Control beacons for wireless devices

ABSTRACT

Systems and methods for automatically modifying computing devices are provided. Various embodiments allow multiple control beacons (e.g., Bluetooth low energy beacons) with GPS to automatically pre-configure by discovering each other using location provided by the GPS in the beacons. These beacons can then be used to enforce multiple rules or policies on the computing device (e.g., restrict the activities/functionality of a mobile device). For example, a beacon can be installed at a family&#39;s dinner table and can be used as a trigger to restrict (or activate) phone features (e.g., allow only incoming calls while near this beacon during dinner times). In some embodiments, the GPS on the beacon can be used to notify administrators (e.g., parents) if the beacon is moved from its current location.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a division of U.S. patent application Ser. No.15/393,088 filed Dec. 28, 2016, which claims the benefit of U.S.Provisional Application Ser. No. 62/271,891, filed on Dec. 28, 2015, andentitled “CONTROL BEACONS FOR WIRELESS DEVICES,” both of which arehereby incorporated herein in their entireties by reference.

BACKGROUND

Modern mobile electronic devices (such as mobile phones, personaldigital assistants, computer tablets, or the like) have become a commonpart of modern life. These devices increasingly provide advancedcomputing capabilities along with a variety of other features andoptions that improve the user's experience with the device. Some commonexamples of the features and options include cameras, Wi-Fi, SMS and MMSmessaging, web browsers, voice/video calling, image and video capturing,and GPS capabilities. In addition to these common features and options,modern electronic devices often include operating systems that can runsoftware applications on one or more processors. The softwareapplications can be installed (e.g., by the manufacture, mobile carrier,or by the user) on these devices to perform a variety of specific tasksand/or extend the functionality of the devices.

The software applications may use many of the hardware and othersoftware components of the mobile devices. As the demands andfunctionality of the software applications increase, so does thefrequency of use for these components including situations where suchuse may not be desired. Not only are the demands and functionalityincreasing, but the mobile devices are becoming smaller and the featuresand applications are becoming more powerful. As such, the devices can beused in a variety of ways which may not be desired by those that do notown or operate the device or based on the context or location in whichthe device is located. Unfortunately, there are few options forrestricting the functionality of the device. It is with respect to theseand other problems that embodiments of the present invention have beenmade.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present technology will be described and explainedthrough the use of the accompanying drawings in which:

FIG. 1 illustrates an example of a communications environment in whichsome embodiments of the present technology may be utilized;

FIG. 2 illustrates a set of components within a mobile device accordingto one or more embodiments of the present technology;

FIG. 3 illustrates a set of components within a control beacon accordingto various embodiments of the present technology;

FIG. 4 is a flowchart illustrating a set of operations for automaticallyconfiguring a control beacon in accordance with some embodiments of thepresent technology;

FIG. 5 is flowchart illustrating a set of operations for modifying adevice in accordance with one or more embodiments of the presenttechnology;

FIG. 6 is an example of a graphical user interface that may be used inaccordance with some embodiments of the present technology; and

FIG. 7 is a sequence diagram illustrating an example of the data flowbetween various components of a communications according to variousembodiments of the present technology.

The drawings have not necessarily been drawn to scale. Similarly, somecomponents and/or operations may be separated into different blocks orcombined into a single block for the purposes of discussion of some ofthe embodiments of the present technology. Moreover, while thetechnology is amenable to various modifications and alternative forms,specific embodiments have been shown by way of example in the drawingsand are described in detail below. The intention, however, is not tolimit the technology to the particular embodiments described. On thecontrary, the technology is intended to cover all modifications,equivalents, and alternatives falling within the scope of the technologyas defined by the appended claims.

DETAILED DESCRIPTION

Various embodiments generally relate to the automatic restriction,disabling or enabling of mobile device hardware and software features.More specifically, some embodiments allow control beacons to sendsignals that can be used to modify (e.g., restrict, disable or enable)hardware and/or software features of the mobile device. In accordancewith some embodiments, the mobile device modification may last as longas the device is within range of the control beacon. As such, once thedevice can no longer detect the control beacon, the one or more devicemodifications may end. In other embodiments, the modifications may beassociated with various rules that govern the modifications of themobile device.

One of the problems with traditional beacons is that one has to setupthe beacons and tell software responding to beacon signals where thebeacons are located. In contrast, embodiments described in detail belowallow multiple control beacons (e.g., Bluetooth low energy beacons) withGPS capabilities to automatically pre-configure themselves bydiscovering each other using location provided by the GPS capabilitiesof the beacons. As such, control polices may be automatically associatedwith nearby beacons. A beacon, or network of beacons, can then be usedto send signals, which when received by mobile devices, cause thosedevices to enforce multiple rules or policies on the devices (e.g.,restrict the activities of a mobile device). For example, a controlbeacon can be installed at a family's dinner table and can be used as atrigger to restrict certain phone features (e.g., only incoming callsare accepted while near this beacon during dinner times). In someembodiments, the GPS capabilities of the beacon can be used to notifyadministrators (e.g., parents) if the beacon is moved from its currentlocation.

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of embodiments of the present technology. It will beapparent, however, to one skilled in the art that embodiments of thepresent technology may be practiced without some of these specificdetails. While, for convenience, embodiments of the present technologyare described with reference to modifying device functionality,embodiments of the present technology are equally applicable tocustomizing aesthetic and functional features/content (e.g., wallpaper,color schemes, sound schemes, applications, videos, etc.) on a mobiledevice.

The techniques introduced here can be embodied as special-purposehardware (e.g., circuitry), as programmable circuitry appropriatelyprogrammed with software and/or firmware, or as a combination ofspecial-purpose and programmable circuitry. Hence, embodiments mayinclude a machine-readable medium having stored thereon instructionswhich may be used to program a computer (or other electronic devices) toperform a process. The machine-readable medium may include, but is notlimited to, floppy diskettes, optical disks, compact disc read-onlymemories (CD-ROMs), magneto-optical disks, ROMs, random access memories(RAMs), erasable programmable read-only memories (EPROMs), electricallyerasable programmable read-only memories (EEPROMs), magnetic or opticalcards, flash memory, or other type of media/machine-readable mediumsuitable for storing electronic instructions.

The phrases “in some embodiments,” “according to some embodiments,” “inthe embodiments shown,” “in other embodiments,” and the like generallymean the particular feature, structure, or characteristic following thephrase is included in at least one implementation of the presenttechnology, and may be included in more than one implementation. Inaddition, such phrases do not necessarily refer to the same embodimentsor different embodiments.

FIG. 1 illustrates an example of a communications environment 100 inwhich some embodiments of the present technology may be utilized. Asillustrated in FIG. 1, communications environment 100 may include one ormore mobile devices 110A-110N (such as a mobile phone, tablet computer,mobile media device, mobile gaming device, vehicle-based computer,wearable computing device, etc.), communications network 120, remoteservers 130A-130N, control beacons 140A-140N, beacon management platform150 and database 160. As described in more detail below in FIG. 2, toallow a user to make use of the various services and features of themobile device, mobile devices 110A-110N can include various sensors andinput/output components.

In addition, mobile devices 110A-110N can include network communicationcomponents that enable the mobile devices to communicate with remoteservers 130A-130N or other portable electronic devices by transmittingand receiving wireless signals using licensed, semi-licensed orunlicensed spectrum over communications network 120. In some cases,communication network 120 may be comprised of multiple networks, evenmultiple heterogeneous networks, such as one or more border networks,voice networks, broadband networks, service provider networks, InternetService Provider (ISP) networks, and/or Public Switched TelephoneNetworks (PSTNs), interconnected via gateways operable to facilitatecommunications between and among the various networks. Communicationsnetwork 120 can also include third-party communications networks such asa Global System for Mobile (GSM) mobile communications network, acode/time division multiple access (CDMA/TDMA) mobile communicationsnetwork, a 3rd or 4th generation (3G/4G) mobile communications network(e.g., General Packet Radio Service (GPRS/EGPRS)), Enhanced Data ratesfor GSM Evolution (EDGE), Universal Mobile Telecommunications System(UMTS), or Long Term Evolution (LTE) network), or other communicationsnetwork.

Those skilled in the art will appreciate that various other components(not shown) may be included in mobile device 110A-110N to enable networkcommunication. For example, a mobile device may be configured tocommunicate over a GSM or newer mobile telecommunications network. As aresult, the mobile device may include a Subscriber Identity Module (SIM)card that stores an International Mobile Subscriber Identity (IMSI)number that is used to identify the mobile device on the GSM mobile orother communications networks, for example, those employing 3G and/or 4Gwireless protocols. If the mobile device is configured to communicateover another communications network, the mobile device may include othercomponents that enable it to be identified on the other communicationsnetworks.

In some embodiments, mobile devices 110A-110N may include componentsthat enable them to connect to a communications network using GenericAccess Network (GAN), Unlicensed Mobile Access (UMA), or LTE-U standardsand protocols. For example, a mobile device may include components thatsupport Internet Protocol (IP)-based communication over a Wireless LocalArea Network (WLAN) and components that enable communication with thetelecommunications network over the IP-based WLAN. Further, while notshown, the mobile devices may include capabilities for permittingcommunications with satellites. Mobile devices 110A-110N may include oneor more mobile applications that need to transfer data or check-in withremote servers 130A-130N.

Control beacons 140A-140N can be placed in a variety of locations. Forexample, these beacons may be placed within businesses, familyresidences, churches, museums, shrines, automobiles or other vehicles,etc. Each control beacon is able to transmit an identifier (e.g., usingBluetooth low energy or other wireless personal area networktechnology/protocols) which can be detected by mobile devices 110A-110N.The identifiers may or may not be unique. In addition, the identifiersmay change over time in some embodiments. Software running on mobiledevices 110A-110N may keep selected communications channels (e.g.,Bluetooth low energy) active and prevent the user from manuallydisabling selected communications channels to prevent communication withthe control beacon.

Once detected by the mobile devices, the device determines whichhardware/software functionality to enable, disable, restrict or alter(collectively “modify”). In at least one embodiment, the devicemodification may be time based. As such, the features modified may onlyoccur during specific days/times. For example, a family may setup apolicy with a control beacon near a dinner table that during dinner time(e.g., 5-7 pm) on weekdays, a mobile device within range of that controlbeacon may only be used for emergency calls. As a result, text messagingand social network applications may be completely disabled at thislocation during the established time-based restrictions. As anotherexample, control beacons may be placed near an entry ways of a building.Upon the mobile device detecting the control beacon near the entry way,the modifications may be set and persist until the mobile device exitsthe building or other area such as a parking lot. This has a cleareconomic advantage as fewer control beacons are needed to manage deviceswithin the building.

In some embodiments, the identifier of the detected control beacon maybe used to access a locally stored set of policies on the mobile device.If no match is found, the mobile device may then attempt to accessbeacon management platform 150 to retrieve associated modificationpolicies. In other embodiments, the identifiers or data from the signalsent by the beacons may include a portion that the mobile device can useto directly interpret or determine the control policy. This may includea preset sequence that the mobile device can parse into multiple fieldswhere a first value allows/enables a feature and a second value disablesthe feature.

In other embodiments, the value of the preset sequence itself (orportions thereof) may determine which features (hardware or software) toenable/disable. The preset sequence, in some embodiments, may be analphanumeric sequence that includes numbers, letters, and/or symbols.For example, the following table illustrates some possible examples ofpreset sequences and their corresponding feature modification:

Sequence Feature Modification 0001 Disable Camera and Microphone 0001aDisable Microphone 0001b Disable Camera 0002 Enable Custom ApplicationsEMER Only allow outgoing emergency calls

In other embodiments, the sequence may have preset fields that allow anapplication on the mobile device to interpret the desired modificationby parsing the sequence. The following set of fields illustrates theidea:

Beacon Camera Microphone Cellular Sounds Social Gaming ID Service AppsApps

The sequence in each of the non-identifier fields may be binary (i.e.,1-on or 0-off) or include more options. As such, a control signal havinga 4 digit beacon ID, that reads the following 12345000111 can be parsedand interpreted as follows: 12345—control beacon ID; 0—camera off;0—microphone off; 0—cellular service off; 1—sounds on; 1 social apps on;and 1—gaming apps on. As such, various software applications, hardware,and device configurations can be controlled, such as a particularsequence used by the mobile device to disable social networkingfunctionality. In addition, all or part of the identifier mayautomatically change over time (e.g., hours, days, etc.) so that theenabled/disabled features of the device change accordingly. In otherembodiments, a hashing function that changes over time may be applied tothe identifier to determine the modifications to apply.

FIG. 2 illustrates a set of components within mobile device 110A-110Naccording to one or more embodiments of the present technology. As shownin FIG. 2, mobile device 110A-110N may include memory 205 (e.g.,volatile memory and/or nonvolatile memory), power supply 210 (e.g.,battery), processor(s) 215 for executing processing instructions, andoperating system 220. Additional components such as data storagecomponent 225 (e.g., hard drive, flash memory, memory card, etc.), oneor more network interfaces (e.g., Bluetooth Interface 230; and NetworkCommunication Interface 235, which enables the mobile phone tocommunicate by transmitting and receiving wireless signals usinglicensed, semi-licensed or unlicensed spectrum over a telecommunicationsnetwork), audio interface 240, microphone 245, display 250, keypad orkeyboard 255, and other input and/or output interfaces 260. The variouscomponents of a mobile device may be interconnected via a bus.

