| CPC G06F 21/44 (2013.01) [G06F 21/45 (2013.01)] | 19 Claims |

|
1. A computer-implemented method, comprising:
establishing a serialized inventory database for an inventory of user devices before the user devices are released from the inventory, the inventory of user devices including a first user device, the serialized inventory database including a serialized inventory live status (SILS) data structure of the user devices;
managing serialized inventory information regarding the inventory of user devices according to the SILS data structure, and the serialized inventory live status data structure including a plurality of instances respectively corresponding to the user devices of the inventory, each one of the plurality of instances including a field for a subscriber identity module (SIM) associated with the corresponding user device;
transmitting a first wireless signal to each user device of the inventory, the first wireless signal initiating an inquiry for status information regarding the user device;
receiving a wireless response to the inquiry from the user device, the wireless response including the status information related to one or more attributes of the user device;
comparing, for each user device of the inventory, the status information related to one or more attributes of the user device against the serialized inventory information of the user device;
obtaining a current state of each user device based on the comparison, wherein the current state indicates whether the user device is locked or unlocked with respect to a carrier service;
determining, for each user device, if the user device is eligible for unlock according to a set of pre-established rules specifying conditions for the user device to be eligible for unlock; and
in response to the current state of the first user device indicating the first user device is locked with respect to a carrier service and the determination that the first user device is eligible for carrier unlock, automatically transmitting an unlock command to the first user device without relying on a user request for unlocking, wherein the unlock command is executable to effectuate a change of the user device from being locked to being unlocked with respect to the carrier service.
|