WO2020237293A1 - Method for monitoring electronic device activity - Google Patents
Method for monitoring electronic device activity Download PDFInfo
- Publication number
- WO2020237293A1 WO2020237293A1 PCT/AU2020/050515 AU2020050515W WO2020237293A1 WO 2020237293 A1 WO2020237293 A1 WO 2020237293A1 AU 2020050515 W AU2020050515 W AU 2020050515W WO 2020237293 A1 WO2020237293 A1 WO 2020237293A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user device
- data
- communication
- predefined criteria
- administrator
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012544 monitoring process Methods 0.000 title claims abstract description 45
- 230000000694 effects Effects 0.000 title claims abstract description 18
- 238000001514 detection method Methods 0.000 claims abstract description 13
- 238000004891 communication Methods 0.000 claims description 65
- 230000003993 interaction Effects 0.000 claims description 5
- 230000001413 cellular effect Effects 0.000 claims description 4
- 238000004458 analytical method Methods 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 5
- 206010010144 Completed suicide Diseases 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 208000019901 Anxiety disease Diseases 0.000 description 2
- 241001626506 Philypnodon Species 0.000 description 2
- 230000036506 anxiety Effects 0.000 description 2
- 230000003370 grooming effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001568 sexual effect Effects 0.000 description 2
- 241000543375 Sideroxylon Species 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004630 mental health Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 231100000736 substance abuse Toxicity 0.000 description 1
- 208000011117 substance-related disease Diseases 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/128—Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0222—Message structure or message content, e.g. message protocol
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0269—System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/028—Communication between parent and child units via remote transmission means, e.g. satellite network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Definitions
- the invention relates to a method for monitoring electronic device activity.
- the invention relates, but is not limited, to a method for monitoring electronic communications and activities to detect and prevent online bullying, anxiety, depression, online grooming, suicide and sexual explicit language.
- the method further comprises detecting at least one substantial match with one or more predefined criteria.
- the data is associated with one or more applications of the user device.
- the data comprises communication data associated with a communication application and/or location data.
- the communication data comprises calling data and/or messaging data.
- the location data is associated with a location of the user device determined by a GPS or cellular network.
- the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
- the data comprises activity data associated with an application installed on the user device.
- the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
- the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
- the data is associated with an interaction between a source device (the user device) and a target device.
- the data is associated with an incoming or outgoing communication.
- communication between the administrator device and the user device is established by an application server.
- the data of the user device is transmitted to the application server, wherein the application server analyses the data for the one or more substantial matches with the one or more predefined criteria.
- the application server analyses the data for the one or more substantial matches with the one or more predefined criteria.
- transmitting an alert notification from the application server to the administrator device upon detection of at least one substantial match with at least one of the one or more predefined criteria on the user device, transmitting an alert notification from the application server to the administrator device
- the method comprises the further steps of:
- the method comprises the further steps of:
- the predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
- the alert notification comprises a push message indicating a predefined criteria has been detected on the user device.
- the method comprises the further step of disabling or restricting one or more features of the user device.
- the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device.
- the application server communicates directly with an application installed on the user device and thereby effects operation and/or control of the user device.
- an updated device profile is pushed to the user device via a mobile device management (MDM) profile.
- MDM mobile device management
- the method comprises the further steps of remotely controlling the user device from the administrator device using the link established between the administrator device and the user device.
- connection comprises a wireless, data exchanging connection.
- the step of monitoring data of a user device further comprises monitoring data received by and/or sent from the user device.
- the invention resides in a non-transitory computer- readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for: establishing a wireless connection between a user device and an administrator device;
- the user device comprises a smartphone.
- the administrator device comprises a smartphone.
- the administrator device is in wireless communication or connection with a plurality of user devices.
- the invention resides in a system for monitoring online communications, the system comprising: an administrator device; and a user device in wireless communication (or a wireless connection) with the administrator device, wherein the user device is programmed to: monitor data of the user device analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
- the invention provides a method for monitoring electronic device activity, the method comprising the steps of: establishing a wireless connection between a user device and an administrator device; monitoring data of a user device; analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
- FIG. 1 illustrates a schematic diagram of a system for monitoring electronic communications of user devices according to an embodiment of the invention
- FIG. 2 illustrates a block diagram of a method for monitoring electronic communications of user devices according to an embodiment of the invention.
- FIG. 3 illustrates a diagram of two electronic devices that can be used to implement the embodiments of the invention shown in FIG. 1 and FIG. 2.
- FIG. 1 shows a schematic diagram of a system 100 adapted to provide a service for monitoring electronic communications and activities conducted through smartphone applications and limit or prevent online bullying.
- the illustrated system 100 includes an administrator device in the form of a parent device 105 having an administrator application 106, in the form of monitoring software, installed thereon, and user child devices 110a, 110b each having a monitoring application 111a, 111 b, also in the form of software installed thereon.
- the monitoring applications 111 a, 111 b installed on each user device 110a, 110b can be installed by downloading from an appropriate location (such as an application store or mirror), pushed from the administrator device 105 to each user device 110a, 110b over a network (such as a cellular network or WAN, for example) or can be integrated into the firmware or operating system of each user device 110a, 11 Ob.
- user device 110a, 110b is also in communication with an unmonitored device 115.
- Each of the devices described above are in communication with each relevant device over a network 120
- the parent device 105 establishes a connection with each of the user devices 110a, 110b having an instance of the monitoring application 111 a, 111 b installed which are to be monitored.
- the connection can be established by an application server 120 which stores and verifies user profiles 121 associated with specific devices (such as parent device 105 and user devices 110a, 1110b), wherein the user of parent device 105 logs into an account or profile stored on the application server 120 and adds the user devices 110a, 110b to the account to link the three devices 105, 110a, 110b together.
- the analysis comprises finding exact matches and substantial matches of the data being transmitted to and/or from the device 110a, 110b (including from unmonitored device 115 and elsewhere) with one or more predefined criteria.
- predefined criteria can include predefined text strings included in SMS, emails, MMS or other electronic messages, images, audio clips, or video clips.
- predefined criteria is not limited to text strings and can include a number of indicators or user configured filters.
- the monitoring application is configured to allow a user to define a dictionary of words, phrases (including slang terms and phrases, references to bullying, anxiety, depression, online grooming, suicide and sexual terms, for example) and elements (which can include location data, images, emojis, certain phone numbers/emails/accounts, etc.) which the user of the administrator device has predetermined to be potentially indicative of undesired conduct (i.e. bullying).
- the monitoring application is thereby configured to capture any communication data that is received or transmitted from the user device at any time for monitoring purposes. This can be particularly useful for identifying bullying that has not been reported or bullying occurring from new or unidentified sources.
- an alert notification is created by the application server 120 and transmitted to the parent device 105 to alert the user of the parent device 105 that bullying may be taking place.
- the user device 110a, 110b detects the match, the user device 110a, 110b will communicate the detection to the application server 120 which then alerts the parent device 105.
- the alert notifications are typically transmitted directly to the parent device 105 and thereby an administrator (such as a parent) is not required to access an intermediary database or service to access data that has been identified as a match to the predefined criteria.
- an administrator such as a parent
- the hardware and software required to run the monitoring system resides on the administrator and user devices 105, 110a, 110b.
- one or more features of the user device 110a, 110b are automatically disabled or restricted.
- a prompt may be sent to the administrator device 105 requesting a confirmation instruction to disable or restrict one or more features of the user device at the discretion of the user of the administrator device.
- the administrator device 105 upon identification of a substantial match, is granted remote access and control of the user device 110a, 110b at the discretion of the user of the administrator device 105.
- control of the user device that the administrator device may have include blocking access to certain installed applications on the user device, timed access control, activity monitoring, remote formatting and clearing of the device, remote locking of the device, disabling or restricting the ability to install applications on the user device, preventing access to specific websites and disabling specific features of the device such as the camera, for example.
- application server 120 collects and organises communication data in a database.
- the communication data can include electronic data that is sent to or sent by a user or user device by accessing applications installed on the user devices 110a, 110b.
- the application server 120 communicates directly with the monitoring application 111 a installed on the user device 110a and thereby effects operation and/or control of the user device 110a.
- an updated device profile is pushed to the user device 110b via a mobile device management (MDM) profile.
- MDM mobile device management
- the user devices 110a, 110b belong to one or more bullies who are sending intimidating/threatening/bullying communications and/or one or more victims of bullying who are receiving the intimidating/threatening/bullying communications.
- the application may be installed on any known device associated with a bully or a victim.
- the application is installed on a victim’s device to monitor and collect data received from one or more bullies through various sources (such phone calls, messages and social networks, for example).
- the monitoring application can be remotely pushed to a user device from an administrator device.
- the monitoring application may be integrated into a user device’s firmware. As a result, the application will not be detectable from a task manager or application control panel, and thus may be hidden from users to prevent the monitoring application from being disabled or uninstalled.
- the monitoring application installed on a user device runs in as a background task or program, allowing the application actively monitor incoming and outgoing communications without being present or“on top” on a display of the user device.
- the user devices include mobile phones and/or another other computing device capable of receiving, accessing, sending, and/or storing data.
- the service platform 120 determines data to collect based on the user applications and devices related to a source of harassment as well as a target.
- communication and activity data can include words and phrases, names, images, sounds, videos, metadata and other data related context information or other components of the data that can be parsed.
- the data may also be analysed by a natural language processor in order to determine context of words and phrases used in the interaction data (in order to reduce false positives such as profanities used among friends).
- the user device can be configured to monitor location data obtained from a GPS device of the user device and generate an alert to the administrator device if the location data indicates that the user device has left or entered a specific geographical location defined by the administrator device.
- FIG. 2 illustrates an embodiment of a process 200 for monitoring and analysing communication and activity data of an electronic device.
- step 205 the administrator device and any user devices to be monitored by the administrator device establish a connection.
- each user device by way of an application or service installed thereupon, monitors incoming and/or outgoing data received at the respective device.
- the data that is received and/or sent from a respective user device is analysed by the application or service installed thereupon searching for at least a substantial match to one or more predefined criteria, which may be system defined or user defined.
- step 220 if a substantial match or exact match to at least one predefined criterion is identified, an alert notification is created and transmitted to a relevant administrator device for the attention of a user of the administrator device.
- the monitoring application enables a third-party (such as a school administrator or parent, for example) to remotely access and/or control the electronic device having the monitoring application installed thereon using an administrator device.
- a third-party such as a school administrator or parent, for example
- the monitoring application grants remote access and remote control privileges (i.e. administrator access) to an administrator device.
- the monitoring application allows the parent device to access the user device to collect information about potential instances of bullying experienced by the user of the user device and also control access to various services (such as disabling access to a particular application, for example).
- the monitoring application installed on the user device is programmed to monitor applications and services on the user device for certain keywords or phrases, which may be indicative of bullying behaviour being sent or received.
- FIG. 3 is a diagram of two identical electronic devices 310 (which can each act as a monitored user device or administrator device) that can be used to implement various exemplary embodiments of the invention, and an exemplary embodiment of the application server 120.
- Each electronic device 310 includes a bus 315 coupling a memory 320 (storing firmware and/or software 321 ), a display 325, a communication device in the form of a radio transceiver unit 330 and a processor 335.
- the display 325 such as a liquid crystal display adapted for touchscreen interface, displays information to a user of the user device and may also operate as an input device.
- the display 325 communicates inputs and command requests to the processor 335.
- Application server 120 includes application software 122 having the user profiles 121 stored thereon.
- the application server 120 includes a bus 350 coupling a memory 355 (storing firmware or software including the application software 122), a communication device in the form of data transceiver unit 331 (which includes a wired connection to the Internet via Network 340) and a processor 365.
- the application server may also comprise a web server running web server software, such as Apache, Ngix or IIS, for example.
- web server software such as Apache, Ngix or IIS, for example.
- the application server also includes a scripting language (such as HTML, JS or PHP, for example) installed thereon to form the running software.
- a scripting language such as HTML, JS or PHP, for example
- the processes and methods described herein are performed by the electronic device 310 and application server 120, in response to the processor 335 executing an instruction contained in memory 320 (which may be volatile memory, non volatile memory or a combination of the two). Execution of the instructions contained in memory 320 cause the processor 335 to perform one or more of the process or method steps (such as those described above in relation to FIG. 1 and 2) described herein above.
- memory 320 which may be volatile memory, non volatile memory or a combination of the two.
- processors in a multiprocessing arrangement may also be employed to execute the instructions contained in memory 320.
- hard-wired circuitry may be used in place of or in combination with software instructions to implement embodiments of the invention.
- embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
- the electronic devices 310 also includes a communication device in the form of a radio transceiver unit 330 coupled to bus 315.
- the radio transceiver unit 330 provides a two-way data communication coupling to a network 340 using wireless radio signals.
- the communication device could also take the form of a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line.
- communication device may be a local area network (LAN) card (e.g.
- the communication device sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
- the communication device can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal Computer Memory Card International Association) interface, etc. Although a single communication interface is depicted in FIG. 3, multiple communication interfaces can also be employed.
- the network link 345 typically provides data communication through one or more networks to other electronic devices.
- the network link 345 may provide a connection through cellular network 340 to a second electronic device 310, which has connectivity to a network (e.g. a wide area network (WAN) or the Internet) or to data equipment operated by a service provider.
- a network e.g. a wide area network (WAN) or the Internet
- the local network and the network both use electrical, electromagnetic, or optical signals to convey information and instructions.
- the signals through the various networks and the signals on the network link and through the communication device, which communicate digital data with the electronic devices, are exemplary forms of carrier waves bearing the information and instructions.
- cyber bullying includes, for instance, a person’s (e.g., a source’s) tormenting, threatening, harassing, and/or embarrassing another person (e.g., a target) using communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc.
- communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc.
- the system provides for automated monitoring, processing, and/or reporting of the conduct.
- a user need only install or activate the service on his or her device(s).
- potential victims or targets can proactively install or initiate the service.
- parents of potential targets may latently install or initiate the service on behalf of the target.
- the various embodiments described herein are discussed with respect to providing an anti-bullying service (anti-cyber bullying, in particular), it is contemplated that the embodiments are also applicable to services for monitoring any form of conduct (i.e. , monitored conduct) involving a source and a target.
- monitored conduct includes harassing conduct, offensive conduct, illegal conduct, conduct in violation of public and/or private rules or regulations, and the like.
- the monitored conduct need not be negative conduct, but instead may include positive conduct such as conduct in compliance with rules and regulations, conduct that assists other users, altruistic conduct, etc.
- Some further examples of data comprise voice calls, voice mails, text messages, SMS/MMS, emails, social networks, web pages, news feeds (e.g. news feeds, ticker blocks, blog feeds, forum feeds), images, videos, sound, interaction data related context information (e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.), recordings, links to games and applications and music.
- news feeds e.g. news feeds, ticker blocks, blog feeds, forum feeds
- images e.g. news feeds, ticker blocks, blog feeds, forum feeds
- images e.g., ticker blocks, blog feeds, forum feeds
- images e.g. news feeds, ticker blocks, blog feeds, forum feeds
- interaction data related context information e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.
- the terms ‘comprises’, ‘comprising’, ‘includes’, ‘including’, or similar terms are intended to mean a non-exclusive inclusion, such that a method, system or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Emergency Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Child & Adolescent Psychology (AREA)
- Tourism & Hospitality (AREA)
- Automation & Control Theory (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Educational Administration (AREA)
- Environmental & Geological Engineering (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
Abstract
A method for monitoring electronic device activity. The method includes the steps of establishing a wireless connection between a user device and an administrator device, monitoring data of a user device, analysing the data for one or more substantial matches with one or more predefined criteria, and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
Description
METHOD FOR MONITORING ELECTRONIC DEVICE ACTIVITY
FIELD OF THE INVENTION
[0001 ] The invention relates to a method for monitoring electronic device activity. In particular, the invention relates, but is not limited, to a method for monitoring electronic communications and activities to detect and prevent online bullying, anxiety, depression, online grooming, suicide and sexual explicit language.
BACKGROUND TO THE INVENTION
[0002] Reference to background art herein is not to be construed as an admission that such art constitutes common general knowledge.
[0003] Due to the multiple rapid advances in computer and telecommunications technologies in recent decades, the effects of bullying on individuals and in particular young children and teenagers, has been greatly intensified due to the “always connected” effect of such advances.
[0004] Before the proliferation of always on computer and mobile communications systems, bullying from others at school or in the workplace was often restricted to those areas. However, developments such as emails, SMS and social media websites (e.g. Facebook) expose individuals to potential bullying at all times. It is well known that this online bullying or“cyber bullying” can have considerable impact on an individual’s mental health and in some cases inducing or contributing to depression and suicidal reactions.
[0005] While efforts to curtail cyber bullying have been significant, such efforts can often be frustrated by a reluctance of victims to report such incidents. In
addition, without evidence, it can be difficult to prove the bullying behaviour and the extent of the bullying behaviour.
OBJECT OF THE INVENTION
[0006] It is an aim of this invention to provide a method for monitoring online communications and electronic device activities which overcomes or ameliorates one or more of the disadvantages or problems described above, or which at least provides a useful commercial alternative.
[0007] Other preferred objects of the present invention will become apparent from the following description.
SUMMARY OF THE INVENTION
[0008] In one form, although it need not be the only or indeed the broadest form, there is provided a method for monitoring electronic device activity, the method comprising the steps of:
establishing communication between a user device and an administrator device;
monitoring data of a user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
[0009] Preferably, the method further comprises detecting at least one substantial match with one or more predefined criteria.
[0010] Preferably, the data is associated with one or more applications of the user device. Preferably, the data comprises communication data associated with a communication application and/or location data. Preferably, the communication data comprises calling data and/or messaging data. Preferably, the location data is associated with a location of the user device determined by a GPS or cellular network.
[0011 ] Preferably, the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
[0012] Preferably, the data comprises activity data associated with an application installed on the user device.
[0013] Preferably, the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
[0014] Preferably, the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
[0015] Preferably, the data is associated with an interaction between a source device (the user device) and a target device. Preferably, the data is associated with an incoming or outgoing communication.
[0016] Preferably, communication between the administrator device and the user device is established by an application server.
[0017] Preferably, the data of the user device is transmitted to the application server, wherein the application server analyses the data for the one or more substantial matches with the one or more predefined criteria.
[0018] Preferably, upon detection of at least one substantial match with at least one of the one or more predefined criteria on the user device, transmitting an alert notification from the application server to the administrator device
[0019] Preferably, the method comprises the further steps of:
transmitting an outgoing communication from the user device;
comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and
if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.
[0020] Preferably, the method comprises the further steps of:
receiving an incoming communication at the user device;
comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and
if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.
[0021 ] Preferably, the predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
[0022] Preferably, the alert notification comprises a push message indicating a predefined criteria has been detected on the user device.
[0023] Preferably, upon identification of a substantial match, the method comprises the further step of disabling or restricting one or more features of the user device. Preferably, the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device. In some embodiments, the application server communicates directly with an application
installed on the user device and thereby effects operation and/or control of the user device. In some alternative embodiments, an updated device profile is pushed to the user device via a mobile device management (MDM) profile.
[0024] Preferably, upon identification of a substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the link established between the administrator device and the user device.
[0025] Preferably, the connection comprises a wireless, data exchanging connection.
[0026] Preferably, the step of monitoring data of a user device further comprises monitoring data received by and/or sent from the user device.
[0027] In another form, the invention resides in a non-transitory computer- readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for: establishing a wireless connection between a user device and an administrator device;
monitoring data of a user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
[0028] Preferably, the user device comprises a smartphone. Preferably, the administrator device comprises a smartphone.
[0029] Preferably, the administrator device is in wireless communication or connection with a plurality of user devices.
[0030] In another form, the invention resides in a system for monitoring online communications, the system comprising: an administrator device; and a user device in wireless communication (or a wireless connection) with the administrator device, wherein the user device is programmed to: monitor data of the user device analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
administrator device.
[0031 ] In another form, the invention provides a method for monitoring electronic device activity, the method comprising the steps of: establishing a wireless connection between a user device and an administrator device; monitoring data of a user device; analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] By way of example only, preferred embodiments of the invention will be described more fully hereinafter with reference to the accompanying figures, wherein:
[0033] FIG. 1 illustrates a schematic diagram of a system for monitoring electronic communications of user devices according to an embodiment of the invention;
[0034] FIG. 2 illustrates a block diagram of a method for monitoring electronic communications of user devices according to an embodiment of the invention; and
[0035] FIG. 3 illustrates a diagram of two electronic devices that can be used to implement the embodiments of the invention shown in FIG. 1 and FIG. 2.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0036] FIG. 1 shows a schematic diagram of a system 100 adapted to provide a service for monitoring electronic communications and activities conducted through smartphone applications and limit or prevent online bullying.
[0037] The illustrated system 100 includes an administrator device in the form of a parent device 105 having an administrator application 106, in the form of monitoring software, installed thereon, and user child devices 110a, 110b each having a monitoring application 111a, 111 b, also in the form of software installed thereon. The monitoring applications 111 a, 111 b installed on each user device 110a, 110b can be installed by downloading from an appropriate location (such as an application store or mirror), pushed from the administrator device 105 to each user device 110a, 110b over a network (such as a cellular
network or WAN, for example) or can be integrated into the firmware or operating system of each user device 110a, 11 Ob.
[0038] In the illustrated embodiment, user device 110a, 110b is also in communication with an unmonitored device 115. Each of the devices described above are in communication with each relevant device over a network 120
[0039] In use, the parent device 105 establishes a connection with each of the user devices 110a, 110b having an instance of the monitoring application 111 a, 111 b installed which are to be monitored. The connection can be established by an application server 120 which stores and verifies user profiles 121 associated with specific devices (such as parent device 105 and user devices 110a, 1110b), wherein the user of parent device 105 logs into an account or profile stored on the application server 120 and adds the user devices 110a, 110b to the account to link the three devices 105, 110a, 110b together.
[0040] Once the link has been established between the parent device 105 and the user devices 110a, 110b via application server 120, data transmitted to and from each user device 110a, 110b is pushed to the application server 120 where the data may be monitored and analysed by the monitoring application 111 a, 111 b installed on each respective user device 110a, 110b and the application server 120 and application software 122 (see FIG. 3).
[0041 ] The analysis comprises finding exact matches and substantial matches of the data being transmitted to and/or from the device 110a, 110b (including from unmonitored device 115 and elsewhere) with one or more predefined criteria. Examples of predefined criteria can include predefined text strings included in SMS, emails, MMS or other electronic messages, images, audio clips, or video clips. However, it will be appreciated that the predefined criteria
is not limited to text strings and can include a number of indicators or user configured filters. For example, in some embodiments, the monitoring application is configured to allow a user to define a dictionary of words, phrases (including slang terms and phrases, references to bullying, anxiety, depression, online grooming, suicide and sexual terms, for example) and elements (which can include location data, images, emojis, certain phone numbers/emails/accounts, etc.) which the user of the administrator device has predetermined to be potentially indicative of undesired conduct (i.e. bullying). As a result, the monitoring application is thereby configured to capture any communication data that is received or transmitted from the user device at any time for monitoring purposes. This can be particularly useful for identifying bullying that has not been reported or bullying occurring from new or unidentified sources.
[0042] Upon detection of an exact or substantial match to at least one of the one or more predefined criteria on the user device 110a, 110b (or the application server 120 in some embodiments), an alert notification is created by the application server 120 and transmitted to the parent device 105 to alert the user of the parent device 105 that bullying may be taking place. In the embodiments where the user device 110a, 110b detects the match, the user device 110a, 110b will communicate the detection to the application server 120 which then alerts the parent device 105.
[0043] The alert notifications are typically transmitted directly to the parent device 105 and thereby an administrator (such as a parent) is not required to access an intermediary database or service to access data that has been identified as a match to the predefined criteria. In this regard, in some
embodiments, the hardware and software required to run the monitoring system resides on the administrator and user devices 105, 110a, 110b.
[0044] In some embodiments, upon identification of a match, one or more features of the user device 110a, 110b are automatically disabled or restricted. Alternatively, a prompt may be sent to the administrator device 105 requesting a confirmation instruction to disable or restrict one or more features of the user device at the discretion of the user of the administrator device.
[0045] In some further embodiments, upon identification of a substantial match, the administrator device 105 is granted remote access and control of the user device 110a, 110b at the discretion of the user of the administrator device 105.
[0046] Some examples of control of the user device that the administrator device may have include blocking access to certain installed applications on the user device, timed access control, activity monitoring, remote formatting and clearing of the device, remote locking of the device, disabling or restricting the ability to install applications on the user device, preventing access to specific websites and disabling specific features of the device such as the camera, for example.
[0047] In some additional embodiments, application server 120 collects and organises communication data in a database. As described above, the communication data can include electronic data that is sent to or sent by a user or user device by accessing applications installed on the user devices 110a, 110b.
[0048] In some embodiments, wherein the user device 110a comprises a smart device having the Android operating system installed thereon, the application server 120 communicates directly with the monitoring application 111 a
installed on the user device 110a and thereby effects operation and/or control of the user device 110a.
[0049] In some alternative embodiments, wherein the user device 110b comprises a smart device having the iOS operating system installed thereon, an updated device profile is pushed to the user device 110b via a mobile device management (MDM) profile.
[0050] In one exemplary embodiment, the user devices 110a, 110b belong to one or more bullies who are sending intimidating/threatening/bullying communications and/or one or more victims of bullying who are receiving the intimidating/threatening/bullying communications. For example, the application may be installed on any known device associated with a bully or a victim. Preferably, the application is installed on a victim’s device to monitor and collect data received from one or more bullies through various sources (such phone calls, messages and social networks, for example).
[0051 ] In some embodiments, the monitoring application can be remotely pushed to a user device from an administrator device.
[0052] In some additional embodiments, the monitoring application may be integrated into a user device’s firmware. As a result, the application will not be detectable from a task manager or application control panel, and thus may be hidden from users to prevent the monitoring application from being disabled or uninstalled.
[0053] In some embodiments, the monitoring application installed on a user device runs in as a background task or program, allowing the application actively monitor incoming and outgoing communications without being present or“on top” on a display of the user device.
[0054] In some embodiments, the user devices include mobile phones and/or another other computing device capable of receiving, accessing, sending, and/or storing data.
[0055] In one embodiment, the service platform 120 determines data to collect based on the user applications and devices related to a source of harassment as well as a target. By way of example and not limitation, communication and activity data can include words and phrases, names, images, sounds, videos, metadata and other data related context information or other components of the data that can be parsed. The data may also be analysed by a natural language processor in order to determine context of words and phrases used in the interaction data (in order to reduce false positives such as profanities used among friends).
[0056] In one example, the user device can be configured to monitor location data obtained from a GPS device of the user device and generate an alert to the administrator device if the location data indicates that the user device has left or entered a specific geographical location defined by the administrator device.
[0057] FIG. 2 illustrates an embodiment of a process 200 for monitoring and analysing communication and activity data of an electronic device.
[0058] In step 205, the administrator device and any user devices to be monitored by the administrator device establish a connection.
[0059] In step 210, each user device, by way of an application or service installed thereupon, monitors incoming and/or outgoing data received at the respective device.
[0060] In step 215, the data that is received and/or sent from a respective user device is analysed by the application or service installed thereupon searching for at least a substantial match to one or more predefined criteria, which may be system defined or user defined.
[0061 ] In step 220, if a substantial match or exact match to at least one predefined criterion is identified, an alert notification is created and transmitted to a relevant administrator device for the attention of a user of the administrator device.
[0062] In some embodiments, the monitoring application enables a third-party (such as a school administrator or parent, for example) to remotely access and/or control the electronic device having the monitoring application installed thereon using an administrator device. In one particular example, the monitoring application grants remote access and remote control privileges (i.e. administrator access) to an administrator device. The monitoring application allows the parent device to access the user device to collect information about potential instances of bullying experienced by the user of the user device and also control access to various services (such as disabling access to a particular application, for example). In some embodiments, the monitoring application installed on the user device is programmed to monitor applications and services on the user device for certain keywords or phrases, which may be indicative of bullying behaviour being sent or received. If one or more of the keywords or phrases are detected by the monitoring application a notification can be sent to the parent device to alert the user of the parent device to a potential instance of bullying and to allow the user of the parent device to take appropriate action.
[0063] FIG. 3 is a diagram of two identical electronic devices 310 (which can each act as a monitored user device or administrator device) that can be used to implement various exemplary embodiments of the invention, and an exemplary embodiment of the application server 120. Each electronic device 310 includes a bus 315 coupling a memory 320 (storing firmware and/or software 321 ), a display 325, a communication device in the form of a radio transceiver unit 330 and a processor 335. The display 325, such as a liquid crystal display adapted for touchscreen interface, displays information to a user of the user device and may also operate as an input device. The display 325 communicates inputs and command requests to the processor 335.
[0064] Application server 120 includes application software 122 having the user profiles 121 stored thereon.
[0065] The application server 120 includes a bus 350 coupling a memory 355 (storing firmware or software including the application software 122), a communication device in the form of data transceiver unit 331 (which includes a wired connection to the Internet via Network 340) and a processor 365.
[0066] The application server may also comprise a web server running web server software, such as Apache, Ngix or IIS, for example.
[0067] The application server also includes a scripting language (such as HTML, JS or PHP, for example) installed thereon to form the running software.
[0068] According to some embodiments of the invention, the processes and methods described herein are performed by the electronic device 310 and application server 120, in response to the processor 335 executing an instruction contained in memory 320 (which may be volatile memory, non volatile memory or a combination of the two). Execution of the instructions
contained in memory 320 cause the processor 335 to perform one or more of the process or method steps (such as those described above in relation to FIG. 1 and 2) described herein above.
[0069] One or more processors in a multiprocessing arrangement may also be employed to execute the instructions contained in memory 320. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement embodiments of the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
[0070] As mentioned, the electronic devices 310 also includes a communication device in the form of a radio transceiver unit 330 coupled to bus 315. The radio transceiver unit 330 provides a two-way data communication coupling to a network 340 using wireless radio signals. It will be appreciated that the communication device could also take the form of a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line. As another example, communication device may be a local area network (LAN) card (e.g. for Ethernet™ or an Asynchronous Transfer Model (ATM) network) to provide a data communication connection to a compatible LAN. Wireless links can also be implemented. In any such implementation, the communication device sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information. Further, the communication device can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal
Computer Memory Card International Association) interface, etc. Although a single communication interface is depicted in FIG. 3, multiple communication interfaces can also be employed.
[0071 ] The network link 345 typically provides data communication through one or more networks to other electronic devices. For example, the network link 345 may provide a connection through cellular network 340 to a second electronic device 310, which has connectivity to a network (e.g. a wide area network (WAN) or the Internet) or to data equipment operated by a service provider. The local network and the network both use electrical, electromagnetic, or optical signals to convey information and instructions. The signals through the various networks and the signals on the network link and through the communication device, which communicate digital data with the electronic devices, are exemplary forms of carrier waves bearing the information and instructions.
[0072] As noted above, with greater accessibility to content and information over modern communications networks, users may also be more susceptible to bullying conduct (e.g., cyber bullying) or interactions facilitated over such communication devices and networks. By way of example, cyber bullying includes, for instance, a person’s (e.g., a source’s) tormenting, threatening, harassing, and/or embarrassing another person (e.g., a target) using communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc. In some cases, if bullying conduct is not dealt with properly, cyber bullying potentially may result in grave consequences including substance abuse, suicide, and the like. In milder or less volatile cases, cyber bullying damages the self-esteem of the target (e.g.,
a targeted child or adolescent), causing potentially lifelong psychological and/or emotional issues. In many cases, responsible authorities (e.g., parents, teachers, law enforcement, etc.) are completely unaware of cyber bullying conduct being perpetrated on targeted individuals, and wish for a mechanism to provide earlier warning and/or intervention to prevent or stop such conduct.
[0073] Advantageously in some embodiments, the system provides for automated monitoring, processing, and/or reporting of the conduct. In this way, to initiate the anti-bullying service, a user need only install or activate the service on his or her device(s). In one use case, potential victims or targets can proactively install or initiate the service. In another use case, parents of potential targets may latently install or initiate the service on behalf of the target.
[0074] Although the various embodiments described herein are discussed with respect to providing an anti-bullying service (anti-cyber bullying, in particular), it is contemplated that the embodiments are also applicable to services for monitoring any form of conduct (i.e. , monitored conduct) involving a source and a target. By way of example and not limitation, in addition to bullying-related conduct, such monitored conduct includes harassing conduct, offensive conduct, illegal conduct, conduct in violation of public and/or private rules or regulations, and the like. In yet other embodiments, the monitored conduct need not be negative conduct, but instead may include positive conduct such as conduct in compliance with rules and regulations, conduct that assists other users, altruistic conduct, etc.
[0075] While various embodiments and examples of the data have been described above, it will be appreciated that the definition of data is not limited to those embodiments and examples. Some further examples of data comprise
voice calls, voice mails, text messages, SMS/MMS, emails, social networks, web pages, news feeds (e.g. news feeds, ticker blocks, blog feeds, forum feeds), images, videos, sound, interaction data related context information (e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.), recordings, links to games and applications and music.
[0076] In this specification, adjectives such as first and second, left and right, top and bottom, and the like may be used solely to distinguish one element or action from another element or action without necessarily requiring or implying any actual such relationship or order. Where the context permits, reference to an integer or a component or step (or the like) is not to be interpreted as being limited to only one of that integer, component, or step, but rather could be one or more of that integer, component, or step etc.
[0077] The above description of various embodiments of the present invention is provided for purposes of description to one of ordinary skill in the related art. It is not intended to be exhaustive or to limit the invention to a single disclosed embodiment. As mentioned above, numerous alternatives and variations to the present invention will be apparent to those skilled in the art of the above teaching. Accordingly, while some alternative embodiments have been discussed specifically, other embodiments will be apparent or relatively easily developed by those of ordinary skill in the art. The invention is intended to embrace all alternatives, modifications, and variations of the present invention that have been discussed herein, and other embodiments that fall within the spirit and scope of the above described invention.
[0078] In this specification, the terms ‘comprises’, ‘comprising’, ‘includes’, ‘including’, or similar terms are intended to mean a non-exclusive inclusion, such that a method, system or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.
Claims
1. A method for monitoring electronic device activity, the method comprising the steps of:
establishing a wireless connection between a user device and an administrator device;
monitoring data of the user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
2. The method of claim 1 , wherein the data is associated with one or more applications of the user device.
3. The method of claim 1 or claim 2, wherein the data comprises communication data associated with a communication application and location data.
4. The method of claim 3, wherein the communication data comprises calling data and/or messaging data.
5. The method of claim 3 or claim 4, wherein the location data is associated with a location of the user device determined by a Global Positioning System (GPS) or cellular network.
6. The method of any one of claims 3-5, wherein the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
7. The method of any one of claims 1 -6, wherein the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
8. The method of any one of claims 1 -7, wherein the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
9. The method of any one of claims 1-8, wherein the data is associated with an interaction between the user device and a target device.
10. The method of any one of claims 1-9, wherein the data is associated with an incoming or outgoing communication.
11. The method of any one of claims 1 -10, the method comprising the further steps of:
transmitting an outgoing communication from the user device;
comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and
if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.
12. The method of any one of claims 1 -11 , the method comprising the further steps of:
receiving an incoming communication at the user device;
comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and
if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.
13. The method of any one of claims 1 -12, wherein the one or more predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
14. The method of any one of claims 1 -13, wherein the alert notification comprises a push message indicating a predefined criteria of the one or more predefined criteria has been detected on the user device.
15. The method of any one of claims 1 -14, wherein upon identification of the substantial match, the method comprises the further step of disabling or restricting one or more features of the user device.
16. The method of claim 15, wherein the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device.
17. The method of any one of claims 1 -16, wherein upon identification of the at least one substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the connection established between the administrator device and the user device.
18. A non-transitory computer-readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for:
establishing a wireless connection between a user device and an administrator device;
monitoring data of the user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
19. A system for monitoring online communications, the system comprising:
an administrator device; and
a user device in wireless communication with the administrator device, wherein the user device is programmed to:
monitor data of the user device
analyse the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
administrator device.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2019901774 | 2019-05-24 | ||
AU2019901774A AU2019901774A0 (en) | 2019-05-24 | Method for Monitoring Electronic Device Activity |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020237293A1 true WO2020237293A1 (en) | 2020-12-03 |
Family
ID=73552501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2020/050515 WO2020237293A1 (en) | 2019-05-24 | 2020-05-25 | Method for monitoring electronic device activity |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020237293A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8718633B2 (en) * | 2011-07-13 | 2014-05-06 | Qualcomm Incorporated | Intelligent parental controls for wireless devices |
WO2015095597A1 (en) * | 2013-12-19 | 2015-06-25 | Websafety, Inc. | Devices and methods for improving web safety and deterrence of cyberbullying |
US10009480B2 (en) * | 2007-06-28 | 2018-06-26 | Kajeet, Inc. | Policy management of electronic devices |
-
2020
- 2020-05-25 WO PCT/AU2020/050515 patent/WO2020237293A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10009480B2 (en) * | 2007-06-28 | 2018-06-26 | Kajeet, Inc. | Policy management of electronic devices |
US8718633B2 (en) * | 2011-07-13 | 2014-05-06 | Qualcomm Incorporated | Intelligent parental controls for wireless devices |
WO2015095597A1 (en) * | 2013-12-19 | 2015-06-25 | Websafety, Inc. | Devices and methods for improving web safety and deterrence of cyberbullying |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10375187B1 (en) | Suicide and alarming behavior alert/prevention system | |
Lee et al. | <? covid19?> Tracing surveillance and auto-regulation in Singapore:‘smart’responses to COVID-19 | |
US9665835B2 (en) | Social distribution of emergency status | |
US8473281B2 (en) | Net moderator | |
CN106940641B (en) | Notification message processing method and device | |
CA2773749C (en) | Public safety analysis system | |
US8527596B2 (en) | System and method for monitoring activity of a specified user on internet-based social networks | |
US20170300472A1 (en) | Linguistic analysis and learning for policy engine | |
US9985920B2 (en) | Event notification | |
US9059949B2 (en) | Monitoring of regulated associates | |
US20200394361A1 (en) | Message sentiment analyzer and feedback | |
KR102355973B1 (en) | Apparatus and method for detecting smishing message | |
US20090183259A1 (en) | Integrated Protection Service System Defining Risk Profiles for Minors | |
US20110029618A1 (en) | Methods and systems for managing virtual identities in the internet | |
US11373512B2 (en) | Applying machine intelligence for location-based services to dispatch first responders | |
US20180041532A1 (en) | System for Handling Communicated Threats | |
US10959081B2 (en) | Network-based alert system and method | |
KR20170058885A (en) | Risk detection device, risk detection method, and risk detection program | |
WO2020237293A1 (en) | Method for monitoring electronic device activity | |
CN113904828B (en) | Method, apparatus, device, medium and program product for detecting sensitive information of interface | |
KR20200093152A (en) | Criminal Response System and Method for Foreign Travelers | |
WO2015160038A1 (en) | Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium | |
US20220210189A1 (en) | Mitigation of phishing risk | |
CN106649343B (en) | Network data information processing method and equipment | |
Horsman | A survey of current social network and online communication provision policies to support law enforcement identify offenders |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20812518 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20812518 Country of ref document: EP Kind code of ref document: A1 |