WO2009056148A2 - Mobile device management system - Google Patents
Mobile device management system Download PDFInfo
- Publication number
- WO2009056148A2 WO2009056148A2 PCT/EE2008/000025 EE2008000025W WO2009056148A2 WO 2009056148 A2 WO2009056148 A2 WO 2009056148A2 EE 2008000025 W EE2008000025 W EE 2008000025W WO 2009056148 A2 WO2009056148 A2 WO 2009056148A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile device
- server
- oma
- management system
- devices
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0883—Semiautomatic configuration, e.g. proposals from system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
Definitions
- the present invention relates to management of mobile devices, especially mobile phones.
- OMA Open Mobile Alliance
- DM Device Management
- An OMA DM structure is provided as an extension to the tree structure of the OMA DM standard.
- the OMA DM extension allows selected vendor specific parameters and settings to be managed under the OMA DM protocol.
- OMA Open Mobile Alliance
- DM Device Management
- Existing mobile device management system includes a mobile device, having (OMA) (DM) support, and (OMA) (DM) server.
- DM server 4 sends a SMS 5 to the (OMA) DM client and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device).
- Request from (OMA) DM client's device is sent via wireless network 6 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into server 4 to carry out an inventory of the user's resources ( settings, user data, etc.).
- the session server In response to the session server transmits to the user's device necessary settings, themes, policies, software packages, requests for information, etc. There may be several requests and responses during proprietary DM session.
- MDM system of the present invention enabling information management or service provider of an enterprise to configure devices, install and uninstall applications, set restrictions for end users, take backups, collect inventory of devices and applications and support end users in case of trouble.
- MDM system of the present invention is a client server solution with secure interface between the two.
- MDM system server may be installed on customer's server or it may be offered remotely as service.
- MDM system server All parameters related to device management are configured on MDM system server: - Device security settings;
- MDM system can be used for:
- VNC Virtual Network Computing
- MDM system client is normally invisible to the end user. It, however, monitors the device and its usage and is invoked in following situations:
- a message is sent from the administrator to the end user; - User should address an issue (like low memory).
- MDM server is considered an administrator tool.
- MDM client can be distributed in two ways: 1. Sending a link to MDM client using MDM server.
- MDM server has tool for sending
- MDM client can be installed by the end users of the devices just like any application. In this case, the administrator needs to send MDM client to end users and to add their devices to the MDM server database. MDM clients are activated either manually or by SMS.
- the method selected for distribution of MDM client normally depends on whether the devices get to their users via administrator or not.
- MDM client After its first connection with the MDM server, MDM client shall continue connecting the server. Connection intervals are defined on MDM server - they can also be overridden by a manually given date and time. Also the user of the device may initiate a session with the MDM server manually. All additional settings on the devices are controlled and/or deployed within normat client- initiated sessions remotely.
- MDM server needs to initiate a session with MDM client SMS is used to trigger the session.
- the need for server-initiated activity may be caused by some of the following reasons:
- Connectivity (access point) settings on mobile device need to be altered in order to connect to MDM server.
- Server access information (server address and/or password) needs to be changed unexpectedly.
- Remote device access session is started.
- an SSH tunnel is opened from device to MDM Server. This allows VNC connection to be established between device and Java-based VNC client. Deployment and monitoring of security settings
- Security settings of devices are fundamental for any security scheme deployed within an enterprise. These settings include parameters related to Bluetooth settings as well as deployment of lock codes of the devices.
- the company policy on these settings can be defined in MDM server, while MDM client takes care of deployment of the defined policy. It is up to the administrator to decide whether end-user needs to approve the policy prior to deployment or not. Should the user need to approve changes, MDM client will ask for his/her approval and make the settings automatically. In no case the administrator has a need to write device-specific instructions for the users in order to deploy a security policy. All security settings may be targeted to defined device models and/or user groups as well as individually selected devices.
- MDM makes provisioning of software to mobile devices easy and efficient.
- MDM Server offers tools for making software available for devices - furthermore, it allows administrators to monitor applications that have been installed and run on devices. Silent installation and uninstallation of software is supported.
- Different software packages may be targeted to different device models and different user groups as well as individually selected devices.
- MDM server generates a report that helps the administrator to understand the install base of applications. This is particularly helpful when purchasing or managing software licences.
- the messaging function of MDM is a complementary channel for getting messages to end users.
- the messages are delivered within normal MDM sessions, making them a cost- efficient way to broadcast messages.
- MDM follows delivery of messages, enabling the administrator to see when messages have been sent to users and when they actually become read.
- MDM system facilitates remote desktop access to mobile devices. This feature is particularly useful for helpdesk and troubleshooting. Like in the screenshot below, device doesn't need to have 3 G or WLAN connectivity. Remote access is based on VNC and it allows administrator to access all device functionalities. User's permission is always prompted before remote access session is established for privacy reasons.
- File transfers Selected MDM clients may be commanded to fetch any files from MDM server in a secure manner. Also, files may be pulled from selected devices to server side; files and folders may be created and deleted etc. No user involvement is needed. After each transaction - if administrator chooses so - a message written by administrator is displayed to the user. Delivery and execution of each file command is tracked. File commands may be executed in batches where execution of a command is conditional to successful execution of the previous command.
- Back-ups may be taken from one type of device and restored to another. For instance, data backed up from a Windows Mobile device may be restored to a Series 60 mobile device device or vice versa. No user involvement whatsoever is required for either back-up or restore. Back-up and restore commands may be executed for selected device(s) or the whole device base.
- Any application on selected devices may be executed automatically, with or without parameters. Also, any file may be launched on the device; application associated with the corresponding file extension will be used to process the file.
- Certificates may be installed on devices, OMA DM (Open Mobile Alliance Device Management) commands may be executed, devices may be rebooted etc. Progress of execution commands is tracked.
- OMA DM Open Mobile Alliance Device Management
- MDM client When a device arrives to a new country and registers itself to any mobile network (not necessarily yet being able to connect to the Internet), MDM client displays a country- specific message written by administrator. The contents of these messages are automatically pushed to all devices during normal connections. With these country-specific messages it is possible - for instance - to instruct users to use a specific network or warn them of problems with GPRS roaming etc. In many cases significant savings can be achieved by selecting correct network for roaming.
- Detonation of confidential data MDM can be used to detonate confidential data on lost or stolen devices. This task can be executed by sending a special-content SMS to the device. Detonation of confidential data can also be performed during the course of a normal (client-initiated) session. This is the only option when device's SEVl card has been replaced with another SIM card by an unauthorized device holder. Detonation erases all data from both device memory and memory card.
- MDM Server is written with PHP, making it practically independent on the server platform to be used. It only requires (besides the PHP support) an SQL database (like MySQL, MS SQL Server or Oracle) and a web server (like Apache or IIS). Requirements for the hardware depend on number of devices and selected software environment (operating system, database, web server). However, any modern server with decent software environment is capable of handling a device base of thousands of devices with typical connection intervals.
- the user interface of MDM server is browser-based, so a web browser with JavaScript support is needed. For remote device access, also Java applets need to be supported by the browser.
- Figure 1 depicts a prior art mobile device management system.
- Figure 2 depicts a preferred embodiment of the mobile device management system according to the present invention.
- Figure 3 depicts a prior art mobile device schematic diagram.
- Figure 4 depicts a preferred embodiment of the mobile device schematic diagram according to the present invention.
- a preferred embodiment of the invention depicted in the figure 2 comprises (OMA) DM compatible device like for example mobile device 7, which is connected to proprietary device management server 9 via communication network 8. Between the (OMA) DM of the mobile device 7 and server 9 there is continuous data exchange.
- OMA In need (OMA) DM server 9 sends to (OMA) DM client SMS 10 and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device).
- Request from (OMA) DM client's device is sent via wireless network 8 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into the server 9 to carry out an inventory of the user's resources ( settings, user data, etc.).
- wireless network 8 WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth
- the server 9 transmits to the user's mobile device 7 necessary settings, themes, policies, SW packages, requests for information, etc.
- MDM system server 9 may be installed on customer's server or it may be offered remotely as service.
- MDM system server 9 may be based for example on OS Windows or Unix/Linux, data base of the MDM server may be based on known SQL database (like MySQL, MS SQL server or Oracle).
- MDM server 9 is connected to Administration interface 12, which is browser based interface for administering MDM server and for accessing devices remotely.
- the browser-based interface of MDM Server is used to monitor and control the device base equipped with MDM Clients.
- OMA DM server 13 Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM " server interface 14 (see figure 4).
