely disable the child smart phone during the restricted times, except for emergency phone calls.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: the parent portal can be further configured provide an interface for receiving input from a parent, the input comprising selections of which types of harmful material should be identified, and what level of scrutiny to apply in determining harmful material.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include the following features: a computer that periodically analyzes the selections from many parents regarding types of harmful material and level of scrutiny, analyzes those selections statistically, and incorporates the statistical results in setting default settings and recommendations for future users.
- A system and apparatus for allowing parents to view and track smart phone activities of their children can also include an analysis server configured to automatically identify patterns of harmful content for which helpful works of authorship have previously been created and stored in an electronic library, and provide immediate access to those works of authorship to parents by transmitting an electronic copy thereof or a link thereto to the parent portal for display adjacent to a warning based on harmful content that underlies those patterns of harmful content.
- A computing device can comprise: a communications module; a location determining module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions. Implementation can occur by at least accomplishing the following: retrieve computing device data from the computing device; send computing device data to a control system; and receive a command from the control system based in part on analysis of the sent computing device data. Computing device data can comprise at least one of the following: receiving incoming messages using the communications module of the computing device; retrieving outgoing messages sent using the communications module of the computing device; and determining a location of the computing device using the location determining module. Computing can comprise one or more of the following: activating the location determining module; disabling the location determining module; disabling the communications module; activating the communications module; and selectively deactivating one or more features of the computing device for a predetermined time period.
- A system for monitoring one or more computing devices can comprise: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions. These can be executed to at least: receive communications data from one or more controlled computing devices; analyze received communications data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- A system for monitoring one or more computing devices can comprise: a memory device comprising a controller module stored thereon as computer-executable instructions; and a hardware processor configured to implement the controller module by executing the computer-executable instructions. This implementation can at least: receive location data from one or more controlled computing devices; analyze received location data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- A computing device can comprise: a communications module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions. Implementation can at least: select notification settings; receive notification data based on the selected notification settings; and send command data to control an operation of a controlled computing device.
- In some embodiments, a computing system can access one or more databases in substantially real-time in response to input from a parent provided in an interactive user interface in order to determine information related to a user system and provide the determined information to the parent in the interactive user interface. The computing system can include a network interface coupled to a data network for receiving and transmitting one or more packet flows, a computer processor, and a computer readable storage medium storing program instructions configured for execution by the computer processor in order to cause the computing system to generate user interface data for rendering the interactive user interface on a computing device, the interactive user interface including an indication of a first controlled device associated with a first child of the parent, wherein the indication of the first controlled device is selectable by the parent in order to initiate analysis of usage pattern of the first controlled device and provide results of the analysis to the parent in substantially real-time. The programmed instructions can further include transmit the user interface data to the computing device. In some embodiments, the programmed instructions can include receiving an identification of a selection by the parent of a second controlled device associated with a second child of the parent in the interactive user interface. The programmed instructions can also include accessing a database storing analysis data for the second controlled device associated with the second child of the parent. Further, the programmed instructions can include updating the user interface data such that the interactive user interface includes indications of at least a subset of determined high frequency contacts. The program instructions can include transmitting the updated user interface data to the computing device.
- Embodiments disclosed herein are described below with reference to the drawings. The following drawings and the associated descriptions are provided to illustrate embodiments of the present disclosure and do not limit the scope of the claims.
-
FIG. 1 illustrates a computing environment including a safety system that can help deter cyberbullying. -
FIG. 2 illustrates a communications monitoring process. -
FIG. 3A shows views of a mobile application as it may appear running on a smart phone device. -
FIG. 3B shows three views of a mobile application initiating and sign in process. -
FIG. 3C shows four views of a mobile application sign in and settings process. -
FIG. 3D shows three views of a mobile application activation and device administration process. -
FIG. 3E shows four views of a mobile application setup process. -
FIG. 3F shows two views of a mobile application protected status. -
FIG. 3G shows two views that include a mobile application monitoring status. -
FIG. 4 shows a view of a curfew lockout screen. -
FIG. 5 shows a view of a website that can include a login screen for a system user to access his or her account. -
FIGS. 6A and 6B show a view of a web page that can provide subscription and pricing information. -
FIG. 7 shows a view of a webpage that can assist a user in creating an account and providing name, e-mail, and password information. -
FIG. 8 shows a view of a webpage that can assist a user in creating an account and providing billing information. -
FIG. 9 shows a view of a webpage that can assist a user in preparing to use a safety system by downloading and installing the components. -
FIG. 10A shows a dashboard view with a map. -
FIG. 10B shows an explanation of some of the icons inFIG. 10A . -
FIG. 11 shows a dashboard view with notifications information. -
FIG. 12 shows a view of a notifications screen. -
FIG. 13 shows a view of a device status screen. -
FIG. 14 shows a view of an “Apps” screen. -
FIG. 15 shows a Filters view of a set of SMS (or short message service) screens. -
FIG. 16 shows an Activity view of a set of SMS screens. -
FIG. 17 shows a WWW (or world-wide web) screen. -
FIG. 18 shows a location screen. -
FIG. 19 shows a curfew settings screen. -
FIG. 20 shows an account information screen. -
FIG. 21 shows a notification preferences screen. -
FIG. 22 shows a devices screen listing the devices being tracked. -
FIG. 23 shows a log-in screen. -
FIG. 24 shows a user system including a notification (emphasized) received from the safety system over a network. -
FIG. 25 illustrates a user interface including active links for parents to access community features discussed above. -
FIG. 26 illustrates user interfaces that enable users of the systems described herein to ask technical questions about the software including some or all modules of a safety system. -
FIG. 27 illustrates an example a blog user interface generated by asafety system 110 to provide community features discussed above. -
FIG. 28 shows a second portion of the user interface including additional articles. -
FIG. 29 illustrates an embodiment of a user interface including an article or a blog. -
FIG. 30 illustrates an example user interface showing a more detailed overview of a professional listed in the blog roll. -
FIGS. 31 and 32 illustrate example embodiments of a process for enabling systems described herein on one or more user systems -
FIG. 33 illustrates an embodiment of a maps user interface generated by a safety system to show location information of a child's user system on amap 3302. -
FIG. 34 illustrates an embodiment of a notificationadministration user interface 3400 generated by a safety system. -
FIG. 35A illustrate an example user interface for activating a safety system on the computing device. -
FIG. 35B illustrates an example user interface generated by asafety system 110 indicating status of a safety system on aparticular user system 130. -
FIG. 36 illustrates an example user interface generated by a safety system indicating that the user system is in curfew mode. -
FIG. 37 illustrates an embodiment of a dashboard user interface generated by a safety system. -
FIG. 38 illustrates an embodiment of a process for generating a dashboard user interface. -
FIG. 39 illustrates another example view of a dashboard user interface. -
FIG. 40 illustrates a photo/video summary user interface. -
FIG. 41 illustrates a dashboard user interface that includes a contacts summary bar. -
FIG. 42 includes a notification summary user interface generated by a safety system. -
FIG. 43 illustrates an application usage interface. -
FIG. 44 illustrates a current applications interface. -
FIG. 45 illustrates an application installations interface. -
FIG. 46 illustrates an embodiment of an SMS activity interface. -
FIG. 47A illustrates an embodiment of an SMS filters interface. -
FIG. 47B illustrates another embodiment of an SMS filters interface. -
FIG. 47C illustrates search filters in the embodiment of SMS filters interface shown inFIG. 47B . -
FIG. 47D illustrates an embodiment of an SMS analytics interface. -
FIG. 48 illustrates a web access interface. -
FIG. 49A illustrates an embodiment of a location interface. -
FIG. 49B illustrates an embodiment of a location history interface. -
FIGS. 49C-49I illustrate embodiments of location tracking interfaces. -
FIG. 50A illustrates an embodiment of a curfew interface. -
FIG. 50B illustrates another embodiment of a curfew interface. -
FIG. 51 illustrates an embodiment of a master account user interface. -
FIG. 52 illustrates another embodiment of an account user interface. -
FIG. 53 illustrates another embodiment of an account user interface. -
FIG. 54 illustrates a user system that can implement some functions of a safety system. -
FIG. 55 illustrates using a remote computing system to track activities of a mobile device. -
FIG. 56 illustrates an example sequence for detecting and listing installed applications on a device. -
FIG. 57 illustrates an example sequence for web/browser filtering and application purchase restrictions. -
FIG. 58 illustrates an example sequence for curfew or other time-based blocking. -
FIG. 59 illustrates a computing environment for monitoring activities of a mobile device. -
FIG. 60 illustrates an example process for flagging activities on a person's mobile device. -
FIGS. 61A, 61B, 62A, 62B, 63-65, 66A, 66B, and 67-72 depict example user interfaces for a safety system. -
FIG. 73 shows a generalized structure for a computer system that can perform functions described herein. -
FIGS. 74-79 show example code excerpts. - Although certain preferred embodiments and examples are disclosed below, inventive subject matter extends beyond the, for example, specifically disclosed embodiments to other alternative embodiments and/or uses and to modifications and equivalents thereof. Thus, the scope of any claims appended hereto is not limited by any of the particular embodiments described below. For example, in any method or process disclosed herein, the acts or operations of the method or process may be performed in any suitable sequence and are not necessarily limited to any particular disclosed sequence. Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding certain embodiments; however, the order of description should not be construed to imply that these operations are order dependent. Additionally, the structures, systems, and/or devices described herein may be embodied as integrated components or as separate components. For purposes of comparing various embodiments, certain aspects and advantages of these embodiments are described. Not necessarily all such aspects or advantages are achieved by any particular embodiment. Thus, for example, various embodiments may be carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other aspects or advantages as may also be taught or suggested herein.
- Details regarding several illustrative embodiments for implementing the systems and methods described herein are described below with reference to the figures. At times, features of certain embodiments are described below in accordance with that which will be understood or appreciated by a person of ordinary skill in the art to which the system and method described herein pertain.
- The system and method described herein can advantageously be implemented using computer software, hardware, firmware, or any combination of software, hardware, and firmware. In some embodiments, the system is implemented as a number of software modules that comprise computer executable code for performing the functions described herein. In some embodiments, the computer-executable code is executed on one or more general purpose or specialized computers. However, any module that can be implemented using software to be executed on a general purpose or specialized computer can also be implemented using a different combination of hardware, software, or firmware. For example, such a module can be implemented completely in hardware using a combination of integrated circuits. Alternatively or additionally, such a module can be implemented completely or partially using specialized computers designed to perform the particular functions described herein rather than by general purpose computers. Similarly, a number of databases are described herein. Any two or more databases can be combined into one database and that any one database can be divided into multiple databases. Multiple distributed computing devices can be substituted for any one computing device illustrated herein. In such distributed embodiments, the functions of the one computing device are distributed such that some functions are performed on each of the distributed computing devices.
- The foregoing and other variations understood by a person of ordinary skill in the art can be made to the embodiments described herein without departing from the inventions disclosed herein. With the understanding therefore, that the described embodiments are illustrative and that the invention is not limited to the described embodiments, certain embodiments are described below with reference to the drawings.
- More children now than ever before have access to mobile computing devices (often smart phones), especially at an early age. Accordingly, phone safety is becoming increasingly more important for parents as they want to monitor and control their children's activity on these devices. In addition, children also need protection from cyberbullying. Many states have enacted cyberbullying laws. Cyberbullying is generally defined as bullying that takes place using electronic technology. Electronic technology can include devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat services, and websites. Phone safety can also include reducing or preventing use of a phone while driving.
- This disclosure describes embodiments of safety systems that can protect vulnerable mobile device users, in particular children. Safety systems can assist parents in monitoring and controlling their children's mobile devices, including, for example, the content stored on them or accessed by them, messages received and transmitted by them, etc. Parents can track location of the their children through mobile devices and set up virtual location “fences” as described more in detail below. Safety systems can mine data in text messages (or other communications), filter, and send reports to parents. In some embodiments, a report may be sent to a law enforcement agency or other services, depending on the nature of the messages. Safety systems can also analyze non-written communications, including pictures and videos.
- The features of the systems and methods described herein can also be implemented for mobile safety of groups other than children. For example, employers or caregivers may want to monitor or control mobile devices of their employees or patients.
- Web safety systems can include the following components that can work together or independently. First, an analysis engine that uses filters and search logic. This can comprise a web based crawler and back-end logic designed to continuously or periodically search, filter, or “crawl” social network accounts and flag conversations with illicit content (for example, undesirable content as may be defined or determined by a user). With respect to
FIG. 1 , one or more aspects of such a crawler or back-end logic can be located on a server and accessible through the web or anetwork 102, and the analysis engine can be part of or accessible by theanalysis module 112 of thesafety system 110. Such an analysis engine may also be at least partially included in asafety system plugin 132 that may be located on or close to auser system 130. The analysis engine oranalysis module 112 can be distributed between various processors, including one or more of the following: a processor in auser system 130, a processor in the “cloud” or accessible from thenetwork 102, athird party system 104, and/or a processor in a computer or device having access to a parent portal. A parent can inputuser parameters 140 using a usersystem control module 118 to help select and determine what the back-end logic or crawler delivers to the parent through auser interface module 116. - Second, a system can include a mobile application with various social monitoring and safety related features such as GPS/geolocation-based monitoring (for example, monitoring a child's location for safety purposes), mobile web filtering/blocking, parental notification (for example, alerts regarding keywords, new application installation, application usage, etc.), and SMS/Text message monitoring or blocking, call blocking, and/or phone lockout (for example, inhibition of functionality while driving). In the context of
FIG. 1 , these functions can be accomplished through asafety system plugin 132 that can be installed on auser system 130, for example. In some cases, raw data can be gathered locally at a user system 130 (e.g., using a camera, a GPS, a microphone, an accelerometer, from its memory, from other software applications, etc.) and either partially processed by asafety system plugin 132 or sent directly over the network using a communications module for analysis (or further analysis) by ananalysis module 112 of asafety system 110. Asafety system plugin 132 can be especially helpful in controlling the local functionality of auser system 130. - Third, a website interface (for example, an administration portal, user community, etc.) to allow users (for example, parents) to review reports and details of protected individual's (for example, their children's) activities, subscribe or contribute to services such as crowd-sourced website black lists or white lists, and/or modify various parameters of the monitoring software. In the context of
FIG. 1 , this website interface can be auser interface module 116 and/or anaccount management module 120, and it can be accessible via thenetwork 102, for example. - Fourth, back-end data hardware and software that can store, process, use, index, recall, and send (for example, for display) the information for use by the supporting systems for the functions listed above. In the context of
FIG. 1 , this back-end can be included in theanalysis module 112; it can be located remotely and accessible through thenetwork 102; it may contribute thesystem parameters 150 and be administered by asystem administrator 108. - The described systems can incorporate and expand on the technical information and teachings in U.S. Pat. No. 8,380,176; its entire disclosure is incorporated by reference herein for all that it contains and is made part of this specification for all purposes.
-
FIG. 1 illustrates an embodiment of acomputing environment 100 including asafety system 110 that can monitor and control auser system 130. In some embodiments, a safety system is not limited to those items in thebox 110 but also includes one or more of the other illustrated elements in theenvironment 100. For example, a server, a home computer, and a mobile device can act in concert, each having some locally-installed software and communicating with each other through the web or a network. -
User system 130 is illustrated as a single item for convenience but represents one ormore user systems 130. In general, theuser systems 130 can include any type of computing device capable of executing one or more applications and/or accessing network resources. For example, theuser systems 130 can be one or more desktops, laptops, netbooks, tablet computers, smartphones, PDAs (personal digital assistants), servers, smartwatches, computerized eyewear, smart augmented-reality wear, e-book readers, video game platforms, television set-top boxes (or simply a television with computing capability), a kiosk, combinations of the same, or the like. Theuser systems 130 can include software and/orhardware 132 for accessing thesafety system 110, such as a browser or other client software (including an “app”). In some embodiments, some or all of the modules of thesafety system 110 can be installed as application software on theuser system 130. - The
safety system 110 can control and/or monitoruser systems 130 via one or more modules of theuser system 130. In a first example, theuser systems 130 can include a communication module (not shown) having an antenna for receiving and sending communications data. The usersystem control module 118 of thesafety system 110 can block access to or disable the communications module. Accordingly, the usersystem control module 118 can preventuser systems 130 from transmitting or receiving communications. - In addition to using a communications module of a
user system 130, the usersystem control module 118 can also control theuser system 130 through various other technical channels. For example, even though thecontrol module 118 may monitor a communication module (e.g., as radio frequency transmissions are prepared or transferred to or from an antenna within the user system 130), thecontrol module 118 may use a separate channel to exert control over thesystem 130. Thus, as a result of monitored communications, a user interface may be controlled, locked, blocked, etc. Thus, passive monitoring and active control can be relatively independent as a technical matter, but the two functions can be related through logic or programming within thesafety system 110. This can allow greater flexibility in effectuating control and control can be asserted through multiple channels simultaneously or in a contingency arrangement. Thus, if a mobile phone user is able to defeat the efforts of acontrol module 118 to control a communication module of theuser system 130, the control module can revert to a mode that instead controls an interface of thesystem 130, thereby achieving the same ultimate goal through a different technical channel. This control redundancy can make thesafety system 110 more robust because it can defeat efforts to circumvent its controls. That is, if a child attempts to avoid parental controls in one channel, another channel may allow the parental controls to nevertheless prevail. Moreover, some operating systems may be more difficult to interface with. Accordingly, by allowing asafety system 110 to work through multiple channels to controluser systems 130, one or more of those channels may be more feasible to implement as thesafety system 110 is configured to work with a more closely-guarded underlying operating system. Monitoring and control directed by a usersystem control module 118 can occur at one or more of the root level, a middle level, or a superficial level of auser system 130. In a second example of how asafety system 110 can control and/or monitoruser systems 130, the usersystem control module 118 can intercept or otherwise access and analyze image or video feeds from or to the camera module of theuser systems 130. For example, theanalysis module 112 of thesafety system 110 can intercept and analyze live capture of images or a video feed and determine whether it is appropriate for storage in the memory of theuser system 130 or for transmission. Based on the determination, the usersystem control module 118 can block storage or transmission of the images or video feed. Thus, it can prevent, inhibit, deter, or monitor the taking or receiving inappropriate pictures. - In a third example of how a
safety system 110 can control and/or monitoruser systems 130, the usersystem control module 118 can, in some circumstances, turn on the camera module of theuser system 110. This may be useful to identify the location of theuser system 110 or determine if the child is in danger. Thesafety system 110 can use a microphone of theuser system 130 to receive an audio signal and further determine safety of the child based on parsing the audio. Thesafety system 110 can monitor for certain words (like “help”) or sounds (like “crying” or “screaming”). In some instances, thesafety system 110 can use the communications module of theuser system 130 to send alerts (for example, to parents or authorities) based on analyzed image, video, or audio. Thesafety system 110 can use the speaker of theuser system 130 to output an alarm in an event of danger. In a fourth example of how asafety system 110 can control and/or monitoruser systems 130, the usersystem control module 118 can receive information from a GPS module and/or an accelerometer module of theuser system 130. Based on the received information, the usersystem control module 118 can identify the location and/or calculate speed of theuser system 130. In some embodiments, theanalysis module 112 can supplement with accelerometer data when the GPS data is not available to determine motion of theuser system 130. In some embodiments, speed, acceleration, and/or relative location data can be collected, analyzed and/or used using the information in U.S. Pat. No. 8,380,176; its entire disclosure is incorporated by reference herein for all that it contains and is made part of this specification. Further, the speed may be monitored with respect to other conditions for accuracy. For example, thesafety system 110 can measure heart rate of a user and track speed of the user device concurrently to avoid false positives such as when the user is exercising or walking. Thesafety system 110 can also access accelerometer data from theuser system 130 to determine that a person is running instead of driving. - The third and fourth examples provided above are examples of how a
safety system 110 can control and/or monitoruser systems 130. These demonstrate how a mobile device can become a valuable tool to gather and potentially transmitting information, acting as like an airliner's “black box,” a homing beacon, a child tracking device, and/or as a distress signal in various situations. In some modes, software on a mobile phone can allow a child, for example, to activate a distress signal that will record and/or transmit location information, sounds, pictures, etc. without alerting a would-be kidnapper to the transmissions. To save battery, some embodiments may transmit such emergency information in periodic spurts, for short amounts of time, to enable a longer emergency operation mode. Such an emergency mode can be activated readily, or it can require a password or other verification to avoid improper or inadvertent uses. Thus, the systems described herein can deter or assist in resolving not only cyber-bullying, but also help remediate other more drastic and immediate physical dangers such as kidnapping. In order to more effectively monitor and/or control aspects of theuser system 130, one or more software portions of thesafety system 110 can be installed locally on theuser system 130. For example, it may be inefficient to monitor radio transmissions, image or video feeds, or location information remotely if theuser system 130 is a mobile device. Thus, the safety system can comprise an application that accomplishes many monitoring and control functions locally, while still accepting input and control from a separate user system. Thus, a parent may be able to log in to a usersystem control module 118 oraccount management module 120 and configure settings for thesafety system 110, but those settings can be implemented through software or other modules that are locally present on a child's mobile device, which can be auser system 130. Thesafety system 110 can facilitate safe communication (e.g., through encryption) between the locally-installed software and the web-accessible account management module 110 (which can act as a parental settings/monitoring portal). Thus, a parent may be able to select andinput user parameters 140, to decide levels of scrutiny and filtering that should be applied to a child's device (which can be a user system 130). - In some embodiments, the
safety system 110 can be integrated with the third party tools through a plug-in or an API (application programming interface). The third party tools may come pre-installed with a plug-in to thesafety system 110. In other embodiments, a plugin to thesafety system 110 may be installed on to a third party tool. For example, a third party tool can include text/SMS client, an email client, a web browser, a social networking client (for example Facebook, Twitter, etc.), an image capture client, etc. - The
safety system 110 can be implemented in computer hardware and/or software. Thesafety system 110 can execute on one or more computing devices, such as one or more physical server computers. In implementations where thesafety system 110 is implemented on multiple servers, these servers can be co-located or can be geographically separate (such as in separate data centers). In addition, thesafety system 110 can be implemented in one or more virtual machines that execute on a physical server or group of servers. Further, thesafety system 110 can be hosted in a cloud computing environment, such as in the Amazon Web Services (AWS) Elastic Computer Cloud (EC2) or the Microsoft® Windows® Azure Platform. - The
user systems 130 can remotely access some or all of thesafety system 110 on these servers through thenetwork 102. Theuser systems 130 can include thick or thin client software that can access thesafety system 110 on the one or more servers through thenetwork 102. Thenetwork 102 may be a local area network (LAN), a wide area network (WAN), such as the Internet, combinations of the same, or the like. For example, thenetwork 102 can include any combination of associated computer hardware, switches, etc. (for example, an organization's private intranet, the public Internet, and/or a combination of the same). In some embodiments, the user software on theuser system 130 can be browser software or other application software. Theuser system 130 can access thesafety system 110 through the browser software. In certain embodiments, some or all of thesafety system 110's functionality can be implemented on theuser systems 130. - A
safety system plugin 132 can be part of auser system 130. Thisplugin 132 can periodically communicate through anetwork 102 with asafety system 110 using, for example, a communications module of auser system 130. This arrangement can allow for asafety system 110 to offload intensive processing to a server rather than auser system 130 if thatsystem 130 is a smart phone, for example. Thus, if any filtering algorithms, image analysis, etc. would tend to bog down a mobile processor or make thesafety system 110 less transparent or more intrusive to operation of auser system 130, this can be mitigated by instead feeding raw data to a server or a home computer that is also part of or accessible by thesafety system 110. -
FIG. 1 shows various components of acomputing environment 100. Anetwork 102 can facilitate communication between components of the system. For example, asystem administrator 108 can use thenetwork 102 to confirm that safety systems 110 (e.g., as used and overseen by parents) are properly monitoring and controlling user systems 130 (e.g., as used by their children). Asystem administrator 108 can also providesystem parameters 150 to thesafety system 110. Asafety system 110 can effectively interpose its filters between auser system 130 and various ways in which that user system interacts with the world, whether through any network 102 (including the world wide web) or otherwise. Thus, a safety system (in conjunction with parental interactions) can form a protective shield for transmissions to or from a camera, a communications module, a memory, a microphone, and/or a speaker of theuser system 130. Even theuser systems 130 attempts to accessthird party sites 106 orthird party systems 104 can be monitored and/or controlled. - As described above, the
safety system 110, which may include one or more modules, can control and/or monitor theuser systems 130. In some embodiments, thesafety system 110 can monitor, filter, and/or block communications. - A. Communications Monitoring, Filtering, Blocking, and Alerting
-
FIG. 2 illustrates an embodiment of acommunication monitoring process 200 for monitoring, filtering, and/or blocking communications sent or received atuser systems 130. Thecommunications monitoring process 200 can be implemented by any of the system described above. For illustrative purposes, theprocess 200 will be described as being implemented by components of thecomputing environment 100 ofFIG. 1 . Theprocess 200 depicts an example overview of monitoring and filtering communications. In some embodiments, communications monitoring may also be implemented as described herein with respect to SMS Agent. - Any process descriptions, elements, or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those of ordinary skill in the art.
- The process 200 (some or all of which can be cycled and repeated in parallel or serially) begins at
block 202 when the communications module of theuser system 130 receives or is in the process of sending a communication. The communication may include, without limitation, a text/SMS message, a chat message, an audio message, a video message, a multi-media message (MMS), an e-mail, etc. The user systems controlsmodule 118 can intercept the communications. The communications can be intercepted using the following hardware and technical protocols, for example. In some embodiments, thesafety system 110 can capture packets received at the communications module of theuser system 130. Thesafety system 110 can detect whether these packets include messages, for example, Whatsapp message, SnapChat messages, Facebook messages, etc. The intercepted messages can be stored in adata store 140 and analyzed as described herein. - These communications can then be analyzed by the
analysis module 112 atstep 204. Some or all of this analysis can occur either onboard auser system 130, on a server accessible through thenetwork 102, and/or within asafety system 110 that may be installed on a personal computer of a parent for example. Theanalysis module 112 can review the content and source of the communications and determine, for example, whether the communications contain content that should be blocked or filtered, as indicated atstep 206. This analysis can use external or internal sources (e.g., a dynamic dictionary of regional terminology, dictionaries of urban slang, a database maintained by asystem administrator 108, one or more databases updatable by a community of users, specific language or country resources, etc.) against which to compare this content. For example, the communication may contain illicit content such as profanity or inappropriate images. An analysis process can include comparison of words and word groups to identify not only explicit language but also aggressive language, explicit and implicit threats, etc. Analysis can also review frequency (harassing or distracting rapidity of test messages, for example) to determine if a perpetrator is hounding a child with frequent messages or transmissions. Analysis can review metadata for attachments to determine if they are named in a manner that indicates danger or indicates provenance from or association with pornographic websites for example. Communications can also be analyzed to identify moods, such as neutral, or happy or sad or depressing. Mood analysis can be a function of keyword search and/or machine learning. Certain words such as “kill” or “depress” or “sad” can be used to identify moods. Thesafety system 110 can generate alerts based on the identified mood of the messages (or social media communications) sent or received by the users. Accordingly, thesafety system 110 can identify and trigger alerts for depression or suicide. Alerts may be received via postcard notifications on iOS or Android devices. - In an example, intercepted communications can be analyzed—and a
safety system 110 can perform SMS filtering and searching to achieve the views shown inFIGS. 15, 16, 46 , and/or 47, for example—using the following technical protocols. In some embodiments, thesafety system 110 can call operating system hooks to access SMS messages or other social media data. Operating system hooks can include Android App Managers such as SMS Receiver. Thesafety system 110 can call these hooks over a periodic time interval. Thesafety system 110 can continuously monitor the communications, however, that might drain the battery of theuser system 110. Accordingly, the period may be balanced with respect to battery life conditions. In some instances, thesafety system 110 can poll for data every 15 minutes. Thesafety system 110 can send polled data to server for storage and analysis. In some embodiments, thesafety system 110 can capture video or snapshots of the display of theuser device 130 to track and analyze data. Thesafety system 110 can also modify theuser system 130 on the firmware level. Accordingly, in some instances, thesafety system 110 can operate at a lower level than the operating systems to interface directly with the hardware modules. - The user
system control module 118 can accordingly block or filter the intercepted communications (or take another alternative or additional action such as alerting a user) atstep 208 based on the determination from theanalysis module 112. Blocking can include any one of the following operations: not storing the communication in the user system's memory, preventing the communications module from transmitting the communications, not showing the intercepted communications in the user interface of the user system, deleting, responding with a message that indicates the message was not received and the future messages will also be blocked, re-routing the message to another destination (such as a parent portal or school administrator), responding with an automatically-generated kind and conciliatory message, automatically responding with a reference to reporting, potential legal action, etc. Alerting a user can include passively recording events or items so that a user can look them up later, or it can include actively sending a notification message to a user. Filtering can include removing some or all content of the communication. In some embodiments, filtering can include substituting some content of the communication such as words (for example substituting the word “shucks” for the word “crap”). Certain images may also be blocked, redacted, censored and/or substituted. Filtering can include completely deleting harmful or bullying messages from auser system 130, and/or filtering can include re-routing those messages to a parent that may access the system through auser interface module 116. - In some embodiments, communications may be blocked or filtered depending on the sender or recipient. Certain senders or recipients may be on a block list. The block list may be created by users (for example, parents) through an administrative portal through an account management module, for example. The block list may also be automatically created based on number of communications, frequency of communications, or information received from a third party system. For example, a system can include a web browser or an add-on to a web browser that includes its own blocking, alerting, and/or filtering functionality. Such functionality can be accomplished through socket or port monitoring, proxy filtering or diversion, etc. Block lists can also be created and updated centrally by a
system administrator 108, for example. Block lists can be maintained for various categories, allowing a user to subscribe to filtering or blocking of a category of objectionable sites or material, while allowing other material that may be objectionable to some, but not that particular user. A multi-level hierarchy of blocking sensitivity can be created to allow a more trusted user to have access to some information (e.g., medical information that may be blocked for younger users due to anatomical references.) All examples of blocking or filtering provided herein can additionally or alternatively comprise sending an alert or notification. - As shown at 210, an alert can be transmitted relating to an intercepted communication. The alert can take one or more forms, and can depend on the result of the
analysis 204. In some examples, the alert results in an objectionable word, phrase, or image appearing in a feed viewable by a parent and associated with the child, along with the sender of that word or image. In some cases, a parent can view all communications with his or her child, along with a breakdown of the people communicating with their child and the relative frequencies of those communications. - A safety system can be used to “trust but verify” (in the case where blocking or filtering may be turned off in favor of active alerts or passive logging). In certain embodiments, an alert relating to the intercepted communications can additionally or alternatively be transmitted to parents or a third party system. The safety system can also store intercepted communications in a
user data repository 140. Parents can review all intercepted communications from theuser data repository 140 using an administrative portal user interface described more in detail below. - Because an analysis and/or filter can be applied at various physical locations—a child's device, a server, a parent's device, etc.—raw data and/or alerts can be sent directly from a child's smart phone to a parent device, they can be sent from a server to a parent device, and/or they can be sent within a parent's device. Timing of alerts is advantageously rapid. Real-time alerts can be helpful to identify harmful behavior rapidly and aid a timely response. Real-time can refer to various relatively short delay periods, including a few seconds, one or a few minutes, one or a few hours, same-day alerts, etc. Factors that affect a delay before an alert (although that delay may not be inconsistent with real-time delivery) can include: internet connection speeds and availability, cell phone provider service, available processor speed for analysis algorithms and technical protocols, and various application-specific factors.
- In an example, various aspects of a child's device can be monitored and alerts or notifications can be provided to a parent. The general alert process can be accomplished using the following technical protocols. For example, alerts can be processed through a push protocol. The
safety system 110 can analyze the monitored content and make a determination to push messages to the parent device. In some embodiments, the messages may be pushed according to a priority determination. For example, certain alerts relating to a child leaving a particular geofence may be pushed right away. Other alerts including child's usage of offensive words may be sent in an email report or shown on a dashboard when the parent logs into the system. Accordingly, thesafety system 110 can determine priority levels of alerts and push them accordingly. - B. Application Monitoring, Filtering, Blocking, and Alerting
- Similar to communications filtering, parents may also want to filter content from various software applications on the
user systems 130, such as web browser clients, social networking clients, SMS, MMS, etc. The techniques, protocols, principles, and approaches described elsewhere in this application with respect to analyzing, filtering and blocking functionality can also apply here. In addition to restrictions on viewing content, theuser systems 130 may be blocked from sending messages or posting content in some applications. For example, parents may want to be alerted to various activities, or to prohibit their kids from posting pictures with alcohol or drugs on social networking sites. Parents may also want to be alerted or to prevent cyberbullying via social networking sites. Accordingly, thesafety system 110 can crawl through social networking or other accounts of individuals to be protected (for example, children). This may be done by configuring asafety system plugin 132 to track and automatically store the account names and passwords when children enter them for these websites or other software applications. Thesafety system 110 can also work as a plug-in for these applications. Thesafety system 110 can review the content and determine any content to block or flag for review via the administration portal oruser interface module 116. In some embodiments, application monitoring, filtering and blocking may also be implemented as described herein with respect to Apps Agent. - In some embodiments, the
safety system 130 can alert a user and/or prohibit, inhibit, or block downloading and installation of certain applications. Thesafety system 130 can assess applications to be blocked using an application block list that may be defined by parents or dynamically maintained by asystem administrator 108 or athird party system 104, and be accessible to thesafety system 110, which can access and copy such a block list or comparison database periodically. Thesafety system 130, asystem administrator 108, or others can dynamically maintain the app block list based on crowd-sourcing, allowing users of the system to give feedback about what applications should or should not be included, or discriminating between various levels of protection in a refined hierarchy of block lists. Thesafety system 130 can use selections, reviews and/or ratings from a plurality of users to dynamically maintain the app block list. In some embodiments, thesafety system 130 can automatically send an alert or prepare a report when new applications are installed on a user system. The reports may be sent daily. Parents may also see these reports of theuser system 130 on an administrative portal. The report may include the application name, the description of the application, the date and time of installation, and application rating/reviews. In some embodiments, thesafety system 110 can remove an application from theuser system 130 based on an input. For example, parents can remotely via the administrative portal select removal of a particular application from their child's phone. - Functionality related to application filtering and blocking can be controlled from and/or reviewed using the interactive views illustrated in
FIGS. 14, and 43-45 , for example. In an example, asafety system 110 can identify, analyze, uninstall, and/or block installation of software applications on auser system 130 using the following technical protocols. For example, thesafety system 110 can call an operating system content provider to retrieve status of applications. The status of the applications can include which applications are installed or removed. The status can also include whether the application is active or running in the background. Accordingly, thesafety system 110 can call operating system hooks to retrieve status of the applications. In some embodiments, thedata store 140 may partially reside in the memory of theuser system 130. Theuser system 130 may have restrictions on available data space. However, sending data continuously may tax battery and bandwidth. Thus, in some embodiments, data is stored locally for a certain time period before being transferred to a server. For instance, data may be stored locally for 15 minutes before transfer to an external location. The local cache can be deleted after a predetermined time period or once a predetermined capacity is reached. - C. Website Monitoring, Filtering, Blocking, and Alerting
- The safety system can also block content from certain websites by filtering or substitution. Some websites may be completely prohibited. Some approaches to filtering, blocking, and alerts can include creation, storage, and updating of one or more black lists or white lists. These lists can comprise a look-up table that lists names, URLs, or other identifying indicia of the sites, sources, or content that will trigger the relevant action. For example, a black list of undesirable websites can be downloaded or accessible automatically by an application for a mobile device. Black lists can be dynamically maintained by a user-community and various objectionable materials can be classified using a code system (for example, “po” for pornography, “pr” for profanity, “nu” for nudity, “vi” for violence, “dr” for drugs, etc.) Existing rating systems can be employed or expanded (for example, motion picture or electronic gaming ratings can be used). Content can also be assigned a relative severity on a numeric scale, for example. Users can rate content and an average can be used to automatically include or not include certain content or websites in a black or white list. Users can then determine their desired level of sensitivity and subscribe to one or more sets of black lists or white lists. Black lists can also include graphic images, for example of gang symbols, genitalia, other body parts, etc., and these can be used as reference libraries against which to compare unlisted content with graphical algorithms. These concepts relating to user interaction, black lists, white lists, etc. can apply to blocking, filtering, and alerts with respect to both applications and web pages, and message content. In some embodiments, website monitoring may also be implemented as described herein with respect to WWW Agent.
- In some embodiments, the monitoring, blocking, filtering, and/or alert functions described herein can be used to combat inefficient behavior by students and/or employees on the job. Thus, the system can not only improve safety but it can deter time-wasting activities and improve productivity.
- In addition to analysis of web pages visited, URLs employed, applications run (remotely or locally), and messages sent or received, the system can scan stored files (such as website bookmarks, stored favorites, etc.) in order to generate alerts or other blocking or filtering activity. Some embodiments can allow removal of undesirable bookmarks, websites, etc. The system can employ key-logging, spy-bots, ad-ware techniques, etc. (techniques pioneered by more subversive enterprises) in the service of the greater causes of improving safety, avoiding or recording evidence of illicit activities, cyber bullying, etc.
- Functionality related to website or browser alerting, filtering and blocking can be controlled from, organized by, and/or reviewed using the interactive interface illustrated in
FIGS. 17 and/or 48 , for example. In an example, asafety system 110 can identify, analyze, inhibit access to, send alerts related to, and/or block content from websites or other internet sources on auser system 130 using the following technical protocols. For example, thesafety system 110 can poll content provider of the operation systems to retrieve URLs accessed by users. The content providers may access device drivers which may control hardware (such as communications control and GPS) of theuser systems 130. Accordingly, thesafety system 110 can poll respective content providers for specific information including telephony services, URLs, SMS, application monitoring. - D. Safety System Plugin/Mobile Application
-
FIG. 3A illustrates views of an example safety system plugin (e.g., the plugin 132) that may be installed as a software application on a mobile device or smartphone (which can be auser system 130, for example). An application can be downloaded to the smartphone, and theintroduction view 310 can be shown upon launch of the application. Selection of the “how does this app work” button can result in thetutorial view 316, which can include multiple screens. Selection of the login button can result in the log inview 318. Selection of the log in button after user credentials have been entered can result in acurrent status view 320. A log outcontrol 322 can be provided, allowing entry of a password. Log out can be restricted to a parent or an account holder who installed the mobile application and may not be available to any user of the mobile device. -
FIG. 3B shows three views of an example mobile application initiation and sign in process. For example, asubscription reminder screen 332 can remind a user who has downloaded an application to subscribe and/or install additional software that will interact with the mobile application (or plugin 132). That additional software can provide analysis and reporting features such as those described herein with respect tosafety system 110. An “OK” button control can allow a user to close thereminder screen 332, and this can allow additional screens to be viewed. One of the additional screens can be a sign inscreen 334, which can have a sign in button and also provide information (and access to further information, e.g., through a hyperlink or active control illustrated here to say “How does WebSafety work” thereon) regarding the features and usefulness of asafety system 110. Another additional screen can be a sign upscreen 336, which can be web accessible and allow a user to obtain a subscription. -
FIG. 3C shows four views of a mobile application sign in and settings process. Apassword view 340 can include user accessible fields for accepting and e-mail and password as shown. Alternatively other credential systems can be used. For example, a user can access the system using credentials associated with a social network account. The password view can accomplish functions similar to that of theintroduction view 310, for example. Clicking a sign in button can provide a user access to a bifurcateduser choice screen 344, allowing a user to choose who will use the device: a child or a parent. This can allow a single application software download that can function in either child mode or parent mode, depending on a selection in a process as indicated here inFIG. 3C , and/or inFIGS. 31 and 32 , for example. Selection of a “my child” control button can result in the mychild view 346; selection of a “parent/guardian” button can result in the parent/guardian view 348. Each option allows entry of a name, a save button, and a log out button. The my child option initiates a process that protects the device and tracks its activity. The parent/guardian option initiates a process that provides notifications to the device of protected services associated with children's devices on the same account. -
FIG. 3D shows three views of a mobile application activation and device administration process. A protectedview 350 can be seen on a child's device indicating that aplugin 132 is installed and functioning. An optional activatebutton 351 can be selected, resulting in anadministrative information screen 354. Alock control 352 can be selected, resulting in a prompt to enter a password or other credential (see theaccess settings dialogue 374 ofFIG. 3F ), which, if provided, can lead to the bifurcateduser choice screen 354. Theadministrative information screen 354 can have an activatebutton 355, which, when selected, can result in the curfew disablemessage screen 358. -
FIG. 3E shows four views of a mobile application setup process. For example, setting up a child device (after choosing the option of “my child,” see view 346) can include the technical process steps illustrated here. These views can result after pressing an OK button as seen in the curfew disablemessage screen 358 and generally after the sequence shown in the views ofFIG. 3D . A preparing SMS data view 360 can indicate that the software is accessing, cataloguing, and/or otherwise preparing SMS data to be reported and formatted for a parent portal, for example. An uploading messages view 362 can indicated that the prepared data is being transferred to a server over thenetwork 102. A syncing curfews view 364 can indicated that the software is adjusting control functionality on the device shown here, and an uploading apps data view 368 can indicate that the software is reviewing installed applications and transferring that information to a server accessible over anetwork 102. An analysis step (seeanalysis module 112, for example) can then be performed by the server on any data uploaded to the server. -
FIG. 3F shows two views of a mobile application protected status. The currently protectedview 370 can result after the process shown and described inFIG. 3E . As a result of that process, the “activate”button 351 is not present in this view. Theaccess settings dialogue 374 can appear when alock control button 372 is selected, allowing a user to enter a password and change the settings, functionality, or role of the device (restarting a process described above, for example). -
FIG. 3G shows two views that include a mobile application monitoring status. The parent/guardian view 348, shown again here, can be selected and can result in the monitoring/notifications view 380. This can indicate that the device shown—which can be an example of acontroller user system 130—is configured for use by a parent, because it is “currently providing notifications.” - E. Time Restrictions/Curfew Blocking
- In some instances, the
safety system 110 can enable parents to institute electronic curfew or grounding rules. Parents may want to ensure that their children cannot access certain features of theuser system 130 during a particular time of the day. Parents may not want their children to text after 9 PM or they may not want children to access any applications on a phone after 10 PM on a school night. In some embodiments, thesafety system 110 can allow selective applications based on curfew settings. The selected applications can be customized by parents. For example, parents can allow certain educations apps during curfew time period. In some embodiments, curfews may depend on the location of theuser systems 130. For example, schools may require all phones belonging to students to implement a curfew restriction on school property. Thesafety system 110 can identify that theuser system 130 is within the property bounds of a school and automatically activate classroom curfew restrictions. Accordingly, thesafety system 110 can customize theuser system 110 based on locations and/or curfew settings. Thesafety system 110 can accordingly block access to applications and certain features of theuser system 130 based on the curfew or grounding settings. Parents may enter these settings via one of the user interfaces described below. While the examples in this disclosure relate to children, these features may also be used by employers to control aspect of employee's phone usage during work time. Employers may want to disable access to web browsing or social networking links fromuser systems 130 during work hours. Thesafety system 110 can block these applications during a set time period or set locations. Employees may be able to access these application when they are away from work site. Similar functionality is also useful in a school setting. For example, an authorized and responsible school administrator may be able to oversee children's activities or limit use of smart phones.FIG. 4 illustrates views of an example safety system plugin that may be installed as a software application on a mobile device or smartphone (which can be auser system 130, for example). When the plugin is installed and running, it can present acurfew lockout view 410 during a designated curfew period. Selecting the “close”button 412 can result in a notification sent to the account holder (which may be a parent). In some embodiments, a close button or similar functionality may not be provided and a curfew lockout can be more strict and difficult to avoid, without having the password or other credential of the account holder. A notification resulting from closure can be announced on the lockout view, or it can happen in the background without including the text as shown. Alogout control 450 can allow an account holder to stop the software from running on the mobile device, for example. Another example curfew lockout screen is illustrated inFIG. 36 . Lockout can involve inhibiting functionality of the operating system of a device at a root or core level. Lockout can involve blocking user interface functionality. Lockout can involve intercepting input or output at an intermediate level between these two approaches. In some embodiments, curfew restrictions may also be implemented as described herein with respect to Curfew Agent. - Useful interfaces that can allow a parent to set curfew settings are included herewith as
FIGS. 19, 50A, and 50B . As illustrated inFIG. 50B , the view can include a calendar background and allow visual blocks to be re-sized, dragged, or otherwise manipulated by the finger, cursor, mouse, or other user input approach. The blocks can represent time when usage is allowed, or the blocks can represent time periods when usage is not allowed. The size and placement of the blocks on the calendar, as controlled through a parent interface, for example, can establish periods where smart phone usage of a child is not allowed. The software and system can be configured to actually prevent usage of the smart phone, or it can be configured to report any clandestine usage that is contrary to the curfew restrictions. Curfews can be set as systemic, recurring calendar events, or they can be customized as a consequence of specific child behavior or failure to follow other rules or restrictions. Incentives and punishments can be calibrated to correspond to varying curfew settings. Software installed on a smart phone can be employed to track attempts to circumvent any curfew settings or restrictions. Software installed on the smart phone can continue to report some activities to a parental portal or other interface even when the smart phone itself is locked to prevent a child from using it during a curfew period. Thesafety system 110 can also determine how long a child is on a particular application during the day and/or week and based on the duration, enable some of the curfew restrictions. Also, as discussed herein, thesafety system 110 can disable certain apps during curfew time. Further, as a child leave a particular area, the safety system can block some of the functionalities of theuser system 130. - In an example, a
safety system 110 can help establish time or curfew restrictions on auser system 130 using the technical protocols described herein. For example, thesafety system 110 can selectively choose which applications to enable in curfew mode. - F. Anti-Tampering
- The
safety system 110 can also track any attempts at tampering or disabling features of thesafety system 110. Children or employees may try to remove thesafety system 110 from theuser system 130. Thesafety system 110 can attempt to block removal or disabling of its features. For example, thesafety system 110 can be designed to send ping messages that may be encrypted over a network to verify that thesafety system 110 is still active on theuser system 130. Anti-tampering functionality can also be achieved using redundant and/or parallel control techniques. For example, a usersystem control module 118 may control one or more of the following portions of auser system 130, for example: a central processor, a communication module, a display, a memory, etc. In some embodiments, anti-tampering may also be implemented as described herein with respect to Apps Agent and/or Device Status Agent. - The
safety system 110 can integrate or use other third party systems for analytics. For example, thesafety system 110 can integrate Google Analytics to monitor usage of the mobile applications and website on auser system 130. Thesafety system 110 can store the usage stats and send a report via theaccount management module 120. - The
safety system 110 can intercept data being transferred to and/or from the camera on the phone. During video chatting (FaceTime, Skype, etc.), the system can perform image recognition and block any indecent content in real time or with a small or large time delay. Thesafety system 110 can also prevent storage of certain types of pictures or drawings in the memory of the device. For example, the system can prevent the phone from storing any naked, violent, suggestive, inappropriate, or pornographic pictures taken via the phone's camera or received via external communications (for example text or data messaging applications like SnapChat, WhatsApp, etc.). - Objectionable content can be identified using an algorithm that looks for certain colors (flesh tones, etc.). Objectionable content can also be identified algorithmically by searching for or recognizing anatomical features in proportion or relation to others. For example, facial recognition technology can be employed to identify a human face in a given image. If a face is present, the image can then be reviewed to determine the orientation of a human body associated with that face by following common colors (for example, flesh tones) that may represent a neck. Orientation can also be determined by relative positions of features in the face; a body will generally be positioned in the same general direction from the eyes that a mouth and chin are positioned, for example. This analysis can allow the algorithm to scan the area where a related human body is generally expected to be found, thus avoiding wasting computational and processing resources. A scan can review images to identify erotic, suggestive, or otherwise inappropriate imagery by searching for contours, colors, lines, and/or shading that may be typically associated with images of breasts, genetalia, gluteal regions, typical clothing that may be associated with only partial or otherwise suggestive coverage thereof, hands forming gang or other crude or inappropriate gestures, etc. Images to be blocked, filtered, flagged, or analyzed can also be identified by metadata associated therewith, for example data indicating provenance from a known pornographic website, an “xxx” indication, a title relating to sex acts, a name of a known pornographic actor or actress, a word associated with erotic industries, etc.
- In an example, a
safety system 110 can perform image analysis to assist with child safety and well-being on auser system 130 using the technical protocols described herein. - Parents may want to track the location of their children or demarcate a physical area on a map where their children should be or not be for a particular time. As an example, parents may drop off their child at a location such as a friend's house, a mall, or a movie theater. While dropping off a child, parents may select that location and choose a radius outside which a child should not stray. Parents may select the location via the administration module of the
safety system 110. Selection may include checking the current location on a map. Accordingly, parents can create a geofence using thesafety system 110. When the child leaves the area designated by the parent, thesafety system 110 can send an alert to the parents. Thesafety system 110 can also block certain features of the child's user system inside (for example, disable Facebook inside of school geofence) or outside (for example, texting outside of school during school time) of the selected geofenced area. Thus, parents may use thesafety system 110 to monitor the location of the child with the child'suser system 130. - Parents can pre-designate location and/or time of where their children should be during the day. For example, parents can set their children's school location. The phone safety system can then track the location of the child and send an alert to the parent when the child makes it to the designated location. An alert can also be sent when the child is moving outside of the designated radius. Thus, if a child leaves the school zone during school time, an alert may be sent to the parents. A history of phone location can also be tracked and recorded for later reference and pattern recognition. In some embodiments, location monitoring may also be implemented as described herein with respect to Location Agent.
- Tracking a moving phone can enable measurement of its speed. The
safety system 110 can track location using the GPS module and accordingly calculate an average speed of theuser system 130 based on measured locations at certain time intervals. Other methods can also be used to measure the speed of a moving phone, such as, accelerometer or triangulation. Thesafety system 110 can then inhibit some of the functionalities of the phone, for example, based on the detected speed. For example, if the phone is moving beyond a threshold speed, the phone safety system can block incoming text messages, e-mails, multi-media messages, phone calls, etc. The safety system can also alert parents if their children are driving over the speed limit by automatically identifying the speed limit (for example, based on the location of theuser system 130 over time, based on GPS or local cell-tower triangulation, based on independent accelerometer techniques, etc.). Such systems can incorporate and expand on the technical information and teachings in U.S. Pat. No. 8,380,176; its entire disclosure is incorporated by reference herein for all that it contains and is made part of this specification. - Speed tracking may also be used to prevent, deter, or help deal more effectively with abduction. The
safety system 110 can use various inputs, including video, audio, and speed to identify a possible abduction scenarios and send alerts to parents and authorities. As an example, thesafety system 110 can use variety of parameters to weight and determine an abduction score. Parameters can include screaming or crying sounds, asking for help, unusual geographic location (not in the usual area the person is supposed to be), speed of the user system, or no phone usage for a certain period of time. - As described above, parents can select parameters using the
account management module 120 and/or theuser interface module 116 of thesafety system 110. In some embodiment, parents can directly select the settings from the child's phone. In some embodiments, parents can make the changes remotely (to the child's phone) via one or more user interfaces discussed in more detail below. - A parent community portal (e.g., accessible through the
user interface module 116 or otherwise through a network 102) can increase the effectiveness of thesafety system 110 by enabling parents to share information with the community. For example, parents can rate (positive/negative) software applications (“apps”), websites, etc. and those ratings can be shared with other parents or users. Thesafety system 110 can look up the ratings and automatically decide whether to allow a child to access a particular application, or it can report the community rating (along with voting percentages, detailed feedback, comments, etc.) to the parent for a final decision. Parent portal user interfaces can show blocked messages and pictures to the parents and receive their input, which can be used to adapt the system in blocking/reporting future messages and pictures. Theaccount management module 120 can learn parenting style and automatically implement changes based on parent's selection of what is and is not appropriate, or a parent can actively select a level of protection or define their own style using controls provided through auser interface module 116 or anaccount management module 120, for example. Such controls can include drop-down menus listing available profiles, available blocking databases, available community standards resources, etc. The portal can also use collected data from some or all parents or other users and perform statistical analysis to increase effectiveness of the application. Using appropriate permissions and safeguards (for example, removal of specific personal identifiers), some implementations can allow parents to see other parents' phone preferences for their children as a way to learning options and acceptable community standards in certain cultures and communities. In some embodiments, thesafety system 110 can enable parent to search community information from theiruser systems 130. For example, thesafety system 110 can provide a search functionality to look-up apps of concerns and/or safety ratings. - As described above, the phone safety system can send alerts to the parents, employers, users, etc. Parents can decide if an alert is a false positive and the system can adapt based on parents' ratings. For example, some parents might be fine with their child using the word ‘stupid’, while other parents may not. Accordingly, technical solutions include allowing a user to blacklist or whitelist their own terminology using a visual interface, dropdown menu, color scheme, machine learning, etc. The
safety system 110 can store multiple categories of offensive words. Categories may include firearms, sexual innuendos, etc. Thesafety system 110 can also use context to prevent false positives by analyzing surrounding words and mood. For example, pattern may be recognized showing that a parent tending to be more strict regarding some words is also more likely to be more strict with regard to other words. User community data can be analyzed in order to save a parent time in designating all objectionable words and instead implementing a predicted level of tolerance based on an initial set of responses to an interactive survey or other settings. Also, in some cases there might be language/cultural misunderstanding. As described above, thesafety system 110 can learn parents' responses to the alerts. - Integration with existing public systems and institutions can be beneficial and more easily achieved when an automated system such as those described herein are deployed. For example, suspicious text and messages indicating cyberbullying may automatically be sent to a police or a school server for further investigation. A parent can be automatically queried prior to such notifications to authorities, or notified simultaneously.
- Systems and methods described herein can accomplish automatically what even tech-savvy parents can't. Thus, no matter how attentive, a highly technical parent likely does not have time to scan logs or user transmissions (both content and timing) coming to and from their child's device(s). Children may be sending more than 100 text messages a day and in addition may be posting on different platforms and network. Moreover, writing a script to perform such tasks may be beyond the skills of even tech savvy parents, especially when dangerous applications are constantly being created and distributed. Children may be likely to delete messages before parents are able to review them. The
safety system 110 can include one or more modules described above that can retrieve and analyze messages (including texts and data messages) before a child has an opportunity to delete the messages from their computing devices. For example, in some embodiments, thesafety system 110 can retrieve messages from memory of the phone in real time or in substantial real time with respect to messages sent and/or received. Thus, even if a child is using applications like SnapChat, thesafety system 110 can retrieve sent and or received messages before they are deleted from the phone. In some embodiments, a system can periodically or continuously record screenshots or screen-capture video during the time that a problem website or application is being used on auser system 130. This recording function can be used as an alternative or additional measure if the website or application is not blocked or removed, for example. This function can also be used to gather evidence against a cyber-bully or other perpetrator who attempts to destroy evidence or mask harmful activities using electronic means. - In an example, a
safety system 110 can perform image capture and frequent logging of screenshots to assist with child safety and well-being on auser system 130 using the technical protocols described herein. - Thus, the systems described herein can protect the lives and well-being of children. Monitoring of devices (for example, Android, iOS, or other devices that are examples of user systems 130) can be accomplished remotely by parents using tablets, laptops or home computers (which can provide a parent access to the safety system 110). The systems described herein pay attention to children's behavior on their smartphones and tablets so users can be a parent, even in their world—that is, even when fast-evolving modern technology and social systems are being used by children on a constantly evolving basis. These systems can provide simple, real-time notifications that bring vulgar, derogatory and suspicious online behavior to a user's attention so parents have the opportunity to react when it matters. These systems can provide alerts to potential cyberbullying—which can be purely electronic, or a precursor or adjunct to physical bullying. These systems give parents the opportunity to open a sensitive and timely dialogue with children child about the challenges they may be facing. The systems described herein can do what caring parents can't, due to technological impediments and time constraints. Thus, the described systems empower users with awareness by monitoring children's smartphone and tablet activity including internet, social media, and texting, so parents can teach and assist their children, for example.
- An example system can protect one or more devices (e.g., a user system 130) using a monitor dashboard (e.g., a
user interface module 116 and/or an account management module 120) and notifications. Systems and methods such as those presented herein can allow parents (or any users, but generalized users can be referred to as “parents” herein) to protect multiple devices (e.g., user systems 130) such as tablets and phones. Parents can customize the alerts and other information they wish to receive about their child's social communications and behavior. Thus, a single responsible user can have a device or web interface that tracks information sent by or received by one or more other devices (e.g., user systems 130) that are used by those over whom the responsible user has parental or other authority for safety and well-being. - To accomplish these goals of safety and well-being, a responsible user can have access to a “monitor dashboard,” which is an example of a
user interface module 116 and/or an account management module as illustrated with respect to thesafety system 110 ofFIG. 1 . This can be a web portal, accessible from any computer over the world-wide web (see thenetwork 102 ofFIG. 1 ); it can be an application accessible on a parent's own mobile device. The dashboard (which can be made available via theuser interface module 116 ofFIG. 1 , for example) can be a window that allows parents to see what is going on in their children's lives in real time, and recognize potentially harmful communications (and/or other activities, location, viewing and usage habits, etc.) before it is too late. Examples of how such a dashboard can be arranged and visually presented are provided herein. - Organization of information in a dashboard view can be highly effective in making a monitoring application effective. A dashboard can allow at least some portion of various data resources to be visible at the same time, but allow a single interactive view from which more details can be accessed for any of those data resources. The portion viewable in the dashboard view can provide decision-making information that helps a user assess whether the additional details should be accessed. For example, a dashboard can include information about how many “alerts” have occurred since the last time details were viewed. Additional disclosure on these and related topics are provided herein with respect to many of the figures. It can be helpful to organize notifications and content according to which child's device is the source of a notification.
- It can also be helpful to organize notifications according to perceived priority or threat level. Default presumed threat levels can be established in the system. In some cases, a parent/user may establish their own hierarchy of priorities for notifications. Higher threats or more urgent priorities can be listed or displayed more prominently, and/or they can lead to more drastic notifications. For example, a threat of physical harm may cause a monitor dashboard to proactively send a text or other message to a parent's phone, using the audio aspect of a ringing phone to alert a parent to imminent danger for a child. To take another example, receipt of a crude or otherwise inappropriate image, or receipt of anything at all from a designated threat source, can give rise to visual, tactile, haptic, audio, or other feedback, either through or facilitated by a monitor dashboard. Notifications can be provided as real-time alerts, giving parents the opportunity to become aware of cyberbullying and inappropriate behavior, in a timely manner.
- A monitor dashboard (e.g., a user interface module 116) can depend on information fed to it from sources that continuously or periodically monitor and access content on a child's device. This can be accomplished through software that is installed on a child's device (e.g., a safety system plugin 132) or otherwise has access to—for example, through a cellular network or data-provider's servers—information coming to and leaving from a child's device. That software (or a server accessible therefrom via a network 102) can automatically translate these communications and parse or otherwise analyze them to identify what portions of these communications involve actual content sent to or from a child. Such parsing can increase efficiency when transmitted data volume is high by ignoring some aspects of headers or other technical trappings and focusing instead on substantive content (for example, the actual text of an SMS, the actual images attached to an e-mail or delivered through a snap-chat type platform, etc.) Monitoring software can be periodically updated to support monitoring of applications deemed to be new threat sources. Thus, periodic updating and interaction with a remote server can be very helpful to improve effectiveness of such monitoring software.
- Beneficial features of a system can include one or more of the following features: (1) a dashboard such as that discussed above. This can be a real-time dashboard that parents can use to stay informed on the mobile phone and tablet usage habits of their children. “Real time” can indicate that updates or notifications can occur on a time scale that is relatively rapid with respect to some other underlying time scale, it can refer to virtually instantaneous updates, or it can refer to updates that occur within seconds or minutes. (2) Ability to monitor applications, or “apps.” Thus, a parent can be notified of installed apps on a child's phone or tablet. To assist users who may not be familiar with the latest applications, detailed descriptions can be provided of the leading applications on a child's phone and why a parent should or should not be concerned. (3) Ability to monitor text messages, for example those provided through a short message service (“SMS”). Thus, a parent may have the ability to view all the SMS messages sent and received by their child's device, with the ability to receive notifications when words of concern are used. Parents can also be notified when flagged contacts (that is, contacts of a child that have previously been identified as a potential problem or threat source) send something to the child (for example, an SMS message). (4) Ability to monitor browsing or other usage of the world-wide web (“WWW,” or “web”). Parents can receive alerts when flagged URLs such as porn and other inappropriate websites are accessed from a child's device. (5) Ability to monitor social media. A parent may be able to view photos uploaded to a child's Social Media accounts in one convenient location, and receive alerts when content (for example, words, music, or images) of concern are used on social networks. (6) Location Tracking. Parents can view current and past locations of their child's device, and create areas (geo-fences) where the child cannot use their phone (i.e. school) or the parent will be notified. Geo-fencing features can provide exceptions for emergencies. Such exceptions can be accomplished through a permission system involving a parent's remote decision through a dashboard, for example. Another example is an ability to telephone a parent notwithstanding a geo-fence blocking all other calls from a particular location. (7) Curfew. Parents can establish time restrictions on when the child can use their mobile devices. For example, if the child tries to use the device during restricted times, the parent can be notified immediately. Exceptions for emergencies can also be implemented here. (8) Notifications. All notifications or alerts can be set to real time, hourly, daily, or weekly summary reports. Notifications can be accompanied by icons or particular colors indicating a level of priority or urgency. They can also include icons indicating that the source of a notification is a software program such as those with one or more functions described herein.
-
FIGS. 5-23 show example views of hardware running software that can accomplish the goals discussed herein. These views and the included text and graphical placement indicate functionality and features of a web safety system. -
FIG. 5 shows a view of a website that can include a login screen for a system user to access his or her account. -
FIGS. 6A and 6B show a view of a web page that can provide subscription and pricing information. -
FIG. 7 shows a view of a webpage that can assist a user in creating an account and providing name, e-mail, and password information. -
FIG. 8 shows a view of a webpage that can assist a user in creating an account and providing billing information. -
FIG. 9 shows a view of a webpage that can assist a user in preparing to use a safety system by downloading and installing the components. As noted inFIG. 9 , three steps for initiating use of asafety system 110 can include downloading a software application (“the App,” or a safety system plugin 132) to a mobile device (e.g., a user device 130), setting up a parent device (to display or access theuser interface module 116, to receive notifications from thesafety system 110, etc., installing aplugin 132 that may be configured for parental use), and setting up a child device (providinguser parameters 140, installing aplugin 132 that may be configured for a use on a child's device, granting that plugin access to various portions of theuser system 130, etc.)FIG. 31 shows a screen indicating example steps, processes, and screen shots for setting up a parental device.FIG. 32 shows a screen indicating example steps, processes, and screen shots for setting up a child device. - In addition to the figures included herewith and described herein, reference is made to U.S. design patent application No. 29/509,071, which provides additional interface views, examples of how information can be viewed, and views of controls allowing users to interact with a computer through a user interface. The entire disclosure of this design application is incorporated by reference herein for all that it contains and is made part of this specification.
-
FIGS. 10A and 33-53 , among others, show various views of a software framework for presenting information and controls to an account holder for a system such as the ones described herein. Many of these views are examples of how auser interface module 116 ofFIG. 1 can be implemented. At the left in these figures is a vertical series of tabs with icons that may allow a user to touch, click, or otherwise select them. Each tab causes a different view (or set of views) to be presented to a user, and examples of those views are presented below. Some of these tabs have sub-tabs that may appear, for example, immediately to the right of the left-most series of tabs. The tabs shown here are merely examples, but they include (as noted inFIG. 10A ): Dashboard 1010 (which may include Account Info and Notifications sub-tabs, for example),Device Status 1012, Apps 1014,SMS 1016,WWW 1018,Location 1020, and/or Curfew 1022. -
FIG. 10A shows an embodiment of adashboard user interface 1000 with amap 1002 indicating the current location of devices subject to the system, the names of the children using the devices, astatus section 1006 including an SMS status, a world-wide web status, and the time of alast update 1004. This view also shows a list of thelatest notifications 1008. The latest notifications can include messages to a user alerting them to the actions of their children with respect to theiruser systems 130, for example, and the times at which they occurred.FIG. 10A can indicate a view that is provided byuser interface module 116 ofFIG. 1 . Live hyperlinks can be provided. For example, clicking on the name “Billy” can load a device status screen for Billy. Clicking on “view” in the notification list can load an SMS activity screen with an SMS conversation visible. The dashboard view can be accessed, for example, by an account user on a computer or another mobile device.FIG. 37 provides another software interface view of a dashboard. -
FIG. 10B shows an explanation of some of the icons inFIG. 10A . Icons are provided showing data connection 1030 (when the icon is darker or more prominently displayed, a data connection is available, as indicated by the up and down arrows for uploading and downloading), GPS data 1032 (when the icon is darker or more prominently displayed, GPS data is available for the device), curfew 1034 (when the icon is darker or more prominently displayed, it can indicate that a curfew lockout has or has not been bypassed), and device status 1036 (when the icon is darker or more prominently displayed, it can indicate that device status has or has not changed). -
FIG. 11 shows a dashboard view that emphasizes and explains notification functionality of an example system. In the notification bar at the top right, a notifications call-outwindow 1110 can be displayed after clicking thenotification icon 112. A “view all notifications” hyperlink can be selected to show a “notifications” screen. Other icons in the notification bar at the top include agear 1114 that can allow a user to access a settings interactive interface. -
FIGS. 11-22 and 37-53 (among others) illustrate how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views. For example, the dashboard views ofFIG. 11 can show locations of two different children on the same map at the same time in the same view. The embodiment ofFIG. 11 also aggregates data relating to both of the children and their smart phones—the status of both Billy's phone and Jenny's phone is shown in the same view. The notifications listing also assembles events and messages from both children and integrates them chronologically. Thus, this graphical display allows efficient review by a user of a parent portal. The dashboard assembles data in a highly organized and efficient manner. -
FIG. 12 shows a view of an example notifications screen that can provide a continuously scrolling list, where the most recent notifications can be included most prominently (for example, on top of the list or otherwise emphasized). These notifications can be accessed from various other interface views in the system—see, e.g.,FIGS. 37, 39, and 41 that show “alerts,” which can be notifications—many of which can present a shorter list of only the latest or most relevant notifications, but with the ability to click through to this more extensive list. Another view of a notifications page having similar functionality is provided asFIG. 42 . -
FIG. 13 shows a view of a device status screen that may present a more detailed or dedicated view that is related to or accessible from thedevice status portion 1006 of the dashboard described inFIG. 10A . In this example, it is Billy's device status that is displayed, and the table indicates that Billy's device (auser system 130 in the context ofFIG. 1 ) has WebSafety software installed (which can fill the role of asafety system plugin 132 in the context ofFIG. 1 ), the device Global Positioning System (GPS) is on, the data connection (for example, through a cellular phone network) is on, and that the device itself is powered on. Other device status information views are provided as portions ofFIGS. 41 and 51 . - In an example, a
safety system 110 can identify and report on device status (e.g., installation of a safety application or plugin, GPS status, data connection, and/or whether auser system 130 is powered on) using the technical protocols described herein. In one embodiment, thesafety system 110 can call on operating system modules such as content providers (for Android OS) to access device status. In some embodiments, device status monitoring may also be implemented as described herein with respect to Device Status Agent. -
FIG. 14 shows a view of an “Apps” screen, including “Apps of Concern”—for example, mobile device applications that can potentially be used in cyberbullying activities. In some embodiments, a system can block, delete, or otherwise deter use or functionality of one or more of such applications. Application usage can be tracked and reported as shown. For example, an “Apps of Concern” portion can list software applications that have been identified as presenting potential dangers to children, their installation dates, and when they were uninstalled, if applicable. Columns in the tables can be sorted by each column by clicking the header, then the arrow. Uninstalled applications can be shown in a lighter font color, or “grayed out.” Acalendar 1412 showing application usage organized by date in a table 1414 can initially show the current day as a default view. Other views related to software applications (including control panels from which a user can update controls, filters, and gather information) are provided as portions ofFIGS. 43, 44, 45 and 48 .FIG. 15 shows a Filters view of a set of SMS screens. In some embodiments, a system can identify cyberbullying based on frequency of received communications. A system can search for or filter words that may be employed by users of short message service functionality. This view shows asearch filter list 1512, where search results can be shown automatically as a user of this view types in a search term. The system can also automatically block senders that may use more than a given number of filtered words, as shown at 1516. Users can also be unblocked, as indicated by the hyperlinks of the words “Unblock” at 1520. Word usage frequency can be tracked, as shown under the heading “Usage Top 20” at 1526. -
FIG. 16 shows an Activity view of a set of SMS screens. This demonstrates how information can be grouped and collected for efficient viewing, through interaction of a user with controls made available through a user interface. The “filters”portion 1530 of the user interface illustrated in bothFIGS. 15 and 16 can be selected by a user to access the controls and information visible inFIG. 15 . Immediately adjacent to thefilters portion 1530 is an “activity”portion 1534 of the same toolbar. Selecting theactivity portion 1534 can control the view to provide a running timeline view of messages sent and received, as shown. A control can be provided (shown here as check-box 1620) allowing a user to decide, upon review, that a particular person should be blocked and immediately and conveniently block that person from conversing with their child through texts.FIGS. 15 and 16 illustrate how a series of graphical controls and selections can be used to organize and allow a user to access information. Thus, a hierarchy of selections can include selection of an “SMS” control in a first control area (the left-hand bar), selection of a particular child (here, Billy) in a second control area, selection of filters or activity in a third control area, and, inFIG. 16 , selection of a particular interlocutor (here, Jacob) in a fourth control area. All four control areas can be visible simultaneously to allow rapid changes between the information visible and the controls accessible for selection. Additional control areas can be included (and indeed, various selectable portions of the screens shown inFIGS. 15 and 16 can be characterized as additional control areas, including the tool bar visible across the top of the views shown here. - Messages with filtered words can be highlighted (e.g., using a different text or background color such as red) or otherwise identified or distinguished in order to draw the attention of a user. A “filtered word” can be a word that appears in a black list or a block list, and can be a vulgarity or epithet, for example. Thus, “filtering” can refer to searching for forbidden or problem words, or it can refer to allowing some words to pass while blocking others. This selection can also reveal further selectable controls specific to various potential SMS interlocutors with whom a child may converse through texts, as shown in the sidebar listing names. Various SMS senders can be listed (as shown at 1612 with the example list of names: Jacob, Sophia, Mason, Emma, Ethan, and Isabella). At 1616, search results may be shown (this may be accomplished on the fly as search terms are entered without a user needing to refresh a page). Clicking on the hyperlinked text “go to conversation” can display a message in context in the center of the window. Other views related to SMS filtering that may provide similar functionality to that described with respect to
FIGS. 15 and 16 are provided asFIGS. 46 and 47 .FIG. 17 shows a WWW (or world-wide web) screen, indicating that blocking mode can have a blacklist and a whitelist for URLs to block or allow. An “X” can indicate a website is blocked, and a check-mark can indicate that a website is allowed. As with various other views illustrated and discussed herein, various portions of this view are “active” in the sense that a user can interact with them to select options, activate functions, and generally control and interact with thesafety system 110. Thus, the blacklist and whitelist modes can be selected by the blockingmode user controls 1712, and particular URLs can be blocked or allowed (or flagged or allowed) by a user toggling between these options using the URL-specific user controls 1716. A user can customize a blacklist or whitelist by typing a URL into thecustomization field 1720, which invites input using the faint text “Add site.” Further actions are indicated in theactive area 1724, using an eye icon (which can allow a parent to link directly to a browser view of the URL in question to research whether it should be included), a pencil icon (which can allow a parent to edit the field listing the URL or to add notes annotating when or why a site was included, for example), and a trash can icon (which can allow a URL to be removed from the list, for example). Thus, a user can effectively control the filters and the functionality of thesafety system 110 in order to customize it for the needs of their family. Other views related to web access that may provide similar functionality to that described with respect toFIG. 17 is provided asFIG. 48 .FIG. 18 shows a location screen indicating at thelocation box 1812 example user Billy's location on a map, along with the date and time that the location was recorded. As indicated in theedit device menu 1820, different colors can be used for different devices and users being tracked. Here, Billy's device is shown on the map with light blue icons. An eye icon can be selected to show or hide a device on the map, or to otherwise view related information, re-orient the map, or otherwise draw attention to or make more accessible some aspect of Billy's location data. A frequency can be selected for how often to search for or display device locations, as indicated with the illustratededit device menu 1820. A location history can also be provided and accessed from this location screen, for example by selecting a data from thecalendar 1824. Location information can be graphically or otherwise juxtaposed to aid a parent in recognizing patterns and/or deviations therefrom. This location screen or a similar interactive view can be used to establish geographical boundaries and/or other geofencing functionality. For example, a circle can be dynamically drawn or placed on the map indicating an allowed radius of unreported movement within which the phone (or asafety system plugin 132 of a user system 130) need not alert a parent. Other shapes can be drawn, which can relate to school campus boundaries, allowed neighborhoods, prohibited locations, no-go zones, etc. Results of violating borders can be reporting, diminishing smart phone functionality (e.g., limiting to only emergency calls and abduction tracking, etc.) Other views related to location tracking that may provide similar functionality to that described with respect toFIG. 18 are provided as one or more portions ofFIGS. 33, 37, 39, 41, and 49 . -
FIG. 19 shows a curfew screen indicating Billy's curfews for various days of the week, includingstart times 1914, stoptimes 1915, and checkboxes 1916 for when to apply the curfew, for example. The illustrated interface is interactive and provides an array of customizable controls and active fields that can be adjusted and edited by a user. For example, an active field orhyperlink 1912 can be used for adding additional time restrictions. Check-boxes 1916 can be selected for which days of the week the curfew time restrictions should be applied. A garbage-can icon 1918 can be used for deleting a given restriction, which may result in thedelete menu 1920; this menu may include a confirmation (for example, typing the word “delete” as indicated, providing some other control input such as a password, etc.). A pencil andpaper icon 1922 can be selected to edit restrictions, which may result in theedit menu 1924, as shown, with its additional interactive fields and controls. Thedelete menu 1920 and theedit menu 1924 can be typically not shown, except when one of theicons FIG. 19 are provided as one or more portions ofFIGS. 50A and 50B . -
FIG. 20 shows anaccount information screen 2010. In the context of asafety system 110, this screen can be interactive and represent a way of interacting with an account management module 120 (seeFIG. 1 ) through auser interface module 116. An initial view of anaccount information screen 2010 can include information provided during an account setup process (see, e.g.,FIGS. 7 and 8 ), but thefields 2020 can allow a user to update the information and save new information relating to billing and so forth. -
FIG. 21 shows a notification preferences screen 2110. An account user can indicate the email address or addresses to be used for notifications as indicated at 2120; multiple emails can be listed. Other notification approaches can also or alternatively be used, including texts, phone calls, audible notifications, some combination of these options, etc. Alerts can be sent to an account user when: an SMS filtered word is sent or received (for example, via SMS or multimedia (MM)), or if the user contacts a selected (“filtered”) number; a user tries to access a filtered URL; a user closes the curfew screen; a GPS functionality of a device is disabled or re-enabled; a data connection to the device is lost; and/or account changes are made. Other notifications can also be provided. The selections made when initially setting up a child's device (as explained herein with respect toFIG. 9 , for example) can be initially displayed here, but interactive controls can be provided allowing a user to update or otherwise change the settings and configuration. Another view related to notification preferences and controls that may provide similar functionality to that described with respect toFIG. 21 is provided as one or more portions ofFIGS. 34 and 53 . -
FIG. 22 shows adevices screen 2210 listing the devices being tracked in an example account. Billy has an HTC One, and Jenny has a Samsung Galaxy S4. Installation of software (which can play the role of asafety system plugin 132 ofFIG. 1 , for example, “WebSafety,” available from WebSafety, Inc. of Newport Beach, Calif. as of October 2014 and its successors) and logging in to the account from that software on auser system 130 which can be the devices listed above can cause a device to automatically be visible in the list. Devices' association with user names (for example, Billy is associated with HTC One) can be edited, and devices can be deleted from the listing as shown. For example, a garbage-can icon 2218 can be used for deleting a given device, which may result in thedelete device menu 2220; this menu may include a confirmation (for example, typing the word “delete” as indicated, providing some other control input such as a password, etc.). A pencil andpaper icon 2222 can be selected to edit a device, which may result in theedit device menu 2224, as shown, with its additional interactive fields and controls. Thedelete device menu 2220 and theedit device menu 2224 can be typically not shown, except when one of theicons 2218 or 2222 is selected. Another view related to devices to track and monitor and controls that may provide similar functionality to that described with respect toFIG. 22 is provided as one or more portions ofFIG. 51 . -
FIG. 23 shows a log in screen that can be automatically shown after a time-out period has elapsed, to enhance security for the account user. This log in screen can be displayed to a user of auser interface module 116 of asafety system 110, for example, and it can be especially useful when thesystem 110 is accessed from a web browser over the internet, for example. Another view related to account security and controls that may provide similar functionality to that described with respect toFIG. 23 is provided as one or more portions ofFIGS. 3A, 3B, 3C, 3F, 5, 31 and 32 . -
FIG. 24 shows anexample user system 130 including a notification 2402 (emphasized) received from thesafety system 110 over anetwork 102. Parents can install a software application (e.g., asafety system plugin 132 ofFIG. 1 , for example, the “WebSafety” mobile app, available from WebSafety, Inc. of Newport Beach, Calif. as of October 2014 and its successors) on their smart phones to provide features of thesafety system 110. Thesafety system 110 can provide alerts or notifications to the parent. In some embodiments, thesafety system 110 can interrupt the operating system of theuser system 130 or any tasks running on the operating systems of theuser system 130 to provide themessage 2402. - In some embodiments, the
safety system 110 need not be installed on theuser system 130 of the parents. Instead, thesafety system 110 can sendnotifications 2402 via SMS or data messaging to any e-mail or other account. Parents may be monitoring more than one of their children. Thus, thenotification 2402 can include the identity of the child concerning the alert. In some embodiments, thenotification 2402 can also include a full quotation or an excerpt of the content at issue. The content at issue can be a text message, a multimedia message, a URL, etc. For messages, the notification may also identify the sender or the recipient of the message. Thesafety system 110 can determine the threat level of the content to the child before interrupting the parent's user system. As shown inFIG. 24 , the threat level is very high as the content of the message relates to a possible fight after school. The threat level can be determined based on keyword and/or phrase matching or image recognition. - Parenting is not easy. Parents are often at a loss to identify and resolve some of the issues that they encounter with their children. The
safety system 110 includes technical solutions to assist parents on at least two aspects of parenting—identification of a problem and presenting solutions (or at least identifying resources for learning and finding help leading to potential solutions). For example, parents might find through thesafety system 110 that their children are being bullied or harassed, or that they might be considering drinking or trying drugs. This can represent identification of a problem, and it can occur through parental access to the texts, images, applications, or websites to which a child is exposed. -
FIGS. 25 to 30 illustrate community and support features that can be provided by thesafety system 110. This can represent resources for finding help or understanding the problem, and it can save time by automatically using the same underlying data or information that gave rise to the parental concern to locate relevant articles, content, or other online resources, and drawing a parent's attention to those items. For instance, relevant instructional or informational content can be provided and access thereto (both passive and active) can be improved through the systems described. A community for users to interact with a software provider and each other can be accessed, for example, through acommunity portal 2500 that may be an example of a user interface module 115. Thus, a WebSafety blog (accessible through a blog access button 2502) can include relevant content for users of a WebSafety software system. Experts in the community can keep users up to date, informing users of the best ways to protect their children. A WebSafety forum (accessible through a forum access button 2504) can facilitate dialogues between parents about the best ways to protect their children. A WebSafety customer support portal (accessible through a support access button 2506) can also be provided as part of this community, and such customer support can be technical and/or content-related. Support may include automatically notifying parents through their computing devices of new applications downloaded by their children and include a description of the new application. Thesafety system 110 can obtain description of new applications from adata repository 150 of thesafety system 110. Thesafety system 110 can update the data repository based on information automatically retrieved from application stores, user comments regarding the application, etc. - Technical features of the described system can allow better and faster access to relevant background information on the topics raised by the monitoring and notification features of the described system. For example, automatic keyword searching or automatic alerts based on use of any of the particular features described above can give rise to content suggestions—for example, links to relevant blog posts, support tickets, or forum discussions. Such automatic alerts can sort by relevance, date (putting most recent first), by user rating (putting those most used or most highly approved or most-viewed first), etc. As discussed above, the
safety system 110 can determine certain keywords or identify content from the images. For example, thesafety system 110 can determine words such as “drink” in messages: “Man, that was a close call at the checkpoint; Told you shouldn't drink and drive.” Other examples are provided inFIGS. 11, 12, 16, 37, 39, 42, 46, and 47 . In some embodiments, thesafety system 110 can also identify from images (for example sent or received via messages, posted on Facebook, or SnapChat, etc.) that the child is holding a can of beer, for example. In another example, thesafety system 110 can automatically identify specific children using image recognition techniques or based on social network tagging. - The
mobile safety monitor 110 can suggest content—for example, relevant articles from social scientists, therapists, medical professionals or others—based on the keyword and image detection. Content may not be unique to a user community for the systems and features described here, and can also be drawn from larger web searches or syndications services. Content can be marked as unique to the user community or as drawn from other sources, and may include links to sources so users can assess credibility. Content can be sorted by reaction or preference from a user community, such that content giving rise to more comments, longer reading times, more forwards, etc. can be featured, de-emphasized, or removed, depending on the type of feedback involved. - The
safety system 110 can store in thedata repository 150 written and audio-visual materials such as articles, books, podcasts, or videos. Thedata repository 150 can also store links to professionals who may be able to assist parents in identifying solutions. Thesafety system 110 can suggest content and/or provide access to professionals based on identification of one or more issues discussed above. As an example, besides the notification of the “drink” message, thesafety system 110 can include links to articles dealing with alcohol and teenagers. Thesafety system 110 can also include link to one or more professionals that parents can directly interact with via text, audio, and/or visual communications. Accordingly, thesafety system 110 can connect parents with the resources they need to help their children. - The
safety system 110 can also analyze a child's usage pattern of their user system to determine community content. For example, thesafety system 110 can collect data on messaging use, application use, social networking use, picture capturing usage by the child, etc. Based on this gathered data, thesafety system 110 can determine whether a particular behavior with respect to using a computing device is deviating from the norm. Accordingly, thesafety system 110 can suggest to the parents, via one of the user interfaces shown herein, community content that can assist parents. Further, thesafety system 110 can be used to implement the solutions identified in the content directly such as setting certain restrictions or curfew on the use of one or more computing devices. Based in part on the drinking and driving text, for example, thesafety system 110 can provide parents with an option to disableuser system 130 while the child is driving (that is when theuser system 130 is moving at a speed over a threshold). Thesafety system 110 can also automatically provide other restriction settings as described below with respect toFIGS. 48 and 50 based on the monitoring described herein. - In an example, a
safety system 110 can analyze a child's usage pattern of their user system to determine content recommendations, using one or more of the following technical protocols. For example, thesafety system 110 can automatically implement or recommend curfew protocols based on child's usage patterns. For example, if the child is using their phone while in school or driving, thesafety system 110 can automatically block the texting functionality of the phone. Further, thesafety system 110 can receive input from parents through a survey or questionnaire to automatically recommend phone usage settings for their children. -
FIG. 26 illustratesuser interfaces 2600A and 2600B that enable users of the systems described herein to ask technical questions about the software including some or all modules of thesafety system 110. These interfaces may be used as a WebSafety customer support portal (that may be accessible through a support access button 2506), and such customer support can be technical and/or content-related. -
FIGS. 27-29 illustrate example blog user interfaces. Aninterface 2700 generated by thesafety system 110 can provide some of the community features discussed above. Thisinterface 2700 may be used as a WebSafety blog (accessible through a blog access button 2502). Experts in the community can keep users up to date, informing users of the best ways to protect their children. Thesafety system 110 can customize theblog user interface 2700 based on issues determined automatically through monitoring of their children. As discussed above, thesafety system 110 can select content fromdata repository 150 or external resources for presentation to the parents based on monitoring of children. Thecontent 2704 may also be organized according to ratings or reviews of the particle article or media content. Theblogs user interface 2700 can also include ablog roll 2706 listing some professionals who may have relevant specialty in accordance with the parent's need as automatically determined by thesafety system 110. Theblogs user interface 2700 can also include articles orother media items 2702 that may be rated highly by the community. The community can include other parents using the systems described herein. In some embodiments, the community can also include professionals such as psychologists, doctors, or life coaches.FIG. 28 shows a continuation of theuser interface 2700 including additional articles. A user can select one of the links corresponding to an article or a blog that can direct them to user interface 2900 (as shown inFIG. 29 ) with a more detailed view of the selected article. -
FIG. 30 illustrates anexample user interface 3000 showing a more detailed overview of a professional listed in theblog roll 2706 ofFIG. 27 . Theuser interface 3000 shows writings and other resources related to the particular professional selected by the user from theblog roll 2706. As discussed above, thesafety system 110 can identify professionals based on monitoring children'suser systems 130. - Further to the description provided herein with respect to
FIG. 9 , for example,FIGS. 31 and 32 illustrate example embodiments of a process for enabling systems described herein on one or more user systems. Users can install a software application including some or all the modules of thesafety system 110 on theiruser systems 130. Thesafety system 110 can require email or other forms of validation to activate the software. Thesafety system 110 can provide parents with options to select whether the computing device with the software installed is to be used by a child or parent. When the computing device is selected as parent, thesafety system 110 can send notifications and/or alerts regarding their children to that particular computing device. For example,safety system 110 can interrupt the operations on theuser system 130 of the parent to display alerts. When a particular computing device is enabled in the parent mode, that computing device can be used to control operations of other computing devices such as those belonging to a parent's children. For example, parents can use thesafety system 110 on theiruser system 130 to block some or all functionalities (for example texting, Facebook, etc.) in the children'suser system 130. - In
FIG. 32 , the example process shows registration of a software application including some or all of the modules of thesafety system 110 on auser system 130 for a child. After installation, parents can select that their child will be using theuser system 130. Once the user system is selected to operate in child mode, thesafety system 110 can monitor that user system and control its operations as described herein. Setting up a child device can include filling out a profile (e.g., with name, date of birth, and e-mail) for that child. An example profile interface page for a child is provided asFIG. 52 . - In an example, a
safety system 110 can provide a single application software download that can function in either child mode or parent mode, depending on a selection in a process as indicated in FIGURES, 3C, 31 and 32, using one or more of the following technical protocols. -
FIG. 33 illustrates an embodiment of amaps user interface 3300 generated by thesafety system 110 to showlocation information 3304 of a child's user system (e.g.,user system 130 ofFIG. 1 ) on amap 3302. Other views related to map user interfaces that may provide similar functionality to that described with respect toFIG. 33 are provided as at least a portion ofFIGS. 10A, 10B, 18, 33, 37, 38, 41, and 49 . Themap 3302 can also include additional markers (not shown) for location of school, home, one or more friends' houses, etc. Acalendar control 3312 can be integrated into or accessible from theinterface 3300. Thiscalendar control 3312 can be used to select the day for which location data to display. More granularity can be provided and movements can be plotted by minute, hour, and/or day and graphically superimposed on a map view. In some embodiments, location user interfaces may be generated as described herein with respect to Location Agent. - In some embodiments, the
safety system 110 can track location data received from the user system of the child over time and identify patterns. For example, thesafety system 110 can automatically send an alert when the location of the child's user system has deviated from the norm (for example, more than 100 yards, 500 yards, 1 mile, 5 miles, 25 miles, etc. away from the school during the time when the child should be in school, more than a threshold distance (e.g., 500 yards, 5 miles, 20 miles, etc.) away from home any time of the day). Thesafety system 110 can also determine if the child has visited a new location or is visiting a particular location with high frequency. Thesafety system 110 can store locations and location history indata repository 140. Accordingly, parents can use theuser interface 3300 to determine where their child's device was at a particular day and time by using thetime bar 3306. - The length of time spent in a geographical location can also be tracked. If a child stays at a friend's house much longer than expected, an alert can be generated. Thus, the calendar and mapping features described herein can be combined to create a hybrid between the geofence features and the curfew or other scheduling features. Thus, a child's smart phone can include software that automatically notifies a parent through a parent portal when a child deviates slightly or drastically from a planned schedule. Dangerous or unwanted neighborhoods can be identified geographically and parents alerted when a child ventures within a given distance of such locations. The system can track or otherwise receive data from other interactive applications that provide updates relating to neighborhoods that may become more or less dangerous over time, and incorporate this data into automatic or suggested alert functions.
- Location information can also be integrated with other functionality of the system. For example, certain applications may be allowed in some locations, and not in others. Thus, a full curfew-based lock-down of the phone may not occur while Billy is attending his piano lesson at (Miss Jones' house at the corner of first and elm, for example), but certain restrictions may apply, disabling all installed gaming applications but not the phone, camera, and recording functions, for example. Thus, the system can be used to help improve the chances that a child will not only be in the right place at the right time, but also will not be engaged in unwanted activities for that place and time. Although the calendar feature illustrated in
FIG. 33 only shows days, some embodiments can include a calendar with a more granular break-down of hours and minutes, for example. Thus, an interface similar to the ones presented herein with respect to curfew controls (see, e.g.,FIGS. 19, 50A and 50B ) can also be used in conjunction with geographic or other location-related controls. -
FIG. 34 illustrates an embodiment of a notificationadministration user interface 3400 generated by thesafety system 110. This interface can include functionality similar to that described herein with respect toFIGS. 21 and 53 , for example. Parents can use theadministration user interface 3400 to select alerts and notification settings for activity relating to their children. For example, parents can input a correspondence address 3402 (for example email), which can be used by thesafety system 110 to send alerts and/or notifications. In addition, parents can select notifications to be pushed directly on to theparent user systems 130 that were enabled with thesafety system 110 as discussed above. Notifications may be pushed or pulled via text messages or through an application software installed on parent's user systems. Accordingly, thesafety system 110 can interrupt a parent's user system when an alert or notification is generated. Furthermore, parents can select which alerts that they would like to receive. For instance, thesafety system 110 can generate alerts based at least on the parent's selection of one or more of the following:text messages 3408,internet usage 3410,curfew 3412,GPS 3414,data connection 3416, anduser system applications 3418, etc. Thesafety system 110 can also generate alerts based on detected threat level as discussed above. -
FIG. 34 also shows an addchild user control 3430 that can be selected to add an additional child to the tracking and safety system, and an addparent user control 3440. As with other controls illustrated herein, these controls can have hyperlink functionality that immediately switches a user's view to a dialogue that prompts a user to input the information needed and to perform any other steps (such as installing software on a child's mobile device) relevant to the indicated function. -
FIG. 35A illustrates anexample user interface 3510 for activating the safety system on the computing device. For example, users can activate software including components of thesafety system 110 using theactive link 3516. In some embodiments, thesafety system 110 can include one or more authentication mechanisms for enabling and disabling some or all of the features of thesafety system 110 on a user system. Parents can usepassword authentication 3512 or fingerprint or any other biometric authentication (not shown) to activate the software on the child'suser system 130. Parents can also enable or disable, remotely over a network, some or all of the features of thesafety system 110 on their child's user system. Accordingly, in some embodiments, thesafety system 110 can require authentication from parents on theiruser system 130 to ensure safety and privacy protection of children. In the event that a parent'suser system 130 is lost or stolen, the authentication mechanism provided by thesafety system 110 can protect privacy and safety of children. Parents may also be able to remotely disable theirown user system 130 which was lost or stolen using thesafety system 110. In some embodiments, device status user interfaces may be generated as described herein with respect to Device Status Agent. -
FIG. 35B illustrates anexample user interface 3520 generated by thesafety system 110 indicating status of thesafety system 110 on aparticular user system 130. The status can indicate that the device is currently providing notifications and/or monitored. To exit or disablesafety system 110 on theuser system 130, users can selectactive link 3518 which may promptauthentication mechanism 3514. -
FIG. 36 illustrates anexample user interface 3630 generated by thesafety system 110 indicating that theuser system 130 is in curfew mode. As discussed with respect toFIGS. 4, 19, 50A, and 50B , for example, thesafety system 110 can disable all or some of the functionalities of acomputer device 130 based on customizable curfew settings including curfew time period selected by parents using thesafety system 110. The curfew settings can be stored in thedata repository 140. Thesafety system 110 can access curfew settings over thenetwork 102. Accordingly, thesafety system 110 can automatically enable and disable curfew mode based on the stored curfew settings. In some embodiments, thesafety system 110 enables curfew mode in real time based on a command received from a parent'suser system 130. Thus, parents may use thesafety system 110 to enable curfew mode instead of taking the phone away from the children. - In some embodiments, the
safety system 110 inhibits all of the functionalities of theuser system 130 when curfew mode is activated. In some embodiments, thesafety system 110 can permit voice calls to a preselected group of individuals including emergencynumbers using link 3632 in curfew mode. Thesafety system 110 can prevent bypassing thecurfew screen 3630 by using authentication processes described above. In some embodiments, thesafety system 110 can block features of the user system by accessing the boot module of the operating system running on theuser system 130. Thesafety system 110 may also generate notifications when a user (for example child) attempts to bypass thecurfew screen 3630. Thesafety system 110 can transmit the notifications to parent'suser system 130. - In some embodiments, the
safety system 110 can automatically enable curfew mode when the child is driving. Thesafety system 110 can determine the speed at which theuser system 130 is moving and enable curfew mode when the speed exceeds a threshold. The threshold can be 25 mph. -
FIG. 37 illustrates an embodiment of adashboard user interface 3700 generated by thesafety system 110. Thisdashboard interface 3700 can include functionality similar to, in addition to, or as alternative to embodiments described herein with respect toFIGS. 10A, and 11, 39, and 41 , for example. In some embodiments, thesafety system 110 can aggregate monitoring data from multiple sources in one place—a dashboard user interface such as theinterface 3700. Thus, parents can efficiently review data regarding their children's smartphone usage, including messages third parties send to their children, by accessing and viewing thedashboard user interface 3700. Thesafety system 110 can visually sort data in thedashboard user interface 3700 based on one or more criteria. For example, thesafety system 110 can display notifications according to atimeline 3701 as illustrated inFIG. 37 . Thesafety system 110 can also highlight relevant portions (for example words like “drunk” or “pregnant”) of the notifications. In some embodiments, thesafety system 110 can summarize each day's notifications in analert summary bar 3730. Thealert summary bar 3730 may include an indication of how many recent notifications have been generated related to one or more of the following categories, with a number displayed in association with icons representing the source and area of the alerts as follows: application software 3732,SMS 3734, internet (www) 3736,map 3738, andcurfew 3740. Many of the views and interfaces illustrated herewith show numbers representing alerts; it can be helpful to set off the number against a visually contrasting background to make it more likely to be noticed and visible to a user. - The
timeline 3701 ofFIG. 37 is particularly data rich, because it integrates information from various aspects of asafety system 110. It uses icons at the left to identify the source of the various alerts, while still sorting them chronologically. The icons include a clock, designating a curfew action, stacked stylized conversation bubbles to designate an alert sourced to a text message, a stylized grid indicating a new potentially harmful software application was installed, and a stylized globe showing a website was visited. The icons can be selectable and immediately transform the view visible to a user to a more detailed summary of the relevant aspect of thesafety system 110. The timeline can continuously or periodically refresh, allowing the newest alerts and information to remain in the view most immediately available to the user, but allowing a user to scroll down for a more complete history, with downward scrolling taking the user farther and farther back through a recorded history of previous alerts and other information. A similar chronological organization can be presented in an image section such as thephotos summary 3760. In some embodiments, one or more of theportions - The
safety system 110 can also generate alocation status 3742 of the child and include it in thedashboard interface 3700. For instance, thedashboard interface 3700 can include a map with alocation status 3742 of the child's user system. In some embodiment, parents may use thesafety system 110 to activate the GPS module in the child's user system remotely to get a better location of the child's user system. Thesafety system 110 can monitor a status of the child'suser system 130, including status of communications module of thedevice 130, as indicated in thedevice status portion 3750 of thedashboard interface 3700. The communications module of the device can include data connection, GPS, or NFC. Thesafety system 110 can poll thedevice 130 for status of its modules. In some embodiments, a module of thesafety system 110 resident on the child's user system 130 (e.g., a plugin 132) can monitor the status of theuser system 130 by polling the operating system of theuser system 130 or by directly accessing particular hardware or software modules of theuser system 130. Thesafety system 110 can include thestatus 3750 of the child's user system in thedashboard user interface 3700. - The
dashboard user interface 3700 generated by thesafety system 110 can also include aphotos summary 3760 related to a child. As discussed above, the safety system can mine a child's user system for photos taken, sent or received via the child'suser system 130. In some embodiments, thesafety system 110 can intercept the photos and/or videos taken from the memory of theuser system 130 before they are deleted by applications like Snapchat or by users of the user system. Thesafety system 110 can also mine through social networking data repositories to retrieve pictures and/or videos related to the child. Thesafety system 110 can use image recognition or use a child's password to obtain the photos and videos from the child's account. In some embodiments, the corresponding comments relating to the images are also retrieved by thesafety system 110. Selecting thephotos summary 3760 can change a view focusing on the photos that may be similar toFIG. 40 , for example. Comments and other information regarding the photos may be available when the photo is selected in that more focused view. Thesafety system 110 can group photos retrieved from various sources described above in thephoto summary section 3760. In some embodiments, the photos may grouped by relevance to child's safety. For example, thesafety system 110 may selective display photos that may seem lewd, or is associated with a troublesome comment, or includes pictures of alcohol, etc. The photos may also be arranged in chronological order, arranged by source, etc. - The
dashboard user interface 3700 generated by thesafety system 110 can include acontacts summary bar 3720 that can illustrate a group of people who communicate with a user of auser system 130. For instance, thesafety system 110 can monitor communications from theuser system 130 and via social networking platforms as discussed herein. Based on the monitoring, thesafety system 110 can determine a group of people that a child communicates with most frequently using various modes of communications. Thesafety system 110 can display this group of people with high communication frequency in thecontacts summary bar 3720 as illustrated inFIG. 37 . Thesafety system 110 can automatically remove parents or family members from this group of people, in some embodiments. Thesafety system 110 can retrieve pictures of people in that group for display in thecontact summary bar 3720. The pictures may be retrieved from a person's social networking or phone profile (for example, using a designated contact photo). Thesafety system 110 may also calculate statistics (for example percentage communication) for the group of people as discussed more in detail with respect toFIG. 41 . - Parents can also navigate between monitoring multiple children. For example, the
safety system 110 can store monitored data for each of the children using respective computer devices indata repository 140. Based on the stored data, thesafety system 110 can generate thedashboard user interface 3700. In some embodiments, thesafety system 110 can distinguish notifications based on children. For example, parents can select alink 3702 corresponding to a first child orlinks safety system 110 can indicatenew notifications 3708 by superimposing numbers on icons representing particular children as illustrated inFIG. 37 . Thenotification icon 3708 can indicate a number of new notifications since the dashboard was previously viewed, new notifications, in the last day, new notifications in a preceding amount of time designated by (and adjustable by) the user, etc. - Parents can share information from a dashboard view (or any of the disclosed views) with each other. For example, a screen shot from the parent portal can be automatically e-mailed to a spouse or saved for later reference or proof. When time, place, and activity tracking functions are combined as discussed herein, each child can have a single status indicator showing how the child's current location and activities (for example, phone usage) may or may not currently comply with a comprehensive schedule created by the parent or child, for example. Periods of non-compliance can be tracked and recorded. Children can compete with each other to achieve higher levels of schedule compliance and be rewarded with later curfews or other differences in allowed phone usage. The disclosed systems can automatically arrange and administer such beneficial competition because it tracks usage, timing, and location, as well as controls smart-phone lock-out and other curfew options. Thus, obedience and other desired behavior can be incentivized automatically using the system.
- The
safety system 110 can also include asidebar 3770 to access other user interfaces generated by thesafety system 110 as discussed with respect toFIG. 10A , for example. In some embodiments, thesafety system 110 can generate asidebar 3770 including anapplication summary link 3772,SMS summary link 3774;internet summary link 3776;location summary link 3778;curfew summary link 3780;picture summary link 3782; and communityfeatures summary link 3784. Parents can select one of the links in thesidebar 3770 to access a user interface corresponding to the selected link. -
FIG. 37 is one of various figures illustrating how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views. For example, the dashboard view ofFIG. 37 can aggregate highly complex and data-rich information for various children (here, Billy, Jenny, and Johnny), and rapidly switch between views for each of the children. A timeline, a map, list of interlocutors, a device status, and a mosaic of images, all viewable at once on the same screen, and almost all of which actually represent live hyperlinks that lead to related webpages, content, and context. Thus, this graphical display allows efficient review and further access and information by a user of a parent portal. The dashboard assembles data in a highly organized and efficient manner, but also acts as a dashboard organizing active control functionality. -
FIG. 38 illustrates an embodiment of a process for generating or refreshing adashboard user interface 3700. As discussed herein, thesafety system 110 can access and extract data from or about more than one of the user system's software application and/or hardware modules. The software applications can include a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application. Hardware modules can include location module or communications module or battery. In some embodiments, the extracted data can be sent to an analysis server. The analysis server can identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications. The generated results from the analysis can be sent to a parent portal for display such as that ofFIG. 37 . -
FIG. 39 illustrates another embodiment of adashboard user interface 3900 generated by thesafety system 110. In the illustrated embodiment, the notifications are limited to Facebook notifications for a particular child (“Billy”). Thesafety system 110 can enable parents to review notifications corresponding to a particular application software or social networking website. For example, parents can select a particular application from a list of applications as described more in detail with respect toFIGS. 14, and 43-45 . Using Facebook as an example, thesafety system 110 can generate thedashboard user interface 3900 including Facebook related notifications. Thesafety system 110 can use aggregated Facebook data for a particular child stored indata repository 140. The icons at the left of the timeline view 3910 (e.g., Facebook icon 3912) can indicate the source of the information displayed. As with other timeline views discussed herein, text can be provided indicating how long it has been since the noted event occurred. A comment can be shown in a conversation bubble, and a photo or other identifier for a person making the comment can also be shown. As discussed herein, thesafety system 110 can retrieve information from Facebook through an authentication handshake with Facebook servers and/or API. -
FIG. 40 illustrates another embodiment of a photo/video summary user interface 4000 that can be generated by asafety system 110. In the illustrated embodiment, only pictures corresponding to Facebook are illustrated (as indicated here by the Facebook icon associated with each photo), but thesafety system 110 can also include photos taken or downloaded on a child's computing devices or received via messaging, or from other social networking sources. Accordingly, parents can quickly browse pictures related to their child in one place. As discussed above, the photos can be organized according to threat relevance, or they can be organized chronologically, sortable by source, etc. -
FIG. 41 illustrates an exampledashboard user interface 3700 generated by thesafety system 110 that includes acontacts summary bar 4102 that can display statistics directly on the user interface. The illustrated view of thecontacts summary bar 4102 can be selected or otherwise controlled by a user such that the view toggles between that shown here and the more compact view illustrated for thecontacts summary bar 3720 inFIG. 37 . In the view ofFIG. 41 , the bar is expanded to show bar graphs indicating the relative frequency of communication with a set of people. This expansion and reduction—toggling between the versions showing inFIGS. 37 and 41 —can be accomplished with a specific button or control. For example, the icon 3716 (which includes a stylized bar graph icon) can be selected to change this view. An “X” in the top right corner of thecontacts summary bar 4102 can be used to close the expanded view, for example. In some embodiments (and as illustrated in this example), the bars in a bar chart can be capped with a photographic representation of these interlocutors, or with placeholders for such photographs. As discussed above with respect toFIG. 37 , thecontacts summary bar 4102 can include a group of people in communication with a user of thecomputing device 130. Thesafety system 110 can automatically generate graphs and sort this group of people based on the amount of interaction (calculated by number of communications, number and length of communications, or using other methods), including messaging via SMS, Snapchat, Facebook, WhatsApp, phone calls, etc. In some embodiments, thesafety system 110 can assign weights to certain types of communication to determine a representative amount of interaction for comparison. For example, a child may send 100 messages per day to a first friend, but may spend half an hour on the phone per day with a second friend. Thesafety system 110 can appropriately weight the messages with the phone time to compare the time spent by the child with the first friend versus the second friend. Accordingly, parents can easily view a snapshot of who their children mostly interact with using their smart phone. In some embodiments, theuser interface 3700 allows a user to select for comparison a subset of communications (for example text messages). Thus, rather than an aggregation of all communications, a visual comparison can be provided indicating with whom a child has the most frequent and/or longest lasting communications by a particular channel—e.g., SMS texts, e-mails, phone calls, etc. Thesafety system 110 can also allow a parent to select a time frame from which to draw the data for the statistical bar graph comparison (e.g., using the “today”button 4112, the “this week”button 4114, or the “all time” button 4116) as illustrated inFIG. 41 . The graphs generated by thesafety system 110 can be illustrated in a wide variety of forms. For example, in the illustrated embodiment, thesafety system 110 generates a bar graph with eachbar 4104 including a face profile of the relevant person (e.g., drawn from one of that person's social networking sites or profiles) and a communication metric (for example 40%, meaning that approximately 40% of Bill's total communications in the relevant time period have been with that person). In some embodiments, the size of the faces can be enlarged proportionally to the number of communications (e.g., as an alternative to including taller bars for the most frequently communicating parties). The examplecontacts summary bars FIG. 41 , aconversation feature 4190 is illustrated as pointing to the photograph of Billy. This causes thecontact summary bar 4102 to resemble a stylized conversation bubble, indicating that Billy is conversing with the people shown. Billy's photo is also set off by a thicker border, providing an example of how a visual display can provide emphasis and draw attention to indicate which of the children's activities are being summarized in the current view. -
FIG. 41 (among others) illustrates how the disclosed systems, apparatus, and methods can automatically extract and assemble data from complex, moving electronic devices and assemble that data in organized and graphically efficient views. -
FIG. 42 includes a notificationsummary user interface 4200 generated by thesafety system 110. The notificationsummary user interface 4200 can include a number of notifications sorted according to child and time, with headings for each day as shown. -
FIGS. 43-45 illustrate embodiments of application summary user interfaces generated by thesafety system 110. For example,FIG. 43 illustrates anapplication usage interface 4300 including a graph 4310 showing usage statistics of application software on a child'suser system 130. Thesafety system 110 can retrieve statistics stored in a data repository (e.g.,user parameters 140 ofFIG. 1 ) based on monitoring as discussed above. In some embodiments, the graph 4310 can include a pie chart as illustrated inFIG. 43 . This pie chart or an alternative display showing application usage can also be included on a dashboard view (in place of or in addition to theportions FIG. 37 , for example). The graph 4310 can also include (or be replaced by) a bar chart or other graphs suitable for displaying percentage usage of different software applications. Thesafety system 110 can monitor application usage based on one or metrics. For instance, thesafety system 110 can monitor usage based on tracking the amount of time a particular application is running, open, and/or visible to a user on the display of the user system. Other metrics can include amount of data used or number of messages sent. In some embodiments, applications running in the background or running while a smartphone is in sleep mode can be not included as “used” during that time period; similarly, use can be defined to require that a child has been either actively viewing or interacting with them to count as being “used.” Thesafety system 110 can also provide atime period selector 4312 for parents to review application usage over a particular time period. Thesafety system 110 can determine an application most frequently used by the child (“Top App” 4328) on theuser system 130 in the relevant time period and include it in the generatedapplication usage interface 4300 as shown. Theusage interface 4300 can also include anapplication usage listing 4320 with a last usedtime 4322 indicating when an application was last accessed. Thesafety system 110 can retrieve this data stored as part of monitoring theuser system 130 in a data repository (e.g.,user parameters 140 ofFIG. 1 ). Thesafety system 110 can also retrieve a storeddescription 4326 of an application from a data repository (e.g.,system parameters 150 ofFIG. 1 ). The storeddescription 4326 may be automatically obtained based on description from other parents or application store. -
FIG. 44 illustrates a current applications interface 4400 generated by thesafety system 110. As discussed above, thesafety system 110 can identify applications of concern installed on a child'suser system 130. In some embodiments, thesafety system 110 polls the operating system of theuser system 130 to identify installed applications. Thesafety system 110 can store the applications in thedata repository 140. When new applications are installed and existing applications are deleted, thesafety system 110 can update the list of applications stored in a data repository (e.g.,user parameters 140 ofFIG. 1 ). Further, thesafety system 110 can also maintain a list of application software, its ratings, and description in a data repository (e.g.,system parameters 150 ofFIG. 1 ). The list can be updated based on community feedback. Using the stored data, thesafety system 110 can generate thecurrent applications interface 4400. In some embodiments, the current applications interface 4400 includes a list of “applications of concern” 4412. Further, thesafety system 110 can also provide adescription 4420 for each of the applications of concern in some embodiments, which may be generally hidden until a particular application or related icon is selected, for example. As illustrated, thesafety system 110 can also sort applications between those of concern and others which are also installed on theuser system 130, but which may not be known for posing potential danger to children. -
FIG. 45 illustrates anapplication installations interface 4500 generated by thesafety system 110. As discussed above, thesafety system 110 can track installation and removal of application software on the child'suser system 130. Further, thesafety system 110 may store the time an application was installed or removed in a data repository (e.g.,user parameters 140 ofFIG. 1 ). Based on this stored data, thesafety system 110 can generate theapplication installations interface 4500 including alisting 4512 of applications installed or removed and the corresponding time that the child took that action. -
FIG. 46 illustrates an embodiment of anSMS activity interface 4600 generated bysafety system 110. This example may provide functionality similar to that discussed with respect toFIG. 16 . As discussed with respect toFIGS. 15 and 16 , for example, thesafety system 110 can monitor and store messaging communications originating from or received at each of the child'suser systems 130. In some embodiments, the analysis module of thesafety system 110 can identify messages of concern as discussed above. Thesafety system 110 can aggregate messages of concern based on the child and the contact person. In the illustratedSMS activity interface 4600, messages from Billy to Jacob are shown as per a user's selection. While all messages related to a contact may be included in theSMS activity interface 4600, thesafety system 110 can sort through the messages to include only messages of concern. Further, words of concerns may be highlighted by thesafety system 110 in the messages. In some embodiments, the safety system can include a blockedindicator 4420 to show whether a particular contact related to the message is blocked. Parents may select a contact for blocking using theindicator 4420. Thesafety system 110 can intercept messages from blocked contacts and may not show the blocked messages to the child until reviewed by parents. In some instances, thesafety system 110 can automatically block messages based on content and display it in theSMS activity interface 4600 for parental review. In some embodiments, thesafety system 110 can automatically block the contact such that messages cannot be received or sent to the contact based on detecting content of concern in messages. Thesafety system 110 can also detect if the number of the blocked contact or a method of communication with the blocked contact has changed. Accordingly, thesafety system 110 can prevent blocked contacts or users from circumventing the system. Thesafety system 110 can track if a message belongs to the same contact previously blocked based on continuity of conversation, the contact's phone ID (for example mail account, MAC address, etc.). - In some embodiments, the
safety system 110 may modify thecontact summary bar 4410 included in theSMS activity interface 4600. For example, thesafety system 110 may organize and sort contacts in thebar 4410 based solely on SMS instead of other modes of communications discussed above with respect toFIG. 37 . Thesafety system 110 can also includesearch toolbar 4430 to enable parents to search through messages communicated via the child'suser system 130. -
FIG. 47A illustrates an SMS filters interface 4700 generated bysafety system 110. This example may provide functionality similar to that discussed with respect toFIG. 15 . Parents can use the SMS filters interface 4700 to manage messaging communications (for example SMS) from their child'suser system 130. As discussed above, thesafety system 110 can auto block certain messages and contacts. In some embodiments, parents can modifyauto block settings SMS filters interface 4700. For example, parents can select a number of words of concern (or filtered words) 4704 before a contact is automatically blocked. Thesafety system 110 can include a list of blockedsenders 4706 in theSMS filters interface 4700.FIG. 47B illustrates another embodiment of an SMS filters interface 4720 generated bysafety system 110. The SMS filtersinterface 4720 can include a searchfilter list control 4722 to review whether a particular word is being monitored or filtered. As discussed, users can add words to the filtered words list stored indata store 140.FIG. 47C shows that, in one embodiment, when a user begins typing a particular word, thesafety system 110 can retrieve words from the filter list similar to the typed word. Accordingly, the user can identify the words in the filter list based on their input. If the word is not in the filtered list, the user can add their inputted word into the filtered list. Thesafety system 110 can store the new word and include it in monitoring past and future communications. -
FIG. 47C illustrates an embodiment of an SMS analytics interface 4730 generated by thesafety system 110. The SMS analytics interface 4730 can generate overall summary based on SMS communications sent and/or received by one ormore user systems 130 belonging to respective children. The SMS analytics interface 4730 can enable parents to visually identify SMS offenders and SMS related issues with respect to their children. For example, thesafety system 110 can identify word usage frequency from the filtered list. In the illustrated embodiment, the top 20 words that are used in SMS communications from the filtered list are shown in alisting 4738. In some embodiments, thelisting 4738 is sorted by usage frequency of words in the filter list. Thelisting 4738 may identify a user associated with the word. For example, thelisting 4738 may identify the user who has received and/or sent the offensive word with the highest frequency compared to other users. Thelisting 4738 may also include an icon identifying the source of the word. For example, the icon can include a symbol or color corresponding to one of the applications, such as Facebook, SMS, etc. In some embodiments, when a particular word is selected from thelist 4738, thesafety system 110 can showadditional details 4740 related to the selected word. A word can be selected based on clicking on it or hovering over it.Additional details 4740 can include a listing of users associated the selected word and the corresponding frequency of usage. In addition to thelisting 4738 anddetails 4740, thesafety system 110 can generate agraphical summary 4732 to visually organize SMS summary. In one embodiment, thegraphical summary 4732 is a pie chart illustrating a distribution of offensive word usage frequency. In the illustrated example, “sucks” is the most frequently used offensive word in the SMS communications, which may include sent and/or received SMS messages. Thesafety system 110 can generateadditional details 4734 when a particular word or a graphic element corresponding to the word is selected. As discussed above, selection may be a function of a click or a touch input or hovering over the area of interest. As shown, theadditional details 4734 can visually show children associated with the selected offensive word. In the illustrated embodiment, thesafety system 110 shows a pictorial representation of Billy, Jenny, and Johnny for being associated with the offensive word “frick.” Thesafety system 110 can show a graphic 4736 when Johnny is selected. The graphic can indicate that Johnny used the offensive word “frick” 5 times. Thesafety system 110 can enable customized analysis of SMS data. For example, in some embodiments, parents may be able to generategraphs 4732 based on selecting one or more of the following factors: sent messages, received messages, one or more children, time period, etc. - In some embodiments, the
safety system 110 can enable parents to define theirown custom rules 4708 for filtering messages. For instance, parents can select certain words (for example “drunk”) or terms and connectors (“drunk” near “driving”). Thesafety system 110 can use these custom rules to filter messages. Thesafety system 110 can also track word usages and include a listing of most used words in alist 4710 as illustrated. Thesafety system 110 can employ image recognition or optical character recognition to prevent contacts from using picture in messages to avoid bypassing filters. -
FIG. 48 illustrates aweb access interface 4800 generated bysafety system 110. This example may provide functionality similar to that discussed with respect toFIG. 17 . Theweb access interface 4800 can provide parents options to control which websites can be accessed on child'suser systems 130. For example, parents can select aflagging mode 4810. Based on the selected flagging mode, thesafety system 110 can block a list of problem websites and/or flag these list of problem websites. Thesafety system 110 can allow parents to input the list of problem websites as illustrated at 4820. In some embodiments, thesafety system 110 can automatically suggest problem websites based on collaborative feedback from users. -
FIG. 49A illustrates an embodiment of alocation user interface 4900 generated by thesafety system 110. The example ofFIG. 49 may provide functionality similar to that discussed with respect toFIGS. 18 and 33 . Thelocation user interface 4900 can provide parents with a visual notification of where their children'suser systems 130 are currently located and where they have been in the past. In some embodiments, thesafety system 110 can generate amap 4910 to display thelocation information 4912 of the respective user systems. In some instances, thesafety system 110 can show all the user systems belonging to each of the children on onemap 4910. Thesafety system 110 can include landmarks on themap 4910. Landmarks can include school, home, a circle with a radius of preset distance from home or school. In some embodiments, thesafety system 110 can also display most frequently visited locations on themap 4910. Thesafety system 110 may also include a search bar 4914 that can allow a parent to lookup location history of the child's user system. A geographic movement pattern (comprising a tracing of a route, for example) can be graphically disassociated from the underlying map and compared to other movement patterns—e.g., by superposition and/or juxtaposition, holding map size generally constant between data sets, etc.—to assist a user with review and comparison. -
FIG. 49B illustrateslocation history data 4920 generated by thesafety system 110. In some embodiments, thelocation history data 4920 can be included in the dashboard described above. Thelocation history data 4920 may also be shown in a separate window or separately from other notifications. In the illustrated example, thelocation history 4920 shows location updates of Billy's phone. Thelocation history 4920 may also show other devices belonging to either Billy or other children. Thelocation history 4920 may be sorted according to a chronological order. In some embodiments, thelocation history 4920 may be sorted according to priority of alert which may depend on a determination by the safety system whether the location might be deviating from the norm. Each location notification may identify a child, an event, and a place or geofence associated with the event. For example, the illustrated example shows that “Billy left Home”, “Billy arrived at School”, “Billy has entered restricted location ‘The Mall’, and “Billy has left the safe place ‘Our Neighborhood.’” The locations identified in the notifications may include places or geofences. For example, places may include “home”, “school” and the “mall” while geofences may include “our neighborhood”. -
FIG. 49C illustrates an embodiment of aninterface 4930 for selecting and storing places and/or geofences using thesafety system 110. The places and geofences created can be unique to a user or applied among multiple users. A parent can select aplace using control 4936A as shown more in detail with respect toFIG. 49F . Further, a parent can create ageofence using control 4936B as shown more in detail with respect toFIG. 49G . In some embodiments, thesafety system 110 can provide a map in theinterface 4930. As discussed above, thesafety system 110 can visually display alocation 4934 of auser system 130 on the map provided in theinterface 4930. In the illustrated example, Billy's phone is located at 4934 on the map which may correspond to an address or a known location or one of the stored places. Known locations can include malls, restaurants, schools, friend's houses, dentist, doctor's office, etc. Thesafety system 110 can store known locations based on user input and/or third party data sources. Thesafety system 110 can display an address or knownlocation 4932 along with thelocation 4934 of Billy's device. Further, thesafety system 110 can enable users to save current location as one of the places for future recognition. In some embodiments, thesafety system 110 can also include a timeline search as described with respect toFIG. 49D . - The
safety system 110 can enable parents to track location of children over time using atimeline search control 4942 shown inFIG. 49D . In the illustrated example, the last 7 days are selected for timeline search. Theactive link 4942 can enable parents to select any time period. Based on the selection of a time period, thesafety system 110 can retrieve stored location data about aparticular user system 130 from thedata repository 140 for the selected time period. In some embodiment, thesafety system 110 can generatevisual indications 4938 on the map based on the retrieved data. Thevisual indications 4938 may show a path of transit of theuser device 130 over the selected time period. In some embodiments, thevisual indications 4938 can show only places of interest and discard transit information. Thesafety system 110 can also highlightcertain locations visual indication 4938, as shown inFIG. 49E . Thesafety system 110 can also indicate a period of time that auser system 130 was at a particular location. Thesafety system 110 can automatically identify in thevisual indications 4938, particular locations (4944 and 4946) where the user system was stationary (with respect to the boundary of that location) for at least a predetermined time period. In one embodiment, the predetermined time period is 15 minutes. In some embodiments, the predetermined time period can be more than 15 minutes or less than 15 minutes. For example, the predetermined time period can be 30 minutes or 1 hour. As discussed above, thesafety system 110 can store places like homes and school. Accordingly, thesafety system 110 can illustrate on the map stored places. Further, thesafety system 110 can also show on the map new locations (for example, “Billy was at 251W 3rd St for 15 m”). Accordingly, parents can get a visual snapshot of their children's whereabouts over a time period and identify places that their children are frequently visiting. For example, parents can identify trends such as Billy was at school for a shorter duration than normal hours on Wednesday (as shown in the figure). In another example, parents can review a new location—251W 3rd St that Billy stopped over for 15 minutes. -
FIG. 49F illustrates an example for using theinterface 4930 to identify and store a new place. For example, parents can select a control 4952 to add a new place. Parents can enter a name of the place, select whether the place is a safe place or a place for concern, or select whether to apply the place for a particular child or all the children. Further, parents can select notification settings forsafety system 110 for when to generate alerts with respect to the new place. For example, in some embodiments, parents can select to generate notifications when the child'suser system 130 enters and/or leaves the newly added place. The geographical location of the place can be selected by entering an address in the control 4952 or selecting alocation 4950 on the map. Thesafety system 110 can also suggestlocations 4946 based on the user's input via text or map. Parents can also select acolor 4954 or other identification symbol for the newly added place. Thesafety system 110 can also include in the map predetermined locations such as stores or restaurants or any other places of interest. Parents can select one of these predetermined locations as a stored place. -
FIG. 49G illustrates an example for using theinterface 4930 to add or modify geofences. A geofence can indicate a bounded area on a map. Parents can select aparticular shape 4958 based on their desired preferences for a particular geofence. For example, parents may create a neighborhood geofence as a safe place and select alerts for whenever a user device crosses a boundary of the geofence. In some embodiments, parents may draw any shape on the map to create a geofence. In the illustrated embodiment, parents can drag points on ashape 4958 to create the geofence. Further, thesafety system 110 can enable parents to drag points of the shape to automatically snap on to streets or intersections displayed on the map. In the illustrated embodiment, theshape 4958 can include eight points that can be dragged to create a geofence. Furthermore, the position of theshape 4958 corresponding to a geofence can also be moved on the map. Parents can assign a name, color, or symbol to identify the geofence. The name, color, or symbol may be used by thesafety system 110 in the notifications. Parents can also select when they would like to be notified for the created geofence. For example, thesafety system 110 can provide options for parents to enable notifications when theuser system 130 enters and/or leaves the geofence. Thesafety system 110 can also enable parents to apply the geofence to some or all of their children as illustrated inFIG. 49G . Further, the geofence can be associated as a safe place or a place of concern. Based on the selection, thesafety system 110 can modify its notifications with respect to the geofence. -
FIG. 49H shows a list of geofences andplaces 4960 added by parents using theinterface 4930. Further, parents can selectively turn on and off notifications corresponding to the selected geofence or places as shown in the figure. The illustrated figure also shows a path of the child'suser system 130 for the particular day including stops and the last location. The known stops can be displayed on the map as shown inFIG. 49I . In some embodiments, parents can select whether to show a particular place or geofence by selecting anactive control 4962. Active controls can include links, hyperlinks, buttons, check box, etc. -
FIG. 50A illustrates an embodiment of acurfew user interface 5000 generated by thesafety system 110. The example ofFIG. 50A may provide functionality similar to that discussed with respect toFIG. 19 . Thecurfew user interface 5000 can enable parents to select curfew settings for their children'suser systems 130. Thecurfew settings 5010 can include day and time when a particular set of curfew rules may be activated by thesafety system 110. In the example ofFIG. 50A , the curfew settings rules are preselected to completely disable the user system except for some phone services as discussed above. Accordingly, parents can select times of day to enable and disable curfew to prevent children from using theiruser systems 130 during school, after bedtime, homework time, etc. -
FIG. 50B illustrates another embodiment of acurfew user interface 5050 generated by thesafety system 110. As shown by the pictures of Billy, Jenny, and Johnny in this view, their parents have been using the disclosed systems, resulting in improved attitudes and demeanors in their profile photos. In thecurfew user interface 5050, parents can select virtualslider control knobs 5014, displayed above each day column, to enable curfew settings on or off for that day of the week. Further, parents may be able to select time slots of restrictions by clicking anywhere on the calendar to create new boxes.Resizable boxes 5020 are illustrated superimposed on acalendar view 5024. Parents can also move and drag boxes, and/or the borders and edges of boxes, to adjust the timing and/or duration of the restricted use periods or curfews. Parents may find it efficient to use thecurfew user interface 5050 in some instances on a touch screen computing device. Similar interfaces can be used for other settings and interactions with asafety system 110. For example, resizable, moveable shapes, superimposed on a map, for example, can be used for setting geographic restrictions, geo-fencing, etc. - As discussed herein, the
safety system 110 can apply curfew settings automatically based on locations, places, or geofences. For example, entry into a safe zone or getting out of curfew time may automatically reactivate some of the functionality of theuser system 130. -
FIG. 51 illustrates an interactive “devices”screen 5100 of an account user interface generated by asafety system 110. This screen can be generated by or associated with theaccount management module 120 ofFIG. 1 . - Account settings interactive screens, such as
FIG. 51 , can be accessed using a control associated with the “Welcome, Rowland Day”dropdown menu indicator 5101, which can initiate a menu showing a “log out” control or a “my account” control. The “my account” control (not shown) can be selected and result in various settings pages, accessible by thetabs 5103. As illustrated here, the “my account” bar 5132 can include apointer 5136 indicating that the current account is that of the example parent, Rowland Day (protecting children since Feb. 11, 2011). An additional parent or guardian can be added using theadd parent button 5142 and an additional child can be added using theadd child button 5147. - The
tabs 5103 can include, for example, an “account info” tab, a “profile” tab, a “notifications” tab, and a “devices” tab. The devices screen 5100 can be accessed by selecting the device tab, and this screen can include an existingdevice box 5102 showing details of devices already added (and allowing for their removal), as well as administrative tools to register additional controller user systems 130 (e.g.,user systems 130 used by parents) with thesafety system 110. Thesafety system 110 can add a registeredcontroller user system 130 as one of the devices to send notifications to regardingchild user systems 130 using theadd device control 5104. For example, both parents can receive updates from children'suser system 130 once their devices are registered with the safety system. Subscription plan information can be included at 5112, a devices installed and remainingdialogue 5120 can be provided, and an “upgrade”button 5124 can allow a user to increase the number of registered devices. - When Billy's
identifier 5214 is selected from an account management screen (e.g., the screen shown inFIG. 51 ), rather than navigate to a dashboard view for Billy (e.g., the view shown inFIG. 37 ), thesafety system 110 can display a subset of interactive account screens associated with Billy and settings for monitoring and protection of Billy's device, as shown inFIG. 52 . In contrast with the example shown inFIG. 51 (which shows settings for an example parent), the tabs available for an example child, Billy, are “profile,” “notifications,” and “devices”—but not “account info.” Similar to the example shown inFIG. 51 , a “devices” tab can be available for initiating a link or viewing an existing link with Billy's device(s). As illustrated, setting up a child device can include a snapshot showing devices that have been installed (e.g., by installing onsafety system plugin 132 on the devices 130). Such a snapshot can indicate the name of the child, the name of their device, whether or not a plugin or app has been installed on the device, whether the device is powered on, whether it has a data connection, and whether a GPS function is on. This same snapshot can include a control that allows a parent to remove the device from the parent's account. -
FIG. 52 illustrates an example interactive “profile”screen 5200 for Billy. This view can be generated by or associated with theaccount management module 120 ofFIG. 1 . The “profile”screen 5200 can enable parents to customize monitoring settings for their children'suser systems 130. The settings may include update frequency which can be balanced with battery life of theuser system 130. In some instances, thesafety system 110 can send an alert of low battery of one of the child'suser system 130 to a parent's user system. Based on the low battery alert, the parents may usesafety system 110 to disable some of the modules of child'suser system 130. In some embodiments, thesafety system 110 can activate curfew mode on child'suser system 130 with a low battery status. Theaccount user interface 5200 may also enable parents to input a child's credentials so that thesafety system 110 can use the credentials to monitor social networking portals. As discussed above, thesafety system 110 can also monitor social networking portals without requiring credentials by intercepting via the operating system of theuser system 130. - Setting up a child device can be initiated on that child's mobile device as illustrated in
FIG. 32 . As illustrated inFIG. 52 , the process can also include initiating settings for that child (e.g., using acolor control 5224 to select a color for items viewed relating to that child in a parent interface, using anupdate control 5228 to select an “update frequency” for that child, etc.) Selecting or designating an update frequency can include interacting with acontrol 5228 that comprises selecting from a drop-down list comprising various intervals—e.g., 5, 10, 15, or 30 minutes, 1 hour, 2 hours, etc. The more frequent the updates, the more rapid battery resources are used, which can affect battery life of a mobile device. Setting up a child device can further includesocial network settings 5212 associating a child's social networks with asafety system 110, which can include gathering log in information as a child logs in to a social network site. As indicated at 5212, settings can be used to selecting which notifications to receive regarding that child from a social network (in this case, Facebook).FIG. 53 illustrates an interactive “notifications”screen 5300. This interactive screen is also associated with Billy, as shown. Theaccount user interface 5300 further enables parents to customize what type of alerts they want to receive fromsafety system 110 related to their child's user systems. As shown in the example ofFIG. 53 , a user interface can include user controls by which a parent can select one or more of the following options for which notifications to receive: SMS (if a filtered word is sent or received via SMS or MM, or if the user contacts a filtered number; WWW (if user tries to access a flagged URL); Curfew (if a user closes the curfew screen); GPS (if GPS is disabled or re-enabled on the device); Device Data (if a data connection to the device is lost or reconnected); Apps (if an app is installed or uninstalled); Account (if any account changes are made via the web admin interface).FIGS. 21 and 34 show example interfaces that can be used for these or similar purposes, in particular when a user desires to update or change the settings provided when initially setting up a child device as described here with respect toFIG. 53 . - A number of computing systems have been described throughout this disclosure. The descriptions of these systems are not intended to limit the teachings or applicability of this disclosure. For example, the user systems and described herein can generally include any computing device(s), such as desktops, laptops, video game platforms, television set-top boxes, televisions (for example, internet TVs), computerized appliances, and wireless mobile devices (for example smart phones, PDAs, tablets, or the like), to name a few. Further, it is possible for the user systems described herein to be different types of devices, to include different applications, or to otherwise be configured differently. In addition, the user systems described herein can include any type of operating system (“OS”). For example, the mobile computing systems described herein can implement an Android™ OS, a Windows® OS, a Mac® OS, a Linux or Unix-based OS, or the like.
- In some embodiments, the
safety system 110 described above may operate with mobile computing systems using Android OS. As discussed above, the Android OS may provide software libraries to access and/or control the mobile systems. For example, thesafety system 110 can include an Apps Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve a list of installed apps, retrieve a list of uninstalled apps, and track usage of currently installed apps. The Apps Agent may use one or more of the following classes: AppsAgentService, AppsIconService, AppsInstallService, AppsUninstallService, AppsUsageService, AppsUsageSyncService, ProtectedActivity, AppModel, PackageIntentReceiver, or AppsLoader. The Apps Agent can run at specific intervals based on a Frequency Agent Service. The App Agent can check for the history of apps installation from Android's Package Manager and then check it against the currently synced apps from the server. If it is not synced, (for example) then the App Agent may then check if the app is currently installed to classify it as installed or uninstalled. If an app is already synced to the server, the Apps agent may check for the difference (in time) of the app's launch until it closed. - The
safety system 110 can also include a Curfew Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve current date/time, and lock phone. The Curfew Agent may use one or more of the following classes: CurfewAgentService, ProtectedActivity, Curfew, CurfewManager, or StaticCurfewManager. The Curfew Agent can retrieve current date and time. The Curfew Agent can run at specific intervals based on Frequency Agent Service. The Curfew Agent can retrieve a list of pre-identified curfew times from the server and then check it against the current date and time of the device. If the current date and time retrieved from the server matches the device's current date and time, the Curfew Agent can lock the device and set the lock's password the current WebSafety account logged into the device. - The
safety system 110 can also include a Device Status Agent, which may use one or more of Android's classes for at least one of the following operations: retrieve device's power state, retrieve device's connection type (WiFi or cellular) and status, retrieve device's GPS status, and retrieve installation state of the safety system on the mobile device. The Device Status Agent may use one or more of the following classes: DeviceStatusAgentService, ProtectedActivity, BootCompleteReceiver, NetworkChangeReceiver, or ShutDownReceiver. - The
safety system 110 can also include a Location Agent, which may use one or more of Android's classes for at least retrieving the device's geographical location. The Location Agent can runs at specific intervals based on Frequency Agent Service. The Location Agent can check for the current device's location if a location provider is available (GPS or Mobile). If a location provider is available, it can then send the device's current location to the server. The Location Agent may use one or more of the following classes: FuseLocationAgentService, LocationAgentService, ProtectedActivity, and GPSLocationChangeReciever. - The
safety system 110 can also include an SMS agent, which may use one or more of Android's classes for at least retrieving the device's SMS threads and messages. The SMS agent can run at specific intervals based on Frequency Agent Service. In one embodiment, the SMS agent can check for unsynced message threads from the last 6 hours. If the message thread is not synced yet, it may flag it as unsynced and send the thread details (message thread id, messages, thread sender, and thread receiver) to the server. Otherwise, if a thread is already synced, the SMS Agent may then check if there are new messages within the thread and sync it to the server per thread accordingly. The SMS Agent may use an SMSAgentService class. - The
safety system 110 can also include a WWW Agent, which may use one or more of Android's classes for at least retrieving device's browsing history. The WWW Agent can run at specific intervals based on Frequency Agent Service. The WWW Agent can retrieve the device's browsing history since the last query and send it to the server. The WWW Agent may use one or more of the following classes: WWWAgentService or Bookmark. - The
safety system 110 can also include a Frequency Agent Service, which may use one or more Android's classes for at least retrieving the frequency of services server synchronization rate. For instance, the Frequency Agent Service can retrieve parent set update frequency from the dashboard. The Frequency Agent Service can use UpdateFrequencyAgentService. - Further, the processing of the various components of the illustrated systems can be distributed across multiple machines, networks, and other computing resources. In addition, two or more components of a system can be combined into fewer components. For example, the various systems illustrated can be distributed across multiple computing systems, or combined into a single computing system. Further, various components of the illustrated systems can be implemented in one or more virtual machines, rather than in dedicated computer hardware systems. Likewise, the data repositories shown can represent physical and/or logical data storage, including, for example, storage area networks or other distributed storage systems. Moreover, in some embodiments the connections between the components shown represent possible paths of data flow, rather than actual connections between hardware. While some examples of possible connections are shown, any of the subset of the components shown can communicate with any other subset of components in various implementations.
- Depending on the embodiment, certain acts, events, or functions of any of the algorithms, methods, or processes described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, multiple processors or processor cores, or on other parallel architectures, rather than sequentially.
- Each of the various illustrated systems may be implemented as a computing system that is programmed or configured to perform the various functions described herein. The computing system may include multiple distinct computers or computing devices (for example, physical servers, workstations, storage arrays, etc.) that communicate and interoperate over a network to perform the described functions. Each such computing device typically includes a processor (or multiple processors) that executes program instructions or modules stored in a memory or another non-transitory computer-readable storage medium. The various functions disclosed herein may be embodied in such program instructions, although some or all of the disclosed functions may alternatively be implemented in application-specific circuitry (for example, ASICs or FPGAs) of the computer system. Where the computing system includes multiple computing devices, these devices may be, but are not required to be, co-located. The results of the disclosed methods and tasks may be persistently stored by transforming physical storage devices, such as solid state memory chips and/or magnetic disks, into a different state. Each process described may be implemented by one or more computing devices, such as one or more physical servers programmed with associated server code.
- Embodiments of the disclosed systems and methods may be used and/or implemented with local and/or remote devices, components, and/or modules. The term “remote” may include devices, components, and/or modules not stored locally, for example, not accessible via a local bus. Thus, a remote device may include a device which is physically located in the same room and connected via a device such as a switch or a local area network. In other situations, a remote device may also be located in a separate geographic area, such as, for example, in a different location, building, city, country, and so forth.
- Methods and processes described herein may be embodied in, and partially or fully automated via, software code modules executed by one or more general and/or special purpose physical computing systems. The word “module” refers to logic embodied in hardware and/or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, C or C++. A software module may be compiled and linked into an executable program, installed in a dynamically linked library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software instructions may be embedded in firmware, such as an erasable programmable read-only memory (EPROM). It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays, application specific integrated circuits, and/or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware and/or firmware. Moreover, although in some embodiments a module may be separately compiled, in other embodiments a module may represent a subset of instructions of a separately compiled program, and may not have an interface available to other logical program units.
- In certain embodiments, code modules may be implemented and/or stored in any type of computer-readable medium or other computer storage device (for example, hard disks, RAM, ROM, flash memory, etc.). Computer-readable media include non-transitory computer-readable media such as magnetic storage, optical storage (for example, CD-ROMs or DVDs), semiconductor storage, etc. In some systems, data (and/or metadata) input to the system, data generated by the system, and/or data used by the system can be stored in any type of computer data repository, such as a relational database and/or flat file system. Any of the systems, methods, and processes described herein may include an interface configured to permit interaction with other systems, components, programs, and so forth.
- Although sometimes described by partitioning functionality of the overall system into modules for ease of explanation, it is to be understood that one or more modules may operate as a single unit. Conversely, a single module may comprise one or more subcomponents that are distributed throughout one or more locations. Further, the communication between the modules may occur in a variety of ways, such as hardware implementations (for example, over a network, serial interface, parallel interface, or internal bus), software implementations (for example, database, DDE, passing variables), firmware implementations, a combination of hardware and software, etc.
- In some embodiments, the modules of the
safety system 110 are distributed such that some of the functionality runs locally on the mobile device or theuser system 130 and other (e.g., the remaining) functionalities run on remote computer systems (see e.g. theremote computing system 5540 shown inFIG. 55 ). For example, the remote computing system can be servers operating the portions of thesafety system 110. The remote computing system can also be theuser systems 130. The remote computing system can includethird party systems 104 orsystem administrator 108. The remote computing system can be accessed over anetwork 102. -
FIG. 54 illustrates an embodiment of a user system which implements some functions of a safety system. Theuser system 130 inFIG. 54 can include hardware such as user system hardware 5440 (e.g., GPS, camera, antenna, and so on), ahardware processor 5450 programmed to execute the various software modules in the logical blocks, and amemory 5460 configured to store activity data of theuser system 130 as well as various software instructions in the logical blocks. Theuser system 130 can also include logical blocks such as a safety system application/plug-in 132, anoperating system 5420, and alocal data store 5430. - The
local data store 5430 can include instructions for storing activity data of theuser system 130. The safety system application/plug-in 132 can include instructions which includes instructions to capture and communicate (to a remote computing system) data generated by hardware blocks such as theuser system hardware 5440 - As an example, when application software (“app”) or a
plugin 132 corresponding to themobile safety system 110 is installed on auser system 130, the installation process can create one or more agents orservices 5410 to run in the background along with the operating system 5420 (such as Android, iOS, Windows, Linux, etc.) of theuser system 130. Theagents 5410 can collect data, communicate data with remote computing system, and control operations of theuser system 130. Asafety system plugin 132 can include six agents to implement the functionality of thesafety system 110 the monitored user system 130: an apps agent, a curfew agent, a device status agent, a location agent, a SMS agent, and a WWW agent. In some embodiments, themobile safety system 110 can also include a general update frequency agent. - In some implementations, the App Agents can perform the following functionalities: adding installed apps to the server, removing uninstalled apps from the server, uploading icons for installed apps, and tracking the amount of time a user uses a particular application on the
user system 130. - Notifying a remote computing system of which apps are installed can be handled by the AppsInstallService class. This service can execute once every update cycle, for example. In some embodiments, the update cycle can be specified by the user. The update cycle can also be determined based on the battery life or power management of the
user system 130. The AppsInstallService can execute the following steps of a process. The AppsInstallService can retrieve a list of all apps currently installed on the device by querying Android's PackageManager service. Next, it can compare this list to the list of apps currently stored in a local sqlite database (db), if any. Any new apps that are not present in the sqlite db are put into a separate list which is then passed into a newly created WSAppsTask object. This task object posts the list of new apps to the server. When this REST request is finished, the task checks if the new apps have an icon image associated with them, and if not, sets a flag indicating the icon might have to be uploaded (see below). The task can then store the newly reported apps in the sqlite db to be used in the list comparison during the next update cycle. - See
FIG. 74 in this context. - Notifying the server of which apps have been uninstalled can be handled by the AppsUninstallServices class. This service can perform the inverse operation of the AppsInstallService. Every update cycle, it can query the list of currently installed apps from the PackageManager and compare this to the list of apps stored in the sqlite database. If there are any apps in the database that are not reported as being installed by the PackageManager, they can be stored in a list and passed to a new WSAppsTask object. The task posts the uninstalled apps list to the server. The uninstall service is notified of the result of the request, and updates the sqlite database to remove the apps that were uninstalled.
- See
FIG. 75 in this context. - Uploading the app icons for installed apps can be handled by the AppsIconService class. This service contains logic to initialize a WSUploadAppsIconTask object every update cycle. This task retrieves a list of apps that were previously flagged to upload an icon from the sqlite database. It can then iterate through each app, retrieve the icon image for the app from the PackageManager service, and upload it to a dedicated bucket on the remote computing system. After the upload is complete, the task can send an update request to the remote computing system to store the URL of the newly created icon image.
- The tracking of app usage can be handled by the AppsUsageService and AppsUsageServiceV21 classes. These classes can query app usage data from the system and store that data in the local sqlite database by either updating existing records or inserting new records. The difference between the two classes is in their implementations, as AppsUsageService retrieves the usage data from a service that is deprecated in
Android version 21, so AppsUsageServiceV21 fills in that gap by using an alternate method that requires the user to explicitly grant themobile safety system 130 access to usage data. In other operating systems, similar permission access requests may be required. After the data has been stored in the sqlite db, the AppsUsageSyncService class can upload the data. It queries the db for all new usage data then passes that list to a WSAppUsagesTask which posts the data to the remote computing system. The data may be deleted after transmission to the remote computing system. - In some embodiments, the Curfew Agent comprises the following functionality: retrieving curfew settings from the remote computing system, scheduling the locking of the device or
user system 130 during curfew, scheduling the unlocking of the device after curfew, and notifying the remote computing system of breaks in curfew. All of these functions can be handled by the CurfewAgentService class. - See
FIG. 76 in this context. - Every update cycle (or at another periodic or selectable interval), the service runs and retrieves an updated list of curfew times from the server by executing a WSUserCurfewTask instance. This task can perform the logic for both inserting newly created curfews into the local sqlite db, as well as removing curfews that are no longer present on the server (e.g. the user has deleted or disabled a curfew). The curfew service can look up the newly stored curfews from the sqlite db and execute the scheduling logic via a WSScheduleCurfewsTask instance.
- The WSScheduleCurfewsTask instance can iterate through all curfew data it has been given to decide what events to schedule. If there are no active curfews, it can cancel all previously scheduled events and start a new instance of the CurfewAgentService class to unlock the device. The service can then remove or reset the device password using a WSDevicePolicyManager instance to unlock the device. If the WSScheduleCurfewsTask does have curfews, it can schedule an event to happen at the beginning of each curfew. Each of these events can trigger a new instance of the CurfewAgentService. The service can use the WSDevicePolicyManager to set the password of the device and lock the user out based on the curfew time.
- See
FIG. 77 in this context. - The WSScheduleCurfewTask class can also be initialized via the CurfewBroadcastReceiver. This receiver is notified directly by messages sent by the remote computing system when a new curfew is activated or an old curfew is disabled/deleted. This can prompt the schedule task to run and update the state of the phone appropriately in real time. For example, this service can be advantageous in some embodiments for parents to remotely disable or activate the mobile devices of their children. In some embodiments, the Curfew Agent can also report non-permitted usage of the device during curfew hours. The Agent can call on the services to check for usage of SMS messages. If the user has sent a text during the curfew hour, the time and violation can be reported to the remote computing system. All time-based or curfew-related descriptions herein can also apply to other geographic or behavior-based restrictions.
- See
FIG. 78 in this context. - The Device Status agent can update the remote computing system with information about the GPS and internet connectivity of the device as well as the device power and installation status of mobile safety system plugin or application on the device. In some embodiments, the only data that is collected on the device is the GPS state. Internet connectivity, power, and the safety system installation can be evaluated from the remote computing system side based on the time since the last communication with the device because it may not be possible for device itself to send an update if any of those values are false.
- The GPS state can be updated on the device by using the class GPSLocationChangeReceiver. This class can receive notification of changes in the location provider configuration sent by the Android system. It then sets a persistent flag depending on whether or not GPS is present in the update location configuration. This flag is then read by the DeviceStatusAgentService class. This service can be executed once every update cycle. The service retrieves the latest device state flags and passes them to a WSSaveDeviceStatusTask instance. This instance then posts the data to the server.
- The Location agent can listen for location device updates from the native (device) location system and can post the updates to the remote computing system periodically.
- In some embodiments, the location agent is implemented in the WSLocationServiceV2 class. This service registers itself for location updates from the operating system's location service. Whenever it receives an updated location, it checks its accuracy against the previously saved location, if any, and also makes sure it is newer than the previous location and at least two minutes have passed since the last update. The elapsed time can be more than two minutes or less than two minutes since the last location. If all these conditions are met, it can store the new location for future comparisons and start a LocationAgentService instance to update the remote computing system. This LocationAgentService instance then posts the new location to the remote computing system using a WSLocationTask instance. It can also check for any unsynced locations in the sqlite database and post them to the server as well via a WSLocationsTask. Upon completion of these requests, it can update the local sqlite database with the newly saved locations.
- The SMS agent can obtain the SMS messages that the user has received and sent on the device and sends them to the remote computing system with update cycles, for example. The SMS content can be separated into messages, threads (collections of messages), and users (senders and recipients of messages).
- The SMS agent can be implemented using the SmsAgentService class. This service can be executed every update cycle, and its function is to initialize a WSSyncSmsTask instance, which can take care of the logic for retrieving messages. This task operates by checking the time since the last update and retrieving any new messages since then, or messages from the past week in the case of the very first update. It retrieves the messages by performing a query against the operating system's content service specifically for the SMS content. It then compares the results of this query against the current data stored in the local sqlite database to find any messages, users, or threads that are new since the last update. It then passes these data types to WSMessageTask, WSMessageUserTask, and WSMessageThreadTask instances, respectively. These tasks then post their respective data to the remote computing system. On completion, the tasks update the newly retrieved data in the sqlite db for use in the next update cycle.
- In some embodiments, the WWW agent can run continuously in the background, collecting data from the device's browser and posting it to the server. The agent can be implemented by the WWWAgentService class. This service can spawn an internal runnable task with the operating system that runs every second or every minute or hour. When this task executes, it triggers the service to evaluate any new browsing activity on the device. Separate implementations may be required depending on the type of browser that is operating on the device such as the native Android browser, the Chrome app, and the custom browser installed on Samsung phones. The class can handle different browsers by retrieving data directly from the operating system. The agent can retrieve a list of recent websites from the operating system's content service using a specific URI for each browser. In some embodiments, it will only request browsing data since the last update time. Once it has retrieved this data, it saves it to the local sqlite db and passes it to a new WSUserUrlTask instance. This task can then post the data to the remote computing system.
- The Update Frequency Agent can coordinate the frequency of updates among the agents of the
mobile safety system 110. The agent can include a service class for checking new update frequency against the cached value and restart agent services if necessary. If the update frequency has changed, the preferences are updated and all agent services may be restarted to use the new update interval. - See
FIG. 79 in this context. - Agents can be implemented, for example, using programming languages such as C, C++, Java, Javascript, etc. Following is an example structure of a package developed using JAVA to implement the agents of the
mobile safety system 110 on auser system 130. The machine code generated based on compiling the programmed instructions can be executed by the hardware processor of theuser system 130. - Service Classes: The ‘service’ classes can run in the background and operate at timed intervals. The timing may be a function of battery management as discussed above. In some embodiments, the interval can be one minute or less, for example. The service classes can enable operational functionality for each agent. Their general execution pattern is to retrieve information from a database relevant to their agent (e.g. list of apps, sms agents, etc.) and then spin off a relevant ‘task’ which will then upload this data to one or more remote server computers or data repositories. Each task may correspond to an instantiation of an object of a “task” class described below. The tasks may be added to a queue for execution at a later time. The retrieved data may come from the local sqlite database that is managed by the
mobile safety system 110. The retrieved data may also come from other resources such as the operating system by the task that is started. For example, the SMS data may be retrieved from the operating system. - Tasks Classes: The ‘task’ classes can be started by the service class of the corresponding agent. Some of the instantiations of the task object can execute immediately upon being created. The task class may be instantiated with a list of data that needs to be sent to the server, at which point they will execute a REST call to post that data to the appropriate endpoint. REST call relates to Representational State Transfer service to manage states of Web Services. Some of these (such as sms) may not be given data directly by the service and will instead query the operating system directly for the relevant information.
- AppsLoader Task Class: The AppsLoader class can retrieve a list of installed applications. For instance, the class can import packages from the operating system to retrieve information about the installed applications. For an Android OS, the imported packages can include android.content.Context, android.content.pm.ApplicationInfo, android.content.pm.PackageManager, and android.support.v4.content.AsyncTaskLoader. The “Context” class enable interface to global information about an application environment. It can allow access to application-specific resources and classes, as well as up-calls for application-level operations such as launching activities, broadcasting and receiving intents, etc. The PackageManager class can be used to retrieve various kinds of information related to the application packages that are currently installed on the
user system 130. - The AppsLoader class can deliver the result if it already has a list of currently installed Apps. The AppsLoader can also attach to a process of the operating system to listen for changes such as when an application is installed or uninstalled. For example, when a user clicks on the uninstall button under the Manage Apps settings of an Android operated user system, the
system 130 can listen by calling “com.android.packinstaller.UninstallerActivity”. After the information is transferred to the server, the AppsLoader class can release the resources. - Request Classes: The ‘request’ classes can be used to send specific types of data to one or more remote computers. In some embodiments, there is a dedicated request class for each type of data that is handled (e.g. one for sms messages, one for websites visited, and location). They are generally instantiated in a task or sometimes a service with a set of data and can then execute a REST call with that data to the server.
- Models Classes: These ‘model’ classes can be used to represent different data types or data structures (e.g. an sms message, a location point, and curfew) as JAVA objects. Instances of these models can be constructed from database information when a query is executed by a service or task, and are then sent to the remote computer via request objects.
- Receiver Classes: In some embodiments, most of the agents are executed at timed intervals and collect information at these intervals. However, certain types of data may be collected reactively in response to system-level events. For instance, the location agent may collect data with each significant location change, the timing of which cannot be predicted. These receivers accomplish this by registering with the operating system to be notified by some specific system event. Then, whenever this event happens, they will retrieve the new data and generally store it in the local sqlite database to be retrieved by the relevant service at the next update interval. In some embodiments, the receivers can trigger an update immediately by directly executing the agent's relevant service (such as sms). For example, a SMSBroadcastReceiver class can implement the SMS monitoring service. For an Android OS, the SMSBroadcastReceiver class can import “android.content.BroadcastReceiver”, “android.content.Context”, “android.content.Intent”, “android.telephony.SmsMessage”, and “android.util.Log”. The SMSBroadcastReceiver class can register with Android to receive an event in response to the user system sending or receiving SMS messages. The sent or received SMS message is stored in the SMSMessage class for to be transferred to the remote computer.
- Some agents may operate differently than other agents. Instead of just collecting information on the device and sending it to the server, the curfew agent also responds to updates sent from the server concerning updated curfew times. The receiver class for the curfew agent listens for curfew update events that are broadcasted by the server to the device, and when it is notified of a change, it initiates the curfew agent's service class to appropriately respond to the update. This response can be locking down the phone if an new active curfew has been added, unlocking the phone if an existing active curfew has been disabled, or simply storing the new curfew information for later use. For example, the CurfewBroadcastReceiver class can import “android.os.PowerManager” to control the power state of the
user system 130. - In the above example, the
mobile system 110 used many O/S level functionalities on the device itself to implement its features. In some embodiments, it may be advantageous to implement the features of themobile system 110 using a remote computing system such as a mobile device management (MDM) server or a backup computer storage system backup for a particular user (such as an iCloud server). -
FIG. 55 illustrates an approach to using a remote computing system to track activities of a mobile device. InFIG. 55 , a safety application may be installed on themobile device 5510, such as a child's iPhone. Themobile device 5510 may implement one or more modules of theuser system 130 as described with reference toFIG. 1 . - A
person 5530, such as a parent, can sign into the safety application. Theremote computing system 5540 can authenticate the login credentials to make sure that they are the correct credentials. In some implementations, if theperson 5530 has not registered an account, the safety application on themobile device 5510 may provide a sign-up user interface for theperson 5530 to put in the personal information. - Upon successful authentication, the
remote computing system 5540 may trigger themobile device 5510 to download and install an MDM profile with default configuration. For example, the default configuration may include which applications or which types of activities on themobile device 5510 are tracked. The default configuration may also include restrictions on certain applications of themobile device 5510. For example, the restrictions may be blocking text messaging on themobile device 5510 after midnight and before 6 am. In some implementations, an MDM server is enrolled and a configuration downloaded. A device can then register with the MDM server and provide the device's information. Later, push notifications can be sent from the MDM server to the device. MDM can refer to “mobile device management,” or any server that manages one or more mobile devices. A custom implementation of an MDM server approach can accomplish the functions described herein. MDM servers may be configured to administer many enterprise devices under common restrictions or parameters. However, a custom configuration allows an MDM server to permit multiple parents to each have control over the parameters for their own childrens' devices. This distributes the decision-making authority and technical oversight to far more than a single enterprise or department administrator. - The default configuration may be customized by the
person 5530 via theweb portal 5520. Theweb portal 5520 may be a part of thesafety system 110 described with reference toFIG. 1 . Theweb portal 5520 may be configured to access from a desktop or laptop as well as configured from a mobile device. For example, theweb portal 5520 may be part of the safety application on themobile device 5410. Theweb portal 5520 may also be a webpage accessible via a web browser. - The
person 5530 may log onto theweb portal 5520 and customize the MDM profile associated with thedevice 5510. For example, a parent can sign into theweb portal 5520 and select themobile device 5510 on a user interface of theweb portal 5520. The parent can then change the settings for restrictions and activity tracking for themobile device 5510 using theweb portal 5520. - The changes made by the
person 5530 on theweb portal 5520 can trigger theremote computing system 5540 to generate an updated MDM profile. The updated MDM profile may be communicated to the child'sdevice 5510. For example, as shown inFIG. 54 , the updated MDM profile may be pushed to themobile device 5510 via thepush notification service 5550, although other techniques of communicating the updated MDM profile (such as pulling by the mobile device 5510) can also be used. The changes to the profile can take effect on themobile device 5510 after the updated MDM profile is received by themobile device 5510. In some beneficial MDM implementations, push notifications are used frequently as commands are issued from an MDM server to various remote devices. Devices can check in to an MDM server as a result of or independently of such notifications. An example of a command is one that initiates a device profile update. -
FIG. 56 shows an example sequence for detecting and listing installed applications on a device. The device can be a child's device, and the listing can be accessible by a parent, for example.Column 5602 can represent actions performed on, by, or relating to a device.Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal. - In a
stage 5612, a user such as a parent can enroll a device such as a child device for monitoring. Arrows such as thearrow 5613 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally. Thus, thestage 5612 can cause and/or be followed by thestage 5614, where a web portal authenticates the device being enrolled and stores the device (or an identifier related thereto) in a database. In astage 5616, a device can receive the URL of a server such as an MDM server and request an MDM profile. In astage 5618, an MDM server can send authenticating or identifying information (e.g., a Server Certificate and MDM profile). In astage 5620, the device can incorporate the information (e.g., by installing the Server Certificate and MDM profile). In astage 5622, a server can receive a response from the device confirming installation. In astage 5624, a PNS can send a push notification for the device to check in to the server. (This can be preceded by communication between the server and the PNS that allows the PNS the ability to make such contact; the PNS can be localized on the server, for example. In astage 5626, the device can receive the push notification and poll for a command—e.g., request or indicate readiness for a command from a server such as the MDM server. In astage 5628, a server can issue a command such as an “InstalledApplicationList” command. In astage 5630, the device can execute the command and send the request information (e.g., a list of installed applications present on the device) to the server. In astage 5632, the server can receive the list of installed applications. In astage 5634, the server can store the received information (e.g., the list of applications) in a database such as a WebSafety database. In astage 5636, a web portal can display the list of applications for the device, which can be viewable or otherwise accessible to a user such as a parent or administrator. -
FIG. 56 demonstrates, for example, that multiple devices and services can interact securely, and that multiple layers can improve security if each device and/or service separately stores information relating to timing and content of interactions. Certificates, handshake protocols, unique identifiers, etc. can be used to improve security and create a more definite trail of transactions for later diagnosis or security uses.FIG. 56 also shows how a server can be employed to help centralize a control structure and allow easier administration and more efficient use of resources. The server may be an embodiment of theremote computing system 5540 shown inFIG. 55 . The server can be located one layer removed from a user interface (and can handle security and initialization tasks, for example) to simplify user views and interactions. A PNS can be employed to cause a device to actively check in with a server at periodic intervals. The PNS may exist in current operating systems and therefore allow a server to take advantage of the existing functionality and exceptions to firewalls or other security safeguards. Adevice 5602 and a portal 5608 can be accessible by a user, whereasPNS 5604 and aserver 5606 can comprise intervening, intermediary, or less-accessible layers that provide security and/or administrative controls. These intervening layers can be used to facilitate simplicity of a user experience while simultaneously improving security, facilitating efficient database management, and improving compliance. -
FIG. 57 shows an example sequence for web/browser filtering and application purchase restrictions. The filtering and restrictions can be applied to a child's device, and the control or monitoring can be accessible by a parent, for example.Column 5602 can represent actions performed on, by, or relating to a device.Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal. - In a
stage 5712, a parent can set content filters and/or application purchase restrictions using a web portal. In astage 5716, the web portal can send a push notification or control a PNS to send a push notification. Arrows such as thearrow 5713 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally. In astage 5720, a PNS can send a push notification for the device to check in to a server such as the MDM server. In astage 5722, a device can receive the push notification and poll for a command—e.g., send a message requesting or indicating readiness for a command to a server such as the MDM server. In astage 5726, a server can issue a command such as an “InstallProfile” command. In asage 5728, a device can receive the push notification and execute the command. In astage 5730, a server can generate an updated profile such as an MDM profile reflecting any changes that may have occurred on the device (e.g., as a result of executing the command). The updated profile can also or alternatively include the filters and restrictions initially indicated through a portal atstage 5712. In astage 5734, the device can install the updated profile and the content filter restrictions can take effect on the device. -
FIG. 57 illustrates how a server level (e.g., server 5606) can act as an intermediary between a portal and a device. This can provide efficiency because a server can be persistently active to accomplish commands or requests initiated through a less persistently active portal. A PNS layer (5604) can be helpful to provide persistent or periodic contact or outreach to a device. -
FIG. 58 shows an example sequence for curfew or other time-based blocking. Blocking can include reducing or turning off functionality. The blocking can be applied to a child's device, and the control or monitoring can be accessible by a parent, for example.Column 5602 can represent actions performed on, by, or relating to a device.Column 5604 can represent actions performed on, by, or relating to a push notification service (or “PNS”) such as the Apple Push Notification Service, if the iOS operating system is being used, for example.Column 5606 can represent actions performed on, by, or relating to a server such as a mobile device management or “MDM” server.Column 5608 can represent actions performed on, by, or relating to a portal (including the various alternatives and access/control implementations described herein) such as a WebSafety Web Portal. - In a
stage 5812, a user such as a parent can set curfew or other restrictions (e.g., time, place, behavior status restrictions) using a web portal. Arrows such as thearrow 5813 can indicate causation, sequencing, or some other kind of relationship that applies to this example or more generally. In astage 5816, a server such as an MDM server can employ a background process to check for curfew settings for one or more devices that may be associated with that user, that portal, that server, etc. In some cases, behavior status restrictions can include failure to pay a phone bill or failure to pay in accordance with a usury contract. (In such implementations, a user may be a lender or loan administrator). In astage 5820, a query can be initiated of whether curfew (or other restriction) is found for a device. If not, a recurring process can be employed that periodically checks for curfew settings, and that process can be continuous until a positive result occurs. If the answer is yes, astage 5824 can be entered with a PNS sending a push notification for the device to check in to a server. The device can receive the push notification in astage 5830 and can poll for a command (e.g., request or indicate readiness for a command from a server). In astage 5834, a server can query whether a relevant curfew is active. If so, a server can issue a “DeviceLock” command or other restrictive action in astage 5838. If not, a server can issue a “ClearPasscode” command in astage 5836 that lifts or relaxes restrictions, for example. In astage 5842, a PNS can wake up a device and forward a command from a server. In astage 5848, a device can receive a push notification and execute a related command by locking or blocking (or controlling other restrictions for or on) a device. -
FIG. 59 illustrates an embodiment of a computing environment for monitoring activities of a mobile device. Thecomputing environment 5900 can include amobile device 5510, a backupcomputer storage system 5910, aweb portal 5520, adatabase 5930, and a computing system (such as the remote computing system 5940 shown inFIG. 54 ) executing thebackground process 5920. - In
FIG. 59 , themobile device 5510 can regularly store a backup copy of the files and activity logs to the backupcomputer storage system 5910. For example, where themobile device 5510 is an iPhone, themobile device 5510 may be set up for regular backup (e.g., via iCloud or other cloud service). iCloud is used here for illustrative purposes in the following discussion as an example backupcomputer storage system 5910. For example, a copy of the device backup such as text messages and social network activities on themobile device 5510 can be regularly communicated to an iCloud server via the Internet. - As described with reference to
FIG. 55 , aperson 5530, such as a parent, can sign on to theweb portal 5520 and add thedevice 5510. For example, to monitor a child's iPhone, the parent can add the child's iCloud account to the list of monitored devices through theweb portal 5520. The parent can add the child's iCloud account by entering the user name and password associated with the account. These credentials may be stored in a secure data store such as thedatabase 5930. - The
background process 5920 can regularly check for updates of data in backupcomputer storage system 5910. For example, thebackground process 5820 can communicate with the iCloud server every day and determine whether there are any new backup data in the iCloud server. In some embodiments, thebackground process 5820 may use a time and/or date function on a device for time-based restrictions. Thebackground process 5820 can use a universal clock in addition to or in alternative to a device clock. The universal clock may be a clock external to thedevice 5510, such as a clock associated with a server, PNS, or portal. This implementation can be advantageous because relying on non-device clocks can prevent a child from circumventing restrictions by manually changing time settings. An update process can obtain data from a mobile device periodically, for example every eight hours. The timing can be configured to correspond to the timing of back-ups or cloud synchronization of a device. Some devices typically back up to a cloud service (e.g., iCloud) when they are plugged in and have a wifi connection. Some devices are set to automatically synchronize no more than once/day. If the device waits until certain such conditions are met before synchronizing, a system can strategically time the update process to correspond to recognized patterns of behavior for each device. Thus, a predictive update can review data showing the average time that charging and wifi begins (or that cloud synchronization occurs) each evening or morning and time updates for approximately this same time or shortly thereafter. A naïve backup schedule can also be used. For example, updates can occur three times per day at regular intervals. Cryptographic approaches to prevent security override can also be helpful, including use of blockchain-type technology. Crypto-currency concepts can apply for oversight of child devices. For example, a shared server ledger of transactions can help prevent a child device from avoiding technical restrictions as discussed herein. - The
background process 5920 can download the updates from the backupcomputer storage system 5910. The downloaded files may be stored to thedatabase 5930. The downloaded files may include updates to thedevice 5510's SMS, call history, web browsing history, social network usage, and so on. In certain embodiments, thebackground process 5920 may reformat the data, such as rehashing the data, for storage in thedatabase 5930, which may provide more efficient storage and hardware utilization. - In some implementations, the data packet obtained from the backup
computer storage system 5910 may be encoded, for example, by an encryption algorithm. Thebackground process 5920 can include instructions that decrypt the data packet. In many implementations, backups are transmitted in encrypted formats. Authentication (which can involve decryption) can occur after an encrypted data packages is received. Authentication can occur through iCloud, for example. Parsing can involve any and all processes required for reading and analyzing the data that results after authentication and decryption. File types, extensions, or paths can all assist in the parsing process. An intermediate step (e.g., transmission to and from a third-party provider) can be used to authenticate or otherwise communicate effectively with a cloud server (e.g., an iCloud server). Direct connection can be established using decryption. Secure data keys or certificates can be periodically required to enhance security. For some usage of a child phone, a secondary, multi-key, multi-channel and/or expiring password system can be employed. - In some situations, the data packet may include data collected by multiple applications and/or software modules. For example, the data packet may include data collected by various agents described in the section XXIII The
background process 5920 can parse the decoded data packet and determine which portions of the data are collected by what applications and/or software modules. Thebackground process 5920 can further analyze these data and display to theperson 5530 information related to the activities of thedevice 5510. For example, thebackground process 5920 can download the data packet including today's updates on thedevice 5510 from the backupcomputer storage system 5910. Thebackground process 5920 may communicate to another computing system or thedatabase 5930 to obtain information to decode the data packet. The decoded data may include all text messages, phone calls, web browsing history, and so on, occurred on thedevice 5510. Thebackground process 5920 can decrypt, decode, parse and/or analyze these data to identify any suspicious activities. For example, thebackground process 5920 can parse the data to identify text messages sent by the mobile device today, and analyze the text messages to determine whether the child has used any inappropriate words or initiated any other actions that merit a warning indicator. Thebackground process 5920 can flag these words or actions to the parent via theweb portal 5520, actively, passively, and/or dynamically (e.g., with a sliding scale or relative urgency determined algorithmically, or by a user or an administrator through a survey wizard or other setting interface mechanism). In some embodiments, parsing can involve sorting data received in a packaged or bundled state. For example, efficiency may be enhanced by grouping data together at a mobile device, then sending the data as a bundle or package without clear differentiation between types or categories of data. For example, data relating to texts can be packaged and sent with data relating to browser usage. Similarly, data relating to texts or browser usage during a first time period may be packaged and sent along with data relating to texts or browser usage during a second time period. When such packaged or bundled data is received by a server, parsing can involve unwinding or reversing the bundling or packaging process. Thus, distinctions between data from first and second time periods can be created and/or restored by parsing. Similarly, distinctions between data from texts and browser usage can be created and/or restored. This packaging and subsequent parsing process can enable more efficient or otherwise more effective transfer of data. For example, larger packages or bundles can be prioritized in a mobile phone transmissions. In some embodiments, smaller packages or bundles can be created if warranted to take advantage of inherent limitations or features of a phone's transmission protocol, bandwidth, or other processing approaches or limitations. Parsing may be accomplished by recognition of signals or codes that were inserted in the packaging or bundling process. Parsing may also be accomplished by recognition of patterns inherent in different types of data or data from different time periods. -
FIG. 60 illustrates an example process for flagging suspicious activities on a person's mobile device. Theprocess 6000 may be part of thebackground process 5920 described with reference toFIG. 58 . Theprocess 6000 may be executed by theremote computing system 5540 as described with reference toFIG. 55 . Theprocess 6000 may or may not occur in real-time as the activities on the device take place. An advantage of prompt or real-time is that parental users are allowed the opportunity of prompt, prophylactic action. For example, theremote computing system 5540 may intermittently receive data with device activities associated with a period of time. The device activity data may be communicated to a temporary repository such as a queue or a stack. One or more servers can process the device activity data by obtaining the data from the temporary repository. Using an offload implementation (where less robust computing power devices store for processing by other devices or at a later time) can be advantageous for reducing the processing needs on the mobile device which may not have as strong of processing power (or as much constant processor availability) as a server. Additionally, a temporary repository can allow the one or more servers to efficiently allocate the computing resources among themselves while processing the data. Such repositories can also be archived or saved for later use, and they can have periodic purging if desired. - In some embodiments, the
process 6000 may be implemented in real-time and/or in a time-delayed fashion. For example, the mobile device may process a portion of the data such as location of the mobile device in real-time, either on the mobile device or on theremote computing system 5540, while communicate other device activity data to theremote computing system 5540 at a certain time period. These embodiments may be advantageous because certain activities may require a parent's immediate attention, such as the child's cellphone appearing to be in an unsafe place, while other activities, such as chatting to friends via text message, may not require the parent's immediate attention. By processing only a portion of the data in real-time, the systems described therein can focus the processing powers on data of a high priority. - At
block 6010, theremote computing system 5540 can obtain device activity data associated with a mobile device. The mobile device may be programmed to run an android or an iOS operating system. The mobile device can record device activity data such as SMS and call history, web browsing activity, location data, application usage history (such as which mobile applications are used at what time period, which files are generated by which mobile applications, activities within the mobile applications, and so on), and other activities, in combination or the like. In some implementations, at least a portion of the device activity data may be recorded by a safety application installed on the mobile device. - The
remote computing system 5540 can communicate with the device to directly obtain the device activity data. For example, some mobile applications (such as social network applications) may be configured to transmit data directly to the remote computing system. As another example, the safety application can send the recorded device data toremote computing system 5540. - In some implementations, the
remote computing system 5540 may not be able to obtain data directly from mobile device. As an example, mobile applications may be confined to different “sandbox” environments where one mobile application executing in a sandbox may not have access to files of another mobile application executing in another sandbox. As a result, the safety application installed on the mobile device may not be able to access activity logs of other mobile applications. To solve this problem, theremote computing system 5540 may communicate with a backup system, such as the backupcomputer storage system 5910, and periodically obtain device activity data. - At
block 6020, theremote computing system 5540 can decrypt the device activity data. For example, the device activity data may be decrypted with a decryption algorithm. In some implementations, the device activity data may be unlocked by entering user credentials (such as a user name or a password) associated with the device. - The decrypted device activity data may be in one or more formats, such as .html, .msg, or other data formats. At
