DEVICE MANAGER REPOSITORY
First Claim
Patent Images
1. A system, comprising:
- a data store storing associations of first encryption keys to wireless device identifiers, each association defining an association of a first encryption key to a wireless device identifier, the wireless device identifier identifying a corresponding wireless device storing a corresponding second encryption key, and the first encryption key being matched to the second encryption key;
a repository manager comprising instructions executable by a processing system that includes one or more computers and upon such execution cause the processing system to perform operations comprising;
receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in communication with the access device, the access device being connected to a network and facilitating a wireless connection of the wireless device to the network;
identifying a wireless device identifier in the data store that matches the received wireless device identifier;
identifying a first encryption key associated with the identified wireless device identifier; and
transmitting the identified encryption key to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified first encryption key and the second encryption key stored in the wireless device.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus, systems and methods for managing wireless devices. A wireless device identifier from an access device is received. An encryption key associated with the wireless device identifier that matches an encryption key stored in the wireless device is identified. The identified encryption key is transmitted to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified encryption key and the encryption key stored in the wireless device.
190 Citations
23 Claims
-
1. A system, comprising:
-
a data store storing associations of first encryption keys to wireless device identifiers, each association defining an association of a first encryption key to a wireless device identifier, the wireless device identifier identifying a corresponding wireless device storing a corresponding second encryption key, and the first encryption key being matched to the second encryption key; a repository manager comprising instructions executable by a processing system that includes one or more computers and upon such execution cause the processing system to perform operations comprising; receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in communication with the access device, the access device being connected to a network and facilitating a wireless connection of the wireless device to the network; identifying a wireless device identifier in the data store that matches the received wireless device identifier; identifying a first encryption key associated with the identified wireless device identifier; and transmitting the identified encryption key to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified first encryption key and the second encryption key stored in the wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in communication with the access device; identifying an encryption key associated with the wireless device identifier, the identified encryption key matching an encryption key stored in the wireless device; and transmitting the identified encryption key to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified encryption key and the encryption key stored in the wireless device. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system, comprising:
-
a data store storing associations of cluster data sets to wireless device identifiers, each cluster data set defining one or more wireless device functionalities of a wireless device identified by a corresponding wireless device identifier; a repository manager comprising instructions executable by a processing system that includes one or more computers and upon such execution cause the processing system to perform operations comprising; receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in communication with the access device, the access device being connected to a network and facilitating a wireless connection of the wireless device to the network; identifying a wireless device identifier in the data store that matches the received wireless identifier; identifying a corresponding cluster data set associated with the identified wireless device identifier; and transmitting the corresponding cluster data a service provider that provides a service to a user of the wireless device by use of the wireless device. - View Dependent Claims (21)
-
-
22. Software stored in a computer readable medium and comprising instructions executable by a processing system and upon such execution cause the processing system to perform operations comprising:
-
receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in wireless communication with the access device, the access device being connected to a network and facilitating a wireless connection of the wireless device to the network; identifying an encryption key associated with the wireless device identifier, the identified encryption key matching an encryption key stored in the wireless device; and transmitting the identified encryption key to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified encryption key and the encryption key stored in the wireless device.
-
-
23. Software stored in a computer readable medium and comprising instructions executable by a processing system and upon such execution cause the processing system to perform operations comprising:
-
receiving a wireless device identifier from an access device, the wireless device identifier identifying a wireless device in wireless communication with the access device, the access device being connected to a network and facilitating a wireless connection of the wireless device to the network; identifying a wireless device identifier in the data store that matches the received wireless identifier; identifying a corresponding cluster data set associated with the identified wireless device identifier; and transmitting the corresponding cluster data to a service provider that provides a service to a user of the wireless device by use of the wireless device.
-
Specification