Processor(s) 215 are the main processors of mobile device 110A-110Nwhich may include application processors, baseband processors, variouscoprocessors, and other dedicated processors for operating mobile device110A-110N. For example, an application processor can provide theprocessing power to support software applications, memory management,graphics processing, and multimedia. An application processor may becommunicably coupled with memory 205 and configured to run the operatingsystem, the user interface, and the applications stored on memory 205 ordata storage component 225. A baseband processor may be configured toperform signal processing and implement/manage real-time radiotransmission operations of mobile device 110. These processors alongwith the other components may be powered by power supply 210. Thevolatile and nonvolatile memories found in various embodiments mayinclude storage media for storing information such as processor-readableinstructions, data structures, program modules, or other data. Someexamples of information that may be stored include basic input/outputsystems (BIOS), operating systems, and applications.

FIG. 3 illustrates a set of components within control beacons 140A-140Naccording to one or more embodiments of the present technology. As shownin FIG. 3, control beacon 140A-140N may include memory 305 (e.g.,volatile memory and/or nonvolatile memory), power supply 310 (e.g.,battery, solar panel, etc.), and processor(s) 315 (or ASICs) forexecuting processing instructions. Additional components such as GPS320, Bluetooth 325, USB 330 and/or additional sensors 335 (e.g.,temperature sensors, motion sensors, accelerometers, light sensors,vibration sensors) may also be included in various embodiments ofcontrol beacon 140A-140N.

USB interface 330 can be used as an interface for configuring thecontrol beacon. These may be used, for example, in a home applicationtier of beacons. Other embodiments of the control beacon may also have awireless or wired interface for configuring the control beacon. Thiswired or wireless interface for configuring the control beacons may beon an enterprise tier of control beacons in some embodiments. TheBluetooth interface may allow for a variety of settings including asetting that allows the range of the broadcast control signal to beconfigured. These ranges may be available in preset increments (e.g.,one foot, three feet, five feet and ten feet). These preset incrementsmay be based on an estimated range computed from signal strength andenvironmental factors such as walls or other obstacles. In otherembodiments, the range (or strength of the control signal) may becompletely customizable from one foot or less to ten feet or more.

The processor and other components can be used to generate and transmitcontrol signals (e.g., using Bluetooth Interface 325 or other personalarea network hardware and protocols). Once received by the mobiledevice, specific hardware and/or software functionality of the mobiledevice can be modified. In accordance with various embodiments, sensors335 can be used as additional inputs to change the control signal,generate notifications, power on/off the control beacon, add additionalfields within the control signal, and the like. For example, if thecontrol beacon has an accelerometer this could be used to generate anotification to an administrator that the control beacon has been moved.As another example, the accelerometer may be used to change the controlsignal itself such as if the control beacon is in an automobile thecontrol signal can restrict all activity but GPS navigation and/oremergency calling when an acceleration is detected.

Sensors 335 may include a microphone to detect sound. In someembodiments, the signal generated by the microphone can be used todetermine the noise level of the surrounding environment of the controlbeacon. Using this information the policies and/or range of the beaconmay be dynamically set. As a result, when the noise level increases thepolicies may impose more restrictions on calling and sounds of thedevice or simply increase the range of those policies. Similarly, whenthe noise level decreases the range of the beacon may be reduced or thepolicies loosened so that more calls may occur.

In some embodiments, the control beacon uses Bluetooth component 325 orother communication component to receive an acknowledgement response,inquiry, challenge, or other message from the mobile device that isgenerated and transmitted in response to the detection of the controlsignal. For example, the control beacon may receive an identifier (e.g.,device ID, International Mobile Subscriber Identity, user name and/orcredentials, etc.) from the mobile device. The identifier can be storedwithin memory 305 of the control beacon and/or uploaded to a server(e.g., control beacon management platform 150 illustrated in FIG. 1).This creates a tracking feature of mobile devices that pass within rangeof the control beacon. Some embodiments allow for real-time or nearreal-time interfaces to this information for a variety of uses (e.g.,serving advertisements, device monitoring, and the like).

