Systems and methods for restricting the use of stolen devices on a wireless network
First Claim
1. A system for restricting the use of a stolen wireless device on a wireless network, comprising:
- a wireless network device management system comprising a processor and a computer readable memory, the processor being configured to;
receive a unique device identifier of the wireless device;
store the device identifier in the computer readable memory with a purchase indicator;
receive a device identifier from the wireless network corresponding to a device attempting to make a call, the calling device identifier being transmitted by the device to the network, captured by the network, and transferred to the device management system; and
instruct the wireless network to route voice calls from the calling device to a fraud management center if the purchase indicator shows that the device has not been sold.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling wireless network access for stolen wireless devices is disclosed. The system creates an electronic record for devices intended for sale in retail stores. The records associated with the devices include a field that identifies the devices as unsold prior to being shipped to those stores. Upon proper purchase, the retail store automatically communicates to the wireless service provider that a device has been sold. The system updates the electronic record to show that the device has been purchased. Sold devices are allowed to access the network as normal. Attempts to use a device marked as unsold result in the call being routed to a fraud management center for verification of proper device purchase.
30 Citations
16 Claims
-
1. A system for restricting the use of a stolen wireless device on a wireless network, comprising:
-
a wireless network device management system comprising a processor and a computer readable memory, the processor being configured to; receive a unique device identifier of the wireless device; store the device identifier in the computer readable memory with a purchase indicator; receive a device identifier from the wireless network corresponding to a device attempting to make a call, the calling device identifier being transmitted by the device to the network, captured by the network, and transferred to the device management system; and instruct the wireless network to route voice calls from the calling device to a fraud management center if the purchase indicator shows that the device has not been sold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for restricting the use of a stolen wireless device on a wireless network, comprising:
-
a wireless network device management system comprising a processor and a computer readable memory, the processor being configured to receive a unique device identifier of the wireless device and store the device identifier in the computer readable memory with a purchase indicator; a warehouse management system comprising a warehouse management processor and an electronic reader, wherein; the electronic reader is configured to electronically read a unique device identifier of the wireless device; the warehouse management processor is programmed to receive the device identifier from the electronic reader and transmit the device identifier to the device management system; and the warehouse management system is configured to transmit the device identifier to the device management system, where the device identifier corresponds to a device that has no record of shipment in the warehouse management system and has not appeared in at least one inventory scan of the warehouse.
-
-
11. A method for routing calls in a wireless network comprising:
-
capturing a unique device identifier and a unique subscriber identifier transmitted by a wireless device attempting to place a call using the wireless network; comparing the captured device identifier with a device identifier stored with a unique subscriber identifier matching the captured subscriber identifier in a computer readable memory, if the captured device identifier and the stored device identifier do not match; comparing the captured device identifier to a list of device identifiers stored in a computer readable memory; reading a purchase indicator stored with a matching device identifier from the list; routing a call to a fraud management center if the purchase indicator shows that the device corresponding to the captured device identifier has not been sold. - View Dependent Claims (12)
-
-
13. A package scanner for electronically marking a wireless device as not sold comprising:
-
a processor; an electronic reader; and a computer readable memory, the electronic reader configured to read a unique device identifier of the wireless device and provide the unique device identifier to the processor, wherein the processor is configured to store; the unique device identifier in the computer readable memory with a purchase indicator showing the device corresponding to the unique device identifier as not sold; and a participation type indicator with the unique device identifier, wherein the participation type indicator indicates whether the intended shipping recipient of the device participates in a stolen device restriction program. - View Dependent Claims (14, 15)
-
-
16. A package scanner for electronically marking a wireless device as not sold comprising:
-
a processor; a computer readable memory; an electronic reader configured to read a unique device identifier of the wireless device and provide the unique device identifier to the processor; and
, wherein the processor is configured to store the unique device identifier in the computer readable memory with a purchase indicator showing the device corresponding to the unique device identifier as not sold, and, to store a participation type indicator and a shipping destination code with the unique device identifier, the processor automatically setting the participation type for the shipping recipient upon the entering of a shipping destination code.
-
Specification