H04M1/724631

System and method for discouraging inappropriate use of a mobile device
11356549 · 2022-06-07 ·

A system and method for discouraging the in appropriate use of a mobile device including registering a mobile device with a monitoring application running on a system coupled with a network. A mobile device is linked with the monitoring application through the network. The operational status of the mobile device is monitored to detect if a change occurs in the operational status. A change in the operational status of the mobile device is reported to the monitoring program with time information and the status change is displayed in a graphical interface, and a notification message is sent to a system user. Beacons might also be implemented to advise a device user to disable a mobile device to be monitored.

Mobile device and accessory case with display locking feature
11356548 · 2022-06-07 ·

Systems and methods for use with a mobile electronic device comprising a sensor operatively associated with the mobile electronic device for detecting contact with the display and a feature that helps prevent unauthorized access to the mobile electronic device responsive to the determination that the detected contact is accidental, and in some embodiments, the systems and methods of the invention include a case for mating with the body, a sensor mounted to the case, and a software application stored in the memory of the mobile electronic device, the application being in communication with the sensor for detecting contact with the cover to receive data relating to the contact and determine whether the contact is accidental contact, wherein the mobile electronic device is made inaccessible responsive to the determination that the detected contact is accidental.

Detecting device movement and/or device usage within a vehicle

Systems and methods are disclosed for receiving and transmitting accelerometer data and/or usage data, and analyzing the data to detect movement or usage of the device within a vehicle. A device, such as a mobile device, may detect a device movement event or a device usage event associated with the device. Based on the detection of the device movement event or the device usage event, a time associated with the event may be stored. The device may determine whether another event associated with the device occurs within a threshold amount of time from the time associated with the event. Based on a determination of whether the other event occurs within the threshold amount of time, the device may determine an event session associated with the device. The event session may comprise an instantaneous event or a continuous event. Data indicative of the event session may be transmitted to a server.

Redirecting Cellular Telephone Communications Through a Data Network
20220166768 · 2022-05-26 · ·

A method, system, and apparatus, including a program encoded on computer-readable medium, for routing communications to a mobile device includes registering a cellular telephone identifier with a visitor location register associated with a bridge mobile switching center adapted to receive communication through a cellular backbone network and route communications over a packet-switched network and determining that cellular communications using the cellular telephone identifier are disabled. A home location register associated with the cellular telephone is notified that the cellular telephone is roaming in a network served by the visitor location register. A communication directed to the cellular telephone is received at the bridge mobile switching center. The received communication is routed to the cellular telephone.

USE RESTRICTION METHOD, PORTABLE TERMINAL, AND STORAGE MEDIUM
20230275988 · 2023-08-31 ·

A system that is capable of preventing an operation-while-moving and giving an advantage to a user, a communication carrier, or the like is proposed. A use restriction method for a portable terminal includes: a detection step of detecting an operation-while-moving performed by a user on the portable terminal; a restriction step of restricting the user's use of the portable terminal; a reproduction step of reproducing question type content while the user's use is being restricted and a stop of movement of the user is being detected; and a releasing step of terminating the reproducing of the question type content and releasing the restricting, in a case where the user has completed answering the question type content.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
20220159469 · 2022-05-19 · ·

A configuration that performs lock control such as unlocking of IC card function providing applications in various types of fine condition setting is realized. The configuration has a control section that executes lock control including a locking process in which use of an IC card function providing application is disabled and a lock unlocking process in which use of the IC card function providing application is enabled. On the basis of acquisition information of a lock unlocking decision application that is an application different from the IC card function providing application, the control section executes the lock control of the IC card function providing application. For example, in a case where a step count of a user counted by a step counting application has exceeded a specified step count that is a prespecified lock unlocking condition, the control section executes the lock unlocking process of the IC card function providing application.

Cross-device security scheme for tethered devices
11334650 · 2022-05-17 · ·

Embodiments help to provide a cross-device security schema for an audio device and a master device to which it is tethered (e.g., a smartphone). An example security scheme provides flexible mechanisms for locking and unlocking the audio device and the device to which it is tethered. For instance, an example security scheme may include: (a) an unlock sync feature that unlocks the audio device and keeps the audio device unlocked whenever the master device is unlocked, (b) a separate audio device unlock process that unlocks the audio device only (without unlocking the master device, and (c) an on-head detection process that, in at least some scenarios, locks the audio device in response to a determination that the audio device is not being worn.

Fingerprint identification method, device, mobile terminal, and storage medium

A fingerprint identification method, a device, a mobile terminal, and a storage medium, belong to the technical field of information processing technology. The method is applied to a terminal, response to detecting a touch operation on a specified application icon, obtaining fingerprint information corresponding to the touch operation; transmitting the fingerprint information to an application corresponding to the specified application icon; the application performing a safety authentication to the fingerprint information; and response to determining that the fingerprint information passes the safety authentication, the application entering an application display interface.

MULTIFUNCTION WIRELESS DEVICE

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

Context-based notifications presentation

The present disclosure is related to automatically, based on contextual information and without needing explicit input from a user, modifying one or more settings associated with presenting a notification. In examples, settings may include automatically suspending notification presentation or automatically overriding a notification setting that suspends notification presentation. In addition, contextual information may include, among other things, information related to a computing device (e.g., device location or network signal strength), a rate of user interaction or engagement with an application (e.g., rate of information sharing, user reactions, etc.), and/or a calendar or schedule of a user. In examples, the contextual information may be analyzed (e.g., based on comparison to a threshold) to determine whether a condition is met, and based on the analysis, the one or more settings may be modified.