MOBILE DEVICE MANAGEMENT
First Claim
1. A computing device comprising:
- one or more processors configured to obtain a first set of data from a device for storage in a non-transitory memory to authenticate the device for access to one or more communication/data networks, and when the device is authenticated the one or more processors being further configured to obtain a second set of data for storage in the non-transitory memory to determine an eligibility status for the device to utilize a third party subsidized service for utilizing the one or more communication/data networks, the second set of data including real-time user input data and data associated with an eligibility rule that is not based on the real-time user input data, the eligibility rule being determined by an entity responsible for administering the third part subsidized service, and upon determining the eligibility status the one or more processors being further configured to permit a service request that utilizes the one or more communication/data networks.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for reducing fraud, waste, and abuse of devices associated with government or business programs. Devices are authenticated based on a first set of data collected from the device, and if authenticated, may be permitted to send or receive service requests based on a second set of data that identifies the user, includes data about the user, identifies the service and/or identifies eligibility criteria. Devices may also be subject to eligibility requirements instituted before, during or after a service request is performed that determine the eligibility of the device and/or the user of the device. Devices may also be subject to filtering requirements administered before or during a service request. Devices may also be subject verification before, during or after one or more service requests.
-
Citations
20 Claims
-
1. A computing device comprising:
one or more processors configured to obtain a first set of data from a device for storage in a non-transitory memory to authenticate the device for access to one or more communication/data networks, and when the device is authenticated the one or more processors being further configured to obtain a second set of data for storage in the non-transitory memory to determine an eligibility status for the device to utilize a third party subsidized service for utilizing the one or more communication/data networks, the second set of data including real-time user input data and data associated with an eligibility rule that is not based on the real-time user input data, the eligibility rule being determined by an entity responsible for administering the third part subsidized service, and upon determining the eligibility status the one or more processors being further configured to permit a service request that utilizes the one or more communication/data networks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A method for regulating a device, comprising the steps of:
-
obtaining a first set of data from the device; authenticating the device for access to one or more communication/data networks based on the first set of data; when the device is authenticated, obtaining a second set of data; determining an eligibility status based on the second set of data for the device to utilize a third party subsidized service for utilizing the one or more communication/data networks, the second set of data including real-time user input data and data associated with an eligibility rule that is not based on the real-time user input data, the eligibility rule being determined by an entity responsible for administering the third party subsidized service; and upon determining the eligibility status, determining whether to permit a service request that utilizes the one or more communication/data networks.
-
Specification