Method for reprogramming a communicaton unit's access to a wireless communication system
First Claim
1. A method for correcting a communication unit'"'"'s access to a wireless communication system, the method comprising the steps of:
- a) monitoring, by a monitoring computer, a first communication resource of the wireless communication system to detect a transmission by the communication unit, wherein the transmission includes software application serial numbers, for non-permanent software applications presently contained in a programmable non-volatile memory of the communication unit, and a unique unit identifier;
b) upon detecting the transmission, comparing, by the monitoring computer, the software application serial numbers to stored software application serial numbers for the communication unit based on the unique unit identifier; and
c) when the comparison of step (b) is unfavorable, reprogramming, by the monitoring computer via a second communication resource of the wireless communication system, at least a portion of system access information contained in the communication unit;
wherein step (c) further comprises reprograming the at least a portion of the system access information, to prohibit the communication unit from the future access to the wireless communication system.
2 Assignments
0 Petitions
Accused Products
Abstract
A monitoring computer (115) monitors a communication resource within a wireless communication system for transmissions by a communication unit. Upon detecting the transmission, which contains a unit identifier, the monitoring computer compares the unit identifier with stored system access information for the communication unit. When the unit identifier is not compatible with the stored system access information, the monitoring computer reprograms at least a portion of the system access information of the communication unit. In this manner, discrepancies in communication unit programming may be corrected.
15 Citations
6 Claims
-
1. A method for correcting a communication unit'"'"'s access to a wireless communication system, the method comprising the steps of:
-
a) monitoring, by a monitoring computer, a first communication resource of the wireless communication system to detect a transmission by the communication unit, wherein the transmission includes software application serial numbers, for non-permanent software applications presently contained in a programmable non-volatile memory of the communication unit, and a unique unit identifier; b) upon detecting the transmission, comparing, by the monitoring computer, the software application serial numbers to stored software application serial numbers for the communication unit based on the unique unit identifier; and c) when the comparison of step (b) is unfavorable, reprogramming, by the monitoring computer via a second communication resource of the wireless communication system, at least a portion of system access information contained in the communication unit; wherein step (c) further comprises reprograming the at least a portion of the system access information, to prohibit the communication unit from the future access to the wireless communication system. - View Dependent Claims (2, 3)
-
-
4. A method for a communication unit to correct access privileges to a wireless communication system, the method comprising the steps of:
-
a) transmitting a message, wherein the message includes software application serial numbers, for non-permanent software applications presently contained in a programmable non-volatile memory of the communication unit, and a unique unit identifier; b) receiving reprogramming information over a communication resource of the wireless communication system; and c) overwriting at least a portion of system access information, contained in the communication unit, with the reprogramming information; wherein step (c) further comprises reprograming the at least a portion of the system access information, to prohibit the communication unit from the future access to the wireless communication system. - View Dependent Claims (5, 6)
-
Specification