Systems and methods for restricting the use of stolen devices on a wireless network
First Claim
1. A system for restricting the use of a wireless device on a wireless network, the system comprising:
- a wireless network device management system comprising a computer readable memory and a processor, the wireless device management system being configured to;
receive, from a warehouse management system, a device identifier associated with the wireless device;
store the device identifier in the computer readable memory with a purchase indicator, wherein the purchase indicator initially is set to indicate that the wireless device has not been sold;
receive a calling device identifier from the wireless network, the calling device identifier corresponding to a calling wireless device that is attempting to make a call using the wireless network; and
instruct the wireless network to route voice calls from the calling device to a fraud management center if the purchase indicator shows that the device has not been sold, wherein the calling device identifier is captured by the network and transferred to the device management system.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling wireless network access for wireless devices are disclosed. A system can create an electronic record for a device intended for sale in a retail store. The record associated with the device can include an indication that the device has not been sold, and the device can be shipped to the retail store. When the device is purchased, the retail store can communicate to the wireless service provider that the device has been sold, and the system can update the electronic record to reflect that the device has been sold. The sold device can be allowed to access a network. An attempt to use a device marked as unsold can result in the call being routed to a fraud management center for verification of proper device purchase.
-
Citations
15 Claims
-
1. A system for restricting the use of a wireless device on a wireless network, the system comprising:
a wireless network device management system comprising a computer readable memory and a processor, the wireless device management system being configured to; receive, from a warehouse management system, a device identifier associated with the wireless device; store the device identifier in the computer readable memory with a purchase indicator, wherein the purchase indicator initially is set to indicate that the wireless device has not been sold; receive a calling device identifier from the wireless network, the calling device identifier corresponding to a calling wireless device that is attempting to make a call using the wireless network; and instruct the wireless network to route voice calls from the calling device to a fraud management center if the purchase indicator shows that the device has not been sold, wherein the calling device identifier is captured by the network and transferred to the device management system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for routing calls in a wireless network, the method comprising:
-
capturing a device identifier transmitted by a wireless device attempting to place a call using the wireless network; comparing the captured device identifier to a device identifier stored in a computer readable memory to determine if the stored device identifier matches the captured device identifier; and if the captured device identifier matches the stored device identifier; retrieving, from the computer readable memory, a purchase indicator stored with the stored device identifier; and routing a call to a fraud management center if the purchase indicator comprises data indicating that a device has not been sold. - View Dependent Claims (10)
-
-
11. A package scanner for electronically marking a wireless device as not sold, the packaging scanner comprising an electronic reader and a computer readable memory, wherein the package scanner is configured to:
-
obtain, using the electronic reader, a device identifier associated with a wireless device; store, at the computer readable memory, the device identifier and a purchase indicator, the purchase indicator comprising data that indicates that the device has not been sold; and store, at the computer readable memory, a participation type indicator, the participation type indicator comprising data that indicates whether an intended shipping recipient of the wireless device participates in a stolen device restriction program. - View Dependent Claims (12)
-
-
13. A method for connecting a wireless device with a fraud management center, the method comprising:
-
determining, at the wireless communications network, that the wireless device is stolen, wherein determining that the wireless device is stolen comprises; comparing a received device identifier with a device identifier stored in a computer readable memory to determine if the stored device identifier matches the received device identifier; and if the received device identifier matches the stored device identifier, retrieving, from the computer readable memory, a purchase indicator stored with the stored device identifier; and in response to determining that the purchase indicator comprises data indicating that a device associated with the received identifier has not been sold, routing a call to the fraud management center. - View Dependent Claims (14, 15)
-
Specification