WO2020237293A1 - Method for monitoring electronic device activity - Google Patents

Method for monitoring electronic device activity Download PDF

Info

Publication number
WO2020237293A1
WO2020237293A1 PCT/AU2020/050515 AU2020050515W WO2020237293A1 WO 2020237293 A1 WO2020237293 A1 WO 2020237293A1 AU 2020050515 W AU2020050515 W AU 2020050515W WO 2020237293 A1 WO2020237293 A1 WO 2020237293A1
Authority
WO
WIPO (PCT)
Prior art keywords
user device
data
communication
predefined criteria
administrator
Prior art date
Application number
PCT/AU2020/050515
Other languages
French (fr)
Inventor
Fiona Leigh Hayes
Original Assignee
Intellectual Property Holdings Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2019901774A external-priority patent/AU2019901774A0/en
Application filed by Intellectual Property Holdings Pty Ltd filed Critical Intellectual Property Holdings Pty Ltd
Publication of WO2020237293A1 publication Critical patent/WO2020237293A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/128Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0222Message structure or message content, e.g. message protocol
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0269System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/028Communication between parent and child units via remote transmission means, e.g. satellite network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Definitions

  • the invention relates to a method for monitoring electronic device activity.
  • the invention relates, but is not limited, to a method for monitoring electronic communications and activities to detect and prevent online bullying, anxiety, depression, online grooming, suicide and sexual explicit language.
  • the method further comprises detecting at least one substantial match with one or more predefined criteria.
  • the data is associated with one or more applications of the user device.
  • the data comprises communication data associated with a communication application and/or location data.
  • the communication data comprises calling data and/or messaging data.
  • the location data is associated with a location of the user device determined by a GPS or cellular network.
  • the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
  • the data comprises activity data associated with an application installed on the user device.
  • the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
  • the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
  • the data is associated with an interaction between a source device (the user device) and a target device.
  • the data is associated with an incoming or outgoing communication.
  • communication between the administrator device and the user device is established by an application server.
  • the data of the user device is transmitted to the application server, wherein the application server analyses the data for the one or more substantial matches with the one or more predefined criteria.
  • the application server analyses the data for the one or more substantial matches with the one or more predefined criteria.
  • transmitting an alert notification from the application server to the administrator device upon detection of at least one substantial match with at least one of the one or more predefined criteria on the user device, transmitting an alert notification from the application server to the administrator device
  • the method comprises the further steps of:
  • the method comprises the further steps of:
  • the predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
  • the alert notification comprises a push message indicating a predefined criteria has been detected on the user device.
  • the method comprises the further step of disabling or restricting one or more features of the user device.
  • the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device.
  • the application server communicates directly with an application installed on the user device and thereby effects operation and/or control of the user device.
  • an updated device profile is pushed to the user device via a mobile device management (MDM) profile.
  • MDM mobile device management
  • the method comprises the further steps of remotely controlling the user device from the administrator device using the link established between the administrator device and the user device.
  • connection comprises a wireless, data exchanging connection.
  • the step of monitoring data of a user device further comprises monitoring data received by and/or sent from the user device.
  • the invention resides in a non-transitory computer- readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for: establishing a wireless connection between a user device and an administrator device;
  • the user device comprises a smartphone.
  • the administrator device comprises a smartphone.
  • the administrator device is in wireless communication or connection with a plurality of user devices.
  • the invention resides in a system for monitoring online communications, the system comprising: an administrator device; and a user device in wireless communication (or a wireless connection) with the administrator device, wherein the user device is programmed to: monitor data of the user device analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
  • the invention provides a method for monitoring electronic device activity, the method comprising the steps of: establishing a wireless connection between a user device and an administrator device; monitoring data of a user device; analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
  • FIG. 1 illustrates a schematic diagram of a system for monitoring electronic communications of user devices according to an embodiment of the invention
  • FIG. 2 illustrates a block diagram of a method for monitoring electronic communications of user devices according to an embodiment of the invention.
  • FIG. 3 illustrates a diagram of two electronic devices that can be used to implement the embodiments of the invention shown in FIG. 1 and FIG. 2.
  • FIG. 1 shows a schematic diagram of a system 100 adapted to provide a service for monitoring electronic communications and activities conducted through smartphone applications and limit or prevent online bullying.
  • the illustrated system 100 includes an administrator device in the form of a parent device 105 having an administrator application 106, in the form of monitoring software, installed thereon, and user child devices 110a, 110b each having a monitoring application 111a, 111 b, also in the form of software installed thereon.
  • the monitoring applications 111 a, 111 b installed on each user device 110a, 110b can be installed by downloading from an appropriate location (such as an application store or mirror), pushed from the administrator device 105 to each user device 110a, 110b over a network (such as a cellular network or WAN, for example) or can be integrated into the firmware or operating system of each user device 110a, 11 Ob.
  • user device 110a, 110b is also in communication with an unmonitored device 115.
  • Each of the devices described above are in communication with each relevant device over a network 120
  • the parent device 105 establishes a connection with each of the user devices 110a, 110b having an instance of the monitoring application 111 a, 111 b installed which are to be monitored.
  • the connection can be established by an application server 120 which stores and verifies user profiles 121 associated with specific devices (such as parent device 105 and user devices 110a, 1110b), wherein the user of parent device 105 logs into an account or profile stored on the application server 120 and adds the user devices 110a, 110b to the account to link the three devices 105, 110a, 110b together.
  • the analysis comprises finding exact matches and substantial matches of the data being transmitted to and/or from the device 110a, 110b (including from unmonitored device 115 and elsewhere) with one or more predefined criteria.
  • predefined criteria can include predefined text strings included in SMS, emails, MMS or other electronic messages, images, audio clips, or video clips.
  • predefined criteria is not limited to text strings and can include a number of indicators or user configured filters.
  • the monitoring application is configured to allow a user to define a dictionary of words, phrases (including slang terms and phrases, references to bullying, anxiety, depression, online grooming, suicide and sexual terms, for example) and elements (which can include location data, images, emojis, certain phone numbers/emails/accounts, etc.) which the user of the administrator device has predetermined to be potentially indicative of undesired conduct (i.e. bullying).
  • the monitoring application is thereby configured to capture any communication data that is received or transmitted from the user device at any time for monitoring purposes. This can be particularly useful for identifying bullying that has not been reported or bullying occurring from new or unidentified sources.
  • an alert notification is created by the application server 120 and transmitted to the parent device 105 to alert the user of the parent device 105 that bullying may be taking place.
  • the user device 110a, 110b detects the match, the user device 110a, 110b will communicate the detection to the application server 120 which then alerts the parent device 105.
  • the alert notifications are typically transmitted directly to the parent device 105 and thereby an administrator (such as a parent) is not required to access an intermediary database or service to access data that has been identified as a match to the predefined criteria.
  • an administrator such as a parent
  • the hardware and software required to run the monitoring system resides on the administrator and user devices 105, 110a, 110b.
  • one or more features of the user device 110a, 110b are automatically disabled or restricted.
  • a prompt may be sent to the administrator device 105 requesting a confirmation instruction to disable or restrict one or more features of the user device at the discretion of the user of the administrator device.
  • the administrator device 105 upon identification of a substantial match, is granted remote access and control of the user device 110a, 110b at the discretion of the user of the administrator device 105.
  • control of the user device that the administrator device may have include blocking access to certain installed applications on the user device, timed access control, activity monitoring, remote formatting and clearing of the device, remote locking of the device, disabling or restricting the ability to install applications on the user device, preventing access to specific websites and disabling specific features of the device such as the camera, for example.
  • application server 120 collects and organises communication data in a database.
  • the communication data can include electronic data that is sent to or sent by a user or user device by accessing applications installed on the user devices 110a, 110b.
  • the application server 120 communicates directly with the monitoring application 111 a installed on the user device 110a and thereby effects operation and/or control of the user device 110a.
  • an updated device profile is pushed to the user device 110b via a mobile device management (MDM) profile.
  • MDM mobile device management
  • the user devices 110a, 110b belong to one or more bullies who are sending intimidating/threatening/bullying communications and/or one or more victims of bullying who are receiving the intimidating/threatening/bullying communications.
  • the application may be installed on any known device associated with a bully or a victim.
  • the application is installed on a victim’s device to monitor and collect data received from one or more bullies through various sources (such phone calls, messages and social networks, for example).
  • the monitoring application can be remotely pushed to a user device from an administrator device.
  • the monitoring application may be integrated into a user device’s firmware. As a result, the application will not be detectable from a task manager or application control panel, and thus may be hidden from users to prevent the monitoring application from being disabled or uninstalled.
  • the monitoring application installed on a user device runs in as a background task or program, allowing the application actively monitor incoming and outgoing communications without being present or“on top” on a display of the user device.
  • the user devices include mobile phones and/or another other computing device capable of receiving, accessing, sending, and/or storing data.
  • the service platform 120 determines data to collect based on the user applications and devices related to a source of harassment as well as a target.
  • communication and activity data can include words and phrases, names, images, sounds, videos, metadata and other data related context information or other components of the data that can be parsed.
  • the data may also be analysed by a natural language processor in order to determine context of words and phrases used in the interaction data (in order to reduce false positives such as profanities used among friends).
  • the user device can be configured to monitor location data obtained from a GPS device of the user device and generate an alert to the administrator device if the location data indicates that the user device has left or entered a specific geographical location defined by the administrator device.
  • FIG. 2 illustrates an embodiment of a process 200 for monitoring and analysing communication and activity data of an electronic device.
  • step 205 the administrator device and any user devices to be monitored by the administrator device establish a connection.
  • each user device by way of an application or service installed thereupon, monitors incoming and/or outgoing data received at the respective device.
  • the data that is received and/or sent from a respective user device is analysed by the application or service installed thereupon searching for at least a substantial match to one or more predefined criteria, which may be system defined or user defined.
  • step 220 if a substantial match or exact match to at least one predefined criterion is identified, an alert notification is created and transmitted to a relevant administrator device for the attention of a user of the administrator device.
  • the monitoring application enables a third-party (such as a school administrator or parent, for example) to remotely access and/or control the electronic device having the monitoring application installed thereon using an administrator device.
  • a third-party such as a school administrator or parent, for example
  • the monitoring application grants remote access and remote control privileges (i.e. administrator access) to an administrator device.
  • the monitoring application allows the parent device to access the user device to collect information about potential instances of bullying experienced by the user of the user device and also control access to various services (such as disabling access to a particular application, for example).
  • the monitoring application installed on the user device is programmed to monitor applications and services on the user device for certain keywords or phrases, which may be indicative of bullying behaviour being sent or received.
  • FIG. 3 is a diagram of two identical electronic devices 310 (which can each act as a monitored user device or administrator device) that can be used to implement various exemplary embodiments of the invention, and an exemplary embodiment of the application server 120.
  • Each electronic device 310 includes a bus 315 coupling a memory 320 (storing firmware and/or software 321 ), a display 325, a communication device in the form of a radio transceiver unit 330 and a processor 335.
  • the display 325 such as a liquid crystal display adapted for touchscreen interface, displays information to a user of the user device and may also operate as an input device.
  • the display 325 communicates inputs and command requests to the processor 335.
  • Application server 120 includes application software 122 having the user profiles 121 stored thereon.
  • the application server 120 includes a bus 350 coupling a memory 355 (storing firmware or software including the application software 122), a communication device in the form of data transceiver unit 331 (which includes a wired connection to the Internet via Network 340) and a processor 365.
  • the application server may also comprise a web server running web server software, such as Apache, Ngix or IIS, for example.
  • web server software such as Apache, Ngix or IIS, for example.
  • the application server also includes a scripting language (such as HTML, JS or PHP, for example) installed thereon to form the running software.
  • a scripting language such as HTML, JS or PHP, for example
  • the processes and methods described herein are performed by the electronic device 310 and application server 120, in response to the processor 335 executing an instruction contained in memory 320 (which may be volatile memory, non volatile memory or a combination of the two). Execution of the instructions contained in memory 320 cause the processor 335 to perform one or more of the process or method steps (such as those described above in relation to FIG. 1 and 2) described herein above.
  • memory 320 which may be volatile memory, non volatile memory or a combination of the two.
  • processors in a multiprocessing arrangement may also be employed to execute the instructions contained in memory 320.
  • hard-wired circuitry may be used in place of or in combination with software instructions to implement embodiments of the invention.
  • embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • the electronic devices 310 also includes a communication device in the form of a radio transceiver unit 330 coupled to bus 315.
  • the radio transceiver unit 330 provides a two-way data communication coupling to a network 340 using wireless radio signals.
  • the communication device could also take the form of a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line.
  • communication device may be a local area network (LAN) card (e.g.
  • the communication device sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
  • the communication device can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal Computer Memory Card International Association) interface, etc. Although a single communication interface is depicted in FIG. 3, multiple communication interfaces can also be employed.
  • the network link 345 typically provides data communication through one or more networks to other electronic devices.
  • the network link 345 may provide a connection through cellular network 340 to a second electronic device 310, which has connectivity to a network (e.g. a wide area network (WAN) or the Internet) or to data equipment operated by a service provider.
  • a network e.g. a wide area network (WAN) or the Internet
  • the local network and the network both use electrical, electromagnetic, or optical signals to convey information and instructions.
  • the signals through the various networks and the signals on the network link and through the communication device, which communicate digital data with the electronic devices, are exemplary forms of carrier waves bearing the information and instructions.
  • cyber bullying includes, for instance, a person’s (e.g., a source’s) tormenting, threatening, harassing, and/or embarrassing another person (e.g., a target) using communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc.
  • communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc.
  • the system provides for automated monitoring, processing, and/or reporting of the conduct.
  • a user need only install or activate the service on his or her device(s).
  • potential victims or targets can proactively install or initiate the service.
  • parents of potential targets may latently install or initiate the service on behalf of the target.
  • the various embodiments described herein are discussed with respect to providing an anti-bullying service (anti-cyber bullying, in particular), it is contemplated that the embodiments are also applicable to services for monitoring any form of conduct (i.e. , monitored conduct) involving a source and a target.
  • monitored conduct includes harassing conduct, offensive conduct, illegal conduct, conduct in violation of public and/or private rules or regulations, and the like.
  • the monitored conduct need not be negative conduct, but instead may include positive conduct such as conduct in compliance with rules and regulations, conduct that assists other users, altruistic conduct, etc.
  • Some further examples of data comprise voice calls, voice mails, text messages, SMS/MMS, emails, social networks, web pages, news feeds (e.g. news feeds, ticker blocks, blog feeds, forum feeds), images, videos, sound, interaction data related context information (e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.), recordings, links to games and applications and music.
  • news feeds e.g. news feeds, ticker blocks, blog feeds, forum feeds
  • images e.g. news feeds, ticker blocks, blog feeds, forum feeds
  • images e.g., ticker blocks, blog feeds, forum feeds
  • images e.g. news feeds, ticker blocks, blog feeds, forum feeds
  • interaction data related context information e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.
  • the terms ‘comprises’, ‘comprising’, ‘includes’, ‘including’, or similar terms are intended to mean a non-exclusive inclusion, such that a method, system or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Emergency Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Child & Adolescent Psychology (AREA)
  • Tourism & Hospitality (AREA)
  • Automation & Control Theory (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for monitoring electronic device activity. The method includes the steps of establishing a wireless connection between a user device and an administrator device, monitoring data of a user device, analysing the data for one or more substantial matches with one or more predefined criteria, and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

Description

METHOD FOR MONITORING ELECTRONIC DEVICE ACTIVITY
FIELD OF THE INVENTION
[0001 ] The invention relates to a method for monitoring electronic device activity. In particular, the invention relates, but is not limited, to a method for monitoring electronic communications and activities to detect and prevent online bullying, anxiety, depression, online grooming, suicide and sexual explicit language.
BACKGROUND TO THE INVENTION
[0002] Reference to background art herein is not to be construed as an admission that such art constitutes common general knowledge.
[0003] Due to the multiple rapid advances in computer and telecommunications technologies in recent decades, the effects of bullying on individuals and in particular young children and teenagers, has been greatly intensified due to the “always connected” effect of such advances.
[0004] Before the proliferation of always on computer and mobile communications systems, bullying from others at school or in the workplace was often restricted to those areas. However, developments such as emails, SMS and social media websites (e.g. Facebook) expose individuals to potential bullying at all times. It is well known that this online bullying or“cyber bullying” can have considerable impact on an individual’s mental health and in some cases inducing or contributing to depression and suicidal reactions.
[0005] While efforts to curtail cyber bullying have been significant, such efforts can often be frustrated by a reluctance of victims to report such incidents. In addition, without evidence, it can be difficult to prove the bullying behaviour and the extent of the bullying behaviour.
OBJECT OF THE INVENTION
[0006] It is an aim of this invention to provide a method for monitoring online communications and electronic device activities which overcomes or ameliorates one or more of the disadvantages or problems described above, or which at least provides a useful commercial alternative.
[0007] Other preferred objects of the present invention will become apparent from the following description.
SUMMARY OF THE INVENTION
[0008] In one form, although it need not be the only or indeed the broadest form, there is provided a method for monitoring electronic device activity, the method comprising the steps of:
establishing communication between a user device and an administrator device;
monitoring data of a user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
[0009] Preferably, the method further comprises detecting at least one substantial match with one or more predefined criteria. [0010] Preferably, the data is associated with one or more applications of the user device. Preferably, the data comprises communication data associated with a communication application and/or location data. Preferably, the communication data comprises calling data and/or messaging data. Preferably, the location data is associated with a location of the user device determined by a GPS or cellular network.
[0011 ] Preferably, the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
[0012] Preferably, the data comprises activity data associated with an application installed on the user device.
[0013] Preferably, the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
[0014] Preferably, the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
[0015] Preferably, the data is associated with an interaction between a source device (the user device) and a target device. Preferably, the data is associated with an incoming or outgoing communication.
[0016] Preferably, communication between the administrator device and the user device is established by an application server.
[0017] Preferably, the data of the user device is transmitted to the application server, wherein the application server analyses the data for the one or more substantial matches with the one or more predefined criteria. [0018] Preferably, upon detection of at least one substantial match with at least one of the one or more predefined criteria on the user device, transmitting an alert notification from the application server to the administrator device
[0019] Preferably, the method comprises the further steps of:
transmitting an outgoing communication from the user device;
comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and
if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.
[0020] Preferably, the method comprises the further steps of:
receiving an incoming communication at the user device;
comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and
if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.
[0021 ] Preferably, the predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
[0022] Preferably, the alert notification comprises a push message indicating a predefined criteria has been detected on the user device.
[0023] Preferably, upon identification of a substantial match, the method comprises the further step of disabling or restricting one or more features of the user device. Preferably, the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device. In some embodiments, the application server communicates directly with an application installed on the user device and thereby effects operation and/or control of the user device. In some alternative embodiments, an updated device profile is pushed to the user device via a mobile device management (MDM) profile.
[0024] Preferably, upon identification of a substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the link established between the administrator device and the user device.
[0025] Preferably, the connection comprises a wireless, data exchanging connection.
[0026] Preferably, the step of monitoring data of a user device further comprises monitoring data received by and/or sent from the user device.
[0027] In another form, the invention resides in a non-transitory computer- readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for: establishing a wireless connection between a user device and an administrator device;
monitoring data of a user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
[0028] Preferably, the user device comprises a smartphone. Preferably, the administrator device comprises a smartphone. [0029] Preferably, the administrator device is in wireless communication or connection with a plurality of user devices.
[0030] In another form, the invention resides in a system for monitoring online communications, the system comprising: an administrator device; and a user device in wireless communication (or a wireless connection) with the administrator device, wherein the user device is programmed to: monitor data of the user device analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
administrator device.
[0031 ] In another form, the invention provides a method for monitoring electronic device activity, the method comprising the steps of: establishing a wireless connection between a user device and an administrator device; monitoring data of a user device; analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device. BRIEF DESCRIPTION OF THE DRAWINGS
[0032] By way of example only, preferred embodiments of the invention will be described more fully hereinafter with reference to the accompanying figures, wherein:
[0033] FIG. 1 illustrates a schematic diagram of a system for monitoring electronic communications of user devices according to an embodiment of the invention;
[0034] FIG. 2 illustrates a block diagram of a method for monitoring electronic communications of user devices according to an embodiment of the invention; and
[0035] FIG. 3 illustrates a diagram of two electronic devices that can be used to implement the embodiments of the invention shown in FIG. 1 and FIG. 2.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0036] FIG. 1 shows a schematic diagram of a system 100 adapted to provide a service for monitoring electronic communications and activities conducted through smartphone applications and limit or prevent online bullying.
[0037] The illustrated system 100 includes an administrator device in the form of a parent device 105 having an administrator application 106, in the form of monitoring software, installed thereon, and user child devices 110a, 110b each having a monitoring application 111a, 111 b, also in the form of software installed thereon. The monitoring applications 111 a, 111 b installed on each user device 110a, 110b can be installed by downloading from an appropriate location (such as an application store or mirror), pushed from the administrator device 105 to each user device 110a, 110b over a network (such as a cellular network or WAN, for example) or can be integrated into the firmware or operating system of each user device 110a, 11 Ob.
[0038] In the illustrated embodiment, user device 110a, 110b is also in communication with an unmonitored device 115. Each of the devices described above are in communication with each relevant device over a network 120
[0039] In use, the parent device 105 establishes a connection with each of the user devices 110a, 110b having an instance of the monitoring application 111 a, 111 b installed which are to be monitored. The connection can be established by an application server 120 which stores and verifies user profiles 121 associated with specific devices (such as parent device 105 and user devices 110a, 1110b), wherein the user of parent device 105 logs into an account or profile stored on the application server 120 and adds the user devices 110a, 110b to the account to link the three devices 105, 110a, 110b together.
[0040] Once the link has been established between the parent device 105 and the user devices 110a, 110b via application server 120, data transmitted to and from each user device 110a, 110b is pushed to the application server 120 where the data may be monitored and analysed by the monitoring application 111 a, 111 b installed on each respective user device 110a, 110b and the application server 120 and application software 122 (see FIG. 3).
[0041 ] The analysis comprises finding exact matches and substantial matches of the data being transmitted to and/or from the device 110a, 110b (including from unmonitored device 115 and elsewhere) with one or more predefined criteria. Examples of predefined criteria can include predefined text strings included in SMS, emails, MMS or other electronic messages, images, audio clips, or video clips. However, it will be appreciated that the predefined criteria is not limited to text strings and can include a number of indicators or user configured filters. For example, in some embodiments, the monitoring application is configured to allow a user to define a dictionary of words, phrases (including slang terms and phrases, references to bullying, anxiety, depression, online grooming, suicide and sexual terms, for example) and elements (which can include location data, images, emojis, certain phone numbers/emails/accounts, etc.) which the user of the administrator device has predetermined to be potentially indicative of undesired conduct (i.e. bullying). As a result, the monitoring application is thereby configured to capture any communication data that is received or transmitted from the user device at any time for monitoring purposes. This can be particularly useful for identifying bullying that has not been reported or bullying occurring from new or unidentified sources.
[0042] Upon detection of an exact or substantial match to at least one of the one or more predefined criteria on the user device 110a, 110b (or the application server 120 in some embodiments), an alert notification is created by the application server 120 and transmitted to the parent device 105 to alert the user of the parent device 105 that bullying may be taking place. In the embodiments where the user device 110a, 110b detects the match, the user device 110a, 110b will communicate the detection to the application server 120 which then alerts the parent device 105.
[0043] The alert notifications are typically transmitted directly to the parent device 105 and thereby an administrator (such as a parent) is not required to access an intermediary database or service to access data that has been identified as a match to the predefined criteria. In this regard, in some embodiments, the hardware and software required to run the monitoring system resides on the administrator and user devices 105, 110a, 110b.
[0044] In some embodiments, upon identification of a match, one or more features of the user device 110a, 110b are automatically disabled or restricted. Alternatively, a prompt may be sent to the administrator device 105 requesting a confirmation instruction to disable or restrict one or more features of the user device at the discretion of the user of the administrator device.
[0045] In some further embodiments, upon identification of a substantial match, the administrator device 105 is granted remote access and control of the user device 110a, 110b at the discretion of the user of the administrator device 105.
[0046] Some examples of control of the user device that the administrator device may have include blocking access to certain installed applications on the user device, timed access control, activity monitoring, remote formatting and clearing of the device, remote locking of the device, disabling or restricting the ability to install applications on the user device, preventing access to specific websites and disabling specific features of the device such as the camera, for example.
[0047] In some additional embodiments, application server 120 collects and organises communication data in a database. As described above, the communication data can include electronic data that is sent to or sent by a user or user device by accessing applications installed on the user devices 110a, 110b.
[0048] In some embodiments, wherein the user device 110a comprises a smart device having the Android operating system installed thereon, the application server 120 communicates directly with the monitoring application 111 a installed on the user device 110a and thereby effects operation and/or control of the user device 110a.
[0049] In some alternative embodiments, wherein the user device 110b comprises a smart device having the iOS operating system installed thereon, an updated device profile is pushed to the user device 110b via a mobile device management (MDM) profile.
[0050] In one exemplary embodiment, the user devices 110a, 110b belong to one or more bullies who are sending intimidating/threatening/bullying communications and/or one or more victims of bullying who are receiving the intimidating/threatening/bullying communications. For example, the application may be installed on any known device associated with a bully or a victim. Preferably, the application is installed on a victim’s device to monitor and collect data received from one or more bullies through various sources (such phone calls, messages and social networks, for example).
[0051 ] In some embodiments, the monitoring application can be remotely pushed to a user device from an administrator device.
[0052] In some additional embodiments, the monitoring application may be integrated into a user device’s firmware. As a result, the application will not be detectable from a task manager or application control panel, and thus may be hidden from users to prevent the monitoring application from being disabled or uninstalled.
[0053] In some embodiments, the monitoring application installed on a user device runs in as a background task or program, allowing the application actively monitor incoming and outgoing communications without being present or“on top” on a display of the user device. [0054] In some embodiments, the user devices include mobile phones and/or another other computing device capable of receiving, accessing, sending, and/or storing data.
[0055] In one embodiment, the service platform 120 determines data to collect based on the user applications and devices related to a source of harassment as well as a target. By way of example and not limitation, communication and activity data can include words and phrases, names, images, sounds, videos, metadata and other data related context information or other components of the data that can be parsed. The data may also be analysed by a natural language processor in order to determine context of words and phrases used in the interaction data (in order to reduce false positives such as profanities used among friends).
[0056] In one example, the user device can be configured to monitor location data obtained from a GPS device of the user device and generate an alert to the administrator device if the location data indicates that the user device has left or entered a specific geographical location defined by the administrator device.
[0057] FIG. 2 illustrates an embodiment of a process 200 for monitoring and analysing communication and activity data of an electronic device.
[0058] In step 205, the administrator device and any user devices to be monitored by the administrator device establish a connection.
[0059] In step 210, each user device, by way of an application or service installed thereupon, monitors incoming and/or outgoing data received at the respective device. [0060] In step 215, the data that is received and/or sent from a respective user device is analysed by the application or service installed thereupon searching for at least a substantial match to one or more predefined criteria, which may be system defined or user defined.
[0061 ] In step 220, if a substantial match or exact match to at least one predefined criterion is identified, an alert notification is created and transmitted to a relevant administrator device for the attention of a user of the administrator device.
[0062] In some embodiments, the monitoring application enables a third-party (such as a school administrator or parent, for example) to remotely access and/or control the electronic device having the monitoring application installed thereon using an administrator device. In one particular example, the monitoring application grants remote access and remote control privileges (i.e. administrator access) to an administrator device. The monitoring application allows the parent device to access the user device to collect information about potential instances of bullying experienced by the user of the user device and also control access to various services (such as disabling access to a particular application, for example). In some embodiments, the monitoring application installed on the user device is programmed to monitor applications and services on the user device for certain keywords or phrases, which may be indicative of bullying behaviour being sent or received. If one or more of the keywords or phrases are detected by the monitoring application a notification can be sent to the parent device to alert the user of the parent device to a potential instance of bullying and to allow the user of the parent device to take appropriate action. [0063] FIG. 3 is a diagram of two identical electronic devices 310 (which can each act as a monitored user device or administrator device) that can be used to implement various exemplary embodiments of the invention, and an exemplary embodiment of the application server 120. Each electronic device 310 includes a bus 315 coupling a memory 320 (storing firmware and/or software 321 ), a display 325, a communication device in the form of a radio transceiver unit 330 and a processor 335. The display 325, such as a liquid crystal display adapted for touchscreen interface, displays information to a user of the user device and may also operate as an input device. The display 325 communicates inputs and command requests to the processor 335.
[0064] Application server 120 includes application software 122 having the user profiles 121 stored thereon.
[0065] The application server 120 includes a bus 350 coupling a memory 355 (storing firmware or software including the application software 122), a communication device in the form of data transceiver unit 331 (which includes a wired connection to the Internet via Network 340) and a processor 365.
[0066] The application server may also comprise a web server running web server software, such as Apache, Ngix or IIS, for example.
[0067] The application server also includes a scripting language (such as HTML, JS or PHP, for example) installed thereon to form the running software.
[0068] According to some embodiments of the invention, the processes and methods described herein are performed by the electronic device 310 and application server 120, in response to the processor 335 executing an instruction contained in memory 320 (which may be volatile memory, non volatile memory or a combination of the two). Execution of the instructions contained in memory 320 cause the processor 335 to perform one or more of the process or method steps (such as those described above in relation to FIG. 1 and 2) described herein above.
[0069] One or more processors in a multiprocessing arrangement may also be employed to execute the instructions contained in memory 320. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement embodiments of the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
[0070] As mentioned, the electronic devices 310 also includes a communication device in the form of a radio transceiver unit 330 coupled to bus 315. The radio transceiver unit 330 provides a two-way data communication coupling to a network 340 using wireless radio signals. It will be appreciated that the communication device could also take the form of a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line. As another example, communication device may be a local area network (LAN) card (e.g. for Ethernet™ or an Asynchronous Transfer Model (ATM) network) to provide a data communication connection to a compatible LAN. Wireless links can also be implemented. In any such implementation, the communication device sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information. Further, the communication device can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal Computer Memory Card International Association) interface, etc. Although a single communication interface is depicted in FIG. 3, multiple communication interfaces can also be employed.
[0071 ] The network link 345 typically provides data communication through one or more networks to other electronic devices. For example, the network link 345 may provide a connection through cellular network 340 to a second electronic device 310, which has connectivity to a network (e.g. a wide area network (WAN) or the Internet) or to data equipment operated by a service provider. The local network and the network both use electrical, electromagnetic, or optical signals to convey information and instructions. The signals through the various networks and the signals on the network link and through the communication device, which communicate digital data with the electronic devices, are exemplary forms of carrier waves bearing the information and instructions.
[0072] As noted above, with greater accessibility to content and information over modern communications networks, users may also be more susceptible to bullying conduct (e.g., cyber bullying) or interactions facilitated over such communication devices and networks. By way of example, cyber bullying includes, for instance, a person’s (e.g., a source’s) tormenting, threatening, harassing, and/or embarrassing another person (e.g., a target) using communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc. In some cases, if bullying conduct is not dealt with properly, cyber bullying potentially may result in grave consequences including substance abuse, suicide, and the like. In milder or less volatile cases, cyber bullying damages the self-esteem of the target (e.g., a targeted child or adolescent), causing potentially lifelong psychological and/or emotional issues. In many cases, responsible authorities (e.g., parents, teachers, law enforcement, etc.) are completely unaware of cyber bullying conduct being perpetrated on targeted individuals, and wish for a mechanism to provide earlier warning and/or intervention to prevent or stop such conduct.
[0073] Advantageously in some embodiments, the system provides for automated monitoring, processing, and/or reporting of the conduct. In this way, to initiate the anti-bullying service, a user need only install or activate the service on his or her device(s). In one use case, potential victims or targets can proactively install or initiate the service. In another use case, parents of potential targets may latently install or initiate the service on behalf of the target.
[0074] Although the various embodiments described herein are discussed with respect to providing an anti-bullying service (anti-cyber bullying, in particular), it is contemplated that the embodiments are also applicable to services for monitoring any form of conduct (i.e. , monitored conduct) involving a source and a target. By way of example and not limitation, in addition to bullying-related conduct, such monitored conduct includes harassing conduct, offensive conduct, illegal conduct, conduct in violation of public and/or private rules or regulations, and the like. In yet other embodiments, the monitored conduct need not be negative conduct, but instead may include positive conduct such as conduct in compliance with rules and regulations, conduct that assists other users, altruistic conduct, etc.
[0075] While various embodiments and examples of the data have been described above, it will be appreciated that the definition of data is not limited to those embodiments and examples. Some further examples of data comprise voice calls, voice mails, text messages, SMS/MMS, emails, social networks, web pages, news feeds (e.g. news feeds, ticker blocks, blog feeds, forum feeds), images, videos, sound, interaction data related context information (e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.), recordings, links to games and applications and music.
[0076] In this specification, adjectives such as first and second, left and right, top and bottom, and the like may be used solely to distinguish one element or action from another element or action without necessarily requiring or implying any actual such relationship or order. Where the context permits, reference to an integer or a component or step (or the like) is not to be interpreted as being limited to only one of that integer, component, or step, but rather could be one or more of that integer, component, or step etc.
[0077] The above description of various embodiments of the present invention is provided for purposes of description to one of ordinary skill in the related art. It is not intended to be exhaustive or to limit the invention to a single disclosed embodiment. As mentioned above, numerous alternatives and variations to the present invention will be apparent to those skilled in the art of the above teaching. Accordingly, while some alternative embodiments have been discussed specifically, other embodiments will be apparent or relatively easily developed by those of ordinary skill in the art. The invention is intended to embrace all alternatives, modifications, and variations of the present invention that have been discussed herein, and other embodiments that fall within the spirit and scope of the above described invention. [0078] In this specification, the terms ‘comprises’, ‘comprising’, ‘includes’, ‘including’, or similar terms are intended to mean a non-exclusive inclusion, such that a method, system or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.

Claims

1. A method for monitoring electronic device activity, the method comprising the steps of:
establishing a wireless connection between a user device and an administrator device;
monitoring data of the user device;
analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
2. The method of claim 1 , wherein the data is associated with one or more applications of the user device.
3. The method of claim 1 or claim 2, wherein the data comprises communication data associated with a communication application and location data.
4. The method of claim 3, wherein the communication data comprises calling data and/or messaging data.
5. The method of claim 3 or claim 4, wherein the location data is associated with a location of the user device determined by a Global Positioning System (GPS) or cellular network.
6. The method of any one of claims 3-5, wherein the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.
7. The method of any one of claims 1 -6, wherein the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.
8. The method of any one of claims 1 -7, wherein the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.
9. The method of any one of claims 1-8, wherein the data is associated with an interaction between the user device and a target device.
10. The method of any one of claims 1-9, wherein the data is associated with an incoming or outgoing communication.
11. The method of any one of claims 1 -10, the method comprising the further steps of:
transmitting an outgoing communication from the user device;
comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and
if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.
12. The method of any one of claims 1 -11 , the method comprising the further steps of:
receiving an incoming communication at the user device;
comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.
13. The method of any one of claims 1 -12, wherein the one or more predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.
14. The method of any one of claims 1 -13, wherein the alert notification comprises a push message indicating a predefined criteria of the one or more predefined criteria has been detected on the user device.
15. The method of any one of claims 1 -14, wherein upon identification of the substantial match, the method comprises the further step of disabling or restricting one or more features of the user device.
16. The method of claim 15, wherein the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device.
17. The method of any one of claims 1 -16, wherein upon identification of the at least one substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the connection established between the administrator device and the user device.
18. A non-transitory computer-readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for:
establishing a wireless connection between a user device and an administrator device;
monitoring data of the user device; analysing the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.
19. A system for monitoring online communications, the system comprising:
an administrator device; and
a user device in wireless communication with the administrator device, wherein the user device is programmed to:
monitor data of the user device
analyse the data for one or more substantial matches with one or more predefined criteria; and
upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the
administrator device.
PCT/AU2020/050515 2019-05-24 2020-05-25 Method for monitoring electronic device activity WO2020237293A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2019901774 2019-05-24
AU2019901774A AU2019901774A0 (en) 2019-05-24 Method for Monitoring Electronic Device Activity

Publications (1)

Publication Number Publication Date
WO2020237293A1 true WO2020237293A1 (en) 2020-12-03

Family

ID=73552501

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2020/050515 WO2020237293A1 (en) 2019-05-24 2020-05-25 Method for monitoring electronic device activity

Country Status (1)

Country Link
WO (1) WO2020237293A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8718633B2 (en) * 2011-07-13 2014-05-06 Qualcomm Incorporated Intelligent parental controls for wireless devices
WO2015095597A1 (en) * 2013-12-19 2015-06-25 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying
US10009480B2 (en) * 2007-06-28 2018-06-26 Kajeet, Inc. Policy management of electronic devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10009480B2 (en) * 2007-06-28 2018-06-26 Kajeet, Inc. Policy management of electronic devices
US8718633B2 (en) * 2011-07-13 2014-05-06 Qualcomm Incorporated Intelligent parental controls for wireless devices
WO2015095597A1 (en) * 2013-12-19 2015-06-25 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying

Similar Documents

Publication Publication Date Title
US10375187B1 (en) Suicide and alarming behavior alert/prevention system
Lee et al. <? covid19?> Tracing surveillance and auto-regulation in Singapore:‘smart’responses to COVID-19
US9665835B2 (en) Social distribution of emergency status
US8473281B2 (en) Net moderator
CN106940641B (en) Notification message processing method and device
CA2773749C (en) Public safety analysis system
US8527596B2 (en) System and method for monitoring activity of a specified user on internet-based social networks
US20170300472A1 (en) Linguistic analysis and learning for policy engine
US9985920B2 (en) Event notification
US9059949B2 (en) Monitoring of regulated associates
US20200394361A1 (en) Message sentiment analyzer and feedback
KR102355973B1 (en) Apparatus and method for detecting smishing message
US20090183259A1 (en) Integrated Protection Service System Defining Risk Profiles for Minors
US20110029618A1 (en) Methods and systems for managing virtual identities in the internet
US11373512B2 (en) Applying machine intelligence for location-based services to dispatch first responders
US20180041532A1 (en) System for Handling Communicated Threats
US10959081B2 (en) Network-based alert system and method
KR20170058885A (en) Risk detection device, risk detection method, and risk detection program
WO2020237293A1 (en) Method for monitoring electronic device activity
CN113904828B (en) Method, apparatus, device, medium and program product for detecting sensitive information of interface
KR20200093152A (en) Criminal Response System and Method for Foreign Travelers
WO2015160038A1 (en) Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium
US20220210189A1 (en) Mitigation of phishing risk
CN106649343B (en) Network data information processing method and equipment
Horsman A survey of current social network and online communication provision policies to support law enforcement identify offenders

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20812518

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20812518

Country of ref document: EP

Kind code of ref document: A1