The present invention relates to mobile wireless communication devices, systems, networks, and methods of operation and in particular to a password protect feature for application in mobile device during a remote session.
Traditionally the mobile user customer care is handled manually by the customer care technician requesting the end user to take specific actions on the device and user informing the technician with the results observed on the device. In some instances the end user informs the technician the actions being performed on the device and the technician assessing the next steps based on the results observed according to predefined scripts that are defined in the knowledgebase.
When a customer care technician is able to connect to a user mobile device and control the device to troubleshoot a problem it is desired that sensitive password text is contextually hidden from the remote support technician.
This invention describes the feature of Password Protection that can be applied to applications on mobile devices during a remote control session.
An objective of the invention is to provide a user with complete privacy of his/her application passwords during a remote control session.
Another objective of the invention is to provide a user with complete privacy of his/her passwords to e-mails, social network, banking applications and the like applications which involves the user to enter the password or PIN.
Still another objective of the invention is to contextually hide passwords from a customer care technician when being edited by the user.
Still another objective of the invention is to allow a technician to navigate through a mobile device without any impact to user authentication data.
Yet still another objective of the invention is to allow carriers and other tech support organizations to be able to support remote control to a mobile device without worrying about legal issues of privacy infringement.
Other objectives and advantages of this invention will become apparent from the following description taken in conjunction with the accompanying drawings wherein are set forth, by way of illustration and example, certain embodiments of this invention. The drawings constitute a part of this specification and include exemplary embodiments of the present invention and illustrate various objects and features thereof.
Referring to
The Virtual Mobile Management Remote Control (VMM-RC) is a powerful tool designed to be used by the customer care representatives to remotely view and control the mobile devices. In a preferred embodiment, the key components of the VMM-RC system include: Technician Console [30] where care agents interact with the remote devices [10] through Control Center [20] services that mediate communication between the Technician Console [30] and the remote devices [10].
The Control Center [20] comprises the following elements:
Communication Endpoint Gateway or CEG [200]
Admin and Control Function or ACF [220]
Registration and Authentication Function or RAF [240]
Data Repository [260]
The primary responsibility of CEG [200] is to manage and mediate sessions. The server provides communication endpoints between device [10] and Technician Console [30]. This allows for multiple requests to be serviced within one session from multiple instances of [30]. The CEG or [200] provides a consistent manner of device connection and Tool service in a system with heterogeneous devices running different operating systems. The CEG or [200] provides load balancing across multiple Connection Handlers on each Communication End Point Gateway Server in order to minimize single point of failure.
The primary function of [201] is: Create and manage multiple instances of [205]; Creates Session ID for new connection requests; Monitors all the scheduled and existing sessions. The primary function of [205] is: authenticate inbound connections; mediate VMM session traffic between device [10] and Technician Console [30].
The Administrative Service [221] is designed to be a central administrative entity of the entire virtual mobile management system. Through this service, system administrators perform administration, management and instrumentation servers within the system, create and maintain multiple tenants, assign tenant administrator roles, etc.
The Management Service [225] provides the operational endpoint to the system. The primary functions of Management Service are: Load distribution among the CEG, management of device registration; Administration of devices; Administration of users, zones, policies, roles, etc.; and Session Queuing.
The Management Entity [227] component is responsible in providing the Management service [225] with an in-memory data store for key operational data such as ACL, user/group/zone structures, etc.
The Service Coordinator [231] coordinates the communication between various elements within the System. It provides the database interface to the RAF [240] in the Control Center. All services register themselves with this service. This service is responsible for service discovery.
Registration Service [241]: During Auto-Enrollment, devices are required to register themselves with this service, prior to enrolling themselves.
Enrollment Service [244]: This service is responsible to enroll registered devices with the system. The Enrollment process is defined in detail in the later sections of the document.
Software Updates [247]: This service manages the various client packages in the system. Devices connect to this service to request for client update. If an update is available, the service will provide the appropriate client download link.
Device Management [250]: This service provides the enrolled devices an interface to update its parameters in the system such as MDN when the device detects a change. AnchorAdmin [253]: This service provides the administration component.
Data Repository [260] is the data warehouse that stores the information about the VMM-RC Mobile devices, server configuration, tasks and status settings. These data bases are pivotal to configure and update managed devices and server components. It is also responsible to maintain the user login information as well as device authentication information.
VMM Modules [112] provide a multitude of tool services. Tool Services are grouped together that exhibit common functionality such as Remote Control, File Manager, Device Management, etc.
State Machine [113], each tool service maintains an instance of the state machine. A State Machine defines a set of shared states that the tool service on the device application shares with the server.
Tool Service Coordinator [114] maintains a collection of active tool service instances that are currently being serviced by the VMM application. This entity maintains the lifetime of all Tool Services, and is responsible in creating and destroying Tool Services.
NV Data Repository [115] authentication and authorization specific data that is shared between the VMM application and the server is maintained within the NV data repository. This data repository also serves the purpose of maintaining Tool Service configuration as well as VMM configuration data.
Access Control Entity [121] layer provides a set of functions to the Tool Services to communicate with the Control Center [20]. It provides in the encapsulation of messages before forwarding it to the Communication Core [130]. This layer is responsible to invoke an instance of the Communication Core [130] layer and provides a state machine [123] that defines the state of the VMM application.
Access Control Interface [122] provides a set standard Application Programmer Interface or API to the Tool Services. These APIs provide a consistent communication platform to facilitate both synchronous as well as asynchronous communication.
State Machine [123] identifies the overall state of the VMM application. State transitions within the ACE State Machine triggers events that are handled by the VMM layer. The states are Open and Closed. Traffic flows through the ACI layer only in the State Open.
Message Routing Entity [124] is responsible for routing all signal messages, destined to Tool Services to the respective event handlers.
Message Processing Function [125] is a signal message pre-processor. This entity receives signal messages from the Session Layer destined towards Tool Services. It de-frames these messages prior to forwarding it to the Message Routing Entity to apply routing rules. Messages that are destined for the server from Tool Services are encapsulated here.
Communication Core [130] Layer is responsible to set up and maintain a dedicated communication channel with the Control Center [20]. This layer provides the necessary framework to transport messages between the upper layers and the Control Center [20]. It provides message encapsulation, framing, fragmentation and packet re-construction of Tool Service messages.
The communication core [130] comprises of the following sub-layers.
State Machine [141] maintains a state within a predefined set of shared state between the application and the CEG [200]. State changes within the state machine trigger the execution of state transition procedures within the VMM Application Module [112].
Signal Message Processor [142] is responsible to encapsulate and process signal messages that are transmitted between the CEG [200] and the Application Module [112]. This entity is also responsible in influencing the state transition within the state machine by altering its state. Signal messages destined to VMM modules are forwarded to the Signal Message Routing Function.
Signal Message Routing Function [143] is responsible with the task of forwarding signal messages to the appropriate destination. Signal messages destined to VMM modules are directly forwarded to the VVM Tool Service Coordinator [114]. Signal messages destined to the CEG [200] are forwarded to the link layer [160].
Referring to
The following components form the Link Layer [160] as in
The Transport Channel [163,164] binds to the appropriate transport layer of the underlying operating system, which is dependent upon the VMM Tool Service. It is responsible to forward messages to the network layer and receives messages from the network layer. It provides notification to the upper layer of the state of the network layer through asynchronous events.
The key features that are required by VMM-RC application to manage devices remotely include: Display Capture, this method involves the capturing of the device screen; Key event Injection, this method involves the injection of key events into the device screen; Touch event injection, this method involves the simulation of touch events on the device screen; and Device Information, getting the device information like network, power status, MNC, MCC, IMEI, IMSI, ESN, battery level of the smart phone etc., this is of value to the remote technician.
The VMM-RC Enabler [191] performs the key functions: Intercepts all the SMS; keeps the VMM-RC Application to its current version; if the VMM-RC Application is removed accidentally the VMM-RC Enabler shall connect to the server and download the application and installs the same.
(a) CEG[200] receives C-S link connection request from Technician Console [30];
(b) Authentication Request is received by CEG [200] from the Technician Console [30];
(c) Authentication Response is sent by [200] to [30];
(d) PEER_CONNECT_REQ signal is received by [200] from [30];
(e) [200] sends a Mobile Terminated SMS to Device [10];
(f) [200] receives D-S link connection request from Device [10];
(g) Authentication Request is received by [200] from Device [10];
(h) Authentication Response is sent by [200] to Device [10];
(i) PEER_CONNECT_REQ signal sent by [200] to Device [10];
(j) ACK received by [200] from [10];
(k) ACK transmitted by [200] to Technician Console [30];
(l) TOOL_SVC_REQ received by [200] from [30];
(m) TOOL_SVC_REQ relayed by [200] to VMM_RC[112.1];
(n) [200] receives D-B link connection from [112.1];
(o) [200] receives ACK from [112.1] for the TOOL_SVC_REQ for step (m);
(p) ACK relayed by [200] to [30];
(q) [200] receives C-B link connection request from [30].
At this point, the control plane and bearer plane is/are established. VMM-RC bearer data is carried over the bearer channels (D-B and C-B).
VMM-Remote Session Termination, referring to
(a) TOOL_SVC_DISCONNECT is received from Technician Console [30] by CEG[200];
(b) TOOL_SVC_DISCONNECT is relayed by [200] to Device [10];
(c) ACK is received by [200] from [10];
(d) ACK is relayed by [200] to Technician Console [30];
(e) PEER_DISCONNECT is received from Technician Console [30] by CEG[30];
(f) PEER_DISCONNECT is relayed by [200] to Device [10];
(g) ACK is received by [200] from [10]; and
(h) ACK is relayed by [200] to Technician Console [30].
At this time, all channels are disconnected and the VMM-RC session is closed.
The feature of Password Protection can be applied to applications on mobile devices during a remote control session. A remote control session is where a customer care technician is able to connect to a user mobile device and control the device to troubleshoot a problem. The current invention provides the user complete privacy of his/her application passwords during remote control session.
During a remote control session, sensitive password text shall be contextually hidden from the remote support technician. This capability is extended to all password/PIN protected applications. When the user or technician navigates to various applications including but not limited to email, social network, banking applications which involves the users to enter the password or PIN, the password data is contextually hidden from the customer care technician when being edited by the user. The technician shall also be prevented from editing the password data while being edited by the user.
If a soft keyboard is used to enter this data, the keyboard is completely hidden so that any key press by the user while entering the password/PIN is also hidden thereby preventing the customer care technician to guess the password being typed. This feature can be enabled/controlled dynamically as part of the Access control List (ACL) feature either by the user, server or both. ACL is a feature that enables access restrictions to be put for applications on mobile devices during a remote control session.
In operation, a subscriber calls a customer service representative (CSR) and initiates the remote control session. During the remote session, the subscriber navigates to password sensitive applications. For example, e-mail setup, market place login, browser sessions with login pages with password fields, applications installed from market like Skype whose login page is password protected, and so forth. While the subscriber is at the password protected page for a password sensitive application, when the subscriber clicks/highlights the password field, the soft keyboard that appears on the screen shall be hidden from the CSR and will appear greyed out on the remote session console. Even if the orientation of the device is changed, the keyboard shall stay hidden from the CSR view.
Any password input by the subscriber shall appear hidden to the CSR (only asterisk shall be visible). A toast message shall be shown once per remote session the first time a password field is highlighted/selected by the Subscriber. The content of the toast shall be “Your password shall not be visible to the customer service”. This message shall be visible to both CSR and Subscriber.
The CSR will not be able to edit the password field by entering digits remotely from remote console.
Once the Subscriber is done typing in the password field, when he/she highlights any other field in the dialog outside the password field the keyboard shall become visible again.
By way of example, referring to Picture 1 of
As the capabilities of the mobile devices continue to expand, they provide the ability to the user to access all their financial transactions, email. Social network data and a multitude of other password protected browser based web transactions from the comfort of their smartphone device. This invention helps to protect the privacy of the end user in this context while a care agent performs the remote session.
(a) VMM-RC application [112.] starts on the device as a result VMM-RC remote initiation from Console [30]
(b) Client Security Policy is applied to the VMM-RC application [112.1]
(c) Text Input processor thread is invoked.
(d) During navigation, if the text field in focus is “Password” type, Streaming is paused and a bearer notification is sent to the console
(e) A toast message is displayed to the user.
(f) When the Password text field is no longer in focus, streaming is resumed.
Detailed embodiments of the instant invention are disclosed herein, however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific functional and structural details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representation basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriately detailed structure.
One skilled in the art will readily appreciate that the present invention is well adapted to carry out the objectives and obtain the ends and advantages mentioned, as well as those inherent therein. The embodiments, methods, procedures and techniques described herein are presently representative of the preferred embodiments, are intended to be exemplary and are not intended as limitations on the scope. Changes therein and other uses will occur to those skilled in the art which are encompassed within the spirit of the invention and are defined by the scope of the appended claims. Although the invention has been described in connection with specific preferred embodiments, it should be understood that the invention as claimed should not be unduly limited to such specific embodiments. Indeed, various modifications of the described modes for carrying out the invention which are obvious to those skilled in the art are intended to be within the scope of the following claims.