block 6030, theremote computing system 6030 can parse and analyze the decrypted device activity data based on the formats of the data. For example, theremote computing system 6030 can identify data associated with a particular application based on the format of the data typically generated by that application, e.g., by file suffixes, extensions or other patterns or clues in the data itself. As an example, theremote computing system 6030 can automatically associate data with .msg format with a texting application because the texting application stores files in the .msg format. Theremote computing system 6030 can also analyze the parsed data based the format of the data. For example, the web browsing history may include data in html or xml format. Theremote computing system 5540 can use this format information to extract relevant data from the web browsing data. An example format used for some such data is the SQLite database format for storage libraries. - At
block 6040, theremote computing system 5540 can analyze the device activity data and flag suspicious activities. For example, theremote computing system 5540 may flag inappropriate words or websites in the parsed data. Theremote computing system 5540 can send a notification to another person, such as a parent. The notification may include the suspicious activities as flagged by theremote computing system 5540. In some implementations, theremote computing system 6030 can automatically send an instruction to the mobile device blocking certain activities of the mobile device. For example, the instruction may include locking the mobile device, blocking access to certain websites, blocking call functions, and so on. - In certain embodiments, the mobile device may be programmed to provide limited abilities for external controls. For example, the operating system of the mobile device may prevent the mobile device being locked remotely by another computing system. As another example, the user (such as a child) of the mobile device can override the external controls. Where the mobile device runs an iOS system, the user of the mobile device may defeat the screen lock, for example, by re-typing the password to unlock the device. To circumvent this problem, the
remote computing system 5540, alone or in combination with the safety application, can repeatedly lock the mobile device during a short time interval and thereby sabotage the user's continuous use of the mobile device. For example, a child may need to re-type the password every 30 seconds while watching a video, which may prevent the child from enjoying the video. -
FIGS. 61A, 61B, 62A, 62B, 63-65, 66A, 66B, and 67-72 depict example user interfaces for a safety system. The example user interfaces may include embodiments of theweb portal 5520 described with reference toFIGS. 55 and 59 . Each of the user interfaces shown includes one or more user interface controls that can be selected by a user, for example, using a browser, a mobile application, or other application software. Although the examples are described with reference to the safety system, each of the user interfaces shown may be output for presentation by the safety system, the remote computing system, the user system, and other computing systems described herein, alone or in combination, which may optionally include a browser, a mobile application, or any other application software. A user interface can include multiple display screens or multiple webpages. The user interface may also refer to a single display screen or web page in some implementations. - The user interface controls shown are merely illustrative examples and can be varied in other embodiments. For instance, buttons, dropdown boxes, select boxes, text boxes, check boxes, slider controls, and other user interface controls shown may be substituted with other types of user interface controls that provide the same or similar functionality. Further, user interface controls may be combined or divided into other sets of user interface controls such that similar functionality or the same functionality may be provided with very different looking user interfaces. Moreover, each of the user interface controls may be selected by a user using one or more input options, such as a mouse, touch screen input, controller, or keyboard input, among other user interface input options. Although each of these user interfaces are shown implemented in a mobile device, the user interfaces or similar user interfaces can be output by any computing device, examples of which are described above. The user interfaces described herein may be generated electronically by the
user interface module 116 of thesafety system 110. - A. Example User Interfaces for Signing-Up with and Signing-in to the Safety System
-
FIGS. 61A and 61B illustrate example user interfaces when the user is signing-up with and signing-in to a safety application on a parent device. Theuser interface 6110 illustrates an embodiment of a start-up screen. The start-up screen may be shown when a user first opens a safety application. The start-up screen may include options such as sign-in on parent's device, sign-in on child's device and create an account. When the user chooses sign-in on parent's device, thesafety system 110 may present theuser interface 6130 where the parent can input his login credentials. When the user chooses create an account, the safety system may present theuser interface 6120 where the parent can input his personal information. When the user chooses sign-in on a child's device, the safety system may present one or more of the user interfaces described with reference toFIGS. 62A and 62B , which can allow a parent to configure and view settings of a child's device. - The
user interface 6120 illustrates an embodiment of a sign-up screen. For example, a parent named Brian Smith can input his name, email, and password into the user interface element. After the parent clicks the submit button, thesafety system 110 may show a screen indicating successful registration. In some embodiments, the parent may need to activate the account. For example, thesafety system 110 may send the parent a confirmation email based on the inputted email address. The parent can open the confirmation email in his inbox and follow the instructions in the confirmation email (such as clicking on a link) to complete the activation process. - The parent can sign in using the registered account. The
user interface 6130 illustrates an embodiment of a sign in screen, where the parent can input his login credentials such as email address and password. After the user successfully logged into his account, the safety system can present theuser interface 6140, which may include alerts and summaries of child devices' activities. - The
safety system 110 can detect whether there are child devices associated with the parent's account. If the is no child device, thesafety system 110 can present theuser interface 6150 shown inFIG. 61B . The user can add a child by selecting the add a child option in theuser interface 6150 and in response, thesafety system 110 can return theuser interface 6160 which provides a reminder for installing the safety application on the child's device. -
FIGS. 62A and 62B illustrate example user interfaces when the user is signing-up with and signing-in to a safety application on a child device. Thesafety system 110 can present theuser interface 6110 when the safety application is open. The user can select sign in on child's device on theuser interface 6110. Thesafety system 110 can then present another user interface for the user to type in the login credentials, which may be the parent's login information. - The
safety system 110 can determine whether the account has already had at least one child associated with it. If thesafety system 110 determines that there is at least one child under logged in account, thesafety system 110 can present theuser interface 6210 to allow the parent to associate the device with a child. In some situations, the child who owns the device may not be on the list of children associated with the account. Theuser interface 6210 can allow the parent to add a child and associate the child with the current device. - The
safety system 110 can present theuser interfaces user interface 6230 and other personal information of the child, such as birthday and email address at theuser interface 6240. The parent can also configure how often the parent receives updates of activities on the child device at theuser interface 6240. In some implementations, the functionalities of theuser interfaces safety system 110 can present a user interface which allows the parent to input personal information of the child and to configure the update frequency. - As described herein, in some implementations, the
safety system 110 can receive the device activity data of a child device by communicating with a backup storage system (see e.g.backup storage system 5910 described inFIG. 59 ). Thesafety system 110 can presentuser interfaces user interface 6250 can allow a parent to input the child's iCloud account name and password. Once iCloud is connected, thesafety system 110 can present theuser interface 6260 which instructs the parent to turn on the options for backing up data to iCloud. - In some embodiments, the
safety system 110 can interface with other applications on the child device and acquire activity data directly from these applications. Thesafety system 110 can output auser interface 6270 which allows the parent to choose which application's activities he would like to monitor. For example, as shown in theuser interface 6270, the parent can choose to connect the child's Facebook account with thesafety system 110, while choose not to monitor the activities on Instagram. - Once the child's device has successfully been associated with the parent's account, the
safety system 110 may output a notification page such as theuser interface 6280 to inform the parent that the device registration is successful. In some implementations, at theuser interface 6280, thesafety system 110 can provide an option for the parent to enroll in the MDM service. The MDM service may identify suspicious activities, provide alerts for suspicious activities, disable certain functions of the mobile device based on a set of criteria, as well as provide other functionalities as described herein, alone or in combination. The MDM service may implemented on theremote computing system 5540. - The
user interface 6290 provides a summary on whether the certain safety functionalities are enabled on the child device. For example, as shown in theuser interface 6290, the child's iCloud is connected to thesafety system 110, and is enrolled in the MDM service. Additionally, the social network applications on the child device are also connected to thesafety system 110. Accordingly, thesafety system 110 can obtain the child's activity data from the iCloud account and the social network applications. The parent can also use the MDM service to monitor the child's activities and instruct thesafety system 110 to take an action (such as send notification to parents or disable certain functions of the child device) based on the child's activities on the device. - B. Example User Interface on a Parent Device for Viewing Activities of a Child Device
-
FIG. 63 illustrates example user interfaces of dashboard feed on a parent's device. Theuser interface 6310 shows a navigation menu which includes different categories of data. For example, if the parent chooses to view dashboard, the safety system can present theuser interface 6320. Among other things, theuser interface 6320 can show notifications of a child's social activities. As an example, it can show the child has become friend with someone on Facebook or the child has uploaded a photo onto a social network site. As another example, theuser interface 6320 can also show the child's comments on the social network site and flag any inappropriate words. The flag may include one or more visual indicators showing the word in a different color, font, size, style, and so forth. - Besides the dashboard, the parent can also choose, from the menu in the
user interface 6310, to view other activity data such as messaging data, web browsing history, location data, curfew information, photos, application usage, contact data, and bad words (for example used in comments). User interfaces associated with these functionalities are described with reference toFIGS. 65 through 71 . - In addition to or in alternative to displaying activity data on the dashboard, the
safety system 110 can also send a notification to the parent phone notifying the child device's activities. For example, thesafety system 110 can push the notification to the parent's device (such as iPhone) to activate the security application on the parent device. The security application can communicate with other modules of the parent device to display the notification on theuser interface 6330. -
FIG. 64 illustrates example user interfaces for viewing the location information of the child device. The location data may be acquired by a GPS sensor of the child device.User interface 6410 shows waypoint information of the child device. The waypoint information may be across multiple days. For example, the waypoint information may include, duration of stay at a location, start and/or end time of the duration. Theuser interface 6410 can provide a map which shows the locations of stay. Theuser interface 6410 can also show when the location data was last updated. In some implementations, the parent can customize the name of a place, such as school, home, grocery store, and so on. -
User interface 6420 can allow a parent to select among multiple children. For example, the parent may choose to view Jenny's location instead of Billy's location. In some implementations, the map can show the location of multiple children. The parent can add or hide the locations of the children on the map. - In some embodiments, the parent can filter the location information. For example, the parent can apply a time filter, such as last 7 days, yesterday, all time, etc. Suppose the parent set the time filter to last 7 days, the user interface can show a map or a list of locations associated with a child device in the past 7 days. The
safety system 110 can also determine popular locations associated with the child device. The popular locations may be identified based on the duration of stay, frequency of stay, or other factors. For example, as shown in the user interface 6450, the most popular location associated with Billy's iPhone is home. This may be because Billy spends most of his day at home. -
FIG. 65 illustrates example user interfaces which allow a parent to monitor activities associated with a specific location. For example, as shown inuser interface 6510, the parent may be interested in monitoring the child's activity at home and school. Besides these two places, the parent can also add a new place using theuser interface 6520, or delete or edit a place using theuser interface 6530. The parent can set when to receive notifications. For example, as shown in theuser interface 6520, the parent chooses to be notified when Billy's iPhone leaves and arrives at the school. -
FIG. 66A illustrates example user interfaces for viewing and searching message history on a child device. Theuser interface 6610 can show a list of messages on the child device. Thesafety system 110 can provide visual indicators for unread activities, group chats, and so on. In some implementations, inappropriate content (such as bad words) may also be flagged using the visual indicators. - The
safety system 110 can also provide a search function as shown in theuser interface 6620. The parent can search a name of a person and view a list of conversions with that person. -
FIG. 66B illustrates example user interfaces for flagging inappropriate content. The parent can configure which words are allowable and which words should be flagged in theuser interface 6630. The parent can also add and delete words in theuser interface 6630. - The
user interface 6640 can display texts and pictures as well as flag inappropriate posts (texts and/or pictures) with one or more visual indicators. Thesafety system 110 can display the content of the message on theuser interface 6640 in addition to or in alternative theuser interface 6610. -
FIG. 67 illustrates example user interfaces for viewing photos on a child's social media account. For example, thesafety system 110 can capture social network usage on the child device by interfacing thesafety system 110 with the social media applications. As shown inuser interface 6710, the parent can view pictures posted by the child on his social medial network. As shown in theuser interface 6720, thesafety system 110 can also show the comments (by the child or other persons) related to the posted photo. Thesafety system 110 can flag inappropriate comments with one or more visual indicators described herein. -
FIG. 68 illustrates example user interfaces for viewing web browsing history and blocking access to inappropriate websites by the child device. Theuser interface 6810 shows an example of searching whether a child has viewed a certain website. For example, the parent can input a portion of the domain name of the website and thesafety system 110 can return a list of search results. The safety system can also automatically check for inappropriate websites and provide notifications to parents if the child device has accessed one more of the inappropriate websites. In some embodiments, the safety system may have a default list of inappropriate websites. The parents can customize this list by adding or deleting the websites using theuser interface 6820. -
FIG. 69 illustrates example user interfaces for viewing a child's frequent contacts. These user interfaces may be generated based on the child's messaging activity, such as text messages, messages on social network, communication in a messaging application (such as FaceTime or google Hangout), and call history, alone or in combination. Thesafety system 110 can use various factors to determine who the frequent contacts are. For example, thesafety system 110 can calculate how frequently a child communicates with a person and/or how long the conversion lasts. As shown in theuser interface 6910, thesafety system 110 can also calculate the percentage of the communications with a person among all communications. - The
safety application 110 can also presentuser interface 6920 to the parent which allows the parent to apply a time filter so that the parent can view the child's frequent contacts within a specified time period. -
FIG. 70 illustrates example user interfaces for viewing application installation activities. Theuser interface 7010 shows a list of current applications installed on the child's iPhone. The parents may not want the child to have certain applications on the iPhone, such as social networking applications. The parents add these applications to applications of concern. Theuser interface 7020 can show the installation history of the application. For example, theuser interface 7020 can flag whether an application of concern has been installed or uninstalled using the visual indicators described herein. -
FIG. 71 illustrates example user interfaces for implementing a curfew feature. As shown in theuser interface 7010, thesafety system 110 can allow a parent to schedule time throughout the week to send a child device into curfew mode. Curfew mode can restrict some the smartphone features such as access to the internet and texting while permitting other features such as emergency phone. - In the
user interface 7010, the parent can select the day of the week and tap on the calendar to create a timeframe for the curfew mode. The parent can move and drag the box to adjust the timeframe. The parent can enable or disable restriction for the selected day using the on/off button at the top of each day. Thesafety system 110 can transmit a data packet to the child device. The data packet may include executable code that causes the safety application to begin executing the instructions for implementing the curfew mode. In some implementations, when the safety application is not running at the time the device is about to enter into the curfew mode, the executable code may activate the safety application and provide instructions to execute the curfew mode. The data packet may be sent at the beginning of the timeframe for the curfew mode. In some implementations, the data packet may be sent beforehand and stores at a data store of the child device, and cause the safety application to only begin executing the curfew mode at the designated time. -
User interface 7020 shows an example user interface displayed by the child device when the child device is in the curfew mode. In theuser interface 7020, all the smartphone functionalities are disabled except the call function. The system may send a notification to a parent device when the child attempts to bypass the curfew, for example, by attempting to close or minimize the safety application, to force to quit the safety application, or to delete the application. - As described above, the
safety system 110 can cause the child's phone to enter lock screen mode repeatedly during the curfew mode. Theuser interface 7130 shows an example of the lock screen mode. The child has to repeatedly enter the password to unlock the iPhone, which may disrupt the child's enjoyment of using the iPhone. As a result of this disruption, the child may give up on the attempt to unlock the iPhone and not review the content on the iPhone during the curfew hours. - C. Example User Interface for Configuring Notification Settings
-
FIG. 72 illustrates an example user interface for configuring notification settings. Theuser interface 7110 may be shown in a parent device. In theuser interface 7110, the parent can select whether to receive push notifications. For example, when the parent chooses to receive push notifications, thesafety system 110 can send notifications to the parent device without needing the parent to open the safety application on the parent device. An example of push notification is shown in theuser interface 6330 inFIG. 63 . - The parent can also select whether to receive alerts for certain types of data. For example, the parent can select whether to receive alerts based on SMS content, GPS data, web browsing history, etc. The parent can select how often he wants to receive the summary report of a child device. For example, the parent may select to receive a daily summary report, weekly summary report, etc. The reports may be sent to the parent's email address.
-
FIG. 73 illustrates a generalized structure for a computer system. Thecomputer system 7300 can be part of or used in connection with thecomputing environment 5500 shown inFIG. 55 and thecomputing environment 5900 shown inFIG. 59 , for example. Aload balancer 7310 can interact withweb servers 7320 as shown to coordinate data processing by theweb servers 7320 and thereby efficiently distribute loads across theweb servers 7320. An example device that can serve as a load balancer is an NGINX server (pronounced “engine x”). This can be advantageous because it may not rely on threads to handle requests. The web servers 7320 (or the entire structure shown inFIG. 73 ) can be examples of theremote computing system 5540 depicted and described elsewhere herein. Theweb servers 7320 can run API and HTML processes, for example. The web servers can queue imports (such as SMS, location, and social media data received from remote computing devices). This can create ajob queue 7330, as shown by thearrow 7322. Thejob queue 7330 can be an example of the temporary repository discussed elsewhere herein. - In turn, job workers, 7340, can then read from the
job queue 7330 and insert information into a logging database, for example. Thejob workers 7340 can be embodiments of thebackground process 5920 described inFIG. 59 . Anarchive database 7350 is illustrated, which can play the role of the logging database, and thearrow 7342 indicates how thejob workers 7340 can interact with thearchive database 7350. Thearchive database 7350 can be a Dynamo database. Thejob workers 7340 can also perform additional processing, which can include the analysis, flagging, and notification processes described elsewhere herein. Thejob workers 7340 can run from the same codebase, which can allow access to the same backend data such as Loopback models. Additionally, thejob workers 7340 can run on a common stack (or share other data structures). A web server and application server having support for Ruby, Python, and or Node.js can be used. One example of such a server is Phusion Passenger. In some embodiments,job workers 7340 can rely on such a web server and application server to act as a process watchdog and launcher. Thejob workers 7340 are example embodiments ofbackground processes 5920 described elsewhere herein. - Two paths are schematically illustrated between the
web servers 7320 and thearchive database 7350. A direct path is illustrated by thearrow 7352; this path can represent API read requests that run synchronously. An indirect path is illustrated by thearrow 7322, thejob queue 7330, thearrow 7332, thejob workers 7340, and thearrow 7342. This path can represent API requests that write to thearchive database 7350 and occur asynchronously. Theload balancer 7310 can help control, coordinate, schedule, smooth, throttle, and/or accelerate such processes.Web servers 7320 can include those having functions similar to NGINX, Phusion Passenger, Loopback, and/or Angular, for example. An event-driven, input/output server-side JavaScript environment based on V8 can be used, such as one having functionality similar to node.js. For building and managing APIs and connecting them with backend data sources, a node.js framework having functions similar to that of LoopBack and other Express-based tools can be used. JavaScript frameworks can be used to extend HTML functionality. A web server having functions similar to Angular can host frontend pages, for example. -
FIG. 73 also illustrates anoperational database 7360 and a workingdata store 7370. Theoperational database 7360 can be a Postgres database. Each of thedatabases data store 7370 can be part of (or interact with) thedatabase 5930 described elsewhere herein. They are illustrated separately here to assist in describing different functionality, and in some embodiments separate databases can be created and used, for convenience. In particular, anarchive database 7350 can interact with theweb servers 7320 as indicated with thearrow 7352. These servers can read data from a logging database (which can be the archive database 7350) and use that information for a dashboard (e.g., the various user interfaces described herein). Theoperational database 7360 can interact with theweb servers 7320, as indicated by thearrow 7362, to manage user account information and other non-logging related data. Many common API interactions result in direct communications between theweb servers 7320 and theoperational database 7360. - The working
data store 7370 can be a Redis database or other advanced key-value store. It can be referred to as a data structure, for example. Keys can contain strings, hashes, lists, sets, and stored sets. The workingdata store 7370 can interact with the web servers 7320 (as shown by the arrow 7372). In some embodiments, the workingdata store 7370 may also be a cache. The workingdata store 7370 can be accessed by the job workers as indicated with thearrow 7374. It can also interact with theweb servers 7320 as shown by thearrow 7372. - Description of the systems and solutions included herein refer to examples relating to use of a system by parents to improve the safety and parental knowledge about their children's activities relating to mobile devices. In several cases, the technology includes not only monitoring but also controlling remote systems so that a user such as a parent can disable or otherwise diminish functionality of a child's device, for example, in response to movement, location, behavior, violation of curfew, etc. Potential users of such systems and functionality include parents who may need to discipline or otherwise monitor or control a wayward child through mobile phone approaches. Such users can also include lenders who desire to influence repayment on a loan—for example, lenders—that may provide college students with funding for expensive mobile devices. Device functionality can be conditioned on timely or sufficient repayment under the terms of a loan contract. Companies may use similar functionality to cut costs for company hardware, data streaming, or non-business usage, for example.
- As described herein, functionality can be customized in real time or otherwise based on a remote portal access by an active user, or it can be scaled automatically according to programmable time, location, behavioral, incentive-related, or other restrictions. For example, such restriction can remove, reduce, disable, lock or otherwise affect: phone call functions, or all but phone call functions; web access and/or other data usage; texting or SMS functions; social media access; camera or other hardware, internally installed applications, regular phone functionality, emergency phone functionality, etc. A system can prioritize or otherwise sort an order for reducing functionality, and this can be based on functionality used by a child, lessor, or borrower. For example an algorithm and monitoring functionality can be used to determine the most used applications and use that information to order the functionality to be inhibited if there is a missed payment, violated curfew, behavioral breach, etc. Emergency phone access can be granted as a matter of course even when other restrictions are in place, for example. Whereas functionality can be reduced in a binary, all-or-nothing manner, it can also be advantageous to throttle down some functionality: for example, by reducing a data flow rate, reducing available memory, partially obstructing or delaying certain web access. Connection speed can be reduced, number of allowed SMS texts can be reduced, etc. Combinations of the above techniques can also be helpful—for example a deadbeat phone borrower can have his or her access or functionality of some kind first throttled down, then removed altogether, or initially turned off, only to be restored but at a slower or less functional level than was available previously.
- Control for such reduction of functionality can be achieved automatically, remotely, gradually, suddenly, specifically, or generally. For example, a parent/lender/administrator (or someone else with a legitimate need for access and control) can be provided a specific interface. This interface can allow, for example, a parent or lender to review past usage and select which functional reduction would likely be most persuasive (or tuned to the correct level of persuasiveness) for a particular user. A pre-determined order can be provided for loss of and/or reduction in functionality (e.g., for non-payment, rule violations, etc.) For example, a lender contract can provide that functions will be turned off in order of average time used per day (e.g., SMS, social apps, other apps, camera, then phone). A user may be able to pre-set parameters, thresholds, or other criteria that customize this process for a particular provider, parent, lender, business administrator, or information technology department. These parameters can correspond with contract terms or organizational (e.g., family) policies or rules. Control systems and interfaces can include active monitoring, active alerts (e.g., e-mail or text to parent or lender when something happens, such as when a rule is violated, a deadline is missed, a geographic boundary is breached, etc.). This can allow a lender, administrator, parent, etc. (collectively, user) to defer action, track compliance history, provide a warning to the device holder, etc. Device holders or other restriction subjects can have various levels of visibility (at varying levels of time delay) to this process of restriction. For example, a message to a device user can be sent informing them of the restriction and the potential future restrictions, along with information about how to remove the restrictions. This can provide a virtuous cycle of improved behavior as users learn from past mistakes and comply more readily with relevant rules. Alternatively, a stealthy mode can be employed, to increase persuasive power by sudden and unexpected changes that may be more disruptive and troubling to an offending user.
- Various approaches can be used to inhibit circumvention of the monitoring and controls described here, including prevention of hacking, spoofing, etc., and increase security and smooth functionality from the perspective of the parent or other controlling user. For examples, code for a system can be included in root directors, in firmware, or in other places more difficult to locate or remove or requiring system passwords for modification. Code can also be distributed in a difficult-to-trace manner, such that the code is difficult to locate as a single package for ready deletion, isolation, or modification.
- One approach is to provide for ongoing authorization by a valid user. Information periodically delivered to a user can be a list of ongoing blockades or restrictions, and authorization can be requested at periodic intervals such as daily, hourly, etc. The default can be to remove restrictions after a certain time, or to leave them in place until otherwise instructed. These functions can be automated and/or accomplished remotely or on-site using an administrator computer or portal, the device itself, a parental device, etc. as described herein. An ongoing confirmation can be allowed or required (such as through a ping restricted approach) to make sure they relevant functions and/or hardware are still disabled. For example, a server or PNS can send texts from various sources and make sure they bounce back as undelivered if an SMS functionality is purportedly disabled during a curfew period. In some embodiments, data backup may be warranted when restricting functionality (E.g., older texts may be archived before turning off text service).
- Functionality can be reduced in a systematic fashion that can be programmed into a mobile device, the sequence activated upon receipt of an efficient or short command having few data characters. This can be the equivalent of a green light for a previously-programmed package for execution. For example, to turn off texting functionality in response to a payment being missed or a curfew broken, a remote system (e.g., a server) can log in to a phone using a main system password. An existing program kernel can be activated within a texting program or within memory of a phone, and this can invoke a restrictive SMS process. Similarly, an approach is to initiate a small-scale, legitimate, “DNS”-style process, where large data amounts or frequent messages are sent to a mobile phone, flooding an inbox or text interface with messages that effectively reduces functionality. The messages can include encouragement to pay a bill or reduce anti-social or otherwise dangerous or rule-breaking behavior.
- A control interface can be visually viewable and accessible through more than one computing device platform. Such an interface can juxtapose usage reports (or other types of monitoring reports such as payment reports) with related functionality cut-off controls to simplify usage for a parent or user. For example, an interface can assess a contract or policy to determine which actions or lack of actions are to be accompanied by functionality reductions. If a restriction on SMS or MMS is imposed, for example, a text usage report can be juxtaposed with a control for the functionality (e.g., a texting functionality) that has been linked by contract or otherwise with the monitored activity.
- For controls relating to desired incentive systems, different levels of potential function reduction can be provided at the outset. For example, a lower credit-risk customer may be able to not only get a lower lending rate, but also a contract listing less-draconian restriction in the event of non-payment given that additional recourse may be available from a borrower with higher credit. Different levels of feature reduction can be provided for different payment plans. Systems can be automated to arrange controls by scanning legal documents to identify contractual links between behavior and functionality allowed, and arrange controls to facilitate the pre-determined consequences, or otherwise automate those consequences. Thus, a shotdown sequence can be drafted into a lending contract so a user knows and agrees to what is coming, and then that same shutdown sequence can be hard-wired or included in protected software, thereby preventing an administrative override to help avoid breaching a contract and make the process seem less objectionable and personal to a potential lender or other customer.
- In a 1st aspect, a computer system for distributing management of a parent-controllable safety monitoring system, the computer system comprising: one or more child mobile devices, each having an operating system and a plurality of applications installed thereon; at least one mobile safety application installed on each of the one or more child mobile devices, the mobile safety application configured to: run in the background along with the operating system of the child mobile device; collect child data from other applications of the plurality of applications installed on the same child mobile device; communicate the child data to a remote computing system; and control operations of the child mobile device; the at least one mobile safety application further comprising the following local agents: an apps agent configured to periodically review a memory of the child mobile device to identify one or more installed applications and usage times for those installed applications; a curfew agent configured to retrieve curfew settings from the remote computing system, schedule and implement curfew actions on the child mobile device based on the curfew settings, and notify the remote computing system of attempted curfew violations; an SMS agent configured to periodically review the memory of the child mobile device to identify content of sent and received texts; and a WWW agent configured to collect browser data; at least one local agent in the mobile safety application configured to transmit collected information from the child mobile device to the remote computing system; a parent interface for display on a parent mobile device configured to accept parent input to establish parent parameters regarding content and frequency of child device updates and warnings; a remote database configured to receive periodic updates from the child mobile device; and the remote computing system configured to receive the collected information associated with the one or more child mobile devices, analyze that information as indicated under the parent parameters, and flag inappropriate child activity based at least partly on the analysis of the collected information, thereby offloading processing loads from mobile devices to the remote computing system, reducing system lag, and improving accuracy of any warnings, curfew actions, and control operations recommended or automatically implemented on the child mobile device.
- In a 2nd aspect, the computer system of
aspect 1, wherein the remote database comprises a backup storage system associated with an iOS operating system. - In a 3rd aspect, the computer system of any one of the
aspects - In a 4th aspect, the computer system of any one of the aspects 1-3, wherein the remote computing system is further configured to send a notification of the flagged inappropriate activity to the parent mobile device.
- In a 5th aspect, the computer system of any one of the aspects 1-4, wherein the remote computing system is further configured to: identify the child mobile device associated with the flagged inappropriate activity and cause the mobile safety application to inhibit a function of the child mobile device.
- In a 6th aspect, the computer system of any one of the aspects 1-5, wherein control operations of the child device comprises: accessing a list of restricted applications; identifying whether the plurality of applications includes one or more applications on the list of restricted applications; in response to a determination that the plurality of applications includes the one or more applications on the list of restricted applications, inhibiting one or more interactions with identified applications on the child mobile device.
- In a 7th aspect, the computer system of any one of the aspects 1-6, wherein the apps agent is further configured to perform one or more of the following: restricting purchase or preventing download of a predetermined application.
- In an 8th aspect, the computer system of any one of the aspects 1-7, wherein the curfew actions comprise one or more of the following: blocking access to one or more applications on the child mobile device; inhibiting interactions with one or more applications on the child mobile device; or locking the child mobile device periodically thereby requiring repeated logins on the child mobile device.
- In a 9th aspect, the computer system of any one of the aspects 1-8, wherein the local agents further comprises one or more of the following: a device status agent configured to update the remote computing system with at least one of the following information of the child device: GPS data, internet connectivity, device power and installation status of one or more applications on the child device; a location agent configured to acquire location data from the child mobile device and transmit the location data to the remote computing system periodically; or an update frequency agent configured to coordinate frequency of updates for agents of the local agents.
- In a 10th aspect, the computer system of any one of the aspects 1-9, wherein the collected information comprises encoded information, and wherein the remote computing system is further configured to decode the collected information and parse the collected information.
- In an 11th aspect, a method for using a remote computing system to monitor one or more child computing devices, said method comprising: identifying a child computing device, the child computing device comprising a plurality of applications including a mobile safety application programmed to monitor and control the child computing device; generating a default configuration file for monitoring and controlling the child computing device; transmitting the default configuration file to the child computing device; receiving device activity data associated with the child computing device, wherein the device activity data is encoded; decrypting and parsing the device activity data to obtain information on usage of one or more applications of the plurality of applications on the mobile device; analyzing the information to identify one or more inappropriate activities; flagging the inappropriate activities; and transmitting at least the flagged inappropriate activities to a parent computing device.
- In a 12th aspect, the method of
aspect 11, wherein the mobile safety application comprises at least one of the following agents: an apps agent configured to periodically review a memory of the child mobile device to identify one or more installed applications among the plurality of applications and usage times for those installed applications; a curfew agent configured to access curfew settings, schedule and implement curfew actions on the child mobile device based on the curfew settings, and notify the parent computing device attempted curfew violations; an SMS agent configured to periodically review the memory of the child mobile device to identify content of sent and received texts; a WWW agent configured to collect browser data; a device status agent configured to monitor at least one of the following information of the child device: GPS data, internet connectivity, device power and installation status of one or more applications of the plurality of applications on the child device; a location agent configured to acquire location data from the child mobile device and transmit the acquired location data; or an update frequency agent configured to coordinate frequency of updates among the agents. - In a 13th aspect, the method of any one of the
aspects - In a 14th aspect, the method of any one of the aspects 11-13, wherein device activity data comprise at least one of the following: device location, browsing history, content of social network posts, or application installation status.
- In a 15th aspect, the method of any one of the aspects 11-14, further comprises: accessing criteria associated with inappropriate activities and flagging the inappropriate activities based on the accessed criteria.
- In a 16th aspect, the method of the
aspect 15, wherein the criteria are directed toward at least one of the following: location of the child device, word usage in a message, website browsing, or installation of applications on the child mobile device. - In a 17th aspect, the method of any one of the aspects 11-16, wherein transmitting at least the flagged inappropriate activities to the parent computing device comprises generating user interface data comprising: visual indicators associated with the flagged inappropriate activities and descriptions of the flagged inappropriate activities.
- In an 18th aspect, the method of any one of the aspects 11-17, wherein receiving device activity data is performed by communicating with at least one of the following: one or more applications of the plurality of applications or a backup data storage configured to regularly receive device activity data from the child mobile device.
- In a 19th aspect, a system for improving processing efficiency to allow parents to reduce delay in tracking smart phone activities of their children, the system comprising: one or more child software modules, a module installed on each child's smart phone, each child software module configured to: obtain device activity data from or about more than one of the smart phone's other software applications; and package the device activity data to avoid parsing and analysis on a local smart phone processor; send the device activity data to an analysis server; the analysis server, configured to: decrypt the device activity data; parse the decrypted device activity data to determine a data type and select an appropriate flagging algorithm and database; perform at least one analysis algorithm on the parsed, decrypted device activity data by comparison to the selected database; and a parent interface on a mobile device configured to: receive and display results of the analysis algorithm; provide visual warnings when harmful results have been found by the analysis algorithm, along with access to more details relating to the specific underlying data that triggered the warning; provide an interface for receiving input from a parent, the input comprising: selections of which child's data to view; and selections of which types and how much of the data and analysis results to view for each child.
- In a 20th aspect, the system of
aspect 19, wherein the analysis server is configured to parse the decrypted device activity data to associate at least one child software modules with the decrypted device activity data. - In a 21st aspect, a computer system for distributing management of a parent-controllable safety monitoring system, the computer system comprising: a non-transitory computer memory; and a processor programmed to: identify a child computing device, the child computing device comprising a plurality of applications including a mobile safety application programmed to monitor and control the child computing device by at least collecting device activity data from one or more applications of the plurality of applications on that device for analysis; generate a default configuration file that comprises settings for monitoring and controlling the child computing device; transmit the default configuration file to the child computing device, thereby imposing the settings on the child computing device; receive the collected device activity data associated with the child computing device, wherein the device activity data is encoded; decrypt and parse the device activity data to obtain information on usage of the one or more applications on the mobile device; analyze the information to identify one or more inappropriate activities based at least partly on the decrypted and parsed device activity data; flag the inappropriate activities; generate user interface data comprising information identifying the inappropriate activity; and transmit the user interface data to a parent computing device, thereby allowing a parent to monitor child activity.
- In a 22nd aspect, a computer system for distributing management of a parent-controllable safety monitoring system, the computer system comprising: a first control system configured to be executed on one or more hardware processors of a child mobile device and further configured to: run in the background along with an operating system; collect device activity data associated with a plurality of applications on the child mobile device; and communicate the device activity data to a second control system; the second control system configured to be executed on one or more hardware processors on a network computing system remote from the child mobile device and a parent computing device and further configured to: receive the device activity data associated with a plurality of applications on the child mobile device; access parent parameters, the parent parameters comprising settings for monitoring content of communications on the child mobile device, frequency of the child mobile device updates, and warnings associated with content of the device activity data; analyze the device activity data based at least partly on the parent parameters; flag an inappropriate child activity based at least partly on the analysis of the device activity; generate user interface data comprising: information identifying the inappropriate activity; and transmit the user interface data to a third control system; and the third control system configured to be executed on one or more hardware processors of the parent computing device and further configured to: receive the user interface data from the second control system; display the user interface data on the parent computing device; receive an update on one or more of the parent parameters; and generate a data packet comprising the update and computer executable instructions to implement the update on at least one of the first control system or the second control system.
- In a 23rd aspect, a computer system of
aspect 22, wherein the data packet comprising the update is configured to control the child mobile device by decreasing or increasing at least one of functionality and child access to the child mobile device features. - In a 24st aspect, a system and apparatus for allowing parents to view and track smart phone activities of their children, the system and apparatus comprising: one or more child software modules, a module installed on each child's smart phone, each child software module configured to: access and extract data from or about more than one of the smart phone's other software applications, including at least two of the following: a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application; and send the extracted data to an analysis server; the analysis server, configured to identify potentially harmful language, images, and websites by comparing the extracted data to existing databases of harmful words, harmful images or image types, harmful websites, and harmful applications; a parent portal configured to: receive results from the analysis server; display the results organized by child; provide both generalized smart phone usage data for each child and visual warnings when harmful results have been found by the analysis server, along with the specific underlying data that triggered the warning; provide an interface for receiving input from a parent, the input comprising: selections of which child's data to view; and selections of which types and how much of the data and analysis results to view for each child.
- In a 25th aspect, the system and apparatus of
aspect 24, wherein each child software module is further configured to access and extract data sufficient to allow the analysis server to report which new applications are downloaded to each child's smart phone, and that information is automatically recorded in a computer memory and displayed promptly through the parent portal. - In a 26th aspect, the system and apparatus of any one of the
aspects - In a 27th aspect, the system and apparatus of any one of the aspects 24-26, wherein each child software module is further configured to access and extract data sufficient to allow the analysis server to report each of the following: the location of the smart phone at periodic intervals throughout the day; and usage of the smart phone that occurs outside of geographic constraints that can be set through the parent portal; and that location and usage information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- In a 28th aspect, the system and apparatus of any one of the aspects 24-27, wherein each child software module is further configured to access and extract data sufficient to allow the analysis server to report usage of the smart phone that occurs during curfew periods, and that information is automatically recorded in a computer memory and displayed promptly through the parent portal.
- In a 29th aspect, the system and apparatus of any one of the aspects 24-28, wherein for each child, the parent portal is configured to display the following information on the same daily feed screen: identities of people with whom that child communicates most often, including a visual indication ranking those people by frequency or amount of communication; a daily feed of the child's activities, organized chronologically, the child's activities comprising: any smart phone applications downloaded; content of any SMS text messages sent or received; identity of any websites visited; content of any social network posts created, viewed, or sent; and a visual warning of each of the following, incorporated into the daily feed: cursing or bullying terms; questionable website visits; and breaking curfew.
- In a 30th aspect, the system and apparatus of
aspect 29, wherein for each child, the parent portal is further configured to display the following information on the same current applications screen: a list of all applications currently installed on that child's phone, a visual warning identifying applications that are identified as potentially harmful based on information in the analysis server, and a description of the functions of each of the applications in the list. - In an 31st aspect, the system and apparatus of any one of the
aspects - In a 32nd aspect, the system and apparatus of any one of the aspects 29-31, wherein for each child, the parent portal is further configured to display the following: text messages sent and received, with curse words and bullying terms highlighted; a list of most commonly used curse words and bullying terms; and an interface allowing a user of the parent portal to control if text conversations should be flagged automatically, and how many curse words or bullying terms should be allowed before a flag is automatically applied.
- In a 33rd aspect, the system and apparatus of any one of the aspects 24-32, wherein for each child, the parent portal is further configured to display the following web access information and controls: a whitelist mode that triggers warnings if the child visits any website domain that is not listed as specifically allowed; or a blacklist mode that triggers warnings for only website domains that that are flagged by a user of the parent portal or by the existing database of harmful websites accessible from the analysis server.
- In a 34th aspect, the system and apparatus of any one of the aspects 24-33, wherein an embedded map feature visible in the parent portal indicates where each child has traveled during the day and provides a warning if the child leaves a given geographical radius.
- In a 35th aspect, the system and apparatus of any one of the aspects 24-34, further including a curfew feature comprising: a control interface in the parent portal configured to allow a user of the parent portal to select restricted times that a child's smart phone may not be used; an active restriction feature in the child software module configured to completely disable the child smart phone during the restricted times, except for emergency phone calls.
- In a 36th aspect, the system and apparatus of any one of the aspects 24-35, wherein the parent portal is further configured provide an interface for receiving input from a parent, the input comprising selections of which types of harmful material should be identified, and what level of scrutiny to apply in determining harmful material.
- In a 37th aspect, the system and apparatus of aspect 36, further comprising a computer that periodically analyzes the selections from many parents regarding types of harmful material and level of scrutiny, analyzes those selections statistically, and incorporates the statistical results in setting default settings and recommendations for future users.
- In a 38th aspect, the system and apparatus of any one of the aspects 24-37, wherein the analysis server is configured to automatically identify patterns of harmful content for which helpful works of authorship have previously been created and stored in an electronic library, and provide immediate access to those works of authorship to parents by transmitting an electronic copy thereof or a link thereto to the parent portal for display adjacent to a warning based on harmful content that underlies those patterns of harmful content.
- In a 39th aspect, a computing device comprising: a communications module; a location determining module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; and a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions to at least: retrieve computing device data from the computing device; send computing device data to a control system; and receives a command from the control system based in part on analysis of the sent computing device data.
- In a 40th aspect, the computing device of aspect 39, wherein the computing device data comprises at least one of the following: incoming messages received using the communications module of the computing device; retrieve outgoing messages sent using the communications module of the computing device; or determine a location of the computing device using the location determining module
- In an 41th aspect, the computing device of any one of the aspects 39 and 40, wherein said command comprises one or more of the following: activate the location determining module; disable the location determining module; disable the communications module; activate the communications module; or selectively deactivate one or features of the computing device for a predetermined time period.
- In a 42nd aspect, a system for monitoring one or more computing devices, said system comprising: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions to at least: receive communications data from one or more controlled computing devices; analyze received communications data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- In a 43rd aspect, a system for monitoring one or more computing devices, said system comprising: a memory device comprising a controller module stored thereon as computer-executable instructions; a hardware processor configured to implement the controller module by executing the computer-executable instructions to at least: receive location data from one or more controlled computing devices; analyze received location data; and transmit notification data to one or more controlling computing devices based on the received communications data.
- In a 44th aspect, a computing device comprising: a communications module; a memory device comprising a mobile safety module stored thereon as computer-executable instructions; a hardware processor configured to implement the mobile safety module by executing the computer-executable instructions to at least: select notification settings; receive notification data based on the selected notification settings; and send command data to control an operation of a controlled computing device.
- In a 45th aspect, a computing system configured to access one or more databases in substantially real-time in response to input from a parent provided in an interactive user interface in order to determine information related to a user system and provide the determined information to the parent in the interactive user interface, the computing system comprising: a network interface coupled to a data network for receiving and transmitting one or more packet flows; a computer processor; and a computer readable storage medium storing program instructions configured for execution by the computer processor in order to cause the computing system to: generate user interface data for rendering the interactive user interface on a computing device, the interactive user interface including an indication of a first controlled device associated with a first child of the parent, wherein the indication of the first controlled device is selectable by the parent in order to initiate analysis of usage pattern of the first controlled device and provide results of the analysis to the parent in substantially real-time; transmit the user interface data to the computing device; receive an identification of a selection by the parent of a second controlled device associated with a second child of the parent in the interactive user interface; access a database storing analysis data for the second controlled device associated with the second child of the parent; update the user interface data such that the interactive user interface includes indications of at least a subset of determined high frequency contacts; and transmit the updated user interface data to the computing device. The technical aspects, problems and solutions discussed herein can stand independently or can depend on one another.
- Conditional language used herein, such as, among others, “can,” “might,” “may,” “for example,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or states. Thus, such conditional language is not generally intended to imply that features, elements and/or states are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or states are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. In addition, the articles “a” and “an” are to be construed to mean “one or more” or “at least one” unless specified otherwise.
- Conjunctive language such as the phrase “at least one of X, Y and Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be either X, Y or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y and at least one of Z to each be present.
- While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the devices or algorithms illustrated can be made without departing from the spirit of the disclosure. Thus, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module, or block is necessary or indispensable. As will be recognized, the processes described herein can be embodied within a form that does not provide all of the features and benefits set forth herein, as some features can be used or practiced separately from others. The scope of protection is defined by the appended claims rather than by the foregoing description.
- Reference throughout this specification to “some embodiments” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least some embodiments. Thus, appearances of the phrases “in some embodiments” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment and may refer to one or more of the same or different embodiments. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.
- As used in this application, the terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list.
- Similarly, it should be appreciated that in the above description of embodiments, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that any claim require more features than are expressly recited in that claim. Rather, inventive aspects lie in a combination of fewer than all features of any single foregoing disclosed embodiment. Accordingly, no feature or group of features is necessary or indispensable to each embodiment.
- A number of applications, publications, and external documents may be incorporated by reference herein. Any conflict or contradiction between a statement in the body text of this specification and a statement in any of the incorporated documents is to be resolved in favor of the statement in the body text.
- Although described in the illustrative context of certain preferred embodiments and examples, it will be understood by those skilled in the art that the disclosure extends beyond the specifically described embodiments to other alternative embodiments and/or uses and obvious modifications and equivalents. Thus, it is intended that the scope of the claims which follow should not be limited by the particular embodiments described above.
Claims (23)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/355,367 US20200053099A1 (en) | 2015-06-25 | 2019-03-15 | Management and control of mobile computing device using local and remote software agents |
US17/156,460 US20210286889A1 (en) | 2015-06-25 | 2021-01-22 | Management and control of mobile computing device using local and remote software agents |
US17/938,646 US20230161893A1 (en) | 2015-06-25 | 2022-10-06 | Management and control of mobile computing device using local and remote software agents |
US18/474,110 US20240232414A9 (en) | 2015-06-25 | 2023-09-25 | Management and control of mobile computing device using local and remote software agents |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562184797P | 2015-06-25 | 2015-06-25 | |
US201662354054P | 2016-06-23 | 2016-06-23 | |
US15/192,619 US10237280B2 (en) | 2015-06-25 | 2016-06-24 | Management and control of mobile computing device using local and remote software agents |
US16/355,367 US20200053099A1 (en) | 2015-06-25 | 2019-03-15 | Management and control of mobile computing device using local and remote software agents |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/192,619 Continuation US10237280B2 (en) | 2015-06-25 | 2016-06-24 | Management and control of mobile computing device using local and remote software agents |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/156,460 Continuation US20210286889A1 (en) | 2015-06-25 | 2021-01-22 | Management and control of mobile computing device using local and remote software agents |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200053099A1 true US20200053099A1 (en) | 2020-02-13 |
Family
ID=57586009
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/192,619 Active US10237280B2 (en) | 2015-06-25 | 2016-06-24 | Management and control of mobile computing device using local and remote software agents |
US16/355,367 Abandoned US20200053099A1 (en) | 2015-06-25 | 2019-03-15 | Management and control of mobile computing device using local and remote software agents |
US17/156,460 Abandoned US20210286889A1 (en) | 2015-06-25 | 2021-01-22 | Management and control of mobile computing device using local and remote software agents |
US17/938,646 Abandoned US20230161893A1 (en) | 2015-06-25 | 2022-10-06 | Management and control of mobile computing device using local and remote software agents |
US18/474,110 Pending US20240232414A9 (en) | 2015-06-25 | 2023-09-25 | Management and control of mobile computing device using local and remote software agents |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/192,619 Active US10237280B2 (en) | 2015-06-25 | 2016-06-24 | Management and control of mobile computing device using local and remote software agents |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/156,460 Abandoned US20210286889A1 (en) | 2015-06-25 | 2021-01-22 | Management and control of mobile computing device using local and remote software agents |
US17/938,646 Abandoned US20230161893A1 (en) | 2015-06-25 | 2022-10-06 | Management and control of mobile computing device using local and remote software agents |
US18/474,110 Pending US20240232414A9 (en) | 2015-06-25 | 2023-09-25 | Management and control of mobile computing device using local and remote software agents |
Country Status (5)
Country | Link |
---|---|
US (5) | US10237280B2 (en) |
EP (1) | EP3314924A4 (en) |
AU (1) | AU2016283117A1 (en) |
CA (1) | CA2990184A1 (en) |
WO (1) | WO2016210327A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804167A (en) * | 2018-06-12 | 2018-11-13 | 北京智明星通科技股份有限公司 | A kind of method, apparatus and server of identification pupil player |
US10686931B1 (en) * | 2018-12-04 | 2020-06-16 | Ncr Corporation | Smartphone messaging apps interaction with airport smart artificial intelligence |
US10880708B1 (en) * | 2017-01-27 | 2020-12-29 | Allstate Insurance Company | Early notification of driving status to a mobile device |
WO2021198744A1 (en) * | 2020-04-04 | 2021-10-07 | Mir Sharifi Seyed Javad | Ardbit software |
US11201899B1 (en) * | 2015-09-02 | 2021-12-14 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US11323765B1 (en) | 2020-10-26 | 2022-05-03 | T-Mobile Usa, Inc. | Recording manager |
US11757958B1 (en) | 2015-09-02 | 2023-09-12 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
Families Citing this family (172)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10984913B2 (en) * | 2012-04-27 | 2021-04-20 | Netspective Communications Llc | Blockchain system for natural language processing |
WO2014143776A2 (en) | 2013-03-15 | 2014-09-18 | Bodhi Technology Ventures Llc | Providing remote interactions with host device using a wireless device |
US10789642B2 (en) | 2014-05-30 | 2020-09-29 | Apple Inc. | Family accounts for an online content storage sharing service |
EP3195098B1 (en) | 2014-07-21 | 2024-10-23 | Apple Inc. | Remote user interface |
KR102319896B1 (en) | 2014-08-02 | 2021-11-02 | 애플 인크. | Context-specific user interfaces |
US10102374B1 (en) | 2014-08-11 | 2018-10-16 | Sentinel Labs Israel Ltd. | Method of remediating a program and system thereof by undoing operations |
US9710648B2 (en) | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US10452253B2 (en) | 2014-08-15 | 2019-10-22 | Apple Inc. | Weather user interface |
WO2016036413A1 (en) | 2014-09-02 | 2016-03-10 | Apple Inc. | Multi-dimensional object rearrangement |
US10073590B2 (en) | 2014-09-02 | 2018-09-11 | Apple Inc. | Reduced size user interface |
WO2016036603A1 (en) | 2014-09-02 | 2016-03-10 | Apple Inc. | Reduced size configuration interface |
US9792957B2 (en) | 2014-10-08 | 2017-10-17 | JBF Interlude 2009 LTD | Systems and methods for dynamic video bookmarking |
US9875346B2 (en) | 2015-02-06 | 2018-01-23 | Apple Inc. | Setting and terminating restricted mode operation on electronic devices |
US10134255B2 (en) * | 2015-03-03 | 2018-11-20 | Technomirai Co., Ltd. | Digital future now security system, method, and program |
WO2016144385A1 (en) | 2015-03-08 | 2016-09-15 | Apple Inc. | Sharing user-configurable graphical constructs |
US20160304004A1 (en) * | 2015-04-16 | 2016-10-20 | Thorley Industries Llc | Child restraint system |
US10582265B2 (en) | 2015-04-30 | 2020-03-03 | JBF Interlude 2009 LTD | Systems and methods for nonlinear video playback using linear real-time video players |
EP3337583B1 (en) | 2015-08-20 | 2024-01-17 | Apple Inc. | Exercise-based watch face |
US10272921B2 (en) * | 2015-08-25 | 2019-04-30 | International Business Machines Corporation | Enriched connected car analysis services |
US10460765B2 (en) | 2015-08-26 | 2019-10-29 | JBF Interlude 2009 LTD | Systems and methods for adaptive and responsive video |
GB2557556A (en) * | 2015-11-25 | 2018-06-20 | Walmart Apollo Llc | Unmanned aerial delivery to secure location |
US10762245B2 (en) * | 2015-12-17 | 2020-09-01 | Ncr Corporation | Input peripheral device security |
EP4080794A1 (en) | 2016-01-06 | 2022-10-26 | TVision Insights, Inc. | Systems and methods for assessing viewer engagement |
US11540009B2 (en) | 2016-01-06 | 2022-12-27 | Tvision Insights, Inc. | Systems and methods for assessing viewer engagement |
US10103947B2 (en) * | 2016-01-08 | 2018-10-16 | Universal Research Solutions, Llc | Processing of portable device data |
JP6841241B2 (en) * | 2016-02-08 | 2021-03-10 | ソニー株式会社 | Information processing equipment, information processing methods, and programs |
US10440025B2 (en) | 2016-06-07 | 2019-10-08 | Gryphon Online Safety, Inc | Remotely controlling access to online content |
US11301572B2 (en) | 2016-02-27 | 2022-04-12 | Gryphon Online Safety, Inc. | Remotely controlling access to online content |
US11240215B2 (en) * | 2016-04-11 | 2022-02-01 | Avaya Inc. | Temporary control of components using location based grants |
US11856271B2 (en) | 2016-04-12 | 2023-12-26 | JBF Interlude 2009 LTD | Symbiotic interactive video |
DK201670595A1 (en) | 2016-06-11 | 2018-01-22 | Apple Inc | Configuring context-specific user interfaces |
US10389725B2 (en) | 2016-06-29 | 2019-08-20 | International Business Machines Corporation | Enhance computer security by utilizing an authorized user set |
US20180041532A1 (en) * | 2016-08-03 | 2018-02-08 | Roblox Corporation | System for Handling Communicated Threats |
US20180063318A1 (en) * | 2016-08-23 | 2018-03-01 | Santhosh Muralidharan | Automobile safety system for a drivers mobile device |
CA3036706A1 (en) | 2016-10-04 | 2018-04-12 | Walmart Apollo, Llc | Landing pad receptacle for package delivery and receipt |
US10534925B2 (en) * | 2016-10-05 | 2020-01-14 | Microsoft Technology Licensing, Llc | Detection of compromised devices via user states |
US9992639B1 (en) * | 2016-11-19 | 2018-06-05 | Avni P Singh | Semantically-enabled controlled sharing of objects in a distributed messaging platform |
US10410494B2 (en) | 2016-12-12 | 2019-09-10 | K&M Bristol Holdings, LLC | Electronic device and computer application monitoring, alert, and intervention system and method |
US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US11050809B2 (en) | 2016-12-30 | 2021-06-29 | JBF Interlude 2009 LTD | Systems and methods for dynamic weighting of branched video paths |
US10334408B2 (en) * | 2016-12-30 | 2019-06-25 | Brett Seidman | Mobile communication system and method of gaffe prevention |
CN108289110B (en) | 2017-01-09 | 2021-10-08 | 斑马智行网络(香港)有限公司 | Device association method and device, terminal device and operating system |
CN108289111B (en) * | 2017-01-09 | 2021-10-08 | 斑马智行网络(香港)有限公司 | Service providing method, device, terminal equipment and operating system |
US10721624B2 (en) * | 2017-02-17 | 2020-07-21 | Global Tel*Link Corporation | Security system for inmate wireless devices |
US20180287920A1 (en) * | 2017-03-30 | 2018-10-04 | Ca, Inc. | Intercepting application traffic monitor and analyzer |
WO2018195391A1 (en) * | 2017-04-20 | 2018-10-25 | Tvision Insights, Inc. | Methods and apparatus for multi-television measurements |
WO2018208243A1 (en) * | 2017-05-10 | 2018-11-15 | Inovent Fikri Mulkiyet Haklari Yonetim Ticaret Ve Yatirim A.S. | Plurally controllable automated robotic system for children |
DK179412B1 (en) | 2017-05-12 | 2018-06-06 | Apple Inc | Context-Specific User Interfaces |
WO2018213692A1 (en) | 2017-05-19 | 2018-11-22 | John Carnahan | Systems and methods for objective-based scoring using machine learning techniques |
US11755449B1 (en) * | 2017-06-01 | 2023-09-12 | Alarm.Com Incorporated | Screen feed analytics |
CN107315606A (en) * | 2017-06-14 | 2017-11-03 | 北京小米移动软件有限公司 | Using update method and device |
US10498844B2 (en) * | 2017-06-26 | 2019-12-03 | Tune, Inc. | Universal deep linking |
JP6640798B2 (en) * | 2017-07-31 | 2020-02-05 | グリー株式会社 | Application usage management program, application usage management method, server, management program, and management user terminal |
US10923227B2 (en) * | 2017-08-03 | 2021-02-16 | Episode Solutions, LLC | Tracking program interface |
US10462171B2 (en) * | 2017-08-08 | 2019-10-29 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US10572692B2 (en) * | 2017-08-11 | 2020-02-25 | Hewlett Packard Enterprise Development Lp | Detecting camera access breaches |
US10075811B1 (en) | 2017-08-16 | 2018-09-11 | Tile, Inc. | Tracking device operation in risk-classified zone |
JP2019041187A (en) * | 2017-08-23 | 2019-03-14 | 京セラ株式会社 | Portable terminal and system |
CN109753322B (en) * | 2017-08-29 | 2022-04-15 | 武汉斗鱼网络科技有限公司 | Method and device for accelerating application program on IOS platform |
US10097490B1 (en) | 2017-09-01 | 2018-10-09 | Global Tel*Link Corporation | Secure forum facilitator in controlled environment |
US10673854B2 (en) * | 2017-09-12 | 2020-06-02 | Amazon Technologies, Inc. | Proactively limiting functionality |
US11520606B2 (en) * | 2017-09-22 | 2022-12-06 | Vmware, Inc. | Dynamic generation of user interface components based on hierarchical component factories |
US11003757B1 (en) * | 2017-10-17 | 2021-05-11 | Atlassian Pty Ltd. | Application authenticity verification in digital distribution systems |
US10536440B2 (en) | 2017-10-23 | 2020-01-14 | Disney Enterprises, Inc. | User account access management |
US11259235B2 (en) * | 2017-11-03 | 2022-02-22 | Blackout Technologies Group Ltd. | Blocking functionality on a smart device |
US10628591B2 (en) * | 2017-11-20 | 2020-04-21 | Forcepoint Llc | Method for fast and efficient discovery of data assets |
US10749870B2 (en) | 2017-11-21 | 2020-08-18 | Vmware, Inc. | Adaptive device enrollment |
US10986078B2 (en) | 2017-11-21 | 2021-04-20 | Vmware, Inc. | Adaptive device enrollment |
US10972468B2 (en) | 2017-11-21 | 2021-04-06 | Vmware, Inc. | Adaptive device enrollment |
US10798103B2 (en) * | 2017-11-21 | 2020-10-06 | VWware, Inc. | Adaptive device enrollment |
US20190190915A1 (en) * | 2017-12-15 | 2019-06-20 | John Barrera | Method and apparatus to configure and regulate network access of devices |
US10257578B1 (en) | 2018-01-05 | 2019-04-09 | JBF Interlude 2009 LTD | Dynamic library display for interactive videos |
US10064007B1 (en) | 2018-01-22 | 2018-08-28 | International Business Machines Corporation | Cognitive geofence updates |
US11470115B2 (en) | 2018-02-09 | 2022-10-11 | Attivo Networks, Inc. | Implementing decoys in a network environment |
US10257052B1 (en) | 2018-02-28 | 2019-04-09 | Heart Thinking Technologies GmbH | Computer-implemented method performed by an electronic data processing apparatus to more efficiently utilize network resources for at least one user device and data processing apparatus for the same |
US11029808B2 (en) * | 2018-03-01 | 2021-06-08 | PAG Financial International LLC | Systems and methods for generating a dynamically adjustable dial pad |
US10956670B2 (en) | 2018-03-03 | 2021-03-23 | Samurai Labs Sp. Z O.O. | System and method for detecting undesirable and potentially harmful online behavior |
US10678948B2 (en) * | 2018-03-29 | 2020-06-09 | Bank Of America Corporation | Restricted multiple-application user experience via single-application mode |
US10878129B2 (en) * | 2018-04-30 | 2020-12-29 | Cyberark Software Ltd. | Classification of GUI items according to exposure to security sensitive operations |
US11327650B2 (en) | 2018-05-07 | 2022-05-10 | Apple Inc. | User interfaces having a collection of complications |
US10558546B2 (en) * | 2018-05-08 | 2020-02-11 | Apple Inc. | User interfaces for controlling or presenting device usage on an electronic device |
US10609208B2 (en) | 2018-05-08 | 2020-03-31 | Apple Inc. | Managing device usage |
US11601721B2 (en) * | 2018-06-04 | 2023-03-07 | JBF Interlude 2009 LTD | Interactive video dynamic adaptation and user profiling |
CN112740160A (en) * | 2018-06-19 | 2021-04-30 | Gps史派西网络有限责任公司 | Geo-fence based location tracking and notification triggering system |
US11025638B2 (en) | 2018-07-19 | 2021-06-01 | Forcepoint, LLC | System and method providing security friction for atypical resource access requests |
US10878202B2 (en) * | 2018-08-03 | 2020-12-29 | International Business Machines Corporation | Natural language processing contextual translation |
US11134087B2 (en) | 2018-08-31 | 2021-09-28 | Forcepoint, LLC | System identifying ingress of protected data to mitigate security breaches |
KR20200034020A (en) | 2018-09-12 | 2020-03-31 | 삼성전자주식회사 | Electronic apparatus and control method thereof |
US20190096523A1 (en) * | 2018-09-15 | 2019-03-28 | Mark Taniguchi | Home care options compliance tablet for post-acute-care patients |
US10405133B1 (en) * | 2018-10-02 | 2019-09-03 | Titan Health & Security Technologies, Inc. | Geofenced mesh network communication |
CN109614813B (en) * | 2018-10-31 | 2020-06-23 | 阿里巴巴集团控股有限公司 | Privacy transaction method and device based on block chain and application method and device thereof |
US11171980B2 (en) | 2018-11-02 | 2021-11-09 | Forcepoint Llc | Contagion risk detection, analysis and protection |
US11245723B2 (en) | 2018-11-02 | 2022-02-08 | Forcepoint, LLC | Detection of potentially deceptive URI (uniform resource identifier) of a homograph attack |
US11082429B2 (en) | 2018-11-05 | 2021-08-03 | Citrix Systems, Inc. | Providing access to content within a computing environment |
US10534928B1 (en) * | 2018-11-19 | 2020-01-14 | Live Nation Entertainment, Inc. | Systems and methods for dynamic queue control using machine learning techniques |
US11295026B2 (en) | 2018-11-20 | 2022-04-05 | Forcepoint, LLC | Scan, detect, and alert when a user takes a photo of a computer monitor with a mobile phone |
US11297099B2 (en) | 2018-11-29 | 2022-04-05 | Forcepoint, LLC | Redisplay computing with integrated data filtering |
US11050767B2 (en) | 2018-12-17 | 2021-06-29 | Forcepoint, LLC | System for identifying and handling electronic communications from a potentially untrustworthy sending entity |
US20200228612A1 (en) * | 2019-01-16 | 2020-07-16 | Joshua Salters | Digital assistant system providing advanced customizable services for a user |
US11379426B2 (en) | 2019-02-05 | 2022-07-05 | Forcepoint, LLC | Media transfer protocol file copy detection |
WO2020170112A1 (en) * | 2019-02-18 | 2020-08-27 | Fido Voice Sp. Z O.O. | Method and apparatus for detection and classification of undesired online activity and intervention in response |
US11468757B2 (en) * | 2019-03-05 | 2022-10-11 | Gary Thomas Baker, Jr. | Systems and methods for facilitating supervision of individuals based on geofencing |
US20230056959A1 (en) * | 2019-03-05 | 2023-02-23 | Gary Thomas Baker, Jr. | Systems and methods for facilitating supervision of individuals based on geofencing |
US11562093B2 (en) | 2019-03-06 | 2023-01-24 | Forcepoint Llc | System for generating an electronic security policy for a file format type |
US11003746B1 (en) * | 2019-03-25 | 2021-05-11 | Ca, Inc. | Systems and methods for preventing electronic form data from being electronically transmitted to untrusted domains |
US12022292B2 (en) | 2019-04-11 | 2024-06-25 | Netspark Ltd. | Partial limitation of a mobile network device |
US11131967B2 (en) | 2019-05-06 | 2021-09-28 | Apple Inc. | Clock faces for an electronic device |
US11960701B2 (en) | 2019-05-06 | 2024-04-16 | Apple Inc. | Using an illustration to show the passing of time |
US11468197B2 (en) * | 2019-05-06 | 2022-10-11 | Apple Inc. | Configuring context-based restrictions for a computing device |
AU2020239670B2 (en) * | 2019-05-06 | 2021-07-15 | Apple Inc. | Restricted operation of an electronic device |
WO2020236981A1 (en) | 2019-05-20 | 2020-11-26 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
DK201970533A1 (en) | 2019-05-31 | 2021-02-15 | Apple Inc | Methods and user interfaces for sharing audio |
US11363137B2 (en) | 2019-06-01 | 2022-06-14 | Apple Inc. | User interfaces for managing contacts on another electronic device |
US11240367B1 (en) * | 2019-06-05 | 2022-02-01 | Brook S. Parker-Bello | System, method, and apparatus for coordinating resources to prevent human trafficking and assist victims of human trafficking |
