Service provider subsidy lock
First Claim
1. A method of operating a wireless communications device, the method comprising:
- identifying a wireless network for communicating with the device in response to receiving subscriber provided network identity data;
activating a restricted use mode restricting communications between the identified wireless network and the device;
receiving network provided network security data from the identified wireless network in response to a request from the device to the identified wireless network; and
deactivating the restricted use mode in response to determining that subscriber provided network security data corresponds to the received network provided network security data.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method (300) of operating a wireless communications device, and comprising identifying a wireless network for communicating with the device in response to receiving subscriber provided network identity data (315), activating a restricted use mode restricting communications between the wireless network and the device (320), receiving network provided network security data from the wireless network (330) in response to a request for the network provided network security data transmitted from the device to the wireless network (325), deactivating the restricted use mode (350) in response to determining that subscriber provided network security data corresponds to the network provided network security data (340Y).
101 Citations
7 Claims
-
1. A method of operating a wireless communications device, the method comprising:
-
identifying a wireless network for communicating with the device in response to receiving subscriber provided network identity data;
activating a restricted use mode restricting communications between the identified wireless network and the device;
receiving network provided network security data from the identified wireless network in response to a request from the device to the identified wireless network; and
deactivating the restricted use mode in response to determining that subscriber provided network security data corresponds to the received network provided network security data. - View Dependent Claims (2, 3)
-
-
4. A wireless communications device comprising:
-
a processor and memory;
the processor arranged to identify a wireless network for communicating with the device in response to receiving subscriber provided network identity data;
the processor further arranged to activate a restricted use mode restricting communications between the identified wireless network and the device;
a transceiver arranged to send a request to the identified wireless network for network provided network security data, and to receive said data; and
the processor further arranged to deactivate the restricted use mode in response to determining that subscriber provided network security data corresponds to the received network provided network security data. - View Dependent Claims (5, 6)
-
-
7. A wireless communications system having a wireless network and a number of wireless communications devices, the devices each comprising:
-
a processor and memory;
the processor arranged to identify the wireless network for communicating with the device in response to receiving subscriber provided network identity data;
the processor further arranged to activate a restricted use mode restricting communications between the identified wireless network and the device;
a transceiver arranged to send a request to the identified wireless network for network provided network security data, and to receive said data; and
the processor further arranged to deactivate the restricted use mode in response to determining that subscriber provided network security data corresponds to the received network provided network security data.
-
Specification