This invention relates generally to communication systems, and more particularly to a method and system for approval of communications by a guardian.
Cellular phones have become ubiquitous to the point where young children and adults alike stay in contact with one another. Parents frequently justify the purchase of a new cellular phone for their children as a way to keep in contact with them from a personal and family security aspect. Children and teens are spending more time away from their parents and need the capability to contact their parent or guardian in the event of an emergency or for a sense of comfort or well being.
Ubiquitous communication devices can be a double-edged sword. On one hand, they can provide a bidirectional lifeline to both parent and child. A child with a cellular phone is accessible to his or her parent regardless of distance and time. Likewise, a parent is accessible to their child. Unfortunately, this also means that the child is also exposed to others who may wish to do them harm and take advantage of them. Sexual predators, identification thieves, and unscrupulous marketers search out young children and even elderly individuals in hopes of alluring them to a defenseless state or in hopes of shamelessly taking advantage of them.
There are a number of applications on the Internet that limit exposure of a child or teen to activity of individuals that may cause harm to them. Some examples include AOL Guardian, Cybersitter software and numerous email add-ons that prevent access to content that is deemed inappropriate to the individual. However, these applications fail to provide a real time mobile environment for the parent or guardian to monitor and therefore approve access. Wire line phones can be subscribed to block certain outgoing or incoming area codes. There are even options on mobile phones that determine if an application on the phone is allowed to perform. Other attempts at resolving other problems such as providing preprogrammed one-touch dialing buttons (insuring callers can make necessary calls to a predetermined number of locations) can help a small business owner manage communications expenses and avoid incurring unauthorized expenses, but such devices would not likely become ubiquitous and would unnecessarily limit the functionality of communication devices.
Embodiments in accordance with the present invention can enable a mediating parent or guardian to decide if an incoming or outgoing call, contact or both are allowed to go through. Embodiments herein enable devices to retain substantial open connectivity while enabling the monitoring or prevention of callers or calls that mean ill will towards an individual.
In a first embodiment of the present invention, a method of guardian approval of communications where a guardian phone serves as a master phone to at least one slave phone can include the steps of forwarding an unknown incoming call to a slave phone to the master phone, enabling the master phone to approve the unknown incoming call, and routing the unknown incoming call to the slave phone when the master phone approves the unknown call. The method can further include the steps of routing an unknown outgoing call from a slave phone to the master phone, enabling the master phone to approve the unknown outgoing call to a third party, and routing the unknown outgoing call to the third party when the master phone approves the unknown outgoing call. The method can further include the step of recognizing the unknown outgoing call by the master phone as an approved called party and subsequently enabling outgoing calls from the slave phone to the approved called party without forwarding the outgoing call to the master phone. The method can also include the step of recognizing the unknown incoming call by the master phone as an approved caller and subsequently enabling incoming calls from the approved caller to the slave phone without forwarding the approved caller to the master phone. The method can also enable the master phone to override existing settings such that all incoming and outgoing calls go through the master phone. The method can also periodically generate or selectively generate a report of unknown incoming calls or unknown outgoing calls to or from the slave phone at the master phone. The method can also maintain a master profile for access and control for slave devices under the master phone at a server. The method can also present an indication on the slave device that the slave device is being monitored by the master device or alternatively or optionally present an indication on the master device of a particular call or caller being monitored.
In a second embodiment of the present invention, a system of guardian approval of communications can include a guardian phone serving as a master phone to at least one slave phone, and a processor operatively coupled to the master phone and the slave phone. The processor can be programmed to forward any unknown incoming call to a slave phone to the master phone, enable the master phone to approve the unknown incoming call, and route the unknown incoming call to the slave phone when the master phone approves the unknown call. The processor can be further programmed to route an unknown outgoing call from a slave phone to the master phone, enable the master phone to approve the unknown outgoing call to a third party, and route the unknown outgoing call to the third party when the master phone approves the unknown outgoing call. The processor can be further programmed to recognize the unknown incoming call and designate the unknown incoming call by the master phone as an approved caller and subsequently enables incoming calls from the approved caller to the slave phone without forwarding the approved caller to the master phone. The processor can be programmed to designate the unknown outgoing call as a call to an approved called party by the master phone and subsequently enable outgoing calls from the slave phone to the approved called party without forwarding the outgoing call to the master phone. The processor can also enable the master phone to override existing settings such that all incoming and outgoing calls go through the master phone. The system can periodically generate or selectively generate a report of unknown incoming calls or unknown outgoing calls to or from the slave phone at the master phone. The system can also maintain a master profile for access and control for slave devices under the master phone at a server. The system can also present an indication on the slave device that the slave device is being monitored by the master device.
In a third embodiment of the present invention, a portable wireless communication unit having a system of guardian approval can include a transceiver and a processor operatively coupled to the transceiver. The processor can be programmed to forward any unknown incoming call to the transceiver to a master phone and accept the unknown incoming call if the master phone approves the unknown incoming call and designates the unknown incoming call as an approved call. The processor can be further programmed to route an unknown outgoing call from the transceiver to the master phone and enable the transceiver to route the unknown outgoing call to a third party when the master phone approves the unknown outgoing call to the third party and designates the unknown outgoing call as an approved call. The processor can further be programmed to recognize approved calls and subsequently enables incoming calls from an approved caller to the slave phone without forwarding the approved caller to the master phone. The processor can also be programmed to recognized approved calls to third parties and subsequently enables outgoing calls from the transceiver to an approved caller without forwarding the approved call to the master phone.
The terms “a” or “an,” as used herein, are defined as one or more than one. The term “plurality,” as used herein, is defined as two or more than two. The term “another,” as used herein, is defined as at least a second or more. The terms “including” and/or “having,” as used herein, are defined as comprising (i.e., open language). The term “coupled,” as used herein, is defined as connected, although not necessarily directly, and not necessarily mechanically.
The terms “program,” “software application,” and the like as used herein, are defined as a sequence of instructions designed for execution on a computer system. A program, computer program, or software application may include a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a midlet, a source code, an object code, a shared library/dynamic load library and/or other sequence of instructions designed for execution on a computer system. The “processor” as described herein can be any suitable component or combination of components, including any suitable hardware or software, that are capable of executing the processes described in relation to the inventive arrangements.
Other embodiments, when configured in accordance with the inventive arrangements disclosed herein, can include a system for performing and a machine readable storage for causing a machine to perform the various processes and methods disclosed herein.
While the specification concludes with claims defining the features of embodiments of the invention that are regarded as novel, it is believed that the invention will be better understood from a consideration of the following description in conjunction with the figures, in which like reference numerals are carried forward.
Referring to
Referring to
In most instances, the Slave mobile devices will be able to initiate outgoing calls or receive incoming calls from the newly added approved contact without having to through the Master Phone. However, there may be times when the adult or guardian may want to monitor the time two individuals spend talking. As noted in the method above, the master phone 24 may also choose to override all settings and may choose to receive all incoming and outgoing calls to any of the slave devices 26 or 28. The master phone 24 may also choose to receive a call record for each slave device that they administrator to either periodically or selectively received a report. The report can also be selectively triggered based on a call event as well. The periodic report interval may be daily, weekly, monthly, or set to some other interval. In addition, the master phone 24 may choose to receive real time notification for certain calls that have been already pre-approved by the master device for the purpose of real time monitoring. As shown in a user interface or display 40 of
Referring again to
The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, personal digital assistant, a cellular phone, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine, not to mention a mobile server. It will be understood that a device of the present disclosure includes broadly any electronic device that provides voice, video or data communication. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The computer system 200 can include a controller or processor 202 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a main memory 204 and a static memory 206, which communicate with each other via a bus 208. The computer system 200 may further include a presentation device such as a video display unit 210 (e.g., a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT)). The computer system 200 may include an input device 212 (e.g., a keyboard), a cursor control device 214 (e.g., a mouse), a disk drive unit 216, a signal generation device 218 (e.g., a speaker or remote control that can also serve as a presentation device) and a network interface device 220. Of course, in the embodiments disclosed, many of these items are optional.
The disk drive unit 216 may include a machine-readable medium 222 on which is stored one or more sets of instructions (e.g., software 224) embodying any one or more of the methodologies or functions described herein, including those methods illustrated above. The instructions 224 may also reside, completely or at least partially, within the main memory 204, the static memory 206, and/or within the processor 202 during execution thereof by the computer system 200. The main memory 204 and the processor 202 also may constitute machine-readable media.
Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations.
In accordance with various embodiments of the present invention, the methods described herein are intended for operation as software programs running on a computer processor. Furthermore, software implementations can include, but are not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein. Further note, implementations can also include neural network implementations, and ad hoc or mesh network implementations between communication devices.
The present disclosure contemplates a machine readable medium containing instructions 224, or that which receives and executes instructions 224 from a propagated signal so that a device connected to a network environment 226 can send or receive voice, video or data, and to communicate over the network 226 using the instructions 224. The instructions 224 may further be transmitted or received over a network 226 via the network interface device 220.
While the machine-readable medium 222 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure. The terms “program,” “software application,” and the like as used herein, are defined as a sequence of instructions designed for execution on a computer system. A program, computer program, or software application may include a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a midlet, a source code, an object code, a shared library/dynamic load library and/or other sequence of instructions designed for execution on a computer system.
In light of the foregoing description, it should be recognized that embodiments in accordance with the present invention can be realized in hardware, software, or a combination of hardware and software. A network or system according to the present invention can be realized in a centralized fashion in one computer system or processor, or in a distributed fashion where different elements are spread across several interconnected computer systems or processors (such as a microprocessor and a DSP). Any kind of computer system, or other apparatus adapted for carrying out the functions described herein, is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the functions described herein.
In light of the foregoing description, it should also be recognized that embodiments in accordance with the present invention can be realized in numerous configurations contemplated to be within the scope and spirit of the claims. Additionally, the description above is intended by way of example only and is not intended to limit the present invention in any way, except as set forth in the following claims.