FIG. 4 is a flowchart illustrating a set of operations for automaticallyconfiguring a control beacon in accordance with some embodiments of thepresent technology. As illustrated in FIG. 4, location operation 410automatically determines the control beacon location. This determinationcan occur in a variety of ways. For example, the control beacon may beequipped with a GPS component. As such, the location may be determineddirectly from the GPS component. As another example, the control beaconmay be able to detect another beacon nearby which has already beenpreconfigured or has a GPS component. Using the information from theother control beacon, the control beacon location can be automaticallydetermined.

Identification operation 420 determines the control beacon identifiers.The identifiers may be set at the factory, or all or part of theidentifiers may be customized by an administrator via a graphical userinterface or other mechanism. The control beacon and associated policiesmay then be registered with a management platform during registrationoperation 430. In other embodiments, the policies may be directly loadedonto the control beacon (e.g., using a USB or wireless interface). Stillyet, there may be tiers of control beacons some that require localmanagement (e.g., via a USB) and some that require a management platformfor setting the policies. During creation operation 440, policies formobile device modification can be created.

Mobile devices 110A-110N can detect the control signals generated by thecontrol beacon. The mobile application may have an installedapplication, dedicated hardware component, or an integrated operatingsystem component that would trigger modifications to the mobile devicehardware and/or software upon detection and processing of a detectedcontrol signal. In some embodiments, there may be a table (e.g.,predefined in factory or set by admin/user) that includes a column ofbeacon IDs and corresponding rules to execute when that ID is received.Consequently, when the device detects ID 12345, the table says to shutdown the WiFi radio and shut down cellular data so that only voice callsare possible, and when it detects ID 56789, then the input devices likecamera app and microphone are disabled, etc.

The policies created during creation operation 440 may range fromcompletely shutting down the device (e.g., in a restricted area) toallowing full unrestricted operations (e.g., in a public space). Somepolicies may be fixed to the type of beacon that is purchased. Forexample, some beacons can be coded so that mobile devices receivingtheir beacon signals always disable the camera on the mobile device.This type of fixed structure could be useful in areas where sensitive orrestricted information is present and the user of the control beacondesires to prevent tampering or inadvertently adjusting policy settings.

Modifications associated with other beacons may be fully customizable.As an example, a beacon may be purchased and installed in a familyresidence near the dinner table. An administrator (e.g. a head of thehousehold) may locate the beacon near the dinner table and set with oneor more policies that restrict mobile device activity during meal times(e.g., breakfast, lunch, or dinner). When any mobile device is near(e.g., within five feet of) the dinner table, the mobile starts shuttingoff or suspending services (e.g. WiFi radio, certain devicefunctionality, certain apps, etc.). For example, the modificationimplemented by the phone when detecting the particular beacon ID may beto receive only incoming calls. As such, no Facebook messages, no textmessages, no Internet, no games, and the like may be allowed during mealtimes but allow full functionality (or a different set of restrictions)at other times or at locations out of range of the beacon. As anotherexample, the mobile device may only be allowed to make calls toemergency services (e.g., 911).

The policies may also include excluded devices on which the policiesshould not be applied. For example, policies may be created individuallyon different mobile devices that indicate that all mobile devices,except device A, B, and C, can only make calls to emergency services.Device A may have a separate, different policy that allows it to receiveand send text messages. Device B may have a policy similar to device A,but also be allowed to send and receive e-mails; device C may have apolicy that allows it to also be able to access the Internet (e.g. viaWiFi, cellular data, or both).

In addition to residential uses, control beacons and associated policiesmay be used in commercial settings or within vehicles (e.g.,automobiles, planes, buses, trains, etc.). For example, the controlpolicies created during creation operation 440 may indicate that nosounds are allowed during at all during movies within a movie theater orwithin a church and during a church service. As another example, acompany may want to install propriety software that can only be used ina certain location. As such, the software will only be enabled upondetection of a control beacon within that location. The control policiesmay also be used to set network configurations. For example, a enforcedvirtual private network configurations may be set to allow applicationson the mobile device to gain access to a shared repository or otherresources on a private network. Such a local requirement feature may beuseful in military, government, or other areas where maintaining secretand/or confidential information is essential. In some embodiments, thepolicies may allow for purchased or earned exclusions. As such, a userof a mobile device may be able to pay money in exchange for access tothe services during the restriction.

For example, a business owner may disable, limit the duration of, limitthe number of and/or otherwise restrict outgoing calls unless a fee ispaid. Once the fee is paid, the mobile device may be excluded from suchrestrictions indefinitely or for a finite time period. As an example ofan earned policy change, a coffee shop may disable one or more featuresof the mobile device until the mobile device has frequented the coffeeshop more than a predetermined number of times within a fixed period(e.g., five times within the last thirty days). Once the policy changehas been earned, an exclusion or change in the policy may be made forthat mobile device.

In addition to fixed location based policies, dynamic policies may alsobe created during creation operation 440. For example, for a controlbeacon located within a car, a policy may be set that so that if the caris moving, all messaging, dialer functionality, video, and broadbandfunctionality can be shut down and only GPS is left active fornavigation. When the car is not moving, all functionality may beenabled. As such, the dynamic policy may depend on an input from one ormore sensors or applications.

In some embodiments, the mobile devices may be set at the factory with aset of pre-installed policies that allow for the enforcement of certainrules such as a rule for a camera and/or microphone shutoff, a rule thatshuts off all incoming services, a rule that the shuts down all audiooutput (silence), and a rule that shuts everything down except theability to make 911 calls. This type of pre-installed policies can allowfor universal enforcement of the most common or desirable policies.

FIG. 5 is flowchart illustrating a set of operations 500 for modifying adevice in accordance with one or more embodiments of the presenttechnology. In the embodiments illustrated in FIG. 5, monitoringoperation 510 monitors for signals from one or more control beacons.During detection operation 520 a determination is made as to whether oneor more control signals have been detected. If no signal has beendetected, then detection operation 520 branches to monitoring operation510. If detection operation 520 determines that a signal has beendetected, then detection operation 520 branches to policy determinationoperation 530 where the policies associated with the control beacon aredetermined. In some embodiments, the beacons may be prioritized so thatany conflicting commands may be sorted and enforced based on prioritylevel.

Policy determination operation 530 can determine the policies in avariety of ways. For example, the policy may be able to be directlydetermined from a signal received from the control beacon. As anotherexample, multiple policies may be locally stored on the mobile deviceand the signal may be used as an index into those policies. Still yet,the mobile device may contact a beacon management platform (see, e.g.,150 in FIG. 1) to retrieve the policies. As one example, the beacons maybe cascaded through a desired area. The initial beacon on an outerperimeter may require that a set of policies be loaded onto a mobiledevice. Then, upon detection of a control beacon within the perimeter anindicated policy may be retrieved from local memory or storageassociated with the mobile device. If for some reason the policy is notable to be locally accessed then a secondary policy may require the moststringent enforcement (e.g., the mobile device may be required tocompletely shut down).

Once the policies are determined, modification or exclusion operation540 determines if the mobile device is excluded. If exclusion operation540 determines the mobile device is excluded, then exclusion operation540 may branch to monitoring operation 510. If exclusion operation 540determines the mobile device is not excluded, then exclusion operation540 branches to application operation 550 where the policies are appliedto set the device modifications (e.g., disable the camera). Once thepolicies expire (e.g., based on time, location, sensor input, etc.) thenending operation 560 ends the device modifications.

FIG. 6 is an example of a graphical user interface 600 that may be usedin accordance with some embodiments of the present technology to setupand configure a control beacon. The graphical user interface 600 may beautomatically displayed when a control beacon is detected by a mobiledevice or other computing device running a specific setup softwareapplication. In other embodiments, the user of the mobile or computingdevice may navigate to a webpage or directly connect with the controlbeacon (e.g., via a wired or wireless interface).

The interface illustrated in FIG. 6 allows the user to setup variousaspects of the policy by selecting beacon setup portion 610. Uponselection of beacon setup portion 610, the graphical user interface maydisplay multiple interfaces for setting up different policy portions,such as excluding certain devices, setting the location of the beacon,setting time based restrictions, creating a beacon network, and settingmodification policies that would allow for exclusions to be purchased,earned, or otherwise requested. In response to the setting set by theadministrator, control signals may be generated (e.g., by populatingfields with appropriate preset sequences that result in the desiredpolicy enforcement). Once set, active policy portion 620 can display allpolicies currently set to allow for easy review by the administrator.

As discussed above, the location of the beacon may be automatically set(e.g., by using a GPS receiver within the beacon). The location of thecontrol beacon can be useful if someone tries to relocate or move thecontrol beacon. Through this interface the administrator can configurewhat response should occur. For example, the administrator may setup anotification (e.g., via e-mail) that indicates the beacon has beenmoved. The notification may identify any mobile devices that have sent asignal to the control beacon in response to detecting a control signal.As another example, alternate policies may be enforced or the policiesassociated with nearby beacons may be modified (e.g., all neighboringbeacons cooperating to send the same signal to shut down all deviceswithin range of any of the beacons).

Control beacon portion 630 may display neighboring control beacons andthe range of the current control beacon settings. This visualization canbe used by the administrator in reviewing coverage. In addition, controlbeacon portion 630 may allow the administrator to actively set the rangewith a drag and drop interface that responsively increases or decreasesthe range of each control beacon shown.

FIG. 7 is a sequence diagram illustrating an example of the data flowbetween various components of a communications according to variousembodiments of the present technology. As illustrated in FIG. 7, controlbeacon A 710 may be setup to broadcast identifier A. Using controlbeacon management platform 150, policies can be associated withidentifier A. When control beacon B 720 initially detects identifier A,control beacon B 720 can automatically setup and transmit identifier Bto control beacon management platform 150. Control beacon managementplatform 150 can automatically associate the policies of control beaconA 710 with control beacon B 720. As such, a network of identical beaconscan be easily configured with only the setup of a single beacon. Oncemobile device 730 detects any one of the broadcast identifiers, thedevice determines the associated policies and implements thecorresponding modifications.

CONCLUSION

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof means any connection or coupling,either direct or indirect, between two or more elements; the coupling orconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, refer tothis application as a whole and not to any particular portions of thisapplication. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or,” in reference to alist of two or more items, covers all of the following interpretationsof the word: any of the items in the list, all of the items in the list,and any combination of the items in the list.

The above Detailed Description of examples of the technology is notintended to be exhaustive or to limit the technology to the precise formdisclosed above. While specific examples for the technology aredescribed above for illustrative purposes, various equivalentmodifications are possible within the scope of the technology, as thoseskilled in the relevant art will recognize. For example, while processesor blocks are presented in a given order, alternative implementationsmay perform routines having steps, or employ systems having blocks, in adifferent order, and some processes or blocks may be deleted, moved,added, subdivided, combined, and/or modified to provide alternative orsubcombinations. Each of these processes or blocks may be implemented ina variety of different ways. Also, while processes or blocks are attimes shown as being performed in series, these processes or blocks mayinstead be performed or implemented in parallel, or may be performed atdifferent times. Further any specific numbers noted herein are onlyexamples: alternative implementations may employ differing values orranges.

The teachings of the technology provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various examples described above can be combined to providefurther implementations of the technology. Some alternativeimplementations of the technology may include not only additionalelements to those implementations noted above, but also may includefewer elements.

These and other changes can be made to the technology in light of theabove Detailed Description. While the above description describescertain examples of the technology, and describes the best modecontemplated, no matter how detailed the above appears in text, thetechnology can be practiced in many ways. Details of the system may varyconsiderably in its specific implementation, while still beingencompassed by the technology disclosed herein. As noted above,particular terminology used when describing certain features or aspectsof the technology should not be taken to imply that the terminology isbeing redefined herein to be restricted to any specific characteristics,features, or aspects of the technology with which that terminology isassociated. In general, the terms used in the following claims shouldnot be construed to limit the technology to the specific examplesdisclosed in the specification, unless the above Detailed Descriptionsection explicitly defines such terms. Accordingly, the actual scope ofthe technology encompasses not only the disclosed examples, but also allequivalent ways of practicing or implementing the technology under theclaims.

To reduce the number of claims, certain aspects of the technology arepresented below in certain claim forms, but the applicant contemplatesthe various aspects of the technology in any number of claim forms. Forexample, while only one aspect of the technology is recited as acomputer-readable medium claim, other aspects may likewise be embodiedas a computer-readable medium claim, or in other forms, such as beingembodied in a means-plus-function claim. Any claims intended to betreated under 35 U.S.C. § 112(f) will begin with the words “means for”,but use of the term “for” in any other context is not intended to invoketreatment under 35 U.S.C. § 112(f). Accordingly, the applicant reservesthe right to pursue additional claims after filing this application topursue such additional claim forms, in either this application or in acontinuing application.

What is claimed is:
 1. A mobile device comprising: at least one processor; at least one wireless transceiver coupled to the at least one processor; at least one memory, coupled to the at least one processor, and storing: an identification module configured to— receive a signal from a control beacon; and identify one or more policies in a set of policies to be applied in response to receipt of the signal from the control beacon, wherein at least one policy in the set of policies identifies aesthetic, content, hardware, or functional customizations to be applied to the mobile device; and a customization module configured to— apply the one or more policies on the mobile device while the identification module continues to receive the signal from the control beacon.
 2. The mobile device of claim 1, wherein the functional customizations relate to a camera, a microphone, a network communication module, one or more sensors, speaker, an e-mail application, a gaming application, a social media application, a device connection, a network connection, or a cellular service associated with the mobile device.
 3. The mobile device of claim 1, wherein the memory further stores at least one database, wherein the at least one database stores the set of policies.
 4. The mobile device of claim 1, wherein one or more policies in the set of policies are automatically downloaded to the memory from a control beacon management platform.
 5. The mobile device of claim 1, wherein the signal received by the mobile device from the control beacon comprises an identifier that uniquely identifies the control beacon among multiple control beacons, and wherein the identification module accesses one or more locally stored policies, stored at the mobile device, based on the identifier.
 6. The mobile device of claim 1, wherein the signal from the control beacon comprises an identifier that uniquely identifies the control beacon among multiple control beacons, wherein the identification module parses the identifier into at least a first field value and a second field value, and wherein the customization module applies the one or more policies on the mobile device based on at least a portion of the identifier, the first field value, the second field value, or any combination thereof.
 7. The mobile device of claim 1, wherein the signal from the control beacon comprises an identifier that uniquely identifies the control beacon among multiple control beacons, and wherein the identification module applies a hashing function on the identifier to identify the one or more policies in the set of policies to be applied in response to receipt of the signal from the control beacon.
 8. The mobile device of claim 1, wherein the identification module determines if the mobile device should be excluded from the identified one or more policies, and wherein when the identification module determines that the mobile device should be excluded, the customization module prevents the application of the one or more policies on the mobile device.
 9. The mobile device of claim 1, wherein identification module recognizes a format of the signal from the control beacon and deciphers a customized portion that identifies the one or more policies that should be applied.
 10. The mobile device of claim 1, wherein the one or more policies disable one or more of a camera, a microphone, incoming text messages, outgoing text messages, sounds, an ability to receive incoming calls, an ability to place outgoing calls, an e-mail application, a gaming application, a social media application, a device connection, a network connection, or a cellular service.
 11. The mobile device of claim 1, wherein the identification module uses Bluetooth to detect the signal from the control beacon.
 12. The mobile device of claim 1, wherein the customization module applies the one or more policies on the mobile device based on a time of day, location of the mobile device, or any combination thereof.
 13. The mobile device of claim 1, wherein the memory further stores a transmission module configured to transmit a message to the control beacon in response to receipt of the signal from the control beacon, wherein the message comprises an identifier that uniquely identifies the mobile device among multiple mobile devices.
 14. The mobile device of claim 1, wherein the identification module identifies the one or more policies based on a type of the control beacon.
 15. A mobile device comprising: at least one processor; at least one wireless transceiver coupled to the at least one processor; at least one memory, coupled to the at least one processor, and storing at least one database, wherein the at least one database stores multiple policies, wherein the policies identify aesthetic, content, hardware, or functional customizations to be applied to the mobile device, and wherein the memory further stores: an identification module configured to— receive a signal from a control beacon; and identify one or more of the policies to be applied in response to receipt of the signal from the control beacon; and a customization module configured to— apply the one or more policies on the mobile device while the identification module continues to receive the signal from the control beacon.
 16. The mobile device of claim 15, wherein the policies are automatically downloaded to the memory from a control beacon management platform.
 17. The mobile device of claim 15, wherein the identification module determines if the mobile device should be excluded from the one or more policies.
 18. The mobile device of claim 15, wherein identification module recognizes a format of the signal from the control beacon and deciphers a customized portion that identifies the one or more policies that should be applied.
 19. The mobile device of claim 15, wherein the one or more policies disable one or more of a camera, a microphone, incoming text messages, outgoing text messages, sounds, an ability to receive incoming calls, an ability to place outgoing calls, an e-mail application, a gaming application, a social media application, a device connection, a network connection, or a cellular service.
 20. A non-transitory computer-readable medium storing instructions that when executed by one or more processors cause a mobile device to: receive a signal from a control beacon, wherein the signal received from the control beacon is associated with one or more policies that modify a hardware or software functionality of the mobile device; identify one or more of the policies to be applied in response to receipt of the signal from the control beacon; determine, upon detection of the signal broadcast by the control beacon, whether the one or more policies should be applied to the machine until an ending event occurs; and apply the one or more policies on the mobile device while the identification module continues to receive the signal from the control beacon. 