Automatic profile updating for a wireless communication device

ABSTRACT

A profile audit system in a wireless network comprises a communication interface and a processing system. The communication interface is configured to receive a notification of a failed attempt by a first wireless communication device operated by a user to register with the wireless network using invalid registration data, and receive a user profile associated with the user. The processing system is configured to process the user profile and the invalid registration data to determine if a credential error has occurred, and if the credential error has occurred, process the user profile to determine if a second wireless communication device is associated with the user, and if the second wireless communication device is associated with the user, direct the communication interface to transfer an updated user profile for wireless delivery to the second wireless communication device, wherein the updated user profile includes valid registration data.

TECHNICAL BACKGROUND

To establish a communication session with a wireless access network, auser typically operates a wireless communication device to communicatein a wireless protocol with a wireless access node. The wireless accessnode then exchanges the user communications with other systems of thewireless access network, such as gateways, service nodes, and mobileswitching centers, to ultimately provide a communication service, suchas telephony voice communications or data access over the Internet.

However, in order to establish the communication session with thewireless network, the wireless communication device is typicallyrequired to first successfully register with the network. Deviceregistration to establish a communication session often involves thewireless network receiving registration data from the wirelesscommunication device attempting to register, such as device and useridentifiers associated with the device or its user. In order to grant ordeny the session request, a communication system in the wireless accessnetwork then retrieves user profile information from a profile storagesystem corresponding to the wireless communication device requestingregistration. If the registration data provided by the wirelesscommunication device is valid and matches the information in the userprofile, the device is granted access to the wireless network and thecommunication session is established. However, if the wirelesscommunication device provides invalid registration data, the informationin the user profile will not match and the communication session requestis denied.

OVERVIEW

A method of operating a profile audit system in a wireless network isdisclosed. The method comprises receiving a notification of a failedattempt by a first wireless communication device operated by a user toregister with the wireless network using invalid registration data,receiving a user profile associated with the user, and processing theuser profile and the invalid registration data to determine if acredential error has occurred. The method further comprises, if thecredential error has occurred, processing the user profile to determineif a second wireless communication device is associated with the user,and if the second wireless communication device is associated with theuser, transferring an updated user profile for wireless delivery to thesecond wireless communication device, wherein the updated user profileincludes valid registration data.

A profile audit system in a wireless network comprises a communicationinterface and a processing system. The communication interface isconfigured to receive a notification of a failed attempt by a firstwireless communication device operated by a user to register with thewireless network using invalid registration data, and receive a userprofile associated with the user. The processing system is configured toprocess the user profile and the invalid registration data to determineif a credential error has occurred, and if the credential error hasoccurred, process the user profile to determine if a second wirelesscommunication device is associated with the user, and if the secondwireless communication device is associated with the user, direct thecommunication interface to transfer an updated user profile for wirelessdelivery to the second wireless communication device, wherein theupdated user profile includes valid registration data.

Another method of operating a profile audit system in a wireless networkis disclosed. The method comprises receiving a notification of a failedattempt by a first wireless communication device operated by a user toregister with the wireless network using invalid registration data,receiving a user profile associated with the user, and processing theuser profile and the invalid registration data to determine if acredential error has occurred. The method further comprises, if thecredential error has occurred, transferring an updated user profile forwireless delivery to the first wireless communication device andprocessing the user profile to determine if a second wirelesscommunication device is associated with the user, and if the secondwireless communication device is associated with the user, transferringthe updated user profile for wireless delivery to the second wirelesscommunication device, wherein the updated user profile includes validregistration data obtained from the user profile.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram that illustrates a communication system.

FIG. 2 is a flow diagram that illustrates an operation of thecommunication system.

FIG. 3 is a block diagram that illustrates a communication system in anexemplary embodiment.

FIG. 4 is a sequence diagram that illustrates an operation of thecommunication system in an exemplary embodiment.

FIG. 5 is a block diagram that illustrates a roaming management computersystem.

DETAILED DESCRIPTION

The following description and associated drawings teach the best mode ofthe invention. For the purpose of teaching inventive principles, someconventional aspects of the best mode may be simplified or omitted. Thefollowing claims specify the scope of the invention. Some aspects of thebest mode may not fall within the scope of the invention as specified bythe claims. Thus, those skilled in the art will appreciate variationsfrom the best mode that fall within the scope of the invention. Thoseskilled in the art will appreciate that the features described below canbe combined in various ways to form multiple variations of theinvention. As a result, the invention is not limited to the specificexamples described below, but only by the claims and their equivalents.

FIG. 1 is a block diagram that illustrates communication system 100.Communication system 100 includes wireless communication devices 101 and102, wireless access node 110, wireless communication network 120, andprofile audit system 130. Wireless communication devices 101 and 102 arein communication with wireless access node 110 over respective wirelesscommunication links 111 and 112. Wireless access node 110 communicateswith wireless communication network 120 over communication link 121.Wireless communication network 120 is in communication with profileaudit system 130 over communication link 131.

FIG. 2 is a flow diagram that illustrates an operation of communicationsystem 100. The steps of the operation are indicated belowparenthetically. The exemplary operation shown in FIG. 2 depicts amethod of operating profile audit system 130 in a wireless communicationnetwork 120.

To begin, profile audit system 130 receives a notification of a failedattempt by a first wireless communication device 101 operated by a userto register with a wireless network 120 using invalid registration data(201). Typically, profile audit system 130 receives the notification ofthe failed registration attempt transferred from a registration server,authorization system, data session registrar, service node, or someother communication system associated with wireless communicationnetwork 120. For example, an authorization system, such as anauthentication, authorization, and accounting (AAA) server, may beconfigured to transfer the notification of the failed attempt fordelivery to profile audit system 130 responsive to the failed attempt bythe first wireless communication device 101 operated by the user toregister with the wireless network 120 using the invalid registrationdata.

In some examples, the notification of the failed attempt includes theinvalid registration data presented by the first wireless communicationdevice 101 when attempting to register with the wireless network 120.Typically, the registration data is considered invalid when at least aportion of the registration data does not match the corresponding datastored in wireless network 120 needed to authenticate and authorizedevice 101 for network access. The invalid registration data couldinclude various device and user identifiers associated with (or formerlyassociated with) wireless communication device 101 and its user. Forexample, the invalid registration data could comprise a Mobile StationInternational Subscriber Directory Number (MSISDN) or some othertelephone number, Electronic Serial Number (ESN), Mobile StationIdentifier (MSID), Mobile Equipment Identifier (MEID), InternationalMobile Equipment Identity (IMEI), International Mobile SubscriberIdentity (IMSI), Media Access Control Identifier (MACID), UserIdentifier (UID), or some other identifier that uniquely identifieswireless communication device 101 and/or a user of device 101.

In addition to the notification of the failed attempt by the firstwireless communication device 101 operated by the user to register withthe wireless network 120, profile audit system 130 receives a userprofile associated with the user (202). Typically, profile audit system130 receives the user profile associated with the user responsive toreceiving the notification of the failed registration attempt. Forexample, profile audit system 130 may receive the notification of thefailed attempt to register by wireless communication device 101 anddetermine a user associated with device 101 based on the invalidregistration data included with the notification message. Profile auditsystem 130 could then retrieve a user profile associated with the userof wireless communication device 101 from a database or other storagesystem. Typically, the user profile includes the most current version ofregistration data available to wireless network 120. For example, theuser profile could include a user identifier associated with the userand a device identifier that identifies the first wireless communicationdevice 101.

Profile audit system 130 then processes the user profile and the invalidregistration data to determine if a credential error has occurred (203).Often, the credential error occurs when the invalid registration dataincludes outdated or corrupted information. In some examples, profileaudit system 130 may process the user profile and the invalidregistration data to determine that the invalid registration data isassociated with an old user profile associated with the user. Forexample, wireless communication device 101 may have missed an attempt bywireless network 120 to update the user profile, so device 101 has anoutdated user profile stored thereon. In other examples, profile auditsystem 130 may compare the information in the user profile to theinvalid registration data to determine if the credential error hasoccurred. For example, profile audit system 130 could obtain validregistration data from the user profile, and process the user profileand the invalid registration data by comparing the valid registrationdata from the user profile to the invalid registration data to determineif the credential error has occurred.

