Method and apparatus for preventing unauthorized data from being transferred
First Claim
Patent Images
1. A method for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system, comprising:
- the WTRU recording a subject and storing the recording as data in a memory of the WTRU;
the WTRU transmitting the data to the access point; and
the access point examining the data to determine if the data is allowed for transfer to the external network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system includes the WTRU recording a subject and storing the recording as data in a memory of the WTRU. The WTRU transmits the data to the access point. The access point examines the data to determine if the data is allowed for transfer to the external network.
-
Citations
27 Claims
-
1. A method for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system, comprising:
-
the WTRU recording a subject and storing the recording as data in a memory of the WTRU;
the WTRU transmitting the data to the access point; and
the access point examining the data to determine if the data is allowed for transfer to the external network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 27)
-
-
22. In a wireless communication system comprising a plurality of wireless transmit/receive units (WTRUs), an access point, and an external network, the access point comprising:
-
a transmitter;
a receiver; and
a processor in communication with the transmitter and the receiver, wherein an application for preventing the unauthorized transfer of data from the WTRUs to the external network in the wireless communication system runs on the processor, the receiver receives an attempt from one of the WTRUs attempting to transfer data to the external network, the processor examines the data to determine if the transfer of data is authorized, and the processor transfers the data to the external network if the transfer is authorized. - View Dependent Claims (23, 24)
-
-
25. In a wireless communication system comprising a plurality of wireless transmit/receive units (WTRUs), an access point, and an external network, the access point including an integrated circuit (IC) comprising:
-
a transmitter;
a receiver; and
a processor in communication with the transmitter and the receiver, wherein an application for preventing the unauthorized transfer of data from the WTRUs to the external network in the wireless communication system runs on the processor, the receiver receives an attempt from one of the WTRUs attempting to transfer data to the external network, the processor examines the data to determine if the transfer of data is authorized, and the processor transfers the data to the external network if the transfer is authorized. - View Dependent Claims (26)
-
Specification