System and method for controlling the use of a wireless device
First Claim
Patent Images
1. A user equipment, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
storing, in a data store of the user equipment, number data representing a set of telephone numbers, wherein the user equipment is restricted to communicate with a set of respective communication devices associated with the set of telephone numbers,in response to verifying that first request data indicative of a first request for a modification of the number data has been received via an input interface of the user equipment, rejecting the first request,in response to verifying that second request data indicative of a second request for the modification of the number data has not been received via the input interface of the user equipment and has been received from a device coupled to the user equipment via a communication link, initiating an authentication of the device based on identifier data representing an alphanumeric sequence associated with the device, andin response to determining that the authentication satisfies a defined authentication criterion, accepting the second request to facilitate the modification.
1 Assignment
0 Petitions
Accused Products
Abstract
Preferred embodiments of the present invention provide for enabling a user to select telephone numbers to which a wireless device may place calls and from which the wireless device may receive calls. One preferred embodiment of the present invention includes software for use on a general purpose computer allowing the user to input into the memory of a wireless device desired telephone numbers that may not be changed by the operator of the wireless device. The computer software also programs the wireless device to only place calls to, or receives calls from, the telephone numbers entered into the memory of the wireless device by the owner.
31 Citations
20 Claims
-
1. A user equipment, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; storing, in a data store of the user equipment, number data representing a set of telephone numbers, wherein the user equipment is restricted to communicate with a set of respective communication devices associated with the set of telephone numbers, in response to verifying that first request data indicative of a first request for a modification of the number data has been received via an input interface of the user equipment, rejecting the first request, in response to verifying that second request data indicative of a second request for the modification of the number data has not been received via the input interface of the user equipment and has been received from a device coupled to the user equipment via a communication link, initiating an authentication of the device based on identifier data representing an alphanumeric sequence associated with the device, and in response to determining that the authentication satisfies a defined authentication criterion, accepting the second request to facilitate the modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage device comprising instructions that, in response to execution, cause a user equipment comprising a processor to perform operations, comprising:
-
storing in a data store of the user equipment, number data representing a set of telephone numbers, wherein the user equipment is restricted to communicate with a set of respective communication devices associated with the set of telephone numbers; rejecting a first request to modify the number data, wherein the first request is determined to be received via an input interface of the user equipment; initiating an authentication of a second request to modify the number data, wherein the second request is not determined to be received via the input interface of the user equipment and is determined to be received via a device coupled to the user equipment via a communication link and wherein the authentication employs identifier data representing an alphanumeric sequence associated with the device; and in response to determining that the authentication satisfies a defined authentication criterion, modifying the number data based on the second request. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
storing, by a first piece of equipment comprising a processor, identifier data indicative of a second piece of equipment within a data store of the first piece of equipment, wherein the storing prohibits a communication between the first piece of equipment and a third piece of equipment disparate from the second piece of equipment; in response to determining that first modification data that initiates a first modification of the identifier data has been received via an input interface of the first piece of equipment, prohibiting, by the first piece of equipment, the first modification; in response to determining that second modification data that initiates a second modification of the identifier data has not been received via the input interface of the first piece of equipment and has been received via a device coupled to the first piece of equipment via a communication link, verifying, by the first piece of equipment, that the device is an authorized device based on credential data indicative of an alphanumeric sequence associated with the device; and in response to the verifying, allowing, by the first piece of equipment, the second modification. - View Dependent Claims (19, 20)
-
Specification