- OMA DM server 13 Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM " server interface 14 (see figure 4).
- the broader device management framework together with the smart DM client can be used as the overall framework - the more narrow OMA DM framework works in the mobile device 7 as a subset.
- OMA DM interface can be used in two ways:
- the DM client decides whether the changes on device are performed directly by the DM client by accessing/writing device resources - or, if it instructs OMA DM client to connect with the virtual OMA DM server 2 from where OMA DM client gets the necessary instructions and communicates them with device resources (look figure 4).
- OMA DM instructions can be encapsulated (wrapped) into the DM server/client communication and passed directly to OMA DM client through the virtual OMA DM server 2.
- proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device.
- OMA OMA DM instructions
- proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device.
- Local (OMA) DM server 2 may also access/write device resources independently (C).
Abstract
Mobile device management system comprises a mobile device, where is OMA DM (Open Mobile Alliance Device Management) interface, and a server. Management of the mobile device is executed through a proprietory OMA DM server. Using the management system of the invention it is possible to configure mobile phones, smart phones and computers, install, uninstall applications, set up restrictions to the end user, make backup copies, perform the inventory of the devices and applications and support the end users in trouble. Mobile device management system can be installed into client server or it can be as a remote service. In addition mobile device management system can be used for distribution of software (including silent install), sending messages to users (with secure, reported delivery), generation of reports, taking back-ups of devices (and restoring data to devices), accessing devices remotely, and other similar. MDM client is normally invisible to the end user.
Description
Mobile device management system
Field of the invention
The present invention relates to management of mobile devices, especially mobile phones.
Background US2005055397 discloses method and system that extends the functionality of the Open Mobile Alliance (OMA) Device Management (DM) standard to manage vendor specific configuration parameters and settings. An OMA DM structure is provided as an extension to the tree structure of the OMA DM standard. The OMA DM extension allows selected vendor specific parameters and settings to be managed under the OMA DM protocol. In prior art the management of mobile device uses Open Mobile Alliance (OMA) Device Management (DM). Existing mobile device management system includes a mobile device, having (OMA) (DM) support, and (OMA) (DM) server.
Between the (OMA) (DM) interface of the mobile device 1 (look figures 1 and 3) and resources of the device there takes place continuous data exchange. In need (OMA) DM server 4 sends a SMS 5 to the (OMA) DM client and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device). Request from (OMA) DM client's device is sent via wireless network 6 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into server 4 to carry out an inventory of the user's resources ( settings, user data, etc.).
In response to the session server transmits to the user's device necessary settings, themes, policies, software packages, requests for information, etc. There may be several requests and responses during proprietary DM session.
Solutions known in the prior art do not provide sufficient functionality for management of the devices.
Summary of the invention
In organisations are many mobile phones, smartphones and computers that can use mobile device management (MDM) system of the present invention, enabling information management or service provider of an enterprise to configure devices, install and uninstall applications, set restrictions for end users, take backups, collect inventory of devices and applications and support end users in case of trouble.
MDM system of the present invention is a client server solution with secure interface between the two. MDM system server may be installed on customer's server or it may be offered remotely as service.
All parameters related to device management are configured on MDM system server: - Device security settings;
- Device connection settings;
- Blacklist of applications;
- List of mandatory applications;
- List of mandatory access points; - Access point restrictions;
- E-mail settings;
- OMA DM operations;
- other similar.
All these settings can be set for individually selected devices and on bases of device models and/or user groups. Furthermore, MDM system can be used for:
- Distribution of software (including silent install);
- Sending messages to users (with secure, reported delivery);
- Transferring files to/from devices;
- Generation of reports; - Taking back-ups of devices (and restoring data to devices);
- Restricting user activities;
- Accessing devices remotely (VNC, Virtual Network Computing);
- other similar.
MDM system client is normally invisible to the end user. It, however, monitors the device and its usage and is invoked in following situations:
- Blacklisted applications are either installed or run;
- Mandatory applications are not installed or running;
- Security settings of the device are compromised;
- A message is sent from the administrator to the end user; - User should address an issue (like low memory).
MDM server is considered an administrator tool. MDM client can be distributed in two ways:
1. Sending a link to MDM client using MDM server. MDM server has tool for sending
OTA (Over-The-Air) SMS messages. Sending a link to MDM client installation package enables end user to open the link and install MDM client with very little effort. After installation, MDM client is activated either manually or by SMS. 2. Software package delivery
MDM client can be installed by the end users of the devices just like any application. In this case, the administrator needs to send MDM client to end users and to add their devices to the MDM server database. MDM clients are activated either manually or by SMS.
The method selected for distribution of MDM client normally depends on whether the devices get to their users via administrator or not.
After its first connection with the MDM server, MDM client shall continue connecting the server. Connection intervals are defined on MDM server - they can also be overridden by a manually given date and time. Also the user of the device may initiate a session with the MDM server manually. All additional settings on the devices are controlled and/or deployed within normat client- initiated sessions remotely.
Server-initiated sessions
When MDM server needs to initiate a session with MDM client SMS is used to trigger the session. The need for server-initiated activity may be caused by some of the following reasons:
1. Connectivity (access point) settings on mobile device need to be altered in order to connect to MDM server.
2. Confidential data on mobile device needs to be erased in case of theft or loss
3. Server access information (server address and/or password) needs to be changed unexpectedly.
4. Sessions need to re-scheduled (a session should take place immediately).
5. Remote device access session is started. In this case, after receiving the SMS, an SSH tunnel is opened from device to MDM Server. This allows VNC connection to be established between device and Java-based VNC client.
Deployment and monitoring of security settings
Security settings of devices are fundamental for any security scheme deployed within an enterprise. These settings include parameters related to Bluetooth settings as well as deployment of lock codes of the devices. The company policy on these settings can be defined in MDM server, while MDM client takes care of deployment of the defined policy. It is up to the administrator to decide whether end-user needs to approve the policy prior to deployment or not. Should the user need to approve changes, MDM client will ask for his/her approval and make the settings automatically. In no case the administrator has a need to write device-specific instructions for the users in order to deploy a security policy. All security settings may be targeted to defined device models and/or user groups as well as individually selected devices.
Distribution and monitoring of applications installed and/or run on devices
MDM makes provisioning of software to mobile devices easy and efficient. MDM Server offers tools for making software available for devices - furthermore, it allows administrators to monitor applications that have been installed and run on devices. Silent installation and uninstallation of software is supported.
Different software packages may be targeted to different device models and different user groups as well as individually selected devices.
MDM server generates a report that helps the administrator to understand the install base of applications. This is particularly helpful when purchasing or managing software licences.
Messaging
The messaging function of MDM is a complementary channel for getting messages to end users. The messages are delivered within normal MDM sessions, making them a cost- efficient way to broadcast messages.
MDM follows delivery of messages, enabling the administrator to see when messages have been sent to users and when they actually become read.
Remote access to device
MDM system according to the invention facilitates remote desktop access to mobile devices. This feature is particularly useful for helpdesk and troubleshooting. Like in the screenshot below, device doesn't need to have 3 G or WLAN connectivity.
Remote access is based on VNC and it allows administrator to access all device functionalities. User's permission is always prompted before remote access session is established for privacy reasons.
File transfers Selected MDM clients may be commanded to fetch any files from MDM server in a secure manner. Also, files may be pulled from selected devices to server side; files and folders may be created and deleted etc. No user involvement is needed. After each transaction - if administrator chooses so - a message written by administrator is displayed to the user. Delivery and execution of each file command is tracked. File commands may be executed in batches where execution of a command is conditional to successful execution of the previous command.
Back-up/restore
Key personal data - like contacts, calendar (with meeting notes) and messages - can be backed up over the air. Back-ups may be taken from one type of device and restored to another. For instance, data backed up from a Windows Mobile device may be restored to a Series 60 mobile device device or vice versa. No user involvement whatsoever is required for either back-up or restore. Back-up and restore commands may be executed for selected device(s) or the whole device base.
Execution of commands on selected devices Any application on selected devices may be executed automatically, with or without parameters. Also, any file may be launched on the device; application associated with the corresponding file extension will be used to process the file.
Certificates may be installed on devices, OMA DM (Open Mobile Alliance Device Management) commands may be executed, devices may be rebooted etc. Progress of execution commands is tracked.
Country information
When a device arrives to a new country and registers itself to any mobile network (not necessarily yet being able to connect to the Internet), MDM client displays a country- specific message written by administrator. The contents of these messages are automatically pushed to all devices during normal connections.
With these country-specific messages it is possible - for instance - to instruct users to use a specific network or warn them of problems with GPRS roaming etc. In many cases significant savings can be achieved by selecting correct network for roaming.
Detonation of confidential data MDM can be used to detonate confidential data on lost or stolen devices. This task can be executed by sending a special-content SMS to the device. Detonation of confidential data can also be performed during the course of a normal (client-initiated) session. This is the only option when device's SEVl card has been replaced with another SIM card by an unauthorized device holder. Detonation erases all data from both device memory and memory card.
Technical notes
MDM Server is written with PHP, making it practically independent on the server platform to be used. It only requires (besides the PHP support) an SQL database (like MySQL, MS SQL Server or Oracle) and a web server (like Apache or IIS). Requirements for the hardware depend on number of devices and selected software environment (operating system, database, web server). However, any modern server with decent software environment is capable of handling a device base of thousands of devices with typical connection intervals. The user interface of MDM server is browser-based, so a web browser with JavaScript support is needed. For remote device access, also Java applets need to be supported by the browser.
Brief description of the drawings
Figure 1 depicts a prior art mobile device management system.
Figure 2 depicts a preferred embodiment of the mobile device management system according to the present invention. Figure 3 depicts a prior art mobile device schematic diagram.
Figure 4 depicts a preferred embodiment of the mobile device schematic diagram according to the present invention.
Detailed description of the preferred embodiment
A preferred embodiment of the invention depicted in the figure 2 comprises (OMA) DM compatible device like for example mobile device 7, which is connected to proprietary device management server 9 via communication network 8. Between the (OMA) DM of
the mobile device 7 and server 9 there is continuous data exchange. In need (OMA) DM server 9 sends to (OMA) DM client SMS 10 and initiates a session. Proprietary DM session can also be initiated manually by the user or it can be a scheduled connection (time schedule is saved in the (OMA) DM client device). Request from (OMA) DM client's device is sent via wireless network 8 (WLAN, CSD (GSM Data), GPRS, EDGE, WCDMA/UMTS (3G), Bluetooth) into the server 9 to carry out an inventory of the user's resources ( settings, user data, etc.). In response to the session the server 9 transmits to the user's mobile device 7 necessary settings, themes, policies, SW packages, requests for information, etc. There may be several requests and responses during proprietary DM session. MDM system server 9 may be installed on customer's server or it may be offered remotely as service. MDM system server 9 may be based for example on OS Windows or Unix/Linux, data base of the MDM server may be based on known SQL database (like MySQL, MS SQL server or Oracle). MDM server 9 is connected to Administration interface 12, which is browser based interface for administering MDM server and for accessing devices remotely. The browser-based interface of MDM Server is used to monitor and control the device base equipped with MDM Clients. Into the mobile device 7 of the present invention in addition to the OMA DM interface 2 and device's resources 3 is also incorporated OMA DM server 13 and proprietary DM "server interface 14 (see figure 4). In that specific solution the broader device management framework together with the smart DM client can be used as the overall framework - the more narrow OMA DM framework works in the mobile device 7 as a subset.
OMA DM interface can be used in two ways:
1) One can change settings of mobile device 7 using the framework and passing the necessary instructions from the DM server 9 to DM client (mobile device 7). The DM client then decides whether the changes on device are performed directly by the DM client by accessing/writing device resources - or, if it instructs OMA DM client to connect with the virtual OMA DM server 2 from where OMA DM client gets the necessary instructions and communicates them with device resources (look figure 4).
2) OMA DM instructions can be encapsulated (wrapped) into the DM server/client communication and passed directly to OMA DM client through the virtual OMA DM server 2. The difference to the previous option is that in this case the DM client doesn't necessarily understand the meaning of the instructions as such - it's just being used as a transport of the instructions between device and server-side infrastructure.
On device, proprietory DM client may access and write device 7 resources by itself (B), or it can invoke (OMA) DM client (A) to connect to local (OMA) DM server 2 and instruct the local (OMA) DM server (D) to feed/fetch necessary data (E) to/from device. Local (OMA) DM server 2 may also access/write device resources independently (C).
Claims
1. Mobile device management system that consists of a mobile device (1), which is connected OTA (over-the-air) to an OMA DM server (4) via the OMA DM interface (2), characterized in that, it has the OMA DM server on the mobile device and the management system contains the owner's OMA DM server (9).
