METHOD FOR INTERNET ACCESS AND FOR COMMUNICATION
First Claim
1. A wireless method for Internet access with a wireless communication device that is plug connectable to an external port of a first computing device, the wireless communication device being a portable device and previously being distinct from the first computing device, the wireless communication device having,an interface for plug connecting to the external port of the first computing device,a wireless communication component for wireless communication,a memory component that includes a private memory area, the private memory area not accessible to an user of the wireless communication device,a protected data stored in the private memory area for executing at the first computing device,a memory controller having means for managing communication through the interface and means for accessing the private memory area, the method comprising:
- plug connecting the wireless communication device to the external port of the first computing device, and while the wireless communication device is being plug connected to the external port of the first computing device, the wireless communication device,draws power to the wireless communication device from the first computing device for operating the wireless communication device,accesses at least part of the protected data from the private memory area of the wireless communication device by the memory controller of the wireless communication device,provides at least part of the protected data accessed by the memory controller, over the interface of the wireless communication device to a wireless application running and executing on the first computing device, the wireless application running and executing at the first computing device activates at least part of the wireless communication operations employing at least in part the protected data received from the wireless communication device, andenables the first computing device Internet access via the wireless communication component of the wireless communication device with the protected data;
disconnecting the wireless communication device, from the external port of the first computing device, and the wireless application automatically not providing Internet access to the first computing device through the wireless communication component of the wireless communication device;
plug connecting the wireless communication device to the external port of a second computing device, the second computing device being a distinct device from the first computing device and the wireless communication device, while the wireless communication device is being plug connected to the external port of the second computing device, the wireless communication device,draws power to the wireless communication device from the second computing device for operating the wireless communication device,accesses at least part of the protected data from the private memory area of the wireless communication device by the memory controller of the wireless communication device,provides at least part of the protected data accessed by the memory controller, over the interface of the wireless communication device to the second computing device,enables the second computing device Internet sharing employing at least in part the protected data, the Internet sharing being from the second computing device to the first computing device over a local wireless communication link between the second computing device and the first computing device; and
disconnecting the wireless communication device from the external port of the second computing device, and the second computing device automatically not providing Internet access to the first computing device through Internet sharing from the second computing device to the first computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless method for Internet access and a phone calling method is disclosed. Each method uses a portable communication device that is plug connectable to an external port of a computing device for enabling the computing device Internet access, Internet sharing, and or phone calling. Upon plug connecting the portable communication device to the computing device, a software application running at the computing device is enabled by employing at least in part a protected data stored in the portable communication device. In a first exemplary application, the portable communication device enables wireless communication and Internet access to the computing device. In a second exemplary application, the portable communication device enables phone calling from the computing device and facilitates installation of a phone calling software running at the computing device upon plug connecting the communication device to the computing device.
-
Citations
24 Claims
-
1. A wireless method for Internet access with a wireless communication device that is plug connectable to an external port of a first computing device, the wireless communication device being a portable device and previously being distinct from the first computing device, the wireless communication device having,
an interface for plug connecting to the external port of the first computing device, a wireless communication component for wireless communication, a memory component that includes a private memory area, the private memory area not accessible to an user of the wireless communication device, a protected data stored in the private memory area for executing at the first computing device, a memory controller having means for managing communication through the interface and means for accessing the private memory area, the method comprising: -
plug connecting the wireless communication device to the external port of the first computing device, and while the wireless communication device is being plug connected to the external port of the first computing device, the wireless communication device, draws power to the wireless communication device from the first computing device for operating the wireless communication device, accesses at least part of the protected data from the private memory area of the wireless communication device by the memory controller of the wireless communication device, provides at least part of the protected data accessed by the memory controller, over the interface of the wireless communication device to a wireless application running and executing on the first computing device, the wireless application running and executing at the first computing device activates at least part of the wireless communication operations employing at least in part the protected data received from the wireless communication device, and enables the first computing device Internet access via the wireless communication component of the wireless communication device with the protected data; disconnecting the wireless communication device, from the external port of the first computing device, and the wireless application automatically not providing Internet access to the first computing device through the wireless communication component of the wireless communication device; plug connecting the wireless communication device to the external port of a second computing device, the second computing device being a distinct device from the first computing device and the wireless communication device, while the wireless communication device is being plug connected to the external port of the second computing device, the wireless communication device, draws power to the wireless communication device from the second computing device for operating the wireless communication device, accesses at least part of the protected data from the private memory area of the wireless communication device by the memory controller of the wireless communication device, provides at least part of the protected data accessed by the memory controller, over the interface of the wireless communication device to the second computing device, enables the second computing device Internet sharing employing at least in part the protected data, the Internet sharing being from the second computing device to the first computing device over a local wireless communication link between the second computing device and the first computing device; and disconnecting the wireless communication device from the external port of the second computing device, and the second computing device automatically not providing Internet access to the first computing device through Internet sharing from the second computing device to the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A wireless method for Internet access with a wireless communication device that is plug connectable to an external port of a first computing device, the wireless communication device being a portable device and previously being distinct from the first computing device, the wireless communication device including:
-
an interface for plug connecting to the external port of the first computing device, a wireless communication component that includes a baseband component and a radio component for wireless communication, a wireless protocol stack component for conforming the wireless communication device to one or more wireless communication protocols, an memory component that includes a private memory area, the private memory area not accessible to an user of the wireless communication device, a protected data stored in the private memory area for executing at the first computing device upon plug connecting the wireless communication device to the first computing device, and one or more controllers having, means for managing communication through the interface of the wireless communication device, means for accessing the protected data from the private memory area, means for providing the protected data to the first computing device over the interface of the wireless communication device, means for managing at least in part the wireless communication component that includes the baseband component and the radio component, and means for accessing at least part of the wireless protocol stack component, the wireless protocol stack component includes software for an encoding operation and or software for a decoding operation, and software for a conversion operation, and subsequent to plug connecting the wireless communication device to the external port of the first computing device the method comprising; drawing power to the wireless communication device from the first computing device for operating the wireless communication device; accessing the protected data from the private memory area of the wireless communication device by the one or more controllers included in the wireless communication device; providing over the interface of the wireless communication device to the first computing device at least part of the protected data from the private memory area of the wireless communication device to the first computing device for enabling the first computing device Internet access; enabling the first computing device Internet access over the wireless communication component of the wireless communication device by running and executing at least part of the protected data at the first computing device, the Internet access over the wireless communication component of the wireless communication device including the one or more controllers managing at least in part the wireless communication component that includes the baseband component and the radio component and accessing at least part of the wireless protocol stack component; enabling data communication between the first computing device and a second computing device via the wireless communication component of the wireless communication device, the second computing device being a distinct device from the wireless communication device and the first computing device; and thereby, the wireless communication device, which is a portable device, functions as a key for enabling the first computing device Internet access in dependence of whether the wireless communication device is being plug connected to the first computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for phone calling with a portable communication device, the portable communication device having,
an interface for plug connecting to an external port of a first computing device, a memory component that includes a private memory area, the private memory area not accessible to an user of the portable communication device, a protected software component stored in the private memory area of the communication device for executing at the first computing device, a public memory area that is accessible to the user of the portable communication device, and the public memory area of the portable communication device stores at least a pointer to an executable related to a phone calling software for facilitating installation and or running of the phone calling software, one or more controllers having, means for managing communication through the interface of the portable communication device, means for accessing the private memory area, and means for performing an operation that includes one or more of an encoding operation, a decoding operation, and a conversion operation, the method comprising: -
drawing power to the portable communication device from the first computing device for operating the portable communication device upon plug connecting the portable communication device to the first computing device; accessing the protected software component from the private memory area of the portable communication device by the one or more controllers of the portable communication device while the portable communication device is plug connected to the first computing device; providing over the interface of the portable communication device to the first computing device at least part of the protected software component by the one or more controllers while the portable communication device is plug connected to the external port of the first computing device; facilitating at least part of an installing or a running of at least part of the phone calling software at the first computing device employing at least in part the executable related to the phone calling software stored in the public memory area of the portable communication device, the phone calling software including at least part of the protected software component accessed from the private memory area of the portable communication device by the one or more controllers; and enabling phone calling from the first computing device to a second computing device by the phone calling software, while the portable communication device is being plug connected to the external port of the first computing device, the second computing device being a distinct device from the portable communication device and the first computing device; and wherein, the portable communication device further functions as a security key for enabling phone calling from the first computing device in dependence of whether the portable communication device is being plug connected to the first computing device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification