US20060073820A1 - Method and apparatus for remote control and updating of wireless mobile devices - Google Patents

Method and apparatus for remote control and updating of wireless mobile devices Download PDF

Info

Publication number
US20060073820A1
US20060073820A1 US10/538,794 US53879405A US2006073820A1 US 20060073820 A1 US20060073820 A1 US 20060073820A1 US 53879405 A US53879405 A US 53879405A US 2006073820 A1 US2006073820 A1 US 2006073820A1
Authority
US
United States
Prior art keywords
updates
update
application
discretionary
action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/538,794
Inventor
Ronald Craswell
David Pratt
Paul Klassen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gula Consulting LLC
Original Assignee
Action Engine Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Action Engine Corp filed Critical Action Engine Corp
Priority to US10/538,794 priority Critical patent/US20060073820A1/en
Assigned to ACTION ENGINE CORPORATION reassignment ACTION ENGINE CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CRASWELL, RONALD J., KLASSEN, PAUL J.H., PRATT, DAVID S., JR.
Publication of US20060073820A1 publication Critical patent/US20060073820A1/en
Assigned to PERLEGO SYSTEMS, INC. reassignment PERLEGO SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ACTION ENGINE CORPORATION
Assigned to SILICON VALLEY BANK reassignment SILICON VALLEY BANK SECURITY AGREEMENT Assignors: PERLEGO SYSTEMS, INC.
Assigned to PERLEGO SYSTEMS INC. reassignment PERLEGO SYSTEMS INC. RELEASE Assignors: SILICON VALLEY BANK
Assigned to BOLLER CROSS DATA, L.L.C. reassignment BOLLER CROSS DATA, L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PERLEGO SYSTEMS, INC.
Assigned to PERLEGO SYSTEMS, INC. reassignment PERLEGO SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: SILICON VALLEY BANK
Priority to US14/799,007 priority patent/US10057415B2/en
Priority to US16/105,617 priority patent/US20190058789A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42178Administration or customisation of services by downloading data to substation equipment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42144Administration or customisation of services by service provider
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present invention relates to the field of wireless communications. More specifically, the present invention relates to the provision of a remove control function from remotely controlling a wireless mobile device, including remotely locking the device; and additionally includes the provision of an update function for wireless devices.
  • wireless mobile devices Since their introduction, the capabilities and number of services and features of wireless mobile devices have steadily increased while the cost of ownership and operation has decreased. At first, wireless mobile devices operated on analog wireless networks that established voice communications and simple paging features. Later, digital wireless networks were introduced for cellular telephone communications to provide more advanced features for voice and data communications, such as encryption, caller identification and transmitting and receiving Short Message Service (“SMS”) text messages.
  • SMS Short Message Service
  • Some cellular telephones also incorporate many of the features originally provided for in the hand-held electronic devices, such as personal data assistants (“PDAs”).
  • PDAs personal data assistants
  • Relative simple PDA features such as keeping a list of contacts, a calendar, appointments and the like have been generally integrated into recent cellular telephone models.
  • FIG. 1 is a pictorial diagram of a number of devices connected to a network which provide a client device, also connected to the network, with update and remote control services in accordance with embodiments of the present invention.
  • FIG. 2 is a block diagram of the client device that provides an exemplary operating environment for an embodiment of the present invention.
  • FIG. 3 is a diagram illustrating the actions taken by a client device, a remote control/update server and an administrator device to provide remote control services in accordance with embodiments of the present invention.
  • FIG. 4 is a flow diagram illustrating a client remote control routine in accordance with embodiments of the present invention.
  • FIG. 5 is a diagram illustrating the actions taken by a client device, and a remote control/update server to provide update services in accordance with embodiments of the present invention.
  • FIG. 6 is a flow diagram illustrating an update routine in accordance with embodiments of the present invention.
  • FIG. 7 is a diagram illustrating actions taken by a client device, and a remote control/update server to provide an alternate update service in accordance with embodiments of the present invention.
  • FIG. 8 is the flow diagram illustrating an alternate update routine in accordance with embodiments of the present invention.
  • the present invention includes a remote control application for wireless mobile devices.
  • the remove control application allows a wireless communication service provider to remotely control a subscriber's wireless mobile device.
  • the remote control application allows a wireless communications service provider to remotely lock a subscriber's wireless mobile device.
  • by invoking the update application described below a user's data (including programs and operating system data) on a wireless mobile device can be updated without the user needing to intervene.
  • the remote control software application resides on a wireless mobile device and can allow secure remote administration of the wireless mobile device to cause specific tasks to be performed on the device, to cause the user interface (“UI”) of the device to be locked from normal access, allow a remote administrator to cause files and data stored on the wireless mobile device to be erased, to allow a remote administrator to cause a backup to be performed on the wireless mobile device, and for a remote administrator to cause an update on data in the wireless mobile device.
  • UI user interface
  • the remote control application allows the remote administrator to seize control (either with or without a user's permission) of a wireless mobile device and in one exemplary embodiment, to do so with no visible indication as to the fact that control has been seized of the device.
  • the remote administrator will be able to use a unique device identifier (“ID”) to log in and select various options.
  • Special messages or instructions for the remote control application on the wireless mobile device are then placed in a secure queue on a server.
  • a “ping” message is sent to the wireless mobile device.
  • the ping message is in turn processed by the remote control application on the wireless mobile device.
  • the remote control application on the wireless mobile device retrieves the special messages or instructions from the remote server and processes these instructions.
  • the instructions include updating the wireless mobile device
  • the updating process will allow programs installed on the wireless mobile device to be automatically updated in a manner that can be controlled by the user in some cases and is completely automatic (e.g., controlled by the wireless service provider as instructions) in other cases.
  • the update application on the wireless mobile device can update itself, update applications from a remote server, monitor a catalogue of application updates and additions on the server, monitor user activity via a unique device ID and/or other unique identifiers, launch by stub applications asking to be replaced by full applications and may further stop or resume downloads that have been interrupted.
  • the update application may be activated in a number of different ways: (1) It may be launched as a normal stand alone application as to any other application launched on the wireless mobile device. (2) It may be launched by a stub application, with a specific path, to replace the stub application with its intended application (after download and successful install). To the user, they would launch the stub application, see a download in progress screen, followed by the actual application starting up. (3) As already noted above, the update application may be invoked using the remote control application and having the update application invoked by a remote administrator.
  • the server will send updates in priority order. It will first send mandatory updates, then critical updates, then all others. Within each category, it will download the files in order of appearance.
  • Mandatory updates are those updates that the update application will automatically (and silently) download and update whenever the update application is invoked and such an update is located.
  • Critical updates are those that have been singled out as particularly important as they relate to fixing “bugs” in existing applications and/or providing increased security to a wireless mobile device. Normal updates are all the remaining types of updates.
  • Application and updates and be further categorized into “exclusive” updates. If an exclusive update is selected, no other selections can be made until the exclusive update is downloaded and installed. This category is particularly useful when installing updates that require a device reset, or updates that change the operating system files.
  • the update application does not sent personal information to a remote server. Rather, it downloads from the server the list of available updates from which is parses and analyzes against the local wireless mobile device's computing environment.
  • embodiments of the present invention operate in a wireless network to communicate between wireless mobile devices and remote servers.
  • networks may be used in addition to a wireless network, e.g., the “Internet” which refers to a collection of networks and routers that can communicate between each other on a global level using the Internet Protocol (“IP”) communications protocol.
  • IP Internet Protocol
  • FIG. 1 is a pictorial diagram of the exemplary wireless remote control and update system 100 for providing remote control and update services to wireless mobile devices such as client device 200 via a wireless network 110 and other networks 130 .
  • the client device 200 is shown pictorially as a PDA in FIG. 1 , it being recognized that a large number of client devices in a variety of forms will be included in actual remote control and update system 100 employing embodiments of the present invention.
  • a client device 200 has computing capabilities and may be any form of device capable of communicating with the remote/update server 150 in various embodiments of the present invention.
  • client device 200 is pictorially shown as a PDA, a mobile computer, cellular phone and the like may be equally employed, although these are just representative devices and should be taken as illustrative and not limiting.
  • the remote control/update system 100 functions in a distributed computer environment that includes a plurality of client devices, interconnected by a wireless network 110 via a gateway 120 to other networks 130 to a remote control/update server 150 .
  • an administrator device 140 is connected with the remote control/update server 150 to pass instructions to the remote control/update server 150 . All these connections and communications are interconnected via suitable network connections using suitable network communications protocols.
  • the remote control/update server 150 may reside on any device accessible by the client device 200 shown in FIG. 1 .
  • An exemplary client device 200 is shown in detail in FIG. 2 and described below.
  • remote control/update server 150 of the remote control/update system 100 is illustrated as a single device, the remote control/update server 150 may actually comprise more than a single device in an actual system practicing embodiments of the present invention. It will also be appreciated that the remote control/update server 150 may comprise file servers, database servers or a mixture of file servers and database servers.
  • FIG. 2 illustrates an exemplary computing device 200 suitable for use in embodiments of the present invention.
  • the computing device 200 may include many more components than those shown in FIG. 2 . However, it is not necessary that all of these generally conventional components be shown in order to disclose an enabling embodiment for practicing the present invention.
  • the client device 200 includes a communications interface 230 for connecting to remote devices.
  • the communications interface 230 includes the necessary circuitry, driver and/or transceiver for such a connection, and is constructed for use of the appropriate protocols for such a connection.
  • the communications interface 230 includes the necessary circuitry for a wireless network connection.
  • the computing device 200 also includes a processing unit 210 , a display 240 and a memory 250 , all interconnected along with the communications interface 230 via a bus 220 .
  • the memory 250 generally comprises a random access memory (“RAM”), a read-only memory (“ROM”), and a permanent mass storage device, such as a disc drive, flash memory, or the like.
  • the memory 250 stores and operating system 255 , remote control software 260 , and update software 265 , formed in accordance with embodiments of the present invention.
  • these software components may be loaded from a computer readable medium into memory 250 of the client device 200 using a drive mechanism (not shown) associated with the computer readable medium, such as a floppy, tape, DVD/CD ROM drive, flash memory or the communications interface 230 .
  • a drive mechanism associated with the computer readable medium, such as a floppy, tape, DVD/CD ROM drive, flash memory or the communications interface 230 .
  • a client device 200 may be any of a great number of computing devices capable of communicating remotely with other computing devices.
  • the client device 200 may be a cellular phone, PDA, general purpose computing device and the like.
  • FIG. 3 includes one exemplary sequence of communication interactions between an administrator device 140 , a remote control/update server 150 and a client device 200 .
  • the exemplary communication interaction shown in FIG. 3 begin with the administrator device 140 sending instructions 305 for the client device 200 along with a unique client device ID to the remote control/update server 150 .
  • the remote control/update server 150 then sends a “ping” message 310 to the client device 200 .
  • a determination 315 is then made that the ping message was meant for that particular client device 200 .
  • the client device 200 requests 320 further instructions for itself and includes its client ID.
  • the remote control/update server 150 then retrieves 325 one or more instructions for the client device 200 with the sent client ID. These instructions are then sent back as client device instructions 330 to the client device 200 . The client device 200 then performs 335 the client device instructions and notifies 340 the remote control/update server 150 that the client device instructions have been performed.
  • FIG. 4 is a flow diagram illustrating an exemplary client-side remote control software routine suitable for implementation by the client device 200 for receiving and processing remote control instructions from the remote control/update server 150 .
  • the remote control routine 400 begins at block 405 , where a message is received from the remote control/update server 150 .
  • decision block 410 a determination is made whether the message is a specially formatted “ping” message recognized by the remote control software 260 . If in decision block 410 it was determined that the massage was not a ping message, then routine 400 proceeds to block 455 where the message is forwarded on for normal processing and remote control routine 400 ends.
  • processing proceeds to block 415 where the client device 200 sends a request for further instructions to a remote server (e.g., remote control/update server 150 ).
  • a remote server e.g., remote control/update server 150
  • the client device 200 sends a request for further instructions to a remote server (e.g., remote control/update server 150 ).
  • a remote server e.g., remote control/update server 150
  • the client device 200 sends a request for further instructions to a remote server (e.g., remote control/update server 150 ).
  • the client device 200 receives the requested instructions. Similarly, while the request for instructions in block 415 may have been sent to one remote control/update server 150 , yet another remote control/update server 150 may return the actual instructions to the client device 200 .
  • decision block 425 a determination is made as to what service the instructions are targeted for. If in decision block 425 it was determined that the instructions are targeted to an update service, then processing proceeds to block 450 where the client device 200 is updated. Exemplary client update routines are illustrated in FIGS. 6 and 8 and described below.
  • mobile services may be any conventional mobile services that would apply to a wireless mobile device. However, in one exemplary embodiment of the present invention, these mobile services may include service for locking the UI of the client device 200 .
  • decision block 425 If in decision block 425 it was determined that the instruction was targeted to the backup service then processing proceeds to decision block 430 where a further determination is made whether the instructions are directed to erasing or backing up data on the client device 200 . If the determination in decision block 430 indicated that data is to be erased, then processing proceeds to block 435 where the memory of the client device is partially or completely erased as directed in the received instructions. In the alternative, where a backup instruction was issued for backing up the data on the client device 200 , then processing proceeds to block 440 where some or all of the memory of the client device is backed up depending on the received instructions.
  • FIGS. 5-8 include further description of the functionality of the present invention.
  • FIG. 5 includes one exemplary sequence of communication interactions between a client device 200 and a remote control/update server 150 .
  • the communications from the client device 200 to the remote control/update server 150 may comprise wireless signals, including but not limited to: radio frequency (“RF”) signals, optical signals, audio modulated signals and electromagnetic signals as well as conventional wire-based signals.
  • RF radio frequency
  • the exemplary communication interactions shown in FIG. 5 begin with the client device 200 sending an update request 505 to the remote control/update server 150 .
  • the remote control/update server 150 then retrieves 510 a catalog of available updates.
  • the catalog of available updates is then sent 515 along with any mandatory updates back to the client device 200 .
  • mandatory updates are those updates which will be installed on the client device 200 regardless of a user's interaction.
  • the user may or may not be notified that a mandatory update has been installed. Accordingly once the client device receives the mandatory updates, they are installed 520 on the client device 220 .
  • the client device 200 next depicts 525 any relevant available updates on the client device 200 (e.g., via the display 240 ).
  • the relevant available updates are those non-mandatory updates (i.e., critical updates and other updates) that have not already been installed on the client device 200 and for which the client device 200 has a use (e.g., that are applicable to the currently installed operating system and/or versions of software running on the client device 200 ).
  • One or more relevant available updates are selected 530 on the client device 200 .
  • the selection of relevant available updates may be accomplished in a variety of manners. In one exemplary embodiment of the present invention all relevant available critical updates are automatically selected while other updates may be selected by a user using any form of conventional user interface.
  • the selected updates are requested 535 from the remote control/update server 150 .
  • the remote control/update server 150 retrieves 540 the selected update or updates and sends 545 the selected updates back to the client device 200 . Once the client device 200 receives the selected updates, they are then installed 550 on the client device 200 .
  • the remote control/update system 100 (described herein) includes a client device 200 whose software is to be updated via the remote control/update server 150 .
  • FIG. 6 is a flow diagram illustrating an exemplary client side update routine 600 suitable for implementation by the client device 200 for updating software on the client device from the remote control/update server 150 .
  • the update routine 600 begins at block 605 where a update is requested from the remote control/update server 150 .
  • a catalog of available updates is received along with any mandatory updates for the client device 200 .
  • decision block 615 a determination is made whether any mandatory updates were received. If so then processing proceeds to block 620 where the mandatory updates are installed on the client device 200 . Processing then proceeds to block 625 . Also if in decision block 615 it was determined that no mandatory updates were received then processing continues to block 625 .
  • the received catalog of available updates is compared to the currently installed software on the client device 200 .
  • decision block 630 a determination is made whether any available updates in the catalog are still relevant to the client device 200 . If in decision block 630 it is determined that no available updates are relevant to client device 200 then processing continues to block 660 where a message is depicted on the client device 600 that there are no relevant updates and routine 600 ends.
  • decision block 630 If, however, in decision block 630 it was determined that there are available updates that are still relevant to the client device 200 , then in block 635 those relevant updates are depicted at the client device 200 . Processing then proceeds to block 640 where any desired relevant updates are selected. As already noted, desired relevant updates may be selected in a variety of fashions according to any conventional selection mechanism.
  • block 645 a request is sent to the remote control/update server 150 for the selected updates. The selected updates are received in block 650 , and installed on the client device 200 in block 655 .
  • FIG. 7 illustrates an update session with communications between a client device 200 and a remote control/update server 150 .
  • the client device has a stub application that is automatically updated via the remote control/update server 150 .
  • the exemplary communications interactions shown in FIG. 7 begin with the client device 200 executing 705 a stub application.
  • the client device 200 depicts placeholder information 710 indicating that the application has been executed.
  • the full application is requested 715 from the remote control/update server 150 .
  • the remote control/update server 150 retrieves the full application 720 and returns 725 the full application back to the client device 200 .
  • the client device 200 then installs 730 the full application. At which point the full application may then be executed 735 .
  • FIG. 8 illustrates an alternate update routine 800 for implementation on the client device 200 .
  • the alternate update routine 800 replaces a stub application with a full application from a remote control/update server 150 .
  • Alternate update routine 800 begins at block 805 with the execution of a stub application. Next in block 810 a placeholder for the full application is displayed. In block 815 , the client device 200 sends a request to the remote control/update server 150 for the full application. In decision block 820 a determination is made whether the full application was received from the remote control/update server 150 . If so, processing proceeds to block 830 where the full application is installed on the client device 200 . After which, the full application can then be executed in block 835 . If however in decision block 820 it was determined that the full application was not received then in block 825 an error is depicted indicating that the full application was not available.

Abstract

A method and apparatus are provided to in one aspect update data on a wireless mobile device. Available updates may include both mandatory and discretionary updates, where the mandatory updates are always installed on the wireless mobile device. In another aspect, a method and apparatus for of remotely instructing a wireless mobile device to perform a service is provided. The wireless mobile device receives a ping message that instructs it to retrieve further instruction for performing services actions on the wireless mobile device.

Description

    CROSS-REFERENCE TO A RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/417,905, filed on Oct. 10, 2002, entitled UPDATE FOR WIRELESS MOBILE DEVICES, and U.S. Provisional Application No. 60/417,858, filed on Oct. 10, 2002, entitled REMOTE CONTROL FOR WIRELESS MOBILE DEVICES INCLUDING REMOTE LOCKING, the subject matter of which is incorporated herein by reference.
  • FIELD OF THE INVENTION
  • The present invention relates to the field of wireless communications. More specifically, the present invention relates to the provision of a remove control function from remotely controlling a wireless mobile device, including remotely locking the device; and additionally includes the provision of an update function for wireless devices.
  • BACKGROUND OF INVENTION
  • Since their introduction, the capabilities and number of services and features of wireless mobile devices have steadily increased while the cost of ownership and operation has decreased. At first, wireless mobile devices operated on analog wireless networks that established voice communications and simple paging features. Later, digital wireless networks were introduced for cellular telephone communications to provide more advanced features for voice and data communications, such as encryption, caller identification and transmitting and receiving Short Message Service (“SMS”) text messages.
  • Some cellular telephones also incorporate many of the features originally provided for in the hand-held electronic devices, such as personal data assistants (“PDAs”). Relative simple PDA features such as keeping a list of contacts, a calendar, appointments and the like have been generally integrated into recent cellular telephone models.
  • Recently, some cellular telephones were enabled to allow the browsing of web pages on the Internet or other on-line services. More recently, Action Engine, Inc. of Redmond, Wash., assignee of the present invention, has developed and improved browserless approach to are consumed using wireless mobile devices, more user data, in particular, important, sensitive and/or critical data are being stored on the wireless mobile devices. In addition, as more and more types of software are implemented and/or installed on wireless mobile devices, the number of updates to the software has increased as well. Additionally, as wireless mobile devices become more sophisticated, users may not be able to keep track of the current state of development in their software and other data on their wireless mobile devices.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The present invention will be described by way of exemplary embodiments, but not limitations, illustrated in the accompanying drawings in which like references denotes similar elements, and in which:
  • FIG. 1 is a pictorial diagram of a number of devices connected to a network which provide a client device, also connected to the network, with update and remote control services in accordance with embodiments of the present invention.
  • FIG. 2 is a block diagram of the client device that provides an exemplary operating environment for an embodiment of the present invention.
  • FIG. 3 is a diagram illustrating the actions taken by a client device, a remote control/update server and an administrator device to provide remote control services in accordance with embodiments of the present invention.
  • FIG. 4 is a flow diagram illustrating a client remote control routine in accordance with embodiments of the present invention.
  • FIG. 5 is a diagram illustrating the actions taken by a client device, and a remote control/update server to provide update services in accordance with embodiments of the present invention.
  • FIG. 6 is a flow diagram illustrating an update routine in accordance with embodiments of the present invention.
  • FIG. 7 is a diagram illustrating actions taken by a client device, and a remote control/update server to provide an alternate update service in accordance with embodiments of the present invention.
  • FIG. 8 is the flow diagram illustrating an alternate update routine in accordance with embodiments of the present invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • The detailed description which follows is represented largely in terms of processes and symbolic representations of the of operations by conventional computing components, including processors, memory storage devices for these processors, connected display devices and input devices, all of which are well-known in the art. These processes and operations may utilize conventional computing components in a heterogeneous distributed computer environment, including remote storage servers, computer servers and memory storage devices. Such processes, devices and operations also being known to those skilled in the art and others. Each of these conventional computing components may be accessible by the processors via a communications network.
  • The present invention includes a remote control application for wireless mobile devices. The remove control application allows a wireless communication service provider to remotely control a subscriber's wireless mobile device. In particular, the remote control application allows a wireless communications service provider to remotely lock a subscriber's wireless mobile device. Further, in an exemplary embodiment of the present invention, by invoking the update application described below, a user's data (including programs and operating system data) on a wireless mobile device can be updated without the user needing to intervene.
  • The remote control software application resides on a wireless mobile device and can allow secure remote administration of the wireless mobile device to cause specific tasks to be performed on the device, to cause the user interface (“UI”) of the device to be locked from normal access, allow a remote administrator to cause files and data stored on the wireless mobile device to be erased, to allow a remote administrator to cause a backup to be performed on the wireless mobile device, and for a remote administrator to cause an update on data in the wireless mobile device.
  • The remote control application allows the remote administrator to seize control (either with or without a user's permission) of a wireless mobile device and in one exemplary embodiment, to do so with no visible indication as to the fact that control has been seized of the device.
  • The remote administrator will be able to use a unique device identifier (“ID”) to log in and select various options. Special messages or instructions for the remote control application on the wireless mobile device are then placed in a secure queue on a server. Next, a “ping” message is sent to the wireless mobile device. The ping message is in turn processed by the remote control application on the wireless mobile device. The remote control application on the wireless mobile device then retrieves the special messages or instructions from the remote server and processes these instructions. In the exemplary embodiment of the present invention where the instructions include updating the wireless mobile device, the updating process will allow programs installed on the wireless mobile device to be automatically updated in a manner that can be controlled by the user in some cases and is completely automatic (e.g., controlled by the wireless service provider as instructions) in other cases.
  • Briefly, the update application on the wireless mobile device can update itself, update applications from a remote server, monitor a catalogue of application updates and additions on the server, monitor user activity via a unique device ID and/or other unique identifiers, launch by stub applications asking to be replaced by full applications and may further stop or resume downloads that have been interrupted.
  • As noted above, the update application may be activated in a number of different ways: (1) It may be launched as a normal stand alone application as to any other application launched on the wireless mobile device. (2) It may be launched by a stub application, with a specific path, to replace the stub application with its intended application (after download and successful install). To the user, they would launch the stub application, see a download in progress screen, followed by the actual application starting up. (3) As already noted above, the update application may be invoked using the remote control application and having the update application invoked by a remote administrator.
  • There are different types of updates and in various embodiments, the server will send updates in priority order. It will first send mandatory updates, then critical updates, then all others. Within each category, it will download the files in order of appearance. Mandatory updates are those updates that the update application will automatically (and silently) download and update whenever the update application is invoked and such an update is located. Critical updates are those that have been singled out as particularly important as they relate to fixing “bugs” in existing applications and/or providing increased security to a wireless mobile device. Normal updates are all the remaining types of updates.
  • Application and updates and be further categorized into “exclusive” updates. If an exclusive update is selected, no other selections can be made until the exclusive update is downloaded and installed. This category is particularly useful when installing updates that require a device reset, or updates that change the operating system files. The update application does not sent personal information to a remote server. Rather, it downloads from the server the list of available updates from which is parses and analyzes against the local wireless mobile device's computing environment.
  • As previously explained, embodiments of the present invention operate in a wireless network to communicate between wireless mobile devices and remote servers. It will be appreciated by those of ordinary skill in the art that other networks may be used in addition to a wireless network, e.g., the “Internet” which refers to a collection of networks and routers that can communicate between each other on a global level using the Internet Protocol (“IP”) communications protocol.
  • FIG. 1 is a pictorial diagram of the exemplary wireless remote control and update system 100 for providing remote control and update services to wireless mobile devices such as client device 200 via a wireless network 110 and other networks 130. For ease of illustration, the client device 200 is shown pictorially as a PDA in FIG. 1, it being recognized that a large number of client devices in a variety of forms will be included in actual remote control and update system 100 employing embodiments of the present invention. In general, a client device 200 has computing capabilities and may be any form of device capable of communicating with the remote/update server 150 in various embodiments of the present invention. Thus, while client device 200 is pictorially shown as a PDA, a mobile computer, cellular phone and the like may be equally employed, although these are just representative devices and should be taken as illustrative and not limiting.
  • The remote control/update system 100 functions in a distributed computer environment that includes a plurality of client devices, interconnected by a wireless network 110 via a gateway 120 to other networks 130 to a remote control/update server 150. In addition, an administrator device 140 is connected with the remote control/update server 150 to pass instructions to the remote control/update server 150. All these connections and communications are interconnected via suitable network connections using suitable network communications protocols. As will be appreciated by those of ordinary skill in the art, the remote control/update server 150 may reside on any device accessible by the client device 200 shown in FIG. 1. An exemplary client device 200 is shown in detail in FIG. 2 and described below.
  • It will also be appreciated that while the remote control/update server 150 of the remote control/update system 100 is illustrated as a single device, the remote control/update server 150 may actually comprise more than a single device in an actual system practicing embodiments of the present invention. It will also be appreciated that the remote control/update server 150 may comprise file servers, database servers or a mixture of file servers and database servers.
  • FIG. 2 illustrates an exemplary computing device 200 suitable for use in embodiments of the present invention. Those of ordinary skill in the art and others will appreciate that the computing device 200 may include many more components than those shown in FIG. 2. However, it is not necessary that all of these generally conventional components be shown in order to disclose an enabling embodiment for practicing the present invention. As shown in FIG. 2, the client device 200 includes a communications interface 230 for connecting to remote devices. Those of ordinary skill in the art will appreciate that the communications interface 230 includes the necessary circuitry, driver and/or transceiver for such a connection, and is constructed for use of the appropriate protocols for such a connection. In one embodiment of the present invention, the communications interface 230 includes the necessary circuitry for a wireless network connection.
  • The computing device 200 also includes a processing unit 210, a display 240 and a memory 250, all interconnected along with the communications interface 230 via a bus 220. Those of ordinary skill in the art and others will appreciate that the display 240 may not be necessary in all embodiments of the present invention and accordingly, is an optional component. The memory 250 generally comprises a random access memory (“RAM”), a read-only memory (“ROM”), and a permanent mass storage device, such as a disc drive, flash memory, or the like. The memory 250 stores and operating system 255, remote control software 260, and update software 265, formed in accordance with embodiments of the present invention. It will be appreciated that these software components may be loaded from a computer readable medium into memory 250 of the client device 200 using a drive mechanism (not shown) associated with the computer readable medium, such as a floppy, tape, DVD/CD ROM drive, flash memory or the communications interface 230.
  • Although an exemplary computing device 200 has been described, it general conforms to conventional computing devices, those of ordinary skill in the art and others will appreciate that a client device 200 may be any of a great number of computing devices capable of communicating remotely with other computing devices. In various embodiments of the present invention, the client device 200 may be a cellular phone, PDA, general purpose computing device and the like.
  • The operation of the remote control functionality of the remote control/update system 100 shown in FIG. 1 will be best understood by reference to FIG. 3 which includes one exemplary sequence of communication interactions between an administrator device 140, a remote control/update server 150 and a client device 200. The exemplary communication interaction shown in FIG. 3 begin with the administrator device 140 sending instructions 305 for the client device 200 along with a unique client device ID to the remote control/update server 150. The remote control/update server 150 then sends a “ping” message 310 to the client device 200. At the client device 200 a determination 315 is then made that the ping message was meant for that particular client device 200. Next, the client device 200 requests 320 further instructions for itself and includes its client ID. The remote control/update server 150 then retrieves 325 one or more instructions for the client device 200 with the sent client ID. These instructions are then sent back as client device instructions 330 to the client device 200. The client device 200 then performs 335 the client device instructions and notifies 340 the remote control/update server 150 that the client device instructions have been performed.
  • FIG. 4 is a flow diagram illustrating an exemplary client-side remote control software routine suitable for implementation by the client device 200 for receiving and processing remote control instructions from the remote control/update server 150. The remote control routine 400 begins at block 405, where a message is received from the remote control/update server 150. Next, in decision block 410 a determination is made whether the message is a specially formatted “ping” message recognized by the remote control software 260. If in decision block 410 it was determined that the massage was not a ping message, then routine 400 proceeds to block 455 where the message is forwarded on for normal processing and remote control routine 400 ends.
  • If, however, in decision block 410 it was determined that the message was a ping message, then processing proceeds to block 415 where the client device 200 sends a request for further instructions to a remote server (e.g., remote control/update server 150). Those of ordinary skill in the art and others will appreciate that while only a single remote control/update server 150 is illustrated in FIG. 1, that more than one remote control server 150 may be employed in sending ping messages and storing instructions. Accordingly, in one embodiment, one remote server may send a ping message which may direct the client device 200 to another remote server to retrieve instructions. Accordingly, the request for further instructions in block 415 may be directed to the same or a different remote control/update server 150 as to the one that sent the ping message. Next, in block 420, the client device 200 receives the requested instructions. Similarly, while the request for instructions in block 415 may have been sent to one remote control/update server 150, yet another remote control/update server 150 may return the actual instructions to the client device 200. Next, in decision block 425, a determination is made as to what service the instructions are targeted for. If in decision block 425 it was determined that the instructions are targeted to an update service, then processing proceeds to block 450 where the client device 200 is updated. Exemplary client update routines are illustrated in FIGS. 6 and 8 and described below.
  • If, however, in decision block 425 it was determined that the instructions are targeted for mobile services, then processing proceeds to block 445 where mobile services are performed. Such mobile services may be any conventional mobile services that would apply to a wireless mobile device. However, in one exemplary embodiment of the present invention, these mobile services may include service for locking the UI of the client device 200.
  • If in decision block 425 it was determined that the instruction was targeted to the backup service then processing proceeds to decision block 430 where a further determination is made whether the instructions are directed to erasing or backing up data on the client device 200. If the determination in decision block 430 indicated that data is to be erased, then processing proceeds to block 435 where the memory of the client device is partially or completely erased as directed in the received instructions. In the alternative, where a backup instruction was issued for backing up the data on the client device 200, then processing proceeds to block 440 where some or all of the memory of the client device is backed up depending on the received instructions.
  • Those of ordinary skill in the art and others will appreciate that more types of instruction may be included in still other embodiments of the present invention. The inclusion of the messaging service, backup and update instructions is meant to be illustrative and not limiting. To better appreciate one such embodiment, FIGS. 5-8 include further description of the functionality of the present invention.
  • The operation of an exemplary embodiment of the present invention having an update functionality implemented in the remote control/update system 100 shown in FIG. 1, will be best understood with reference to FIG. 5, which includes one exemplary sequence of communication interactions between a client device 200 and a remote control/update server 150. It will be appreciated by those of ordinary skill in the art that the communications from the client device 200 to the remote control/update server 150, may comprise wireless signals, including but not limited to: radio frequency (“RF”) signals, optical signals, audio modulated signals and electromagnetic signals as well as conventional wire-based signals.
  • The exemplary communication interactions shown in FIG. 5 begin with the client device 200 sending an update request 505 to the remote control/update server 150. The remote control/update server 150 then retrieves 510 a catalog of available updates. The catalog of available updates is then sent 515 along with any mandatory updates back to the client device 200. As will be further described below mandatory updates are those updates which will be installed on the client device 200 regardless of a user's interaction. In various embodiments of the present invention, the user may or may not be notified that a mandatory update has been installed. Accordingly once the client device receives the mandatory updates, they are installed 520 on the client device 220.
  • The client device 200 next depicts 525 any relevant available updates on the client device 200 (e.g., via the display 240). The relevant available updates are those non-mandatory updates (i.e., critical updates and other updates) that have not already been installed on the client device 200 and for which the client device 200 has a use (e.g., that are applicable to the currently installed operating system and/or versions of software running on the client device 200).
  • One or more relevant available updates are selected 530 on the client device 200. Those of ordinary skill in the art and others will appreciate that the selection of relevant available updates may be accomplished in a variety of manners. In one exemplary embodiment of the present invention all relevant available critical updates are automatically selected while other updates may be selected by a user using any form of conventional user interface. Next the selected updates are requested 535 from the remote control/update server 150. The remote control/update server 150 retrieves 540 the selected update or updates and sends 545 the selected updates back to the client device 200. Once the client device 200 receives the selected updates, they are then installed 550 on the client device 200.
  • The remote control/update system 100 (described herein) includes a client device 200 whose software is to be updated via the remote control/update server 150. FIG. 6 is a flow diagram illustrating an exemplary client side update routine 600 suitable for implementation by the client device 200 for updating software on the client device from the remote control/update server 150.
  • The update routine 600 begins at block 605 where a update is requested from the remote control/update server 150. Next in block 610 a catalog of available updates is received along with any mandatory updates for the client device 200. In decision block 615 a determination is made whether any mandatory updates were received. If so then processing proceeds to block 620 where the mandatory updates are installed on the client device 200. Processing then proceeds to block 625. Also if in decision block 615 it was determined that no mandatory updates were received then processing continues to block 625. In block 625 the received catalog of available updates is compared to the currently installed software on the client device 200. Next in decision block 630 a determination is made whether any available updates in the catalog are still relevant to the client device 200. If in decision block 630 it is determined that no available updates are relevant to client device 200 then processing continues to block 660 where a message is depicted on the client device 600 that there are no relevant updates and routine 600 ends.
  • If, however, in decision block 630 it was determined that there are available updates that are still relevant to the client device 200, then in block 635 those relevant updates are depicted at the client device 200. Processing then proceeds to block 640 where any desired relevant updates are selected. As already noted, desired relevant updates may be selected in a variety of fashions according to any conventional selection mechanism. Next, in block 645 a request is sent to the remote control/update server 150 for the selected updates. The selected updates are received in block 650, and installed on the client device 200 in block 655.
  • Similarly to FIG. 5, FIG. 7 illustrates an update session with communications between a client device 200 and a remote control/update server 150. However in the alternate update session illustrated in FIG. 7 the client device has a stub application that is automatically updated via the remote control/update server 150. The exemplary communications interactions shown in FIG. 7 begin with the client device 200 executing 705 a stub application. The client device 200 then depicts placeholder information 710 indicating that the application has been executed. Next the full application is requested 715 from the remote control/update server 150. The remote control/update server 150 retrieves the full application 720 and returns 725 the full application back to the client device 200. The client device 200 then installs 730 the full application. At which point the full application may then be executed 735.
  • The operations of the alternate update mechanism illustrated in FIG. 7 are further described within FIG. 8 which illustrates an alternate update routine 800 for implementation on the client device 200. The alternate update routine 800 replaces a stub application with a full application from a remote control/update server 150.
  • Alternate update routine 800 begins at block 805 with the execution of a stub application. Next in block 810 a placeholder for the full application is displayed. In block 815, the client device 200 sends a request to the remote control/update server 150 for the full application. In decision block 820 a determination is made whether the full application was received from the remote control/update server 150. If so, processing proceeds to block 830 where the full application is installed on the client device 200. After which, the full application can then be executed in block 835. If however in decision block 820 it was determined that the full application was not received then in block 825 an error is depicted indicating that the full application was not available.
  • Although various embodiments of the present invention have been illustrated and described, it will be appreciated that changes can be made therein without departing from the spirit and scope of the invention as defined by the appended claims. In particular it will be appreciated that while the processes and communication-interactions and the present interaction have been described in a particular order, those of ordinary skill in the art and other will appreciate that other orders of processes and/or communication interactions will also fall within the spirit and scope of the present invention.

Claims (29)

1. A wireless computing apparatus having:
a processor; and
a memory comprising computer executable instructions which, when executed are operative to:
request available updates;
receive an update catalog for available updates, wherein said updates are selected from the group consisting of discretionary updates and mandatory updates;
receive any of said mandatory updates;
install any of said mandatory updates; and
depict representations of any relevant discretionary updates in a selectable manner.
2. The apparatus of claim 1, further operative to select a desired discretionary update from said depicted relevant discretionary updates; and obtain said desired discretionary update.
3. The apparatus of claim 2, further operative to install said obtained discretionary update.
4. The apparatus of claim 1, wherein said relevant discretionary updates are determined from a current state of the apparatus.
5. The apparatus of claim 4, wherein said current state comprises the currently installed software on the apparatus.
6. A wireless computing apparatus having:
a processor; and
a memory comprising computer executable instructions which, when executed are operative to:
execute a stub application, said stub application automatically querying a remote source for a full application;
receive said current application from said remote source;
automatically install said full application; and
automatically execute said full application.
7. The apparatus of claim 6, wherein said stub application further displays a placeholder screen for said full application.
8. The apparatus of claim 6, wherein said full application is installed in place of said stub application.
9. The apparatus of claim 8, wherein subsequent executions of a stub application's execution point executes said full application.
10. A method of updating data on a wireless mobile device, the method comprising:
requesting available updates;
receiving an update catalog for available updates, wherein said updates are selected from the group consisting of discretionary updates and mandatory updates;
receiving any mandatory updates;
installing any of said mandatory updates; and
depicting any relevant discretionary updates in a selectable manner.
11. The method of claim 10, further comprising selecting a desired discretionary update from said depicted relevant discretionary updates; and
obtaining said discretionary update.
12. The method of claim 10, further comprising selecting a desired discretionary update from said depicted relevant discretionary updates; and
obtaining said discretionary update.
13. A method of updating a nonfunctional stub application to a full application on a wireless mobile device, the method comprising:
executing the stub application;
the stub application automatically querying a remote source for a full application;
receiving said current application from said remote source;
automatically installing said full application; and
automatically executing said full application.
14. A wireless computing apparatus having:
a processor; and
a memory comprising computer executable instructions which, when executed are operative to:
receive a message;
determine that the message is a ping message for the apparatus;
obtain further instructions, said instructions being directed to an action for a service selected from the group consisting of update services, backup services and mobile services; and
perform said action on the wireless computing apparatus.
15. The apparatus of claim 14, wherein said action updates the wireless computing apparatus.
16. The apparatus of claim 14, wherein said action performs a mobile service.
17. The apparatus claim 14, wherein said action erases a portion of a memory of the wireless computing apparatus.
18. The apparatus of claim 14, wherein said action backs up a portion of a memory of the wireless computing apparatus.
19. The apparatus of claim 14, wherein said action is performed automatically upon receipt of said instructions.
20. The apparatus of claim 19, wherein said action is performed without notifying a user of the wireless computing apparatus.
21. The apparatus of claim 20, wherein said message is a security notice.
22. The apparatus of claim 21, wherein said security notice triggers a backup of user data on the wireless computing apparatus.
23. The apparatus of claim 21, wherein said security notice triggers an erasure of data on the wireless computing apparatus.
24. The apparatus of claim 21, wherein said security notice triggers a mobile service that locks the wireless computing apparatus.
25. A method of remotely instructing a wireless mobile device to perform a service, comprising:
receiving a message;
determining that the message is a ping message for the wireless mobile device;
obtaining instructions, said instructions being directed to an action for a service selected from the group consisting of update services, backup services and mobile services; and
performing said action on the wireless mobile device.
26. The method of claim 25, wherein said action updates the wireless device.
27. The method of claim 25, wherein said action performs a mobile service.
28. The method claim 25, wherein said action erases a portion of a memory of the wireless mobile device.
29. The method of claim 25, wherein said action backs up a portion of a memory of the wireless mobile device.
US10/538,794 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices Abandoned US20060073820A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/538,794 US20060073820A1 (en) 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices
US14/799,007 US10057415B2 (en) 2002-10-10 2015-07-14 Method and apparatus for remote control and updating of wireless mobile devices
US16/105,617 US20190058789A1 (en) 2002-10-10 2018-08-20 Method and apparatus for remote control and updating of wireless mobile devices

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US41790502P 2002-10-10 2002-10-10
US41785802P 2002-10-10 2002-10-10
US10/538,794 US20060073820A1 (en) 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices
PCT/US2003/032284 WO2004034687A1 (en) 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/032284 A-371-Of-International WO2004034687A1 (en) 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/799,007 Continuation US10057415B2 (en) 2002-10-10 2015-07-14 Method and apparatus for remote control and updating of wireless mobile devices

Publications (1)

Publication Number Publication Date
US20060073820A1 true US20060073820A1 (en) 2006-04-06

Family

ID=32096220

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/538,794 Abandoned US20060073820A1 (en) 2002-10-10 2003-10-10 Method and apparatus for remote control and updating of wireless mobile devices
US14/799,007 Expired - Lifetime US10057415B2 (en) 2002-10-10 2015-07-14 Method and apparatus for remote control and updating of wireless mobile devices
US16/105,617 Abandoned US20190058789A1 (en) 2002-10-10 2018-08-20 Method and apparatus for remote control and updating of wireless mobile devices

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/799,007 Expired - Lifetime US10057415B2 (en) 2002-10-10 2015-07-14 Method and apparatus for remote control and updating of wireless mobile devices
US16/105,617 Abandoned US20190058789A1 (en) 2002-10-10 2018-08-20 Method and apparatus for remote control and updating of wireless mobile devices

Country Status (3)

Country Link
US (3) US20060073820A1 (en)
AU (1) AU2003279246A1 (en)
WO (1) WO2004034687A1 (en)

Cited By (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050047414A1 (en) * 2003-08-28 2005-03-03 Kabushiki Kaisha Toshiba Communication control apparatus, communication system, and communication control method
US20060026268A1 (en) * 2004-06-28 2006-02-02 Sanda Frank S Systems and methods for enhancing and optimizing a user's experience on an electronic device
US20060023738A1 (en) * 2004-06-28 2006-02-02 Sanda Frank S Application specific connection module
US20060145133A1 (en) * 2004-12-31 2006-07-06 Intel Corporation Recovery of computer systems
US20070197191A1 (en) * 2006-02-22 2007-08-23 Ben-Chuan Du Method for checking a configuration of a wireless communication device and related device
US20080215632A1 (en) * 2001-12-10 2008-09-04 Dunkeld Bryan C Digital Media Asset Identification System and Method
US20090017812A1 (en) * 2007-07-11 2009-01-15 Weng Chong Chan Method and system for restoring user settings after over-the-air update of mobile electronic device software
US7620392B1 (en) * 2006-02-27 2009-11-17 Good Technology, Inc. Method and system for distributing and updating software in wireless devices
US20100076871A1 (en) * 2002-08-08 2010-03-25 Hands-On Mobile, Inc. Software Application Framework for Network-Connected Devices
US7702322B1 (en) 2006-02-27 2010-04-20 Good Technology, Llc Method and system for distributing and updating software in wireless devices
US20100190482A1 (en) * 2009-01-26 2010-07-29 Ntt Docomo, Inc Installation notification method, installation notification system, and installation notification server
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
US20100223677A1 (en) * 2001-05-15 2010-09-02 Altair Engineering, Inc. Digital content licensing method
US7853297B1 (en) 2001-10-18 2010-12-14 Iwao Fujisaki Communication device
US7865216B1 (en) 2001-10-18 2011-01-04 Iwao Fujisaki Communication device
WO2011011534A1 (en) * 2009-07-23 2011-01-27 Sourcetrace Systems, Inc. Modification of terminal and service provider machines using an update server machine
US7890089B1 (en) 2007-05-03 2011-02-15 Iwao Fujisaki Communication device
US20110047594A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for mobile communication device application advisement
US20110047033A1 (en) * 2009-02-17 2011-02-24 Lookout, Inc. System and method for mobile device replacement
US20110047597A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
US20110047620A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for server-coupled malware prevention
US7917167B1 (en) * 2003-11-22 2011-03-29 Iwao Fujisaki Communication device
US20110082900A1 (en) * 2008-02-15 2011-04-07 Aashin Nagpal System and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US20110093516A1 (en) * 2006-08-23 2011-04-21 Zte Corporation implementation method for updating the terminals in batches
US7945287B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US20110119765A1 (en) * 2009-11-18 2011-05-19 Flexilis, Inc. System and method for identifying and assessing vulnerabilities on a mobile communication device
US20110145932A1 (en) * 2009-09-08 2011-06-16 Paul Shelton Nerger System and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance
US20110145920A1 (en) * 2008-10-21 2011-06-16 Lookout, Inc System and method for adverse mobile application identification
US7996038B1 (en) 2003-09-26 2011-08-09 Iwao Fujisaki Communication device
US8081962B1 (en) 2004-03-23 2011-12-20 Iwao Fujisaki Communication device
US8208954B1 (en) 2005-04-08 2012-06-26 Iwao Fujisaki Communication device
US8229512B1 (en) 2003-02-08 2012-07-24 Iwao Fujisaki Communication device
US20120188064A1 (en) * 2009-02-17 2012-07-26 Lookout. Inc., a California Corporation System and method for remotely initiating playing of sound on a mobile device
US8241128B1 (en) 2003-04-03 2012-08-14 Iwao Fujisaki Communication device
US8271608B2 (en) 2008-10-21 2012-09-18 Lookout, Inc. System and method for a mobile cross-platform software system
US20120239783A1 (en) * 2011-03-17 2012-09-20 Optim Corporation Remote operation system and remote operation method for terminal
US8340726B1 (en) 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
US8365252B2 (en) 2008-10-21 2013-01-29 Lookout, Inc. Providing access levels to services based on mobile device security state
US8381303B2 (en) 2008-10-21 2013-02-19 Kevin Patrick Mahaffey System and method for attack and malware prevention
US8452307B1 (en) 2008-07-02 2013-05-28 Iwao Fujisaki Communication device
US8505095B2 (en) 2008-10-21 2013-08-06 Lookout, Inc. System and method for monitoring and analyzing multiple interfaces and multiple protocols
US8510843B2 (en) 2008-10-21 2013-08-13 Lookout, Inc. Security status and information display system
US8543157B1 (en) 2008-05-09 2013-09-24 Iwao Fujisaki Communication device which notifies its pin-point location or geographic area in accordance with user selection
US8639214B1 (en) 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US8655307B1 (en) 2012-10-26 2014-02-18 Lookout, Inc. System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US8676273B1 (en) 2007-08-24 2014-03-18 Iwao Fujisaki Communication device
US8738765B2 (en) 2011-06-14 2014-05-27 Lookout, Inc. Mobile device DNS optimization
US8788881B2 (en) 2011-08-17 2014-07-22 Lookout, Inc. System and method for mobile device push communications
US8855599B2 (en) 2012-12-31 2014-10-07 Lookout, Inc. Method and apparatus for auxiliary communications with mobile communications device
US8855601B2 (en) 2009-02-17 2014-10-07 Lookout, Inc. System and method for remotely-initiated audio communication
US20150134726A1 (en) * 2013-11-14 2015-05-14 Eric P. Vance System and Method For Machines to Communicate over the Internet
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
US9042876B2 (en) 2009-02-17 2015-05-26 Lookout, Inc. System and method for uploading location information based on device movement
US20150312275A1 (en) * 2014-04-29 2015-10-29 Dell Products L.P. Single-step custom configuration of a cloud client device
US20150334184A1 (en) * 2011-12-22 2015-11-19 Hew-Lett-Pack Development Company, L.P. Enabling execution of remotely-hosted applications using application metadata and client updates
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
US9215074B2 (en) 2012-06-05 2015-12-15 Lookout, Inc. Expressing intent to control behavior of application components
US9235704B2 (en) 2008-10-21 2016-01-12 Lookout, Inc. System and method for a scanning API
US9374369B2 (en) 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US9405527B2 (en) 2010-08-18 2016-08-02 Microsoft Technology Licensing, Llc Selective update of core mobile device user interface through application marketplace
US9424409B2 (en) 2013-01-10 2016-08-23 Lookout, Inc. Method and system for protecting privacy and enhancing security on an electronic device
US9544398B2 (en) 2008-02-15 2017-01-10 Good Technology Holdings Limited System and methods to store, retrieve, manage, augment and monitor applications on appliances
EP3011777A4 (en) * 2013-06-17 2017-01-25 Seven Networks, LLC Secure mechanism to deliver mobile traffic management configuration upon stub activation on a mobile device of a global service discovery server
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
US9633182B2 (en) 2001-05-15 2017-04-25 Altair Engineering, Inc. Token based digital content licensing method
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US9753796B2 (en) 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
US9779253B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US20170286091A1 (en) * 2016-04-01 2017-10-05 Intel Corporation Update failure rebooting and recovery for a smart device
US9813514B2 (en) 2002-06-12 2017-11-07 Good Technology Holdings Limited Information repository system including a wireless device and related method
US9955352B2 (en) 2009-02-17 2018-04-24 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US20180121219A1 (en) * 2016-10-29 2018-05-03 Deutsche Telekom Ag Distribution of a software client application towards a client computing device
WO2018106236A1 (en) * 2016-12-06 2018-06-14 Facebook, Inc. Systems and methods for providing stub applications for a social networking system
US10122747B2 (en) 2013-12-06 2018-11-06 Lookout, Inc. Response generation after distributed monitoring and evaluation of multiple devices
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US10387140B2 (en) 2009-07-23 2019-08-20 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US10540494B2 (en) 2015-05-01 2020-01-21 Lookout, Inc. Determining source of side-loaded software using an administrator server
US10679151B2 (en) 2014-04-28 2020-06-09 Altair Engineering, Inc. Unit-based licensing for third party access of digital content
US10685055B2 (en) 2015-09-23 2020-06-16 Altair Engineering, Inc. Hashtag-playlist content sequence management
US10806851B2 (en) * 2013-12-26 2020-10-20 Tandem Diabetes Care, Inc. Wireless control of a drug delivery device
US20210021670A1 (en) * 2015-09-30 2021-01-21 Integenx Inc. Command Center
US11799864B2 (en) 2019-02-07 2023-10-24 Altair Engineering, Inc. Computer systems for regulating access to electronic content using usage telemetry data

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8418168B2 (en) 2008-05-29 2013-04-09 Research In Motion Limited Method and system for performing a software upgrade on an electronic device connected to a computer
US8041346B2 (en) 2008-05-29 2011-10-18 Research In Motion Limited Method and system for establishing a service relationship between a mobile communication device and a mobile data server for connecting to a wireless network
US7865573B2 (en) 2008-05-29 2011-01-04 Research In Motion Limited Method, system and devices for communicating between an internet browser and an electronic device
EP2128760A1 (en) * 2008-05-29 2009-12-02 Research in Motion Limited A method and system for performing a software upgrade on an electronic device connected to a computer

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052600A (en) * 1998-11-23 2000-04-18 Motorola, Inc. Software programmable radio and method for configuring
US6321275B1 (en) * 1995-04-24 2001-11-20 Microsoft Corporation Interpreted remote procedure calls
US20020016166A1 (en) * 2000-08-01 2002-02-07 Kazuyuki Uchida Download system
US20020128029A1 (en) * 2001-01-10 2002-09-12 Shoji Nishikawa Data distribution device and method, and data receiving device and method
US20030022657A1 (en) * 2001-07-18 2003-01-30 Mark Herschberg Application provisioning over a wireless network
US6622017B1 (en) * 2000-02-25 2003-09-16 Cellco Parntership Over-the-air programming of wireless terminal features
US6643506B1 (en) * 1996-08-07 2003-11-04 Telxon Corporation Wireless software upgrades with version control
US20040203681A1 (en) * 2002-07-01 2004-10-14 Ross David J. Application catalog on an application server for wireless devices
US6820259B1 (en) * 1999-08-31 2004-11-16 Hitachi, Ltd. Software distribution system and software receiving terminal apparatus
US6928579B2 (en) * 2001-06-27 2005-08-09 Nokia Corporation Crash recovery system
US6941148B2 (en) * 2000-06-03 2005-09-06 International Business Machines Corporation Device registry for automatic connection and data exchange between pervasive devices and backend systems
US7096311B2 (en) * 2002-09-30 2006-08-22 Innopath Software, Inc. Updating electronic files using byte-level file differencing and updating algorithms
US7275243B2 (en) * 2002-03-22 2007-09-25 Sun Microsystems, Inc. Mobile download system
US7415707B2 (en) * 2001-04-19 2008-08-19 Sony Corporation Installation software using a setting file to automatically determine if a module is installable and the location of the installation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5528490A (en) * 1992-04-10 1996-06-18 Charles E. Hill & Associates, Inc. Electronic catalog system and method
US6425125B1 (en) * 1999-03-30 2002-07-23 Microsoft Corporation System and method for upgrading client software
US6718447B2 (en) * 2001-06-28 2004-04-06 Hewlett-Packard Development Company, L.P. Method and system for providing logically consistent logical unit backup snapshots within one or more data storage devices
US8611919B2 (en) * 2002-05-23 2013-12-17 Wounder Gmbh., Llc System, method, and computer program product for providing location based services and mobile e-commerce

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321275B1 (en) * 1995-04-24 2001-11-20 Microsoft Corporation Interpreted remote procedure calls
US6643506B1 (en) * 1996-08-07 2003-11-04 Telxon Corporation Wireless software upgrades with version control
US6052600A (en) * 1998-11-23 2000-04-18 Motorola, Inc. Software programmable radio and method for configuring
US6820259B1 (en) * 1999-08-31 2004-11-16 Hitachi, Ltd. Software distribution system and software receiving terminal apparatus
US6622017B1 (en) * 2000-02-25 2003-09-16 Cellco Parntership Over-the-air programming of wireless terminal features
US6941148B2 (en) * 2000-06-03 2005-09-06 International Business Machines Corporation Device registry for automatic connection and data exchange between pervasive devices and backend systems
US20020016166A1 (en) * 2000-08-01 2002-02-07 Kazuyuki Uchida Download system
US20020128029A1 (en) * 2001-01-10 2002-09-12 Shoji Nishikawa Data distribution device and method, and data receiving device and method
US7415707B2 (en) * 2001-04-19 2008-08-19 Sony Corporation Installation software using a setting file to automatically determine if a module is installable and the location of the installation
US6928579B2 (en) * 2001-06-27 2005-08-09 Nokia Corporation Crash recovery system
US20030022657A1 (en) * 2001-07-18 2003-01-30 Mark Herschberg Application provisioning over a wireless network
US7275243B2 (en) * 2002-03-22 2007-09-25 Sun Microsystems, Inc. Mobile download system
US20040203681A1 (en) * 2002-07-01 2004-10-14 Ross David J. Application catalog on an application server for wireless devices
US7096311B2 (en) * 2002-09-30 2006-08-22 Innopath Software, Inc. Updating electronic files using byte-level file differencing and updating algorithms

