Methods and apparatus for content protection in a wireless network
First Claim
1. A method for operating a protection system to protect an application from unauthorized operation, wherein the application will fail to operate on a device that is outside a predetermined operating region, the method comprising:
- associating a geographic identifier with the application, wherein the geographic identifier identifies the predetermined operating region;
downloading the application and the geographic identifier to the device;
receiving a request to execute the application on the device, wherein the request includes the geographic identifier;
determining a device location;
comparing the device location with the predetermined operating region identified by the geographic identifier; and
preventing the application from executing when the device is outside the predetermined operating region.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for content protection in a wireless network. A method is provided for operating a protection system to protect an application from unauthorized distribution, wherein the application will fail to operate on a device that is outside a predetermined operating region. The method includes associating a geographic identifier with the application, wherein the geographic identifier identifies the predetermined operating region, and downloading the application and the geographic identifier to the device. The method also includes receiving a request to execute the application on the device, wherein the request includes the geographic identifier, and determining a device location. The method also includes comparing the device location with the predetermined operating region identified by the geographic identifier, and preventing the application from executing when the device is outside the predetermined operating region.
-
Citations
19 Claims
-
1. A method for operating a protection system to protect an application from unauthorized operation, wherein the application will fail to operate on a device that is outside a predetermined operating region, the method comprising:
-
associating a geographic identifier with the application, wherein the geographic identifier identifies the predetermined operating region;
downloading the application and the geographic identifier to the device;
receiving a request to execute the application on the device, wherein the request includes the geographic identifier;
determining a device location;
comparing the device location with the predetermined operating region identified by the geographic identifier; and
preventing the application from executing when the device is outside the predetermined operating region. - View Dependent Claims (2, 3, 4)
-
-
5. Apparatus that operates to protect an application from unauthorized operation, wherein the application will fail to operate on a device that is outside a predetermined operating region, the apparatus comprising:
-
a geographic database that operates to associate the application with a geographic indicator that identifies the predetermined operating region; and
processing logic that operates to match a device location with the predetermined operating region identified by the geographic indicator to determine whether the device is outside the predetermined operating region, wherein if the device is outside the predetermined operating region the application is prevented from operating. - View Dependent Claims (6, 7, 8, 9)
-
-
10. Apparatus that operates to protect an application from unauthorized operation, wherein the application will fail to operate on a device that is outside a predetermined operating region, the apparatus comprising:
-
means for associating the application with a geographic indicator that identifies the predetermined operating region;
means for matching a device location with the predetermined operating region identified by the geographic indicator;
means for determining whether the device is outside the predetermined operating region; and
means for preventing the application from operating if the device is outside the predetermined operating region. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-readable media comprising instructions that when executed by a processor in a protection system operate to protect an application from unauthorized operation, wherein the application will fail to operate on a device that is outside a predetermined operating region, the computer-readable media comprising:
-
instructions for associating the application with a geographic indicator that identifies the predetermined operating region;
instructions for matching a device location with the predetermined operating region identified by the geographic indicator;
instructions for determining whether the device is outside the predetermined operating region; and
instructions for preventing the application from operating if the device is outside the predetermined operating region. - View Dependent Claims (16, 17, 18, 19)
-
Specification