Control of a mobile device

ABSTRACT

A method, apparatus, and computer readable storage medium are disclosed to control a mobile device. A disable event module detects a failure to respond to a communication. The communication is sent to a mobile communications device from a supervisory source. A function disable module disables one or more functions of the mobile communications device in response to detecting the failure to respond to the communication. An enable event module detects a second communication between the mobile communications device and the supervisory source. A function enable module enables the one or more functions in response to detecting the second communication.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 12/751,569 entitled “Control of A Mobile Device”and filed on Mar. 31, 2010 for Ephraim D. Starr which is incorporatedherein by reference.

BACKGROUND

1. Field

The subject matter disclosed herein relates to control of a mobiledevice and more particularly relates to remotely controlling a mobilecommunications device.

2. Description of the Related Art

Mobile communications devices are becoming increasingly ubiquitous. Theuse of mobile telephones has become nearly universal. Other mobiledevices such as mobile gaming devices, mobile media player devices,electronic readers (“e-readers”), and the like also routinely includecommunications functions. These communications functions can provideaccess to wireless data networks for browsing the Internet or accessingemail and can provide mobile telephone device functionality such asvoice calling and text messaging.

There are many situations where one person provides a mobilecommunications device for another person's use. For example, manyparents provide mobile telephones or other mobile communications devicesto their children. This provides a convenient manner for parents andchildren to communicate and has safety benefits for the children. Manyemployers also provide various mobile communications devices toemployees to facilitate communication with the employees and to improveproductivity.

When a supervisory entity such as a parent or employer provides a mobilecommunications device to another user, such as a child or an employee,the supervisory entity may wish to place certain restrictions on the useof the mobile communications device. For example, the supervisory entitymay want to ensure that the other user responds to communications fromthe supervisory entity, that the other user does not exceed certainusage limits, or that the other user uses the mobile communicationsdevice for certain purposes. Traditionally, if the other user refuses toabide by restrictions set by the supervisory entity, the supervisoryentity's primary option to enforce the restrictions is to take back themobile communications device from the other user.

Other options exist, such as to suspend payment to the network carrier,following which the carrier may discontinue service to the mobilecommunications device. Alternatively, in the corporate enterprisecontext, an IT services group may be able to disable certain functionsof the mobile communications device such as access to the corporateenterprise email server. In each of these contexts, however, re-enablingthe discontinued services involves a time-consuming or otherwiseinefficient process. For example, the mobile communications device'suser may be required to contact a customer support center, follow aseries of steps, and/or otherwise fulfill multiple requirements beforeservices are resumed.

SUMMARY

The present inventor has recognized a need for a method, apparatus, andcomputer readable storage medium that provide efficient, responsivecontrol over a mobile device. Such a method, apparatus, and computerreadable storage medium allow the disabling and/or enabling of one ormore functions of a mobile device remotely, promptly and efficiently.

A method is presented to control a mobile device. In one embodiment, themethod includes detecting a failure to respond to a communication. Thecommunication is sent to a mobile communications device from asupervisory source. The method further includes disabling one or morefunctions of the mobile communications device in response to detectingthe failure to respond to the communication.

The method, in one embodiment, includes detecting a second communicationbetween the mobile communications device and the supervisory source. Themethod may include enabling the one or more functions in response todetecting the second communication. In one embodiment, the secondcommunication comprises a voice call between the mobile communicationsdevice and the supervisory source that lasts at least a predefinedduration.

The second communication, in a further embodiment, comprises an enableconfirmation from the supervisory source. In one embodiment, the secondcommunication includes a voice call between the mobile communicationsdevice and the supervisory source and the enable confirmation includes acode generated at the supervisory source during the secondcommunication. In another embodiment, the enable confirmation includes atext message from the supervisory source to the mobile communicationsdevice.

The method, in another embodiment, includes establishing an expectedlocation at the supervisory source. In a further embodiment, the methodincludes determining that the expected location matches a currentlocation of the mobile communications device. In one embodiment the oneor more functions are enabled in response to detecting the secondcommunication and a determination that the expected location matches thecurrent location.

In one embodiment, the second communication includes a time-stampedphotograph sent from the mobile communications device to the supervisorysource. The one or more functions, in another embodiment, are enabled inresponse to detecting the second communication and in response toreceiving an enable confirmation from the supervisory source. The enableconfirmation, in one embodiment, is associated with the time-stampedphotograph.

In a further embodiment, the method includes allowing communicationsbetween the mobile communications device and the supervisory sourcewhile the one or more functions are disabled. The method, in anotherembodiment, includes allowing one or more emergency communications fromthe mobile communications device while the one or more functions aredisabled. In one embodiment, the method includes initiating an alertfrom the mobile communications device in response to detecting thefailure to respond to the communication.

The method, in one embodiment, includes waiting a predefined time periodin response to receiving the communication. In a further embodiment,detecting the failure to respond to the communication includes detectinga failure to respond to the communication within the predefined timeperiod.

In another embodiment, the method includes detecting a failure torespond to a predefined number of previous communications from thesupervisory source that were sent to the mobile communications devicefrom the supervisory source prior to the communication. In oneembodiment, the one or more functions of the mobile communicationsdevice are disabled in response to detecting the failure to respond tothe communication and in response to detecting the failure to respond tothe predefined number of previous communications. The method, in afurther embodiment, includes selectively disabling one or more differentfunctions of the mobile communications device in response to detectingthe failure to respond to at least one of the predefined number ofprevious communications. In one embodiment, the method includes enablingthe one or more different functions in response to detecting a secondcommunication.

The mobile communications device, in one embodiment, comprises a mobiletelephone device. In a further embodiment, the supervisory sourceincludes a predefined telephone number and the communication includes avoice call from the predefined telephone number. In another embodiment,the communication includes an email message and/or a text message. Afailure to respond to the communication, in another embodiment, includesa failure to view the communication within a predefined time period. Inone embodiment, the communication comprises a predefined disablecommand. In a further embodiment, the detecting and the disabling areperformed via a network controller.

A computer readable storage medium is also presented to control a mobiledevice. The computer readable storage medium stores computer executableprogram code on a tangible storage device. The computer executableprogram code is executable to perform operations. In one embodiment, theoperations are substantially similar to one or more of the methodembodiments described above.

The operations, in one embodiment, include detecting a failure torespond to a communication. In one embodiment, the communication is sentto a mobile communications device from a supervisory source. In afurther embodiment, the operations include disabling one or morefunctions of the mobile communications device in response to detectingthe failure to respond to the communication.

The operations, in another embodiment, include detecting a secondcommunication between the mobile communications device and thesupervisory source. In one embodiment, the operations include enablingthe one or more functions in response to detecting the secondcommunication.

In one embodiment, the mobile communications device includes a mobiletelephone device. In a further embodiment, the supervisory sourceincludes a predefined telephone number and the communication includes avoice call from the predefined telephone number.

Another method is presented to control a mobile device. In oneembodiment, the method includes detecting a failure to respond to acommunication. The communication is sent to a mobile communicationsdevice from a supervisory source. The method further includes disablingone or more functions of the mobile communications device in response todetecting the failure to respond to the communication. In oneembodiment, the method includes detecting a second communication betweena mobile communications device and the supervisory source. In anotherembodiment, the method includes enabling one or more functions of themobile communications device in response to detecting the secondcommunication.

The method, in one embodiment, includes waiting a predefined time periodin response to receiving the communication. In a further embodiment,detecting the failure to respond to the communication includes detectinga failure to respond to the communication within the predefined timeperiod.

In another embodiment, the method includes detecting a failure torespond to a predefined number of previous communications from thesupervisory source that were sent to the mobile communications devicefrom the supervisory source prior to the communication. In oneembodiment, the one or more functions of the mobile communicationsdevice are disabled in response to detecting the failure to respond tothe communication and in response to detecting the failure to respond tothe predefined number of previous communications. The method, in afurther embodiment, includes selectively disabling one or more differentfunctions of the mobile communications device in response to detectingthe failure to respond to at least one of the predefined number ofprevious communications. In one embodiment, the method includes enablingthe one or more different functions in response to detecting the secondcommunication.

The method, in another embodiment, includes establishing an expectedlocation from the supervisory source. In a further embodiment, themethod includes determining that the expected location matches a currentlocation of the mobile communications device. In one embodiment the oneor more functions are enabled in response to detecting the secondcommunication and a determination that the expected location matches thecurrent location.

In one embodiment, the communication includes a time-stamped photographor live video sent from the mobile communications device to thesupervisory source. The one or more functions, in another embodiment,are enabled in response to detecting the communication and in responseto receiving an enable confirmation from the supervisory source. Theenable confirmation, in one embodiment, is associated with thetime-stamped photograph or live video.

An apparatus to control a mobile device, in one embodiment, includes amobile communications device. The mobile communications device isprovided with a plurality of modules configured to functionally executethe steps of the methods and the operations of the computer readablestorage medium described above. The modules, in one embodiment, includea disable event module, a function disable module, an enable eventmodule, and a function enable module.

In one embodiment, the disable event module is configured to detect afailure to respond to a communication. The communication, in oneembodiment, is sent to the mobile communications device from asupervisory source. The function disable module, in one embodiment, isconfigured to disable one or more functions of the mobile communicationsdevice in response to detecting the failure to respond to thecommunication.

In one embodiment, the enable event module is configured to detect asecond communication between the mobile communications device and thesupervisory source. The function enable module, in one embodiment, isconfigured to enable the one or more functions in response to detectingthe second communication.

In a further embodiment, the mobile communications device includes amobile telephone device. The supervisory source, in another embodiment,includes a predefined telephone number. In one embodiment, thecommunication includes a voice call from the predefined telephonenumber. In yet another embodiment, the supervisory source may includeanother source that is not predefined, but otherwise enables or permitsthe user of the source to by uniquely identified

References throughout this specification to features, advantages, orsimilar language do not imply that all of the features and advantagesmay be realized in any single embodiment. Rather, language referring tothe features and advantages is understood to mean that a specificfeature, advantage, or characteristic is included in at least oneembodiment. Thus, discussion of the features and advantages, and similarlanguage, throughout this specification may, but do not necessarily,refer to the same embodiment.

Furthermore, the described features, advantages, and characteristics ofthe embodiments may be combined in any suitable manner. One skilled inthe relevant art will recognize that the embodiments may be practicedwithout one or more of the specific features or advantages of aparticular embodiment. In other instances, additional features andadvantages may be recognized in certain embodiments that may not bepresent in all embodiments.

These features and advantages of the embodiments will become more fullyapparent from the following description and appended claims, or may belearned by the practice of the embodiments as set forth hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the advantages of the embodiments will be readilyunderstood, a more particular description of the embodiments brieflydescribed above will be rendered by reference to specific embodimentsthat are illustrated in the appended drawings. Understanding that thesedrawings depict only some embodiments and are not therefore to beconsidered to be limiting of scope, the embodiments will be describedand explained with additional specificity and detail through the use ofthe accompanying drawings, in which:

FIG. 1 is a schematic block diagram illustrating one embodiment of asystem for control of a mobile device;

FIG. 2 is a schematic block diagram illustrating one embodiment of acontrol module;

FIG. 3 is a schematic block diagram illustrating another embodiment of acontrol module;

FIG. 4 is a schematic block diagram illustrating a further embodiment ofa control module;

FIG. 5 is a schematic block diagram illustrating one embodiment of amobile communications device;

FIG. 6 is a schematic flow chart diagram illustrating one embodiment ofa method for control of a mobile device;

FIG. 7 is a schematic flow chart diagram illustrating another embodimentof a method for control of a mobile device;

FIG. 8 is a schematic flow chart diagram illustrating another embodimentof a method for control of a mobile device; and

FIG. 9 is a schematic flow chart diagram illustrating a furtherembodiment of a method for control of a mobile device.

DETAILED DESCRIPTION

Many of the functional units described in this specification have beenlabeled as modules, in order to more particularly emphasize theirimplementation independence. Modules may include hardware circuits suchas one or more processors with memory, Very Large Scale Integration(VLSI) circuits, gate arrays, programmable logic, and/or discretecomponents. The hardware circuits may perform logic functions, executecomputer executable programs stored on tangible, non-transitory storagedevices, and/or execute programmed functions. Modules may also include acomputer readable storage medium comprising a computer executableprogram stored on a tangible, non-transitory storage device thatperforms a function when executed by a hardware circuits such as aprocessor, microcontroller, or the like.

Reference throughout this specification to “one embodiment,” “anembodiment,” or similar language means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one embodiment. Thus, appearances of the phrases“in one embodiment,” “in an embodiment,” and similar language throughoutthis specification may, but do not necessarily, all refer to the sameembodiment, but mean “one or more but not all embodiments” unlessexpressly specified otherwise. The terms “including,” “comprising,”“having,” and variations thereof mean “including but not limited to,”unless expressly specified otherwise. An enumerated listing of itemsdoes not imply that any or all of the items are mutually exclusive,unless expressly specified otherwise. The terms “a,” “an,” and “the”also refer to “one or more” unless expressly specified otherwise.

Furthermore, the described features, structures, or characteristics ofthe embodiments may be combined in any suitable manner. In the followingdescription, numerous specific details are provided, such as examples ofprogramming, software modules, user selections, network transactions,database queries, database structures, hardware modules, hardwarecircuits, hardware chips, etc., to provide a thorough understanding ofembodiments. One skilled in the relevant art will recognize, however,that embodiments may be practiced without one or more of the specificdetails, or with other methods, components, materials, and so forth. Inother instances, well-known structures, materials, or operations are notshown or described in detail to avoid obscuring aspects of anembodiment.

FIG. 1 depicts one embodiment of a system 100 for control of a mobilecommunications device 102. In the depicted embodiment, the system 100includes the mobile communications device 102, a control module 104, acommunications network 106, and a supervisory source 108. In general,the system 100, using the control module 104, allows a user at thesupervisory source 108 to control one or more functions of the mobilecommunications device 102 remotely over the communications network 106.For example, in one embodiment, the control module 104 may disableand/or enable certain functions on the mobile communications device 102in response to a communication from the supervisory source 108. By usingthe system 100, for example, an owner of the mobile communicationsdevice 102 that provides the mobile communications device 102 to anotheruser can enforce certain restrictions on the use of the mobilecommunications device 102, encourage the other user to respond tocommunications from the owner, and the like.

In one embodiment, the mobile communications device 102 sends andreceives communications over the communications network 106. In variousembodiments, the mobile communications device 102 may include a mobiletelephone device, a mobile gaming device, a mobile media player device,a mobile computing device, an electronic reader (“e-reader”) device, amobile texting device, a mobile email device, and/or another type ofmobile communications device 102 that is capable of sending andreceiving communications.

The mobile communications device 102, in one embodiment, is capable ofsending and receiving one or more types of communications, such as voicecalls, text messages, emails, binary data packets, and the like.Examples of text messages include short message service (“SMS”)messages, multimedia messaging service (“MMS”) messages, instantmessages (“IM's”), and the like. In a further embodiment, the mobilecommunications device 102 is capable of one or more additionalfunctions, such as media playback, video game functions, softwareapplication execution, Internet browsing, camera functions, globalpositioning system (“GPS”) or other location-based functions, and thelike.

The mobile communications device 102, in one embodiment, may includevarious hardware components to send and receive communications, provideadditional functions, and to interact with a user. For example, in oneembodiment, the mobile communications device 102 may include aprocessor, volatile memory, non-volatile data storage, a transmitter, areceiver, a display screen, a microphone, a speaker, a battery or otherpower source, one or more user input devices, and/or other components.Examples of user input devices, in one embodiment, include buttons,keys, touchscreens, touchpads, dials, rockers, switches, pointingsticks, trackballs, optical pads, scroll wheels, and the like.

In one embodiment, an owner of the mobile communications device 102,such as a parent, an employer, or the like, provides the mobilecommunications device 102 to a user, such as a child, an employee, orthe like. The owner may intend for the user to make use of the mobilecommunications device 102, but may still wish to retain some controlover that use or provide some restrictions on that use. The mobilecommunications device 102, in a further embodiment, may be a children'smobile device designed or adapted specifically for a child's use.

In one embodiment, the control module 104 enables and/or disablesfunctions of the mobile communications device 102 based on one or morecommunications between the mobile communications device 102 and thesupervisory source 108. The control module 104, in one embodiment,resides on the mobile communications device 102. For example, in variousembodiments, the control module 104 may be part of, integrated with, orin communication with a firmware, basic input/output system (“BIOS”),operating system, executable software application, or the like, of themobile communications device 102. In one embodiment, the control module104 may be provided with the mobile communications device 102 by amanufacturer or distributor of the mobile communications device 102. Ina further embodiment, an end user of the mobile communications device102 may install, execute, or otherwise integrate the control module 104with the mobile communications device 102, or, the supervisor, parent,financially responsible, or otherwise responsible party may install thecontrol module 104, or cause it to be installed, on the mobilecommunications device 102. For example, in one embodiment, the controlmodule 104 includes a downloadable software application that can beinstalled on, executed by, or otherwise integrated with the mobilecommunications device 102.

In another embodiment, the control module 104 may reside in thecommunications network 106. For example, in various embodiments, thecontrol module 104 may be part of, integrated with, or in communicationwith a network controller, such as a base station controller, a mobileswitching center, or another network controller capable of enablingand/or disabling one or more functions on the mobile communicationsdevice 102. In a further embodiment, the control module 104 is part of,is integrated with, or is otherwise in communication with a networkcontroller that can block and unblock individual communications to andfrom the mobile communications device 102, either independently or withcooperation from the mobile communications device 102.

The control module 104 is described in greater detail with regard toFIGS. 2, 3, and 4. In general, the control module 104 enables and/ordisables one or more functions of the mobile communications device 102in response to one or more communications between the mobilecommunications device 102 and the supervisory source 108. For example,in one embodiment, the control module 104 disables one or more functionsof the mobile communications device 102 in response to detecting amissed voice call for the mobile communications device 102 from thesupervisory source 108. In the example, in a further embodiment, thecontrol module 104 may enable the one or more disabled functions inresponse to a completed voice call between the mobile communicationsdevice 102 and the supervisory source 108. It should be noted that,unless otherwise stated, as used in this description and in the claimsthe phrase “in response to” should be broadly understood. Thus, itencompasses not only the traditional definitions (e.g., “in reply oranswer to,” “a reaction to a specific stimulus”), but other situationswhen there is some causal link between the two relevant events orconditions, whether direct or indirect, and whether or not there is anymanual intervention.

In one embodiment, the communications network 106 providescommunications between the mobile communications device 102 and thesupervisory source 108. The communications network 106 may be a wirelessnetwork, a wired network, or a combination of both. For example, thecommunications network 106, in one embodiment, may be a cellular orsatellite communications network that interfaces with the publicswitched telephone network (“PSTN”) for communications with differentcommunications networks and with plain old telephone service (“POTS”)communications devices. In a further embodiment, the communicationsnetwork 106 may include a data network such as a wireless and/or wiredlocal area network (“LAN”), wide area network (“WAN”), the Internet, orthe like.

As described relative to the control module 104, in one embodiment, thecommunications network 106 may include the control module 104, forexample, as a network controller such as a base station controller, amobile switching center, a router, a modem, or the like. In oneembodiment, the communications network 106 is capable of blocking andunblocking individual communications to and from the mobilecommunications device 102, either independently or with cooperation fromthe mobile communications device 102.

In one embodiment, the supervisory source 108 includes one or morecommunications devices capable of sending communications to andreceiving communications from the mobile communications device 102. In afurther embodiment, the supervisory source 108 includes one or moresource identifiers associated with one or more communications devices.Examples of a source identifier, in one embodiment, include a telephonenumber, an email address, a hostname, an Internet protocol (“IP”)address, a media access control (“MAC”) address; a user account andpassword, and the like. In various embodiments, the supervisory source108 may be associated with a source identifier, represented by a sourceidentifier, or may actually be a source identifier.

The source identifier, in another embodiment, may include credentials, apassword, a certificate or the like, selected by or associated with theparent, supervisor or other control entity, and the supervisory source108 may thus be any communication device suitable for use by the parent,supervisor or other control entity. The supervisory source 108 thuscould be, by way of example only, a desk telephone located at anemployer's headquarters, a cordless telephone located at the parent'shome, a mobile telephone, a VOIP terminal located at a hotel in avacation destination, etc.

In one embodiment, the control module 104 identifies communications toand from the supervisory source 108 based on a source identifierassociated with the supervisory source 108. In another embodiment, thesupervisory source 108 includes several communications devices and/orseveral source identifiers. In a further embodiment, severalcommunications devices may be associated with a single supervisorysource 108, such as a single telephone number, email address, or thelike. The supervisory source 108, in one embodiment, may be a devicethat is substantially similar to the mobile communications device 102.

In a further embodiment, the supervisory source 108 is owned by, usedby, or otherwise associated with an owner of the mobile communicationsdevice 102, such as a parent, an employer, or the like, that providesthe mobile communications device 102 to another user, such as a child,an employee, or the like for the other user's use. In anotherembodiment, the supervisory source 108 is owned by, used by, orotherwise associated with an entity that the owner of the mobilecommunications device 102 selects, such as a family member, a friend, acoworker, or another trusted or supervisory entity. In one embodiment, auser, such as an owner of the mobile communications device 102, providesa list of one or more supervisory sources 108 to the control module 104,granting some control over functions of the mobile communications device102 to the one or more supervisory sources 108.

FIG. 2 depicts one embodiment of the control module 104. In oneembodiment, the control module 104 is substantially similar to thecontrol module 104 described with regard to FIG. 1. In the depictedembodiment, the control module 104 includes a disable event module 202and a function disable module 204.

The control module 104, in the depicted embodiment, allows a user todisable one or more functions of the mobile communications device 102remotely from the supervisory source 108. In one embodiment, the disableevent module 202 detects a communication sent to the mobilecommunications device 102 from the supervisory source 108. The disableevent module 202, in a further embodiment, detects communications sentto the mobile communications device 102 from a plurality of supervisorysources 108.

The supervisory source 108, in one embodiment, is associated with and/ordefined by a user with control over the mobile communications device102, such as an owner of the mobile communications device 102. In afurther embodiment, the user with control over the mobile communicationsdevice 102 provides the mobile communications device 102 to another userand would like to motivate the other user to respond to communicationsfrom the supervisory source 108. For example, in one embodiment, aparent may provide the mobile communications device 102 to a child, andmay want to encourage the child to respond to voice calls, textmessages, or other communications sent from the parent's telephonenumber. In the example embodiment, the parent may select one or morecommunication devices associated with the parent's telephone number(e.g., one or more home telephones) as the supervisory source 108.

In one embodiment, the disable event module 202 receives a list of oneor more supervisory sources 108 from a user, such as an owner of themobile communications device 102, or the like. In one embodiment, thedisable event module 202 secures the list of one or more supervisorysources 108 such that only an authorized user can edit the list. Forexample, in one embodiment, the disable event module 202 may requirethat a user enter a password or provide other authentication beforeallowing a user to edit the list of supervisory sources 108. Requiringauthentication, in one embodiment, restricts an unauthorized user, suchas a child or employee using the mobile communications device 102, fromtampering with the list of supervisory sources 108 to circumvent remotecontrol of the mobile communications device 102.

In one embodiment, the disable event module 202 determines that thecommunication was sent to the mobile communications device 102 from thesupervisory source 108 based on a source identifier associated with thecommunication. A source identifier, in one embodiment, may include avariety of identifiers such as those described with regard to thesupervisory source 108 of FIG. 1. In a further embodiment, the disableevent module 202 detects that a communication is sent to the mobilecommunications device 102 from the supervisory source 108 by comparing asource identifier associated with a communication to a list of one ormore supervisory sources 108 to determine if the source identifiermatches an identifier on the list.

In one embodiment, the disable event module 202 detects one or morepredefined types of communications from the supervisory source 108. Inone embodiment, the disable event module 202 detects missedcommunications sent to the mobile communications device 102 from thesupervisory source 108. A missed communication, in one embodiment, is acommunication that is received at the mobile communications device 102that a user of the mobile communications device 102 fails to respond to.

A failure to respond to a communication, in one embodiment, includes afailure of a user of the mobile communications device 102 to answer avoice call. In a further embodiment, a failure to respond to acommunication includes a failure of a user to view a text message oremail within a predefined time period. A failure to respond to acommunication, in another embodiment, includes a failure to send aresponse to a text message or email within a predefined time period. Inone embodiment, the disable event module 202 detects a communicationfrom the supervisory source 108 and detects a failure of a user of themobile communications device 102 to respond to the communication.

In a further embodiment, the disable event module 202 detectscommunications from the supervisory source 108 that include a predefineddisable command. The predefined disable command, in one embodiment, is apredefined identifier included in a communication from the supervisorysource 108 that indicates that a user at the supervisory source 108would like to disable one or more functions of the mobile communicationsdevice 102. In one embodiment, the disable event module 202 detects afailure to respond to a communication that includes a predefined disablecommand.

The disable event module 202, in one embodiment, parses communicationsfrom the supervisory source 108 and scans for a predefined disablecommand. For example, in one embodiment, a user at the supervisorysource 108 may include a predefined disable command in the subject orbody of an email or text message to the mobile communications device102, enter a predefined disable command during a voice call with themobile communications device 102, or otherwise send a communication tothe mobile communications device 102 that includes a predefined disablecommand. In one embodiment, a user at the supervisory source 108 mayenter a predefined disable command as a dual-tone multi-frequency(“DTMF”) or touch-tone code during a voice call with the mobilecommunications device 102. In other embodiments, the disable command maybe accomplished using voice commands (e.g., through voice-recognition),gesture-based commands, and data commands entered via a web-basedinterface. In still other embodiments, the disable command may beaccomplished using one or more of the foregoing approaches incombination.

In another embodiment, the disable event module 202 may detectcommunications from the supervisory source 108 that include one or morepredefined disable commands from a group of several predefined disablecommands. For example, in one embodiment, each predefined disablecommand from a group of predefined disable commands corresponds to adifferent function or set of functions of the mobile communicationsdevice 102 that a user at the supervisory source 108 can remotelydisable.

In one embodiment, the function disable module 204 disables one or morefunctions of the mobile communications device 102 in response to thedisable event module 202 detecting the communication from thesupervisory source 108. In a further embodiment, the function disablemodule 204 disables the one or more functions of the mobilecommunications device 102 in response to the disable event module 202detecting a failure to respond to a communication from the supervisorysource 108. In one embodiment, the function disable module 204 disablesthe one or more functions of the mobile communications device 102 inresponse to the disable event module 202 detecting a predefined disablecommand within the communication. The function disable module 204, in afurther embodiment, disables the one or more functions in response tothe disable event module 202 detecting a combination of these events,such as detecting a communication with a predefined disable command anddetecting a failure to respond to the communication, or the like.

The function disable module 204, in one embodiment, disablessubstantially all functions of the mobile communications device 102. Forexample, in one embodiment, the function disable module 204 may disablesubstantially all user-controllable functions of the mobilecommunications device 102 by blocking a user's access to the functions,but continuing to power components of the mobile communications device102 and maintaining a connection to the communications network 106, andthe like. In a further embodiment, the function disable module 204allows communications between the mobile communications device 102 andthe supervisory source 108 while the one or more functions are disabled.In another embodiment, the function disable module 204 allows one ormore emergency communications from the mobile communications device 102while the one or more functions are disabled. Emergency communicationsmay include, for example, 911 calls (or calls to othernationally-recognized emergency numbers in the country of use) and callsto other national, regional or local emergency numbers such as those ofthe state highway patrol, sheriff station, poison control center, etc.

In one embodiment, the function disable module 204 is capable ofdisabling both communication functions and non-communications functionsof the mobile communications device 102. Examples of non-communicationfunctions include media playback, games, executable softwareapplications, and the like. In a further embodiment, the functiondisable module 204 may disable one or more communication functions, suchas voice calls, text messaging, data communications, and the like, whileallowing non-communication functions. For example, in one embodiment,the control module 104 may be integrated with the communications network106, and may disable one or more communications functions of the mobilecommunications device 102, even without cooperation with the mobilecommunications device 102. In a further embodiment, the control module104 may be integrated with the communications network 106 and maycooperate with the mobile communications device 102 to disable bothcommunications functions and non-communications functions.

In a further embodiment, the function disable module 204 selectivelydisables one or more predefined functions of the mobile communicationsdevice 102. For example, in one embodiment, a user at the supervisorysource 108 may include one or more predefined disable commands in acommunication to the mobile communications device 102 and eachpredefined disable command may correspond to a different function or setof functions of the mobile communications device 102 for the functiondisable module 204 to disable. The function disable module 204, in afurther embodiment, may receive a set of functions to disable from thedisable event module 202.

By disabling one or more functions of the mobile communications device102 in response to a communication from the supervisory source 108, thecontrol module 104 provides the supervisory source 108 with the abilityto control aspects of the mobile communications device 102 remotely. Inone embodiment, where the function disable module 204 disables one ormore functions in response to a missed communication, the control module104 may motivate a user of the mobile communications device 102 toaccept communications from the supervisory source 108 in an effort toprevent the function disable module 204 from disabling the one or morefunctions, or in the case of already-missed communications, to respondpromptly so that desired functions will be enabled or restored.

FIG. 3 depicts another embodiment of the control module 104. In oneembodiment, the control module 104 is substantially similar to thecontrol module 104 described with regard to FIG. 1. In the depictedembodiment, the control module 104 includes an enable event module 302and a function enable module 304. In a further embodiment, the controlmodule 104 includes the enable event module 302 and the function enablemodule 304 and may further include the disable event module 202 and thefunction disable module 204. One embodiment of the control module 104that includes the enable event module 302, the function enable module304, the disable event module 202, and the function disable module 204depicted in FIG. 4.

The control module 104, in the depicted embodiment, allows a user toenable or restore one or more disabled functions of the mobilecommunications device 102 remotely from the supervisory source 108. Thedisabled functions, in one embodiment, may include one or more functionsthat the disable event module 202 disabled, as described with regard toFIG. 2. In a further embodiment, the disabled functions may includefunctions that have been disabled in response to a disable event.Examples of disable events, in one embodiment, include the occurrence ofa predefined curfew period, detecting that the mobile communicationsdevice 102 has entered or exited a predefined geographical location orboundary, exceeding a predefined number of allowed voice call minutes,exceeding a predefined number of allowed text messages, or the like.

In one embodiment, the enable event module 302 detects a communicationbetween the mobile communications device 102 and the supervisory source108. In one embodiment, the enable event module 302 detects one or morepredefined types of communications between the mobile communicationsdevice 102 and the supervisory source 108. For example, the enable eventmodule 302, in various embodiments, may be configured to detect voicecalls, text messages, emails, IM's, and/or other communication typesbetween the mobile communications device 102 and the supervisory source108.

In one embodiment, the enable event module 302 detects voice callsbetween the mobile communications device 102 and the supervisory source108 that last at least a predefined duration. In a further embodiment,the enable event module 302 detects communications that include apredefined enable confirmation from the supervisory source 108. Examplesof enable confirmations, in one embodiment, may include a code in thesubject or body of an email or text message to the mobile communicationsdevice 102, a code entered during a voice between the mobilecommunications device 102 and the supervisory source 108, a text messageor email sent from the supervisory source 108 to the mobilecommunications device 102 within a predefined time period after a voicecall, and/or another type of confirmation. In one embodiment, a user atthe supervisory source 108 may enter an enable confirmation code as aDTMF or touch-tone code during a voice call with the mobilecommunications device 102.

In an embodiment where the enable confirmation includes a code in acommunication from the supervisory source 108, the enable event module302, in one embodiment, may parse communications from the supervisorysource 108 and scan the communications for an enable confirmation. In afurther embodiment, an enable confirmation may include one or more codesfrom a group of several enable confirmation codes. Each code from thegroup of enable confirmation codes, in one embodiment, corresponds to adifferent function or set of functions of the mobile communicationsdevice 102 that a user at the supervisory source 108 may enable. Inanother embodiment, the enable confirmation codes may be the same as orsimilar to the codes of the disable command described with regard toFIG. 2. By detecting a communication that includes an enableconfirmation, in one embodiment, the enable event module 302 restricts auser of the mobile communications device 102 from circumventing thecontrol of a user at the supervisory source 108.

In one embodiment, the enable event module 302 detects a communicationfrom the mobile communications device 102 that includes a photograph.The mobile communications device 102, in various embodiments, may sendthe photograph in a text message, email, or other data communication.The photograph, in one embodiment, is a time-stamped photograph. In afurther embodiment, the photograph may be taken by and/or stored on themobile communications device 102. In another embodiment, the enableevent module 302 determines whether the photograph was taken within apredefined time period based on the time-stamp. In a further embodiment,the enable event module 302 may determine whether the photograph wastaken within a predefined time period before the mobile communicationsdevice 102 sends the photograph.

In one embodiment, the enable event module 302 detects a communicationfrom the mobile communications device 102 to the supervisory source 108that includes a photograph and detects an additional communication fromthe supervisory source 108 that includes an enable confirmation. Theenable confirmation, in a further embodiment, may be associated with thephotograph. For example, in one embodiment, an enable confirmation fromthe supervisory source 108 may indicate that a user at the supervisorysource 108, such as a parent, employer, or the like, has reviewed thephotograph and that the photograph indicates that a user of the mobilecommunications device 102 is in compliance with one or more restrictionsset by the user at the supervisory source 108. The user at thesupervisory source 108 may use the photograph to verify locationrestrictions, activity restrictions, and/or other restrictions that arevisually perceptible based on a photograph (e.g., background, otherpersons, absence of bloodshot eyes or flush cheeks, etc.).Alternatively, the communication may provide both voice and videocommunications, and the user at the supervisory source 108 may use thevideo received from the mobile communications device 102 to verifycompliance with the parent, supervisor or other control entity'srestrictions.

In another embodiment, an enable confirmation from the supervisorysource 108 includes an expected location for the mobile communicationsdevice 108. The enable event module 302, in a further embodiment, maydetermine that the expected location matches a current location of themobile communications device 102. Verifying that an expected location ofthe mobile communications device 102 matches the actual current locationof the mobile communications device 102 is discussed in greater detailwith regard to the location verification module 406 of FIG. 4.

The supervisory source 108, in one embodiment, is substantially similarto the supervisory source 108 described with regard to the disable eventmodule 202 of FIG. 2. For example, in one embodiment, the enable eventmodule 302 and the disable event module 202 both detect communicationsbetween the mobile communications device 102 and the same supervisorysource 108 and/or group of supervisory sources 108. In a furtherembodiment, the enable event module 302 detects communications betweenthe mobile communications device 102 and a set of one or moresupervisory sources 108 that is separately defined and independent froma disable event module 202. A communication between the mobilecommunications device 102 and the supervisory source 108, in oneembodiment, may include communications sent from the mobilecommunications device 102 to the supervisory source 108 and/orcommunications sent from the supervisory source 108 to the mobilecommunications device 102.

In the depicted embodiment, the control module 104 does not include thedisable event module 202 and the function disable module 204, and theenable event module 302 detects communications between the mobilecommunications device 102 and the supervisory source 108 independentlyof the disable event module 202 of FIG. 2. In one embodiment, the enableevent module 302 detects communications between the mobilecommunications device 102 and a list of one or more supervisory sources108, such that each supervisory source 108 on the list may enable theone or more disabled functions. In a further embodiment, the controlmodule 104 includes or is otherwise in communication with the disableevent module 202 described with regard to FIG. 2 and the enable eventmodule 302 detects communications between the mobile communicationsdevice 102 and the same supervisory source 108 that the disable eventmodule 202 detected a communication from, requiring the same supervisorysource 108 that disabled the one or more functions to enable the one ormore functions.

For example, in one embodiment, the supervisory source 108 is associatedwith an owner of the mobile communications device 102 that has providedthe mobile communications device 102 to another user to use, such as aparent or employer may do for a child or employee. As described withregard to FIG. 2, in one embodiment, the disable event module 202detects a failure to respond to a communication from the supervisorysource 108, such as a missed voice call or the like, and the functiondisable module 204 disables one or more functions of the mobilecommunications device 102 in response to detecting the failure torespond to the communication. In the example embodiment, the enableevent module 302 may detect a second, successful communication betweenthe supervisory source 108 and the mobile communications device 102.

In a further embodiment, a user, such as an owner of the mobilecommunications device 102 or the like, may define a list of one or moresupervisory sources 108 that may enable disabled functions on the mobilecommunications device 102, and the enable event module 302 detectscommunications between the mobile communications device 102 and each ofthe one or more supervisory sources 108. For example, in one embodiment,a user, such as an owner of the mobile communications device 102, mayallow a family member, a friend, a coworker, and/or one or more othertrusted or supervisory entities to remotely enable one or more functionson the mobile communications device 102, and may define them as a listof supervisory sources 108.

In one embodiment, the enable event module 302 secures the list of oneor more supervisory sources 108 such that only an authorized user mayedit the list. For example, in one embodiment, the enable event module302 may request that a user enter a password or provide otherauthentication before allowing the user to edit the list of supervisorysources 108. By securing the list of supervisory sources 108, in oneembodiment, the enable event module 302 restricts an unauthorized userfrom tampering with the list of supervisory sources 108 to circumventremote control of the mobile communications device 102.

In one embodiment, the enable event module 302 determines that thecommunication was sent between the mobile communications device 102 andthe supervisory source 108 based on a source identifier associated withthe communication. A source identifier, in one embodiment, may include avariety of identifiers as described with regard to the supervisorysource 108 of FIG. 1. In a further embodiment, the enable event module302 detects that a communication is sent between the mobilecommunications device 102 and the supervisory source 108 by comparing asource identifier associated with a communication to a list of one ormore supervisory sources 108 to determine if the source identifiermatches an identifier on the list.

In one embodiment, the function enable module 304 enables one or morefunctions in response to the enable event module 302 detecting acommunication between the mobile communications device 102 and thesupervisory source 108. In a further embodiment, the function enablemodule 304 enables the one or more functions of the mobilecommunications device 102 in response to the enable event module 302detecting an enable confirmation from the supervisory source 108.

The function enable module 304, in one embodiment, enables substantiallyall disabled functions of the mobile communications device 102. In afurther embodiment, the function enable module 304 selectively enables asubset of disabled functions of the mobile communications device 102.For example, in one embodiment, a user at the supervisory source 108 mayinclude one or more predefined enable confirmation codes in acommunication to the mobile communications device 102 and eachpredefined enable confirmation code may correspond to a differentfunction or set of functions of the mobile communications device 102 forthe function enable module 304 to enable. The function enable module304, in a further embodiment, may receive a set of functions to enablefrom the enable event module 302.

In one embodiment, the function enable module 304 temporarily enablesthe one or more functions and disables the one or more functions inresponse to the occurrence of an event. For example, in variousembodiments, the function enable module 304 may disable the one or morefunctions in response to a predefined time period ending, the occurrenceof a predefined curfew period, detecting that the mobile communicationsdevice 102 has entered or exited a predefined geographical location orboundary, exceeding a predefined number of allowed voice call minutes,exceeding a predefined number of allowed text messages, or the like.

FIG. 4 depicts a further embodiment of the control module 104. In thedepicted embodiment, the control module 104 includes the disable eventmodule 202, the function disable module 204, the enable event module302, and the function enable module 304, substantially as described withregard to FIGS. 2 and 3. The control module 104, in the depictedembodiment, further includes a settings module 402, ananti-circumvention module 404, a location verification module 406, anallowed sources module 408, an emergency module 410, and an alert module412.

Conveniently, in some embodiments, the parent, supervisor or othercontrol entity may optionally customize the manner of operation of thecontrol module 104 or other elements of the embodiments using thesettings module 402. The settings module 402, in one embodiment, mayreceive the one or more settings as user input to the mobilecommunications device 102. In a further embodiment, the settings module402 may receive the one or more settings as user input to a web page, anetwork connected software application, or the like that is incommunication with the control module 104. For example, in oneembodiment, a user may provide one or more settings by logging in to auser account associated with the communications network 106. A userinterface may be provided to the parent, supervisor or other controlentity with check-lists, drop-down menus or other suitable selectionoptions to select or otherwise customize features using parameters suchas, for example, the following:

Source Identifier Settings: These settings may include a selection ofsource identifiers such as a telephone number, email address, hostname,Internet protocol (“IP”) address, media access control (“MAC”) address;or user account and password.

Supervisory Sources: These settings may include a set of one or moresupervisory sources 108 for the disable event module 202 and/or theenable event module 302. These settings, in a further embodiment, mayinclude a set of supervisory sources 108 for the allowed sources module408.

Disable Criteria: These settings provide options such as whether theuser of the mobile communications device 102 will receive any leewaybefore the control module 104 begins to disable functions.

Functions to Disable: These settings may include a selection offunctions and/or sets of functions for the function disable module 204to disable.

Order of Disabling: These settings provide options for setting the orderin which functions may be disabled (e.g., in a progressive disablingmode, described below).

Emergency Module Functions. These settings provide options for settingthe emergency numbers for the emergency module 410.

Alerts: These settings may include a selection of an alert and/or typeof alert for the alert module 412.

Enable/Restore Criteria. These settings provide options for the mannerin which functions may be enabled or restored.

Enable/Restore Options. These settings may include a selection offunctions and/or sets of functions for the function enable module 304 toenable.

Control Code Options: These settings may include a selection of one ormore codes, passwords, or the like. The one or more codes, passwords, orthe like may be used by one or more modules for authentication purposes,used as disable commands, used as enable confirmation codes, and thelike. In one embodiment, the settings module 402 may require that a userenter a password or provide other authentication before allowing a userto provide, view, and/or edit the one or more settings. By requiringauthentication, the settings module 402, in one embodiment, restricts anunauthorized user from tampering with the one or more settings tocircumvent remote control of the mobile communications device 102.

In one embodiment, the anti-circumvention module 404 restricts a user ofthe mobile communications device 102 from circumventing control measurestaken by a user at the supervisory source 108. In one embodiment, theanti-circumvention module 404 may be integrated with the enable eventmodule 302, the function enable module 304, and/or the settings module402.

In one embodiment, where the enable event module 302 detects a voicecall between the mobile communications device 102 and the supervisorysource 108, the anti-circumvention module 404 requires that the voicecall last at least a predefined duration before the function enablemodule 304 enables one or more functions. In a further embodiment, theanti-circumvention module 404 may require that a voice call is connectedbetween the mobile communications device 102 and the supervisory source108 and/or that voice communications occur between the mobilecommunications device 102 and the supervisory source 108 before thefunction enable module 304 enables one or more functions.

In a further embodiment, the anti-circumvention module 404 requires thatthe enable event module 302 detect an enable confirmation from thesupervisory source 108 before the function enable module 304 enables oneor more functions. For example, the anti-circumvention module 404, invarious embodiments, may require that the enable event module 302 detecta communication between the mobile communications device 102 and thesupervisory source 108 that includes one or more predefined enableconfirmation codes, that the enable event module 302 detect aconfirmation text message or email sent from the supervisory source 108to the mobile communications device 102, and/or another enableconfirmation from the supervisory source 108.

In a further embodiment, the anti-circumvention module 404 restricts theuser of the mobile communications device 102 from disabling one or morenetwork connections. In this manner, the anti-circumvention module 404restricts the user of the mobile communications device 102 from avoidingcommunications from the supervisory source 108, whether initialcommunications that require a response (such as the acceptance of aphone call from a parent, supervisor or other control entity), orfunction-disabling communications following a failure to respond to aprevious communication.

In one embodiment, the location verification module 406 confirms that auser at the supervisory source 108 has knowledge of the actual locationof the mobile communications device 102. The location verificationmodule 406, in one embodiment, detects the location of the mobilecommunications device 102 using GPS or other location detection hardwareintegrated with the mobile communications device 102. In a furtherembodiment, the location verification module 406 detects the location ofthe mobile communications device 102 based on the location of one ormore base stations in the communications network 106 that the mobilecommunications device 102 communicates with. In one embodiment, thelocation verification module 406 displays a detected location of themobile communications device 102 to a user at the supervisory source108. In a further embodiment, the location verification module 406 maysend a time-stamped photograph from the mobile communications device 102to the supervisory source 108.

In another embodiment, the location verification module 406 receives anexpected location of the mobile communications device 102 from a user atthe supervisory source 108. The location verification module 406, in oneembodiment, may receive the expected location as an address, a city, azip code, latitude and longitude coordinates, a selection on a map, aname of a landmark or business, and/or the like. In a furtherembodiment, the location verification module 406 may receive theexpected location as an enable confirmation indicating that a currentlocation and/or photograph that the location verification module 406sent to the supervisory source 108 matches an expected location. Thelocation verification module 406, in a further embodiment, may determinewhether the expected location matches an actual current location of themobile communications device 102. In one embodiment, the function enablemodule 304 enables the one or more functions in response to the locationverification module 406 determining that the expected location matchesthe current location of the mobile communications device 102 and doesnot enable the one or more functions if they do not match.

In one embodiment, the allowed sources module 408 allows communicationsbetween the mobile communications device 102 and one or more supervisorysources 108 while one or more functions of the mobile communicationsdevice 102 are disabled. In one embodiment, the allowed sources module408 allows communications between the mobile communications device 102and the supervisory source 108 that caused the one or more functions ofthe mobile communications device 102 to be disabled. In a furtherembodiment, the allowed sources module 408 allows communications betweenthe mobile communications device 102 and a set of supervisory sources108.

In one embodiment, the allowed sources module 408 restricts the functiondisable module 204 from disabling communications between the mobilecommunications device 102 and one or more supervisory sources 108. In afurther embodiment, the function disable module 204 disablescommunications between the mobile communications device 102 and one ormore supervisory sources 108 and the allowed sources module 408 bypassesthe disabling, allowing communications between the mobile communicationsdevice 102 and the one or more supervisory sources 108. In anotherembodiment, the allowed sources module 408 may allow communications ofone or more predefined types between the mobile communications device102 and one or more supervisory sources 108, but allow the functiondisable module 204 to disable one or more other types of communications.

In one embodiment, the emergency module 410 allows one or more emergencycommunications from the mobile communications device 102 while the oneor more functions are disabled. In one embodiment, the emergency module410 restricts the function disable module 204 from disabling one or moretypes of emergency communications from the mobile communications device102. In a further embodiment, the function disable module 204 disablesemergency communications from the mobile communications device 102 andthe emergency module 410 bypasses the disabling, allowing one or moreemergency communications to be sent from the mobile communicationsdevice 102.

In one embodiment, the alert module 412 initiates an alert from themobile communications device 102 in response to the disable event module202 detecting the communication from the supervisory source 108. Thealert, in one embodiment, may include a visual alert on a screen of themobile communications device 102. The alert, in a further embodiment,may include an audible alert from a speaker of the mobile communicationsdevice 102. The alert, in one embodiment, may inform a user of themobile communications device 102 that one or more functions have beendisabled. In a further embodiment, the alert may remind a user of one ormore actions to take to enable the one or more functions. The alert, inanother embodiment, may provide motivation for a user to enable the oneor more functions. For example, in one embodiment, the alert may beselected to provide an annoyance or an embarrassment to a user tomotivate the user to return a missed communication from the supervisorysource 108.

FIG. 5 depicts one embodiment 500 of the mobile communications device102. In the depicted embodiment 500, the mobile communications device102 includes an alert 502, an allowed communication element 504, and anemergency communication element 506. The mobile communications device102, in the depicted embodiment 500, displays the alert 502, the allowedcommunication element 504, and the emergency communication element 506to the user on a screen of the mobile communications device 102. In oneembodiment, a parent provides the mobile communications device 102 to achild for the child's use, and “Home” represents a supervisory source108 associated with the parent, such as a telephone number of the parentor the like.

In one embodiment, the alert module 412 initiates the alert 502. Thealert 502, in the depicted embodiment 500, includes a graphical elementthat visually indicates to a user of the mobile communications device102 that the user missed a call from “Home” and that one or morefunctions of the mobile communications device 102 have been disabled or“locked.” In the depicted embodiment 500, “Home” represents asupervisory source 108 for the mobile communications device 102. In afurther embodiment, the alert 502 may include an audible alert from aspeaker of the mobile communications device 102, or the like.

In the depicted embodiment 500, the allowed communication element 504includes a graphical element provided by the allowed sources module 408that allows communications between the mobile communications device 102and one or more supervisory sources 108 while one or more functions ofthe mobile communications device 102 are disabled. The allowedcommunication element 504, in the depicted embodiment 500, allows a userof the mobile communications device 102 to “Call Home,” meaning that theallowed sources module 408 allows a voice call from the mobilecommunications device 102 to “Home,” the supervisory source 108 of thedepicted embodiment 500.

In the depicted embodiment 500, the emergency communication element 506includes a graphical element provided by the emergency module 410 thatallows one or more emergency communications from the mobilecommunications device 102 while the one or more functions are disabled.The emergency communication element 506, in one embodiment, facilitatesan emergency voice call to a predefined emergency number, regardless ofwhat functions are disabled on the mobile communications device 102.

In one embodiment, the disable event module 202 detects a communicationsent to the mobile communications device 102 from a supervisory source108. In the depicted embodiment 500, the supervisory source 108 is“Home” and the communication is a voice call. In a further embodiment,the disable event module 202 detects a failure to respond to thecommunication. In the depicted embodiment 500, a user of the mobilecommunications device 102 misses the call from “Home.” The functiondisable module 204, in one embodiment, disables one or more functions ofthe mobile communications device 102 in response to the disable eventmodule 202 detecting the communication and/or detecting a failure torespond to the communication. In the depicted embodiment 500, the alertmodule 412 initiates the alert 502 from the mobile communications device102 in response to the disable event module 202 detecting thecommunication and/or detecting a failure to respond to thecommunication. In the depicted embodiment 500, substantially all userfunctions of the mobile communications device 102 other than a voicecall to the supervisory source 108 and emergency communications aredisabled.

In one embodiment, in response to the enable event module 302 detectinga second communication between the mobile communications device 102 andthe supervisory source 108, the function enable module 304 enables theone or more disabled functions. For example, in the depicted embodiment500, the enable event module 302 may detect a voice call to “Home,” thesupervisory source 108, using the allowed communication element 504 andthe function enable module 304 may enable the one or more disabledfunctions on the mobile communications device 102. In a furtherembodiment, the anti-circumvention module 404 may determine that a voicecall between the mobile communications device 102 and the supervisorysource 108 lasts at least a predefined duration, that the communicationincludes an enable confirmation from the supervisory source 108, or thelike before the function enable module 304 enables the one or moredisabled functions.

In one or more embodiments, it may be desirable to provide the end-userof the mobile communications device some leeway before any functions ofhis or her mobile communications device are disabled in response to afailure to respond to a communication from the supervisory source 108.The disable event module 202, in one embodiment, may wait for apredefined time period upon receiving a communication from thesupervisory source 108 before detecting a failure to respond to thecommunication. For example, there may be circumstances when the mobilecommunications device 102 is out of network communications range orotherwise not receiving network communications through no fault of itsuser. In such case, the control module 104 may enter a wait mode, anddisable one or more functions of the mobile communications device 102only after some predefined time period has elapsed once the mobilecommunications device 102 begins receiving network communications again,such that the child or other user of the mobile communications device102 may have an opportunity to respond to the communication from thesupervisory source 108.

Leeway may also be provided by permitting the occurrence of one or morefailures to respond to communications from the supervisory source 108before the control module 104 disables one or more functions of themobile communications device 102. In one embodiment, the disable eventmodule 202 may detect a failure to respond to a predefined number ofprevious communications from the supervisory source 108 before thefunction disable module 204 disables one or more functions of the mobilecommunications device 102. For example, a parent may decide that his orher child should be given a second chance to respond to his or hercommunication on a given evening, in which case the control module 104may disable one or more functions of the mobile communications device102 in response to the child's second failure to respond on thatevening.

In still other embodiments, the functions of the mobile communicationsdevice 102 may be disabled in a progressive manner. The function disablemodule 204, in one embodiment, may disable a different set of functionsfor each successive failure to respond to a communication from thesupervisory source 108. For example, in response to a first failure torespond to a communication from the supervisory source 108, the controlmodule 104 may disable all video game functions of the mobilecommunications device 102; in response to a second failure to respond toa communication from the supervisory source 108, the control module 104may disable all multi-media (e.g., music and video playback) functionsof the mobile communications device 102; in response to a third failureto respond to a communication from the supervisory source 108, thecontrol module 104 may disable all text messaging and remainingnon-emergency functions of the mobile communications device 102. Aparent may be aware of his or her child's preferred functions, andchoose to disable the most preferred functions only after giving thechild a second or third chance to respond. In this manner, particularembodiments may be tailored to a particular user of the mobilecommunications device 102.

The schematic flow chart diagrams that follow are generally set forth aslogical flow chart diagrams. As such, the depicted order and labeledsteps are indicative of one embodiment of the presented method. Othersteps and methods may be conceived that are equivalent in function,logic, or effect to one or more steps, or portions thereof, of theillustrated method.

Additionally, the format and symbols employed are provided to explainthe logical steps of the method and are understood not to limit thescope of the method. Although various arrow types and line types may beemployed in the flow chart diagrams, they are understood not to limitthe scope of the corresponding method. Indeed, some arrows or otherconnectors may be used to indicate only the logical flow of the method.For instance, an arrow may indicate a waiting or monitoring period ofunspecified duration between enumerated steps of the depicted method.Additionally, the order in which a particular method occurs may or maynot strictly adhere to the order of the corresponding steps shown.

The methods described relative to the following schematic flow chartdiagrams substantially include the steps to carry out the functionspresented above with respect to the operation of the described apparatusand system of FIGS. 1, 2, 3, 4, and 5. In one embodiment, one or more ofthe methods are implemented with a computer readable storage mediumstoring computer executable program code on a tangible storage device.The computer readable storage medium may be integrated into a computingsystem, such as the mobile communications device 102, a networkcontroller of the communications network 106, or the like, wherein thecomputer readable program executed by the computing system performs oneor more of the methods.

FIG. 6 depicts one embodiment of a method 600 for control of a mobiledevice. In the depicted embodiment, the method 600 begins, and thedisable event module 202 detects 602 whether a communication has beensent to the mobile communications device 102 from a supervisory source108. As described with regard to the disable event module 202, in oneembodiment, the communication that the disable event module 202 detects602 may be a predefined type of communication, such as a communicationthat is not responded to, a communication that includes a disablecommand, and/or has other predefined characteristics.

If the disable event module 202 does not detect 602 a communication sentto the mobile communications device 102 from a supervisory source 108,in the depicted embodiment, the disable event module 202 continuesdetecting 602 communications from a supervisory source 108. If thedisable event module 202, in the depicted embodiment, detects 602 that acommunication has been sent to the mobile communications device 102 froma supervisory source 108, the function disable module 204 disables 604one or more functions of the mobile communications device 102 and themethod 600 ends.

FIG. 7 depicts one embodiment of a method 700 for control of a mobiledevice. In the depicted embodiment, the method 700 begins, and theenable event module 302 detects 702 whether there has been acommunication between the mobile communications device 102 and asupervisory source 108. As described with regard to theanti-circumvention module 404, in one embodiment, the communication thatthe enable event module 302 detects 702 may include a voice call lastingat least a predefined duration, a communication that includes an enableconfirmation, or the like.

If the enable event module 302 does not detect 702 a communicationbetween the mobile communications device 102 and a supervisory source108, in the depicted embodiment, the enable event module 302 continuesdetecting 702 communications between the mobile communications device102 and a supervisory source 108. If the enable event module 302, in thedepicted embodiment, detects 702 a communication between the mobilecommunications device 102 and a supervisory source 108, the functionenable module 304 enables 704 one or more functions of the mobilecommunications device 102 and the method 700 ends.

FIG. 8 depicts one embodiment of a method 800 for control of a mobiledevice. In the depicted embodiment, the method 800 begins, and thedisable event module 202 detects 802 whether a communication has beensent to the mobile communications device 102 from a supervisory source108. In one embodiment, the communication that the disable event module202 detects 802 may be a predefined type of communication, such as acommunication that is not responded to, a communication that includes adisable command, and/or has other predefined characteristics.

If the disable event module 202 does not detect 802 a communication sentto the mobile communications device 102 from a supervisory source 108,in the depicted embodiment, the disable event module 202 continuesdetecting 802 communications from a supervisory source 108. If thedisable event module 202, in the depicted embodiment, detects 802 that acommunication has been sent to the mobile communications device 102 froma supervisory source 108, the function disable module 204 disables 804one or more functions of the mobile communications device 102.

In the depicted embodiment, the enable event module 302 detects 806whether there has been a communication between the mobile communicationsdevice 102 and a supervisory source 108. In one embodiment, thecommunication that the enable event module 302 detects 806 may include avoice call lasting at least a predefined duration, a communication thatincludes an enable confirmation, or the like. In one embodiment, thecommunication that the enable event module 302 detects 806 is acommunication between the mobile communications device 102 and the samesupervisory source 108 from which the disable event module 202 detects802 a communication.

If the enable event module 302 does not detect 806 a communicationbetween the mobile communications device 102 and a supervisory source108, in the depicted embodiment, the enable event module 302 continuesdetecting 806 communications between the mobile communications device102 and a supervisory source 108. If the enable event module 302, in thedepicted embodiment, detects 806 a communication between the mobilecommunications device 102 and a supervisory source 108, the functionenable module 304 enables 808 one or more functions of the mobilecommunications device 102 and the method 700 ends. In one embodiment,the function enable module 304 enables 808 the same set of one or morefunctions that the function disable module 204 disables 804.

FIG. 9 depicts one embodiment of a method 900 for control of a mobiledevice. In the depicted embodiment, the method 900 begins, and thedisable event module 202 detects 902 a failure to respond to acommunication. The communication, in one embodiment, was sent to themobile communications device 102 from a supervisory source 108. Inanother embodiment, the disable event module 202 detects 902 a failureto respond to a predefined number of communications from the supervisorysource 108. In one embodiment, the disable event module 202 waits apredefined time period upon receiving the communication and detects 902a failure to respond to a communication within the predefined timeperiod.

If the disable event module 202 does not detect 902 a failure to respondto a communication sent to the mobile communications device 102 from asupervisory source 108, in the depicted embodiment, the disable eventmodule 202 continues detecting 902 failures to respond to communicationsfrom a supervisory source 108. If the disable event module 202, in thedepicted embodiment, detects 902 a failure to respond to a communicationsent to the mobile communications device 102 from a supervisory source108, the function disable module 204 disables 904 one or more functionsof the mobile communications device 102. In a further embodiment, thefunction disable module 204 progressively disables 904 a different setof one or more functions of the mobile communications device 102 foreach successive failure to respond to a communication that the disableevent module 202 detects 902. The alert module 412, in the depictedembodiment, initiates 906 an alert from the mobile communications device102.

In response to a subsequent communication to or from the mobilecommunications device 102, in the depicted embodiment, the allowedsources module 408 and the emergency module 410 determine 908 whetherthe subsequent communication is an allowed communication between themobile communications device 102 and a supervisory source 108 or anemergency communication. If the allowed sources module 408 and theemergency module 410 determine 908 that the subsequent communication isnot an allowed communication or an emergency communication, in thedepicted embodiment, the function disable module 204 directly orindirectly blocks 910 the subsequent communication.

In the depicted embodiment, if the allowed sources module 408 and theemergency module 410 determine 908 that the subsequent communication isan allowed communication or an emergency communication, the subsequentcommunication is allowed, and the enable event module 302 detects 912whether the subsequent communication is between the mobilecommunications device 102 and a supervisory source 108. In oneembodiment, the communication that the enable event module 302 detects912 is a communication between the mobile communications device 102 andthe same supervisory source 108 from which the disable event module 202detects 902 a communication.

If the enable event module 302 does not detect 912 that the subsequentcommunication is between the mobile communications device 102 and asupervisory source 108, in the depicted embodiment, the allowed sourcesmodule 408 and the emergency module 410 continue to determine 908whether subsequent communications are allowed communications oremergency communications. If the enable event module 302, in thedepicted embodiment, detects 912 that the subsequent communication isbetween the mobile communications device 102 and a supervisory source108, the anti-circumvention module 404 determines 914 whether thesubsequent communication includes an enable confirmation and thelocation verification module 406 determines 914 whether an expectedlocation of the mobile communications device 102 matches an actualcurrent location of the mobile communications device 102.

If the anti-circumvention module 404 and/or the location verificationmodule 406 make a negative determination 914, in the depictedembodiment, the allowed sources module 408 and the emergency module 410continue to determine 908 whether subsequent communications are allowedcommunications or emergency communications. If the anti-circumventionmodule 404 and the location verification module 406 make positivedeterminations 914, in the depicted embodiment, the function enablemodule 304 enables 916 the one or more functions of the mobilecommunications device 102. In one embodiment, the function enable module304 enables 916 the same set of one or more functions that the functiondisable module 204 disabled 904. In a further embodiment, the functionenable module 304 enables 916 several different sets of functions thatthe function disable module 204 has disabled. In the depictedembodiment, the method 900 returns to the detection step 902, and thedisable event module 202 continues to detect 902 failures to respond tocommunications sent to the mobile communications device 102 from asupervisory source 108.

Embodiments may be practiced in other specific forms. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by the foregoing description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

What is claimed is:
 1. A method comprising: selectively disabling, by use of a processor, one or more functions of a mobile communications device in response to detecting a failure to respond to a communication sent to the mobile communication device from a supervisory source; and enabling, by use of the processor, the one or more functions in response to detecting a second communication between the mobile communications device and the supervisory source.
 2. The method of claim 1, further comprising, receiving an expected location from the supervisory source; determining that the expected location matches a current location of the mobile communications device, wherein the one or more functions are enabled in response to detecting the second communication and a determination that the expected location matches the current location.
 3. The method of claim 1, wherein the second communication comprises a time-stamped photograph sent from the mobile communications device to the supervisory source and further wherein the one or more functions are enabled in response to detecting the second communication and in response to receiving an enable confirmation from the supervisory source.
 4. The method of claim 1, further comprising allowing one or more emergency communications from the mobile communications device while the one or more functions are disabled.
 5. The method of claim 1, further comprising initiating an alert from the mobile communications device in response to detecting the failure to respond to the communication.
 6. The method of claim 1, wherein the mobile communications device comprises a mobile telephone device, the supervisory source comprises a predefined telephone number, and the communication comprises a voice call from the predefined telephone number.
 7. The method of claim 1, further comprising detecting a failure to respond to a predefined number of previous communications from the supervisory source, the number of previous communications sent to the mobile communications device from the supervisory source prior to the communication, wherein the one or more functions of the mobile communications device are disabled in response to detecting the failure to respond to the communication and further in response to detecting the failure to respond to the predefined number of previous communications.
 8. The method of claim 1, further comprising waiting a predefined time period in response to receiving the communication, wherein detecting the failure to respond to the communication comprises detecting a failure to respond to the communication within the predefined time period.
 9. The method of claim 1, further comprising allowing communications between the mobile communications device and the supervisory source while the one or more functions are disabled.
 10. The method of claim 1, wherein the second communication comprises a voice call between the mobile communications device and the supervisory source, the voice call lasting at least a predefined duration.
 11. The method of claim 1, wherein the second communication comprises an enable confirmation from the supervisory source.
 12. The method of claim 11, wherein the enable communication comprises a code entered from the supervisory source during the second communication, the second communication comprising a voice call between the mobile communications device and the supervisory source.
 13. The method of claim 11, wherein the enable confirmation comprises a text message from the supervisory source to the mobile communications device.
 14. The method of claim 1, wherein the communication is selected from the group consisting of an email message and a text message.
 15. The method of claim 14, wherein a failure to respond to the communication comprises a failure to view the communication within a predefined time period.
 16. The method of claim 14, wherein the communication comprises a predefined disable command.
 17. A method comprising: producing computer executable program code; providing the computer executable program code to be deployed to a non-transitory computer readable storage medium and executed on a computer system, the computer executable program code performing: selectively disabling one or more functions of a mobile communications device in response to detecting a failure to respond to a communication sent to the mobile communication device from a supervisory source; and enabling, by use of the processor, the one or more functions in response to detecting a second communication between the mobile communications device and the supervisory source.
 18. The method of claim 17, wherein the second communication comprises a voice call between the mobile communications device and the supervisory source, the voice call lasting at least a predefined duration.
 19. An apparatus comprising: a first processor; a non-transitory computer readable storage medium storing computer executable program code executable by a second processor, the computer executable program code performing: selectively disabling one or more functions of a mobile communications device in response to detecting a failure to respond to a communication sent to the mobile communication device from a supervisory source; and enabling, by use of the processor, the one or more functions in response to detecting a second communication between the mobile communications device and the supervisory source.
 20. The apparatus of claim 19, wherein the second communication comprises a voice call between the mobile communications device and the supervisory source, the voice call lasting at least a predefined duration. 