Cited By (224)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633182B2 (en) 2001-05-15 2017-04-25 Altair Engineering, Inc. Token based digital content licensing method
US20100223677A1 (en) * 2001-05-15 2010-09-02 Altair Engineering, Inc. Digital content licensing method
US7907942B1 (en) 2001-10-18 2011-03-15 Iwao Fujisaki Communication device
US7945287B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US8200275B1 (en) 2001-10-18 2012-06-12 Iwao Fujisaki System for communication device to display perspective 3D map
US8086276B1 (en) 2001-10-18 2011-12-27 Iwao Fujisaki Communication device
US7853297B1 (en) 2001-10-18 2010-12-14 Iwao Fujisaki Communication device
US7945256B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US7945286B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US7865216B1 (en) 2001-10-18 2011-01-04 Iwao Fujisaki Communication device
US7945236B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US8538486B1 (en) 2001-10-18 2013-09-17 Iwao Fujisaki Communication device which displays perspective 3D map
US7996037B1 (en) 2001-10-18 2011-08-09 Iwao Fujisaki Communication device
US8024009B1 (en) 2001-10-18 2011-09-20 Iwao Fujisaki Communication device
US8064964B1 (en) 2001-10-18 2011-11-22 Iwao Fujisaki Communication device
US7907963B1 (en) 2001-10-18 2011-03-15 Iwao Fujisaki Method to display three-dimensional map on communication device
US8290482B1 (en) 2001-10-18 2012-10-16 Iwao Fujisaki Communication device
US7949371B1 (en) 2001-10-18 2011-05-24 Iwao Fujisaki Communication device
US7904109B1 (en) 2001-10-18 2011-03-08 Iwao Fujisaki Communication device
US8068880B1 (en) 2001-10-18 2011-11-29 Iwao Fujisaki Communication device
US8498672B1 (en) 2001-10-18 2013-07-30 Iwao Fujisaki Communication device
US8538485B1 (en) 2001-10-18 2013-09-17 Iwao Fujisaki Communication device
US8606856B2 (en) 2001-12-10 2013-12-10 Content Technologies, Llc Digital media asset identification system and method
US8706636B2 (en) 2001-12-10 2014-04-22 Content Technologies Llc System and method for unique digital asset identification and transaction management
US20080215632A1 (en) * 2001-12-10 2008-09-04 Dunkeld Bryan C Digital Media Asset Identification System and Method
US8583556B2 (en) 2001-12-10 2013-11-12 Content Technologies, Llc Method of providing a digital asset for distribution
US20110302636A1 (en) * 2001-12-10 2011-12-08 Bryan Dunkeld Method of Providing a Digital Asset for Distribution
US8626838B2 (en) 2001-12-10 2014-01-07 Content Technologies, Llc Digital media asset identification system and method
US9813514B2 (en) 2002-06-12 2017-11-07 Good Technology Holdings Limited Information repository system including a wireless device and related method
US20100235261A1 (en) * 2002-08-08 2010-09-16 Lloyd David B Software Application Framework for Network-Connected Devices
US9665860B2 (en) * 2002-08-08 2017-05-30 Shoreline Innovations, Llc Software application framework for network-connected devices
US20100076871A1 (en) * 2002-08-08 2010-03-25 Hands-On Mobile, Inc. Software Application Framework for Network-Connected Devices
US8229512B1 (en) 2003-02-08 2012-07-24 Iwao Fujisaki Communication device
US8241128B1 (en) 2003-04-03 2012-08-14 Iwao Fujisaki Communication device
US20100122351A1 (en) * 2003-08-08 2010-05-13 Hands-On Mobile, Inc. Software Application Framework for Network-Connected Devices
US20050047414A1 (en) * 2003-08-28 2005-03-03 Kabushiki Kaisha Toshiba Communication control apparatus, communication system, and communication control method
US8331984B1 (en) 2003-09-26 2012-12-11 Iwao Fujisaki Communication device
US8090402B1 (en) 2003-09-26 2012-01-03 Iwao Fujisaki Communication device
US8331983B1 (en) 2003-09-26 2012-12-11 Iwao Fujisaki Communication device
US8229504B1 (en) 2003-09-26 2012-07-24 Iwao Fujisaki Communication device
US7996038B1 (en) 2003-09-26 2011-08-09 Iwao Fujisaki Communication device
US8340720B1 (en) 2003-09-26 2012-12-25 Iwao Fujisaki Communication device
US8010157B1 (en) 2003-09-26 2011-08-30 Iwao Fujisaki Communication device
US8351984B1 (en) 2003-09-26 2013-01-08 Iwao Fujisaki Communication device
US8041371B1 (en) 2003-09-26 2011-10-18 Iwao Fujisaki Communication device
US8055298B1 (en) 2003-09-26 2011-11-08 Iwao Fujisaki Communication device
US8064954B1 (en) 2003-09-26 2011-11-22 Iwao Fujisaki Communication device
US8233938B1 (en) 2003-09-26 2012-07-31 Iwao Fujisaki Communication device
US8364201B1 (en) 2003-09-26 2013-01-29 Iwao Fujisaki Communication device
US8295880B1 (en) 2003-09-26 2012-10-23 Iwao Fujisaki Communication device
US8326355B1 (en) 2003-09-26 2012-12-04 Iwao Fujisaki Communication device
US8301194B1 (en) 2003-09-26 2012-10-30 Iwao Fujisaki Communication device
US8311578B1 (en) 2003-09-26 2012-11-13 Iwao Fujisaki Communication device
US8320958B1 (en) 2003-09-26 2012-11-27 Iwao Fujisaki Communication device
US8095181B1 (en) 2003-09-26 2012-01-10 Iwao Fujisaki Communication device
US8095182B1 (en) 2003-09-26 2012-01-10 Iwao Fujisaki Communication device
US8244300B1 (en) 2003-09-26 2012-08-14 Iwao Fujisaki Communication device
US8335538B1 (en) 2003-09-26 2012-12-18 Iwao Fujisaki Communication device
US8121641B1 (en) 2003-09-26 2012-02-21 Iwao Fujisaki Communication device
US8150458B1 (en) 2003-09-26 2012-04-03 Iwao Fujisaki Communication device
US8160642B1 (en) 2003-09-26 2012-04-17 Iwao Fujisaki Communication device
US8165630B1 (en) 2003-09-26 2012-04-24 Iwao Fujisaki Communication device
US8195228B1 (en) 2003-09-26 2012-06-05 Iwao Fujisaki Communication device
US8260352B1 (en) 2003-09-26 2012-09-04 Iwao Fujisaki Communication device
US8121635B1 (en) 2003-11-22 2012-02-21 Iwao Fujisaki Communication device
US8238963B1 (en) 2003-11-22 2012-08-07 Iwao Fujisaki Communication device
US8224376B1 (en) 2003-11-22 2012-07-17 Iwao Fujisaki Communication device
US7917167B1 (en) * 2003-11-22 2011-03-29 Iwao Fujisaki Communication device
US8295876B1 (en) 2003-11-22 2012-10-23 Iwao Fujisaki Communication device
US8121587B1 (en) 2004-03-23 2012-02-21 Iwao Fujisaki Communication device
US8195142B1 (en) 2004-03-23 2012-06-05 Iwao Fujisaki Communication device
US8270964B1 (en) 2004-03-23 2012-09-18 Iwao Fujisaki Communication device
US8081962B1 (en) 2004-03-23 2011-12-20 Iwao Fujisaki Communication device
US20060075506A1 (en) * 2004-06-28 2006-04-06 Sanda Frank S Systems and methods for enhanced electronic asset protection
US20060023738A1 (en) * 2004-06-28 2006-02-02 Sanda Frank S Application specific connection module
US20060026268A1 (en) * 2004-06-28 2006-02-02 Sanda Frank S Systems and methods for enhancing and optimizing a user's experience on an electronic device
US20060145133A1 (en) * 2004-12-31 2006-07-06 Intel Corporation Recovery of computer systems
US7409575B2 (en) * 2004-12-31 2008-08-05 Intel Corporation Recovery of computer systems
US8208954B1 (en) 2005-04-08 2012-06-26 Iwao Fujisaki Communication device
US20070197191A1 (en) * 2006-02-22 2007-08-23 Ben-Chuan Du Method for checking a configuration of a wireless communication device and related device
USRE46355E1 (en) 2006-02-27 2017-03-28 Good Technology Holdings Limited Method and system for distributing and updating software in wireless devices
US8078157B2 (en) 2006-02-27 2011-12-13 Good Technology, Inc. Method and system for distributing and updating software in wireless devices
US20100173622A1 (en) * 2006-02-27 2010-07-08 Sanjiv Maurya Method and System for Distributing and Updating Software in Wireless Devices
US7620392B1 (en) * 2006-02-27 2009-11-17 Good Technology, Inc. Method and system for distributing and updating software in wireless devices
US7702322B1 (en) 2006-02-27 2010-04-20 Good Technology, Llc Method and system for distributing and updating software in wireless devices
US20110093516A1 (en) * 2006-08-23 2011-04-21 Zte Corporation implementation method for updating the terminals in batches
US7890089B1 (en) 2007-05-03 2011-02-15 Iwao Fujisaki Communication device
US20090017812A1 (en) * 2007-07-11 2009-01-15 Weng Chong Chan Method and system for restoring user settings after over-the-air update of mobile electronic device software
US8676273B1 (en) 2007-08-24 2014-03-18 Iwao Fujisaki Communication device
US8639214B1 (en) 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US9544398B2 (en) 2008-02-15 2017-01-10 Good Technology Holdings Limited System and methods to store, retrieve, manage, augment and monitor applications on appliances
US9185554B2 (en) 2008-02-15 2015-11-10 Appcentral, Inc. System and methods to store, retrieve, manage, augment and monitor applications on appliances
US20110082900A1 (en) * 2008-02-15 2011-04-07 Aashin Nagpal System and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US8543157B1 (en) 2008-05-09 2013-09-24 Iwao Fujisaki Communication device which notifies its pin-point location or geographic area in accordance with user selection
US8340726B1 (en) 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
US8452307B1 (en) 2008-07-02 2013-05-28 Iwao Fujisaki Communication device
US9245119B2 (en) 2008-10-21 2016-01-26 Lookout, Inc. Security status assessment using mobile device security information database
US9344431B2 (en) 2008-10-21 2016-05-17 Lookout, Inc. System and method for assessing an application based on data from multiple devices
US10509910B2 (en) 2008-10-21 2019-12-17 Lookout, Inc. Methods and systems for granting access to services based on a security state that varies with the severity of security events
US20110047597A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
US8505095B2 (en) 2008-10-21 2013-08-06 Lookout, Inc. System and method for monitoring and analyzing multiple interfaces and multiple protocols
US8510843B2 (en) 2008-10-21 2013-08-13 Lookout, Inc. Security status and information display system
US8533844B2 (en) 2008-10-21 2013-09-10 Lookout, Inc. System and method for security data collection and analysis
US10509911B2 (en) 2008-10-21 2019-12-17 Lookout, Inc. Methods and systems for conditionally granting access to services based on the security state of the device requesting access
US10417432B2 (en) 2008-10-21 2019-09-17 Lookout, Inc. Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device
US20110047594A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for mobile communication device application advisement
US8381303B2 (en) 2008-10-21 2013-02-19 Kevin Patrick Mahaffey System and method for attack and malware prevention
US8561144B2 (en) 2008-10-21 2013-10-15 Lookout, Inc. Enforcing security based on a security state assessment of a mobile device
US9996697B2 (en) 2008-10-21 2018-06-12 Lookout, Inc. Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device
US20110047620A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for server-coupled malware prevention
US9860263B2 (en) 2008-10-21 2018-01-02 Lookout, Inc. System and method for assessing data objects on mobile communications devices
US9781148B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses between collections of mobile communications devices
US9779253B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US8365252B2 (en) 2008-10-21 2013-01-29 Lookout, Inc. Providing access levels to services based on mobile device security state
US9740852B2 (en) 2008-10-21 2017-08-22 Lookout, Inc. System and method for assessing an application to be installed on a mobile communications device
US8347386B2 (en) 2008-10-21 2013-01-01 Lookout, Inc. System and method for server-coupled malware prevention
US8683593B2 (en) 2008-10-21 2014-03-25 Lookout, Inc. Server-assisted analysis of data for a mobile device
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
US9100389B2 (en) 2008-10-21 2015-08-04 Lookout, Inc. Assessing an application based on application data associated with the application
US20110145920A1 (en) * 2008-10-21 2011-06-16 Lookout, Inc System and method for adverse mobile application identification
US8271608B2 (en) 2008-10-21 2012-09-18 Lookout, Inc. System and method for a mobile cross-platform software system
US8745739B2 (en) 2008-10-21 2014-06-03 Lookout, Inc. System and method for server-coupled application re-analysis to obtain characterization assessment
US8752176B2 (en) 2008-10-21 2014-06-10 Lookout, Inc. System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment
US9235704B2 (en) 2008-10-21 2016-01-12 Lookout, Inc. System and method for a scanning API
US11080407B2 (en) 2008-10-21 2021-08-03 Lookout, Inc. Methods and systems for analyzing data after initial analyses by known good and known bad security components
US9367680B2 (en) 2008-10-21 2016-06-14 Lookout, Inc. System and method for mobile communication device application advisement
US8826441B2 (en) 2008-10-21 2014-09-02 Lookout, Inc. Event-based security state assessment and display for mobile devices
US9065846B2 (en) 2008-10-21 2015-06-23 Lookout, Inc. Analyzing data gathered through different protocols
US9294500B2 (en) 2008-10-21 2016-03-22 Lookout, Inc. System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects
US8875289B2 (en) 2008-10-21 2014-10-28 Lookout, Inc. System and method for preventing malware on a mobile communication device
US8881292B2 (en) 2008-10-21 2014-11-04 Lookout, Inc. Evaluating whether data is safe or malicious
US9407640B2 (en) 2008-10-21 2016-08-02 Lookout, Inc. Assessing a security state of a mobile communications device to determine access to specific tasks
US8984628B2 (en) 2008-10-21 2015-03-17 Lookout, Inc. System and method for adverse mobile application identification
US9223973B2 (en) 2008-10-21 2015-12-29 Lookout, Inc. System and method for attack and malware prevention
US8997181B2 (en) 2008-10-21 2015-03-31 Lookout, Inc. Assessing the security state of a mobile communications device
US20100190482A1 (en) * 2009-01-26 2010-07-29 Ntt Docomo, Inc Installation notification method, installation notification system, and installation notification server
US8320899B2 (en) * 2009-01-26 2012-11-27 Ntt Docomo, Inc. Installation notification method, installation notification system, and installation notification server
US8855601B2 (en) 2009-02-17 2014-10-07 Lookout, Inc. System and method for remotely-initiated audio communication
US8774788B2 (en) 2009-02-17 2014-07-08 Lookout, Inc. Systems and methods for transmitting a communication based on a device leaving or entering an area
US8682400B2 (en) 2009-02-17 2014-03-25 Lookout, Inc. Systems and methods for device broadcast of location information when battery is low
US8635109B2 (en) 2009-02-17 2014-01-21 Lookout, Inc. System and method for providing offers for mobile devices
US9100925B2 (en) 2009-02-17 2015-08-04 Lookout, Inc. Systems and methods for displaying location information of a device
US9167550B2 (en) 2009-02-17 2015-10-20 Lookout, Inc. Systems and methods for applying a security policy to a device based on location
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
US9179434B2 (en) 2009-02-17 2015-11-03 Lookout, Inc. Systems and methods for locking and disabling a device in response to a request
US9955352B2 (en) 2009-02-17 2018-04-24 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US10623960B2 (en) 2009-02-17 2020-04-14 Lookout, Inc. Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices
US8467768B2 (en) * 2009-02-17 2013-06-18 Lookout, Inc. System and method for remotely securing or recovering a mobile device
US8538815B2 (en) 2009-02-17 2013-09-17 Lookout, Inc. System and method for mobile device replacement
US20120188064A1 (en) * 2009-02-17 2012-07-26 Lookout. Inc., a California Corporation System and method for remotely initiating playing of sound on a mobile device
US9232491B2 (en) 2009-02-17 2016-01-05 Lookout, Inc. Mobile device geolocation
US8929874B2 (en) 2009-02-17 2015-01-06 Lookout, Inc. Systems and methods for remotely controlling a lost mobile communications device
US9042876B2 (en) 2009-02-17 2015-05-26 Lookout, Inc. System and method for uploading location information based on device movement
US10419936B2 (en) 2009-02-17 2019-09-17 Lookout, Inc. Methods and systems for causing mobile communications devices to emit sounds with encoded information
US8825007B2 (en) 2009-02-17 2014-09-02 Lookout, Inc. Systems and methods for applying a security policy to a device based on a comparison of locations
US20110047033A1 (en) * 2009-02-17 2011-02-24 Lookout, Inc. System and method for mobile device replacement
US10387140B2 (en) 2009-07-23 2019-08-20 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US9304758B2 (en) 2009-07-23 2016-04-05 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US10261774B2 (en) 2009-07-23 2019-04-16 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US8572571B2 (en) 2009-07-23 2013-10-29 Shuv Gray Llc Modification of terminal and service provider machines using an update server machine
US10831468B2 (en) 2009-07-23 2020-11-10 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US9940124B2 (en) 2009-07-23 2018-04-10 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
WO2011011534A1 (en) * 2009-07-23 2011-01-27 Sourcetrace Systems, Inc. Modification of terminal and service provider machines using an update server machine
US11210082B2 (en) 2009-07-23 2021-12-28 S3G Technology Llc Modification of terminal and service provider machines using an update server machine
US11662995B2 (en) 2009-07-23 2023-05-30 S3G Technology Llc Network efficient location-based dialogue sequence using virtual processor
US9081897B2 (en) 2009-07-23 2015-07-14 Shuv Gray Llc Modification of terminal and service provider machines using an update server machine
US8984657B2 (en) * 2009-09-08 2015-03-17 Appcentral, Inc. System and method for remote management of applications downloaded to a personal portable wireless appliance
US20110145932A1 (en) * 2009-09-08 2011-06-16 Paul Shelton Nerger System and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance
USRE47757E1 (en) 2009-11-18 2019-12-03 Lookout, Inc. System and method for identifying and assessing vulnerabilities on a mobile communications device
US8397301B2 (en) 2009-11-18 2013-03-12 Lookout, Inc. System and method for identifying and assessing vulnerabilities on a mobile communication device
USRE49634E1 (en) 2009-11-18 2023-08-29 Lookout, Inc. System and method for determining the risk of vulnerabilities on a mobile communications device
USRE48669E1 (en) 2009-11-18 2021-08-03 Lookout, Inc. System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device
US20110119765A1 (en) * 2009-11-18 2011-05-19 Flexilis, Inc. System and method for identifying and assessing vulnerabilities on a mobile communication device
USRE46768E1 (en) 2009-11-18 2018-03-27 Lookout, Inc. System and method for identifying and assessing vulnerabilities on a mobile communications device
US9405527B2 (en) 2010-08-18 2016-08-02 Microsoft Technology Licensing, Llc Selective update of core mobile device user interface through application marketplace
US10235155B2 (en) 2010-08-18 2019-03-19 Microsoft Technology Licensing, Llc Selective update of core mobile device user interface through application marketplace
US20120239783A1 (en) * 2011-03-17 2012-09-20 Optim Corporation Remote operation system and remote operation method for terminal
US9609508B2 (en) * 2011-03-17 2017-03-28 Optim Corporation Forced operating of software on a remote terminal
US20140136665A1 (en) * 2011-03-17 2014-05-15 Optim Corporation Forced operating of software on a remote terminal
US9319292B2 (en) 2011-06-14 2016-04-19 Lookout, Inc. Client activity DNS optimization
US8738765B2 (en) 2011-06-14 2014-05-27 Lookout, Inc. Mobile device DNS optimization
US8788881B2 (en) 2011-08-17 2014-07-22 Lookout, Inc. System and method for mobile device push communications
US10181118B2 (en) 2011-08-17 2019-01-15 Lookout, Inc. Mobile communications device payment method utilizing location information
US20150334184A1 (en) * 2011-12-22 2015-11-19 Hew-Lett-Pack Development Company, L.P. Enabling execution of remotely-hosted applications using application metadata and client updates
US10256979B2 (en) 2012-06-05 2019-04-09 Lookout, Inc. Assessing application authenticity and performing an action in response to an evaluation result
US9215074B2 (en) 2012-06-05 2015-12-15 Lookout, Inc. Expressing intent to control behavior of application components
US11336458B2 (en) 2012-06-05 2022-05-17 Lookout, Inc. Evaluating authenticity of applications based on assessing user device context for increased security
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
US10419222B2 (en) 2012-06-05 2019-09-17 Lookout, Inc. Monitoring for fraudulent or harmful behavior in applications being installed on user devices
US9407443B2 (en) 2012-06-05 2016-08-02 Lookout, Inc. Component analysis of software applications on computing devices
US9992025B2 (en) 2012-06-05 2018-06-05 Lookout, Inc. Monitoring installed applications on user devices
US9940454B2 (en) 2012-06-05 2018-04-10 Lookout, Inc. Determining source of side-loaded software using signature of authorship
US8655307B1 (en) 2012-10-26 2014-02-18 Lookout, Inc. System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US9408143B2 (en) 2012-10-26 2016-08-02 Lookout, Inc. System and method for using context models to control operation of a mobile communications device
US9769749B2 (en) 2012-10-26 2017-09-19 Lookout, Inc. Modifying mobile device settings for resource conservation
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
US9374369B2 (en) 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US8855599B2 (en) 2012-12-31 2014-10-07 Lookout, Inc. Method and apparatus for auxiliary communications with mobile communications device
US9424409B2 (en) 2013-01-10 2016-08-23 Lookout, Inc. Method and system for protecting privacy and enhancing security on an electronic device
EP3011777A4 (en) * 2013-06-17 2017-01-25 Seven Networks, LLC Secure mechanism to deliver mobile traffic management configuration upon stub activation on a mobile device of a global service discovery server
US10452862B2 (en) 2013-10-25 2019-10-22 Lookout, Inc. System and method for creating a policy for managing personal data on a mobile communications device
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US10990696B2 (en) 2013-10-25 2021-04-27 Lookout, Inc. Methods and systems for detecting attempts to access personal information on mobile communications devices
US20150134726A1 (en) * 2013-11-14 2015-05-14 Eric P. Vance System and Method For Machines to Communicate over the Internet
US10164857B2 (en) * 2013-11-14 2018-12-25 Eric P. Vance System and method for machines to communicate over the internet
US9753796B2 (en) 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
US10742676B2 (en) 2013-12-06 2020-08-11 Lookout, Inc. Distributed monitoring and evaluation of multiple devices
US10122747B2 (en) 2013-12-06 2018-11-06 Lookout, Inc. Response generation after distributed monitoring and evaluation of multiple devices
US10806851B2 (en) * 2013-12-26 2020-10-20 Tandem Diabetes Care, Inc. Wireless control of a drug delivery device
US10679151B2 (en) 2014-04-28 2020-06-09 Altair Engineering, Inc. Unit-based licensing for third party access of digital content
US20150312275A1 (en) * 2014-04-29 2015-10-29 Dell Products L.P. Single-step custom configuration of a cloud client device
US10038719B2 (en) * 2014-04-29 2018-07-31 Dell Products L.P. Single-step custom configuration of a cloud client device
US10540494B2 (en) 2015-05-01 2020-01-21 Lookout, Inc. Determining source of side-loaded software using an administrator server
US11259183B2 (en) 2015-05-01 2022-02-22 Lookout, Inc. Determining a security state designation for a computing device based on a source of software
US10685055B2 (en) 2015-09-23 2020-06-16 Altair Engineering, Inc. Hashtag-playlist content sequence management
US20210021670A1 (en) * 2015-09-30 2021-01-21 Integenx Inc. Command Center
US10810084B2 (en) * 2016-04-01 2020-10-20 Intel Corporation Update failure rebooting and recovery for a smart device
US20170286091A1 (en) * 2016-04-01 2017-10-05 Intel Corporation Update failure rebooting and recovery for a smart device
US10877773B2 (en) * 2016-10-29 2020-12-29 Deutsche Telekom Ag Distribution of a software client application towards a client computing device
US20180121219A1 (en) * 2016-10-29 2018-05-03 Deutsche Telekom Ag Distribution of a software client application towards a client computing device
WO2018106236A1 (en) * 2016-12-06 2018-06-14 Facebook, Inc. Systems and methods for providing stub applications for a social networking system
US11038876B2 (en) 2017-06-09 2021-06-15 Lookout, Inc. Managing access to services based on fingerprint matching
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US11799864B2 (en) 2019-02-07 2023-10-24 Altair Engineering, Inc. Computer systems for regulating access to electronic content using usage telemetry data

Also Published As

Publication number Publication date
WO2004034687A1 (en) 2004-04-22
AU2003279246A1 (en) 2004-05-04
US10057415B2 (en) 2018-08-21
US20150319299A1 (en) 2015-11-05
US20190058789A1 (en) 2019-02-21

Similar Documents

Publication Publication Date Title
US20190058789A1 (en) Method and apparatus for remote control and updating of wireless mobile devices
US10348804B2 (en) System to automatically process components on a device
US9928041B2 (en) Managing a software appliance
RU2339076C2 (en) Execution of non-verified programs in radio communication device
US8935687B2 (en) Incrementally updating a software appliance
US8924920B2 (en) Providing a software appliance based on a role
US20100107150A1 (en) Terminal having application update managing function, and application update managing program and system
US20090017812A1 (en) Method and system for restoring user settings after over-the-air update of mobile electronic device software
JP5248657B2 (en) System for registry-based automated installation and component handling on devices
US20070021113A1 (en) Device management network with support for roaming
CA2934482C (en) Providing application programs to devices
US20050118991A1 (en) Method, software and apparatus for performing actions on a wireless device using action lists and versioning
JP2003022189A (en) Distributed network computing system
US9323515B1 (en) Network with broker for device management
WO2023045442A1 (en) Application group transmission method and device, storage medium, and electronic device

Legal Events

Date Code Title Description
AS Assignment

Owner name: ACTION ENGINE CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CRASWELL, RONALD J.;PRATT, DAVID S., JR.;KLASSEN, PAUL J.H.;REEL/FRAME:017698/0339

Effective date: 20060303

AS Assignment

Owner name: PERLEGO SYSTEMS, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ACTION ENGINE CORPORATION;REEL/FRAME:021046/0430

Effective date: 20080523

AS Assignment

Owner name: SILICON VALLEY BANK,CALIFORNIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:PERLEGO SYSTEMS, INC.;REEL/FRAME:024201/0781

Effective date: 20100330

Owner name: SILICON VALLEY BANK, CALIFORNIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:PERLEGO SYSTEMS, INC.;REEL/FRAME:024201/0781

Effective date: 20100330

AS Assignment

Owner name: PERLEGO SYSTEMS INC., WASHINGTON

Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:025321/0253

Effective date: 20101109

AS Assignment

Owner name: BOLLER CROSS DATA, L.L.C., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PERLEGO SYSTEMS, INC.;REEL/FRAME:026621/0940

Effective date: 20110707

AS Assignment

Owner name: PERLEGO SYSTEMS, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:026626/0389

Effective date: 20110630

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION