With the growing ubiquity of mobile communication devices such as smart phones and the like, comes the increasing desire to monitor their use. Parents want to know who their children are calling. Employers want to know their employees' communication habits during work. Users want to study their own mobile communication device usage, for example to assist in selecting a suitable mobile device, telecommunication carrier or service plan. Data provided in a telecommunication service provider bill may be insufficient and not suitably presented to provide an understanding of mobile communication device use.
The invention provides a computer-implemented method for logging and reporting mobile device information. The method includes receiving device activity information corresponding to use of a particular mobile device via a client executed on the particular mobile device. The activity information is sorted based on at least one predetermined criterion, and the sorted activity information is reported to a user.
The invention further provides a computer activity monitoring and reporting system comprising at least one computing system including at least one memory comprising instructions operable to enable the at least one computing system to perform a procedure. The procedure includes receiving device activity information corresponding to use of a particular mobile device via a client executed on the particular mobile device. The activity information is sorted based on at least one predetermined criterion, and the sorted activity information is reported to a user.
The invention further provides non-transitory computer-readable media tangibly embodying a program of instructions executable by a processor to implement a method. The method includes receiving device activity information corresponding to use of a particular mobile device via a client executed on the particular mobile device. The activity information is sorted based on at least one predetermined criterion, and the sorted activity information is reported to a user.
The following detailed description will be readily understood in conjunction with the appended drawings which illustrate embodiments of the invention. In the drawings:
This invention provides a system and method for logging mobile device use and information and supplying numerical and visual diagrams for user analysis and comparison. Logs operatively associated with applications which monitor device activity include information such as date, time, contact details (e.g. name, phone number, email address, or other details), activity type (e.g. text message, email, phone call, application used, contact information, or other activity information), and content from interactions (e.g. text message content or email content). This data allows comparison of data over a span of time and is presented in different ways to highlight different types of data collected, for example in the form of numerical totals, visual graphs and tables.
Information is collected from a mobile device via a client application installed on the device and is stored in a server database. The information is retrieved by a user for example via a web application, where it is displayed and organized for the user to observe and gain insight into device use and patterns.
Referring to
The monitor and control system 20 is configured to sort activity information based on user preference, for example via a sorting engine 28, in real-time or on the fly, to enable viewing data chronologically (e.g. date or time), by keyword search, by contact details (i.e. with whom communications were initiated), or by the type of activity (e.g. phone calls, short message service (“SMS”) messages, instant messages (“IMs”), applications used, or other activities). An activity information history is logged, stored and rendered accessible for long-term and short-term comparisons via the activity database 24. Important events are also logged and used to provide more up-to-date activity alerts and notifications related to use of the monitored mobile device 14. A user accessing the interface application 26 via a computing device 16 can trigger transmissions from the monitoring agent 12 to the monitor and control system 20 via the monitoring agent API 22. The user can further trigger sorting of the transmissions.
Notifications that are sent from the monitoring agent 12 to a monitoring user via the interface application 26 are also included in the logs stored in the activity database 24. Data corresponding to a particular monitored user is preferably stored in the activity database 24 as one log. However, different logs can be generated by filtering the logs for more specialized lists via the interface application 26, for example based on preferences of a monitoring user. Logs can include for example indications of alerts, SMSs, phone calls, applications used, or other recorded activities.
The monitor and control system 20 is further enabled to effect locking controls on a monitored user's mobile device 14 via the monitoring agent 12 pursuant to instructions received by a monitoring user via the interface application 26. The monitoring user can select time periods when features of the mobile communication device 14, such as phone calling, text message transmission to and reception by a monitored user are to be enabled or disabled.
In a first example, a child mobile device user “Sally” just received a new mobile device from her parents and uses it non-stop. Via the interface application 26, her parents enable the monitoring agent 12 on Sally's mobile device 14 to begin logging her mobile device activity. The parents monitor Sally's activity on her mobile device 14 via their computing device 16. The parents notice from data retrieved via the interface application 26 that Sally constantly sends text messages to a mobile number they don't recognize. Through further investigation of the retrieved data, they realize the text messages were communications with a boy Sally recently met online 3 weeks prior.
In a second example, Jerry installs the monitoring agent 12 on his mobile communication device 14 and collects activity information over a 5-year period. Jerry would like to find out how much time he spends on average in work-related phone calls vs. social phone calls in order to better manage his time and to decide whether having a separate mobile device for work is worth having. Through interactive logging enabled by the interface application 26, Jerry sorts activity information based on what is important to him to know and determines if it is worth incurring the expense of a separate account. Sorting methods enabled by the sorting engine 28 to enable Jerry's research include:
Contacts can be ranked based on an algorithm that takes into consideration an amount of time or number of communications between a monitored user and a particular contact, for example a number of calls to or an amount of time talking to a particular contact on the phone and the number of text messages sent to or received from the particular contact. A particular contact may be designated as a flagged contact, which will alert the monitoring user if the monitored device is used to talk to the particular contact or other communication is initiated with the particular contact.
Mobile communication devices can be used for communication in a variety of ways including phone calls and electronic text messages (e.g. SMSs). When presenting this information to an individual, it is desirable to list the contacts in order of the amount of communication between that contact and the monitored mobile device. For example, a parent may wish to know who their child talks to the most on the phone. This invention provides a means of ranking contacts who a monitored user may be communicating with in a variety of ways by assigning a quantitative measure to each form of communication. For example, a number of minutes spent talking on the phone and a number of text messages sent can be combined to achieve a single quantitative measure of communication with a particular contact. In another example, a phone call can correspond to a first factor and an electronic text message can correspond to a second factor, wherein the number of minutes in the phone call are multiplied by the first factor and the number of electronic text messages are multiplied by the second factor, and the results are summed to achieve the quantitative measure. Based on a determined quantitative measure, contacts can be ranked from most frequently communicated with to least frequently communicated with. Alternatively, a plurality of quantitative measures can be calculated for a contact.
An individual may want to monitor communication of a particular monitored user with a particular contact more closely. For example, a mother may want to know whether her child is talking to a particular new friend. This invention enables an individual to designate (flag) one or more contacts to be monitored extra carefully. Preferably, flagged contacts correspond to a lower threshold of notification. When a monitored mobile device is used to communicate in any way with such flagged contacts, the individual monitoring the device is preferably alerted by means of a message within a software application, an electronic text message, or an email.
Referring to
Referring to
The monitor and control system 20 is further configured to determine from received activity information a total duration of phone calls and a total number of electronic messages which occur in a plurality of predetermined time slots in a day. One or more displays are provided to a monitoring user reporting the total duration of phone calls and/or the total number of electronic messages which occurred at each of the plurality of predetermined time slots.
The monitor and control system 20 is further configured to determine a plurality of contacts of the monitored user via a phone call or messaging history or a contact listing stored on the mobile communication device 14 or remote network location, for example a third party application server 30. A communication level of the plurality of contacts is determined and rankings of the plurality of contacts are generated and displayed based on their respective communication levels.
While embodiments of the invention have been described in detail, the invention is not limited to the specific embodiments described above, which should be considered as merely exemplary. Further modifications and extensions of the invention may be developed, and all such modifications are deemed to be within the scope of the invention as defined by the appended claims.
This application claims the benefit of U.S. Provisional Application No. 61/566,586, filed Dec. 2, 2011, which is incorporated by reference as if fully set forth.
Number | Name | Date | Kind |
---|---|---|---|
4956825 | Wilts et al. | Sep 1990 | A |
5434562 | Reardon | Jul 1995 | A |
5673691 | Abrams et al. | Oct 1997 | A |
5882258 | Kelly et al. | Mar 1999 | A |
5907831 | Lotvin et al. | May 1999 | A |
5973683 | Cragun et al. | Oct 1999 | A |
6023692 | Nichols | Feb 2000 | A |
6161008 | Lee et al. | Dec 2000 | A |
6529724 | Khazaka et al. | Mar 2003 | B1 |
6731746 | Usami | May 2004 | B1 |
7178720 | Strubbe et al. | Feb 2007 | B1 |
7257367 | Etuk et al. | Aug 2007 | B2 |
7272633 | Malik et al. | Sep 2007 | B2 |
7729945 | Katz et al. | Jun 2010 | B1 |
7839891 | Allan | Nov 2010 | B1 |
7925690 | Smith et al. | Apr 2011 | B2 |
8010037 | Bannwolf | Aug 2011 | B2 |
8024290 | Yang et al. | Sep 2011 | B2 |
8095413 | Beaven | Jan 2012 | B1 |
8121879 | Cohen | Feb 2012 | B1 |
8135392 | Marcellino et al. | Mar 2012 | B2 |
8160560 | Geyer et al. | Apr 2012 | B2 |
8193982 | Kupfer et al. | Jun 2012 | B2 |
8401521 | Bennett et al. | Mar 2013 | B2 |
8621075 | Luna | Dec 2013 | B2 |
8738688 | Myers et al. | May 2014 | B2 |
8825035 | Moton, Jr. et al. | Sep 2014 | B2 |
8843122 | Wick et al. | Sep 2014 | B1 |
8849095 | Hoofien et al. | Sep 2014 | B2 |
8856322 | Dare et al. | Oct 2014 | B2 |
9124703 | Tayadon et al. | Sep 2015 | B2 |
20020012894 | Becker | Jan 2002 | A1 |
20020174180 | Brown et al. | Nov 2002 | A1 |
20020178046 | Lawrence | Nov 2002 | A1 |
20030005306 | Hunt et al. | Jan 2003 | A1 |
20030082508 | Barney | May 2003 | A1 |
20030211889 | Walker et al. | Nov 2003 | A1 |
20040024569 | Camillo | Feb 2004 | A1 |
20040030599 | Sie et al. | Feb 2004 | A1 |
20040039624 | Izekawa | Feb 2004 | A1 |
20040083472 | Rao et al. | Apr 2004 | A1 |
20040219493 | Phillips | Nov 2004 | A1 |
20040267607 | Maddux | Dec 2004 | A1 |
20050003895 | Nara | Jan 2005 | A1 |
20050096030 | Boyd et al. | May 2005 | A1 |
20050287502 | Southard et al. | Dec 2005 | A1 |
20060085547 | Cormier | Apr 2006 | A1 |
20060184792 | Berlin | Aug 2006 | A1 |
20060270476 | Denkewicz | Nov 2006 | A1 |
20070039624 | Roberts et al. | Feb 2007 | A1 |
20070041545 | Gainsboro | Feb 2007 | A1 |
20070203872 | Flinn et al. | Aug 2007 | A1 |
20070208802 | Barman et al. | Sep 2007 | A1 |
20070263843 | Foxenland | Nov 2007 | A1 |
20080176585 | Eldering | Jul 2008 | A1 |
20080199199 | Kato et al. | Aug 2008 | A1 |
20080201469 | Reasor et al. | Aug 2008 | A1 |
20080246605 | Pfeffer et al. | Oct 2008 | A1 |
20080299954 | Wright et al. | Dec 2008 | A1 |
20090017750 | Marcinkiewicz | Jan 2009 | A1 |
20090038005 | Howarth | Feb 2009 | A1 |
20090055938 | Samuel | Feb 2009 | A1 |
20090064316 | Liao et al. | Mar 2009 | A1 |
20090089876 | Finamore et al. | Apr 2009 | A1 |
20090181356 | Dasgupta | Jul 2009 | A1 |
20090204471 | Elenbaas et al. | Aug 2009 | A1 |
20090247124 | de Atley et al. | Oct 2009 | A1 |
20090286218 | Johnson et al. | Nov 2009 | A1 |
20090298019 | Rogan et al. | Dec 2009 | A1 |
20100028844 | Wiseman | Feb 2010 | A1 |
