Restoring functionality of a mobile device

ABSTRACT

A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.

CROSS REFERENCES TO RELATED APPLICATIONS

The present application claims the benefit of priority under 35 U.S.C. §119 from U.S. Provisional Patent Application Ser. No. 62/293,286,entitled “Controlling Device Functionality Based on Account Status,”filed on Feb. 9, 2016, and U.S. patent application Ser. No. 15/082,388,filed on Mar. 28, 2016, entitled “Restoring Functionality of MobileDevice,” which are hereby incorporated by reference in their entiretyfor all purposes.

BACKGROUND

Today, wireless telecommunication carriers provide their customersvarious competitive options for obtaining mobile communication devices,such as smartphones. Some devices are carrier-locked, to restrict thedevices to the particular wireless telecommunication carrier and aspecific region. A user device may be carrier locked to a wirelesscommunication carrier via a subscriber identity module (SIM) lock enginethat is located within the modem of the user device. The restrictionsmay be formalized via an equipment installment plan (EIP) or equipmentlease.

One of the reasons a wireless telecommunication carrier locks acommunication device to a particular carrier is because these devicesmay be offered at a discount to customers in exchange for a contract topay for the use of the network for a predetermined time period. Theagreements may be formalized via an equipment lease or installment plan,collectively referred to herein as an equipment installment plan (EIP).This subsidized device business model allows the wirelesstelecommunication carrier to recoup the cost of the communication deviceduring the term of the contract.

To prevent a subsidized communication device from being used on analternate network (e.g., for a lower fee) or from its various featuresto be used without making requisite payments (e.g., the phone may bestolen), the communication device may be locked and/or its access to thecommunication network of the telecommunication carrier restricted by thewireless telecommunication carrier to mitigate the disruption of thebusiness model. For example, a nefarious actor may attempt to exploitthe value of a user device provided by a wireless telecommunicationcarrier without having made the requisite payments, such as attemptingto sell an unpaid user device still under an EIP to a person who mayswap the original subscriber identity module (SIM) card for another. Inanother scenario, an EIP subscriber may fall behind on or avoid makingpayments (e.g., incur a “bad debt”) while still attempting to takeadvantage of various functionality of the user device on anotherwireless telecommunication carrier and/or with ubiquitous Wi-Fi. Once auser device is restricted by an infrastructure of the telecommunicationcarrier, it is difficult to restore the functionality of the userdevice.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is described with reference to the accompanyingfigures, in which the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Theuse of the same reference numbers in different figures indicates similaror identical items.

FIG. 1 illustrates an example architecture for implementing a system forcontrolling a user device functionality based on an account status.

FIG. 2 is a block diagram showing various components of an illustrativeuser device (UD).

FIG. 3 illustrates an example Warning Lock Screen.

FIG. 4 illustrates an example Info Lock Screen.

FIG. 5 illustrates an example Alert Lock Screen.

FIG. 6 illustrates an embodiment where an Alert Lock Screen that mayprovide notification of incentives for returning or reactivating devicewith payment.

FIG. 7 illustrates a high level example process flow for a paymentreminder.

FIG. 8 illustrates a high level example process flow for a notificationon a subscriber identity module (SIM) swap.

FIG. 9A illustrates a high level example process flow for locking a userdevice.

FIG. 9B illustrates a high level example process flow removingrestrictions on a user device

FIG. 10 illustrates a high level example process flow for providing anincentive to return a user device to a telecommunication carrier.

FIG. 11 illustrates a high level example process flow for redirectingcalls and/or data to an original telecommunication carrier.

FIG. 12 illustrates a high level example process flow for disabling themost frequently used features of a user device.

FIG. 13 illustrates a high level example process flow for restoringfunctionality by reinstating the original SIM card.

FIG. 14 illustrates a high level example process flow for restoringfunctionality by a user of a SIM-swapped locked user device.

DETAILED DESCRIPTION Overview

In the following detailed description, numerous specific details are setforth by way of examples in order to provide a thorough understanding ofthe relevant teachings. However, it should be apparent to those skilledin the art that the present teachings may be practiced without suchdetails. In other instances, well known methods, procedures, components,and/or circuitry have been described at a relatively high-level, withoutdetail, in order to avoid unnecessarily obscuring aspects of the presentteachings.

This disclosure generally relates to methods and systems of controllinga functionality of a user device that may have been limited infunctionality for being operated beyond the scope of an originalagreement with a wireless telecommunication carrier, sometimes referredto herein as EIP. Conditions are detected that are consistent with theuser device being used in an unauthorized way in view of the originalagreement. The detection of an unauthorized use of the user device is atrigger event. A user device may be limited and/or augmented infunctionality in response to a trigger event, such as a detected “baddebt” condition. In various embodiments, depending on the specificdetected “bad debt” condition, a user device may be automaticallycontrolled to (1) display a “Payment Past Due” notification or othernotification on the user interface; (2) implement a lock screen thatallows partial functionality, such as an emergency (e.g., 911) call andto make payments (e.g., via the Internet or a customer servicerepresentative); and/or (3) augment or partially disable user devicefunctionality.

In one embodiment, in order to monitor user devices under an EIP todetect a trigger event such as a “bad debt” condition, there is a RemoteRecovery Server (RRS) that may have stored in its memory a table ofrecords that keeps a list of various data related to the user device.For example, the RRS may include or have access to, inter alia, thefollowing data related to each user device under an EIP: (1) aninternational mobile station equipment identity (IMEI) of the userdevice; (2) an international mobile subscriber identity (IMSI) of theassigned subscriber; and/or (3) an EIP or lease status of the assignedsubscriber. Accordingly, the RRS may communicate with and receiveupdates from various systems, such as a billing system, notificationsystem, and a Home Location Register (HLR) of the radio access networkof the wireless telecommunication carrier.

In one embodiment, the user device may include a User Device RecoveryTool (UDRT), which may be a program that is configured to interact withthe RRS to perform various functions on the user device including tohelp identifying when the user device is being operated in anunauthorized way (e.g., beyond the scope of an original agreement),limiting various aspects of the functionality of the user device, andrestoring the various aspects of the functionality of the user devicewhen appropriate criteria are met.

When the RRS has detected that a subscriber is behind on payments for auser device (e.g., a triggering event), the RRS may communicate with theuser device's Recovery Tool to activate an appropriate response on theuser device. In various embodiments, an appropriate response may be anotification to an appropriate recipient, locking the screen of the userdevice, or augmenting (e.g., limiting) the functionality of the userdevice. In one embodiment, the communication of the RRS with the userdevice is via a non-cellular messaging intermediary that does not relyon a cellular connection, such as Google Cloud Messaging (GCM). Forexample, GCM provides a way to send data from the servers discussedherein to the user device applications, such as the Recovery Tool.

In one embodiment, even when the functionality of a user device islimited, per government regulations, the user device is provided theability to make emergency (E-911) calls. Additionally, in some cases,the user device may be provided limited access to voice and/or dataservices such that the user can arrange payments via the Internet orallow the user of the user device to speak with a customer care orcollections representative. When the account is replenished at least inpart, one or more functions (e.g., features) that were previouslylimited (e.g., restricted or disabled) are restored. In one embodiment,the number of features that are restored is based on the account statusof the user device.

The techniques described herein may be implemented in a number of ways.Example implementations are provided below with reference to thefollowing figures.

Example Network Architecture

FIG. 1 illustrates an example architecture 100 for implementing a systemfor determining whether a user device is being operated beyond the scopeof an original agreement and controlling the user device functionalitybased on an account status. FIG. 1 illustrates a first radio accessnetwork 122 and a second radio access network 170, as may be operated bytwo separate wireless telecommunication carriers or service providers toprovide a wide range of mobile communication services and ancillaryservices or features to its subscriber customers and associated mobiledevice users. For example, the radio access network 122 providescommunications between various user devices (UD), such as 102(1) to102(n), as well as communications for the UD with networks and stationsoutside the radio access network 122, such as UD's 104 subscribed to thesecond radio access network 170.

For purposes of later discussion, several UD's appear in the drawing, torepresent some examples of the devices that may receive various servicesvia the radio access network 122. Today, UD's typically take the form ofportable handsets, smart-phones, tablet computers, personal digitalassistants (PDAs), and smart watches, although they may be implementedin other form factors, including consumer, business, and medicalelectronic devices. UD's may communicate with other UD's and accessresources of the packet data communication network (PDCN) 120 in variousways, including the radio access network 122 (discussed below) and viaWi-Fi. In some embodiments, a UD (e.g., UD 102(1)) may communicate overWi-Fi with a router 162, which is coupled 106 to a modem 164, which inturn is coupled to an Internet service provider (ISP), ultimatelyleading to the Internet 128.

Radio access network 122 allows users of the UD's (e.g., customers orsubscribers to the radio access network 122) to initiate communication,and receive information from the PDCN 120. Physical elements of a radioaccess network 122, operated by one of the wireless telecommunicationcarriers, include a number of base stations, represented in the exampleof FIG. 1 by an eNodeB 132(1) or 132(n) node. Such eNodeB 132(1) to132(n) nodes may include a base transceiver system (BTS) thatcommunicates via an antennae system at the site of the node and over theair-link with one or more of the UD's (102(1) to 102(n)) when the UD'sare within range. Each eNodeB 132 node may include a BTS coupled toseveral antennae mounted on a radio tower within a coverage area oftenreferred to as a “cell.” The BTS is the part of the radio network thatsends and receives RF signals to/from the UD's that the eNodeB node132(1) to 132(n) currently serves. The second radio access network 170may have similar base stations (e.g., 172).

The radio access network 122 carries the user communications for theUD's between the respective eNodeB 132 nodes and other elements with orthrough which the UD's communicate. Individual elements such as switchesand/or routers forming the radio access network 122 or 170 are omittedhere for simplicity. For example, the radio access network 122 and/or170 may include a home location register (HLR), which stores asubscriber profile for each of the wireless subscribers of the radioaccess network 122 and their associated user devices 102(1) to 102(n).For example, the HLR stores for each mobile subscriber the subscriber'smobile directory number (MDN), the mobile identification number (MIN),and information specifying the wireless services subscribed to by themobile subscriber, such as numeric paging or text-based paging, datacommunication services, etc. Of course, the HLR can also be astand-alone device. The HLR also tracks the current point of attachmentof the user device to the radio access network 122.

It will be understood that the various network elements can communicatewith each other, as well as other aspects of the radio access network122, and other networks (e.g., the public switched telephone network(not shown) and the Internet 128) either directly or indirectly.

The wireless telecommunication carrier of the radio access network 122may also operate a number of systems that provide ancillary functions insupport of the communications services and/or application servicesprovided through the radio access network 122, and those elementscommunicate with other nodes or elements of the radio access network122, such as one or more private IP type packet data networks 120 basedon a packet data communication network (PDCN), sometimes referred to asan Intranet, (i.e., a private network).

Generally, such systems are part of, or connected for, communication viathe private network, represented by PDCN 120 and may provide additionalservices such as determining the account status of a UD, blocking orlimiting functionality of a user device, offering alternate services,and restoring functionality of a UD. To that end, in various embodimentsthere may be an RRS 130 and a billing server 150, which may be coupledfor communication via the private network 120. The billing server 150may update the RRS 130 with past-due payment status related to the UD.In turn, the RRS 130 may send a notification of past-due payment to theDevice Recovery Tool (e.g., program) of a UD. Consequently, the DeviceRecovery Tool may display a “Payment Past Due” notification and/orimplement a warning lock screen on a display of the UD. One or moreoptions may be provided to replenish the account associated with theuser device.

In one example, there is an customer resource management (CRM) server160 configured to provide its account holders (e.g., user of a UD and/oran authorized customer service representative (CSR)) on-line access to avariety of functions related to the account holders' account, such ason-line payment information, subscription changes, where and/or to whomthe notification information is to be provided (e.g., to the accountholder, application provider, system administrator, etc.), how thenotifications are to be sent (e.g., via short message service (SMS),e-mail, regular mail, GCM, etc.), password control, and the like. Thus,the transport of notifications to and from a UD may be non-cellular(e.g., via Wi-Fi over the Internet 128). The CRM server 160 may providethe user an interface via the Internet 128 to access the accountinformation. Hence, a user's terminal, such as a PC, or the UD itselfmay be used to access on-line information about a UD's user's account,which the radio access network 122 carrier makes available via thecarrier's Internet site, accessible through the Internet 128.

In the example of FIG. 1, there is an RRS 130 that is configured toreceive account status information of user devices that are subscribedto the radio access network 122, as well as other information. The RRS130 receives the information from the billing server 150 or the CRMserver 160 in the form of a data package. The RRS 130 is also configuredto send instructions to a UD that has been identified to have exceededthe scope of the EIP agreement with the wireless telecommunicationcarrier of radio access network 122 (e.g., has incurred bad debt). Invarious embodiments, these instructions may interact with a program onthe user device, sometimes referred to herein as the UDRT, to block orrestrict functionality of the user device. In one embodiment, the RRS130 may also be configured to restore functionality of the user deviceupon determining that the user device is no longer subject to bad debt.

In one embodiment, GCM 180 is used to communicate with UD's (e.g., UD102(n)), even though they may have been nefariously switched to thealternate radio access network 170.

While the RRS 130, the billing server 150, and the CRM server 160 areillustrated by way of example as separate servers, they may beimplemented on different hardware platform combinations. Thus, thefunctionality described herein with respect to each of the servers 130,150, and 160 can also be provided by one or multiple different computingdevices. In other words, the RRS 130, billing server 150, and CRM server160, need not be a stand-alone computing devices but can be combined invarious configurations. In one embodiment, the RRS 130, billing server150, and/or the CRM server 160 may have a scalable and fault-tolerantarchitecture, such as that provided by the cloud.

Example User Device Components

FIG. 2 is a block diagram showing various components of an illustrativeUD 200. As discussed in the context of FIG. 1, the control of a userdevice functionality based on the account status discussed hereininvolves an interaction with appropriately configured user devices. Tothat end, it may be useful to consider the functional elements/aspectsof an exemplary UD, at a high-level. For purposes of such a discussion,FIG. 2 provides a block diagram illustration of an exemplary UD 200. Itwill be understood that the UD 200 may be a handset type mobile phone ormay be incorporated into another device, such as a personal digitalassistant (PDA), a tablet computer, or the like. For discussionpurposes, the illustration shows the UD 200 in the form of a handheldsmart-phone.

The UD 200 may include one or more antennae 202, a cellular transceiver204, a Wi-Fi transceiver 205, user interface 206, one or more processors208, hardware 210, and memory 216. In some embodiments, the antennae 202include an uplink antenna that sends radio signals to a radio tower,sometimes referred to herein as a base station (e.g., 132(1) in FIG. 1),and a downlink antenna that receives radio signals from the basestation. In other embodiments, a single antenna may both send andreceive radio signals. The same or other antennas may be used for Wi-Ficommunication with a router 162. These signals may be processed by thecellular transceiver 204 or the Wi-Fi transceiver 205, sometimescollectively referred to herein as a network interface, which isconfigured to receive and transmit digital data.

In one embodiment, the UD 200 includes a user interface 206 that enablesa user to provide input and receive output from the UD 200. For example,the user interface 206 may include a data output device (e.g., visualdisplay, audio speakers, haptic device, etc.) that may be used todisplay notifications from the RRS 130. The user interface 206 may alsoinclude one or more data input devices. The data input devices mayinclude, but are not limited to, combinations of one or more of keypads,keyboards, mouse devices, touch screens, microphones, speech recognitionpackages, and any other suitable devices or other electronic/softwareselection interfaces.

The UD 200 may include one or more processors 208, which may be asingle-core processor, a multi-core processor, a complex instruction setcomputing (CISC) processor, or another type of processor. The hardwaremay include a power source and digital signal processors (DSPs), whichmay include single-core or multiple-core processors. The processors mayperform operation in parallel to process a stream of data that may beprovided by probe application and/or operating system 220.

The hardware may also include network processors that manage high speedcommunication interfaces, including communication interfaces thatinteract with peripheral components. The network processors and theperipheral components may be linked by switching fabric. The hardwaremay further include hardware decoders and encoders, a network interfacecontroller, and/or a universal serial bus (USB) controller.

The network interface controller may enable the processors to transmitand receive data via the radio access network 122 of FIG. 1. In someembodiments, the hardware may also include a direct memory access (DMA)engine. The DMA engine may enable the various controllers to access thememory 216 independently of the one or more processors 208 to performtasks. The various controllers and processors of the UD 200 may executeinstructions and perform tasks under the direction of softwarecomponents that are stored in the memory 216.

The memory 216 may be implemented using computer-readable media, such ascomputer storage media. Storage media includes volatile andnon-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules, orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVD), high definition video storage disks, or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other non-transmissionmedium that can be used to store information for access by a computingdevice.

The memory 216 may store various software components that are executableor accessible by the processor(s) 208 and controller(s) of the UD 200.The various components of the memory 216 may include software 218 and anoperating system 220. Each module may include routines, programinstructions, objects, and/or data structures that perform particulartasks or implement particular abstract data types. For example, thesoftware 218 of the memory 216 may include a user device reporting tool(UDRT) program that is configured to perform various functions,including functions of helping determine whether a user device is beingoperated beyond the scope of an original agreement with atelecommunication carrier, limiting UD functionality, and reinstatingdevice functionality, as appropriate.

For example, upon identifying that the UD 200 has an unauthorized SIMcard, the RRS 130 may send a message to the UD 200, indicating that theUD 200 is being used in an authorized way. Upon receiving this message,the UDRT may block or limit the functionality of the UD 200.

In one embodiment, the UD 200 may include a most frequently used featuremodule 246, which is configured to determine the functions, features,and/or applications that are most commonly used by the UD 200,collectively referred to herein as “most frequently used features.” Forexample, typical applications may include particular games, a musicplayer, an Internet browser, social networking applications, camera,navigation, etc. For example, this module 246 determines a predeterminednumber of most frequently used features that have been used on thisparticular UD 200 during a predetermined time period (e.g., one month)and stores the information in the memory 216. In one embodiment, themost frequent usage is based on net length of time a features is activeor the number of times it is invoked in a predetermined period.

Upon identifying a trigger event (e.g., the UD 200 is being operatedbeyond the scope of the agreement with the original wirelesstelecommunication carrier), the UDRT 240 deactivates one or more mostfrequently used features. In one embodiment, there is an escalatingschedule of the number of features that are deactivated (e.g., 1 featureper day) until the account associated with the EIP is replenished.

Upon determining that the UD has a legitimate SIM card (i.e., after itwas deactivated), the UDRT may re-activate the UD 200. Accordingly, thesoftware 218 may enable the UD 200 to perform various functions andcontrol hardware components of the UD 200.

The operating system 220 may include components that enable the UD 200to receive and transmit data via various interfaces (e.g., usercontrols, communication interface, and/or memory input/output devices),as well as process data using the processors 204 to generate output. Theoperating system 220 may include a presentation component that presentsthe output (e.g., display the data on an electronic display of the UD200, store the data in memory 216, transmit the data to anotherelectronic device, etc.). Additionally, the operating system 220 mayinclude other components that perform various additional functionsgenerally associated with an operating system.

Limiting Device Functionality Responsive to Identified “Bad Debt”Conditions

As mentioned above, the system of FIG. 1 can block or limit UDfunctionality based on the account status. For example, upon a triggerevent, such as determining that a UD is being operated beyond the scopeof an agreement with a wireless telecommunication carrier (e.g., when abad debt is incurred), one or more functions of the UD device may belimited or even blocked. Several functions that can be affected areprovided below by way of example only and not limitation:

Lock Screens

FIG. 3 illustrates an example Warning Lock Screen. It is a screen thatis displayed when functionality is temporarily and/or partiallydisabled. In one embodiment, a notification is sent to the user (e.g.,account holder) of the UD, indicating that service may be interrupted ifpayment is not made within a specified time period. In variousembodiments, the warnings may be provided in stages. For example, awarning lock screen may be implemented by the UDRT 240 when an accountis detected by the RRS 130 to be “Past Due” but has not escalated to “InDefault” status.

In one embodiment, in response to the RRS 130 communicating a past-duepayment status to the UDRT 240 on the UD, the UDRT 240 implements a lockscreen to the UD (e.g., next time the phone is awakened from sleep stateor powered ON). The UDRT 240 may disable non-emergency calls andconsumer access to data usage. The UD may still be used fornotifications and to access emergency functions. Further, the UDRT 240may provide a Warning Lock Screen, similar to that of FIG. 3.

In one embodiment, the Warning Lock Screen includes a timer 330, whichis operative to display the period of time (e.g., 5 minutes) a userassociated with the account of the UD has to access the Internet tocomplete payment before being locked and/or restricted to a limitedfunctionality.

Upon a user's selection on the user interface to “Pay” 332, the UDRT 240enables data usage for a payment application or access to an Internetsite allowing payment to replenish the account balance of the UD.

Upon a user's selection on the user interface to “Call Care” 334, theUDRT 240 enables calling a customer care or collections representativeof the wireless telecommunication carrier under original agreement(e.g., EIP) with the UD.

FIG. 4 illustrates an example Info Lock Screen. It is a screen that maybe displayed when functionality is temporarily and/or partiallydisabled. In one embodiment, a notification is sent to the accountholder of the UD to indicate that a payment in connection with the EIPis not complete. Such notification may be sent in response todetermining an unauthorized swapped SIM card. For example, the originaluser of the UD may have sold the UD to a buyer who installs a differentSIM card.

In one embodiment, in response to the RRS 130 communicating detection ofan unauthorized SIM card switch to the UDRT 240 on the UD, the UDRT 240implements an Info Lock Screen at startup (e.g., next time the UD isused or turned ON). The UDRT 240 may disable non-emergency calls and/ordata usage. Further, the UDRT may display an Info Lock screen, similarto that of FIG. 4.

In one embodiment, the Info Lock Screen includes a timer 430 operativeto display the time (e.g., 5 minutes) a user of the UD has to access theInternet to complete payment before being locked and/or restricted tolimited functionality.

Upon a user's selection on the user interface of the UD to access averification link 432, the UDRT 240 may enable data usage and Internetbrowser functionality for the UD to access the verification page.

Upon a user's selection on the user interface of the UD to “Call Care”434, the UDRT 240 enables calling to connect the UD to a customer careor collection representative of the wireless telecommunication carrierunder original agreement with the UD.

Upon a user's selection of an “Emergency Call” 436 on the user interfaceof the UD, the lock screen may automatically dial a local emergencynumber or provide a keypad for dialing an emergency number, (e.g., 911).

FIG. 5 illustrates an example Alert Lock Screen. It is a screen that isdisplayed while functionality is partially disabled because of a triggerevent. For example, the UD payment status is “In Default” or the userhas repeatedly ignored previous Warning and/or Info Lock screens,similar to those of FIGS. 3 and 4, respectively. In one embodiment, inresponse to the RRS 130 communicating an “In Default” status to the UDRT240 on the UD, the UDRT 240 implements a lock screen (e.g., next timethe UD is used). The UDRT 240 may disable non-emergency calls and/ordata usage. Further, the UDRT 240 may provide an Alert Lock Screen,similar to that of FIG. 5.

Upon a user's selection on the user interface of the UD to “Pay” 530,the UDRT 240 may enable data usage for a payment application and/or foran Internet site allowing payment. Upon a user's selection on the userinterface to “Call Care” 534, the UDRT 240 enables calling to connectthe UD to a customer care or collection representative of the wirelesstelecommunication carrier under original agreement in connection withthe UD.

Upon a user's selection of an “Emergency Call” 536 on the user interfaceof the UD, the lock screen may provide a keypad for dialing an emergencynumber, (e.g., 911).

FIG. 6 illustrates an embodiment where an Alert Lock Screen that mayprovide a notification of one or more incentives for returning orreactivating the device. In one embodiment, in response to the RRS 130communicating a trigger event (e.g., “In Default” status) to the UDRT240 on the UD, the UDRT 240 implements a lock screen (e.g., next timethe UD is used). The UDRT 240 may disable non-emergency calls and/ordata usage. Further, the UDRT 240 may provide an Alert Lock Screen, suchas that of FIG. 6, which provides the user a notification of a possibleincentive for returning or paying to reactivate the UD. An incentive maybe an attractive plan with the telecommunication carrier, avoidance of apenalty, etc.

Upon a user's selection on the user interface of the UD to “Pay” 630,the UDRT 240 may enable data usage for a payment application and/oraccess to an Internet site allowing payment. Upon a user's selection onthe user interface to “Call Care” 634, the UDRT 240 enables calling toconnect the UD to a customer care or collection representative of thewireless telecommunication carrier under original agreement inconnection with the UD.

Upon a user's selection of an “Emergency Call” 636 on the user interfaceof the UD, the lock screen may provide a keypad for dialing an emergencynumber, (e.g., 911).

Cross-Network Functionality

A UD may include a UDRT 240 that communicates with an RRS 130. In oneembodiment, such communication is facilitated via Google Cloud Messaging(GCM). This platform provides for communication even when the device isfrom an alternate radio access network or Wi-Fi. For example, when theUD is turned ON and connected to a radio access network (e.g., 122), theUDRT 240 in the memory of the UD pings GCM to connect to the RRS 130 toprovide various conditions of the UD, such as the IMSI of the presentlyinstalled SIM card of the UD and whether the UD is being used via Wi-Fi.Accordingly, the RRS 130 identifies the status of the UD (e.g., accountpast due, account in default, swapped SIM card detected) and thenimplements a “bad debt” reduction solution for the UD, based on thedetected conditions.

Allowing E-911 Calls

In one embodiment, a lock screen (e.g., similar to that of FIG. 5)provides functionality for making emergency calls. Accordingly, the UDRT240 may block non-emergency functionality while allowing to place anemergency call by selecting an appropriate option on the display of theUD.

Allowing Payment Options and Other Links

In some embodiments, a lock screen (e.g., similar to that of FIG. 4) mayprovide functionality for making online payments within an Internetbrowser. For example, a user click on a provided link 432, which mayinvoke a predetermined link on an Internet browser of the UD.Accordingly, the UDRT 240 may block non-emergency functionality whileallowing the user to select an option on the lock screen, allowing theuser to make a payment. Accordingly, a user is provided the opportunityto restore (e.g., full or partial) UD functionality using the very UDthat is blocked from regular functionality.

Allowing Communication with Customer Care/Collections Representative

In some embodiments, a lock screen (e.g., similar to that of FIGS. 5 and6) may provide functionality for communicating with a customer care orcollections representative, so that the user may arrange payments orresolve other related problems. Upon resolution, the UDRT 240 of the UDmay reactivate the UD to full functionality.

Lock Screen Tinier

In one embodiment, a lock screen (e.g., similar to that of FIGS. 3 and4) may include a timer (e.g., 330 and 430, respectively) for displayingthe amount of time the lock screen limits functionality. Additionally,in some cases, in which an Alert Lock Screen is in effect and devicefunctionality is limited to emergency calls, the UDRT 240 may allow alimited period of time to access the Internet for the purpose of makinga payment. Accordingly, the lock screen timer may display the timeremaining during which the user will be allowed partial functionalityfor making payments. In one embodiment, when the predetermined timeperiod expires, the UD is blocked from using the communication networkof a telecommunication carrier. In various embodiments, such block maybe implemented at the communication network side and/or the UD.

Redirecting Calls and Data to a Wireless Telecommunication Carrier

In some embodiments, instead of implementing a lock screen, the UDRT 240may redirect non-emergency calls to the wireless telecommunicationcarrier presently under contract. For example, the call may be routed toa customer care or collections representative. In response to a userattempting to make a non-emergency call, the UDRT 240 may redirect thecall to an operator of the wireless telecommunication carrier undercontract. In one embodiment, a notification is sent to the accountholder (e.g., registered user) of the UD to inform of the reason forredirecting the call (e.g., account past due, account in default,unauthorized SIM card detected). In various embodiments, thenotification may be sent via SMS and/or GCM directly to the UD, e-mail,regular mail, etc. In various embodiments, the e-mail and/or the addressof the account holder of the user device may be provided by the CRMserver 160 or the billing server 150.

In one embodiment, the UDRT 240 may additionally redirect all Internetbrowsing to a customer care or collections Internet sites, orapplications of the wireless telecommunication carrier under contract.For example, in response to a user attempting to access an Internet pagewithin a browser, the UDRT 240 may instead load an Internet page of thewireless telecommunication carrier that is still under contract. Inaddition, a notification may be sent to the user to inform the user ofthe reason for the redirection (e.g., account past due, account indefault, unauthorized SIM card detected).

In one embodiment, in response to the RRS 130 communicating a “bad debt”status to the UDRT 240 on the UD 200, the UDRT 240 implements a lockscreen according to predetermined settings of the UDRT 240. For example,the next time the UD 200 is used to place a call or attempts to navigateto an Internet page within a browser application, a lock screen isdisplayed on the UD 200.

For example, in response to a user attempting to make a non-emergencycall on the UD, the UDRT 240 may provide a notification on the displayof the UD to the user to inform of the reason for redirecting the call(e.g., account is past due, account is in default, an unauthorized SIMcard is detected, etc.).

In one embodiment, upon determining that there is a trigger event, theUDRT 240 redirects any non-emergency call to a customer care orcollections number of the wireless telecommunication carrier underoriginal agreement in connection with the UD.

In one embodiment, in response to a user's attempt (on the UD) to accessan Internet page within a browser application, the UDRT 240 may displaya notification on the UD to inform of the redirection and/or the reasonfor the redirection (e.g., the account is past due, the account is indefault, an unauthorized SIM card is detected, etc.).

In one embodiment, the UDRT 240 redirects to a customer care orcollections Internet page of the wireless telecommunication carrierunder original agreement in connection with the UD. Alternatively or inaddition, the UDRT 240 may open an application on the UD that allowsrepayment.

Disabling Commonly Used Functionality

In some embodiments, instead of or in addition to implementing a lockscreen, the UDRT 240 may disable a commonly used feature or application.To that end, the UDRT 240 may passively detect the most frequently usedfeatures of the subject UD, such as a camera application or browserapplication, or may query a database in the device's memory 216 thatstores UD feature usage information for a predefined time period.

In response to a trigger event, such as a detected “bad debt” condition,the UDRT 240 may determine the most frequently used predetermined numberof features on the particular UD and block these features. In variousembodiments, the number of features that are blocked may be one orseveral. Further, the number of features that are blocked may escalatebased on the severity of the trigger event. In one embodiment, the UDRT240 may send a notification to the account holder to inform the user ofthe reason for blocking the one or more features (e.g., account pastdue, account in default, unauthorized SIM card detected).

For example, the UDRT 240 may (e.g., passively) detect most frequentlyused features applications. By way of non-limiting example, suchfeatures/applications may include various games, a music player, anInternet browser, social networking applications, camera, a navigationapplication, etc.

Thus, in response to the RRS 130 messaging a trigger event (e.g.,communicating a “bad debt” status to the UDRT 240 of the UD 200), theUDRT 240 implements a lock screen in the UDRT 240. For example, the lockscreen may be displayed at startup (e.g., the next time the UD is turnedON or simply used to make calls, or used to navigate to an Internet pagewithin a browser application).

In one embodiment, the UDRT 240 may query a database in the UD's memory216, providing usage details. Alternatively or in addition, the UDRT 240may have previously detected a most frequently used application.

In response to a user attempting to use a most frequently usedapplication on the UD, the UDRT 240 may block functionality for one ormore commonly used application(s). Instead, the UDRT 240 may display anotification on the UD to inform of the reason for blocking the feature(e.g., the account is past due, the account is in default, anunauthorized SIM card is detected, etc.).

Restoring Functionality to a User Device

In one embodiment, a UD that has been previously limited infunctionality (e.g., restricted and/or blocked) can be restored infunctionality. For example, the UD may have been previously restrictedand/or blocked due to a trigger event (e.g., determination that the UDis used beyond the scope of the original agreement with a wirelesstelecommunication carrier). One such scenario may be in the context of a“bad debt” condition. A UD 200 previously locked by its UDRT 240 may beunlocked if the account assigned to the UD is replenished.

In some embodiments, lock screens may provide an interface for payingpast-due amounts, including paying over the phone, paying within anInternet browser application, or paying within a specific applicationprovided by the wireless telecommunication carrier.

For example, a user may make a payment at a store related to thewireless telecommunication carrier or over the phone with a customercare/collections representative. When a user replenishes the account(e.g., makes a payment that brings the subscriber account into goodstanding), the billing server 150 may update the RRS 130, which in turncommunicates with the UDRT 240 of the UD 200 (e.g., via GCM) to unlock(e.g., restore one or more features) of the UD.

In one embodiment, while the UD is locked, a user may make a paymentwithin a mobile application, such as an Internet browser or an accountapplication provided by the wireless telecommunication carrier. When theUDRT 240 receives a confirmation from a browser or upon replenishment ofthe outstanding balance on the account, the UDRT 240 may unlock the UDand communicate with the RRS 130 (e.g., via GCM) to confirm that paymenthas been made and that the account is replenished.

Alternatively, the UDRT 240 may wait for the billing server 150, whichkeeps track of the account status of the UD, to update the RRS 130. TheRRS 130 may in turn communicate with UDRT 240 (e.g., via GCM) to unlockthe UD if the payment has brought the account of the UD to a goodstanding.

However, in one scenario, a UD may have been locked because the RRS 130had detected an unauthorized SIM card swap. In this case, upondetermining that the original (i.e., authorized) SIM card is in the UDSIM card slot and upon the UD being turned ON and connected to a network(e.g., 122 or 170), the UDRT 240 may update the RRS 130 with the SIMCard's IMSI (e.g., via GCM). If the RRS 130 verifies the IMSI, the RRS130 may communicate with the Recovery Tool of the UD (e.g., via GCM) tounlock the UD.

In a related scenario, a user may wish to restore service to a UD thathas been locked because of an unauthorized SIM card swap. If so, theuser may go to a store related to the wireless telecommunication carrieror call a customer care/collections representative to unlock the UD andactivate the service with the wireless telecommunication carrier usingthe new SIM card. After the IMEI of the presently installed SIM card ofthe UD is received by the customer care representative of the wirelesstelecommunication carrier and the account is activated, the billingserver 150 may inform the RRS 130 the new IMSI assigned to the UE'sIMEI. The RRS 130 may then communicate with the Recovery Tool of the UD(e.g., via GCM) to unlock the UD and restore service to the wirelesstelecommunication carrier.

Example Use Cases:

As discussed above, the method and system can be applied in differentscenarios. Several use cases are provided below by way of example onlyand not limitation. In some examples, process flow charts are used. Thecall flow processes 700 to 1400 are illustrated as a collection ofblocks in logical flows, which each represents a sequence of operationsthat can be implemented in hardware, software, or a combination thereof.

In the context of software, the blocks represent computer-executableinstructions that, when executed by one or more processors, perform therecited operations. Generally, computer-executable instructions mayinclude routines, programs, objects, components, data structures, andthe like that perform particular functions or implement particularabstract data types.

The order in which the operations are described is not intended to beconstrued as a limitation, and any number of the described steps can becombined in any order and/or performed in parallel to implement theprocess. For discussion purposes, the scenarios described below are withreference to the architecture 100 of FIG. 1 and the displays of FIGS. 3to 6.

Use Case 1: Example Payment Reminder

FIG. 7 illustrates a high level example process flow for a paymentreminder. For example, a user may purchase a new UD under the EIP of thewireless telecommunication carrier 122. The user fails to make a monthlypayment. Consequently, the account associated with the EIP becomespast-due.

At block 702, the billing system (represented by the billing server 150)determines the account status of the UD (e.g., 102(n)).

At block 704, the billing system updates the RRS 130 with the accountstatus of the UD. In various embodiments, the update may be performedperiodically or upon the billing server 150 determining that the accounthas a past-due payment status.

At block 706, the RRS 130 sends a notification of past-due paymentstatus to the Device Recovery Tool of the UD (e.g., 102(n)). In variousembodiments, the notification to the UD may be sent immediately or at apredetermined time.

At block 708, in various embodiments, the UDRT displays a notification(e.g., “Payment Past Due”) or a Warning Lock Screen, similar to that ofFIG. 3, to the UD 102(n), depending on the seriousness of the accountstatus. In various embodiments, the notification on the display of theUD may be provided when the notification is received from the RRS 130 ornext time the UD is turned ON.

Use Case 2: Example Notification on SIM Swap

FIG. 8 illustrates a high level example process flow for a notificationon a SIM swap. For example, a user may purchase a new UD under the EIPof the wireless telecommunication carrier 122 (i.e., the first radioaccess network).

Before EIP has been paid off, the user sells the UD (e.g., 102(n)) toanother person, e.g., via Craigslist, eBay, etc., or simply decides toswitch to another mobile plan. The (e.g., new) user swaps the originalSIM card for another SIM card.

At block 802, the UDRT of the UD (e.g., 102(n)) determines an IMSI ofthe SIM card presently installed on the UD. For example, such operationmay be performed every time the UD is turned ON (e.g., startup).

At block 804, the UDRT determines whether the UD is connected to a datanetwork. The data network is not limited to the radio access network 122of the original EIP. Rather, the data network may be any radio accessnetwork, such as the alternate radio access network 170 or Wi-Fi.Accordingly, the UDRT of the UD (e.g., 102(n)) communicates theidentified SIM card's IMSI to the RRS 130 (e.g., via a non-cellularmessaging intermediary, such as GCM), which may be accessed via anetwork that is different from the radio access network 122, such as thesecond radio access network 170 or via Wi-Fi.

At block 808, in various embodiments, the RRS retrieves the IMSI of theUD from the billing server 150 or the CRM server 160. The retrieved IMSI(whether from the billing server 150 or the CMR Server 160) iscollectively referred to herein as the stored IMSI.

At block 810, the RRS 130 compares the IMSI received from the UD andcompares it with the stored IMSI. At block 812, the RRS 130 determineswhether the received IMSI is authorized for the UD (e.g., 102(n)) basedon the comparison.

If the SIM card is authorized (i.e., “YES”, at decision block 812), nofurther action is taken by the RRS 130. In one embodiment, at block 814,the RRS 130 sends a confirmation to the UDRT of the UD (e.g., 102(n)),indicating that the SIM card is authorized.

If the SIM card is not authorized (i.e., “NO”, at decision block 812),at block 816, the RRS 130 sends a notification the UDRT 240 of the UD(e.g., 102(n)), to indicate that the SIM card is not authorized for thisUD (e.g., 102(n)).

At block 818, in various embodiments, immediately or upon the nextturning ON of the UD, the UDRT 240 of the UD (e.g., 102(n)) implementsan Info Lock screen, similar to that of FIG. 4, which limits devicefunctionality. In one embodiment, the screen informs the user of theinstallment plan related to the UD to encourage the user to replenishthe account.

Use Case 3: Example Lock Device

FIG. 9 illustrates a high level example process flow for locking a UD.For example, a user may purchase a new UD under the EIP of the wirelesstelecommunication carrier 122 (i.e., the first radio access network).The user then fails to make an expected (e.g., monthly) payment.Consequently, the account associated to the UD (e.g., 102(n)), becomespast-due for exceeding a first time period.

At block 902, the billing system (represented by the billing server 150)determines the account status of the UD (e.g., 102(n)).

At block 904, the billing system (i.e., billing server 150) updates theRRS 130 with the account status of the UD. In various embodiments, theupdate may be performed periodically or upon determining that theaccount has a past-due payment status (past a first time period).

At block 906, the RRS 130 sends a notification of a past-due paymentstatus to the Device Recovery Tool of the UD (e.g., 102(n)).

At block 908, in various embodiments, the UDRT displays a notification(e.g., “Payment Past Due” in the form of a Warning Lock Screen), similarto that of FIG. 3, to the UD 102(n), depending on the seriousness of theaccount status. In various embodiments, the notification may bedisplayed when the notification is received from the RRS 130 or the nexttime the UD is turned ON.

At block 910, the billing server 150 determines whether the account isreplenished at least in part during a second time period. If so, (i.e.,“YES” at decision block 910), the process continues with block 912 ofFIG. 9B, discussed below.

At block 912, the billing server 150 sends a notification to the RRS130, indicating the account status. At block 914, the RRS 130determines, based on the received notification from the billing server150, whether the account is satisfied in full or in part. If the accountis satisfied in full, the process continues with block 918, where theRRS 130 sends a message to the UD, wherein the message includesinstructions to the UDRT 240 of the UD. In one embodiment, the messageincludes instructions for the UDRT 240 to display on the display of theUD a notification that the account has been replenished in full and thatfunctionality is restored. To that end, at block 918, all restrictionsare removed to restore functionality.

Returning to block 914, upon the RRS 130 determining, that the accounthas been satisfied in part (e.g., the user has only payed part of theremaining balance or has provided an assurance that the account will besatisfied within a predetermined time period, the process continues withblock 920, where the RRS sends a message to the UD includinginstructions to the UDRT 240 of the UD. In one embodiment, the messageincludes instructions for the UDRT 240 to display on the display of theUD a notification that the account has been replenished only in part andthat part of the functionality is restored. To that end, at block 922, apredetermined number of restrictions are removed to restorefunctionality of the UD in part. For example, a predetermined number(e.g., 3) of most frequently used features may be restored, while theremaining disabled featured remain disabled until the account isreplenished. In one embodiment, more features are activated, the moreclosely replenished the account is.

Returning back to block 910 of FIG. 9A, upon the billing server 150determining that the account is not replenished (i.e., “NO” at decisionblock 910), the process continues with block 930. For example, the usermay ignore the “Payment Past Due” notifications and becomes behind at asecond period (e.g., two months behind on payments), and the account ofthe user escalates to a second state (e.g., “In Default”).

At block 930, the RRS sends a notification to the UDRT 240 of the UD,such that the UDRT displays an escalated warning and/or introducesadditional restrictions on the UD. In one embodiment, the wirelesstelecommunication carrier of the first radio access network 122disconnects the UD (e.g., 102(n)) from network 122 service of theoriginal telecommunication carrier.

In one embodiment, after block 930 the process 900 continues with blocksthat are similar to that of process 800 of FIG. 8, which are notrepeated here for brevity. Instead, some salient differences arediscussed below.

For example, the UDRT 240 of the UD (e.g., 102(n)) determines an IMSI ofthe SIM card presently installed on the UD. For example, such operationmay be performed every time the UD is turned ON (e.g., startup). Thus,if the UD (e.g., 102(n)) is continued to be used with a swapped-inmobile virtual network operator (MVNO) SIM card, or simply uses Wi-Fi,the situation escalates further. It should be noted that theunauthorized SIM card may be part of the original radio access network122 of the telecommunication carrier (that has the original EIP) or maybe part of the second radio access network 170.

For example, at block 930, the billing system, represented by billingserver 150, updates (e.g., sends a message to) the RRS 130 to indicatethat an “In Default” status is reached because the account in connectionwith the UD (e.g., 102(n)) has not been replenished for a second timeperiod. Further, after going through blocks 802 to 812 of process 800and upon determining that the SIM card is not authorized (i.e., “NO”, atdecision block 812), at block 816, the RRS 130 escalates the status ofthe UD by sending a notification to the UDRT 240 of the UD (e.g.,102(n)), to indicate that an “In Default” status is reached and the SIMcard is not authorized for this UD (e.g., 102(n)) (e.g., block 816).

Upon receiving the notification, the UDRT 240 of the UD (e.g., 102(n))implements an Alert Lock Screen, similar to that of FIG. 5, allowing theuser of the UD (e.g., 102(n)) to have a predetermined period of time(e.g., 5 minutes) to access the internet to complete payment beforebeing locked and/or restricted to a further escalated level of limitedfunctionality of the UD (e.g., 102(n)).

Use Case 4: Example Incentive to Return User Device

FIG. 10 illustrates a high level example process flow for providing anincentive to return a UD to a telecommunication carrier. For example, auser may purchase a new UD under the EIP of the wirelesstelecommunication carrier 122 (i.e., the first radio access network).The user then fails to make expected (e.g., monthly) payments.Consequently, the account associated to the UD (e.g., 102(n)), becomespast-due for a first time period.

At block 1002, the billing server 150 determines whether an accountassociated with a UD is replenished during a first period. Putdifferently, the billing server 150 determines whether a timely paymenthas been made for the UD with respect to the EIP. If so, (i.e., “YES”,at decision block 1002), at block 1004 the billing server 150 waits apredetermined time period before performing the next account statusinquiry. In one embodiment the wait is equivalent to the first timeperiod (e.g., one month).

Upon determining, by the billing server 150, that a timely paymentwithin the first period is not made (“NO”, at decision block 1002), theprocess continues with block 1006.

At block 1006, an appropriate warning is displayed on the UD, similar tothat of FIGS. 3 or 4. Such notification is facilitated by the billingserver 150 updating the RRS 130 with the account status of the UD. TheRRS 130 sends a message (e.g., first message) that includesinstructions, to the UD. For example, the message includes anotification of the account status (e.g., a past-due payment status) tothe UDRT 240 of the UD. The UDRT 240 then displays the warning (e.g.,first warning) on a display of the UD. In various embodiments, thewarning may provide an opportunity to replenish the account. In oneembodiment, one or more features may be disabled on the user device, asdiscussed herein. A second period may be displayed on the UD, indicatingthe time remaining (i.e., second time period) until the account statusescalates to a more severe level.

At block 1008 the billing server 150 determines whether the accountassociated with the UD is replenished (at least in part) during thesecond period. If so, (i.e., “YES”, at decision block 1008), at block1010 the billing server 150 sends a message to the RRS 130 to indicatethat the account of the UD is replenished (e.g., at least in part). Theprocess continues with block 912 of FIG. 9B, discussed previously, andtherefore not repeated here for brevity.

Returning to decision block 1008 of FIG. 10A, upon the billing server150 determining that the account has not been replenished during thesecond period, (i.e., “NO”, at decision block 1008), at block 1012 thebilling server 150 sends a notification to the RRS 130 to inform thatthe UD is now in a second state (e.g., “In Default”). For example, theuser may ignore the “Payment Past Due” notification(s) and becomesbehind at a second period (e.g., two months behind on payments), and theaccount of the user escalates to this second state (e.g., “In Default”).

Consequently, in one embodiment, the wireless telecommunication carrierof the radio access network 122 (that is under the EIP) blocks (e.g.,disconnects) the UD (e.g., 102(n)) from network 122 service of theoriginal telecommunication carrier.

At block 1014, it is determined whether the UD (e.g., 102(n)) iscontinued to be used with a swapped-in MVNO SIM card and/or via Wi-Fi.For example, a user may attempt to use the UD on the radio accessnetwork 122 of the original telecommunication provider at a lower rate,or simply use the UD on an alternate radio access network 170 from analternate telecommunication provider. Whether an unauthorized SIM cardis used has been described in the context of the discussion of process800 and will therefore not be repeated here for brevity. It should benoted that, in one embodiment, the UDRT 240 is operative to determinefrom the transceiver 204 whether the UD is being used through a Wi-Ficonnection.

If an unauthorized SIM card (e.g., on an alternate network) or Wi-Fi isnot being used (i.e., “NO”, at decision block 1014), at block 1016 anypresent warnings and/or restrictions are maintained.

However, if an unauthorized SIM card (e.g., on an alternate network) orWi-Fi is being used (i.e., “YES”, at decision block 1014), then thestatus of the account of the UD escalates. At block 1018, the billingsystem, represented by billing server 150, updates the RRS 130 with an“In Default” status in connection with the UD. Consequently, the RRS 130sends a message (e.g., third message) that includes instructions to theUD. For example, the message includes a notification of “In Default”status to the UDRT 240 of the UD.

At block 1020, in various embodiments, the UDRT 240 implements an AlertLock Screen, similar to that of FIG. 6, limits (or further limits)device functionality, and/or informs the user of the UD of an offer thatprovides an incentive to return or reactivate the UD. These actions ofblock 1020 are performed by the UDRT 240 immediately, or upon the nextusage of the UD. An incentive may be an attractive rate to use theservices of the telecommunication carrier and/or a mitigated penalty ifthe UD is returned in a predetermined period. In one embodiment, theAlert Lock Screen displays the nearest store address based on theoriginal provided billing address and/or the present location of thedevice based on a global positioning (GPS) sensor and/or cellulartriangulation.

Use Case 5: Redirect Calls/Data to Original Wireless TelecommunicationCarrier

FIG. 11 illustrates a high level example process flow for redirectingcalls and/or data to the original telecommunication carrier. Forexample, a user may purchase a new UD under the EIP of the wirelesstelecommunication carrier 122 (i.e., the original radio access network).The user then fails to make expected (e.g., monthly) payments.Consequently, the account associated to the UD (e.g., 102(n)), becomespast-due for a first time period.

At block 1102, the billing server 150 determines whether an accountassociated with a UD is replenished during a first period. Putdifferently, the billing server 150 determines whether a timely paymenthas been made for the UD with respect to the EIP. If so, (i.e., “YES”,at decision block 1102), at block 1104 the billing server 150 waits apredetermined period before performing the next account status inquiry.In one embodiment the wait is equivalent to the first period (e.g., onemonth).

Upon determining, by the billing server 150, that a timely paymentwithin the first period is not made (“NO”, at decision block 1102), theprocess continues with block 1106.

At block 1106, an appropriate warning is displayed on the UD, similar tothat of FIGS. 3 or 4. Such notification is facilitated by the billingserver 150 updating the RRS 130 with the account status of the UD. TheRRS 130 sends a notification of a past-due payment status to the UDRT240 of the UD. The UDRT 240 then displays the warning on a display ofthe UD. In various embodiments, the warning may provide an opportunityto replenish the account. In one embodiment, one or more features may bedisabled on the user device, as discussed herein. A second period may bedisplayed on the UD, indicating the time remaining (i.e., second timeperiod) until the account status escalates to a more severe level.

At block 1108 the billing server 150 determines whether the accountassociated with the UD is replenished during the second period. If so,(i.e., “YES”, at decision block 1108), at block 1110 the billing server150 sends a notification to the RRS 130 to indicate that the account ofthe UD is replenished. The process continues with block 912 of FIG. 9B,discussed previously, and therefore not repeated here for brevity.

Returning to block 1108 of FIG. 11, upon the billing server 150determining that the account has not been replenished during the secondperiod, (i.e., “NO”, at decision block 1108), at block 1112 the billingserver 150 sends a notification to the RRS 130 to inform that the UD isnow in a second state (e.g., “In Default”). For example, the user mayignore the “Payment Past Due” notification(s) and becomes behind at asecond period (e.g., two months behind on payments), and the account ofthe user escalates to this second state (e.g., “In Default”).

Consequently, the wireless telecommunication carrier of the radio accessnetwork 122 (that is under the EIP) blocks (e.g., disconnects) the UD(e.g., 102(n)) from network 122 service of the originaltelecommunication carrier.

At block 1114, it is determined whether the UD (e.g., 102(n)) iscontinued to be used with a swapped-in MVNO SIM card and/or via Wi-Fi.

If an unauthorized SIM card (e.g., on an alternate network) or Wi-Fi isnot being used (i.e., “NO”, at decision block 1114), at block 1116 anypresent warnings and/or restrictions are maintained.

However, if an unauthorized SIM card (e.g., on an alternate network) orWi-Fi is being used (i.e., “YES”, at decision block 1114), then thestatus of the account of the UD escalates.

At block 1118, the billing system, represented by billing server 150,updates the RRS 130 with an “In Default” status in connection with theUD. Consequently, the RRS 130 sends a notification of “In Default”status to the UDRT 240 of the UD.

At block 1120, upon receiving the notification from the RRS 130, theUDRT 240 redirects calls and/or data. For example, the UDRT 240 augmentsUD functionality such that outgoing calls from the UD, including thosemade via an alternate network, such as the second radio access network170, are redirected to a customer care or collections teamrepresentative of the wireless telecommunication carrier of the first(e.g., original) radio access network 122. In one embodiment, theaugmented functionality is such that some or all Internet browsing isredirected to a payment/collections Internet site.

Use Case 6: Disable Most Frequently used Features

FIG. 12 illustrates a high level example process flow for disabling themost frequently used features of a UD upon determining that is beingused in an unauthorized way. For example, a user may purchase a new UDunder the EIP of the wireless telecommunication carrier 122 (i.e., theoriginal radio access network). The user then fails to make expected(e.g., monthly) payments. Consequently, the account associated to the UD(e.g., 102(n)), becomes past-due for a first time period.

At block 1202, the billing server 150 determines whether an accountassociated with a UD is replenished during a first period. Putdifferently, the billing server 150 determines whether a timely paymenthas been made for the UD with respect to the EIP. If so, (i.e., “YES”,at decision block 1202), at block 1204 the billing server 150 waits apredetermined period before performing the next account status inquiry.In one embodiment the wait is equivalent to the first period (e.g., onemonth).

Upon determining, by the billing server 150, that a timely paymentwithin the first period is not made (“NO”, at decision block 1202), theprocess continues with block 1206.

At block 1206, an appropriate warning is displayed on the UD, similar tothat of FIGS. 3 or 4. Such notification is facilitated by the billingserver 150 updating the RRS 130 with the account status of the UD. TheRRS 130 sends a notification of a past-due payment status to the UDRT240 of the UD. The UDRT 240 then displays the warning on a display ofthe UD. In various embodiments, the warning may provide an opportunityto replenish the account. In one embodiment, one or more features may bedisabled on the user device, as discussed herein. A second period may bedisplayed on the UD, indicating the time remaining (i.e., second timeperiod) until the account status escalates to a more severe level.

At block 1208 the billing server 150 determines whether the accountassociated with the UD is replenished during the second period. If so,(i.e., “YES”, at decision block 1208), at block 1210 the billing server150 sends a notification to the RRS 130 to indicate that the account ofthe UD is replenished. The process continues with block 912 of FIG. 9B,discussed previously, and therefore not repeated here for brevity.

However, upon the billing server 150 determining that the account hasnot been replenished during the second period, (i.e., “NO”, at decisionblock 1208), at block 1212 the billing server 150 sends a notificationto the RRS 130 to inform that the UD is now in a second state (e.g., “InDefault”). For example, the user may ignore the “Payment Past Due”notification(s) and becomes behind at a second period (e.g., two monthsbehind on payments), and the account of the user escalates to thissecond state (e.g., “In Default”).

Consequently, the wireless telecommunication carrier of the radio accessnetwork 122 (that is under the EIP) blocks (e.g., disconnects) the UD(e.g., 102(n)) from network 122 service of the originaltelecommunication carrier.

At block 1214, it is determined whether the UD (e.g., 102(n)) iscontinued to be used with a swapped-in MVNO SIM card and/or via Wi-Fi.

If an unauthorized SIM card (e.g., on an alternate network) or Wi-Fi isnot being used (i.e., “NO”, at decision block 1214), at block 1216 anypresent warnings and/or restrictions are maintained.

However, if an unauthorized SIM card (e.g., on an alternate network) orWi-Fi is being used (i.e., “YES”, at decision block 1214), then thestatus of the account of the UD escalates.

At block 1218, the billing system, represented by billing server 150,updates the RRS 130 with an “In Default” status in connection with theUD. Consequently, the RRS 130 sends a notification of “In Default”status to the UDRT 240 of the UD.

As discussed previously, the UDRT 240 has a most frequently used featuremodule 246 that is configured to determine a predetermined number ofmost frequently used features that have been used on this particular UDin a predetermined time period. At block 1220, immediately, or upon thenext time the UD (e.g., 102(n)) is turned ON, the UDRT 240 deactivatesone or more most frequently used features of the UD.

Use Case 7: Restoring Functionality by Paying over the Phone, in Person,or within a Browser or an Application of the Wireless TelecommunicationCarrier

As discussed herein, warning messages displayed on the UD, similar tothose of FIGS. 3 to 6, the warning message itself may provide guidanceon how to replenish the account related to the UD. For example, a usermay click on an icon (e.g., “Pay”), click on a link to a customerservice representative displayed on the UD, visit a local carrier storedisplayed on the UD, etc. Of course, the user may also replenish theaccount related to the UD electronically via another computing device orby interacting with a customer service representative with an alternatephone.

When payment is accepted, a record is created in the CRM server 160and/or the billing server 150. Other databases may be notified as well,as appropriate. In various embodiments, at predetermined intervals orupon receiving the payment notification, the billing server 150 sends anotification to the RRS 130 to indicate the present account status.

In turn, the RRS 130 sends a notification to the UD to update theaccount status. Upon receiving the notification from the RRS 130, theUDRT 240 of the UD may restore functionality to one or more featuresthat were previously disabled due to the trigger event. Accordingly, theUD is now allowed to use additional features of the UD and/or theservices of the wireless telecommunication carrier. In one embodiment,upon receiving the communication from the RRS 130, the UDRT 240 restoresall features of the UD (e.g., unlocks the UD) to a functionality beforeit was restricted due to a trigger event.

Use Case 8: Restoring Functionality by Un-Swapping the SIM Card

FIG. 13 illustrates a high level example process flow for restoringfunctionality by reinstating the original SIM card. For example, theuser can remove the unauthorized SIM card and replace it with theoriginal SIM card (i.e., by inserting the original SIM card to the SIMcard slot), as described below.

At block 1302, the UDRT of the UD (e.g., 102(n)) determines an IMSI ofthe SIM card presently installed on the UD that has been previouslyrestricted (e.g., limited in functionality). For example, such operationmay be performed every time the UD is turned ON (e.g., startup).

At block 1304, the UDRT determines whether the UD is connected to a datanetwork. The data network is not limited to the radio access network 122of the original EIP. Rather, the data network may be any radio accessnetwork, such as the alternate radio access network 170 or Wi-Fi.Accordingly, the UDRT of the UD (e.g., 102(n)) communicates theidentified SIM card's IMSI to the RRS 130 (e.g., via GCM), which may beaccessed via a network that is different from the radio access network122, such as the second radio access network 170 or via Wi-Fi.

At block 1308, in various embodiments, the RRS 130 retrieves the IMSI ofthe UD from the billing server 150 or the CRM server 160. In oneembodiment, the RRS 130 has the IMSI of subscribing user devices storedin its memory (and therefore does not need to retrieve it from aseparate server).

At block 1310, the RRS 130 compares the IMSI received from the UD andcompares it with the stored IMSI. At block 1312, the RRS 130 determineswhether the received IMSI is authorized for the UD (e.g., 102(n)) basedon the comparison.

If the SIM card is not authorized (i.e., “NO”, at decision block 1312),at block 1316, the warnings and/or restrictions are maintained for thisUD (e.g., 102(n)).

If the SIM card is authorized (i.e., “YES”, at decision block 1312), theRRS 130 sends a confirmation to the UDRT of the UD (e.g., 102(n)),indicating that the SIM card is authorized.

Consequently, at block 1318, in various embodiments, immediately or uponthe next turning ON of the UD, the UDRT 240 of the UD (e.g., 102(n))restores the functionality (e.g., one or more features) of the UD thatwere previously deactivated.

Use Case 9: Restoring Functionality by Buyer of SIM-swapped locked UD

FIG. 14 illustrates a high level example process flow for restoringfunctionality by a user (e.g., buyer) of a SIM-swapped locked UD. Forexample, a buyer may deliberately or inadvertently purchase a UD thathas been restricted and/or blocked. To restore the functionality, thebuyer provides the IMEI of the UD to a customer service representativeof the wireless telecommunication carrier (that is under an EIP with thetelecommunication carrier). The user may start a new service accountwith the wireless telecommunication carrier to overcome the presentrestrictions placed on the UD.

At block 1402, a new account is activated by the wirelesstelecommunication carrier and entered in the CRM server 160 and/or thebilling server 150. At block 1404, a new IMSI is assigned to the UD bythe CRM server 160.

At block 1406, a notification is sent by the CRM server 160 or thebilling server 150 to the RRS 130 to notify that a new EIP is in place.More particularly, the RRS 130 is notified that the IMSI of the SIM cardof the UD is now authorized.

At block 1408, the RRS 130 sends a message to the UDRT 240 of the UD toindicate that the SIM card is authorized for the UD. In particular theRRS 130 communicates with the UDRT 240 to restore one or more functions(e.g., features) that were previously limited (e.g., restricted ordisabled). In one embodiment, the communication is via GCM.

Consequently, at block 1410, the UDRT 240 in the memory of the UDrestores one or more functions that were previously limited.

Conclusion

While the foregoing has described what are considered to be the bestmode and/or other examples, it is understood that various modificationsmay be made therein and that the subject matter disclosed herein may beimplemented in various forms and examples, and that the teachings may beapplied in numerous applications, only some of which have been describedherein. It is intended by the following claims to claim any and allapplications, modifications, and variations that fall within the truescope of the present teachings.

Based upon design preferences, it is understood that the specific orderor hierarchy of steps in the processes described herein may berearranged, expanded, and some steps omitted. Some of the blocks may beperformed simultaneously.

Unless otherwise stated, any measurements, values, ratings, positions,magnitudes, sizes, and other specifications that are set forth in thisspecification, including in the claims that follow, are approximate, notexact. They are intended to have a reasonable range that is consistentwith the functions to which they relate and with what is customary inthe art to which they pertain.