2. Mobile device management system according to the claim 1, characterized in that, the mobile device (1) is connected to the owner's OMA DM server (4) so that with one session the DM server can send an unlimited number of OMA DM commands to a mobile device.
3. Mobile device management system according to the claim 1, characterized in that, the mobile device is configured to use its existing files as OMA DM commands parameters without having to resend the OTA.
4. Mobile device management system according to the claim 1, characterized in that, the mobile device is configured to create an OMA DM sessions without an external data connection.
5. Mobile device management system according to the claim 1, characterized in that, a proprietary DM client is configured to independently to manage mobile device resources.
6. Mobile device management system according to the claim 1, characterized in that, a proprietary DM client is configured to command OMA DM clients to connect to local proprietary OMA DM server and to read/write necessary mobile device information.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EEP200700055A EE200700055A (en) | 2007-10-29 | 2007-10-29 | Mobile device management scheme |
EE200700055 | 2007-10-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009056148A2 true WO2009056148A2 (en) | 2009-05-07 |
WO2009056148A3 WO2009056148A3 (en) | 2009-06-18 |
Family
ID=40545936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EE2008/000025 WO2009056148A2 (en) | 2007-10-29 | 2008-10-27 | Mobile device management system |
Country Status (2)
Country | Link |
---|---|
EE (1) | EE200700055A (en) |
WO (1) | WO2009056148A2 (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140006225A1 (en) * | 2012-06-28 | 2014-01-02 | Adobe Systems Incorporated | Automatic device inventory management for different types of devices |
US8650277B2 (en) | 2010-02-03 | 2014-02-11 | Symantec Corporation | Method, system, and computer readable medium for gathering usage statistics |
WO2014030905A1 (en) * | 2012-08-20 | 2014-02-27 | 엘지전자 주식회사 | Method and apparatus for enabling or disabling server in wireless communication system |
US20140258511A1 (en) * | 2013-03-11 | 2014-09-11 | Bluebox Security Inc. | Methods and Apparatus for Reestablishing Secure Network Communications |
US8838087B1 (en) | 2010-09-06 | 2014-09-16 | Sprint Communications Company L.P. | Provisioning system and methods for interfaceless phone |
US8843122B1 (en) * | 2012-06-29 | 2014-09-23 | Sprint Communications Company L.P. | Mobile phone controls preprocessor |
US8954041B1 (en) | 2011-02-08 | 2015-02-10 | Sprint Communications Company L.P. | System and method for ID platform |
US8972592B1 (en) | 2011-05-27 | 2015-03-03 | Sprint Communications Company L.P. | Extending an interface pack to a computer system |
CN104461648A (en) * | 2014-12-22 | 2015-03-25 | 广东欧珀移动通信有限公司 | OTA upgrade backing-up method and system for intelligent terminals |
US9043446B1 (en) | 2011-03-10 | 2015-05-26 | Sprint Communications Company L.P. | Mirroring device interface components for content sharing |
US9123062B1 (en) | 2011-02-18 | 2015-09-01 | Sprint Communications Company L.P. | Ad sponsored interface pack |
US9125060B2 (en) | 2013-11-22 | 2015-09-01 | At&T Mobility Ii Llc | Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US20150378709A1 (en) * | 2014-06-27 | 2015-12-31 | International Business Machines Corporation | Installation of Software Applications on Mobile Devices Based on Positions Thereof |
US9342381B2 (en) | 2011-02-03 | 2016-05-17 | Symantec Corporation | Method and system for establishing a DLP-compliant environment |
US9386395B1 (en) | 2010-09-06 | 2016-07-05 | Sprint Communications Company L.P. | Dynamic loading, unloading, and caching of alternate complete interfaces |
US9413839B2 (en) | 2012-07-31 | 2016-08-09 | Sprint Communications Company L.P. | Traffic management of third party applications |
CN105872775A (en) * | 2015-12-09 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Silent uninstalling method and device for smart cloud TV application |
US9442709B1 (en) | 2012-10-24 | 2016-09-13 | Sprint Communications Company L.P. | Transition experience during loading and updating an interface and applications pack |
US9483253B1 (en) | 2015-04-30 | 2016-11-01 | Sprint Communications Company L.P. | Methods for customization of default applications on a mobile communication device |
