MOBILE DEVICE MANAGEMENT
First Claim
1. A computing device comprising:
- one or more processors configured to obtain a first set of data from a device for storage in a non-transitory memory to authenticate the device for access to one or more communication/data networks, and if the device is authenticated the one or more processors being further configured to obtain a second set of data for storage in the non-transitory memory to determine an eligibility status for the device to utilize a service that pays for at least part of a cost of utilizing the one or more communication/data networks, and upon determining the eligibility status the one or more processors being further configured to permit a service request that utilizes the one or more communication/data networks.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for reducing fraud, waste, and abuse of devices associated with government or business programs. Devices are authenticated based on a first set of data collected from the device, and if authenticated, may be permitted to send or receive service requests based on a second set of data that identifies the user, includes data about the user, identifies the service and/or identifies eligibility criteria. Devices may also be subject to eligibility requirements instituted before, during or after a service request is performed that determine the eligibility of the device and/or the user of the device. Devices may also be subject to filtering requirements administered before or during a service request. Devices may also be subject verification before, during or after one or more service requests.
-
Citations
49 Claims
-
1. A computing device comprising:
one or more processors configured to obtain a first set of data from a device for storage in a non-transitory memory to authenticate the device for access to one or more communication/data networks, and if the device is authenticated the one or more processors being further configured to obtain a second set of data for storage in the non-transitory memory to determine an eligibility status for the device to utilize a service that pays for at least part of a cost of utilizing the one or more communication/data networks, and upon determining the eligibility status the one or more processors being further configured to permit a service request that utilizes the one or more communication/data networks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
27. A method for regulating a device, comprising the steps of:
-
obtaining a first set of data from the device; authenticating the device for access to one or more communication/data networks based on the first set of data; if the device is authenticated, obtaining a second set of data; determining an eligibility status based on the second set of data for the device to utilize a service that pays for at least part of a cost of utilizing the one or more communication/data networks; and upon determining the eligibility status, permitting a service request that utilizes the one or more communication/data networks. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification