System And Method For Managing A Mobile Device

ABSTRACT

A system and method for managing a mobile device(s) to provide for a notification(s) when specified thresholds are reached and/or execute defined rules for the mobile device(s). The rules can relate to any function of the mobile device(s), including but not limited to, notification when a percentage of voice/data/SMS is reached during a billing cycle, notification when a mobile device(s) leaves a geo-fence, and restrict a mobile device(s) when a threshold is reached. The system provides a versatile management system allowing a user to effectively control use of a mobile device(s) and manage costs.

FIELD OF THE INVENTION

The invention relates to a system and method for managing a mobilecommunication device, and more particularly, to a system and method forproviding enhanced control over a smartphone device.

BACKGROUND OF THE INVENTION

The use of mobile phones, and in particular, smart phones, has increasedmarkedly. Unlike traditional mobile phones, smart phones provideenhanced data management and processing capabilities. For example, smartphones are capable of: connecting to the Internet, presenting imagefiles, running videos, streaming media, opening and editing documents,files and presentations, and downloading and installing numerous typesof applications to run on the smartphone.

Increasingly smart phones are being used by students and young familymembers who have virtually unlimited access to the above-describedfunctionality, some of which are very data intensive. Lack of experiencein using and paying for telecommunications services, coupled with heavydata usage may lead to a large voice/data bill at the end of the billingcycle sometimes called “bill shock.” This is especially so with therising popularity of streaming media, text messaging and theproliferation of numerous applications “Apps” that can be purchased fora relatively low price (or provided free of charge) and downloadeddirectly to a smart phone.

In addition to the freedom to access and download vast amounts of datawith a smart phone, the growing popularity of smart phones is increasingthe use of these devices by younger generations (e.g., school ageusers). Rather than waiting for breaks between classes to communicate,students have the ability to communicate anytime and anywhere (includingwhile in classes). With the rising popularity of text messaging, datausage by younger uses continues to escalate as well as the ability toaccess multimedia while in class. Another problem with smart phone useby students is the unlimited ability of students to access and obtaininformation during class when they shouldn't, such as, for example, whentaking a test. Additionally, younger users of mobile devices haveincreasingly utilized voice and data features late into the eveninghours, which can have a negative impact on the amount of sleep theyobtain.

In addition to the many voice and data features listed above, smartphones are capable of providing for other functionality relating tolocation finding. For example, smartphones are capable of locating thedevice so as to provide a current location and directions for the userof the device. As students increasingly face a range of personal safetyissues, it is contemplated that the location finding technology can beutilized in a number of ways to enhance security for the student.

SUMMARY OF THE INVENTION

Accordingly, what is desired then is a system and method that helps toprevent mobile device “bill shock” and provide parental control formobile device use.

It is also desired to provide a system and method that allows forchecking on the current usage of a voice and/or data plan during abilling cycle so as to determine actual usage at that point during thebilling cycle.

It is further desired to provide a system and method that will provide anotification to a user/administrator/parent/etc. when certain thresholdshave been reached or exceeded relating to a voice/data plan during abilling cycle.

It is still further desired to provide a system and method that willallow a user/administrator/parent/etc. to set custom criteria forreceiving a notification relating to a voice/data plan during a billingcycle.

It is yet further desired to provide a system and method that will allowa user/administrator/parent/etc. to set restrictions on the time,location, phone number(s), applications and data source(s) a user mayaccess with a mobile device(s).

It is also desired to provide a system and method that utilizes thelocation finding ability of a mobile device to provide enhanced securityand alerting capabilities for parents and for users.

These and other objects are achieved by the provision of a system thatallows, for example, for a parent to monitor and set limits as well aslimit usage periods on a student's voice/data usage with the student'ssmart phone. The term “smart phone” as used herein means a mobile devicebuilt on a mobile computing platform.

In one embodiment, the present invention provides a fully integratedsystem where an administrator (e.g., a parent), may log onto a websiteand register various mobile devices for inclusion in the family'stelecommunications network for monitoring of a user (e.g., a child)mobile device. The website provides a real-time, user-friendly solutionthat allows the parent to easily monitor and limit telecommunicationsexpenses, while ensuring the safety of their loved ones in anincreasingly mobile world.

In one embodiment, the administrator can define notifications that willnotify the administrator if the user has exceeded a voice and/or datalimit for a mobile device during a billing cycle. The administrator canset usage limits such that the mobile device is “cut off” when certaindefined limits are reached to ensure that “bill shock” is avoided.Likewise, the notifications can be based, not only on voice/data usage,but on the time of the usage and duration of the usage. For example, aparent may want to be notified that a child was using the mobile devicefrom 2 am to 4 am. It is further contemplated that the administrator maydesired to provide for limited mobile device usage during certain hoursof the day (e.g., no voice/data usage from 12 midnight through 7 am; orno voice/data usage during school hours).

Still further, an administrator may want to define particularlimitations, but still allow for use of other features on the mobiledevice based on time and/or location. For example, a parent may want torestrict the voice/data usage for a mobile device when the student is atschool during class hours. However, the parent wants the child to alwaysbe able to call certain phone number the parents phone(home/mobile/work/etc.), a relative's phone, the school number, or anemergency number (police/fire/911/etc.). As stated above, therestriction in voice/data usage could be based on both time andlocation. In the circumstance stated above, the student's mobile devicewould be restricted when the mobile device was in a pre-definedgeo-fence (e.g., surrounding the school or area defined by the parent).During weekends, the restriction would not apply, or if the student wasoutside the geo-fence, the restriction would not apply. Alternatively,the student's voice usage could be restricted in duration. In thisembodiment, the parent could limit the duration (i.e., 5 minutes) ofphone calls during school hours, while still providing exceptions tothis rule. It can be seen that the parent can create a fully customizedsystem effectively mixing and matching rules for voice/data usage asdesired where each mobile device can be treated separately.

Alternatively, the administrator could define a notification to begenerated if the mobile device left the geo-fence during a defined time(e.g., left the school area during school hours).

It should be understood that the term “notification” as used herein canbe applied to an alert that an administrator has access to informing theadministrator that a threshold has been reached or exceeded or thatattention should be given to a matter. For example, the notification maycomprise an email or a text message that is pushed out to theadministrator. The email or text may define the issue or may alert theadministrator to log onto the website to see the notification.Alternatively, the notification may be in the form of an alert that ispresented to the administrator when the administrator logs onto thewebsite (e.g., a red message flag is presented). In any event, thepurpose is to bring a message to the administrator's attention. Theadministrator may further be presented with an option or series ofoptions as to whether to limit further access by the mobile device or tocontinue to allow the mobile device to function. For example, in oneembodiment, a notification may be generated and sent to a parent'smobile phone that a child's data limit is 50% consumed while only oneweek into the billing cycle. The parent has the option to limit datausage for the next week until the billing cycle is halfway complete.Alternatively, the parent could allow continued usage, but automaticallyshut off usage when 100% usage for the billing cycle is reached. Stillfurther, a notification could also be sent to the user device (thechild's phone) informing the child of the usage. For example, anotification could be sent to the user device at 25% usage, at 50%usage, at 75% usage and at 100% usage, or any defined percentage.Whereas, a notification may be sent to the parent's mobile device (oremail, etc.) at selected times and usage thresholds. The object is toprovide feedback so as to avoid overages charges. While the use of apercentage has been provided above, it should be understood that othercategories may be monitored and/or reported, including, for example butnot limited to, measuring bytes, measuring dollars or money such that analert could be provided on a dollar/money overage basis, and so on. Thiswould provide maximum flexibility for the parent to monitor and set upalerts as desired.

In still another embodiment, the administrator could be provided with anotification that identifies that a usage threshold has been reached(whether usage amount only, or a combination of usage and time in thebilling cycle) and could provide feedback or input to the administratorrelating to a possible adjustment in the billing plan. For example, thesystem could analyze the family voice/data usage versus the currentvoice/data plan and suggest migration to an alternative voice/databilling plan that would save the family money. In this manner, thesystem functions not only to limit voice/data usage to avoid “billshock”, but actively assists the administrator to proactively avoidoverage charges by helping to facilitate a change to a voice/data planthat better fits the family usage. It should be noted that the systemwould not be limited to only suggesting a voice/data plan that wouldincrease the voice/data limits, but could further analyze the familyusage and suggest lowering the plan to a more economical plan if thefamily's voice/data usage is consistently below the current plan limit.

The system may further provide for cost projection analysis. In oneembodiment, the system can look at the current trend of the billingcycle and can “project” a cost based on the current trend. Stillfurther, the system can “project” a cost based, not only on the currentusage for the billing cycle, but can include analysis information fromprevious billing cycles. For example, it could be that there is heavyusage for the first week of the billing cycle, however, the trend forthe past number of billing cycles is that the usage typically tails offfor the second week, and so one. In this manner, a notification wouldnot necessarily be generated based solely on usage in that one billingcycle. Alternatively, if voice/data usage is at 75% at the end of thethird week of the billing cycle (assuming a four week billing cycle), ifthe trend has been heavy data usage at the end of the billing cycle, anotification may be generated that alerts the user to this effect. Forexample, a text or email can be sent to the administrator, who, whenthey log onto the website, can access a graph that illustrates thecurrent usage in the billing cycle versus an average usage for the pastnumber of billing cycle with a cost projection for the current billingcycle.

As family members increasingly become more mobile, the security offamily members is a concern. Parents can also rest comfortably knowingtheft child's smart phone is being safely monitored including locationtracking. Parents can receive email/text alerts about critical events,for example, my/our child has left a geo-fence area (e.g., school area)during school hours. Alternatively, families looking to keep track of anelderly parent may be alerted if the individual leaves a geo-fencedefined area or fans to move in a given time period indicating they areperhaps injured or disabled, and can provide for GFS tracking of themobile device for location of the elderly parent.

Security for family members is further enhanced by an emergency alertingfunction such that if certain phone numbers are dialed on the mobiledevice (i.e., 911 is called), an emergency text message or email is sentto the parent(s) alerting the parents that a call was made and providingan location of where the call was made from. Still further, ananti-bullying function may be provided in the mobile device such that,in the event a child is in a situation that they do not feel comfortablewith, they can one-touch dial a predetermined number (e.g., the schooloffice, a parent, etc.) and a text message or email can again,automatically be sent to a parent or other individual identifying thatan emergency was made and can provide a location of the device when thecall was made and provide for active tracking of the device and could bemade available to authorities if necessary.

In still another embodiment, reports may also be generated by the systemdetailing mobile device usage for each user at the end of each billingcycle or at any time the administrator logs on to the system and decidesto generate a report. For example, at the halfway point of a billingcycle, the parent could generate and print a report including a graph ofvoice/data usage, which could then be presented to the student to showthe child their current usage for the month with a projected usage andcost for the entire billing cycle. Additionally, based the current andhistorical usage patterns, the system could provide suggestions forlowering cost.

For this application the following terms and definitions shall apply:

The term “data” as used herein means any indicia, signals, marks,symbols, domains, symbol sets, representations, and any other physicalform or forms representing information, whether permanent or temporary,whether visible, audible, acoustic, electric, magnetic, electromagneticor otherwise manifested. The term “data” as used to representpredetermined information in one physical form shall be deemed toencompass any and all representations of the same predeterminedinformation in a different physical form or forms. “Data” may beaccessible, whether over-the-air, or via cable, satellite, network,distributed on storage media, or otherwise, without regard to the formor content thereof, and including but not limited to audio, video, text,images, animations, web pages and streaming media data.

The term “network” as used herein includes both networks andinternetworks of all kinds, including the Internet, and is not limitedto any particular network or inter-network.

The terms “coupled”, “coupled to”, “coupled with”, “connected”,“connected to”, and “connected with” as used herein each mean arelationship between or among two or more devices, apparatus, files,programs, media, components, networks, systems, subsystems, and/ormeans, constituting any one or more of (a) a connection, whether director through one or more other devices, apparatus, files, programs, media,components, networks, systems, subsystems, or means, (b) acommunications relationship, whether direct or through one or more otherdevices, apparatus, files, programs, media, components, networks,systems, subsystems, or means, and/or (c) a functional relationship inwhich the operation of any one or more devices, apparatus, files,programs, media, components, networks, systems, subsystems, or meansdepends, in whole or in part, on the operation of any one or more othersthereof.

The term “object” as used herein means a distinct software module orcollection of computer code that possesses (1) data that uniquelyseparates the module or collection of computer code from other similarmodules or collections, (2) attributes constituting a predeterminedsubset of data types describing media data usage and/or media data usersand/or any other supporting datatypes or users, and (3) behavior which(i) limits access to such attributes by responding only to requestsconforming to a predetermined published interface, and (ii) gathers dataof such predetermined subset or merges objects which possess such data.

The terms “process” and “processing” as used herein each mean an actionor a series of actions including, for example, but not limited to, thecontinuous or non-continuous, synchronous or asynchronous, direction ofdata, modification of data, formatting and/or conversion of data,tagging or annotation of data, measurement, comparison and/or review ofdata, and may or may not comprise a program.

In one advantageous embodiment a system for managing atelecommunications device is provided comprising a server coupled to anetwork, the server having a webpage accessible by a user with a usercomputer and a storage accessible by the server. The system furthercomprises a registration module on the server and allowing the user toregister a mobile device, and a mobile device plan module on the serverand receiving information relating to a telecommunications service planassociated with the mobile device. The system still further comprises athreshold module on the server, where the threshold module allows a userto set at least one threshold for the mobile device. Finally, the systemcomprises a notification module on the server, where the notificationmodule generates a notification accessible by the user when the at leastone threshold is reached.

In another advantageous embodiment a method for managing atelecommunications device is provided comprising the steps of providinga webpage on a server connected to a network that is accessible by auser computer, and providing a registration module on the serverallowing a user to register a mobile device. The method also includesthe steps of providing a mobile device plan module on the server forreceiving information relating to a telecommunications service planassociated with the mobile device, and providing a threshold module onthe server allowing a user to set at least one threshold for the mobiledevice. Finally, the method includes the step of generating anotification with a notification module on the server when the at leastone threshold is reached, the notification accessible by the user.

Other objects of the invention and its particular features andadvantages will become more apparent from consideration of the followingdrawings and accompanying detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is block diagram illustrating one advantageous embodiment of thepresent invention.

FIG. 2 is a block diagram according to the embodiment of FIG. 1.

FIG. 3 is a block diagram according to the embodiment of FIG. 2.

FIG. 4 is a block diagram according to the embodiment of FIG. 3.

FIG. 5 is an illustration of a notification sent to a user deviceaccording to the embodiment of FIG. 4.

FIG. 6 is an illustration of a line graph according to the embodiment ofFIG. 4.

FIG. 7 is an illustration of a bar graph according to the embodiment ofFIG. 4.

FIG. 8 is a block diagram of according to the embodiment of FIG. 3.

FIG. 9 is an illustration of screen display for defining a geo-fence formultiple mobile devices based on the time of day according to theembodiment of FIG. 1.

FIG. 10 is an illustration of a defined geo-fence for a mobile deviceaccording to the embodiment of FIG. 1.

FIG. 11 is an illustration of a defined geo-fence for a mobile deviceaccording to the embodiment of FIG. 10.

DETAILED DESCRIPTION OF THE INVENTION

Referring now to the drawings, wherein like reference numerals designatecorresponding structure throughout the views.

FIG. 1 is a block diagram depicting a system 100 for managingtelecommunications devices 102, 102′, 102″ . . . 102 ^(n). A useraccesses a server 104 by means of a user computer 106. It iscontemplated that user computer 106 accesses server 104 by means of awebpage interface over a network connection 108. As previouslydescribed, in one embodiment, the network connection may comprise theInternet.

Server 104 is provided with a server storage 110 accessible by theserver 104, whether locally provided or provided remote from server 104.Server storage 110 may comprise virtually any type of storage device forstoring electronic data and may be comprise, for example, but notlimited to, RAM, ROM, CD, DVD, solid state, magnetic, optical or anyother means for storing electronic data.

Server 104 is also illustrated coupled to service provider system 112via a network connection 114. The service provider system 112 comprisesan interface to the system used by the service provider(s) that providesmobile telecommunications services for the user. For example, server 104may communicate with the service provider that provides commercialtelecommunications services to the user relating to the mobile devices102, 102′, 102″, 102 ^(n). For example, server 104 may confirm useraccount information and mobile device 102, 102′, 102″, 102 ^(n)information. As will be seen, server 104 may communicate with serviceprovider system 112 to provide instructions relating to the operation ofthe mobile devices 102, 102′, 102″, 102 ^(n). While mobile devices 102,102′, 102″, 102 ^(n) are shown wirelessly connected to a block entitledservice provider system 112, it should be understood that serviceprovider system 112 includes all the necessary wired and wirelesscommunication equipment and computers used by a commercial serviceprovider to provide wireless telecommunications services to the public.

Turning now to FIGS. 2 and 3, the process of logging in, registrationand setting thresholds and rules is illustrated. For example, a user mayaccess a webpage on server 104 to log in or alternatively, to registeran account with the system 100. To register, the user would inputvarious information into the system 100 including, for example, but notlimited to, user name, user address (billing address), payment method,name of service provider, mobile device(s) information and service planinformation, etc. The user may utilize registration module 120 anddevice plan module 122, which may comprise a webpage(s) presented to theuser prompting the user to provide registration and device planinformation.

The registration process may further include an install link that getssent to each mobile device(s) 102, 102′, 102″, 102 ^(n). For example,the user could click on an “install link” that gets sent to each devicesuch that each mobile device(s) 102, 102′, 102″, 102 ^(n) can navigateto and install the application.

Once the user has provided all of the registration and device planinformation, the user may have the option to set thresholds and setrules with threshold module 124. For example, the user may decide to seta threshold of 50% for voice, data and/or text messaging (SMS) usage. Ifthe threshold is reached, a number of actions are possible. In oneembodiment, notification module may provide a notification that thethreshold has been reached. It should be noted that any level may beselected for a notification. For example, FIG. 5 illustrates anotification that is provided where data usage is 50%, voice usage is95% and text messaging (SMS) usage is 36%. The notification may beprovided at virtually any type of message, including a text message thatis sent to the user's mobile device(s) 102, 102′, 102″, 102 ^(n), or anemail accessible with the user computer 106. Alternatively, thenotification may comprise an alert that is designed to get the user'sattention when the user logs into the server 104. Still further, thenotification, when provided as an email may include a link that whenclicked on navigates the user to the server 104 and presents the userwith additional information relating to the notification. It should beunderstood that the notification may be pushed out to the user or maypull the user to the system for further information or both.

The process of receiving a notification is further illustrated in FIG. 4where a notification is received by user computer 106. It should benoted that the notification is shown in broken line to illustrate thatthe notification may be received in a number of different ways (e.g.,email, SMS, etc.). The user can access server 104 to request informationrelating to the notification. For example, while some basic informationmay be provided in the notification that may be sent to the user (e.g.,see FIG. 5), it is understood that additional information may beprovided by system 100 relating to the usage of mobile device(s) 102,102′, 102″, 102 ^(n). This additional information may includeinformation relating to multiple mobile devices providing a breakdown ofhow much voice, data and SMS usage is attributed to each individualmobile device 102, 102′, 102″, 102 ^(n). It is further understood thatthe individual mobile device 102, 102′, 102″, 102 ^(n) could include abreakdown of the usage over time (e.g., a day by day breakdown ofusage).

The user further has the option to request a report be generated thatmay include graphs illustrating total and individual mobile device 102,102′, 102″, 102 ^(n) usage as illustrated in FIGS. 6 & 7. For example,FIG. 6 is a line graph illustrating the actual total usage of voice/datafrom the beginning of the billing cycle (March 1^(st)) up to, forexample, March 12^(th) which may have corresponded with a notificationthat was sent to the user once total usage for either voice or data orSMS usage reached a threshold (in this example, 45%). As can be seen,there are four mobile devices that are being tracked in the graph whereeach device usage is individually shown from the beginning of thebilling cycle to the current date. Referring to FIG. 7, bar graph isprovided illustrating the information provided in the line graph of FIG.6. Another feature of system 100 is that, not only is actual usage shownin FIGS. 6 and 7, but projected usage is also provided for the remainderof the billing cycle. In the embodiments of FIGS. 6 and 7, aproportional or linear projection is provided based on the usage overthe current billing cycle. However, it is understood that historicalinformation could also be used in the projection. For example,historically there could be heavy voice/data/SMS usage over the firsttwo weeks of the billing cycle and relatively low voice/data/SMS usageover the last two weeks of the billing cycle. In this instance, theprojected usage could take this historical information into account andlower the projected total usage. It should be understood that theprojection could also be raised based on the historical information.

In the example shown in FIG. 6, a projected overage as a percentage ofthe total voice/data/SMS usage is provided (in this case projected up toapproximately 117%). Also provided is an estimated overage fee (in thisexample, $370.00). In this way, a user is provided with a wealth ofinformation relating to the total usage of voice or data or SMS (or anycombination thereof, for example, each could be tracked independently onthe graphs) and the individual usage as well as a projected total andindividual usage. As this is provided to the user during the billingcycle, the user can then adjust the usage trend by, for example, in theillustration in FIGS. 6 and 7, telling Bobby to stop the intensiveusage. It is contemplated that the report including the graphs could beprinted out and shown to the individual(s) illustrating graphicallytheir mobile device usage.

Another aspect of the invention allows the user to set rules for themobile devices mobile device(s) 102, 102′, 102″, 102 ^(n). This can bedone by means of rules module 126 shown in FIG. 3. It is contemplatedthat the user can set thresholds at which notifications are generated,but the thresholds can also be used to enact rules set by the user. Forexample, the user can disable the ability of a mobile device to accessdata or send/receive SMS messages in the event that 100% of the totalallowed usage in the billing cycle is reached. Alternatively, arestriction could be imposed allowing only SMS messaging to continue, orvoice usage could be restricted in duration (e.g., only 5 min calls) orrestricted by phone number (student's phone can only call emergencynumbers or parents numbers). These restrictions can be set up based onpercentage of usage or based on a combination of percentage of usage anddate. For example, once a threshold of 50% is reached, a notificationmay be sent. However, if 50% is reached in the first few days of thebilling cycle, the mobile device(s) 102, 102′, 102″, 102 ^(n) may berestricted until the halfway point is reached in the billing cycle atwhich point the restrictions are removed.

It is further contemplated that restrictions could be applied to themobile device(s) 102, 102′, 102″, 102 ^(n) based on the time of day. Forexample, a parent could restrict the mobile device(s) 102, 102′, 102″,102 ^(n) from sending/receiving/accessing voice/data/SMS from 11 pm to 6am as a parent does not want the student text messaging at 2 am ortalking on the phone at that time. Alternatively, the restriction may beadjusted based on the day of the week, such that the restrictions arenot applied on the weekend or during holidays. It is understood that thesystem 100 provides complete versatility allowing the user to set ruleswith the rules module 126 for the use of the mobile device(s) 102, 102′,102″, 102 ^(n) as they see fit.

As seen in FIG. 4, once the user has logged onto the server 104 toreview a notification and see a rule that may be in place to restrictthe mobile device(s) 102, 102′, 102″, 102 ^(n), the user has the optionto set or remove the particular restriction. For example, if the datausage of 50% is reached relatively quickly in the billing cycle, therule may be in place to restrict data usage to no more than a specifiedamount per day. The user has the option to release the mobile device(s)102, 102′, 102″, 102 ^(n) from the rule is the user chooses to do so.Alternatively, if a notification was sent and no rule is in place, theuser has the option to set a rule restricting one or any of the mobiledevice(s) 102, 102′, 102″, 102 ^(n). In this way the user is providedwith increased information regarding total and individual usage and isprovided with a very useful tool for managing the mobile device(s) 102,102′, 102″, 102 ^(n). “Bill shock” can be avoided because the system 100is alerting the user to a trend so that the user can take action toprevent the overage charge(s). Alternatively, the user is provided withenhanced controls over student's mobile device(s) 102, 102′, 102″, 102^(n) use.

FIG. 8 provides yet another feature of system 100 to help control costs.For example, if a user sees that a projected overage appears to belikely, the system 100 can provide information to the user relating toalternative service provider plans. The alternative plans could be fromthe current service provider or from a different service provider.However, based on current actual usage or historical usage orcombinations thereof, the system 100 can provide suggestions to the useras to how to reduce costs for the use of the mobile device(s) 102, 102′,102″, 102 ^(n). This information could be in the form of a list ofalternative service plans, or a list of upgrades to the current serviceplan, or a consolidation of multiple different plans, etc. The user isprovided with basic information and may be provided with a costcomparison between switching to one of the new alternative plans andpaying the estimated overage. Alternatively, the system 100 couldprovide an estimated cost savings over multiple billing cycle (e.g., forthe year), which could be provided in the form of a line and/or bargraph. In any event, the user is again provided maximum versatility inbeing able to control costs associated with the use of the mobiledevice(s) 102, 102′, 102″, 102 ^(n).

In addition to providing notifications about projected overage fees andsuggesting potential service plan migration, the system 100 can furthersuggest additional ways in which to save the family money. For example,information relating to the current service plan may include a “friendsand family” feature allowing individuals in the “friends and family”defined network to communicate with each other at a discounted rate. Thesystem 100 can monitor usage for the mobile device(s) 102, 102′, 102″,102 ^(n) and suggest adjustments to the numbers in the “friends andfamily” defined network. For example, “Carrie” (a friend of Lisa) may belisted in the “friends and family” defined network, however, over timeLisa's calling habits have changed such that she is now spending moreminutes communicating with David than Carrie. The system could provide asuggestion to replace Carrie with David and could provide an estimatedcost savings for doing so based on the historical data.

Additional rules that can be provided are illustrated in FIGS. 9-11relating to the creation of a geo-fence(s). FIG. 9 shows a map listing“Home”, “Bobby's School” and “Lisa's Ballet.” In setting rules, the userhas the option to set up geo-fences for the student's mobile device(s)102, 102′, 102″, 102 ^(n). For example, the user (parent) may want toreceive a notification if Bobby's mobile device(s) 102, 102′, 102″, 102^(n) leave the geo-fence area during particular time of the day asillustrated in FIGS. 10 and 11. The rule could be set to send anotification if Bobby's mobile device(s) 102, 102′, 102″, 102 ^(n)leaves the school geo-fence anytime during the school day from 8 am-2:30pm during the school week. Alternatively, during that time, the user(parent) may want to restrict access to voice/data/SMS such that Bobbyis unable to have unlimited access to data (streaming media) or SMS (nomore than 5 text messages) or voice (2 min maximum phone call or onlyhave access to emergency or parents phone numbers). In this manner theuser can ensure the a younger student is not unduly distracted by themobile device(s) 102, 102′, 102″, 102 ^(n) while in school when theyshould be in class and paying attention.

This feature can also be used as a safety feature such that if thestudent is forced to leave the geo-fence area, a notification is sent tothe parent without the student having to send any type of message. Thelocation of the mobile device(s) 102, 102′, 102″, 102 ^(n) can betracked. Alternatively, for elderly individuals, a similar feature canbe used to help identify their location if necessary.

It is contemplated that when setting up geo-fences, the user may simplybe presented with a map and could draw a circle around the area. Whilehexagons are shown in FIG. 9 and rectangles in FIGS. 10 and 11, it isunderstood that the geo-fence could take any shape desired and couldeven be drawn, for example, free-hand. Again, maximum versatility isprovided to the user to define the geo-fence as desired. When ageo-fence is defined for a particular mobile device(s) 102, 102′, 102″,102 ^(n), the user can then further define a time of day, day of theweek, etc., along with the physical location for the threshold andnotification.

As the system 100 is web-based, users (parents) can login from virtuallyanywhere to monitor usage, run reports, receive notifications andadminister rules as the system 100 is accessible via the web portal.

Although the invention has been described with reference to a particulararrangement of parts, features and the like, these are not intended toexhaust all possible arrangements or features, and indeed many othermodifications and variations will be ascertainable to those of skill inthe art.

1. A system for managing a mobile telecommunications device comprising:a server having a storage and coupled to a network, said serverpresenting a webpage accessible by a user computer; software executingon said server allowing a user to register at least one mobile devicewith the system; software executing on said server receiving informationrelating to a telecommunications service plan associated with the atleast one mobile device; software executing on said server to set atleast one threshold for the at least one mobile device, the thresholdselected from the group consisting of: an amount of voice minutes, or anamount of data usage, or an amount of text messages, or an amount ofemail, or a geographic location for the mobile device, or combinationsthereof; software executing on said server generating a notificationwhen the at least one threshold is reached; software executing on saidserver setting at least one rule for the at least one mobile deviceselected from the group consisting of: mobile device is restrictedduring selected time of day, or mobile device is restricted in specifiedlocation, or mobile device is restricted when the at least one thresholdis reached, or combinations thereof.
 2. The system according to claim 1where said at least one mobile device comprises a smart phone.
 3. Thesystem according to claim 1 wherein the information relating to atelecommunications service plan is selected from the group consistingof: user name, user address, mobile number, total minutes for a billingcycle, total data for a billing cycle and a total number of textmessages for a billing cycle.
 4. The system according to claim 1 whereinthe notification is transmitted as either a text message or an email. 5.(canceled)
 6. The system according to claim 1 wherein the restriction isselected from the group consisting of: restrict voice usage, or restricttext messaging, or restrict data usage, or restrict application usage,or restrict data sources or combinations thereof.
 7. The systemaccording to claim 6 wherein when the restriction is selected asrestrict voice usage, the mobile device may only connect with specifiedtelephone numbers for voice usage.
 8. The system according to claim 1further comprises software executing on said server setting at least onerule for the mobile device, said rule defines a geo-fence area for themobile device, said software tracking the location of the mobile devicesuch that if the mobile device is moved out of the geo-fence, the atleast one threshold is reached.
 9. The system according to claim 8wherein the threshold is reached if the mobile device remains stationaryfor a pre-defined period of time.
 10. The system according to claim 8wherein the location of the tracked mobile device is stored in thestorage, and said software presents the tracking information to a userthat logs into the webpage and views the stored tracking information.11. The system according to claim 8 wherein said geo-fence is associatedwith a school location.
 12. The system according to claim 1 wherein thenotification provides actual usage for said at least one mobile deviceover a current billing cycle.
 13. The system according to claim 1wherein the notification provides a prediction for said at least onemobile device usage over a current billing cycle.
 14. The systemaccording to claim 13 wherein the predicted usage is based on actualusage during the current billing cycle or on historical mobile deviceusage during at least one previous billing cycle or combinationsthereof.
 15. The system according to claim 1 wherein the mobile devicecomprises a plurality of mobile devices associated with thetelecommunications service plan.
 16. A system for managing a mobiletelecommunications device comprising: a server having a storage andcoupled to a network, said server having a webpage accessible by a usercomputer; software executing on said server to register a mobiletelecommunications device with the system having an associatedtelecommunications service plan defining a service limit for a billingcycle; software executing on said server to set at least one thresholdfor the mobile telecommunications device, the threshold associated withat least one telecommunications service provided undertelecommunications service plan, the service selected from the groupconsisting of: voice minutes, or data usage, or text messages, or email,or a geographic location for the mobile device, or combinations thereof;software executing on said server setting at least one rule for the atleast one mobile device selected from the group consisting of: mobiledevice is restricted during selected time of day, or mobile device isrestricted in specified location, or mobile device is restricted whenthe at least one threshold is reached, or combinations thereof.
 17. Thesystem according to claim 16 where said at least one mobile devicecomprises a smart phone.
 18. The system according to claim 16 wherein anotification is generated when the at least one threshold is reached andthe notification is transmitted as either a text message or an email.19. (canceled)
 20. The system according to claim 16 further comprisessoftware executing on said server setting at least one rule for themobile device, said rule defines a geo-fence area for the mobile device,said software tracking the location of the mobile device such that ifthe mobile device is moved out of the geo-fence, the at least onethreshold is reached.
 21. The system according to claim 20 wherein saidgeo-fence is associated with a school location.
 22. The system accordingto claim 16 wherein a notification is generated when the at least onethreshold is reached and the notification provides actual usage for saidat least one mobile device over a current billing cycle.
 23. The systemaccording to claim 16 wherein a notification is generated when the atleast one threshold is reached and the notification provides aprediction for said at least one mobile device usage over a currentbilling cycle.
 24. The system according to claim 23 wherein thepredicted usage is based on actual usage during the current billingcycle or on historical mobile device usage during at least one previousbilling cycle or combinations thereof.
 25. The system according to claim16 wherein the mobile device comprises a plurality of mobile devicesassociated with the telecommunications service plan.