US9513888B1 (en) | 2014-01-30 | 2016-12-06 | Sprint Communications Company L.P. | Virtual preloads |
US10437625B2 (en) | 2017-06-16 | 2019-10-08 | Microsoft Technology Licensing, Llc | Evaluating configuration requests in a virtual machine |
US10516762B2 (en) | 2016-05-03 | 2019-12-24 | Zillion Group, Inc. | System for remotely running a service program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1515571A2 (en) * | 2003-09-08 | 2005-03-16 | Microsoft Corporation | System and method for an OMA DM extension to manage mobile device configuration settings |
WO2007006859A1 (en) * | 2005-07-12 | 2007-01-18 | Capricode Oy | Method and device arrangement for managing a client/server environment |
US20070169093A1 (en) * | 2005-08-05 | 2007-07-19 | Logan Will K | Centrally managed solution for all device management activities |
-
2007
- 2007-10-29 EE EEP200700055A patent/EE200700055A/en unknown
-
2008
- 2008-10-27 WO PCT/EE2008/000025 patent/WO2009056148A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1515571A2 (en) * | 2003-09-08 | 2005-03-16 | Microsoft Corporation | System and method for an OMA DM extension to manage mobile device configuration settings |
WO2007006859A1 (en) * | 2005-07-12 | 2007-01-18 | Capricode Oy | Method and device arrangement for managing a client/server environment |
US20070169093A1 (en) * | 2005-08-05 | 2007-07-19 | Logan Will K | Centrally managed solution for all device management activities |
Non-Patent Citations (2)
Title |
---|
"Device Management Architecture; OMA-AD_DM-V1_0-20050530-D" INTERNET CITATION, [Online] XP002433524 Retrieved from the Internet: URL:http://member.openmobilealliance.org/ftp/Publicdocuments/DM/Permanentdocuments/OMA-AD-DM-V_0-20050530-D.zip> [retrieved on 2007-05-14] * |
"OMA DEVICE MANAGEMENT PROTOCOL; CANDIDATE VERSION 1.2" INTERNET CITATION, [Online] XP003018609 Retrieved from the Internet: URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-200604_24-C/OMA-TS-DM-Protocol-V1_2-20060424-C.pdf> [retrieved on 2006-01-01] * |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924461B2 (en) | 2010-02-03 | 2014-12-30 | Symantec Corporation | Method, system, and computer readable medium for remote assistance, support, and troubleshooting |
US8650277B2 (en) | 2010-02-03 | 2014-02-11 | Symantec Corporation | Method, system, and computer readable medium for gathering usage statistics |
US9369357B2 (en) | 2010-02-03 | 2016-06-14 | Symantec Corporation | Method, system, and computer readable medium for remote device management |
US8997092B2 (en) | 2010-02-03 | 2015-03-31 | Symantec Corporation | Method, system, and computer readable medium for provisioning and remote distribution |
US9386395B1 (en) | 2010-09-06 | 2016-07-05 | Sprint Communications Company L.P. | Dynamic loading, unloading, and caching of alternate complete interfaces |
US8838087B1 (en) | 2010-09-06 | 2014-09-16 | Sprint Communications Company L.P. | Provisioning system and methods for interfaceless phone |
US9342381B2 (en) | 2011-02-03 | 2016-05-17 | Symantec Corporation | Method and system for establishing a DLP-compliant environment |
US8954041B1 (en) | 2011-02-08 | 2015-02-10 | Sprint Communications Company L.P. | System and method for ID platform |
US9123062B1 (en) | 2011-02-18 | 2015-09-01 | Sprint Communications Company L.P. | Ad sponsored interface pack |
US9043446B1 (en) | 2011-03-10 | 2015-05-26 | Sprint Communications Company L.P. | Mirroring device interface components for content sharing |
US8972592B1 (en) | 2011-05-27 | 2015-03-03 | Sprint Communications Company L.P. | Extending an interface pack to a computer system |
US20140006225A1 (en) * | 2012-06-28 | 2014-01-02 | Adobe Systems Incorporated | Automatic device inventory management for different types of devices |
US9117191B2 (en) * | 2012-06-28 | 2015-08-25 | Adobe Systems Incorporated | Automatic device inventory management for different types of devices |
US9189607B1 (en) | 2012-06-29 | 2015-11-17 | Sprint Communications Company L.P. | Mobile phone controls preprocessor |
US8843122B1 (en) * | 2012-06-29 | 2014-09-23 | Sprint Communications Company L.P. | Mobile phone controls preprocessor |
US9413839B2 (en) | 2012-07-31 | 2016-08-09 | Sprint Communications Company L.P. | Traffic management of third party applications |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9811672B2 (en) | 2012-08-10 | 2017-11-07 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9762465B2 (en) | 2012-08-20 | 2017-09-12 | Lg Electronics Inc. | Method and apparatus for transmitting a response to a command in wireless communication system |
WO2014030905A1 (en) * | 2012-08-20 | 2014-02-27 | 엘지전자 주식회사 | Method and apparatus for enabling or disabling server in wireless communication system |
US9442709B1 (en) | 2012-10-24 | 2016-09-13 | Sprint Communications Company L.P. | Transition experience during loading and updating an interface and applications pack |
US20140258511A1 (en) * | 2013-03-11 | 2014-09-11 | Bluebox Security Inc. | Methods and Apparatus for Reestablishing Secure Network Communications |
US9125060B2 (en) | 2013-11-22 | 2015-09-01 | At&T Mobility Ii Llc | Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data |
US9513888B1 (en) | 2014-01-30 | 2016-12-06 | Sprint Communications Company L.P. | Virtual preloads |
US20150378709A1 (en) * | 2014-06-27 | 2015-12-31 | International Business Machines Corporation | Installation of Software Applications on Mobile Devices Based on Positions Thereof |
US9817649B2 (en) * | 2014-06-27 | 2017-11-14 | International Business Machines Corporation | Installation of software applications on mobile devices based on positions thereof |
CN104461648A (en) * | 2014-12-22 | 2015-03-25 | 广东欧珀移动通信有限公司 | OTA upgrade backing-up method and system for intelligent terminals |
CN104461648B (en) * | 2014-12-22 | 2017-10-31 | 广东欧珀移动通信有限公司 | A kind of method and system of intelligent terminal OTA upgradings backup |
US9483253B1 (en) | 2015-04-30 | 2016-11-01 | Sprint Communications Company L.P. | Methods for customization of default applications on a mobile communication device |
CN105872775A (en) * | 2015-12-09 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Silent uninstalling method and device for smart cloud TV application |
US10516762B2 (en) | 2016-05-03 | 2019-12-24 | Zillion Group, Inc. | System for remotely running a service program |
US10437625B2 (en) | 2017-06-16 | 2019-10-08 | Microsoft Technology Licensing, Llc | Evaluating configuration requests in a virtual machine |
Also Published As
Publication number | Publication date |
---|---|
EE200700055A (en) | 2009-06-15 |
WO2009056148A3 (en) | 2009-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009056148A2 (en) | Mobile device management system | |
US8214471B2 (en) | Synchronizing information through profile management between a host system and a mobile device | |
US10034259B2 (en) | Mobile device management | |
US9037685B2 (en) | Intelligent migration between devices having different hardware or software configuration | |
EP1523152B1 (en) | Connector gateway | |
EP2095254B1 (en) | Over-the-air device kill pill and lock | |
EP2012229B1 (en) | Mobile provisioning tool system | |
US7987449B1 (en) | Network for lifecycle management of firmware and software in electronic devices | |
US9705738B2 (en) | System for cloud-managed mobile device administration | |
US8135798B2 (en) | Over-the-air device services and management | |
US7975030B2 (en) | Remote configuration of devices using a secure connection | |
US20070093243A1 (en) | Device management system | |
US20110082900A1 (en) | System and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances | |
US20080115141A1 (en) | Dynamic resource management | |
US20090313264A1 (en) | Device-side data de-duping | |
AU2013247347A1 (en) | Configuration of third party applications in a sandboxed environment | |
CA2811332C (en) | Storage of applications and associated digital goods for use in wireless communication devices and systems | |
EP2115577A1 (en) | Intelligent migration between devices having different hardware or software configuration | |
US20130165099A1 (en) | Enhanced System and Method for Custom Programming of Large Groups of Phones Without Requiring Additional Equipment | |
CN107194241B (en) | Control method of terminal equipment, server, terminal equipment and control system | |
US20160028853A1 (en) | System and methods to store, retrieve, manage, augment and monitor applications on appliances |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08843623 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008843623 Country of ref document: EP |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08843623 Country of ref document: EP Kind code of ref document: A2 |