System and method for controlling communication device use

ABSTRACT

A computer implemented method is provided including establishing a value corresponding to a particular user of a device, receiving an indication of a triggering condition of the particular user of the device, the triggering condition being enabled by the device or measurable by the device, and determining the triggering condition has been met by the user via the device. The method further includes modifying the value responsive to determining the triggering condition has been met, determining when the value crosses a particular threshold, and disabling an application or a functional component of the device responsive to the value crossing the particular threshold. A system for implementing the method is also provided.

BACKGROUND

With the advent of smartphones, laptops, tablets and other portableelectronic devices, a child may now have un-tethered access to theInternet, various communication protocols (e.g. phone, video phone,email, text chatting, and text messaging) and a wide variety of digitalentertainment. However, such devices may serve as a distraction whichprevents a child from behaving responsibly. Parents are keen to keep aneye on their children's behavior including communication, travel andwhat media and information their children are exposed to. Further,parents may want to limit the amount of time their children spendexploring and consuming various electronic media (e.g. television andInternet content).

SUMMARY

This Summary introduces simplified concepts that are further describedbelow in the Detailed Description of Illustrative Embodiments. ThisSummary is not intended to identify key features or essential featuresof the claimed subject matter and is not intended to be used to limitthe scope of the claimed subject matter.

A computer implemented method of controlling device use is provided. Themethod includes receiving from a first user an indication of a scheduleof required check-in communications, the schedule corresponding to asecond user. The method further includes determining when a check-incommunication has been initiated by the second user pursuant to theschedule, and disabling at least one of an application and a functionalcomponent of a device corresponding to the second user responsive todetermining at least one check-in communication has not been receivedpursuant to the schedule.

Another computer implemented method of controlling device use isprovided. The method includes receiving from a first user an indicationof a required state of a device corresponding to a second user. Themethod further includes determining a current state of the devicecorresponding to the second user, and disabling at least one of anapplication and a functional component of the device responsive to thecurrent state being inconsistent with the required state.

Another computer implemented method of controlling device use isprovided. The method includes receiving from a first user an indicationof a maximum allowed use of at least one device corresponding to asecond user. The method further includes determining amount of use ofthe at least one device corresponding to the second user, and disablingat least one of an application and a functional component of the atleast one device responsive to the at least one of the determined amountof use being greater than the indicated maximum allowed use.

Another computer implemented method of controlling device use isprovided. The method includes receiving an indication from a first userof a geographic area and receiving an indication from the first user ofa schedule corresponding to at least one time at which a second user isrequired to be present at the geographic area. The method furtherincludes receiving location information of a device corresponding to thesecond user, determining whether the location information indicates thatthe second user is present at the geographic area at the at least onetime, and disabling at least one of an application and a functionalcomponent of the device responsive to determining that the second useris not present at the geographic area at the at least one time.

Another computer implemented method of controlling device use isprovided. The method includes establishing a value corresponding to aparticular user of a device, receiving an indication of at least onetriggering condition of the particular user corresponding to the device,the at least one triggering condition being at least one of enabled bythe device and measurable by the device, and determining the at leastone triggering condition has been met by the user via the device. Themethod further includes modifying the value responsive to determiningthe at least one triggering condition has been met, determining when thevalue crosses a particular threshold, and disabling at least one of anapplication and a functional component of the device responsive to thevalue crossing the particular threshold.

BRIEF DESCRIPTION OF THE DRAWING(S)

A more detailed understanding may be had from the following description,given by way of example with the accompanying drawings. The Figures inthe drawings and the detailed description are examples. The Figures andthe detailed description are not to be considered limiting and otherexamples are possible. Like reference numerals in the Figures indicatelike elements wherein:

FIG. 1 shows a system for controlling use of a mobile device.

FIGS. 2-6 are diagrams showing methods for controlling use of a mobiledevice.

FIGS. 7A-7G show example screen displays enabled by the system of FIG.1.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENT(S)

Embodiments are described below with reference to the drawing figureswhere like numerals represent like elements throughout.

Referring to FIG. 1, a system 10 is provided including a monitoringmanager 20 used for controlling use of a monitored device 12. Themonitoring manager 20 includes an enablement engine 22, a mapping engine24, an overseeing user application 28, a monitoring application programinterface (“API”) 32, a user datastore 34, a contributor applicationprogram interface (“API”) 36, and a carrier integration application 38.The monitoring manager 20 can be implemented on one or morenetwork-connectable computing systems and need not be implemented on asingle system at a single location. The monitoring manager 20 isconfigured for communication via a network 40 with othernetwork-connectable computing systems including one or more devices 12(“monitored devices”) corresponding to a monitored user and clientdevices 16 corresponding to a user who configures the monitoring manager20. Alternatively, the monitoring manager 20 or one or more componentsthereof can be executed on the monitored device 12 or other system. Theoverseeing user application 28 includes a web application or otherapplication enabled by the monitoring manager 20 and accessible to aclient device 16 via a network and/or installed and executed on a clientdevice 16.

The network 40 can include one or more wired or wireless networks,including for example the internet and wireless carrier systems. Themonitored device 12, and the client devices 16 can include for example asmartphone, laptop computer or other wired or wireless terminalpreferably configured to operate on a wired or wirelesstelecommunication network. The operation of the monitoring manager 20 isdescribed herein with respect to the devices 12, 16. One skilled in theart will recognize that the monitoring manager 20 can operate with othersuitable wired or wireless network-connectable computing systems.

Software and/or hardware residing on a monitored device 12 enables amonitoring agent 13 in the form of a client application which canprovide device location information and device use information to themonitoring manager 20 via the monitoring API 32. In addition tocomponents enabling data processing and wireless communication, themonitored device 12 includes a location determination system (“LDS”) 15,such as a global positioning system (“GPS”) receiver, from which themonitoring agent 13 gathers data used for determining location of themonitored device 12. A monitored user operates the monitored device 12with the monitoring agent 13 active.

Referring to FIG. 2, a method 100 for controlling communication deviceuse is shown. The method 100 is described with reference to thecomponents shown in the system 10 of FIG. 1, including the monitoringmanager 20 and monitoring agent 13, which are preferably configured forperforming the method 100 and include or have access to suitablenon-transitory data storage including instructions for performing themethod 100. The method 100 may alternatively be performed by themonitoring agent 13 alone, the monitoring manager 20 alone, or via othersuitable systems and devices. The method 100 is not limited to thecomponents shown in FIG. 1 which are merely exemplary.

In a step 102, the monitoring manager 20 receives from a first user(hereinafter “monitoring user”) an indication of a schedule of requiredcheck-in communications, the schedule corresponding to a second user(hereinafter “monitored user”). The monitoring user can correspond forexample to a parent, and the monitored user can correspond to a child ofthe parent for whom the parent desires to control or limit mobile deviceuse. The monitoring user can provide the indication via the overseeinguser application 28 using a client device 16. The indication can beprovided in the form of a request to enable or disable use by themonitored user of one or more particular applications and/or one or moreparticular functional components of the monitored device 12 based on thewhether a check-in communication is received from the monitored user.The monitoring manager 20 can store check-in scheduling requirementsprovided via the overseeing user application 28 in the user datastore34.

A scheduled check-in can be time based. For example the monitoringmanager 20 can implement a timer that counts down from the most recentlyreceived check-in to determine a time for a subsequent requiredcheck-in, for example two hours from the most recent check-in.Alternatively, a user can be required to check-in at particular times(e.g. 4:00 pm, 5:15 pm, and 8:00 pm). The monitoring user canalternatively specify scheduled check-ins to be location based. Forexample, the monitored user can indicate that the monitoring user isrequired to check-in at each new location they arrive at, for example asdetermined by the monitoring agent 13 via the LDS 15 on the monitoreddevice 12 or by the mapping engine 24 of the monitoring manager 20 via aPDE 45. Alternatively, check-in requirements can be both time andlocation based. For example, based on a particular schedulingrequirement provided by monitoring parent via the overseeing userapplication 28, the monitoring agent 13 can initiate a timer as soon asa monitored child carrying the monitored device 12 is determined to haveleft her school's grounds. The monitored child is required to check-inbefore the timer runs out to avoid one or more functional components andapplications of the monitored device 12 being disabled by the monitoringagent 13 or monitoring manager 20.

A functional component is a hardware or software component of themonitored device 12 which enables a particular functionality such aselectronic messaging, photo messaging, telephone communication, internetusage, camera usage, video camera usage, application execution, accessto a graphic user interface, or other device feature. An application caninclude for example a gaming application, a social networkingapplication, a video playing application, or any application executableusing the monitored device 12.