In accordance with 37 C.F.R. §1.76, a claim of priority is included in an Application Data Sheet filed concurrently herewith. Accordingly, the present invention claims priority under 35 U.S.C. §§119(e), 120, 121, and/or 365(c) to U.S. Provisional Patent Application No. 61/617,860, entitled “PASSWORD PROTECT FEATURE FOR APPLICATION IN MOBILE DEVICE DURING A REMOTE SESSION”, filed on Mar. 30, 2012. The contents of which the above referenced application is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5995829 | Broderick | Nov 1999 | A |
5999521 | Thompson | Dec 1999 | A |
6047071 | Shah | Apr 2000 | A |
6144849 | Nodoushani et al. | Nov 2000 | A |
6148197 | Bridges et al. | Nov 2000 | A |
6201964 | Tung et al. | Mar 2001 | B1 |
6378088 | Mongan | Apr 2002 | B1 |
6516188 | New et al. | Feb 2003 | B1 |
6564055 | Hronek | May 2003 | B1 |
6584454 | Hummel et al. | Jun 2003 | B1 |
6615038 | Moles et al. | Sep 2003 | B1 |
6625451 | LaMedica, Jr. et al. | Sep 2003 | B1 |
6684359 | Noy | Jan 2004 | B2 |
6907546 | Haswell et al. | Jun 2005 | B1 |
6925405 | Adir et al. | Aug 2005 | B2 |
6959433 | Morales, Jr. et al. | Oct 2005 | B1 |
6970719 | McConnell et al. | Nov 2005 | B1 |
7032212 | Amir et al. | Apr 2006 | B2 |
7194264 | Li et al. | Mar 2007 | B2 |
7286802 | Beyme et al. | Oct 2007 | B2 |
7805719 | O'Neill | Sep 2010 | B2 |
20020066039 | Dent | May 2002 | A1 |
20030065738 | Yang et al. | Apr 2003 | A1 |
20030066065 | Larkin | Apr 2003 | A1 |
20030069994 | Herceg et al. | Apr 2003 | A1 |
20030101246 | Lahti | May 2003 | A1 |
20030156549 | Binder et al. | Aug 2003 | A1 |
20030204726 | Kefford et al. | Oct 2003 | A1 |
20040098715 | Aghera et al. | May 2004 | A1 |
20040268148 | Karjala et al. | Dec 2004 | A1 |
20050193098 | Khandpur et al. | Sep 2005 | A1 |
20050227688 | Li et al. | Oct 2005 | A1 |
20060015404 | Tran | Jan 2006 | A1 |
20060015626 | Hallamaa et al. | Jan 2006 | A1 |
20060075284 | Skan | Apr 2006 | A1 |
20060130046 | O'Neill | Jun 2006 | A1 |
20060136922 | Zimberg et al. | Jun 2006 | A1 |
20060248522 | Lakshminarayanan et al. | Nov 2006 | A1 |
20070005647 | Cugi et al. | Jan 2007 | A1 |
20070106564 | Matotek et al. | May 2007 | A1 |
20070299940 | Gbadegesin et al. | Dec 2007 | A1 |
20080098380 | Klusmeyer | Apr 2008 | A1 |
20080120557 | Offenhartz et al. | May 2008 | A1 |
20080172736 | Barr et al. | Jul 2008 | A1 |
20080189781 | Pathak et al. | Aug 2008 | A1 |
20080209193 | Zhang et al. | Aug 2008 | A1 |
20090164602 | Kies et al. | Jun 2009 | A1 |
20090177882 | Saran et al. | Jul 2009 | A1 |
20090221307 | Wolak et al. | Sep 2009 | A1 |
20090228966 | Parfene et al. | Sep 2009 | A1 |
20100070649 | Ng | Mar 2010 | A1 |
20100151823 | Dagorn et al. | Jun 2010 | A1 |
20100217780 | Erola et al. | Aug 2010 | A1 |
20110277019 | Pritchard, Jr. | Nov 2011 | A1 |
20130054969 | Charles et al. | Feb 2013 | A1 |
Number | Date | Country |
---|---|---|
1429569 | Dec 2003 | EP |
WO2005001665 | Jan 2005 | WO |
Entry |
---|
Anonymous, “SyncML notification initiated session”, Internet Citation, XP002462105, URL:http://www.openmobilealliance.org/tech/affiliates/syncml/syncml—dm—notification—v11—20020215.pdf, (Dec. 12, 2007). |
Kovacs, E. et al, “Integrating mobile agents into the mobile middleware”, Internet article: http://download.springer.com/static/pdf/630/art%253A10.1007%252FBF01324936.pdf?auth66=1353975026—642152af85f26d0903f4dc786bdf1416&ext=.pdf>, p. 68-74, (Retrieved from Internet Nov. 26, 2012). |
Caporuscio, M. et al, “Design and evaluation of a support service for mobile, wireless publish subscribe applications”, 2003 IEEE, Internet article: http:ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1265521, 29:12, p. 1059-1071, (Retrieved from Internet Nov 26, 2012). |
Number | Date | Country | |
---|---|---|---|
20130263288 A1 | Oct 2013 | US |
Number | Date | Country | |
---|---|---|---|
61617860 | Mar 2012 | US |