Patent application number | Description | Published |
20100113005 | METHODS AND APPARATUS FOR MOBILE UNITS WITH LOCAL ACTION AND REMEDIATION - A remediation system employs local and autonomous conditions within the mobile unit itself. A method for performing remediation for a plurality of mobile units generally includes determining a first set of remediations, wherein each remediation includes a condition for determining whether a remediation is necessary for one of the mobile units, and an action for addressing the condition. The system may determine a second set of remediations, and providing the second set of remediations to the mobile units. | 05-06-2010 |
20100123436 | OPTIMIZED LITHIUM-ION BATTERY CHARGING - A device optimized battery-charging system for extending the useful life of a rechargeable battery. The optimized battery-charging system predicts periods of use and non-use of the device containing the battery and generates a schedule of when to charge the battery so the battery is ready for the next use cycle. During non-use cycles, the optimized battery-charging system reduces the battery charge level to an optimum level for storage based on the battery chemistry. When charging or discharging the battery, the optimized battery-charging system calculates a rate of charge or discharge that assures that the battery temperature does not exceed a preconfigured maximum value. | 05-20-2010 |
20100131792 | ANALYSIS LEADING TO AUTOMATIC ACTION - A system and methods for detecting an operational problem on a mobile device and automatically resolving the problem with a coordinated execution of repair tasks on the mobile device and on the plurality of servers communicatively connected to the mobile device providing for a complex solution to an operational problem. The system can archive a history of corrective actions and their outcome for later analysis and reporting. | 05-27-2010 |
20100234050 | System and Method for Peer-To-Peer Staging of a Mobile Device - A system comprising a first mobile device and a second mobile device. The first mobile device includes a memory and an output arrangement. The memory stores a staging profile. The staging profile is used to configure at least a portion of the first mobile device. The second mobile device includes an input arrangement. The input arrangement obtains the staging profile from the output arrangement. At least a portion of the second mobile device is configured using the staging profile. | 09-16-2010 |
20100333166 | METHODS AND APPARATUS FOR RATING DEVICE SECURITY AND AUTOMATICALLY ASSESSING SECURITY COMPLIANCE - Automatic Security Compliance Assessment (ASCA) systems and methods are provided for automatically generating and determining a security rating for a plurality of Settings Objects (SOs), where each of the SOs define particular configurations of subsystems of a wireless computing device. Each SO collectively defines a collection of Values specified for Configurable Attributes that can be used to define a different configuration for a particular subsystem associated with a particular Setting Class that is used to guide the creation of that particular SO. The server can store a group of security rating templates, each of which includes the information needed to determine an expected security rating for any SOs created per a particular Settings Class. For any combination of device settings, the resultant SOs can be used to generate an expected security rating. In addition, a security interaction template (SIT) and security test scripts can be generated that correspond to each particular group of SOs, and can be used to produce an Overall Device Security Rating (ODSR) for that particular group of SOs or a sub-set thereof. | 12-30-2010 |
20100333168 | METHODS AND APPARATUS FOR RATING DEVICE SECURITY AND AUTOMATICALLY ASSESSING SECURITY COMPLIANCE - Automatic Security Compliance Assessment (ASCA) systems and methods are provided. The disclosed systems and methods can automatically determine whether all of the devices in an enterprise network comply with security policies or standards, and can automatically take remedial or corrective action to bring those devices into compliance with security policies or standards if they are determined not to be in compliance. The disclosed systems and methods can automatically ensure that all of the devices in an enterprise network remain in compliance with the security policies or standards, and automatically create records that establish whether each of the devices are in compliance and regularly update those records over time so that the enterprise can quickly and easily provide evidence of compliance and/or corrective actions taken to bring devices into compliance if required to do so. | 12-30-2010 |
20120149343 | SYSTEM AND METHOD FOR STAGING A MOBILE DEVICE THROUGH A VOICE STAGING SERVER - A system for staging a mobile device is described. The system includes a mobility services platform (MSP) server for generating a staging profile. A voice staging server is coupled to the MSP server through a network. The voice staging server selects the staging profile. The mobile device is configured to connect to the voice staging server. The voice staging server transmits audio data representing the staging profile to the mobile device. The mobile device decodes the audio data to apply the staging profile to the mobile device. | 06-14-2012 |
20120151022 | SYSTEM AND METHOD FOR RAPID STAGING OF A MOBILE DEVICE - A system for staging a mobile device is described. The system includes a storage device for storing a staging profile of a mobile device. A cradle is coupled to the storage device. The cradle includes at least one cradle port adapted to connect to the mobile device. The cradle receives the staging profile from the storage device and transmits the staging profile to the mobile device for application thereon. | 06-14-2012 |
20130088335 | MOBILE DEVICE STAGING WITH RFID TAGS - A system for staging a mobile device is described. The mobile device includes a processor that executes a software application. A memory stores a unique identifier for the mobile device. The unique hardware identifier is readable by the software application and unreadable by any system that is external to the mobile device. The mobile device also includes a radio frequency identification (RFID) tag associated with the mobile device. The RFID tag stores a unique serial number that is readable by a staging system external to the mobile device and by the software application. The staging system encrypts a staging profile using both the unique serial number and the unique hardware identifier to create a device-specific key. The staging system writes the encrypted staging profile to the RFID tag. | 04-11-2013 |
20140078037 | SYSTEM AND METHOD OF DEVICE MANAGEMENT ON EXTENSIBLE AND CONFIGURABLE DETECTION OF ELECTRONIC DEVICE INTERACTIONS - A system and method determines a management action as a function of device interactions. The method includes determining a first interaction data generated by an electronic device, the first interaction data being indicative of at least one of a device user interaction, a device environment interaction, and a device state interaction. The method includes generating, by the electronic device, a first notification data as a function of the first interaction data. The method includes transmitting the first notification data from the electronic device to a remote device management server. The method includes determining, by the device management server, a first management action data as a function of the first notification data, the first management action data being indicative of a functionality to be applied to the electronic device. | 03-20-2014 |