If the credential error has occurred, profile audit system 130 processesthe user profile to determine if a second wireless communication device102 is associated with the user. Typically, profile audit system 130might extract a device identifier for wireless communication device 102or some other data from the user profile that indicates the user has asecond wireless communication device 102. For example, profile auditsystem 130 may process the user profile to determine a device identifierthat identifies the second wireless communication device 102. Inaddition, if the credential error has occurred, profile audit system 130may transfer an updated user profile for wireless delivery to the firstwireless communication device 101 in some examples.

If the second wireless communication device 102 is associated with theuser, profile audit system 130 transfers an updated user profile forwireless delivery to the second wireless communication device 102,wherein the updated user profile includes valid registration data (205).In some examples, profile audit system 130 obtains the validregistration data from the user profile previously received by profileaudit system 130 in operation 202. Typically, the valid registrationdata transferred for delivery to the second wireless communicationdevice 102 enables device 102 to successfully register with wirelessnetwork 120. In some examples, the user profile received by profileaudit system 130 in operation 202 is transferred to wirelesscommunication device 102 as the updated user profile. However, theupdated user profile could also comprise a patch that only updates theinvalid registration data with the valid registration data obtained fromthe user profile in some examples.

Advantageously, profile audit system 130 can automatically update userprofiles stored on a plurality of wireless communication devices 101 and102 associated with a user responsive to a failed attempt to registerwith a wireless network 120 by one of the devices 101 or 102. Forexample, a user operating wireless communication device 101 or 102 mightcancel, miss, or otherwise fail to receive a user profile update attemptby wireless network 120 needed for successful registration with thenetwork 120. When the user then tries to register with wireless network120 using a wireless communication device 101 or 102 having an outdateduser profile, profile audit system 130 is notified of a failedregistration attempt and determines if a credential error has occurred.In this manner, profile audit system 130 may automatically updatewireless communication devices 101 or 102 with current and validregistration data in an updated user profile.

Referring back to FIG. 1, wireless communication devices 101 and 102each comprise any device having wireless communication connectivity withhardware and circuitry programmed to function as a telecommunicationsdevice, such as Radio Frequency (RF) communication circuitry and anantenna. The RF communication circuitry typically includes an amplifier,filter, modulator, and signal processing circuitry. Wirelesscommunication devices 101 and 102 may also include a user interface,memory device, software, processing circuitry, or some othercommunication components. For example, each wireless communicationdevice 101 and 102 could comprise a telephone, transceiver, mobilephone, cellular phone, smartphone, computer, personal digital assistant(PDA), e-book, game console, mobile Internet device, wireless networkinterface card, media player, or some other wireless communicationapparatus—including combinations thereof. Wireless network protocolsthat may be utilized by wireless communication devices 101 and 102include Code Division Multiple Access (CDMA) 1xRTT, Global System forMobile communications (GSM), Universal Mobile Telecommunications System(UMTS), High-Speed Packet Access (HSPA), Evolution-Data Optimized(EV-DO), EV-DO rev. A, Third Generation Partnership Project Long TermEvolution (3GPP LTE), Worldwide Interoperability for Microwave Access(WiMAX), IEEE 802.11 protocols (Wi-Fi), Bluetooth, Internet, telephony,or any other wireless network protocol that facilitates communicationbetween wireless communication devices 101 and 102 and wireless accessnode 110.

Wireless access node 110 comprises RF communication circuitry and anantenna. The RF communication circuitry typically includes an amplifier,filter, RF modulator, and signal processing circuitry. Wireless accessnode 110 may also comprise a router, server, memory device, software,processing circuitry, cabling, power supply, network communicationinterface, structural support, or some other communication apparatus.Wireless access node 110 could comprise a base station, Internet accessnode, telephony service node, wireless data access point, or some otherwireless communication system—including combinations thereof. Someexamples of wireless access node 110 include a base transceiver station(BTS), base station controller (BSC), radio base station (RBS), Node B,enhanced Node B (eNode B), and others. Wireless network protocols thatmay be utilized by wireless access node 110 include CDMA, GSM, UMTS,HSPA, EV-DO, EV-DO rev. A, 3GPP LTE, WiMAX, Wi-Fi, Bluetooth, Internet,telephony, or some other communication format—including combinationsthereof.

