Reducing mobile-phone fraud
First Claim
1. Non-transitory computer-readable media having computer-executable instructions embodied thereon, that, when executed by a computing device, facilitate a method of reducing mobile-phone fraud, the method comprising:
- receiving a request to activate a mobile device;
determining that the mobile device is identified as lost or stolen;
communicating to the mobile device activation data, which enables the mobile device to communicate via a wireless-telecommunications network despite the fact that the mobile device was determined to be identified as lost or stolen; and
communicating to the mobile device functionality-impairment instructions, which, when run on the mobile device, deliberately disable a set of functional aspects of the mobile device thereby transforming the mobile device from a first state to a second state and wherein the second state is functionally impaired as compared to the first state;
receiving a request for service;
receiving an indication that the mobile device is experiencing issues that stem from the functionality-impairment instructions;
confirming that the mobile device is reported as lost or stolen;
presenting a notification that the mobile device is reported as lost or stolen; and
storing a description of the functional aspects that were disabled, thereby enabling an indication of the description to be presented incident to troubleshooting the mobile device.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and products for facilitating a method of reducing mobile-phone fraud are provided. One method includes receiving a request to activate a mobile device, determining that it is identified as lost or stolen, communicating to the mobile device activation data that enables the mobile device to communicate via a wireless-telecommunications network despite the fact that the mobile device was determined to be identified as lost or stolen, and communicating to the mobile device functionality-impairment instructions that deliberately disable a set of functional aspects of the mobile device, thereby transforming it from a first state to a second state that is functionally impaired compared to the first state.
74 Citations
17 Claims
-
1. Non-transitory computer-readable media having computer-executable instructions embodied thereon, that, when executed by a computing device, facilitate a method of reducing mobile-phone fraud, the method comprising:
-
receiving a request to activate a mobile device; determining that the mobile device is identified as lost or stolen; communicating to the mobile device activation data, which enables the mobile device to communicate via a wireless-telecommunications network despite the fact that the mobile device was determined to be identified as lost or stolen; and communicating to the mobile device functionality-impairment instructions, which, when run on the mobile device, deliberately disable a set of functional aspects of the mobile device thereby transforming the mobile device from a first state to a second state and wherein the second state is functionally impaired as compared to the first state; receiving a request for service; receiving an indication that the mobile device is experiencing issues that stem from the functionality-impairment instructions; confirming that the mobile device is reported as lost or stolen; presenting a notification that the mobile device is reported as lost or stolen; and storing a description of the functional aspects that were disabled, thereby enabling an indication of the description to be presented incident to troubleshooting the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of recovering a lost or stolen mobile device, comprising:
-
incident to receiving input from a technician who has obtained the mobile device in connection with addressing a problem associated with the mobile device, submitting a query to determine whether the mobile device has been reported as being lost or stolen, wherein the problem was deliberately caused by instructions received from a wireless-telecommunications-network provider when activating the mobile device; wherein the instructions received from the wireless-telecommunications-network provider transition the mobile device from a first state to an impaired state, wherein the impaired state is characterized as being impaired with respect to the first state, and wherein the impaired state is further characterized as deliberately disabling functional aspects of one or more of the following, (1) a keyboard of the mobile device, (2) a microphone of the mobile device, (3) a display of the mobile device; receiving a response to the query; and presenting a visual indication that the mobile device is reported as being lost or stolen when the mobile device is identified as being lost or stolen. - View Dependent Claims (14)
-
-
15. Non-transitory computer-readable media having computer-executable instructions embodied thereon, that, when executed by a computing device, facilitate a method of receiving activation data that is usable to enable a mobile device to be used on a wireless-telecommunications network, the method comprising:
-
providing activation data; providing functionality-impairment instructions that, when executed by the mobile device, transition it to an impaired state, wherein the functionality-impairment instructions are activated after a determination that the mobile device is reported as lost or stolen; automatically executing the functionality-impairment instructions, thereby placing the mobile device into the impaired state, which is characterized by one or more of the following, (1) keyboard impairment, wherein a selection of buttons no longer input data correctly into the mobile device; (2) display impairment, wherein a display of the mobile device does not present data correctly; (3) power impairment, wherein a power supply of the mobile device does not function correctly; (4) operational impairment, wherein the mobile device does not operate according to normal procedure but for being in the impaired state; (5) microphone impairment, wherein the microphone of the mobile device does not function correctly. - View Dependent Claims (16, 17)
-
Specification