In a step 104 of the method 100, a determination is made of whether acheck-in communication has been initiated by the monitored user pursuantto the prescribed schedule. The monitoring agent 13 can be used by themonitored user (e.g. a monitored child) to initiate the check-in. Themonitoring agent 13 facilitates packaging and sending information fromthe monitored user to the monitoring user (e.g. a parent), whichinformation can include for example the monitored user's location and amessage from the monitored user indicating what the monitored user isdoing (e.g. practicing violin with her classmate). The monitoring agent13 permits a user to perform the check-in via a user interface 17 wheredetails of the monitored user's activities can be entered. Themonitoring agent 13 sends the check-in communication to the monitoringmanager 20, and the monitoring manager 20 forwards the check-incommunication or renders the check-in communication accessible to theclient device 16 of the monitoring user via suitable protocol.Alternatively, the monitoring agent 13 transmits the check-incommunication directly to the monitoring user via suitable protocol andprovides notification of the check-in communication to the monitoringmanager. Suitable protocols can include for example SMS, email, phone orcommunication via the overseeing user application 28.

In an alternative implementation, the monitoring agent 13 determineswhether a check-in communication has been initiated through other means.For example, the monitoring agent 13 can monitor outgoing phone callsand text messages on the monitored device 12 to determine if themonitored user is checking in with the monitoring user. For example, themonitoring agent 13 can monitor a datastore 21 of outgoing SMS, email,and phone communications on the monitored device 12.

In another alternative implementation, an application such as theoverseeing user application 28 executed on the monitoring user's clientdevice 16 can monitor the client device 16 for evidence of communicationfrom the monitored user. For example, the monitoring agent 28 canmonitor incoming phone calls and text messages on the client device 16to determine if the monitored user is checking in with the monitoringuser.

In another alternative implementation, the monitoring manager 20 caninterface with an application program interface (“API”) 49 enabled by atelecommunication carrier providing network service to the monitoring ormonitored user to monitor for evidence of communication from themonitored user to the monitoring user, which communication can beinitiated without the monitoring agent 13 or monitoring manager 20. Forexample, the monitoring manger 20 can enable a carrier integrationapplication 38 integrated with the telecommunication carrierinfrastructure to monitor phone calls and text messages at a networklevel in order to determine whether the monitored user is checking inwith the monitoring user.

Referring further to FIG. 2, if a check-in communication is determinednot to have been initiated pursuant to the prescribed schedule in step104, one or more applications and functional components of the monitoreddevice 12 are disabled (step 106). The monitoring agent 13 residing onthe monitored device 12 can for example lock features of the monitoreddevice. Alternatively, a lock can be initiated by the carrierintegration application 36 integrated with the telecommunication carrierinfrastructure via the carrier API 49. For example, the carrierinterface application 36 can provide instructions via the carrier API 49to lock device features at a network level based on a determination bythe enablement engine 22. A notification of the lock can be provided bythe monitoring agent 13 via the device user interface 17. An examplenotification message 62 on a display 60 of a monitored device 12 isshown in FIG. 7A which reads “Select device features have been lockedsince you failed to check-in with mom. Call mom to re-enable lockedfeatures.”

If a check-in communication is determined to be initiated pursuant tothe schedule in step 104, one or more applications and functionalcomponents of the monitored device 12 are enabled (step 108) if notalready enabled. Alternatively, step 108 can be omitted, and once anapplication or functional component is disabled based on a failure tocheck-in, subsequent check-in communications do not function tore-enable such application or functional component. In such case thestep 104 repeats itself until it is determined that a check-incommunication has not been initiated pursuant to a prescribed schedule.For example, a late check-in can be insufficient to enable the one ormore applications and functional components.

The method 100 facilitates monitoring of users such as children by otherusers such as their parents. The method 100 through incentivizingenables monitoring users to determine whether those under their care aresafe and to determine their location and what they are doing.

Referring to FIG. 3, a method 200 for controlling communication deviceuse is shown. The method 200 is described with reference to thecomponents shown in the system 10 of FIG. 1, including the monitoringmanager 20 and monitoring agent 13, which are preferably configured forperforming the method 200 and include or have access to suitablenon-transitory data storage including instructions for performing themethod 200. The method may alternatively be performed by the monitoringagent 13 alone, the monitoring manager 20 alone, or via other suitablesystems and devices. The method 200 is not limited to the componentsshown in FIG. 1 which are merely exemplary.

In a step 202, the monitoring manager 20 receives from a first user(hereinafter “monitoring user”) an indication of a required state of amobile device corresponding to a second user (hereinafter “monitoreduser”). The monitoring user can correspond for example to a parent, andthe monitored user can correspond to a child of the parent for whom theparent desires to control or limit mobile device use. The monitoringuser can provide the indication via the overseeing user application 28using a client device 16. The indication can be provided in the form ofa request to enable or disable the use by the monitored user of one ormore particular applications and/or one or more particular functionalcomponents of the monitored device 12 based on the whether the currentstate of the mobile device is inconsistent with the required state. Themonitoring manager 20 can maintain store requirements provided via theoverseeing user application 28 in the user datastore 34.

