Method for managing wireless devices using exception monitoring
First Claim
Patent Images
1. A computerized method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
- using a computer system including at least one computer device to obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following;
restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
using the computer system to compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
using the computer system to create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
using the computer system to present the exception report to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
An improved solution for managing use of a plurality of wireless devices is provided. In an embodiment of the invention, a usage policy is obtained for the plurality of wireless devices. Usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created. In another embodiment, the exception report is analyzed for non-compliance and a customer is notified.
-
Citations
22 Claims
-
1. A computerized method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
-
using a computer system including at least one computer device to obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following;
restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;using the computer system to compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices; using the computer system to create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and using the computer system to present the exception report to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for managing use of a plurality of wireless devices owned by a customer, the system for managing comprising:
-
a system for obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following;
restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices a system for creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and a system for presenting the exception report to a user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program comprising program code stored on a non-transitory computer-readable storage medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
-
obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following;
restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices; creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and presenting the exception report to a user.
-
-
19. A method of generating a system for managing use of a plurality of wireless devices owned by a customer, the method comprising:
providing a computer system operable to; obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following;
restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices; create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and present the exception report to a user. - View Dependent Claims (20, 21, 22)
Specification