Wireless communication network 120 represents the core network of awireless communication provider, and could include routers, gateways,telecommunication switches, servers, processing systems, or othercommunication equipment and systems for providing communication and dataservices. Wireless communication network 120 could comprise wirelesscommunication nodes, telephony switches, Internet routers, networkgateways, computer systems, communication links, or some other type ofcommunication equipment—including combinations thereof. Wirelesscommunication network 120 may also comprise optical networks,asynchronous transfer mode (ATM) networks, packet networks, radio accessnetworks (RAN), local area networks (LAN), metropolitan area networks(MAN), wide area networks (WAN), or other network topologies, equipment,or systems—including combinations thereof. Wireless communicationnetwork 120 may be configured to communicate over metallic, wireless, oroptical links. Wireless communication network 120 may be configured touse time-division multiplexing (TDM), Internet Protocol (IP), Ethernet,optical networking, wireless protocols, communication signaling, or someother communication format—including combinations thereof. In someexamples, wireless communication network 120 includes further accessnodes and associated equipment for providing communication services tomany wireless communication devices across a large geographic region.

Profile audit system 130 comprises a processing system and communicationinterface. Profile audit system 130 may also include other componentssuch as a router, server, data storage system, and power supply. Profileaudit system 130 may reside in a single device or may be distributedacross multiple devices. Profile audit system 130 may be a discretesystem or may be integrated within other systems—including other systemswithin communication system 100. Profile audit system 130 could comprisea packet gateway, mobile switching center, network gateway system,Internet access node, application server, service node, firewall, orsome other communication system—including combinations thereof.

Wireless communication links 111 and 112 use the air or space as thetransport medium. Wireless communication links 111 and 112 may usevarious protocols, such as CDMA, GSM, UMTS, HSPA, EV-DO, EV-DO rev. A,3GPP LTE, WiMAX, Wi-Fi, Bluetooth, Internet, telephony, or some othercommunication format—including combinations thereof. Wirelesscommunication links 111 and 112 may comprise many different signalssharing the same link. For example, each wireless communication link 111and 112 could include multiple signals operating in a single propagationpath comprising multiple communication sessions, frequencies, timeslots,transportation ports, logical transportation links, network sockets, IPsockets, packets, or communication directions—including combinationsthereof.

Communication links 121 and 131 use metal, air, space, optical fibersuch as glass or plastic, or some other material as the transportmedia—including combinations thereof. Communication links 121 and 131could use various communication protocols, such as TDM, IP, Ethernet,telephony, optical networking, hybrid fiber coax (HFC), communicationsignaling, wireless protocols, or some other communicationformat—including combinations thereof. Communication links 121 and 131may be direct links or could include intermediate networks, systems, ordevices.

FIG. 3 is a block diagram that illustrates communication system 300.Communication system 300 includes wireless communication devices 301 and302, wireless access node 310, authorization system 315, wirelesscommunication network 320, profile audit system 330, and profiledatabase 350. Wireless communication devices 301 and 302 communicatewith wireless access node 310 over respective wireless links 311 and312. Wireless access node 310 is in communication with authorizationsystem 315 over communication link 321. Authorization system 315communicates with wireless communication network 320 over communicationlink 331. Wireless communication network 320 is in communication withprofile database 350 over communication link 351. Wireless communicationnetwork 320 is also in communication with profile audit system 330 overcommunication link 341. Profile audit system 330 includes profileauditor 333 and profile updater 335. Profile auditor 333 and profileupdater 335 each typically comprise a processing system andcommunication interface. Profile auditor 333 and profile updater 335 maybe geographically distributed across multiple devices in profile auditsystem 330, or may both reside in a single device comprising profileaudit system 330. In the latter case, profile auditor 333 and profileupdater 335 could comprise software modules configured to execute onprofile audit system 330.

FIG. 4 is a sequence diagram that illustrates an operation ofcommunication system 300 in an exemplary embodiment. In this example, auser is associated with both wireless communication devices 301 and 302.To begin, profile updater 335 receives a user profile update fromprofile database 350. The user profile update is associated with theuser of wireless communication devices 301 and 302. Typically, profiledatabase 350 receives updated user profile information from back-officesystems whenever changes affecting a user profile occur, such as a newsubscription, password reset, device change, or other accountmodifications. In this example, profile updater 335 receives the profileupdate from profile database 350 after database 350 receives the updatedinformation for the user profile.

In response to receiving the user profile update, profile updater 335attempts to transfer the profile update for delivery to wirelesscommunication device 101 and 102 associated with the user. For example,profile updater 335 may process the user profile update to determinethat wireless communication devices 101 and 102 are associated with theuser and should receive the profile update. In this example, however,only wireless communication device 302 receives the user profile updatefrom profile updater 335. Wireless communication device 301 does notreceive the user profile update because device 301 is powered off whenprofile updater 335 attempts to transfer the update.

At a later point in time, the user powers on wireless communicationdevice 301 and a communication session request is transferred fordelivery to authorization system 315. The session registration requesttypically includes access credentials, security tokens, device and/orsubscriber identifiers, or other information associated with wirelesscommunication device 301 and its user. Upon receiving the sessionrequest from wireless communication device 301, authorization system 315typically processes the registration data and other information includedin the session registration request to determine a user associated withdevice 301. Authorization system 315 then transfers a user profilerequest query to profile database 350 requesting the user profile forthe user identified in the registration data.

Responsive to receiving the user profile from profile database 350,authorization system 315 processes the user profile and the registrationdata received in the session request to authenticate the user ofwireless communication device 301. However, in this example, sincewireless communication device 301 did not receive the recent userprofile update from profile updater 335, at least some of theregistration data included in the session request is invalid and doesnot match the corresponding data in the user profile. Therefore,authorization system 315 determines that wireless communication device301 is unauthorized for a session with wireless network 320 and deniesthe session request.

Prior to, during, and/or after informing wireless communication device301 of the session registration failure, authorization system 315transfers a notification to profile auditor 333 of the failed attempt bydevice 301 to register with wireless communication network 320.Typically, authorization system 315 transfers the notification of thefailed registration attempt to profile auditor 333 responsive towireless communication device 301 providing invalid registration dataand failing to register. However, in some examples, authorization system315 may be configured to transfer the notification of the failedregistration attempt based on a flag in the user profile, a userpreference, a group or classification associated with device 301 or theuser, or some other settings configuration.

The registration failure notification includes information related tothe failed registration attempt, including the invalid registration datasubmitted by wireless communication device 301. Profile auditor 333typically processes this information upon receipt of the failurenotification from authorization system 315 to determine the userassociated with device 301 that failed registration. Profile auditor 333then requests the latest profile data from profile database 350 for thisuser. In some example, profile auditor 333 may also request user profiledata from back-office systems.

After receiving the current user profile data from profile database 350,profile auditor 333 processes the current user profile and the invalidregistration data to determine an error that caused the registrationfailure. In this example, profile auditor 333 is configured to comparethe detailed information in the user profile to the information thatwireless device 301 provided to authorization system 315 when attemptingto register. Profile auditor 333 typically processes the invalidregistration data and the user profile to identify inconsistencies andother erroneous information in the registration data provided by device301.

Once profile auditor 333 processes the user profile and the invalidregistration data to determine the erroneous data that caused theregistration failure, profile auditor 333 transfers a profile updaterequest for wireless device 301 to profile updater 335. Typically, theprofile update request instructs profile updater 335 to proceed with anover-the-air (OTA) profile update to wireless communication device 301.In some examples, the profile update request could also direct profileupdater 335 to wirelessly transfer a profile update to all wirelesscommunication devices 301 and 302 indicated in the user profile.

Responsive to the profile update request, profile updater 335 transfersa user profile update for wireless delivery to wireless communicationdevice 301. The user profile update typically includes current and validregistration data to correct the erroneous information provided bydevice 301 during the failed registration attempt. In some examples,responsive to the profile update request from profile auditor 333,profile updater 335 could determine which wireless communication devices301 and 302 have not received the latest profile update, and thentransfer the profile update only to those devices still having an oldprofile, which in this example is only wireless communication device301. Advantageously, once wireless communication device 301 receives theprofile update, the user can successfully register with wireless network320 using device 301. Further, since wireless device 301 automaticallyreceives the profile update from profile updater 335, the user avoidshaving to manually contact personnel at wireless communication network320 in order to correct the registration error and receive the updatedprofile data.

FIG. 5 is a block diagram that illustrates profile audit system 500.Profile audit system 500 provides an example of profile audit systems130 and 330, although systems 130 and 330 may use alternativeconfigurations. Profile audit system 500 comprises communicationinterface 501 and processing system 503. Processing system 503 is linkedto communication interface 501. Processing system 503 includesprocessing circuitry 505 and memory device 506 that stores operatingsoftware 507.

Communication interface 501 comprises components that communicate overcommunication links, such as network cards, ports, RF transceivers,processing circuitry and software, or some other communicationcomponents. Communication interface 501 may be configured to communicateover metallic, wireless, or optical links. Communication interface 501may be configured to use TDM, IP, Ethernet, optical networking, wirelessprotocols, communication signaling, or some other communicationformat—including combinations thereof. Communication interface 501 couldbe configured to receive a notification of a failed attempt by a firstwireless communication device operated by a user to register with awireless network using invalid registration data, and to receive a userprofile associated with the user. Further, communication interface 501could be configured to transfer an updated user profile for wirelessdelivery to a second wireless communication device, wherein the updateduser profile includes valid registration data.

Processing circuitry 505 comprises microprocessor and other circuitrythat retrieves and executes operating software 507 from memory device506. Memory device 506 comprises a disk drive, flash drive, data storagecircuitry, or some other memory apparatus. Operating software 507comprises computer programs, firmware, or some other form ofmachine-readable processing instructions. Operating software 507 mayinclude an operating system, utilities, drivers, network interfaces,applications, or some other type of software.

When executed by circuitry 505, operating software 507 directsprocessing system 503 to operate as described herein for profile auditsystems 130 and 330. In particular, operating software 507 may directprocessing system 503 to direct communication interface 501 to receive anotification of a failed attempt by a first wireless communicationdevice operated by a user to register with the wireless network usinginvalid registration data, and to receive a user profile associated withthe user. In addition, operating software 507 directs processing system503 to process the user profile and the invalid registration data todetermine if a credential error has occurred, and if the credentialerror has occurred, to process the user profile to determine if a secondwireless communication device is associated with the user. Further, ifthe second wireless communication device is associated with the user,operating software 507 directs processing system 503 to directcommunication interface 501 to transfer an updated user profile forwireless delivery to the second wireless communication device, whereinthe updated user profile includes valid registration data. In someexamples, operating software 507 could comprise a profile auditorsoftware module that processes the user profile and the invalidregistration data to determine if a credential error has occurred, andif the credential error has occurred, processes the user profile todetermine if a second wireless communication device is associated withthe user. Additionally, operating software 507 could comprise a profileupdater software module that transfers an updated user profile forwireless delivery to the second wireless communication device if thesecond wireless communication device is associated with the user,wherein the updated user profile includes valid registration data.

The above description and associated figures teach the best mode of theinvention. The following claims specify the scope of the invention. Notethat some aspects of the best mode may not fall within the scope of theinvention as specified by the claims. Those skilled in the art willappreciate that the features described above can be combined in variousways to form multiple variations of the invention. As a result, theinvention is not limited to the specific embodiments described above,but only by the following claims and their equivalents.

1. A method of operating a profile audit system in a wireless network,the method comprising: receiving a notification of a failed attempt by afirst wireless communication device operated by a user to register withthe wireless network using invalid registration data; receiving a userprofile associated with the user; processing the user profile and theinvalid registration data to determine that a credential error hasoccurred by determining that the invalid registration data is associatedwith an old user profile associated with the user; and based on thecredential error having occurred, processing the user profile todetermine that a second wireless communication device is associated withthe user and responsively transferring valid registration data forwireless delivery to the second wireless communication device.
 2. Themethod of claim 1 further comprising, based on the credential errorhaving occurred, transferring the valid registration data for wirelessdelivery to the first wireless communication device.
 3. The method ofclaim 1 wherein processing the user profile to determine that the secondwireless communication device is associated with the user comprisesprocessing the user profile to determine a device identifier thatidentifies the second wireless communication device.
 4. The method ofclaim 1 wherein the valid registration data is obtained from the userprofile.
 5. The method of claim 4 wherein processing the user profileand the invalid registration data to determine that the credential errorhas occurred comprises comparing the valid registration data from theuser profile to the invalid registration data to determine if thecredential error has occurred.
 6. The method of claim 1 whereinreceiving the notification of the failed attempt comprises receiving thenotification of the failed attempt transferred from an authorizationsystem.
 7. The method of claim 6 wherein the authorization system isconfigured to transfer the notification of the failed attempt fordelivery to the profile audit system responsive to the failed attempt bythe first wireless communication device operated by the user to registerwith the wireless network using the invalid registration data.
 8. Themethod of claim 1 wherein the user profile includes a user identifierassociated with the user and a device identifier that identifies thefirst wireless communication device.
 9. The method of claim 1 whereinthe user profile includes the valid registration data.
 10. A profileaudit system in a wireless network, the system comprising: acommunication interface configured to receive a notification of a failedattempt by a first wireless communication device operated by a user toregister with the wireless network using invalid registration data, andreceive a user profile associated with the user; a processing systemconfigured to process the user profile and the invalid registration datato determine that a credential error has occurred by determining thatthe invalid registration data is associated with an old user profileassociated with the user; and the processing system configured to, basedon the credential error having occurred, process the user profile todetermine that a second wireless communication device is associated withthe user and responsively direct the communication interface to transfervalid registration data for wireless delivery to the second wirelesscommunication device.
 11. The system of claim 10 further comprising theprocessing system configured to, based on the credential error havingoccurred, direct the communication interface to transfer the validregistration data for wireless delivery to the first wirelesscommunication device.
 12. The system of claim 10 wherein the processingsystem configured to process the user profile to determine that thesecond wireless communication device is associated with the usercomprises the processing system configured to process the user profileto determine a device identifier that identifies the second wirelesscommunication device.
 13. The system of claim 10 wherein the validregistration data is obtained from the user profile.
 14. The system ofclaim 13 wherein the processing system configured to process the userprofile and the invalid registration data to determine that thecredential error has occurred comprises the processing system configuredto compare the valid registration data from the user profile to theinvalid registration data to determine if the credential error hasoccurred.
 15. The system of claim 10 wherein the communication interfaceconfigured to receive the notification of the failed attempt comprisesthe communication interface configured to receive the notification ofthe failed attempt transferred from an authorization system.
 16. Thesystem of claim 15 wherein the authorization system is configured totransfer the notification of the failed attempt for delivery to theprofile audit system responsive to the failed attempt by the firstwireless communication device operated by the user to register with thewireless network using the invalid registration data.
 17. The system ofclaim 10 wherein the user profile includes a user identifier associatedwith the user and a device identifier that identifies the first wirelesscommunication device.
 18. A computer apparatus to facilitate updatingregistration data for devices in a wireless network, the apparatuscomprising: software instructions configured, when executed by a profileaudit system, to direct the profile audit system to receive anotification of a failed attempt by a first wireless communicationdevice operated by a user to register with the wireless network usinginvalid registration data, receive a user profile associated with theuser, process the user profile and the invalid registration data todetermine that a credential error has occurred by determining that theinvalid registration data is associated with an old user profileassociated with the user, and based on the credential error havingoccurred, process the user profile to determine that a second wirelesscommunication device is associated with the user and responsivelytransfer valid registration data for wireless delivery to the secondwireless communication device; and at least one non-transitorycomputer-readable storage medium storing the software instructions.