Multiple time outs for applications in a mobile device
First Claim
Patent Images
1. A method for revoking user access to a mobile communications network, the method comprising:
- providing a server;
providing a mobile device for communicating with the server;
providing a plurality of authenticated applications for receiving data from the server, the authenticated applications having one or more authentication parameters associated therewith;
providing a plurality of revocation timeout intervals for revoking access by the server to the plurality of authenticated applications running on the mobile device;
associating each of the plurality of authenticated applications provided by the mobile device with one of the plurality of revocation timeout intervals different from the revocation timeout interval associated with any other of the plurality of authenticated applications;
regularly polling the plurality of authenticated applications to determine the continued validity thereof; and
revoking access to one of the authenticated applications if, during the revocation timeout interval associated with the one of the authenticated applications, the one of the authenticated applications has failed to satisfy the authentication parameters associated therewith.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for revoking access to a mobile device includes providing a plurality of authenticated applications accessible by the mobile device, and providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications. Access to a first authenticated application is revoked after a first timeout interval and access to a second authenticated application is revoked after a second timeout interval.
-
Citations
20 Claims
-
1. A method for revoking user access to a mobile communications network, the method comprising:
-
providing a server;
providing a mobile device for communicating with the server;
providing a plurality of authenticated applications for receiving data from the server, the authenticated applications having one or more authentication parameters associated therewith;
providing a plurality of revocation timeout intervals for revoking access by the server to the plurality of authenticated applications running on the mobile device;
associating each of the plurality of authenticated applications provided by the mobile device with one of the plurality of revocation timeout intervals different from the revocation timeout interval associated with any other of the plurality of authenticated applications;
regularly polling the plurality of authenticated applications to determine the continued validity thereof; and
revoking access to one of the authenticated applications if, during the revocation timeout interval associated with the one of the authenticated applications, the one of the authenticated applications has failed to satisfy the authentication parameters associated therewith. - View Dependent Claims (2)
-
-
3. A method for revoking access to a mobile device, comprising:
-
providing a plurality of authenticated applications accessible by the mobile device; and
providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications;
wherein access to a first one of the authenticated applications is revoked after a first one of the timeout intervals; and
wherein access to a second one of the authenticated applications is revoked after a second one of the timeout intervals. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A wireless network comprising:
-
a server; and
a mobile device for communicating with the server, the mobile device providing a plurality of authenticated applications for receiving data from the server;
an agent for providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications running on the mobile device;
wherein access to each of the plurality of authenticated applications is revoked by the agent using one of the plurality of revocation timeout intervals different from the revocation timeout interval used to revoke access to any other of the plurality of authenticated applications. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification