System, method and apparatus for pairing SIM or UICC cards with authorized wireless devices
First Claim
Patent Images
1. A wireless device configured to control network authorization comprising:
- a removable memory storing a list of authorized terminals within the wireless device;
a processor configured to execute a pairing application comprising a plurality of logical flags;
a comparator to compare the list of authorized terminals in the removable memory to at least one of terminal profile data and an IMEI of the wireless device; and
the wireless device being configured to allow network access if at least one the terminal profile data and the IMEI of the wireless device is found on the list of authorized terminals and the wireless device being further configured to limit network access if the terminal profile data and the IMEI of the wireless device are not found on the list of authorized terminals,wherein one of the plurality of logical flags is associated with a SMS reporting process, the processor being configured to implement the SMS reporting process to send activity reports to at least one of a backend server, a system, a component controlled by a MVNO and a component controlled by a wireless carrier.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless device and a process of authorizing a wireless device are disclosed. The process includes storing a list of authorized terminals within a memory accessible by a wireless device. The process further includes comparing the list of authorized terminals in the memory to at least one of terminal profile data and an IMEI of the wireless device and allowing network access if at least one of the terminal profile data and the IMEI are found on the list of authorized terminals and limiting network access if at least one of the terminal profile data and the IMEI are not found on the list of authorized terminals.
26 Citations
13 Claims
-
1. A wireless device configured to control network authorization comprising:
-
a removable memory storing a list of authorized terminals within the wireless device; a processor configured to execute a pairing application comprising a plurality of logical flags; a comparator to compare the list of authorized terminals in the removable memory to at least one of terminal profile data and an IMEI of the wireless device; and the wireless device being configured to allow network access if at least one the terminal profile data and the IMEI of the wireless device is found on the list of authorized terminals and the wireless device being further configured to limit network access if the terminal profile data and the IMEI of the wireless device are not found on the list of authorized terminals, wherein one of the plurality of logical flags is associated with a SMS reporting process, the processor being configured to implement the SMS reporting process to send activity reports to at least one of a backend server, a system, a component controlled by a MVNO and a component controlled by a wireless carrier. - View Dependent Claims (2, 4, 5, 6, 7, 8)
-
-
3. A wireless device configured to control network authorization comprising:
-
a removable memory storing a list of authorized terminals within the wireless device; a processor configured to execute a pairing application comprising a plurality of logical flags; a comparator to compare the list of authorized terminals in the removable memory to at least one of terminal profile data and an IMEI of the wireless device; and the wireless device being configured to allow network access if the at least one the terminal profile data and the IMEI of the wireless device is found on the list of authorized terminals and the wireless device being further configured to limit network access if the at least one of the terminal profile data and the IMEI of the wireless device are not found on the list of authorized terminals, wherein one of the plurality of logical flags is associated with an OTA provisioning process, the processor being configured to implement the OTA provisioning process to allow OTA updates to refresh programming and procedures including at least one of an initial application setup, new listings of authorized parameters, revised methods for sending activity reports, updated switch settings, and connectivity with a network. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification