WO2009056148A2 - Mobile device management system - Google Patents

Mobile device management system Download PDF

Info

Publication number
WO2009056148A2
WO2009056148A2 PCT/EE2008/000025 EE2008000025W WO2009056148A2 WO 2009056148 A2 WO2009056148 A2 WO 2009056148A2 EE 2008000025 W EE2008000025 W EE 2008000025W WO 2009056148 A2 WO2009056148 A2 WO 2009056148A2
Authority
WO
WIPO (PCT)
Prior art keywords
mobile device
server
oma
management system
devices
Prior art date
Application number
PCT/EE2008/000025
Other languages
French (fr)
Other versions
WO2009056148A3 (en
Inventor
Jouko VIERUMÄKI
Original Assignee
Fromdistance As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fromdistance As filed Critical Fromdistance As
Publication of WO2009056148A2 publication Critical patent/WO2009056148A2/en
Publication of WO2009056148A3 publication Critical patent/WO2009056148A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0883Semiautomatic configuration, e.g. proposals from system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications

Definitions

  • the present invention relates to management of mobile devices, especially mobile phones.
  • OMA Open Mobile Alliance
  • DM Device Management
  • An OMA DM structure is provided as an extension to the tree structure of the OMA DM standard.
  • the OMA DM extension allows selected vendor specific parameters and settings to be managed under the OMA DM protocol.
  • OMA Open Mobile Alliance
  • DM Device Management
  • Existing mobile device management system includes a mobile device, having (OMA) (DM) support, and (OMA) (DM) server.
  • DM server 4 sends a SMS 5 to the (OMA) DM client and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device).
  • Request from (OMA) DM client's device is sent via wireless network 6 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into server 4 to carry out an inventory of the user's resources ( settings, user data, etc.).
  • the session server In response to the session server transmits to the user's device necessary settings, themes, policies, software packages, requests for information, etc. There may be several requests and responses during proprietary DM session.
  • MDM system of the present invention enabling information management or service provider of an enterprise to configure devices, install and uninstall applications, set restrictions for end users, take backups, collect inventory of devices and applications and support end users in case of trouble.
  • MDM system of the present invention is a client server solution with secure interface between the two.
  • MDM system server may be installed on customer's server or it may be offered remotely as service.
  • MDM system server All parameters related to device management are configured on MDM system server: - Device security settings;
  • MDM system can be used for:
  • VNC Virtual Network Computing
  • MDM system client is normally invisible to the end user. It, however, monitors the device and its usage and is invoked in following situations:
  • a message is sent from the administrator to the end user; - User should address an issue (like low memory).
  • MDM server is considered an administrator tool.
  • MDM client can be distributed in two ways: 1. Sending a link to MDM client using MDM server.
  • MDM server has tool for sending
  • MDM client can be installed by the end users of the devices just like any application. In this case, the administrator needs to send MDM client to end users and to add their devices to the MDM server database. MDM clients are activated either manually or by SMS.
  • the method selected for distribution of MDM client normally depends on whether the devices get to their users via administrator or not.
  • MDM client After its first connection with the MDM server, MDM client shall continue connecting the server. Connection intervals are defined on MDM server - they can also be overridden by a manually given date and time. Also the user of the device may initiate a session with the MDM server manually. All additional settings on the devices are controlled and/or deployed within normat client- initiated sessions remotely.
  • MDM server needs to initiate a session with MDM client SMS is used to trigger the session.
  • the need for server-initiated activity may be caused by some of the following reasons:
  • Connectivity (access point) settings on mobile device need to be altered in order to connect to MDM server.
  • Server access information (server address and/or password) needs to be changed unexpectedly.
  • Remote device access session is started.
  • an SSH tunnel is opened from device to MDM Server. This allows VNC connection to be established between device and Java-based VNC client. Deployment and monitoring of security settings
  • Security settings of devices are fundamental for any security scheme deployed within an enterprise. These settings include parameters related to Bluetooth settings as well as deployment of lock codes of the devices.
  • the company policy on these settings can be defined in MDM server, while MDM client takes care of deployment of the defined policy. It is up to the administrator to decide whether end-user needs to approve the policy prior to deployment or not. Should the user need to approve changes, MDM client will ask for his/her approval and make the settings automatically. In no case the administrator has a need to write device-specific instructions for the users in order to deploy a security policy. All security settings may be targeted to defined device models and/or user groups as well as individually selected devices.
  • MDM makes provisioning of software to mobile devices easy and efficient.
  • MDM Server offers tools for making software available for devices - furthermore, it allows administrators to monitor applications that have been installed and run on devices. Silent installation and uninstallation of software is supported.
  • Different software packages may be targeted to different device models and different user groups as well as individually selected devices.
  • MDM server generates a report that helps the administrator to understand the install base of applications. This is particularly helpful when purchasing or managing software licences.
  • the messaging function of MDM is a complementary channel for getting messages to end users.
  • the messages are delivered within normal MDM sessions, making them a cost- efficient way to broadcast messages.
  • MDM follows delivery of messages, enabling the administrator to see when messages have been sent to users and when they actually become read.
  • MDM system facilitates remote desktop access to mobile devices. This feature is particularly useful for helpdesk and troubleshooting. Like in the screenshot below, device doesn't need to have 3 G or WLAN connectivity. Remote access is based on VNC and it allows administrator to access all device functionalities. User's permission is always prompted before remote access session is established for privacy reasons.
  • File transfers Selected MDM clients may be commanded to fetch any files from MDM server in a secure manner. Also, files may be pulled from selected devices to server side; files and folders may be created and deleted etc. No user involvement is needed. After each transaction - if administrator chooses so - a message written by administrator is displayed to the user. Delivery and execution of each file command is tracked. File commands may be executed in batches where execution of a command is conditional to successful execution of the previous command.
  • Back-ups may be taken from one type of device and restored to another. For instance, data backed up from a Windows Mobile device may be restored to a Series 60 mobile device device or vice versa. No user involvement whatsoever is required for either back-up or restore. Back-up and restore commands may be executed for selected device(s) or the whole device base.
  • Any application on selected devices may be executed automatically, with or without parameters. Also, any file may be launched on the device; application associated with the corresponding file extension will be used to process the file.
  • Certificates may be installed on devices, OMA DM (Open Mobile Alliance Device Management) commands may be executed, devices may be rebooted etc. Progress of execution commands is tracked.
  • OMA DM Open Mobile Alliance Device Management
  • MDM client When a device arrives to a new country and registers itself to any mobile network (not necessarily yet being able to connect to the Internet), MDM client displays a country- specific message written by administrator. The contents of these messages are automatically pushed to all devices during normal connections. With these country-specific messages it is possible - for instance - to instruct users to use a specific network or warn them of problems with GPRS roaming etc. In many cases significant savings can be achieved by selecting correct network for roaming.
  • Detonation of confidential data MDM can be used to detonate confidential data on lost or stolen devices. This task can be executed by sending a special-content SMS to the device. Detonation of confidential data can also be performed during the course of a normal (client-initiated) session. This is the only option when device's SEVl card has been replaced with another SIM card by an unauthorized device holder. Detonation erases all data from both device memory and memory card.
  • MDM Server is written with PHP, making it practically independent on the server platform to be used. It only requires (besides the PHP support) an SQL database (like MySQL, MS SQL Server or Oracle) and a web server (like Apache or IIS). Requirements for the hardware depend on number of devices and selected software environment (operating system, database, web server). However, any modern server with decent software environment is capable of handling a device base of thousands of devices with typical connection intervals.
  • the user interface of MDM server is browser-based, so a web browser with JavaScript support is needed. For remote device access, also Java applets need to be supported by the browser.
  • Figure 1 depicts a prior art mobile device management system.
  • Figure 2 depicts a preferred embodiment of the mobile device management system according to the present invention.
  • Figure 3 depicts a prior art mobile device schematic diagram.
  • Figure 4 depicts a preferred embodiment of the mobile device schematic diagram according to the present invention.
  • a preferred embodiment of the invention depicted in the figure 2 comprises (OMA) DM compatible device like for example mobile device 7, which is connected to proprietary device management server 9 via communication network 8. Between the (OMA) DM of the mobile device 7 and server 9 there is continuous data exchange.
  • OMA In need (OMA) DM server 9 sends to (OMA) DM client SMS 10 and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device).
  • Request from (OMA) DM client's device is sent via wireless network 8 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into the server 9 to carry out an inventory of the user's resources ( settings, user data, etc.).
  • wireless network 8 WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth
  • the server 9 transmits to the user's mobile device 7 necessary settings, themes, policies, SW packages, requests for information, etc.
  • MDM system server 9 may be installed on customer's server or it may be offered remotely as service.
  • MDM system server 9 may be based for example on OS Windows or Unix/Linux, data base of the MDM server may be based on known SQL database (like MySQL, MS SQL server or Oracle).
  • MDM server 9 is connected to Administration interface 12, which is browser based interface for administering MDM server and for accessing devices remotely.
  • the browser-based interface of MDM Server is used to monitor and control the device base equipped with MDM Clients.
  • OMA DM server 13 Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM " server interface 14 (see figure 4).
  • OMA DM server 13 Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM " server interface 14 (see figure 4).
  • the broader device management framework together with the smart DM client can be used as the overall framework - the more narrow OMA DM framework works in the mobile device 7 as a subset.
  • OMA DM interface can be used in two ways:
  • the DM client decides whether the changes on device are performed directly by the DM client by accessing/writing device resources - or, if it instructs OMA DM client to connect with the virtual OMA DM server 2 from where OMA DM client gets the necessary instructions and communicates them with device resources (look figure 4).
  • OMA DM instructions can be encapsulated (wrapped) into the DM server/client communication and passed directly to OMA DM client through the virtual OMA DM server 2.
  • proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device.
  • OMA OMA DM instructions
  • proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device.
  • Local (OMA) DM server 2 may also access/write device resources independently (C).

Abstract

Mobile device management system comprises a mobile device, where is OMA DM (Open Mobile Alliance Device Management) interface, and a server. Management of the mobile device is executed through a proprietory OMA DM server. Using the management system of the invention it is possible to configure mobile phones, smart phones and computers, install, uninstall applications, set up restrictions to the end user, make backup copies, perform the inventory of the devices and applications and support the end users in trouble. Mobile device management system can be installed into client server or it can be as a remote service. In addition mobile device management system can be used for distribution of software (including silent install), sending messages to users (with secure, reported delivery), generation of reports, taking back-ups of devices (and restoring data to devices), accessing devices remotely, and other similar. MDM client is normally invisible to the end user.

Description

Mobile device management system
Field of the invention
The present invention relates to management of mobile devices, especially mobile phones.
Background US2005055397 discloses method and system that extends the functionality of the Open Mobile Alliance (OMA) Device Management (DM) standard to manage vendor specific configuration parameters and settings. An OMA DM structure is provided as an extension to the tree structure of the OMA DM standard. The OMA DM extension allows selected vendor specific parameters and settings to be managed under the OMA DM protocol. In prior art the management of mobile device uses Open Mobile Alliance (OMA) Device Management (DM). Existing mobile device management system includes a mobile device, having (OMA) (DM) support, and (OMA) (DM) server.
Between the (OMA) (DM) interface of the mobile device 1 (look figures 1 and 3) and resources of the device there takes place continuous data exchange. In need (OMA) DM server 4 sends a SMS 5 to the (OMA) DM client and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device). Request from (OMA) DM client's device is sent via wireless network 6 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into server 4 to carry out an inventory of the user's resources ( settings, user data, etc.).
In response to the session server transmits to the user's device necessary settings, themes, policies, software packages, requests for information, etc. There may be several requests and responses during proprietary DM session.
Solutions known in the prior art do not provide sufficient functionality for management of the devices.
Summary of the invention
In organisations are many mobile phones, smartphones and computers that can use mobile device management (MDM) system of the present invention, enabling information management or service provider of an enterprise to configure devices, install and uninstall applications, set restrictions for end users, take backups, collect inventory of devices and applications and support end users in case of trouble. MDM system of the present invention is a client server solution with secure interface between the two. MDM system server may be installed on customer's server or it may be offered remotely as service.
All parameters related to device management are configured on MDM system server: - Device security settings;
- Device connection settings;
- Blacklist of applications;
- List of mandatory applications;
- List of mandatory access points; - Access point restrictions;
- E-mail settings;
- OMA DM operations;
- other similar.
All these settings can be set for individually selected devices and on bases of device models and/or user groups. Furthermore, MDM system can be used for:
- Distribution of software (including silent install);
- Sending messages to users (with secure, reported delivery);
- Transferring files to/from devices;
- Generation of reports; - Taking back-ups of devices (and restoring data to devices);
- Restricting user activities;
- Accessing devices remotely (VNC, Virtual Network Computing);
- other similar.
MDM system client is normally invisible to the end user. It, however, monitors the device and its usage and is invoked in following situations:
- Blacklisted applications are either installed or run;
- Mandatory applications are not installed or running;
- Security settings of the device are compromised;
- A message is sent from the administrator to the end user; - User should address an issue (like low memory).
MDM server is considered an administrator tool. MDM client can be distributed in two ways: 1. Sending a link to MDM client using MDM server. MDM server has tool for sending
OTA (Over-The-Air) SMS messages. Sending a link to MDM client installation package enables end user to open the link and install MDM client with very little effort. After installation, MDM client is activated either manually or by SMS. 2. Software package delivery
MDM client can be installed by the end users of the devices just like any application. In this case, the administrator needs to send MDM client to end users and to add their devices to the MDM server database. MDM clients are activated either manually or by SMS.
The method selected for distribution of MDM client normally depends on whether the devices get to their users via administrator or not.
After its first connection with the MDM server, MDM client shall continue connecting the server. Connection intervals are defined on MDM server - they can also be overridden by a manually given date and time. Also the user of the device may initiate a session with the MDM server manually. All additional settings on the devices are controlled and/or deployed within normat client- initiated sessions remotely.
Server-initiated sessions
When MDM server needs to initiate a session with MDM client SMS is used to trigger the session. The need for server-initiated activity may be caused by some of the following reasons:
1. Connectivity (access point) settings on mobile device need to be altered in order to connect to MDM server.
2. Confidential data on mobile device needs to be erased in case of theft or loss
3. Server access information (server address and/or password) needs to be changed unexpectedly.
4. Sessions need to re-scheduled (a session should take place immediately).
5. Remote device access session is started. In this case, after receiving the SMS, an SSH tunnel is opened from device to MDM Server. This allows VNC connection to be established between device and Java-based VNC client. Deployment and monitoring of security settings
Security settings of devices are fundamental for any security scheme deployed within an enterprise. These settings include parameters related to Bluetooth settings as well as deployment of lock codes of the devices. The company policy on these settings can be defined in MDM server, while MDM client takes care of deployment of the defined policy. It is up to the administrator to decide whether end-user needs to approve the policy prior to deployment or not. Should the user need to approve changes, MDM client will ask for his/her approval and make the settings automatically. In no case the administrator has a need to write device-specific instructions for the users in order to deploy a security policy. All security settings may be targeted to defined device models and/or user groups as well as individually selected devices.
Distribution and monitoring of applications installed and/or run on devices
MDM makes provisioning of software to mobile devices easy and efficient. MDM Server offers tools for making software available for devices - furthermore, it allows administrators to monitor applications that have been installed and run on devices. Silent installation and uninstallation of software is supported.
Different software packages may be targeted to different device models and different user groups as well as individually selected devices.
MDM server generates a report that helps the administrator to understand the install base of applications. This is particularly helpful when purchasing or managing software licences.
Messaging
The messaging function of MDM is a complementary channel for getting messages to end users. The messages are delivered within normal MDM sessions, making them a cost- efficient way to broadcast messages.
MDM follows delivery of messages, enabling the administrator to see when messages have been sent to users and when they actually become read.
Remote access to device
MDM system according to the invention facilitates remote desktop access to mobile devices. This feature is particularly useful for helpdesk and troubleshooting. Like in the screenshot below, device doesn't need to have 3 G or WLAN connectivity. Remote access is based on VNC and it allows administrator to access all device functionalities. User's permission is always prompted before remote access session is established for privacy reasons.
File transfers Selected MDM clients may be commanded to fetch any files from MDM server in a secure manner. Also, files may be pulled from selected devices to server side; files and folders may be created and deleted etc. No user involvement is needed. After each transaction - if administrator chooses so - a message written by administrator is displayed to the user. Delivery and execution of each file command is tracked. File commands may be executed in batches where execution of a command is conditional to successful execution of the previous command.
Back-up/restore
Key personal data - like contacts, calendar (with meeting notes) and messages - can be backed up over the air. Back-ups may be taken from one type of device and restored to another. For instance, data backed up from a Windows Mobile device may be restored to a Series 60 mobile device device or vice versa. No user involvement whatsoever is required for either back-up or restore. Back-up and restore commands may be executed for selected device(s) or the whole device base.
Execution of commands on selected devices Any application on selected devices may be executed automatically, with or without parameters. Also, any file may be launched on the device; application associated with the corresponding file extension will be used to process the file.
Certificates may be installed on devices, OMA DM (Open Mobile Alliance Device Management) commands may be executed, devices may be rebooted etc. Progress of execution commands is tracked.
Country information
When a device arrives to a new country and registers itself to any mobile network (not necessarily yet being able to connect to the Internet), MDM client displays a country- specific message written by administrator. The contents of these messages are automatically pushed to all devices during normal connections. With these country-specific messages it is possible - for instance - to instruct users to use a specific network or warn them of problems with GPRS roaming etc. In many cases significant savings can be achieved by selecting correct network for roaming.
Detonation of confidential data MDM can be used to detonate confidential data on lost or stolen devices. This task can be executed by sending a special-content SMS to the device. Detonation of confidential data can also be performed during the course of a normal (client-initiated) session. This is the only option when device's SEVl card has been replaced with another SIM card by an unauthorized device holder. Detonation erases all data from both device memory and memory card.
Technical notes
MDM Server is written with PHP, making it practically independent on the server platform to be used. It only requires (besides the PHP support) an SQL database (like MySQL, MS SQL Server or Oracle) and a web server (like Apache or IIS). Requirements for the hardware depend on number of devices and selected software environment (operating system, database, web server). However, any modern server with decent software environment is capable of handling a device base of thousands of devices with typical connection intervals. The user interface of MDM server is browser-based, so a web browser with JavaScript support is needed. For remote device access, also Java applets need to be supported by the browser.
Brief description of the drawings
Figure 1 depicts a prior art mobile device management system.
Figure 2 depicts a preferred embodiment of the mobile device management system according to the present invention. Figure 3 depicts a prior art mobile device schematic diagram.
Figure 4 depicts a preferred embodiment of the mobile device schematic diagram according to the present invention.
Detailed description of the preferred embodiment
A preferred embodiment of the invention depicted in the figure 2 comprises (OMA) DM compatible device like for example mobile device 7, which is connected to proprietary device management server 9 via communication network 8. Between the (OMA) DM of the mobile device 7 and server 9 there is continuous data exchange. In need (OMA) DM server 9 sends to (OMA) DM client SMS 10 and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device). Request from (OMA) DM client's device is sent via wireless network 8 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into the server 9 to carry out an inventory of the user's resources ( settings, user data, etc.). In response to the session the server 9 transmits to the user's mobile device 7 necessary settings, themes, policies, SW packages, requests for information, etc. There may be several requests and responses during proprietary DM session. MDM system server 9 may be installed on customer's server or it may be offered remotely as service. MDM system server 9 may be based for example on OS Windows or Unix/Linux, data base of the MDM server may be based on known SQL database (like MySQL, MS SQL server or Oracle). MDM server 9 is connected to Administration interface 12, which is browser based interface for administering MDM server and for accessing devices remotely. The browser-based interface of MDM Server is used to monitor and control the device base equipped with MDM Clients. Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM "server interface 14 (see figure 4). In that specific solution the broader device management framework together with the smart DM client can be used as the overall framework - the more narrow OMA DM framework works in the mobile device 7 as a subset.
OMA DM interface can be used in two ways:
1) One can change settings of mobile device 7 using the framework and passing the necessary instructions from the DM server 9 to DM client (mobile device 7). The DM client then decides whether the changes on device are performed directly by the DM client by accessing/writing device resources - or, if it instructs OMA DM client to connect with the virtual OMA DM server 2 from where OMA DM client gets the necessary instructions and communicates them with device resources (look figure 4).
2) OMA DM instructions can be encapsulated (wrapped) into the DM server/client communication and passed directly to OMA DM client through the virtual OMA DM server 2. The difference to the previous option is that in this case the DM client doesn't necessarily understand the meaning of the instructions as such - it's just being used as a transport of the instructions between device and server-side infrastructure. On device, proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device. Local (OMA) DM server 2 may also access/write device resources independently (C).

Claims

Claims
1. Mobile device management system that consists of a mobile device (1), which is connected OTA (over-the-air) to an OMA DM server (4) via the OMA DM interface (2), characterized in that, it has the OMA DM server on the mobile device and the management system contains the owner's OMA DM server (9).
2. Mobile device management system according to the claim 1, characterized in that, the mobile device (1) is connected to the owner's OMA DM server (4) so that with one session the DM server can send an unlimited number of OMA DM commands to a mobile device.
3. Mobile device management system according to the claim 1, characterized in that, the mobile device is configured to use its existing files as OMA DM commands parameters without having to resend the OTA.
4. Mobile device management system according to the claim 1, characterized in that, the mobile device is configured to create an OMA DM sessions without an external data connection.
5. Mobile device management system according to the claim 1, characterized in that, a proprietary DM client is configured to independently to manage mobile device resources.
6. Mobile device management system according to the claim 1, characterized in that, a proprietary DM client is configured to command OMA DM clients to connect to local proprietary OMA DM server and to read/write necessary mobile device information.
PCT/EE2008/000025 2007-10-29 2008-10-27 Mobile device management system WO2009056148A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EEP200700055A EE200700055A (en) 2007-10-29 2007-10-29 Mobile device management scheme
EE200700055 2007-10-29

Publications (2)

Publication Number Publication Date
WO2009056148A2 true WO2009056148A2 (en) 2009-05-07
WO2009056148A3 WO2009056148A3 (en) 2009-06-18

Family

ID=40545936

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EE2008/000025 WO2009056148A2 (en) 2007-10-29 2008-10-27 Mobile device management system

Country Status (2)

Country Link
EE (1) EE200700055A (en)
WO (1) WO2009056148A2 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140006225A1 (en) * 2012-06-28 2014-01-02 Adobe Systems Incorporated Automatic device inventory management for different types of devices
US8650277B2 (en) 2010-02-03 2014-02-11 Symantec Corporation Method, system, and computer readable medium for gathering usage statistics
WO2014030905A1 (en) * 2012-08-20 2014-02-27 엘지전자 주식회사 Method and apparatus for enabling or disabling server in wireless communication system
US20140258511A1 (en) * 2013-03-11 2014-09-11 Bluebox Security Inc. Methods and Apparatus for Reestablishing Secure Network Communications
US8838087B1 (en) 2010-09-06 2014-09-16 Sprint Communications Company L.P. Provisioning system and methods for interfaceless phone
US8843122B1 (en) * 2012-06-29 2014-09-23 Sprint Communications Company L.P. Mobile phone controls preprocessor
US8954041B1 (en) 2011-02-08 2015-02-10 Sprint Communications Company L.P. System and method for ID platform
US8972592B1 (en) 2011-05-27 2015-03-03 Sprint Communications Company L.P. Extending an interface pack to a computer system
CN104461648A (en) * 2014-12-22 2015-03-25 广东欧珀移动通信有限公司 OTA upgrade backing-up method and system for intelligent terminals
US9043446B1 (en) 2011-03-10 2015-05-26 Sprint Communications Company L.P. Mirroring device interface components for content sharing
US9123062B1 (en) 2011-02-18 2015-09-01 Sprint Communications Company L.P. Ad sponsored interface pack
US9125060B2 (en) 2013-11-22 2015-09-01 At&T Mobility Ii Llc Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US20150378709A1 (en) * 2014-06-27 2015-12-31 International Business Machines Corporation Installation of Software Applications on Mobile Devices Based on Positions Thereof
US9342381B2 (en) 2011-02-03 2016-05-17 Symantec Corporation Method and system for establishing a DLP-compliant environment
US9386395B1 (en) 2010-09-06 2016-07-05 Sprint Communications Company L.P. Dynamic loading, unloading, and caching of alternate complete interfaces
US9413839B2 (en) 2012-07-31 2016-08-09 Sprint Communications Company L.P. Traffic management of third party applications
CN105872775A (en) * 2015-12-09 2016-08-17 乐视致新电子科技(天津)有限公司 Silent uninstalling method and device for smart cloud TV application
US9442709B1 (en) 2012-10-24 2016-09-13 Sprint Communications Company L.P. Transition experience during loading and updating an interface and applications pack
US9483253B1 (en) 2015-04-30 2016-11-01 Sprint Communications Company L.P. Methods for customization of default applications on a mobile communication device
US9513888B1 (en) 2014-01-30 2016-12-06 Sprint Communications Company L.P. Virtual preloads
US10437625B2 (en) 2017-06-16 2019-10-08 Microsoft Technology Licensing, Llc Evaluating configuration requests in a virtual machine
US10516762B2 (en) 2016-05-03 2019-12-24 Zillion Group, Inc. System for remotely running a service program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1515571A2 (en) * 2003-09-08 2005-03-16 Microsoft Corporation System and method for an OMA DM extension to manage mobile device configuration settings
WO2007006859A1 (en) * 2005-07-12 2007-01-18 Capricode Oy Method and device arrangement for managing a client/server environment
US20070169093A1 (en) * 2005-08-05 2007-07-19 Logan Will K Centrally managed solution for all device management activities

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1515571A2 (en) * 2003-09-08 2005-03-16 Microsoft Corporation System and method for an OMA DM extension to manage mobile device configuration settings
WO2007006859A1 (en) * 2005-07-12 2007-01-18 Capricode Oy Method and device arrangement for managing a client/server environment
US20070169093A1 (en) * 2005-08-05 2007-07-19 Logan Will K Centrally managed solution for all device management activities

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Device Management Architecture; OMA-AD_DM-V1_0-20050530-D" INTERNET CITATION, [Online] XP002433524 Retrieved from the Internet: URL:http://member.openmobilealliance.org/ftp/Publicdocuments/DM/Permanentdocuments/OMA-AD-DM-V_0-20050530-D.zip> [retrieved on 2007-05-14] *
"OMA DEVICE MANAGEMENT PROTOCOL; CANDIDATE VERSION 1.2" INTERNET CITATION, [Online] XP003018609 Retrieved from the Internet: URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-200604_24-C/OMA-TS-DM-Protocol-V1_2-20060424-C.pdf> [retrieved on 2006-01-01] *

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8924461B2 (en) 2010-02-03 2014-12-30 Symantec Corporation Method, system, and computer readable medium for remote assistance, support, and troubleshooting
US8650277B2 (en) 2010-02-03 2014-02-11 Symantec Corporation Method, system, and computer readable medium for gathering usage statistics
US9369357B2 (en) 2010-02-03 2016-06-14 Symantec Corporation Method, system, and computer readable medium for remote device management
US8997092B2 (en) 2010-02-03 2015-03-31 Symantec Corporation Method, system, and computer readable medium for provisioning and remote distribution
US9386395B1 (en) 2010-09-06 2016-07-05 Sprint Communications Company L.P. Dynamic loading, unloading, and caching of alternate complete interfaces
US8838087B1 (en) 2010-09-06 2014-09-16 Sprint Communications Company L.P. Provisioning system and methods for interfaceless phone
US9342381B2 (en) 2011-02-03 2016-05-17 Symantec Corporation Method and system for establishing a DLP-compliant environment
US8954041B1 (en) 2011-02-08 2015-02-10 Sprint Communications Company L.P. System and method for ID platform
US9123062B1 (en) 2011-02-18 2015-09-01 Sprint Communications Company L.P. Ad sponsored interface pack
US9043446B1 (en) 2011-03-10 2015-05-26 Sprint Communications Company L.P. Mirroring device interface components for content sharing
US8972592B1 (en) 2011-05-27 2015-03-03 Sprint Communications Company L.P. Extending an interface pack to a computer system
US20140006225A1 (en) * 2012-06-28 2014-01-02 Adobe Systems Incorporated Automatic device inventory management for different types of devices
US9117191B2 (en) * 2012-06-28 2015-08-25 Adobe Systems Incorporated Automatic device inventory management for different types of devices
US9189607B1 (en) 2012-06-29 2015-11-17 Sprint Communications Company L.P. Mobile phone controls preprocessor
US8843122B1 (en) * 2012-06-29 2014-09-23 Sprint Communications Company L.P. Mobile phone controls preprocessor
US9413839B2 (en) 2012-07-31 2016-08-09 Sprint Communications Company L.P. Traffic management of third party applications
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US9811672B2 (en) 2012-08-10 2017-11-07 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US9762465B2 (en) 2012-08-20 2017-09-12 Lg Electronics Inc. Method and apparatus for transmitting a response to a command in wireless communication system
WO2014030905A1 (en) * 2012-08-20 2014-02-27 엘지전자 주식회사 Method and apparatus for enabling or disabling server in wireless communication system
US9442709B1 (en) 2012-10-24 2016-09-13 Sprint Communications Company L.P. Transition experience during loading and updating an interface and applications pack
US20140258511A1 (en) * 2013-03-11 2014-09-11 Bluebox Security Inc. Methods and Apparatus for Reestablishing Secure Network Communications
US9125060B2 (en) 2013-11-22 2015-09-01 At&T Mobility Ii Llc Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data
US9513888B1 (en) 2014-01-30 2016-12-06 Sprint Communications Company L.P. Virtual preloads
US20150378709A1 (en) * 2014-06-27 2015-12-31 International Business Machines Corporation Installation of Software Applications on Mobile Devices Based on Positions Thereof
US9817649B2 (en) * 2014-06-27 2017-11-14 International Business Machines Corporation Installation of software applications on mobile devices based on positions thereof
CN104461648A (en) * 2014-12-22 2015-03-25 广东欧珀移动通信有限公司 OTA upgrade backing-up method and system for intelligent terminals
CN104461648B (en) * 2014-12-22 2017-10-31 广东欧珀移动通信有限公司 A kind of method and system of intelligent terminal OTA upgradings backup
US9483253B1 (en) 2015-04-30 2016-11-01 Sprint Communications Company L.P. Methods for customization of default applications on a mobile communication device
CN105872775A (en) * 2015-12-09 2016-08-17 乐视致新电子科技(天津)有限公司 Silent uninstalling method and device for smart cloud TV application
US10516762B2 (en) 2016-05-03 2019-12-24 Zillion Group, Inc. System for remotely running a service program
US10437625B2 (en) 2017-06-16 2019-10-08 Microsoft Technology Licensing, Llc Evaluating configuration requests in a virtual machine

Also Published As

Publication number Publication date
EE200700055A (en) 2009-06-15
WO2009056148A3 (en) 2009-06-18

Similar Documents

Publication Publication Date Title
WO2009056148A2 (en) Mobile device management system
US8214471B2 (en) Synchronizing information through profile management between a host system and a mobile device
US10034259B2 (en) Mobile device management
US9037685B2 (en) Intelligent migration between devices having different hardware or software configuration
EP1523152B1 (en) Connector gateway
EP2095254B1 (en) Over-the-air device kill pill and lock
EP2012229B1 (en) Mobile provisioning tool system
US7987449B1 (en) Network for lifecycle management of firmware and software in electronic devices
US9705738B2 (en) System for cloud-managed mobile device administration
US8135798B2 (en) Over-the-air device services and management
US7975030B2 (en) Remote configuration of devices using a secure connection
US20070093243A1 (en) Device management system
US20110082900A1 (en) System and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US20080115141A1 (en) Dynamic resource management
US20090313264A1 (en) Device-side data de-duping
AU2013247347A1 (en) Configuration of third party applications in a sandboxed environment
CA2811332C (en) Storage of applications and associated digital goods for use in wireless communication devices and systems
EP2115577A1 (en) Intelligent migration between devices having different hardware or software configuration
US20130165099A1 (en) Enhanced System and Method for Custom Programming of Large Groups of Phones Without Requiring Additional Equipment
CN107194241B (en) Control method of terminal equipment, server, terminal equipment and control system
US20160028853A1 (en) System and methods to store, retrieve, manage, augment and monitor applications on appliances

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08843623

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008843623

Country of ref document: EP

122 Ep: pct application non-entry in european phase

Ref document number: 08843623

Country of ref document: EP

Kind code of ref document: A2