Identifying a device to a network
First Claim
Patent Images
1. A method for performing equipment identity registry functionality, the method comprising:
- receiving, by a network, a short messaging service message from a wireless device, wherein the wireless device sends the short messaging service message, wherein the short messaging service message comprises a device identifier, a subscriber identifier of a subscriber of the wireless device, and location information associated with the wireless device, wherein the wireless device provides the device identifier of the wireless device and the location information of the wireless device to a subscriber identity module in response to the subscriber identity module being coupled to the wireless device, and wherein the subscriber identity module provides the subscriber identifier to the wireless device in response to receiving the device identifier and the location information;
based on the device identifier, locating, by the network, a status of the wireless device, the status identifying whether the wireless device was lost or stolen based on information stored by a device management network element in a deny database, wherein the network provides connection services for the wireless device, wherein the network does not comprise an equipment identity registry;
based on the subscriber identifier, locating, by the network, services for the subscriber;
based on the status, setting, by the network, permissions for the subscriber, wherein based on the wireless device having the status identifying that the wireless device was lost or stolen, the permissions deny access to all services except limited customer care services; and
storing, by the network, the location information, wherein the location information is applied for locating a user in an event of an emergency call.
6 Assignments
0 Petitions
Accused Products
Abstract
A communication arrangement includes a Short Message Service Center (SMS-SC), a permissions facility (such as a customer care facility) to associate permissions and service requests, and a network element configured to receive a Short Message Service message via the SMS-SC. The network element extracts a device identifier from the message, applies the device identifier to locate device status information, and interacts with the facility to determine permissions to apply to service requests originating from the device.
32 Citations
16 Claims
-
1. A method for performing equipment identity registry functionality, the method comprising:
-
receiving, by a network, a short messaging service message from a wireless device, wherein the wireless device sends the short messaging service message, wherein the short messaging service message comprises a device identifier, a subscriber identifier of a subscriber of the wireless device, and location information associated with the wireless device, wherein the wireless device provides the device identifier of the wireless device and the location information of the wireless device to a subscriber identity module in response to the subscriber identity module being coupled to the wireless device, and wherein the subscriber identity module provides the subscriber identifier to the wireless device in response to receiving the device identifier and the location information; based on the device identifier, locating, by the network, a status of the wireless device, the status identifying whether the wireless device was lost or stolen based on information stored by a device management network element in a deny database, wherein the network provides connection services for the wireless device, wherein the network does not comprise an equipment identity registry; based on the subscriber identifier, locating, by the network, services for the subscriber; based on the status, setting, by the network, permissions for the subscriber, wherein based on the wireless device having the status identifying that the wireless device was lost or stolen, the permissions deny access to all services except limited customer care services; and storing, by the network, the location information, wherein the location information is applied for locating a user in an event of an emergency call. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network element comprising:
-
a processor; and a memory that stores instructions, that when executed by the processor, causes the processor to perform operations for performing equipment identity registry functionality, the operations comprising; receiving a short messaging service message from a wireless device, wherein the wireless device sends the short messaging service message, wherein the short messaging service message comprises a device identifier, a subscriber identifier of a subscriber of the wireless device, and location information associated with the wireless device, wherein the wireless device provides the device identifier of the wireless device and the location information of the wireless device to a subscriber identity module in response to the subscriber identity module being coupled to the wireless device, and wherein the subscriber identity module provides the subscriber identifier to the wireless device in response to receiving the device identifier and the location information; based on the device identifier, locating a status of the wireless device, the status identifying whether the wireless device was lost or stolen based on information stored by a device management network element in a deny database, wherein a network provides connection services for the wireless device, wherein the network does not comprise an equipment identity registry; based on the subscriber identifier, locating services for the subscriber; based on the status, setting permissions for the subscriber, wherein based on the wireless device having the status identifying that the wireless device was lost or stolen, the permissions deny access to all services except limited customer care services; and storing the location information, wherein the location information is applied for locating a user in an event of an emergency call. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a deny database comprising a plurality of device identifiers identifying lost devices or stolen devices; and a network element in communication with the deny database, the network element comprising a memory storing instructions that, when executed by a processor, causes the processor to perform operations for performing equipment identity registry functionality, the operations comprising receiving a short messaging service message from a wireless device, wherein the wireless device sends the short messaging service message, wherein the short messaging service message comprises a device identifier, a subscriber identifier of a subscriber of the wireless device, and location information associated with the wireless device, wherein the wireless device provides the device identifier of the wireless device and the location information of the wireless device to a subscriber identity module in response to the subscriber identity module being coupled to the wireless device, and wherein the subscriber identity module provides the subscriber identifier to the wireless device in response to receiving the device identifier and the location information; based on the device identifier, locating a status of the wireless device, the status identifying whether the wireless device was lost or stolen based on information stored by a device management network element in the deny database, wherein a network provides connection services for the wireless device, wherein the network does not comprise an equipment identity registry; based on the subscriber identifier, locating services for the subscriber; based on the status, setting permissions for the subscriber, wherein based on the wireless device having the status identifying that the wireless device was lost or stolen, the permissions deny access to all services except limited customer care services; and storing the location information, wherein the location information is applied for locating a user in an event of an emergency call. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification