METHOD AND APPARATUS FOR MANAGING SERVICE LISTS
First Claim
Patent Images
1. A method, comprising:
- receiving at a device a service list and a security layer identifier, wherein the service list comprises at least two service identifiers;
determining whether the security layer is authorized for the device; and
for each service identified in the service list, when the security layer is authorized for the deviceacquiring each service in the service list that is not already installed in the device andenabling each service in the service list that is not already enabled in the device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for managing service lists receives a service list and a security layer identifier at a device. The service list comprises at least two service identifiers. The method and apparatus determines whether the security layer is authorized for the device, and, for each service identified in the service list, when the security layer is authorized for the device the method and apparatus acquires each service in the service list that is not already installed in the device and enables each service in the service list that is not already enabled in the device.
-
Citations
10 Claims
-
1. A method, comprising:
-
receiving at a device a service list and a security layer identifier, wherein the service list comprises at least two service identifiers; determining whether the security layer is authorized for the device; and for each service identified in the service list, when the security layer is authorized for the device acquiring each service in the service list that is not already installed in the device and enabling each service in the service list that is not already enabled in the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device, comprising:
-
A processing system; and a receiver coupled to the processing system that receives a service list and a security layer identifier, wherein the service list comprises at least two service identifiers, wherein the processing system determines whether the security layer is authorized for the device, and for each service identified in the service list, when the security layer is authorized for the device acquires each service in the service list that is not already installed in the device and enables each service in the service list that is not already enabled in the device.
-
Specification