System and method for monitoring electronic communications

ABSTRACT

A method for monitoring mobile communication and generating alerts associated with targeted content. A link is established between a monitored user&#39;s mobile communication device and a monitoring user&#39;s mobile communication device to receive communications for monitoring purposes. The monitored user&#39;s mobile communication device forwards an incoming or outgoing communication to the monitoring user&#39;s mobile communication device. The monitored user&#39;s or monitoring user&#39;s mobile communication device generates an alert if it is determined that the incoming or outgoing communication contains targeted content, and an alert is provided on the monitoring user&#39;s mobile communication device.

PRIORITY CLAIM AND REFERENCE TO RELATED APPLICATION

This application claims priority of U.S. Provisional Patent ApplicationSer. No. 61/959,395, filed Aug. 22, 2013, entitled “METHODS AND SYSTEMSFOR MOBILE COMMUNICATION MONITORING AND ALERTS.” U.S. Provisional PatentApplication Ser. No. 61/959,395 is incorporated in its entirety byreference herein.

FIELD OF THE INVENTION

A field of the invention is mobile communications. Particularembodiments of the invention are applicable to monitoring electroniccommunications between mobile communication devices.

BACKGROUND OF THE INVENTION

Short Message Service (SMS) is a text messaging service component ofphone, web, or mobile communication systems, using standardizedcommunications protocols that allow the exchange of text messages(currently up to 160 characters for SMS, though this could change in thefuture) between fixed line, mobile phone devices or mobile communicationdevices. Current communication protocols used to deliver such servicesinclude GSM, CDMA, GPRS; 3G networks such as W-CDMA, EDGE or CDMA2000and 4G networks, though additional protocols and networks may beimplemented. Text messaging is a widely used communications serviceprovided by wireless carriers (e.g. U.S. Cellular), communicationcompanies (e.g. AT&T) and mobile app companies (e.g. Whatsapp, KiK).

Multimedia Messaging Service, or MMS, is a standard way to send messagesthat include multimedia content (images, video, etc.) to and from mobilephones and mobile communication devices. It extends the core SMS (ShortMessage Service) capability that currently allows exchange of textmessages only up to 160 characters in length. A popular use of MMS is tosend photographs from camera-equipped handsets, although it is alsopopular as a method of delivering news and entertainment contentincluding videos, pictures, text pages and ringtones. The standard isdeveloped by the Open Mobile Alliance (OMA), although during developmentit was part of the 3GPP and WAP groups.

Text messages, images (pictures), video and audio can be transmittedusing Wi-Fi, Bluetooth or other wireless technology over the Internetand without use of cellular communication infrastructure. As such, SMSand MMS are emulated by mobile applications (“Mobile Apps”) that providethis type of functionality. Additional functionality such as audio,video and audio/video content can be transmitted and received with thesetypes of Mobile Apps.

Though electronic messaging such as, but not limited to, SMS, MMS andtext messaging (i.e. via mobile apps) has been widely adopted and hasproven very useful, the inherent dangers of electronic messaging andrelated communications such as cyber-bullying, the transmission andreceiving of sexual images (“sexting”) and other inappropriate or othertargeted content have been well publicized. The present inventor hasrecognized that the need to monitor these types of communications duringcell phone (more specifically, what is commonly referred to as a“smartphone”) or mobile communication device use is becomingincreasingly more important.

Other growing issues related to the private usage of mobilecommunications devices such as, but not limited to, laptop computers,tablet PCs (tablet computer), gaming devices, cell phones, PDAs(Personal Data Assistants) and other communication devices is withunsolicited contact by predators to children, facilitation of illegaldrug and alcohol activities, and the malicious broadcasting of contentintended to be private. Due to the portability of mobile communicationsdevices such as cell phones, children (and people) have regularopportunities to engage in electronic messaging such as text messageexchanges that have inappropriate or illegal content unbeknownst totheir parents.

Many parents and guardians that have children with mobile communicationdevices (e.g. cell phones or other devices that enable text messaging)are interested in protecting their children from the inherent dangersand ramifications associated with inappropriate or undesirable textmessaging communications described herein. However, the present inventorhas recognized that such parents or guardians are unable to easily oreffectively monitor the content being transmitted and received on theirchildren's cell phones or other devices that enable text messaging andelectronic communications. This is due in part to the lack oftransparency, anonymity and the mobile nature of cell phones and otherhand-held (mobile) communication devices.

Text messages, images, video and audio can also be transmitted andreceived directly over the Internet using a Wi-Fi, Bluetooth or viaother technologies that enables mobile communication devices to connectwirelessly to the Internet. To this end, mobile applications (mobileapps) now exist that emulate SMS and MMS functionality.

In general, it has been recognized that users (e.g. parents, guardiansand family member) of mobile communication devices (for example but notlimited to SMS and MMS messages communicated via a handheld smartphonesuch as a BlackBerry, iPhone, cellular phone running an Androidoperating system or another portable computing device capable ofreceiving and/or sending wireless communications) face concernsregarding various aspects of communications to/from such mobilecommunication devices. Examples of this include the appropriateness,inappropriateness, safety and legality of such communications. Forexample, people (such as parents or guardians of children) may beconcerned about the language, the meaning of acronyms, the meaning ofshort hand, content, pictures and/or elements included in the childcommunications.

Some example systems and methods of the present invention address one ormore of these concerns by providing preferably near real-time monitoringof text messaging to address these and other related problems andissues.

SUMMARY OF THE INVENTION

An example embodiment of the invention provides, among other things, amethod for monitoring mobile communication and generating alertsassociated with targeted content. In an example method, a link isestablished between monitoring user's mobile communication device and amonitored user's mobile communication device to receive communicationsfor monitoring purposes. In some example embodiments, the monitoringuser's mobile communication device is authenticated to receivecommunications from a monitored user's mobile communication device(e.g., for monitoring purposes). The monitored user's mobilecommunication device forwards an incoming or outgoing electroniccommunication to the monitoring user's mobile communication device. Themonitored user's or monitoring user's mobile communication devicegenerates an alert if it is determined that the incoming or outgoingelectronic communication contains targeted content. The alert isprovided on the monitoring user's mobile communication device, e.g.,displayed, sounded, presented via haptic feedback, etc. In someembodiments, the targeted content associated with the alert and/or adescription of the target content (e.g. description of an acronym) maybe provided on the monitoring user's mobile communication device forreview by the monitoring user.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other features, aspects and advantages of theinvention are described in detail below with reference to the drawingsof various embodiments, in which:

FIG. 1 is a schematic diagram of an embodiment for facilitating wirelesscommunication among communication devices, in accordance with someembodiments.

FIG. 2 shows a block diagram of a method for monitoring communicationson mobile communication devices and generating alerts in accordance withsome embodiments.

FIG. 3 is an example of a portion of a data structure for use inaccordance with some embodiments.

FIG. 4 is a depiction of an embodiment for a parent monitoring theirchild's/children's mobile communication device from their own mobilecommunication device by receiving copies of text messages coming intoand going out of the child's mobile communication device. Thisembodiment could be viewed as a message forwarding scheme. Morespecifically, the software (mobile app) forwards incoming and outgoingtext messages occurring on the child's mobile communication device tothe parent's mobile communication device.

FIG. 5 is a depiction of an embodiment for a parent monitoring theirchild's/children's mobile communication device by receiving copies oftext messages going out of the communication device. This embodimentcould be viewed as a message forwarding scheme. More specifically, thesoftware (mobile app) forwards outgoing text messages from the child'smobile communication device to the parent's mobile communication device.

FIG. 6 is a flowchart illustrating an example process for providingcopies of SMS communications from a mobile communication device beingmonitored to one or more mobile communication devices authenticated orregistered to monitor such communications in accordance with someembodiments.

FIG. 7 is a flowchart illustrating an example process for providingcopies of MMS communications from a mobile communication device beingmonitored to one or more mobile communication devices authenticated orregistered to monitor such communications in accordance with someembodiments.

FIG. 8 is a flowchart illustrating an example process for providingcopies of audio, video or audio/video communications from a mobilecommunication device being monitored to one or more mobile communicationdevices authenticated or registered to monitor such communications inaccordance with some embodiments.

FIG. 9 is a flowchart illustrating an example process for providingcopies of electronic messages from a mobile communication device beingmonitored to one or more mobile communication devices authenticated orregistered to monitor such electronic messages in accordance with someembodiments.

FIG. 10 is a flowchart illustrating an example process for providingcopies of outgoing SMS, MMS or any electronic message from a mobilecommunication device being monitored to one or more mobile communicationdevices authenticated or registered to monitor such communications inaccordance with some embodiments.

FIG. 11 is a flowchart illustrating an example process for providingcopies of incoming SMS, MMS or any electronic message from a mobilecommunication device being monitored to one or more mobile communicationdevices authenticated or registered to monitor such communications inaccordance with some embodiments.

FIG. 12 is a flowchart illustrating an example process for providingcopies of incoming SMS, MMS or any electronic message communications,based on certain conditions being met, from a mobile communicationdevice being monitored to one or more mobile communication devicesauthenticated or registered to monitor such communications in accordancewith some embodiments.

FIG. 13 is a flowchart illustrating an example process for generatingalerts (warnings) for one or more mobile communication devicesauthenticated or registered to monitor communications on the mobilecommunication device being monitored when certain conditions have beenmet or target content has been matched to, based on predefineddata/content stored in a data structure or database (Target ElementData) on either the monitoring or monitored mobile communication devicein accordance with some embodiments.

FIG. 14 is a flowchart illustrating an example process for providingcopies of incoming audio communications, video communications oraudio/video communications based on certain conditions being met, targetcontent being matched to or target content having a close proximitymatch to predefined data/content stored in a data structure or databasefrom a mobile communication device being monitored to one or more mobilecommunication devices authenticated to monitor such communications inaccordance with some embodiments.

FIG. 15 is a flowchart illustrating an example process for providingcopies of all keystrokes or characters entered in or images created(i.e. pictures from camera feature on mobile device) on a mobilecommunication device being monitored by one or more mobile communicationdevices authenticated or registered to monitor such keystrokes andimages in accordance with some embodiments.

FIG. 16 is a schematic diagram of an embodiment for facilitatingwireless communication among communication devices, in accordance withsome embodiments, including communications through the Internet via aWi-Fi, Bluetooth or other wireless technology connection.

FIG. 17 is an example of a user interface that may be incorporated onthe monitoring cell phone, smartphone or mobile communication device toenable the monitoring user to view, in the case of firmware, textmessages or SMS that have occurred on the monitored user's cell phone,smartphone or mobile communication device, and are about to occur (pastand present).

FIG. 18 is an example of a user interface that may be incorporated onthe monitoring cell phone, smartphone or mobile communication device fordisplaying a text message or SMS that is associated with an alert (orwarning) that was generated by the software because it detected targetedcontent (e.g. possible inappropriate content) that occurred on themonitored user's cell phone, smartphone or mobile communication device.

DETAILED DESCRIPTION

Example embodiments of the invention provide, among other things,systems and methods for monitoring electronic communications. Suchsystems and methods in example embodiments further provide alerts ofparticular targeted content, such as inappropriate or illegal content,within electronic communications. Example systems and methods canprovided for monitoring a single user, or multiple users, and can beperformed by a single monitoring user or by multiple monitoring users.Non-limiting examples of mobile communication devices include cellphones, smartphones, iPhones, Windows phones, Samsung cell phones,Android phones, cell phones that have memory and processor(s), cellphones that run a mobile operating system such as Android, webOS, iOS,Blackberry OS, Symbian, Windows Mobile Professional, tablet computers,iPads, iPods, PDAs (Personal Digital Assistant) or other portablecommunication devices. Future mobile communication devices may includetechnologies under development such as Google Glass, smartphonesincorporating cloud-based technologies or cloud-based operating systemsor cloud-based computing schemes.

As used herein, the terms text message, text messages or text messagingis intended to include SMS (Short Message Service), MMS (MultimediaMessaging Service) and other types of electronic messaging services orapplications including but not limited to those that transmit text, textstrings, characters and/or multimedia over the Internet via a Wi-Fi,Bluetooth or other wireless technology connection. Future messagingservices that utilize other electronic data transmission technologies,for example X-ray, RF (Radio Frequency), infrared, visible light,ultraviolet and gamma rays technologies or cloud computing technologiesor schemes (e.g. cloud messaging), may be applicable to some embodimentsherein.

Mobile communications devices include, but are not limited to, PersonalDigital Assistants (PDAs), cell phones, mobile phones, Smartphones,iPods, iPads, gaming devices, mobile computers, Tablet PCs and any otherelectronic device for which transmitting and receiving text messages arefrequently utilized (also referred to herein as a mobile communicationdevice). Example embodiments described herein refer to cell phones,however, such description is intended to also apply, where feasible, tomobile communication devices generally.

As used herein, the term software, mobile application, mobile app isintended to mean either software or firmware. Note that a mobile app maybe downloaded and installed on a smartphone or mobile communicationdevice whereby a smartphone or mobile communication device may havehardware or chips that have the software (application code) programmedinto them. In the case firmware, the software is essentially built intothe hardware of the smartphone or mobile communication device (whichdoes not need to be downloaded or installed). Additionally, it is alsopossible to incorporate software into the operating system of thesmartphone or mobile communication device so that it is integrated intothe smartphone or mobile communication device (not needing mobile appsoftware to be downloaded and installed by the end user). It will beappreciated that description herein for example methods will likewise beapplicable to suitably configured mobile communications devices,software or firmware (e.g., mobile apps), or networks or architectures(peer-to-peer or other networks) that perform one or more features ofthe method.

As used herein, the term “electronic message” or the term “electroniccommunication” is intended to mean any type of message that can betransmitted or received by a mobile communication device, including butnot limited to a text message, SMS, image (picture), MMS, audio clip,video clip, audio/video clip, live audio segment, live video segment orelectronic message.

In an example method for monitoring mobile communication and generatingalerts associated with targeted content, such as potentiallyinappropriate or illegal content, a link is established between a user'smobile communication device to be monitored and a user's mobilecommunication device to receive communications for monitoring purposes.The devices may also be authenticated or registered, though suchauthentication is not required in all embodiments. The monitoring user's(also referred to herein as monitoring party or monitoring party's)mobile communication device (“monitoring device”) receives communication(i.e. via message forwarding), either incoming or outgoing, from auser's (also referred to herein as monitored party or monitored party's)mobile communication device being monitored (monitored device). In someexample embodiments, only incoming, or alternatively only outgoing,communications are monitored.

The monitored user's mobile communication device generates and transmitsan alert to the user's mobile communication device monitoring thecommunications if the application software running on the monitoreduser's mobile communication device determines that a communicationcontains targeted content. Determining whether a communication containstargeted content can be accomplished, for example, by comparing thecontent of the communication to a library of targeted content, such asinappropriate and/or illegal violations, stored in a local database (ordata structure) including text strings, images, audio clips and videoclips. Example software can search for exact matches or comparablematches (e.g. comparable match could be an image in the local databasethat resembles the image in a communication) within the local databaseto determine if it should generate an alert to be transmitted to themonitoring user's mobile communication device. The alert is provided,e.g., displayed, sounded, provided via haptic feedback, etc. on themonitoring mobile communication device.

For example, the monitoring user's mobile communication device canreceive alerts transmitted (forwarded) from a monitored user's mobilecommunication device when potentially inappropriate or illegal contentis determined by the software after searching a local database (or datastructure) of predefined text strings and/or images and/or audio clipsand/or video clips residing on the user's mobile communication devicebeing monitored.

In a particular example method, the communications between the monitoreduser and the monitoring user is implemented in a peer-to-peer networkscheme (i.e. peer-to-peer architecture). For example, run-time softwareof a mobile application resides (is installed) on all monitoring andmonitored mobile communication devices. The monitored mobilecommunication device's run-time software forwards text messages, MMS orother electronic communications to the monitoring mobile communicationsdevice's run-time software and not to an intermediary server. In thisway, an example implementation of some embodiments need not require anintermediary or centralized server (or servers) to carry out itsrun-time functionality. Servers may be implemented for downloadingexample software (e.g., mobile app) to mobile communication devices anduploading keywords and/or images and/or audio clips to the localdatabase or data structure on the monitored user's mobile communicationdevice (non-run-time activities). However, during the run-time executionof the software providing the communication monitoring and alerts, nointermediary or centralized servers are necessary by the exampleapplication software to provide this functionality.

It should be noted that the mobile communications service providers(i.e. Verizon, AT&T, T-Mobile, etc.) may use servers to implement theirspecific services for SMS, MMS, voice mail, live voice communication orinstant messaging (IM), however this level of communication for anexample implementation of the invention is preferably carried out as arequest from the application software to the operating system of themobile communication device, which then requests service to receive aninterrupt pertaining to a new incoming text message or outgoing textmessage, from the mobile communication device's operating system.Another example implementation is to incorporate polling to look for newactivity occurring in the communication buffers for text messages, MMSor other types of electronic communications. Mobile network (cellularnetwork) providers include services for SMS and MMS by incorporatingSMSC (Short Messaging Service Center) and/or MSC (Multimedia MessagingService Center) in there network elements.

Another embodiment provides, among other things, a method for monitoringmobile communication including reading and storing each character inputby a monitored user when entering in information on a monitored mobilecommunication device (e.g. keyboard/keyboard device, on-screen keyboard,voice input, pointing device). The character inputs are analyzed and/orparsed for a text message style communication that utilizes the Internetfor a transmission network (rather than a SMSC or MMSC type network).The content of the text strings (i.e. contiguous characters stored thatwhere input by the user) stored by the software that is intended foranother user to read or see (e.g. text message, images) is transmittedto the monitoring user's mobile communication device.

In an example embodiment, the monitored user's mobile communicationdevice receives characters input on the monitored user's mobilecommunication device and analyzes/parses the character strings for textmessage style communications (the portion of the characters thatcomprise a message or image to be read/viewed by another user) to becompared against a list of predefined text strings, images and videoclips that are deemed to be targeted content, e.g., inappropriate orillegal content, for a direct match or a comparable match. Provided adirect match or comparable match is determined, then the characterstring or image that may have the target content is transmitted(forwarded) to the monitoring user's mobile communication device. Inanother example embodiment, provided a direct match or comparable matchis determined, the example software generates an alert that istransmitted (sent) to the monitoring user's mobile communication device.

In an example embodiment, the information about the names of theapplications (mobile app) running on the monitored mobile communicationdevice can be read from the device's operating system and used by thesoftware as intelligence as to what text messaging type software(Whatsapp, KiK, Snapchat) is being used by the monitored user. Based onthis information, the format of the character strings and images beingcommunicated to other mobile communication devices can be more readilydetermined. For example, Snapchat allows multimedia (for example,pictures) to be transmitted from one party's smartphone to anotherparty's smartphone whereby the user's receiving the pictures on theirsmartphone will only be able to view them for a designated period oftime and then they are no long accessible. This embodiment would, forexample, enable a monitoring user to receive a copy of and store suchpictures for viewing at their convenience.

An example system and method works with two or more mobile communicationdevices (particular non-limiting examples including IPHONE, BLACKBERRY,SAMSUNG GALAXY). At least one mobile communication device is the devicebeing monitored (“Monitored Device”) and at least one additional mobilecommunication device is the device conducting the monitoring(“Monitoring Device”). The monitoring and monitored mobile communicationdevices all have application software (e.g., an app) downloaded,installed and running on the devices in order to implement thefunctionality. In addition, data is stored in a database or datastructures on the monitored mobile communication device for supportingthe application software.

An example application software for monitoring mobile communicationsprovides various functions, such as:

1) the forwarding of communications on the monitored mobilecommunication device(s) to the monitoring mobile communicationdevice(s). It should be noted that a monitored mobile communicationdevice can be monitored by more than one monitoring mobile communicationdevices and that a monitoring mobile communication device can monitormultiple monitored mobile communication devices

2) the generation and transmission of alerts when the applicationsoftware on a monitored mobile communication device determines that acommunication has potentially inappropriate, illegal or target content.This function preferably utilizes a database or data structure ofpredefined text strings, images, audio clips and video clips stored onthe monitored mobile communication device (or on the monitoring mobilecommunications device);

3) the forwarding of characters or images generated by the monitoredmobile communication device as the user types (or otherwise enters in)characters, one by one, on a character input mechanism, an example forwhich is an on-screen keyboard or a physical keyboard, to the monitoringmobile communication device(s) or as the user creates images facilitatedby the mobile communication device, an example for which is a picturetaken using a camera integrated into a mobile phone. Voice recognitioninput mechanisms is another example of an input mechanism to a mobilecommunication device.

Additional embodiments provide, among other things, a method formonitoring mobile communication by reading and storing each image movedfrom memory to the image buffer of the mobile communication device (i.e.the operating system of the mobile communication device) by a monitoreduser (e.g. a picture/photograph to be sent to another user) to be storedby the software and transmitted (forwarded) to the monitoring user'smobile communication device. In this example method, the monitoreduser's mobile communication device moves an image from memory to theimage buffer of the mobile communication device and compares that imageto list of predefined images that are deemed to be targeted content,such as inappropriate, illegal or targeted content, for a direct matchor a comparable match. Provided a direct match or comparable match isdetermined, then the image that may have the targeted content istransmitted (forwarded) to the monitoring user's mobile communicationdevice. Alternatively or additionally, the monitored user's mobilecommunication device moves an image from memory to the image buffer ofthe mobile communication device and compares that image to list ofpredefined images that are deemed to be targeted content for a directmatch or a comparable match. Provided a direct match or comparable matchis determined, then the example software generates an alert that istransmitted (sent) to the monitoring user's mobile communication device.

Example embodiments provide methods and systems for monitoring andanalyzing communications of a monitored user on behalf of a monitoringuser, for transmitting communications (message forwarding) to monitoringusers. Additionally, alerts of potentially inappropriate, illegal ortargeted content are provided (transmitted) to the monitoring users. Forexample, text messages, SMS messages, MMS messages, IMs, e-mails, socialnetwork site postings or voice mails of a child may be monitored onbehalf of a parent. In one embodiment, communications occurring on achild's communication device (cell phone, smartphone, iPod, iPad, etc.)are forwarded (transmitted) to one or more monitoring user(s).

Additionally, an algorithm can be used to analyze the communication formatches (or close similarities) to stored elements (for example, words,text strings, character strings, acronyms, images, audio clips, videoclips) (“Stored Elements”) in a database residing on the communicationdevice being monitored, through a comparison process to assess thepotential of targeted content, such as inappropriate or illegal content.The Stored Elements preferably are updated and uploaded periodically tomaintain up-to-date information in the local database (note that this isan operation that need not be executed as part of some embodiments'run-time functionality, e.g., the upload does not negate an example peerto peer scheme). One reason for the updates is to stay current with thelatest acronyms and short hand used during text messaging (SMS messages)by children. New acronyms with potentially inappropriate or illegalcontent are created by users frequently. For example, currently theacronym GNOC has been known to mean “Get Naked On Camera”. When thealgorithm determines that the communication has a match or closesimilarity to a match, it will generate an alert that is transmitted(sent) to the monitoring user's communication device. In anotherexample, when comparing an image from the monitored user's mobilecommunication device to the Stored Elements, the comparison process mayuse a close proximity match to determine if the image contains sexualcontent. Although there may not be a direct match, it can be determinedthat through a close proximity comparison algorithm, for example, thatan image should be categorized as sexual in its nature.

Although there are many applications for different embodiments, oneexample application enables parents to monitor text messages from theircell phone, smartphone or mobile communication device occurring on theirchildren's cell phones, smartphones or other mobile communicationsdevices. This includes monitoring outgoing messages (e.g. text messages)sent by the child and incoming messages (e.g. text messages) beingtransmitted to the child's cell phone (or communication device) byforwarding the messages to the parent's cell phone, smartphone or mobilecommunication device. The monitoring (or the viewing of these messages)occurs on the parent's cell phone, smartphone or mobile communicationdevice through a mobile app that is installed on the parent's device andchild's device.

In one embodiment, for security purposes, authentication (orregistration) may be performed between the monitoring device and themonitored device (“remote cell phone”) to be monitored, prior to anytext messages or electronic communications being forwarded (transmitted)to the monitoring device. In one embodiment, this is accomplishedthrough a request sent by the monitoring device (or devices) to a cellphone, smartphone or mobile communication device to be monitored(monitored device), e.g., a remote cell phone. The person with theremote cell phone must accept this request to validate the monitoringparty's cell phone, smartphone or mobile communication device andacknowledge that the monitoring party will have the capability tomonitor text messages and other electronic communications occurring ontheir cell phone, smartphone or mobile communication device.

Preferred embodiments will now be discussed with respect to thedrawings. The drawings include schematic figures that are not to scale,which will be fully understood by skilled artisans with reference to theaccompanying description. Features may be exaggerated for purposes ofillustration. From the preferred embodiments, artisans will recognizeadditional features and broader aspects of the invention.

Although several embodiments, examples and illustrations are disclosedbelow, it will be understood by those of ordinary skill in the art thatthe invention(s) described herein extend(s) beyond the specificallydisclosed embodiments, examples and illustrations and includes otheruses of the invention(s) and obvious modifications and equivalentsthereof. Embodiments of the invention(s) are described with reference tothe accompanying figures. The terminology used in the descriptionpresented herein is not intended to be interpreted in any limited orrestrictive manner simply because it is being used in conjunction with adetailed description of certain specific embodiments of theinvention(s). In addition, embodiments of the invention(s) can compriseseveral novel features and it is possible that no single feature issolely responsible for its desirable attributes or is essential topracticing the invention(s) herein described.

Certain aspects, advantages, and novel features are described herein. Itis to be understood that not necessarily all such advantages may beachieved in accordance with any particular embodiment of the invention.Thus, for example, those skilled in the art will recognize that theinvention may be embodied or carried out in a manner that achieves oneadvantage or group of advantages as taught herein without necessarilyachieving other advantages as may be taught or suggested herein.

FIG. 1 is a schematic diagram of an embodiment of a system forfacilitating wireless communication among communication devices, inaccordance with some embodiments. FIG. 1 shows an example of software(mobile app) communicating directly to other mobile communicationdevices in a peer to peer scheme and utilizing a mobile wirelessprovider's SMS/MMS infrastructure (i.e. cellular network). Thisillustrates a mobile wireless communication provider's infrastructureutilized to support some embodiments. FIG. 1 further shows an example ofapplication level software (mobile app) according to particularembodiments. In FIG. 1, arrow with solid line indicates messages beingtransmitted to the monitoring party in a peer to peer scheme at theapplication level. Alerts or warnings are also transmitted to themonitoring party's mobile communication device in a peer to peer schemewhereby the software, data and databases necessary to carry out therun-time functionality of some embodiments reside on the monitoring andmonitored mobile communication devices and do not require logging intoan intermediary server to access the information provided by suchembodiments

FIG. 2 shows a block diagram representing a method for monitoring ofcommunications on mobile communication devices in accordance with someembodiments. In FIG. 2, communications are obtained from one or moremobile communication devices being monitored (a “Monitored Device”) andsuch communications are forwarded to one or more other mobilecommunication devices authenticated to monitor such communications (a“Monitoring Device”). Additionally, should the communications bedetermined to contain targeted content, such as potentiallyinappropriate or illegal content, than an alert will also be transmittedto the mobile communication devices authenticated to monitor theMonitored Device.

Before or concurrently with monitoring, a link is preferably establishedbetween the monitoring user's mobile communication device and themonitored user's mobile communication device. This link can beestablished, for instance by the software requesting and receiving amonitored user's mobile communication devices (e.g., ID number, phonenumber, etc.), sending and receiving (e.g., accepting) a message fromone or more of the devices to another one or more of the devices,handshaking, etc. Establishing the links can be accompanied byauthentication or registration in some embodiments. Such links can bepeer to peer or other direct link, server based, established duringinstallation for one or both of the devices, or in other manners. Suchestablishing of a link can be, but need not be, performed prior to orconcurrently with any of the example methods provided herein.

FIG. 3 shows an example portion of a data structure with stored textstrings, images, audio clips and video clips for the generation ofalerts. The example data structure may be in a database with a library(dictionary) of text strings, images, video clip and audio clips to beused when the software (mobile app) of an embodiment of this inventionanalyzes communications (e.g. SMS, MMS messages, voice mail) fortargeted content, such as inappropriate or illegal content, for thegeneration of alerts to be transmitted from the mobile communicationdevice. The data structure can be part of a database (or standalone) forwhich some embodiments use as a reference to determine, through directmatch or analyzed for a close proximity match, if communications aredeemed to be potentially inappropriate or illegal and warrant an alert(notice or warning) to be generated and transmitted to monitoringparties (e.g. an alert sent to a parent's mobile communication devicewhen potentially inappropriate content was detected on their child'smobile communication device). Example alerts that can be providedinclude but are not limited to, one or more of the following: icon onthe status bar of a monitoring mobile communication device's userinterface/main screen, icon displayed at any designated location on amonitoring mobile communication device user interface, pop up message,text message, SMS, MMS, image, audio clip, live audio message, videoclip, live video message, audio/video clip, live audio/video message,vibration, instant message or any type of notification that can beincorporated with a mobile communication device (of a monitoring user).

An example of a close proximity match is determining if an image in acommunication (e.g. MMS) matches that of an image in the datastructure/database that contains pre-defined text strings, images, audioclips and video clips of potential inappropriate or illegal content.Content analysis may incorporate image comparison, matrix comparison,raster comparison, pixel comparison, facial recognitionalgorithms/software/services or any other technique, software, utility,service or computational model used to determine that an image is aclose match to a defined or target content (PerceptualDiff utility,currently available via the Internet at pdiff.sourceforge.net, is aparticular, non-limiting example).

A specific, non-limiting example application monitors a MMScommunication that has a picture of a female breast. The MMScommunication is compared to similar images in the data structure ordatabase for a reasonable match (close proximity match). If the softwaredeems there is a reasonable match, then an alert may be generated andtransmitted, for example, to the monitoring parties (e.g. parent)indicating that an electronic message with potential sexual content wasdetected. The concept of children engaging in the transmission/receiptof sexually explicit images on smartphones (“Sexting”) activities hasbecome an issue with mobile communications, and such activity between aminor and an adult is currently illegal in the United States.

Preferably, example systems and methods accomplish their run-timefunctionality for providing monitoring capabilities and alerts through apeer to peer network scheme (i.e. peer to peer network architecture).Advantages to the peer to peer network scheme for this exampleapplication include but are not limited to the following:

1) Ease of use—There is no need to login to a server through aweb-browser on a cell phone, smartphone, mobile communication device,computer, PC, tablet PC or any other computing device that can browsethe Internet in order to access text messages being monitored. Exampleembodiments use application software (mobile app) that runs (isexecuted) on the monitoring and monitored cell phones hardware directlyand receives and stores the text messages being monitored in the memory(database) of the monitoring cell phone, smartphone or mobilecommunication device hardware directly and not on an intermediary orcentralized server.

2) Better data security for the text messages being monitored—Being thatall the text messages being forwarded (transmitted) to the monitoringcell phone, smartphone or mobile communication device are storedexclusively on the monitoring party's cell phone, smartphone or mobilecommunication device and not on a remote server or intermediary server,the potential for a security breach from an outside party is greatlyreduced.

3) Real-time monitoring—This technology enables the monitoring party toreceive the text messages and alerts on their cell phone, smartphone ormobile communication device in near real-time (approximately at the timethey occur on the child's cell phone, smartphone or mobile communicationdevice) and without any additional latency (delays) introduced by aserver-based architecture (i.e. two-tier architecture, client/serverarchitecture).

In other words, no servers are needed to display the text messagesprovided by the real-time text message monitoring feature and alerts ofsuch example run-time embodiments. Servers may be implemented to uploadthe application software (mobile app) or data to a mobile communicationdevice, For example, uploading the most recent, up-to-date list of textstrings, images, audio clips and video clips to the data structure ordatabase containing targeted content. Servers may be implemented byservices utilized, for which a specific non-limiting example is servicesof a cellular communications service provider or also known as wirelesscommunications service provider (FIG. 1).

To further clarify this point, the application software, data, databasesand signaling/control information for implementing the run-time aspectof such example embodiments is self-contained on the cell phones,smartphones or mobile communication devices themselves and does not relyon an external server to facilitate or provide any aspect of itsspecific application functionality.

The example application software only needs to reside on at least onemonitored mobile communication device (cell phone) and one monitoringmobile communication device (cell phone) (in any suitable distribution)in order to provide the functionality of this technology, though it canreside on multiple devices if desired. In other words, the technology'sapplication software preferably resides on a minimum of one cell phone(displaying the text messages, pictures, electronic communications andalerts, being monitored) and a minimum of one cell phone whose textmessages are being monitored and forwarded to the cell phone that isdoing the monitoring. The near real-time monitoring function in suchexample embodiments is implemented as a peer to peer network scheme(architecture) and does not require an intermediary server (e.g.application server) for executing its functionality for monitoringelectronic communications (e.g. text messages) or providing alerts. Inthis context, the example application software operates in a peer topeer network scheme implementing direct node to node communication whenissuing a command to transmit (forward) text messages or electroniccommunications from the monitored cell phone (mobile communicationdevice) to the monitoring cell phone (mobile communication device) incontrast to a server-based network scheme whereby one or more cellphones (mobile communication devices) communicate with or transmit textmessages or electronic communications to a computer server (that is notitself a cell phone, smartphone or mobile communication device).However, at least some embodiments may adopt some server basedfunctionality.

FIG. 4 shows a depiction of near real-time text message or SMS messagemonitoring for cell phones, smartphones or mobile communication devices.One example application may be a parent monitoring theirchild's/children's mobile communication device whereby the parentreceives copies of text messages or SMS messages coming into (beingreceived by) and going out (being transmitted out of) of the child'smobile communication device. Such an embodiment may be viewed as amessage forwarding scheme.

Another way to view this is that the software (mobile app) in thisembodiment forwards incoming and outgoing text messages or SMS messagesfrom the child's mobile communication device (“monitored device”) to theparent's mobile communication device (“monitoring device”). All textmessages (incoming & outgoing) occurring on the child's cell phone(mobile communication device) are relayed (forwarded) to the parent'scell phone (mobile communication device) by the example mobile app. Thedata (e.g., text messages to be monitored) preferably are stored on thechild's and parent's cell phone and not on an intermediary orcentralized server. The mobile app preferably is installed on theparent's cell phone (mobile communication device) and the child's cellphone (mobile communication device) and contains the execution code(i.e. software), database(s), libraries and data (including textmessages and electronic messages) to perform all operations necessary tocarry out the functionality of example methods.

Although not illustrated by FIG. 4, monitoring of more than one cellphone (mobile communication device) to be monitored can be done from thesame mobile app. Additionally, more than one monitoring party canmonitor the same child or children. For security purposes, optionalauthentication or registration may be performed on the monitoringparty's cell phone or to register the monitoring party's cell phone tothe monitored party's cell phone prior to any text messages beingrelayed (sent).

Although the above embodiment provides distinct advantages for manyapplications as discussed, in some other applications use of a cloudcomputing, grid computing, autonomic computing configuration or othertypes of network or computing schemes may be useful.

FIG. 5 is a depiction of an embodiment for a parent monitoring theirchild's/children's mobile communication device by receiving copies ofoutgoing text messages or SMS being transmitted out of the communicationdevice. This embodiment could be viewed as a message forwarding scheme.More specifically, the example software (mobile app) forwards outgoingtext messages or SMS messages from the child's mobile communicationdevice to the parent's mobile communication device. FIG. 5 illustratesnear real-time SMS message (text message) monitoring for cell phones(e.g., “smartphones,” or other mobile communication devices) of outgoingSMS messages (text messages), implemented as a peer-to-peer networkarchitecture. All outgoing text messages occurring on the child's cellphone are relayed (sent) to the parent's cell phone by the mobile app.The data (text messages to be monitored) preferably are storedexclusively on the child's and parent's cell phone and not on anintermediary or centralized server. The example mobile app is installedon the parent's cell phone and the child's cell phone and contains theexecution code, database, libraries and data (including text messages orelectronic messages) to perform all operations necessary to carry outthe functionality of some embodiment. Although not illustrated by thisdiagram, monitoring of more than one party's mobile communication devicecan be performed from a single monitoring mobile communication device.Additionally, more than one monitoring party's mobile communicationdevice can monitor the same child's or children's mobile communicationdevice (monitored mobile communication device). For security purposes,optional authentication or registration may be performed on themonitoring party's cell phone prior to any text messages or electronicmessages being forwarded (transmitted).

Various example monitoring methods are shown in FIGS. 6-15. Forinstance, one particular example use for this technology, as a mobileapplication (mobile app), is to enable a parent to monitor the textmessages occurring on their children's cell phones from their personalcell phone (e.g., FIG. 4). However, in addition to text messagemonitoring, this can enable the monitoring of other activities orfeatures that can occur on a child's cell phone including but notlimited to the monitoring of incoming and outgoing MMS messages (FIG.7), images, audio messages, video messages, audio/video messages (FIG.8) and other types of electronic messages (FIG. 9).

Other examples of monitoring functionality that this technology enableson cell phones, smartphones or mobile communication devices include, butare not limited to, cell phone conversations (voice phone calls)monitoring (monitoring cell phone numbers called/received), websites(URLs) visited, applications installed or uninstalled on a remotedevice, the turning on/off of the GPS or other location detectingtechnologies, features or services that may exist today or in the futureon a remote cell phone (or communication device) to be used inidentifying the location of the remote cell phone or communicationdevice (e.g. to find the location of a child), other tracking featuresthat can be used to proactively alert parents when a child travelsbeyond certain geographical boundaries or predefined limits related togeographical position and any or all statistics or metrics related tothe aforementioned functions or any other functions that can bemonitored on a cell phone, smartphone or mobile communication device.Some examples of statistics include: the number of text messagesreceived from a particular contact, the number of text messages sent toa particular contact, which contacts communicated to the most to thechild's cell phone (smartphone), the number of new contacts made duringa particular timeframe, how many times a child left and entered aparticular geographic zone (i.e. residence) and the associated dates andtimes, the number of times a particular website was visited, the numberof new websites visited in a particular timeframe, and others.

Particular example embodiments provide the near real-time monitoring oftext messages, SMS or MMS messages from a third party cell phone (themonitoring cell phone) for all incoming and outgoing text messages, SMSor MMS messages occurring on a designated cell phone to be monitored(the remote cell phone) and any other mobile communication devices suchas a smartphone, PDA, tablet PC or computer that can transmit andreceive text messages, electronic messages, SMS or MMS messages viacellular technology, Internet technology or other types of datacommunication technologies that enable computers or mobile communicationdevices to communicate and share data existing today or in the future,as shown in FIGS. 4, 6, and 7.

FIG. 6 is a flowchart illustrating an example process for providingcopies of SMS or text message communications from a mobile communicationdevice being monitored to one or more mobile communication devicesoptionally authenticated to monitor such communications in accordancewith some embodiments.

FIG. 7 is a flowchart illustrating an example process for providingcopies of MMS communications or images from a mobile communicationdevice being monitored to one or more mobile communication devicesoptionally authenticated to monitor such communications in accordancewith some embodiments.

FIG. 8 is a flowchart illustrating an example process for providingcopies of audio, video or audio/video communications from a mobilecommunication device being monitored to one or more mobile communicationdevices optionally authenticated to monitor such communications inaccordance with some embodiments.

FIG. 9 is a flowchart illustrating an example process for providingcopies of any electronic message from a mobile communication devicebeing monitored to one or more mobile communication devices optionallyauthenticated to monitor such electronic messages in accordance withsome embodiments.

Another embodiment provides a method for transmitting only the incomingtext messages, SMS, MMS messages or any type of electronic messagecommunication occurring on one or more mobile communication devicesbeing monitored (e.g. child's cell phone) to a monitoring mobilecommunication device (FIG. 11). One example use would be for a parent tobe able to monitor from their smartphone, text messages their child isreceiving on their smartphone from one or more parties. FIG. 11 is aflowchart illustrating an example process for providing copies ofincoming text messages, SMS, MMS or any electronic messagecommunications from a mobile communication device being monitored to oneor more mobile communication devices optionally authenticated to monitorsuch communications in accordance with some embodiments. FIG. 10 is aflowchart illustrating an example process for providing copies ofoutgoing text messages, SMS, MMS or any electronic message communicationfrom a mobile communication device being monitored to one or more mobilecommunication devices optionally authenticated to monitor suchcommunications in accordance with some embodiments. One example usewould be for a parent to be able to monitor from their smartphone, textmessages their child is transmitting on their smartphone to one or moreparties.

Another embodiment of this technology provides a method for transmittingonly the incoming and/or outgoing text messages, SMS, MMS, images, audioclips, video clips, audio/video clips or electronic messaging from amobile communication device being monitored to monitoring mobilecommunication devices that have/include a word, text string, image,image snippet, audio clip, video clip or other identifier that has beenpredefined or is target content (FIG. 12). FIG. 12 is a flowchartillustrating an example process for providing copies of text messages,SMS, MMS, images, audio clips, video clips or any electronic messagecommunications, based on certain conditions being met, from a mobilecommunication device being monitored to one or more mobile communicationdevices optionally authenticated to monitor such communications inaccordance with some embodiments. One example use of this embodiment isto enable a parent to received copies of text messages, SMS, MMS,images, audio, video or other electronic messages that match or have aclose proximity match to targeted words, text strings, acronyms, shorthand, codes, images, image snippets, audio, video or other identifiers.This allows a parent to judiciously monitor their children's electronicmessaging content only when there are reasonable grounds or probablycause.

Alerts can optionally be generated and displayed on the MonitoringParty's mobile communication device (cell phone) indicating that a matchor close proximity match was detected based on the comparison of thecommunication content to the predefined words, text strings, acronyms,short hand, codes, images, image snippets, audio, video, audio/video orother identifiers (FIG. 13). FIG. 13 is a flowchart illustrating anexample process for transmitting alerts (warnings) to one or more mobilecommunication devices optionally authenticated to monitor communicationson the mobile communication device being monitored when certainconditions have been met based on predefined data stored (StoredElements) or targeted content has been matched or reasonably matched(close proximity match) in a local data structure or database on themobile communication device being monitored or the monitoring mobilecommunication device, which is in accordance with some embodiments.

Another embodiment of this technology provides a method for transmittingincoming and/or outgoing voice/audio content or clips that match orreasonably match (close proximity match) a predefined audio content/clip(targeted content) stored in a library or database (FIG. 14). FIG. 14 isa flowchart illustrating an example process for providing copies ofincoming audio communications (message) or video communications(message), based on certain conditions being met, from a mobilecommunication device being monitored to one or more mobile communicationdevices optionally authenticated to monitor such communications inaccordance with some embodiments.

One example use of this embodiment is to enable a parent to monitorvoice/audio calls for selected words, sounds or other audio identifiers.This allows a parent to monitor their children's phone (audio)conversations by receiving specific audio clips, words, sounds, or otheraudio identifiers that match those that were predefined, when they occuron their children's cell phone(s) or mobile communication device. Alertscan also be sent to the monitoring party's cell phone or mobilecommunication device indicating that a match or close proximity matchhas occurred.

FIG. 15 is a flowchart illustrating an example process for providingcopies of all keystrokes or characters entered in (e.g., text message),images, audio, video, audio/video or multimedia message created (e.g.pictures from camera feature on mobile a device) on a mobilecommunication device being monitored by one or more mobile communicationdevices optionally authenticated to monitor such keystrokes, characters,images, audio content, video content, audio/video content or multimediamessages in accordance with some embodiments.

FIG. 16 is a schematic diagram of an embodiment for facilitatingwireless communication among communication devices, in accordance withsome embodiments. In particular with this example, communications can bethrough the Internet via a Wi-Fi, Bluetooth or other wireless technologyconnection.

FIG. 17 is an example of a user interface that may be incorporated onthe monitoring cell phone, smartphone or other mobile communicationdevice to enable the monitoring user to view, in the case of firmware,text messages or SMS that have occurred on the monitored user's cellphone, smartphone or mobile communication device, and are about to occur(past and present). That is, if a monitoring user opened this userinterface on their mobile communication device on a specific day, a copyor log of all text messages, for example, from the previous day'scommunication on the monitored user mobile communication device would beaccessible by scrolling backwards on the interface. Additionally andfollowing this logic, other past day's text messages or SMS (2 daysprevious, 3 days previous and so on) would be accessible by themonitoring user on this user interface. In another instance of thisexample, if a new text message or SMS is generated by the monitored userwhile the monitoring user is on/viewing this example user interface,then the new text message or SMS would be displayed in near real-time onthe user interface (in chronological order with the other text messagesor SMS). Therefore, the user would see the text message or SMS appear onthe user interface in near real-time as it was generated on themonitored user's cell phone, smartphone or mobile communication device.

A text message or SMS displayed on this example user interface couldoptionally include all information that a typical text message or SMSwould make available to software or a mobile application (mobile app)such as time and date stamp of when it was received or transmittedon/from the monitored user interface, the phone number or useridentification number of the monitored user's or one or more 3^(rd)party cell phones, smartphones or mobile communication devices involvedin the communication and any other information pertinent or availablefrom the message, from the messaging service providing the text messageor SMS or information related to the message. Additionally, this exampleuser interface would allow a pre-determined total number of textmessages or SMS to be stored for display (viewing may be implemented byenabling scrolling backwards and forward on the user interface) and inthis example, the software would either rewrite over the oldest messagewhen the storage limit was achieved by implementing a circular buffertechnique or would generate a warning message to the monitoring user'scell phone, smartphone or mobile communication device indicating thatthe text message or SMS log was full and that it should be cleared orindividual messages of the choice of the user should be deleted to makeroom for new, incoming text messages or SMS.

FIG. 18 is an example of a user interface that may be incorporated onthe monitoring cell phone, smartphone or mobile communication device fordisplaying a text message or SMS that is associated with an alert (orwarning) that was generated by the software because it detected targetedcontent (e.g. possible inappropriate content) that occurred on themonitored user's cell phone, smartphone or mobile communication device.In this example, the alert causes at least 2 actions to occur on themonitoring user's cell phone, smartphone or mobile communicationdevice. 1) It enables the monitoring user to open up or invoke a userinterface, like the example user interface (FIG. 18), that will displaythe text message or SMS that the software matched or determined was aclose proximity match to target content stored in a local database oneither the monitored user's cell phone, smartphone or other mobilecommunication device or on the monitoring user's cell phone, smartphoneor other mobile communication device; 2) The software will display analert that would attempt to capture the attention of the monitoring userto make he/she aware that a warning (alert) has occurred. This alertcould be displayed, for example, as an icon on the status bar of theprimary user interface of a cell phone, smartphone or other mobilecommunication device (FIG. 18) or it could be in the form of a textmessage, pop up message, audio message, image message, instant messageor other type of message that would attempt to gain the attention of themonitoring user when they looked at the display of or used their cellphone, smartphone or other mobile communication device.

Example embodiments of the near real-time electronic messaging (with anexample being text messaging) monitoring feature disclosed hereinprovide, among other things, a method for monitoring text messages orSMS occurring on one or more monitored mobile communications devices(with examples including, but not limited to, tablet PCs, laptops,gaming devices, music players, PDAs, mobile communication devices,smartphones, cell phones (e.g. children's cell phones)) by anotherparty's monitoring mobile communications device (e.g. parental cellphone).

Other embodiments provide a method for transmitting incoming and/oroutgoing video content or clips that match or reasonably match (closeproximity match) a predefined video content/clip stored in a library ordatabase on either the monitored or monitoring mobile communicationdevice. One example use of such embodiments is to enable a parent tomonitor video content for selected images, moving pictures or othervideo identifiers. This allows a parent to monitor incoming and outgoingvideo content occurring on their children's cell phone(s). Alerts canalso be sent to the monitoring party's cell phone indicating when amatch or close proximity match has occurred. Once the alert isrecognized by the parent, they can watch the actual video content thattriggered the alert from the convenience of their own cell phone ormobile communication device. In such embodiments, video content mayinclude the audio content accompanying the video whereby either thevideo content and/or the audio content (similar to the method in theprevious provision that monitors audio phone conversations), can bemonitored for generating alerts.

Still other embodiments provide a method for transmitting only theincoming and/or outgoing text messages to a third party cell phone thatare associated with one or more preselected contacts (contact names)and/or phone number(s) and/or other communicating identifier by themonitoring party (e.g. parent or guardian). This enables a parent tolimit the text messages being monitored based on certain contact(s)and/or phone number(s) that they preselect.

Other example embodiments provide a method for alerting the monitoringcell phone(s) when potentially inappropriate, illegal or targetedcontent is detected within a text message, SMS, MMS, audio message(words communicated through voice), audio/video message, video, images,or electronic message or during a phone (audio) conversation. Thisincludes words, acronyms, short hand, codes, audio clips, voiceexcerpts, sounds, images, image snippets or other identifiers that are,or are known to have meaning that may be considered inappropriate orillegal or defined as targeted content. The application software runningon the monitored device (e.g., cell phone) can have a library of words,acronyms, short hand, codes, images, image snippets, audio clips, voiceexcerpts, video and other identifiers stored in a database that may beillegal or considered inappropriate by a parent, guardian or society.When this type of inappropriate content is detected by the applicationsoftware running on one or more of the cell phones being monitored, analert is sent to the monitoring device (e.g., see FIG. 13) fornotification purposes.

One intended use for this embodiment is to notify the user of themonitoring device, in near real-time, that the user of the monitoreddevice may be engaged in or was engaged in inappropriate or illegalelectronic communications (e.g. text message, MMS, audio message (wordscommunicated through voice), audio/video message or electronic message).Updates to the database (library) of words, acronyms, short hand, codes,images, image snippets, audio clips, voice excerpts, video and otheridentifiers are (or can be) provided to the end users as part of aservice model for this technology and are uploaded to the database onthe monitored device (e.g., cell phone) periodically.

In example embodiments herein, the method in which these alerts areexecuted during run-time is in a peer to peer scheme (i.e. peer to peernetwork architecture). That is the library of inappropriate words,acronyms, short hand, codes, images, image snippets, audio clips, voiceexcerpts, video and other identifiers (“Watch Words”) and also taughtherein as targeted content is stored on the cell phone, smartphone ormobile communication device directly. In addition, the mobile appsoftware that evaluates the Watch Words or targeted content and receivesand displays alerts is stored on the Monitored Party's or MonitoringParty's cell phones (mobile communication devices) and not on any otherintermediary server.

Another embodiment is a method for monitoring electronic communicationscomprising the steps of:

-   -   Receiving or communicating a first electronic message from or to        a third party with a first mobile communications device;    -   using a first application stored on the first communications        device to monitor and store the first message;    -   using the first application to communicate a second message that        is a copy of the first message or includes information        describing at least some aspect of the first message to a second        application that is stored on a second mobile communications        device; and, using the second application to receive the second        message and to display the information.

Still another embodiment is a method for monitoring electroniccommunications on a mobile communication device by reading thecharacters, text strings, images, audio and videos generated by the user(“Input Elements”) and then, analyze and compare the Input Elements toor against predefined text strings, images, audio content, audio/videocontent and/or videos stored in a local data structure or database. Incontrast to SMS and MMS communications which utilize a wirelesscommunications provider's network (cellular network) for transmittingand receiving communications and may use the mobile communicationdevice's (smartphone) operating system and communication buffers (i.e.SMS buffer or MMS buffer) to facilitate the occurrence of a SMS messageor MMS message (for example, an interrupt generated by the operatingsystem to tell the software/app that a new SMS message was received) andthe replication of such a SMS message or MMS message (for example, thecopying of a SMS message from a communication buffer (SMS buffer) to adatabase). In contrast, this embodiment enables the monitoring ofcommunications to/from messaging applications (i.e. mobile apps thatincorporate SMS-like functionality, MMS-like functionality or both),also referred to as Mobile Messaging Apps, that currently utilize Wi-Fi,Bluetooth or other wireless technology to connect a smartphone or mobilecommunication device to the Internet to transmit and receive textmessages, images, audio content, audio/video content, electronicmessages and videos. Example mobile apps for this are, but not limitedto, WhatsApp, MessageMe, KiK, TextNow, WeChat.

Input Elements include user interactions on a mobile communicationdevice that include, but are not limited to, entering in characters on akeyboard, on-screen keyboard or voice recognition mechanism ordepressing icons on a mobile communication device that activate apicture/image to be taken and/or audio/video to be captured. In onecircumstance, the input/output buffers associated with the mobilecommunication device's operating system is not utilized for transmittingand receiving messages, images and videos, the application software isrequired to analyze the users input entered in on the mobilecommunication device to determine the communication being transmitted.For example, this could be a text message, image, audio clip,audio/video clip, electronic message or video being transmitted over theInternet via a Wi-Fi, Bluetooth or other wireless technology connection.After analysis is performed, the communication is compared to apredefined database or data structure of text strings, images, audioclips, video clips or target content (“Target Element Data”) stored onthe Monitored Party's or Monitoring Party's mobile communication device(FIG. 3). The comparison to the Target Element Data may also occur onthe monitoring data communication device in addition to the TargetElement Data being stored on the monitoring data communication device.Provided there is a match or a close proximity match, then thecommunication and/or associated alert (warning) is transmitted to themobile communication devices optionally authenticated or registered tomonitor such communications. Further, the software may obtaininformation about applications (mobile apps) running on the monitoredusers' mobile communication device from a monitored user's mobilecommunication device's operating system. This information may be used tofacilitate the parsing and analysis of text messages, images, audio andvideo based on previously determined communication protocols, datastructure definitions, formatting definitions, services, characterformatting and/or device input protocols or formats learned or knownabout the protocols, data structures, formats, techniques or servicesimplemented by each specific application (mobile app).

Again, it is preferred that the example application software is intendedto enable communications, most preferably during run-time, between twoor more mobile communication devices (e.g. cell phones, smartphones,iPads, iPods) in a peer to peer network architecture (scheme).

The summary and embodiments described herein are to be understood asbeing in every respect exemplary, but not restrictive, and the scope ofthe invention disclose herein is not to be determined strictly from thesummary and embodiments, but rather as interpreted according to the fullbreadth permitted by the patent laws. It is understood that theembodiments described herein are only illustrative of the principles ofthe present invention and that various modifications may be implementedby those skilled in the art without departing from the scope and spiritof the invention. Those skilled in the art could implement various otherfeature combinations and additions without departing from the scope andspirit of the invention. For example, there are made embodiments thatcite a single mobile communication device being monitored and it shouldbe known that these embodiments can allow for multiple mobilecommunication devices being monitored. An example for which would be aparent who has two or more children that they wish to monitor mobilecommunications for.

As discussed throughout this document, various features and elements ofsome invention embodiments will be discussed and illustrated. It will beappreciated that such discussion is for the purposes of illustrationonly, and is not intended to limit the scope of the invention. As anexample, many invention embodiments will find utility when practicedwith portable phones such as cellular phones, smartphones, iPhones,Blackberry, Android, Windows phone or any mobile phone or mobile devicewith memory and processor running an operating system referred to hereinas “cell phone” or “cell phones.” Cell phone in the context of thisspecification also means a cellular phone with an operating system thatis capable of running a mobile app. A common term (or name) for thistype of phone is “smartphone”. Examples of smartphones currently on themarket include but are not limited to iPhone 5, Samsung Galaxy S5 andthe Motorola Droid RAZR M.

It will be appreciated, however, that the inventive technology is usefulwith a wide variety of mobile communications devices, and cell phoneswith operating systems (“smartphones”) are but one example. Such devicesinclude but are not limited to portable processor based devices such aslaptops, tablets, gaming devices, entertainment devices, music players,cameras, smart phones, dedicated devices, and others. Additionally,reference is made by way of illustration to texting and instantmessaging. These are but two examples of electronic communications thatdifferent embodiments of the invention will find utility with.Additionally, many applications are described in the context of a parentmonitoring a child. It will be appreciated that many other applicationsare likewise within the scope of the invention, with virtually anyapplication in which a first user desires to monitor some aspects ofcommunications occurring via a second user. It will be appreciated thatthe use of these terms herein is intended to illustrate specificembodiments only, and will be appreciated that many otherdevices/terms/technologies will be applicable.

While various embodiments of the present invention have been shown anddescribed, it should be understood that other modifications,substitutions, and alternatives are apparent to one of ordinary skill inthe art. Such modifications, substitutions, and alternatives can be madewithout departing from the spirit and scope of the invention, whichshould be determined from the appended claims.

Various features of the invention are set forth in the appended claims.

What is claimed is:
 1. A method for monitoring mobile communication andgenerating alerts associated with targeted content, the methodcomprising: establishing a link between a monitoring user's mobilecommunication device and a monitored user's mobile communication deviceto receive communications for monitoring purposes; the monitored user'smobile communication device forwarding an incoming or outgoingcommunication to the monitoring user's mobile communication device; themonitored user's or monitoring user's mobile communication devicegenerating an alert if the incoming or outgoing communication on themonitored user's mobile communication device contains targeted content;and the monitoring user's mobile communication device providing thealert indicating that the incoming or outgoing communication containstargeted content; wherein the outgoing communications forwarded from themonitored user's mobile communication device to the monitoring user'smobile communication device are implemented in a peer-to-peer networkarchitecture; wherein the monitored user's mobile communication devicereceives or transmits an electronic message comprising one or more oftext messages, images, audio clips, video clips, SMS or MMS messages;the monitored user's mobile communication device comparing theelectronic message to a list of predefined text strings, images, audioclips, or video clips previously determined to be targeted content; andpredicated on a match or a comparable match, the monitored user's mobilecommunication device forwarding (transmitting) the electronic message tothe monitoring user's mobile communication device.
 2. The method ofclaim 1, wherein a monitoring user's mobile communication device isauthenticated to receive communications from the monitored user's mobilecommunication device for monitoring purposes.
 3. The method of claim 1,wherein the incoming or outgoing communication comprises at least onetext message or SMS message.
 4. The method of claim 1, wherein theincoming or outgoing communication comprises at least one image or MMSmessage.
 5. The method of claim 1, wherein the incoming or outgoingcommunication comprises at least one voice mail message.
 6. The methodof claim 1, wherein the incoming or outgoing communication comprises atleast one live voice communication session or excerpt of a live voicecommunication session.
 7. The method of claim 1, wherein the incoming oroutgoing communication comprises at least one video clip.
 8. The methodof claim 1 further comprising: the monitoring user's mobilecommunication device further providing a description of the targetedcontent on the monitoring user's mobile communication device for reviewby the monitoring user.
 9. The method of claim 1, wherein the incomingor outgoing communication comprises at least one electronic message. 10.The method of claim 1, wherein the forwarded communications from themonitored user's mobile communication device to the monitoring user'smobile communication device are exclusively outgoing (outbound)communications from the monitored user to one of more third parties. 11.The method of claim 1, wherein forwarded communications from themonitored user's mobile communication device to the monitoring user'smobile communication device are exclusively incoming (inbound)communications to the monitored user from one of more third parties. 12.The method of claim 1, wherein the monitored user's mobile communicationdevice receives or is transmitting an electronic message comprising oneor more of text messages, images, audio clips, video clips, SMS or MMSmessages; and the monitored user's or monitoring user's mobilecommunication device comparing the electronic message to a list ofpredefined text strings, images, audio clips, and/or video clipspreviously determined to be targeted content; and predicated on a matchor a comparable match, the monitored user's mobile communication devicetransmitting an alert to the monitoring user's communication devicenotifying that potential inappropriate or targeted content was detectedor the monitoring user's mobile communication device generating an alertnotifying that potential inappropriate or targeted content was detected.13. The method of claim 1, wherein said established link comprises anauthentication.