20100037088 | Krivopaltsev et al. | Feb 2010 | A1 |
20100058446 | Thwaites | Mar 2010 | A1 |
20100076274 | Severson | Mar 2010 | A1 |
20100100618 | Kuhlke et al. | Apr 2010 | A1 |
20100116884 | Alderucci et al. | May 2010 | A1 |
20100125028 | Heppert | May 2010 | A1 |
20100145976 | Higgins et al. | Jun 2010 | A1 |
20100211887 | Woollcombe | Aug 2010 | A1 |
20100235223 | Lyman | Sep 2010 | A1 |
20100250352 | Moore | Sep 2010 | A1 |
20100268768 | Kurtenbach et al. | Oct 2010 | A1 |
20100285871 | Shah et al. | Nov 2010 | A1 |
20100317420 | Hoffberg | Dec 2010 | A1 |
20100330972 | Angiolillo | Dec 2010 | A1 |
20110029598 | Arnold et al. | Feb 2011 | A1 |
20110045868 | Sheha et al. | Feb 2011 | A1 |
20110047078 | Ginter et al. | Feb 2011 | A1 |
20110055546 | Klassen et al. | Mar 2011 | A1 |
20110070567 | Linton | Mar 2011 | A1 |
20110236872 | Taylor | Sep 2011 | A1 |
20110252375 | Chaudhri | Oct 2011 | A1 |
20110302003 | Shirish et al. | Dec 2011 | A1 |
20120008526 | Borghei | Jan 2012 | A1 |
20120066088 | Murset | Mar 2012 | A1 |
20120069131 | Abelow | Mar 2012 | A1 |
20120131161 | Ferris et al. | May 2012 | A1 |
20120135705 | Thaker | May 2012 | A1 |
20120149352 | Backholm et al. | Jun 2012 | A1 |
20120151384 | Stass et al. | Jun 2012 | A1 |
20120157076 | Choi et al. | Jun 2012 | A1 |
20120166285 | Shapiro et al. | Jun 2012 | A1 |
20120172027 | Partheesh et al. | Jul 2012 | A1 |
20120172100 | Colar et al. | Jul 2012 | A1 |
20120179767 | Clarke et al. | Jul 2012 | A1 |
20120214472 | Tayadon et al. | Aug 2012 | A1 |
20120215328 | Schmelzer | Aug 2012 | A1 |
20120226704 | Boland et al. | Sep 2012 | A1 |
20120253918 | Marois et al. | Oct 2012 | A1 |
20120254949 | Mikkonen et al. | Oct 2012 | A1 |
20120260118 | Jiang et al. | Oct 2012 | A1 |
20120280916 | Xia et al. | Nov 2012 | A1 |
20120323990 | Hayworth | Dec 2012 | A1 |
20120330702 | Kowalski et al. | Dec 2012 | A1 |
20130040629 | Sprigg et al. | Feb 2013 | A1 |
20130084847 | Tibbitts et al. | Apr 2013 | A1 |
20130091453 | Kotler et al. | Apr 2013 | A1 |
20130104246 | Baer et al. | Apr 2013 | A1 |
20130111462 | Umansky et al. | May 2013 | A1 |
20130111510 | Baker et al. | May 2013 | A1 |
20130143512 | Hernandez et al. | Jun 2013 | A1 |
20130145007 | Randazzo et al. | Jun 2013 | A1 |
20130185411 | Martin | Jul 2013 | A1 |
20130198272 | Shionoya et al. | Aug 2013 | A1 |
20130198296 | Roy et al. | Aug 2013 | A1 |
20130225151 | King et al. | Aug 2013 | A1 |
20130305384 | Weiss | Nov 2013 | A1 |
20130316746 | Miller et al. | Nov 2013 | A1 |
20130332886 | Cranfill et al. | Dec 2013 | A1 |
20130339345 | Soto et al. | Dec 2013 | A1 |
20130346333 | Hassler et al. | Dec 2013 | A1 |
20140082065 | Anakata | Mar 2014 | A1 |
20140108649 | Barton et al. | Apr 2014 | A1 |
20140143108 | Smith et al. | May 2014 | A1 |
20140236846 | Melika et al. | Aug 2014 | A1 |
20140310327 | Yip et al. | Oct 2014 | A1 |
20140310365 | Sample et al. | Oct 2014 | A1 |
20140310403 | Weiss et al. | Oct 2014 | A1 |
20140316990 | Winston | Oct 2014 | A1 |
20140338006 | Grkov et al. | Nov 2014 | A1 |
20150040246 | Yuen et al. | Feb 2015 | A1 |
20150058488 | Backholm | Feb 2015 | A1 |
20150095970 | Shetty | Apr 2015 | A1 |
20150097669 | Li | Apr 2015 | A1 |
20150099500 | Chalmers | Apr 2015 | A1 |
20150163664 | Martin | Jun 2015 | A1 |
20150169853 | Singh | Jun 2015 | A1 |
20150188777 | Frost | Jul 2015 | A1 |
20150350410 | Weiss et al. | Dec 2015 | A1 |
20170132424 | Anakata | May 2017 | A9 |
Number | Date | Country |
---|---|---|
2863439 | Jun 2005 | FR |
1770969 | Apr 2007 | GB |
WO 2011137279 | Mar 2011 | WO |
Entry |
---|
Kohavi, “Emerging Trends in Business Analytics”, Communications of the ACM, Aug. 2002, vol. 45, No. 8, pp. 45-48. |
Number | Date | Country | |
---|---|---|---|
20130143521 A1 | Jun 2013 | US |
Number | Date | Country | |
---|---|---|---|
61566586 | Dec 2011 | US |