Except as stated immediately above, nothing that has been stated orillustrated is intended or should be interpreted to cause a dedicationof any component, step, feature, object, benefit, advantage, orequivalent to the public, regardless of whether it is or is not recitedin the claims.

It will be understood that the terms and expressions used herein havethe ordinary meaning as is accorded to such terms and expressions withrespect to their corresponding respective areas of inquiry and studyexcept where specific meanings have otherwise been set forth herein.Relational terms such as first and second and the like may be usedsolely to distinguish one entity or action from another withoutnecessarily requiring or implying any actual such relationship or orderbetween such entities or actions. The terms “comprises,” “comprising,”or any other variation thereof, are intended to cover a non-exclusiveinclusion, such that a process, method, article, or apparatus thatcomprises a list of elements does not include only those elements butmay include other elements not expressly listed or inherent to suchprocess, method, article, or apparatus. An element proceeded by “a” or“an” does not, without further constraints, preclude the existence ofadditional identical elements in the process, method, article, orapparatus that comprises the element.

The embodiments described herein may be implemented in software thatruns on one or more computing devices. The one or more computing devicesmay be equipped with a communication interface, a user interface, one ormore processors, and memory.

The communication interface of user devices may include wireless and/orwired communication components that enable the computing devices totransmit or receive data via a network, such as the Internet. The userinterface may enable a user to provide inputs and receive outputs fromthe computing devices.

The user interface may include a data output device (e.g., visualdisplay, audio speakers), and one or more data input devices. The datainput devices may include, but are not limited to, combinations of oneor more of keypads, keyboards, mouse devices, touch screens,microphones, speech recognition packages, and any other suitable devicesor other electronic/software selection methods.

Each of the processors may be a single-core processor or a multi-coreprocessor. Memory may be implemented using computer-readable media, suchas computer storage media. Computer-readable media includes, at least,two types of computer-readable media, namely computer storage media andcommunication media. Computer storage media includes volatile andnon-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such as computerreadable instructions, data structures, program modules, or other data.Computer storage media includes, but is not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVD), Blu-Ray, or other optical storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other non-transmission medium that may be usedto store information for access by a computing device. In contrast,communication media may embody computer readable instructions, datastructures, program modules, or other data in a modulated data signal,such as a carrier wave, or other transmission mechanism. As definedherein, computer storage media does not include communication media.

The Abstract of the Disclosure is provided to allow the reader toquickly ascertain the nature of the technical disclosure. It issubmitted with the understanding that it will not be used to interpretor limit the scope or meaning of the claims. In addition, in theforegoing Detailed Description, it can be seen that various features aregrouped together in various embodiments for the purpose of streamliningthe disclosure. This method of disclosure is not to be interpreted asreflecting an intention that the claimed embodiments require morefeatures than are expressly recited in each claim. Rather, as thefollowing claims reflect, inventive subject matter lies in less than allfeatures of a single disclosed embodiment. Thus the following claims arehereby incorporated into the Detailed Description, with each claimstanding on its own as a separately claimed subject matter.

What is claimed is:
 1. A user device comprising: a processor; a display coupled to the processor; a network interface coupled to the processor configured to enable communications via a communication network; a storage device for content and programming; a program stored in the storage device, wherein execution of the program by the processor configures the user device to perform acts comprising: receiving a first account status associated with the user device, the first account status indicating that an account of the user device has not received a payment during a first time period; restricting use of one or more features that are accessible via the user device, based at least in part on the first account status; presenting a lock screen on the display of the user device indicating that use of the one or more features has been restricted; receiving a second account status associated with the user device, the second account status indicating that the account of the user device has received a payment during a second time period; determining a most frequently used feature of the one or more features; and restoring at least the most frequently used feature on the user device, based at least in part on the second account status.
 2. The user device of claim 1, wherein the payment that is received during second time period corresponds to a partial payment of an outstanding balance of the account.
 3. The user device of claim 1, wherein execution of the program by the processor configures the user device to perform acts further comprising: determining an international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device; sending the IMSI to a Remote Recovery Server (RRS); and receiving a message from the RRS indicating whether the IMSI is authorized for the user device, the message further including the first account status, and wherein, restricting use of the one or more features is based at least in part on the message.
 4. The user device of claim 3, wherein execution of the program by the processor configures the user device to perform acts further comprising: receiving an additional message form the RRS that includes the second account status, and wherein restoring at least the most frequently used feature on the user device is based at least in part on the additional message.
 5. The user device of claim 1, wherein the lock screen displays at least one of (i) an account status of the user device, (ii) an option to replenish the account of the user device, and (iii) a remaining first time period for a payment.
 6. The user device of claim 1, wherein a functionality of the user device is limited to at least one of (i) an emergency call, (ii) an access to a webpage for processing a payment for the account of the user device, and (iii) a communicative connection with a customer service representative associated with the account of the user device.
 7. The user device of claim 1, wherein restoring at least the most frequently used feature of the user device is performed upon a next startup of the user device.
 8. The user device of claim 1, wherein execution of the program by the processor further configures the user device to perform acts comprising: determining a number of times that a particular feature of the one or more features is invoked on the user device over a predetermined time period; and identifying the particular feature as the most frequently used feature, based at least in part on the number of times the particular feature is invoked on the user device over the predetermined time period.
 9. The user device of claim 1, wherein restricting the use of one or more features accessible via the user device is based at least in part on an escalating schedule until the account of the user device receives a payment.
 10. The user device of claim 1, wherein the first account status further includes a status indication that the account of the user device is past due, in default, or that an unauthorized Subscriber Identity Module (SIM) card has been detected, and wherein execution of the program by the processor further configures the user device to perform acts comprising: identifying a number of the one or more features that are to be restricted via the user device, based at least in part on the status indication, and wherein restricting use of the one or more features accessible via the user device, is further based at least in part on the number of the one or more features.
 11. The user device of claim 1, wherein execution of the program by the processor further configures the user device to perform acts comprising: redirecting at least one of (i) a selection to place a non-emergency voice call, and (ii) a selection for internet access via the user device, to a customer service representative or a web page of a telecommunication carrier still under an original equipment installment plan (EIP) with the user device.
 12. A computer-implemented method, comprising: under one or more processors: detecting a first account status associated with a user device, the first account status indicating that an account of the user device has not received a payment during a first time period; restricting use of a plurality of features accessible via the user device, based at least in part on an escalating schedule and the first account status; detecting a second account status associated with the user device, the second account status indicating that the account of the user device has received at least a partial payment during a second time period; and restoring at least a most frequently used feature of the plurality of features accessible via the user device, based at least in part on the second account status.
 13. The computer-implemented method of claim 12, further comprising: determining a length of time that a particular feature of the one or more features is active on the user device over a predetermined time period; and identifying the particular feature as the most frequently used feature, based at least in part on the length of time that the particular feature is active on the user device over the predetermined time period.
 14. The computer-implemented method of claim 12, further comprising: determining a status indication that the account of the user device is past due, in default, or that an authorized Subscriber Identity Module (SIM) has been detected; and identifying a subset of features of the plurality of features to restrict via the user device, based at least in part on the status indication, and wherein, the escalating schedule is configured to progressively restrict access to the subset of features via the user device over a predetermined time interval.
 15. The computer-implemented method of claim 12, further comprising: identifying an international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device; sending, via a Google Cloud Messaging (GCM) service, the IMSI of the SIM card to a Remote Recovery Server (RRS); and receiving a message, via the GCM service, from the RRS indicating whether the IMSI is authorized for the user device.
 16. The computer-implemented method of claim 15, further comprising: determining whether the IMSI is authorized for the user device at every startup of the user device.
 17. The computer-implemented method of claim 12, further comprising: causing a lock screen to display on the user device, the lock screen indicating that the use of the plurality of features has been restricted.
 18. One or more non-transitory computer-readable media storing a set of computer-executable instructions that, when executed on one or more processors, cause the one or more processors to perform acts comprising: presenting a lock screen on a display of a user device, the lock screen indicating that one or more features accessible via the user device have been restricted in response to a current status of an account associated with the user device; determining an international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device; sending the IMSI to a Remote Recover Server (RRS); receiving, from the RRS, a message indicating whether the IMSI is authorized for the user device, the message further indicating whether the account of the user device has been replenished; and in response to determining that the account of the user device has been replenished at least in part, restoring at least a most frequently used feature of the one or more features accessible via the user device.
 19. The one or more non-transitory computer-readable media of claim 18, wherein the set of computer-executable instructions when executed on the one or more processors further cause the one or more processors to perform acts comprising: determining that the IMSI is authorized for the user device, and wherein, restoring at least the most frequently used feature is further based at least in part on the IMSI being authorized for the user device.
 20. The one or more non-transitory computer-readable media of claim 18, wherein a functionality of the user device is limited to at least one of i) an emergency call, ii) an access to a webpage for processing a payment for the account of the user device, or iii) a communicative connection with a customer service representative associated with the account of the user device. 