Apparatus and methods for secure architectures in wireless networks
First Claim
Patent Images
1. A method for securely exchanging information, comprising:
- authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and
providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information securely with resident device resources, and in other aspects, with a remote server over a wireless network.
54 Citations
31 Claims
-
1. A method for securely exchanging information, comprising:
-
authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and
providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A machine-readable medium comprising instructions which, when executed by a machine, cause the machine to perform operations comprising:
-
authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and
providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
16. At least one processor configured to perform the actions of:
-
authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and
providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
17. A wireless device, comprising:
-
means for authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and
means for providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
18. A wireless communication device, comprising:
-
a device resource comprising at least one of device-related data and network-related data; and
a resource interface module operable to receive an access request for access to the device resource, wherein the access request is based on a remotely received information retrieval configuration, wherein access request comprises a client application module identification and a security mechanism, the resource interface module operable to authenticate the client application module identification and a corresponding predetermined access level to the device resource based on the security mechanism. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method for secure information exchange with a wireless device over a wireless network, comprising:
-
establishing a communication protocol with the wireless device;
generating a collection configuration operable to cause the wireless device to collect predetermined information from a device resource on the wireless device;
transmitting the collection configuration and security mechanism to the wireless device over the wireless network; and
receiving from the wireless device the predetermined information based on the collection configuration if the security mechanism authenticates the apparatus to the wireless device based on a predetermined security procedure.
-
-
25. A machine-readable medium comprising instructions which, when executed by a machine, cause the machine to perform operations comprising:
-
establishing a communication protocol with the wireless device;
generating a collection configuration operable to cause the wireless device to collect predetermined information from a device resource on the wireless device;
transmitting the collection configuration and security mechanism to the wireless device over the wireless network; and
receiving from the wireless device the predetermined information based on the collection configuration if the security mechanism authenticates the apparatus to the wireless device based on a predetermined security procedure.
-
-
26. At least one processor configured to perform the actions of:
-
establishing a communication protocol with the wireless device;
generating a collection configuration operable to cause the wireless device to collect predetermined information from a device resource on the wireless device;
transmitting the collection configuration and security mechanism to the wireless device over the wireless network; and
receiving from the wireless device the predetermined information based on the collection configuration if the security mechanism authenticates the apparatus to the wireless device based on a predetermined security procedure.
-
-
27. A remote server, comprising:
-
means for establishing a communication protocol with the wireless device;
means for generating a collection configuration operable to cause the wireless device to collect predetermined information from a device resource on the wireless device;
means for transmitting the collection configuration and security mechanism to the wireless device over the wireless network; and
means for receiving from the wireless device the predetermined information based on the collection configuration if the security mechanism authenticates the apparatus to the wireless device based on a predetermined security procedure.
-
-
28. An apparatus for exchanging data with a wireless device, comprising:
-
a configuration generator operable to generate a configuration for receipt by a wireless device, the configuration operable to cause the wireless device to collect predetermined information from a device resource on the wireless device;
an information repository operable to store information collected from the wireless device based on the configuration;
a communications module and a processor operable to establish a connection between the apparatus and the wireless device over a wireless network; and
a security module operable to provide a predetermined security mechanism to the wireless device, the predetermined security mechanism based on a predetermined exchange protocol with the wireless device, wherein the predetermined security mechanism authenticates the apparatus to the wireless device. - View Dependent Claims (29, 30, 31)
-
Specification