Automatic service provider notification of unauthorized terminal activity
First Claim
1. A method for provision of a type of wireless service for wireless terminals by a wireless switching system controlled by a wireless service provider, comprising the steps of:
- detecting a present reguest to use the type of wireless service by one of the wireless terminals that is unauthorized for the one of the wireless terminals;
establishing a call between the one of the wireless terminals and an agent of the wireless service provider;
determining suitability of the one of the wireless terminals to use the type of wireless service by the agent;
transferring information to the wireless switching system by the agent to authorize the type of wireless service for the one of the wireless terminals;
authorizing the type of wireless service to be provided for the one of the wireless terminals on an ongoing basis by the wireless switching system in response to the information from the agent; and
providing the type of wireless service to the one of the wireless terminals for the present reguest and subsequent requests by the wireless switching system in response to authorization of the type of wireless service for the one of wireless terminals.
19 Assignments
0 Petitions
Accused Products
Abstract
Automatically connecting an unauthorized wireless terminal to a service provider agent so that online registration can be performed to provide permanent service to the wireless terminal. The wireless terminal is initially connected to a service provider agent by a telephone call from the wireless terminal via a call center having a plurality of agents when the wireless terminal first attempts to register with the service provider'"'"'s wireless switching network. From the point of view of the user, the user may purchase a wireless terminal off the shelf of a mass merchandiser or in the corporate setting simply check a wireless terminal out of a stock room. When the user initially turns the power of the wireless terminal on, a call is placed to an agent of the service provider so that the registration may take place. All necessary information that must be loaded into the wireless telephone will be downloaded during this registration process. To prevent fraudulent use of the wireless terminal, the user sets up their service profile to prohibit certain types of activity. The user will have a personal identification number (PIN) that may be utilized to perform these activities on a selective basis. The PIN could be the mother'"'"'s maiden name or secured credit. In addition, authorization could be performed where the PIN would actually be voice recognition. Once a user performs an activity that is not allowed in their service profile, they would be transferred to an agent of the service provider. By identifying themselves with the PIN, the user would be allowed to perform the restricted activity on a one-time basis, for a short period of time, or permanently change their service profile so that the activity could be performed all the time.
-
Citations
18 Claims
-
1. A method for provision of a type of wireless service for wireless terminals by a wireless switching system controlled by a wireless service provider, comprising the steps of:
-
detecting a present reguest to use the type of wireless service by one of the wireless terminals that is unauthorized for the one of the wireless terminals;
establishing a call between the one of the wireless terminals and an agent of the wireless service provider;
determining suitability of the one of the wireless terminals to use the type of wireless service by the agent;
transferring information to the wireless switching system by the agent to authorize the type of wireless service for the one of the wireless terminals;
authorizing the type of wireless service to be provided for the one of the wireless terminals on an ongoing basis by the wireless switching system in response to the information from the agent; and
providing the type of wireless service to the one of the wireless terminals for the present reguest and subsequent requests by the wireless switching system in response to authorization of the type of wireless service for the one of wireless terminals. - View Dependent Claims (2, 3, 4, 5, 10, 11, 12, 13, 14)
-
- 6. The method of claim 6 wherein the step of determining comprises receiving the identity of the user of the one of the wireless terminals.
Specification