The indication of the state can include an indication of a minimumbattery charge of the monitored device 12. For example, a parent maywant to be certain that her child carrying a mobile monitored device 12is contactable, in which case the mobile device should have sufficientbattery charge to remain operable. The indication of the state canalternatively include a requirement that a particular functionalcomponent such as a GPS receiver or WiFi protocol transceiver be on andenabled on the monitored device 12. For example, a parent may want toinclude such requirement to be certain that applications such as themonitoring agent 13 which can use GPS or WiFi protocol for tracking thelocation of their child remain operable.

It is determined in a step 204 if the current state of the monitoreddevice 12 is consistent with the required state. The current state isconsistent with the required state for example if a battery charge ofthe monitored device 12 is at a level greater than a particular requiredminimum charge. In another example, the current state is consistent withthe required state if a GPS receiver or WiFi transceiver of themonitored device 12 is enabled. In yet another example, the currentstate is consistent with the required state if a phone ringer or otheraudible or vibratory notifier of an incoming communication of themonitored device 12 is enabled.

If the current state is determined to be inconsistent with the requiredstate, for example the battery charge is at a level less than anindicated minimum or the GPS receiver, WiFi transceiver, or phone ringeris disabled, one or more application and/or one or more functionalcomponents of the monitored device 12 are disabled (step 206). One orboth of the monitoring agent 13 and the monitoring manager 20 caninitiate a lock to disable an application or functional component of themonitored device 12. A notification of the lock can be provided by themonitoring agent 13 via the device user interface 17. An examplenotification message 64 on the display 60 of the monitored device 12 isshown in FIG. 7B which reads “Select device features have been lockedsince your battery charge is less than 15%. Charge your device tore-enable locked features.” If the current state is determined to beconsistent with the required state, one or more applications and/or oneor more functional components are enabled if not already enabled (step208) and the method returns to step 204 after a particular period oftime Δt (step 210) to again determine the current state. Alternatively,step 208 can be omitted, wherein once an application or functionalcomponent is disabled in step 206 the process ends, and from step 204the method skips to step 210 if a current state is determined to beconsistent with a required state.

Referring to FIG. 4, a method 300 for controlling communication deviceuse is shown. The method 300 is described with reference to thecomponents shown in the system 10 of FIG. 1, including the monitoringmanager 20 and monitoring agent 13, which are preferably configured forperforming the method 300 and include or have access to suitablenon-transitory data storage including instructions for performing themethod 300. The method 300 may alternatively be performed by themonitoring agent 13 alone, the monitoring manager 20 alone, or via othersuitable systems and devices. The method 300 is not limited to thecomponents shown in FIG. 1 which are merely exemplary.

In a step 302, the monitoring manager 20 receives from a first user(hereinafter “monitoring user”) an indication of maximum allowed use ofa monitored device 12 corresponding to a second user (hereinafter“monitored user”). The monitoring user can correspond for example to aparent, and the monitored user can correspond to a child of the parentfor whom the parent desires to control or limit mobile device use. Themonitoring user can provide the indication via the overseeing userapplication 28 using a client device 16. The indication can be providedin the form of a request to enable or disable the use by the monitoreduser of one or more particular applications and/or one or moreparticular functional components of the monitored device 12 based on theamount of use of particular applications or functional components of themonitored device 12. The monitoring manager 20 can store indications ofmaximum allowed use provided via the overseeing user application 28 inthe user datastore 34.

The maximum allowed use can correspond to maximum allowed communicationuse such as a maximum allowed number of transmitted Short MessageService (SMS) messages and maximum quantity or duration of phone use.Alternatively, the maximum allowed use can correspond to a maximumallowed use of one or more applications such as gaming or socialnetworking applications. A parent for example may want to limit theirchild's transmitted text messages to 100 per day or limit use by theirchild of one or more gaming applications to 2 hours a day.

An amount of use of the at least one device is determined in a step 304,for example the number of transmitted Short Message Service (SMS)messages or quantity or duration of phone use. If the amount of use isless than or equal to the maximum allowed use, the method returns tostep 304 after a particular period of time Δt (step 306) to againdetermine the amount of use. If the determined amount of use is greaterthan the maximum allowed use, one or more applications and/or one ormore functional components of the monitored device 12 are disabled (step308). One or both of the monitoring agent 13 and the monitoring manager20 can initiate a lock to disable an application or functional componentof the monitored device 12. The monitoring agent 13 residing on themonitored device 12 can for example lock features of the mobile device.Alternatively, a lock can be initiated by the carrier integrationapplication 38 integrated with the telecommunication carrierinfrastructure via the carrier API 49. For example, the carrierintegration application 38 can provide instructions to the carrier API49 to lock phone features at a network level. A notification of the lockcan be provided by the monitoring agent 13 via the device user interface17. An example notification message 66 on the display 60 of themonitored device 12 is shown in FIG. 7C which reads “Select devicefeatures have been locked since transmitted SMS messages have exceeded50 today.”

The monitoring manager 20 can further receive from the monitoring userindications of exceptions including for example white-listed contacts orapplications. Communications with a contact indicated as an exceptionare not used in determining the amount of use of the monitored device 12or in determining whether use has exceeded the maximum allowed use. Forexample, a parent may not want to discourage communication with theirchild's grandparent, so the grandparent can be indicated as anexception. Executed applications indicated as exceptions are not countedin determining the amount of use or in determining whether use hasexceeded the maximum allowed use. For example, a parent may want toencourage use of certain educational applications, so such educationalapplications can be indicated as exceptions.

Referring to FIG. 5, a method 400 for controlling communication deviceuse is shown. The method 400 is described with reference to thecomponents shown in the system 10 of FIG. 1, including the monitoringmanager 20 and monitoring agent 13, which are preferably configured forperforming the method 400 and include or have access to suitablenon-transitory data storage including instructions for performing themethod 400. The method 400 may alternatively be performed by themonitoring agent 13 alone, the monitoring manager 20 alone, or via othersuitable systems and devices. The method 400 is not limited to thecomponents shown in FIG. 1 which are merely exemplary.

In a step 402, the monitoring manager 20 receives from a first user(hereinafter “monitoring user”) an indication of a geographic area. In astep 404, the monitoring manager 20 receives an indication from themonitoring user of a schedule corresponding to one or more times atwhich a particular second user (hereinafter “monitored user”) isrequired to be present at the geographic area. The indication of thegeographic area can correspond to an address, a geographic coordinate, aname corresponding to a particular location, or any suitable descriptionof a geographic area.

The monitoring user can provide the indications via the overseeing userapplication 28 using a client device 16. The indications can be providedin the form of a request to enable or disable the use by the monitoreduser of one or more particular applications and/or one or moreparticular functional components of the monitored device 12 based onfailure of the monitored user to arrive a particular geographic area ata particular time. The monitoring manager 20 can store indicationsprovided via the overseeing user application 28 in the user datastore34.

In a step 406, location information of the monitored device 12corresponding to the monitored user is received. Location informationcan be received by the monitoring agent 13 and/or the monitoring manager20 via the LDS 15, via a network accessible position determining entity(PDE) 45, or via other suitable source. In a step 408, it is determinedwhether the location information indicates that the monitored user ispresent at the geographic area at a time required by the scheduleprovided by the monitoring user. The determination can be made by themonitoring manager 20 for example via the mapping engine 24 or via themonitoring agent 13. If it is determined that the monitored user is notpresent as required by the schedule, one or more applications and/or oneor more functional components of the monitored device 12 are disabled(step 410) if not already disabled. A notification that suchapplications or functional components are disabled can be provided bythe monitoring agent 13 via the device user interface 17. An examplenotification message 68 on the display 60 of the monitored device 12 isshown in FIG. 7D which reads “Select device features have been lockedsince you arrived late to school today.”

If it is determined that the monitored user is present at the designatedgeographic area as required by the schedule, one or more applicationsand/or one or more functional components of the device are enabled (step412) if not already enabled, and the process returns to step 406 after aperiod of time Δt (step 414). Accordingly, an incentive is provided forthe monitored user to arrive at a particular location at a timedesignated by the monitoring user, and a disincentive is provided forthe monitored user to arrive late to a particular location after a timedesignated by the monitoring user.

Alternatively, step 412 can be omitted, wherein once an application orfunctional component is disabled in step 410 the process ends, and fromstep 408 the method skips to step 414 if the monitored user isdetermined to be present at the designated geographic area pursuant tothe indicated schedule. In such case, once an application or functionalcomponent is disabled based on the monitored user's failure to bepresent at a particular geographic area at a scheduled time, suchapplication or functional component is not re-enabled based on themonitored user's presence at a particular location at a future timeaccording to the indicated schedule.

By the method 400 a user can be reprimanded or rewarded with more orless restricted use of their mobile device. For example, a parent canprovide an indication of a time required for their child to arrive atschool in an effort to incentivize arriving on time to school, whereinif the child arrives to school on time a particular day, all functionalcomponents and applications on the child's mobile phone are enabledafter the school day. If the child arrives late to school, one or morefunctional components and/or applications on the mobile phone can bedisabled and remain disabled after the school day.

Two or more of the methods 100, 200, 300 and 400 can be operatedconcurrently in controlling use of a particular device. These methodscan operate independently via the monitoring manager 20 and monitoringagent 13. For example, features of the monitored device 12 are unlockedif battery charge is above a particular threshold and locked if batterycharge is below a particular threshold without regard to other behaviorof the monitored user. Alternatively, criteria set forth for triggeringdisabling and enabling functional components and applications arecombined into a system of multipliers in which a monitored user has adepletable reserve of unrestricted use of her monitored device 12. Avalue of the reserve can for example decay based on passage of time,based on use of the monitored device 12, or based on a determination ofundesirable user behavior, for example failure to check-in with amonitoring user. The reserve can be replenished for example by thepassing of time (e.g. a daily reset of the value of the reserve) orbased on a determination of desirable user behavior (e.g. checking inwith a monitoring user). The monitoring agent 13 can enable a userinterface 17 to provide a monitored user a view of their current reservevalue, an indication of past actions contributing to the rise and fallof the reserve value, and an indication of suggested actions which canmost effectively increase the current reserve value to permit enablementof functional components or applications.

Referring to FIG. 6, a method 500 for controlling communication deviceuse based on particular triggering conditions is shown. The method 500is described with reference to the components shown in the system 10 ofFIG. 1, including the monitoring manager 20 and monitoring agent 13,which are preferably configured for performing the method 100 andinclude or have access to suitable non-transitory data storage includinginstructions for performing the method 500. The method 500 mayalternatively be performed by the monitoring agent alone, or themonitoring manager via other suitable systems and devices. The method500 is not limited to the components shown in FIG. 1 which are merelyexemplary.

In a step 502, the monitoring manager 20 establishes a valuecorresponding to a particular user of a monitored device 12. In a step504, the monitoring manager 20 receives an indication of one or moretriggering conditions of the particular user corresponding to themonitored device 12, the one or more triggering conditions being atleast one of enabled by the monitored device 12 and measurable by themonitored device 12. The indications of triggering conditions can beprovided for example by a parent of the particular user via theoverseeing user application 28. The established values and theindications of triggering conditions can be stored in the user datastore34.

In a step 506, it is determined whether one or more of the triggeringconditions have been met by the particular user via the monitored device12. A triggering condition can correspond to an arguably undesirablebehavior, for example a failure to perform a check-in communicationaccording to a particular schedule using the monitored device 12, afailure to maintain a battery charge of the monitored device 12 above aparticular threshold level, performing communication of quantity orduration greater than a particular maximum allowed threshold, and notbeing present at a particular geographic area at a particular specifiedtime. Alternatively, the triggering condition can correspond to anarguably desirable behavior, for example performing a check-incommunication according to a particular schedule using the mobiledevice, charging a battery to a particular threshold level, performingcommunication of quantity or duration less than a particular maximumallowed threshold over a period of time, and being present at aparticular geographic area at a particular specified time. Theparticulars of the triggering conditions, including for example aschedule for performing check-ins, a threshold battery charge, anallowed communication threshold, and a schedule for being present atparticular geographic areas, can be provided by a monitoring user suchas a parent of the particular user via the overseeing user application28.

If a triggering condition is not met, step 506 is repeated after aperiod of time Δt (step 508). If a triggering condition is met, theestablished value is modified (step 510). For example, the value can bedecreased if a first triggering condition is met and the value can beincreased if a second triggering condition is met, wherein for examplethe first triggering condition corresponds to undesirable behavior, andthe second triggering condition corresponds to a desirable behavior. Itis determined in a step 512 if the value crosses a particular thresholdfrom a first direction, and if not, it is determined in a step 516 ifthe value crosses a particular threshold from a second direction. If itis determined in step 512 that the value crosses a particular thresholdfrom the first direction, one or more particular applications and/or oneor more functional components of the monitored device 12 are disabled(step 514), if not already disabled. The threshold can correspond forexample to a numeric indicator such as 0 wherein the one or moreapplications and functional components are disabled responsive to thevalue dropping from a value above 0 to a value equal to or less than 0,the first direction being from positive value to zero value or frompositive value to negative value. If it is determined in step 516 thatthe value crosses another particular threshold in a second direction,one or more applications and/or one or more functional components of thedevice 12 are enabled (step 518), if not already enabled. The otherparticular threshold can correspond for example to a numeric indicatorsuch as 0 or other numeric count wherein the one or more applicationsand functional components are enabled responsive to the value increasingfrom a value less than or equal to 0 to a value greater than 0, thesecond direction being from negative or zero value to positive value.After enabling or disabling the one or more applications and functionalcomponents, the process returns to step 506 after a period of time Δt(step 508). The thresholds in steps 512 and 516 need not be of the samevalue. Further, steps 516 and 518 can be omitted, for example based onpreference indication of a monitoring user, in which case step 512 skipsto step 508 if the particular value does not cross the threshold, andthe method ends after the one or more applications and functionalcomponents are disabled in step 514.

Different triggering conditions can be weighted differently, whereinwhen a particular triggering condition is met, a reserve value ismodified based on the particular triggering conditions weighting. Amonitoring user via the overseeing user application 28 is enabled to setand adjust the weights based on preference. For example failure tocheck-in may result in a 5 count decrease in reserve value, whereasfailure to maintain battery charge may result in a 2 count decrease inreserve value.

Referring to FIG. 7E, an example notification message 70 indicating thatone or more applications and functional components are disabled pursuantto the method 500 is shown on the display 60 of the mobile device 12.The message 70 further indicates behavior contributing to thedisablement. The message reads “Select device features have been lockedbased on recent behavior including: 1. failure to check in, 2. arrivinglate to home, 3. excess SMS use.” Referring to FIG. 7F, an examplenotification message 72 indicating that one or more applications andfunctional components are disabled pursuant to the method 500 is shownon the display 60 of the mobile device 12. The message 72 furtherindicates behavior which can contribute to re-enablement of theapplications or functional components. The message reads “Select devicefeatures have been locked based on recent behavior. Check in with Momand charge device to unlock features.” Referring to FIG. 7G, an examplenotification message 74 indicating a monitored user's current reservevalue pursuant to the method 500 is shown on the display 60 of themobile device 12. The message 74 further indicates behavior which cancontribute to an increase in the reserve value. The message reads “Yourdevice reserve value is 12 points. Select features are locked whenreserve value reaches 0. Arrive at school by 8:00 am to increase reservevalue.”

Hooks are provided to allow for other applications or systems to callinto the monitoring manager 20 or monitoring agent 13 to provide anindication of activity of the monitored user to the monitoring manager20 to control functional components or applications or modify a valuetied to control of functional components or applications on a monitoreddevice 12. For example, educational games and other applications andsystems, represented by contributing systems 47 and app 19 in FIG. 1,can be integrated with APIs enabled by the monitoring manager 20 ormonitoring agent 13 to permit a monitored user to be rewarded forexample for time spent or achievements earned using a particularapplication or participating in a particular activity.

Contributing systems 47 can include for example school informationsystems which can correlate a monitored child's completion of homework,grades and overall school performance with enablement of applications orfunctional components on the child's monitored device 12. Thecontributing systems 47 can further correspond for example to classroomteachers, babysitters, caregivers or others who look to incentivizedesirable behavior with unrestricted or less restricted device use. Thecontributing systems 47 can further correspond for example to bankingsystems, wherein a monitored user is rewarded with unrestricted or lessrestricted device use or value corresponding to unrestricted or lessrestricted device use based on maintaining a particular bank balance.Contributing systems 47 or applications 19 corresponding to behaviors oractivities of a monitored user can be selected by a monitoring user totie into enablement of functional components and applications of amonitored device 12. The contributing systems 47 and applications 19 canprovide indication of activity to the monitoring manager 20 ormonitoring agent 13, wherein operability of functional components orapplications or a value tied to such operability is controlled at leastin part by such indication of activity.

Although features and elements are described above in particularcombinations, one of ordinary skill in the art will appreciate that eachfeature or element can be used alone or in any combination with theother features and elements. Methods described herein may be implementedin a computer program, software, or firmware incorporated in acomputer-readable medium for execution by a computer or processor.

While embodiments have been described in detail above, these embodimentsare non-limiting and should be considered as merely exemplary.Modifications and extensions may be developed, and all suchmodifications are deemed to be within the scope defined by the appendedclaims.

What is claimed is:
 1. A computer implemented method of controllingdevice use, the method comprising: receiving from a first user anindication of a schedule of required check-in communications, theschedule corresponding to a second user; determining via an agent on amobile communication device when a check-in communication has beeninitiated by the second user using the mobile communication devicepursuant to the schedule; and disabling at least one of an applicationor a functional component of the mobile communication devicecorresponding to the second user responsive to determining at least onecheck-in communication has not been received pursuant to the schedule.2. The computer implemented method of claim 1, further comprising:establishing a value corresponding to allowable use of the at least oneof the application or the functional component of the device; modifyingthe value responsive to determining at least one check-in communicationhas not been received pursuant to the schedule; and disabling the atleast one of the application or the functional component of the deviceresponsive to the value passing a particular threshold.
 3. The computerimplemented method of claim 2, further comprising: receiving anindication of activity corresponding to the particular user; andmodifying the value corresponding to allowable use responsive to thereceived indication of activity.
 4. The computer implemented method ofclaim 1, wherein the indication of a schedule comprises a requirementfor the second user to initiate a check-in communication responsive to achange in location, the method further comprising: determining via theagent on the mobile communication device a change in location of themobile communication device corresponding to the second user; disablingthe at least one of the application or the functional component of thedevice responsive to determining the change in location of the deviceand responsive to determining the at least one check-in communicationhas not been received.
 5. The computer implemented method of claim 1,the method further comprising providing via the agent a user interfaceenabling the check-in communication by the second user.
 6. The computerimplemented method of claim 1, further comprising transmitting via theagent the check-in communication to the first user.
 7. The computerimplemented method of claim 1, further comprising transmitting via theagent the check-in communication via at least one of short messageservice (SMS), email, or phone protocol.
 8. The computer implementedmethod of claim 1, further comprising monitoring via the agent at leastone of outgoing phone calls or text messages on the mobile communicationdevice to determine when the check-in communication has been initiatedby the second user.
 9. The computer implemented method of claim 1, thedisabling of the at least one of the application or the functionalcomponent of the mobile communication device performed by the agent onthe mobile communication device.
 10. A computer implemented method ofcontrolling use of a mobile communication device, the method comprising:establishing a value corresponding to a particular user of the device;receiving an indication of at least one triggering condition of theparticular user of the device, the at least one triggering conditionbeing at least one of enabled by the device or measurable by the device,the at least one triggering condition comprising a failure to perform acheck-in communication using the device; determining via an agent on themobile communication device the failure by user to perform a check-invia the device; modifying the value responsive to determining thefailure by the user to perform check-in via the device; determining whenthe value crosses a particular threshold; and disabling at least one ofan application or a functional component of the device responsive to thevalue crossing the particular threshold.
 11. A computer implementedmethod of controlling use of a mobile communication device, the methodcomprising: establishing a value corresponding to a particular user ofthe device; receiving an indication of at least one triggering conditionof the particular user of the device, the at least one triggeringcondition being at least one of enabled by the device or measurable bythe device, the at least one triggering condition comprising performinga check-in communication using the device; determining via an agent onthe mobile communication device the performing by a user a check-in viathe device; modifying the value responsive to determining the performingby a user a check-in via the device; determining when the value crossesa particular threshold; and enabling at least one of an application or afunctional component of the device responsive to the value crossing theparticular threshold.
 12. A computer implemented method of controllingdevice use, the method comprising: receiving from a first user anindication of a schedule of required check-in communications, theschedule corresponding to a second user; monitoring via a first agent ona first mobile communication device communications to the first mobilecommunication device; determining based on the monitored communicationsto the first mobile communication device when a check-in communicationto the first mobile communication device has been initiated by thesecond user using a second mobile communication device pursuant to theschedule; and disabling via a second agent on the second mobilecommunication device at least one of an application or a functionalcomponent of the second mobile communication device corresponding to thesecond user responsive to determining at least one check-incommunication has not been received pursuant to the schedule based onthe monitored communications to the first mobile communication device.13. A computer implemented method of controlling device use, the methodcomprising: receiving from a first user an indication of a schedule ofrequired check-in communications, the schedule corresponding to a seconduser; monitoring a telecommunication carrier system via an applicationprogram interface for communications from the second user to the firstuser; determining based on the monitored communications when a check-incommunication has been initiated by the second user using a mobilecommunication device pursuant to the schedule; and disabling at leastone of an application or a functional component of the mobilecommunication device corresponding to the second user responsive todetermining at least one check-in communication has not been received bythe first user from the second user pursuant to the schedule based onthe monitored communications.
 14. The computer implemented method ofclaim 13, the disabling of the at least one of the application or thefunctional component of the mobile communication. device performed by anagent on the mobile communication device.
 15. The computer implementedmethod of claim 13, the disabling of the at least one of the applicationor the functional component of the mobile communication device performedat a network level via the telecommunication carrier system.