US11599622B2 (en) | 2019-06-21 | 2023-03-07 | Bank Of America Corporation | System for resource monitoring and transmitting electronic alerts using event-based triggers |
US11140109B2 (en) * | 2019-06-24 | 2021-10-05 | Safe Communications Consultants, Llc | System and method for transparent communications |
CN110489690B (en) * | 2019-06-26 | 2022-10-25 | 中电万维信息技术有限责任公司 | Method, server, device and storage medium for monitoring government affair service application system |
CN113692563A (en) * | 2019-06-27 | 2021-11-23 | 苹果公司 | Modifying existing content based on target audience |
US11374939B2 (en) * | 2019-06-30 | 2022-06-28 | Microsoft Technology Licensing, Llc | Managing application constraints across platforms |
US11589094B2 (en) * | 2019-07-22 | 2023-02-21 | At&T Intellectual Property I, L.P. | System and method for recommending media content based on actual viewers |
US11190840B2 (en) * | 2019-07-23 | 2021-11-30 | Rovi Guides, Inc. | Systems and methods for applying behavioral-based parental controls for media assets |
GB201914255D0 (en) * | 2019-10-02 | 2019-11-13 | Censorpic Ltd | Improvements in and relating to content identification |
CN110766091B (en) * | 2019-10-31 | 2024-02-27 | 上海观安信息技术股份有限公司 | Method and system for identifying trepanning loan group partner |
US11868395B1 (en) | 2019-11-26 | 2024-01-09 | ShotSpotz LLC | Systems and methods for linking geographic segmented areas to tokens using artwork |
US11816146B1 (en) | 2019-11-26 | 2023-11-14 | ShotSpotz LLC | Systems and methods for processing media to provide notifications |
US11436290B1 (en) | 2019-11-26 | 2022-09-06 | ShotSpotz LLC | Systems and methods for processing media with geographical segmentation |
WO2021108329A1 (en) | 2019-11-27 | 2021-06-03 | Pearce Richard J | Assembly and method for preventing wireless communication while driving |
WO2021111430A1 (en) | 2019-12-03 | 2021-06-10 | 1.Netspark Ltd | Fast network recognition of active applications for real time user notification |
US11405772B2 (en) | 2019-12-09 | 2022-08-02 | Amplify Development, LLC | Monitoring and direct communications between mobile devices system and method |
US12096081B2 (en) | 2020-02-18 | 2024-09-17 | JBF Interlude 2009 LTD | Dynamic adaptation of interactive video players using behavioral analytics |
US11372659B2 (en) | 2020-05-11 | 2022-06-28 | Apple Inc. | User interfaces for managing user interface sharing |
DK202070624A1 (en) | 2020-05-11 | 2022-01-04 | Apple Inc | User interfaces related to time |
CN115552375A (en) | 2020-05-11 | 2022-12-30 | 苹果公司 | User interface for managing user interface sharing |
US12047637B2 (en) | 2020-07-07 | 2024-07-23 | JBF Interlude 2009 LTD | Systems and methods for seamless audio and video endpoint transitions |
US11310659B2 (en) * | 2020-07-10 | 2022-04-19 | Cisco Technology, Inc. | Techniques for provisioning an enterprise electronic subscriber identity module (ESIM) profile for an enterprise user |
US11140240B1 (en) * | 2020-07-14 | 2021-10-05 | Facebook, Inc. | Generating a dynamic dependent client device activity dashboard and managing contact-control privileges via managing client device interfaces |
US11605041B2 (en) | 2020-08-13 | 2023-03-14 | Bank Of America Corporation | Machine learning based decision model to open and close enterprise facilities |
US11785456B2 (en) | 2020-08-18 | 2023-10-10 | Cisco Technology, Inc. | Delivering standalone non-public network (SNPN) credentials from an enterprise authentication server to a user equipment over extensible authentication protocol (EAP) |
US11270603B1 (en) | 2020-09-11 | 2022-03-08 | Bank Of America Corporation | Real-time disability identification and preferential interaction modification |
US20220083183A1 (en) * | 2020-09-14 | 2022-03-17 | Apple Inc. | Device management user interface |
US11582253B2 (en) | 2020-09-16 | 2023-02-14 | Bank Of America Corporation | Automated monitoring of proximate devices |
WO2022060612A1 (en) * | 2020-09-21 | 2022-03-24 | Jamf Software, Llc | Monitoring web-based exams |
US20220124407A1 (en) * | 2020-10-21 | 2022-04-21 | Plantronics, Inc. | Content rated data stream filtering |
US11718254B2 (en) * | 2020-11-03 | 2023-08-08 | Rod Partow-Navid | Impact prevention and warning system |
US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
US11694590B2 (en) | 2020-12-21 | 2023-07-04 | Apple Inc. | Dynamic user interface with time indicator |
US11720239B2 (en) | 2021-01-07 | 2023-08-08 | Apple Inc. | Techniques for user interfaces related to an event |
US20220277050A1 (en) * | 2021-03-01 | 2022-09-01 | Microsoft Technology Licensing, Llc | Identifying search terms by reverse engineering a search index |
US20220294788A1 (en) * | 2021-03-09 | 2022-09-15 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US11921992B2 (en) | 2021-05-14 | 2024-03-05 | Apple Inc. | User interfaces related to time |
US11882337B2 (en) | 2021-05-28 | 2024-01-23 | JBF Interlude 2009 LTD | Automated platform for generating interactive videos |
CN113238872B (en) * | 2021-06-21 | 2024-01-23 | 北京飞思特信息技术有限公司 | Distributed examination service system based on USB flash disk |
KR102484251B1 (en) * | 2021-07-05 | 2023-01-03 | 서울대학교산학협력단 | Method and apparatus for providing online meeting capable of detecting online meeting and blocking diruption factors |
US11564081B1 (en) | 2021-07-06 | 2023-01-24 | Cisco Technology, Inc. | Auto-update and activation of locale-specific eSIM profile for a global enterprise user |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
US20230019723A1 (en) * | 2021-07-14 | 2023-01-19 | Rovi Guides, Inc. | Interactive supplemental content system |
US12081623B2 (en) * | 2021-09-14 | 2024-09-03 | Comcast Cable Communications, Llc | Network restriction circumvention management |
US11997756B2 (en) * | 2021-09-21 | 2024-05-28 | At&T Intellectual Property I, L.P. | Detection of unlikely travel of mobile devices indicative of fraudulent mobile device usage |
US11934477B2 (en) | 2021-09-24 | 2024-03-19 | JBF Interlude 2009 LTD | Video player integration within websites |
WO2023070151A1 (en) * | 2021-10-26 | 2023-05-04 | Yoochooz Apps Pty Ltd | An electronic message content intercepting system |
US20230236547A1 (en) | 2022-01-24 | 2023-07-27 | Apple Inc. | User interfaces for indicating time |
CN114553872B (en) * | 2022-02-24 | 2023-12-29 | 吴振星 | Cloud-based data center infrastructure management system and method |
CN114745566B (en) * | 2022-04-15 | 2023-10-20 | 北京搜狐新动力信息技术有限公司 | Teenager mode management method, related device and computer storage medium |
US12047339B2 (en) * | 2022-05-02 | 2024-07-23 | Snap Inc. | Monitoring user activity on messaging platform |
US20230370406A1 (en) * | 2022-05-10 | 2023-11-16 | At&T Intellectual Property I, L.P. | Detection and notification of electronic influence |
WO2024047611A1 (en) | 2022-09-03 | 2024-03-07 | Haazoyi Investments Ltd. | Digital content moderation |
US20240114206A1 (en) * | 2022-09-30 | 2024-04-04 | Motorola Mobility Llc | Variable Concurrent Access to Content of a Device by Multiple Devices |
US11743298B1 (en) | 2022-10-13 | 2023-08-29 | Netskope, Inc. | Machine learning-based risk determination and recommendations for web access |
US11677788B1 (en) | 2022-10-13 | 2023-06-13 | Netskope, Inc. | Policy-controlled web access based on user activities |
US20240259640A1 (en) * | 2023-01-27 | 2024-08-01 | Adeia Guides Inc. | Systems and methods for levaraging machine learning to enable user-specific real-time information services for identifiable objects within a video stream |
Family Cites Families (178)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6795856B1 (en) | 2000-06-28 | 2004-09-21 | Accountability International, Inc. | System and method for monitoring the internet access of a computer |
US9107030B2 (en) | 2000-12-13 | 2015-08-11 | Thomas E. Coverstone | Communication system for sending advertisements based on location determination and previously specified user selections |
US6353778B1 (en) | 2001-03-15 | 2002-03-05 | International Business Machines Corporation | Automobile computer control system for limiting the usage of wireless telephones on moving automobiles |
US20030033582A1 (en) | 2001-05-09 | 2003-02-13 | Wavemarket, Inc. | Representations for estimating distance |
US7493651B2 (en) | 2001-05-17 | 2009-02-17 | Nokia Corporation | Remotely granting access to a smart environment |
US20050043036A1 (en) | 2001-07-05 | 2005-02-24 | Ioppe Igor V | Apparatus and method for obtaining location information of mobile stations in a wireless communications network |
JP2004535744A (en) | 2001-07-16 | 2004-11-25 | ウェーブマーケット・インコーポレーテッド | System for providing alert-based services to mobile stations in wireless communication networks |
US7739707B2 (en) | 2001-11-20 | 2010-06-15 | Starz Entertainment, Llc | Parental controls using view limits |
US20030233447A1 (en) | 2002-06-13 | 2003-12-18 | International Business Machines Corporation | Apparatus and methods for monitoring content requested by a client device |
US20040021567A1 (en) | 2002-08-02 | 2004-02-05 | Tim Dunn | Method and apparatus of distance-based location alarm |
US7110753B2 (en) | 2002-09-26 | 2006-09-19 | Siemens Communications, Inc. | Remotely controllable wireless device |
US8122137B2 (en) | 2002-11-18 | 2012-02-21 | Aol Inc. | Dynamic location of a subordinate user |
US8918840B2 (en) | 2002-12-26 | 2014-12-23 | Better Dating Bureau, Inc. | Systems and methods for identity-based communication gate for social networks |
EP1590975B1 (en) | 2003-02-05 | 2014-06-18 | Longhorn Acquisition, LLC | Use of triggers and a location hypercube to enable push-based location applications |
WO2004077797A2 (en) | 2003-02-25 | 2004-09-10 | Boston Communications Group, Inc. | Method and system for providing supervisory control over wireless phone usage |
US20040180648A1 (en) | 2003-03-11 | 2004-09-16 | Motorola, Inc. | Method and apparatus for constraining services for a communication device |
US7231218B2 (en) | 2003-03-18 | 2007-06-12 | Openwave Systems Inc. | Lawful intercept service |
US7406715B2 (en) * | 2003-03-19 | 2008-07-29 | Intel Corp. | Controlling and remotely monitoring accessed network data |
US8000695B2 (en) | 2003-06-30 | 2011-08-16 | Alcatel Lucent | Communication device employment of one or more restrictions to make determination of allowability of one or more communication sessions |
US20050015612A1 (en) | 2003-07-14 | 2005-01-20 | Jing-Lung You | Parent-children interactive intelligent management system |
WO2005031544A2 (en) | 2003-09-26 | 2005-04-07 | Disney Enterprises, Inc. | Cell phone parental control |
CA2542352A1 (en) | 2003-10-10 | 2005-04-21 | Enfora, L.P. | Controlling the use of a wireless mobile communication device |
US7594019B2 (en) | 2003-11-12 | 2009-09-22 | Intel Corporation | System and method for adult approval URL pre-screening |
US20050130633A1 (en) | 2003-12-15 | 2005-06-16 | Lee Hill | Methods, systems and computer program products for controlling usage of a mobile terminal |
US7046139B2 (en) | 2004-04-26 | 2006-05-16 | Matsushita Electric Industrial Co., Ltd. | Method and parental control and monitoring of usage of devices connected to home network |
US7881733B2 (en) | 2004-11-05 | 2011-02-01 | Wirelesswerx International, Inc. | Method and system to monitor and control devices utilizing wireless media |
US20060099940A1 (en) | 2004-11-10 | 2006-05-11 | Pfleging Gerald W | Method for changing the status of a mobile apparatus |
US7280816B2 (en) | 2004-12-23 | 2007-10-09 | Agere Systems Inc. | Techniques for monitoring mobile telecommunications for shared accounts |
US20060148490A1 (en) | 2005-01-04 | 2006-07-06 | International Business Machines Corporation | Method and apparatus for dynamically altering the operational characteristics of a wireless phone by monitoring the phone's movement and/or location |
US8005913B1 (en) | 2005-01-20 | 2011-08-23 | Network Protection Sciences, LLC | Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications |
US8472923B2 (en) * | 2005-03-10 | 2013-06-25 | At&T Intellectual Property Ii, L.P. | Monitoring mobile phone communications |
RU2007138561A (en) | 2005-03-18 | 2009-04-27 | Сикер Уайрлесс Пти Лимитед (Au) | METHOD AND SYSTEM OF IMPROVED DETERMINATION OF MOBILE PHONE LOCATION |
WO2006096923A1 (en) | 2005-03-18 | 2006-09-21 | Seeker Wireless Pty Limited | Enhanced mobile location |
US7353034B2 (en) | 2005-04-04 | 2008-04-01 | X One, Inc. | Location sharing and tracking using mobile phones or other wireless devices |
EP1872150B9 (en) | 2005-04-08 | 2013-04-10 | WaveMarket, Inc. (d/b/a Location Labs) | Mobile location |
US8437729B2 (en) | 2005-05-10 | 2013-05-07 | Mobile Communication Technologies, Llc | Apparatus for and system for enabling a mobile communicator |
US20060293057A1 (en) | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
US7369845B2 (en) | 2005-07-28 | 2008-05-06 | International Business Machines Corporation | Managing features available on a portable communication device based on a travel speed detected by the portable communication device |
US7720463B2 (en) | 2005-09-02 | 2010-05-18 | Tekelec | Methods, systems, and computer program products for providing third party control of access to media content available via broadcast and multicast service (BCMCS) |
US7505784B2 (en) | 2005-09-26 | 2009-03-17 | Barbera Melvin A | Safety features for portable electronic device |
US8270933B2 (en) | 2005-09-26 | 2012-09-18 | Zoomsafer, Inc. | Safety features for portable electronic device |
US8412191B2 (en) | 2005-09-29 | 2013-04-02 | Qualcomm Incorporated | Cellular telephone service management |
RU2008120700A (en) | 2005-10-24 | 2009-12-10 | Сикер Уайрлесс Пти Лимитед (Au) | MOBILE SUPPORT MANAGEMENT |
WO2007051223A1 (en) | 2005-11-04 | 2007-05-10 | Seeker Wireless Pty Limited | Profile based communications service |
US7397365B2 (en) | 2005-11-21 | 2008-07-08 | Lucent Technologies Inc. | Vehicle speeding alert system for GPS enabled wireless devices |
US20070150918A1 (en) | 2005-12-22 | 2007-06-28 | Sony Ericsson Mobile Communications Ab | Methods, devices, and computer program products for providing parental control over access to media content using a mobile terminal |
US8027662B1 (en) | 2006-02-22 | 2011-09-27 | Sprint Spectrum L.P. | Parental monitoring via cell phones with media capture and location reporting |
US8079044B1 (en) | 2006-04-10 | 2011-12-13 | Rovi Guides, Inc. | Systems and methods for providing parental control asset searching |
US8131763B2 (en) | 2006-05-03 | 2012-03-06 | Cellco Partnership | Age verification and content filtering systems and methods |
US8225380B2 (en) | 2006-05-25 | 2012-07-17 | Celltrust Corporation | Methods to authenticate access and alarm as to proximity to location |
US8290509B2 (en) | 2006-06-23 | 2012-10-16 | The Invention Science Fund I, Llc | Deactivation system and method for a transferable device |
US20080005325A1 (en) | 2006-06-28 | 2008-01-03 | Microsoft Corporation | User communication restrictions |
US20080020803A1 (en) | 2006-07-18 | 2008-01-24 | Motorola, Inc. | Methods and devices for restricting access to mobile communication device functionality |
US8131205B2 (en) | 2008-05-01 | 2012-03-06 | Michael Rosen | Mobile phone detection and interruption system and method |
US8611928B1 (en) | 2006-08-23 | 2013-12-17 | Aol Inc. | Location-based parental controls |
US8437460B2 (en) | 2006-08-30 | 2013-05-07 | At&T Intellectual Property I, L.P. | User supervision and notification |
US20090002147A1 (en) | 2006-08-30 | 2009-01-01 | Sony Ericsson Mobile Communications Ab | Method for safe operation of mobile phone in a car environment |
US20080065746A1 (en) | 2006-09-07 | 2008-03-13 | Ace*Comm Corporation | Consumer configurable mobile communication web filtering solution |
US8095124B2 (en) | 2006-10-20 | 2012-01-10 | Verizon Patent And Licensing Inc. | Systems and methods for managing and monitoring mobile data, content, access, and usage |
US8190754B2 (en) | 2006-12-14 | 2012-05-29 | Verizon Patent And Licensing Inc. | Parental controls in a media network |
US7996005B2 (en) | 2007-01-17 | 2011-08-09 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US9324074B2 (en) * | 2007-01-17 | 2016-04-26 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US20100087194A1 (en) | 2007-03-13 | 2010-04-08 | Macnaughtan Malcolm David | Enhanced zone determination |
US7970388B2 (en) | 2007-04-01 | 2011-06-28 | Time Warner Cable Inc. | Methods and apparatus for providing multiple communications services with unified parental notification and/or control features |
US7809797B2 (en) | 2007-04-06 | 2010-10-05 | Symantec Corporation | Parental control using social metrics system and method |
US20080276311A1 (en) | 2007-05-04 | 2008-11-06 | Stefan Kassovic | Method, Apparatus, and software for a multi-phase packet filter for internet access |
US20080300967A1 (en) | 2007-06-04 | 2008-12-04 | David John Buckley | Interactive Marketing, Product/Market Research, Contact Access and Usage Tracking for Wireless |
US7945238B2 (en) | 2007-06-28 | 2011-05-17 | Kajeet, Inc. | System and methods for managing the utilization of a communications device |
US8116726B2 (en) | 2007-08-30 | 2012-02-14 | Motorola Mobility, Inc. | Parent and child mobile communication devices with feature control and call-back |
US20090064314A1 (en) | 2007-08-31 | 2009-03-05 | Lee Michael M | Method and Apparatus for Implementing Parental Controls for a Portable Media Device |
AU2008301216A1 (en) | 2007-09-17 | 2009-03-26 | Seeker Wireless Pty Limited | Systems and methods for triggering location based voice and/or data communications to or from mobile radio terminals |
US8170342B2 (en) | 2007-11-07 | 2012-05-01 | Microsoft Corporation | Image recognition of content |
US8358846B2 (en) | 2007-11-13 | 2013-01-22 | Symantec Corporation | Scanning images for pornography |
EP2215869B1 (en) | 2007-11-26 | 2012-06-06 | WaveMarket, Inc. (d/b/a Location Labs) | Method and system for updating a zone profile |
US8307029B2 (en) | 2007-12-10 | 2012-11-06 | Yahoo! Inc. | System and method for conditional delivery of messages |
US20090149205A1 (en) | 2007-12-10 | 2009-06-11 | Zipit Wireless Inc. | System And Method For Regulating Data Messaging Between A Wireless Device And A Mobile Communication Device Using Short Message Service |
US8229669B2 (en) | 2007-12-31 | 2012-07-24 | Wavemarket, Inc. | Navigation system implementing dynamic route correction |
US7814163B2 (en) | 2008-01-03 | 2010-10-12 | Apple Inc. | Text-based communication control for personal communication device |
US20090215387A1 (en) | 2008-01-16 | 2009-08-27 | Brennan Joseph P | In-vehicle cellular device blocker to restrict cellular use for operator |
US8595336B1 (en) | 2008-02-01 | 2013-11-26 | Wimm Labs, Inc. | Portable universal personal storage, entertainment, and communication device |
US20090215466A1 (en) | 2008-02-22 | 2009-08-27 | Darcy Ahl | Mobile phone based system for disabling a cell phone while traveling |
US8868741B2 (en) | 2008-03-03 | 2014-10-21 | Leapfrog Enterprises, Inc. | Method and apparatus for custodial monitoring, filtering, and approving of content |
US8107670B2 (en) | 2008-03-11 | 2012-01-31 | Symantec Corporation | Scanning images for pornography |
US8787171B2 (en) | 2008-04-07 | 2014-07-22 | Wavemarket, Inc. | Efficient collection of wireless transmitter characteristics |
US8200238B2 (en) | 2008-06-17 | 2012-06-12 | Trimble Navigation Limited | System having doppler-based control of a mobile device |
US20100014497A1 (en) | 2008-07-15 | 2010-01-21 | Qualcomm Incorporated | Selectively restricing participation in communication sessions at a communications device within a wireless communications system |
US9078043B2 (en) | 2008-08-01 | 2015-07-07 | Verizon Patent And Licensing Inc. | Media source monitoring and parental awards |
US8380176B2 (en) | 2008-08-08 | 2013-02-19 | Websafery, Inc. | Method of inhibiting functions of a mobile communications device |
US20100045451A1 (en) | 2008-08-25 | 2010-02-25 | Neeraj Periwal | Speed reduction, alerting, and logging system |
US8712429B2 (en) | 2008-09-11 | 2014-04-29 | At&T Intellectual Property I, L.P. | Managing device functionality during predetermined conditions |
US8204649B2 (en) | 2008-10-09 | 2012-06-19 | University Of Utah Research Foundation | Integrated systems and method for preventing mobile computing device use while driving |
US8434126B1 (en) | 2009-02-02 | 2013-04-30 | Symantec Corporation | Methods and systems for aiding parental control policy decisions |
US20100223673A1 (en) | 2009-02-27 | 2010-09-02 | At&T Intellectual Property I, L.P. | Providing multimedia content with access restrictions |
US8413217B2 (en) | 2009-03-04 | 2013-04-02 | Qualcomm Incorporated | Systems and methods for controlling operation of a mobile station |
US7801512B1 (en) | 2009-03-05 | 2010-09-21 | Makor Issues And Rights Ltd. | Traffic speed enforcement based on wireless phone network |
US8490176B2 (en) | 2009-04-07 | 2013-07-16 | Juniper Networks, Inc. | System and method for controlling a mobile device |
US8548492B2 (en) | 2009-05-12 | 2013-10-01 | Andrew Llc | System and method for locating WiMAX or LTE subscriber stations |
CN102742242A (en) * | 2009-08-07 | 2012-10-17 | 瑞典爱立信有限公司 | Method and arrangements for control of consumption of content services |
US9762961B2 (en) | 2009-08-10 | 2017-09-12 | Steelseries Aps | Apparatus and method for managing parental control |
US8825036B2 (en) | 2009-08-20 | 2014-09-02 | T-Mobile Usa, Inc. | Parent telecommunication device configuration of activity-based child telecommunication device |
US8353050B2 (en) | 2009-09-02 | 2013-01-08 | Research In Motion Limited | Mobile device management |
CA2772399C (en) | 2009-09-03 | 2014-09-16 | Virtual Piggy, Inc. | Parent match |
BR112012004972A2 (en) | 2009-09-03 | 2016-04-12 | Virtual Piggy Inc | parental reproduction |
US8347362B2 (en) | 2009-09-30 | 2013-01-01 | Alcatel Lucent | Usage control services performed in an end user device |
US8443436B1 (en) | 2009-10-21 | 2013-05-14 | Symantec Corporation | Systems and methods for diverting children from restricted computing activities |
US20110105130A1 (en) | 2009-10-30 | 2011-05-05 | Openwave Systems, Inc. | Back-channeled packeted data |
US20110167342A1 (en) | 2009-12-08 | 2011-07-07 | Isaac De La Pena | Child-safe media interaction |
US20120084349A1 (en) | 2009-12-30 | 2012-04-05 | Wei-Yeh Lee | User interface for user management and control of unsolicited server operations |
US8918901B2 (en) | 2010-02-04 | 2014-12-23 | Ca, Inc. | System and method for restricting access to requested data based on user location |
US9043928B1 (en) | 2010-02-24 | 2015-05-26 | Sprint Communications L.P. | Enabling web page tracking |
US8655965B2 (en) | 2010-03-05 | 2014-02-18 | Qualcomm Incorporated | Automated messaging response in wireless communication systems |
US8606298B2 (en) | 2010-03-11 | 2013-12-10 | Electronics And Telecommunications Research Institute | System and method for tracking location of mobile terminal using TV |
US20110227730A1 (en) | 2010-03-22 | 2011-09-22 | Brent Stevenson | System and apparatus for locating and surveillance of persons and/or surroundings |
US8219542B2 (en) | 2010-03-25 | 2012-07-10 | Boku, Inc. | Systems and methods to provide access control via mobile phones |
US8798610B2 (en) | 2010-03-26 | 2014-08-05 | Intel Corporation | Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone |
JP5397699B2 (en) | 2010-03-31 | 2014-01-22 | 日本電気株式会社 | Mobile communication terminal and function restriction control method thereof |
US20130104246A1 (en) | 2010-04-30 | 2013-04-25 | Howard R. Bear | E-mail, text, and message monitoring system and method |
US9204193B2 (en) | 2010-05-14 | 2015-12-01 | Rovi Guides, Inc. | Systems and methods for media detection and filtering using a parental control logging application |
US9497164B2 (en) | 2010-05-27 | 2016-11-15 | At&T Intellectual Property I, L.P. | System and method of redirecting internet protocol traffic for network based parental controls |
US9015253B1 (en) * | 2010-07-15 | 2015-04-21 | Amber Watch Foundation | System and method for copying text messages of a minor to be monitored by a guardian |
US8418223B1 (en) | 2010-07-19 | 2013-04-09 | Symantec Corporation | Systems and methods for updating parental-control settings |
US20120023548A1 (en) | 2010-07-26 | 2012-01-26 | Research In Motion Limted | Apparatus, and an associated method, for implementing a parental control feature at a wireless device |
US20120028624A1 (en) | 2010-07-30 | 2012-02-02 | TCMD Holdings, LLC | System and method for improving mobile device safety by selectively disabling device features during unsafe operational conditions |
US8838077B2 (en) | 2010-09-02 | 2014-09-16 | Verizon Patent And Licensing Inc. | Mobile services access management methods and systems |
US20120135705A1 (en) | 2010-11-15 | 2012-05-31 | Chet Thaker | Tools for mobile safety for children |
US8880107B2 (en) | 2011-01-28 | 2014-11-04 | Protext Mobility, Inc. | Systems and methods for monitoring communications |
US8548443B2 (en) | 2011-03-16 | 2013-10-01 | Dell Products L.P. | System and method for selectively restricting portable information handling system features |
US9043455B1 (en) | 2011-04-06 | 2015-05-26 | Cellco Partnership | Universal data remote |
US9076020B2 (en) | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
US20120311673A1 (en) | 2011-06-01 | 2012-12-06 | Comcast Cable Communications, Llc | Media usage monitoring and control |
US8949928B2 (en) | 2011-06-22 | 2015-02-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for personalizing parental control in a PCC architecture |
US20130013705A1 (en) | 2011-07-08 | 2013-01-10 | Image Vision Labs, Inc. | Image scene recognition |
US8718633B2 (en) | 2011-07-13 | 2014-05-06 | Qualcomm Incorporated | Intelligent parental controls for wireless devices |
WO2013016666A2 (en) * | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Mobile device usage control in a mobile network by a distributed proxy system |
US8699998B2 (en) * | 2011-08-10 | 2014-04-15 | Qualcomm Incorporated | Controlling text messages on a mobile device |
US8571538B2 (en) | 2011-08-10 | 2013-10-29 | Qualcomm Incorporated | Web-based parental controls for wireless devices |
US9286617B2 (en) | 2011-08-12 | 2016-03-15 | Redbox Automated Retail, Llc | System and method for applying parental control limits from content providers to media content |
US8583112B2 (en) | 2011-09-26 | 2013-11-12 | Klone Mobile, LLC | End user controlled temporary mobile phone service device swapping system and method |
US9529996B2 (en) | 2011-10-11 | 2016-12-27 | Citrix Systems, Inc. | Controlling mobile device access to enterprise resources |
US20130097261A1 (en) | 2011-10-13 | 2013-04-18 | Howard R. Baer | Safe and monitored virtual world |
US20130124192A1 (en) | 2011-11-14 | 2013-05-16 | Cyber360, Inc. | Alert notifications in an online monitoring system |
US9060004B1 (en) | 2011-11-16 | 2015-06-16 | Symantec Corporation | Systems and methods for maintaining location-aware virtualization layers |
US8942692B2 (en) | 2011-12-02 | 2015-01-27 | Text Safe Teens, Llc | Remote mobile device management |
US9154901B2 (en) | 2011-12-03 | 2015-10-06 | Location Labs, Inc. | System and method for disabling and enabling mobile device functional components |
US9113497B2 (en) | 2011-12-16 | 2015-08-18 | Yip Yap, Inc. | Non-cellular wireless entertainment phone, system and architecture |
CN103188227A (en) | 2011-12-29 | 2013-07-03 | 北京网秦天下科技有限公司 | Method and system for conducting parental control over mobile equipment |
US20130178151A1 (en) | 2012-01-10 | 2013-07-11 | Eliyahu Itzhaki | Safe mobile cellular phone primarily for children |
US8640190B1 (en) | 2012-02-09 | 2014-01-28 | Symantec Corporation | Parental control policy generation |
CN103294965B (en) | 2012-02-16 | 2016-06-15 | 克利特股份有限公司 | Parent-child guidance support for social networks |
US9049305B2 (en) | 2012-03-30 | 2015-06-02 | Verizon Patent And Licensing Inc. | Granular control system |
US20130263001A1 (en) | 2012-04-03 | 2013-10-03 | Google Inc. | Restricting operation of a client device to parent approved content |
US8412154B1 (en) | 2012-04-10 | 2013-04-02 | Tangoe, Inc. | System and method for managing a mobile device |
US9223986B2 (en) | 2012-04-24 | 2015-12-29 | Samsung Electronics Co., Ltd. | Method and system for information content validation in electronic devices |
US9489531B2 (en) | 2012-05-13 | 2016-11-08 | Location Labs, Inc. | System and method for controlling access to electronic devices |
US20130318628A1 (en) | 2012-05-25 | 2013-11-28 | Htc Corporation | Systems and Methods for Providing Access to Computer Programs Based on Physical Activity Level of a User |
US8843953B1 (en) | 2012-06-24 | 2014-09-23 | Time Warner Cable Enterprises Llc | Methods and apparatus for providing parental or guardian control and visualization over communications to various devices in the home |
US9847948B2 (en) | 2012-07-09 | 2017-12-19 | Eturi Corp. | Schedule and location responsive agreement compliance controlled device throttle |
US20140096180A1 (en) | 2012-09-28 | 2014-04-03 | Ansuya Negi | System, devices, and methods for proximity-based parental controls |
US9043826B1 (en) | 2012-10-19 | 2015-05-26 | Cox Communications, Inc. | User based parental controls |
US9554190B2 (en) | 2012-12-20 | 2017-01-24 | Location Labs, Inc. | System and method for controlling communication device use |
US8793207B1 (en) | 2013-01-24 | 2014-07-29 | Kaspersky Lab Zao | System and method for adaptive control of user actions based on user's behavior |
US20140256305A1 (en) | 2013-03-11 | 2014-09-11 | Roman Ginis | Methods and systems for mode scheduling in mobile devices |
US10560324B2 (en) * | 2013-03-15 | 2020-02-11 | Location Labs, Inc. | System and method for enabling user device control |
US20140280944A1 (en) | 2013-03-15 | 2014-09-18 | John Montgomery | Educational content access control system |
US9148762B2 (en) | 2013-05-09 | 2015-09-29 | W2W, Llc | Safecell 360™ wireless policy enforcement management (WPEM) solution |
US9069458B2 (en) | 2013-05-16 | 2015-06-30 | Barnes & Noble College Booksellers, Llc | Kid mode user interface with application-specific configurability |
US9282368B2 (en) | 2013-05-30 | 2016-03-08 | Verizon Patent And Licensing Inc. | Parental control system using more restrictive setting for media clients based on occurrence of an event |
US20150032887A1 (en) | 2013-07-29 | 2015-01-29 | Zerodesktop, Inc. | Cloud-Based Access Management and Activity Monitoring of Mobile Devices |
US9723487B2 (en) | 2013-08-19 | 2017-08-01 | American Megatrends, Inc. | Mobile device security system |
US9071958B2 (en) | 2013-09-18 | 2015-06-30 | Lisa Marie Mullins | Systems and methods to remotely restrict the use of mobile device |
US9247294B2 (en) | 2013-10-24 | 2016-01-26 | At&T Intellectual Property I, Lp | Method and apparatus for managing communication activities of a communication device |
WO2015094984A1 (en) | 2013-12-16 | 2015-06-25 | Avinash Singh | System and process for controlling a portable device |
US9485206B2 (en) | 2013-12-19 | 2016-11-01 | Websafety, Inc. | Devices and methods for improving web safety and deterrence of cyberbullying |
US9762462B2 (en) | 2014-02-28 | 2017-09-12 | Verizon Patent And Licensing Inc. | Method and apparatus for providing an anti-bullying service |
US20150288802A1 (en) | 2014-04-07 | 2015-10-08 | Nathan Medina | System and Mehtod for Managing the Use of a Mobile Device |
US9542567B2 (en) | 2014-04-30 | 2017-01-10 | Rovi Guides, Inc. | Methods and systems for enabling media guidance application operations based on biometric data |
US9172705B1 (en) | 2014-07-10 | 2015-10-27 | Forcefield Online, Inc | System and method for remote, interactive network and browsing supervision, monitoring, and approval |
US20160294962A1 (en) * | 2015-03-31 | 2016-10-06 | Vonage Network Llc | Methods and systems for management and control of mobile devices |
-
2016
- 2016-06-24 US US15/192,619 patent/US10237280B2/en active Active
- 2016-06-24 WO PCT/US2016/039361 patent/WO2016210327A1/en active Application Filing
- 2016-06-24 EP EP16815423.5A patent/EP3314924A4/en not_active Withdrawn
- 2016-06-24 CA CA2990184A patent/CA2990184A1/en not_active Abandoned
- 2016-06-24 AU AU2016283117A patent/AU2016283117A1/en not_active Abandoned
-
2019
- 2019-03-15 US US16/355,367 patent/US20200053099A1/en not_active Abandoned
-
2021
- 2021-01-22 US US17/156,460 patent/US20210286889A1/en not_active Abandoned
-
2022
- 2022-10-06 US US17/938,646 patent/US20230161893A1/en not_active Abandoned
-
2023
- 2023-09-25 US US18/474,110 patent/US20240232414A9/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11201899B1 (en) * | 2015-09-02 | 2021-12-14 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US11757958B1 (en) | 2015-09-02 | 2023-09-12 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US12120160B1 (en) | 2015-09-02 | 2024-10-15 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US10880708B1 (en) * | 2017-01-27 | 2020-12-29 | Allstate Insurance Company | Early notification of driving status to a mobile device |
CN108804167A (en) * | 2018-06-12 | 2018-11-13 | 北京智明星通科技股份有限公司 | A kind of method, apparatus and server of identification pupil player |
US10686931B1 (en) * | 2018-12-04 | 2020-06-16 | Ncr Corporation | Smartphone messaging apps interaction with airport smart artificial intelligence |
WO2021198744A1 (en) * | 2020-04-04 | 2021-10-07 | Mir Sharifi Seyed Javad | Ardbit software |
US11323765B1 (en) | 2020-10-26 | 2022-05-03 | T-Mobile Usa, Inc. | Recording manager |
Also Published As
Publication number | Publication date |
---|---|
EP3314924A4 (en) | 2019-02-20 |
US20240232414A9 (en) | 2024-07-11 |
WO2016210327A1 (en) | 2016-12-29 |
CA2990184A1 (en) | 2016-12-29 |
US20170149795A1 (en) | 2017-05-25 |
EP3314924A1 (en) | 2018-05-02 |
US20230161893A1 (en) | 2023-05-25 |
US20210286889A1 (en) | 2021-09-16 |
AU2016283117A1 (en) | 2018-01-25 |
US10237280B2 (en) | 2019-03-19 |
US20240135020A1 (en) | 2024-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10237280B2 (en) | Management and control of mobile computing device using local and remote software agents | |
US20200014790A1 (en) | Devices and methods for improving web safety and deterrence of cyberbullying | |
AU2014364406A1 (en) | Devices and methods for improving web safety and deterrence of cyberbullying | |
US10735432B2 (en) | Personalized inferred authentication for virtual assistance | |
US11005986B2 (en) | Managing device usage | |
US10777060B2 (en) | Electronic device and computer application monitoring, alert, and intervention system and method | |
US10257127B2 (en) | Email personalization | |
KR20190102308A (en) | Data content filter | |
US20200366636A1 (en) | Initiating a business messaging session | |
CN113906721B (en) | Initiating an enterprise messaging session | |
US11507691B2 (en) | File system for persisting data privacy | |
US20210209254A1 (en) | Rule-based control of communication devices | |
Rich | My Online Privacy for Seniors | |
TW202402076A (en) | Offline mesh messaging network with bluetooth broadcasting | |
KR20240158359A (en) | Managing device usage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: KNOBBE, MARTENS, OLSON & BEAR, LLP, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:WEBSAFETY, INC.;REEL/FRAME:053992/0971 Effective date: 20200504 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: WEBSAFETY, INC., MONTANA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:KNOBBE, MARTENS, OLSON & BEAR, LLP;REEL/FRAME:058942/0011 Effective date: 20220131 |