Mobile software terminal identifier
First Claim
Patent Images
1. A method for use in an electronic device including at least one software component and at least one hardware component, the method comprising:
- generating, in the electronic device, a hash value by performing a hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component;
storing the generated hash value;
generating, in the electronic device, another hash value by performing the hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component; and
comparing the another hash value with the stored hash value;
determining whether software used by the electronic device for accessing a wireless network remains unmodified based on the comparison of the another hash value and the stored hash value.
5 Assignments
0 Petitions
Accused Products
Abstract
An electronic device, including at least one software component and at least one hardware component, generates a hash value by performing a hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component. The electronic device uses this generated hash value to determine whether software used by the electronic device for accessing a wireless network remains unmodified.
79 Citations
40 Claims
-
1. A method for use in an electronic device including at least one software component and at least one hardware component, the method comprising:
-
generating, in the electronic device, a hash value by performing a hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component;
storing the generated hash value;
generating, in the electronic device, another hash value by performing the hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component; and
comparing the another hash value with the stored hash value;
determining whether software used by the electronic device for accessing a wireless network remains unmodified based on the comparison of the another hash value and the stored hash value. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 11, 34, 35, 38)
-
-
5. (canceled)
-
10. (canceled)
-
12. An electronic device including at least one hardware component and at least one software component, the device comprising:
-
means for generating a hash value by performing a hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component;
means for storing the generated hash value;
means for generating another hash value by performing the hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component; and
means for comparing the another hash value with the stored hash value;
means for determining whether software used by the electronic device for accessing a wireless network remains unmodified based on a comparison of the generated hash value and the another hash value. - View Dependent Claims (13, 14, 15, 17, 18, 19, 20, 22, 36, 37, 39)
-
-
16. (canceled)
-
21. (canceled)
-
23. A computer readable computer program storage medium carrying a computer program for an electronic device including at least one software component and at least one hardware component, said program being capable, when executed, of effecting a method comprising:
-
generating, in the electronic device, a hash value by performing a hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component;
storing the generated hash value;
generating, in the electronic device, another hash value by performing the hashing algorithm on an identifier of the at least one software component and an identifier of the at least one hardware component; and
comparing the another hash value with the stored hash value;
determining whether software used by the electronic device for accessing a wireless network remains unmodified based on the comparison of the another hash value and the stored hash value. - View Dependent Claims (24, 25, 26, 28, 29, 30, 31, 33, 40)
-
-
27. (canceled)
-
32. (canceled)
Specification