Remote control app for smart phones
First Claim
Patent Images
1. A method for adding computing functionality to a smart phone (12) comprising the steps of:
- providing a smart phone (12);
said smart phone (12) including a CPU (15B);
said including a non-volatile memory (15A);
said non-volatile memory (15A) being divided into a plurality of dynamic partitions (42);
each of said plurality of dynamic partitions (42) being assigned to a persona of a user (10);
each of said plurality of dynamic partitions (42) being safeguarded by an access rule (46);
said smart phone (12) including a volatile memory (15C);
said smart phone (12) including a long range radio (15D);
said smart phone (12) including a short range radio (15F);
providing a transmitter (16, 18);
providing a server (14);
said transmitter (16, 18) being connected to said server (14);
said server (14) including a memory (17) for storing an App (13);
conveying said App (13) from said server (14) to said transmitter (16, 18);
conveying said App (13) from said transmitter (16, 18) to said smart phone (12) using said long range radio (15D) in said smart phone (12);
storing said App (13) in said non-volatile memory (15) of said smart phone (12);
running said App (13) on said CPU (15B); and
downloading said App (13) to a nearby separate information appliance (21A);
using said smart phone (12) to control the function of said nearby information appliance (21A) using said short range radio (15F).
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for a Remote Control App for Smart Phones are disclosed. One embodiment of the present invention is a software application or “App” which may be downloaded to a conventional smart phone (12). Once downloaded to the smart phone (12) and to a remote computer, network or other information appliance (14), the smart phone (12) may be used to operate and/or control the remote computer, network or other information appliance.
65 Citations
24 Claims
-
1. A method for adding computing functionality to a smart phone (12) comprising the steps of:
-
providing a smart phone (12); said smart phone (12) including a CPU (15B); said including a non-volatile memory (15A); said non-volatile memory (15A) being divided into a plurality of dynamic partitions (42); each of said plurality of dynamic partitions (42) being assigned to a persona of a user (10); each of said plurality of dynamic partitions (42) being safeguarded by an access rule (46); said smart phone (12) including a volatile memory (15C); said smart phone (12) including a long range radio (15D); said smart phone (12) including a short range radio (15F); providing a transmitter (16, 18); providing a server (14); said transmitter (16, 18) being connected to said server (14); said server (14) including a memory (17) for storing an App (13); conveying said App (13) from said server (14) to said transmitter (16, 18); conveying said App (13) from said transmitter (16, 18) to said smart phone (12) using said long range radio (15D) in said smart phone (12); storing said App (13) in said non-volatile memory (15) of said smart phone (12); running said App (13) on said CPU (15B); and downloading said App (13) to a nearby separate information appliance (21A); using said smart phone (12) to control the function of said nearby information appliance (21A) using said short range radio (15F). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 22, 23, 24)
-
-
17. A method for conveying digital content comprising the steps of:
-
providing a server;
said server being connected to a network;providing a client;
said client being connected to said network;requesting a content key from said server; authenticating said request; sending an encrypted session key to said client; decrypting said encrypted session key; sending a second request to said server; authenticating said second request; sending said content key encrypted with said encrypted session key to said client; using said encrypted session key to recover said content key; and using said recovered content to decrypt digital content.
-
-
18. A method for conveying digital content comprising the steps of:
-
setting up a security domain on a server; registering a client on said security domain; said server generating a content key and encrypting said content with said content key; said server transferring said encrypted content to said client; said client sending a request to said server for said content key; said server authenticating said request; generating a session key; encrypting said session key; sending response to said client; decrypting said response to recover said session key; sending a second request to said server; authenticating said second request; encrypting said content key with said session key; sending second response to said client; decrypting said second response with said session key to recover said content key; and using said content key to decrypt digital content.
-
-
19. A method for securely transferring digital content comprising the steps of:
-
setting up a security domain on a server; registering a client on said security domain; dividing said digital content into a plurality of segments; generating a plurality of segment keys, one for each of said plurality of segments; encrypting each of said plurality of segments with one of said plurality of segment keys; transferring said plurality of segments which have been encrypted to said client; said client sending a request to said server for said plurality of segment keys; authenticating said request; generating a plurality of session keys, one for each of said plurality of segments; encrypting said plurality of session keys; sending a response to said client; decrypting said response to recover said plurality of session keys; sending a second request to said server; authenticating said second request; encrypting said remaining segment keys with said remaining session keys; sending second response to said client; decrypting said second response with said plurality of session keys to recover said plurality of segment keys which have been encrypted; and using said plurality of segment keys to decrypt digital content.
-
-
20. A method for securely transferring digital content comprising the steps of:
-
setting up a security domain on a server including a quasi-public key crypto system and a quasi-public key, key exchange system; registering a client on said security domain; dividing digital content into a plurality of segments; generating a random key for each segment; encrypting said plurality of segments with said random keys using a symmetric key algorithm; transferring said encrypted said plurality of segments to said client; sending a request encrypted using said quasi-public key crypto system to said server for said segment keys; authenticating said request for said segment keys from said client;
generating session keys for each of said plurality of segments;transforming said segment keys using said quasi-public key, key exchange protocol; encrypting said transformed session keys using said quasi-public key crypto system; sending response to said client; decrypting said response using said quasi-public key crypto system; recovering said session keys from said transformed session keys using said quasi-public key, key exchange protocol; computing a hash of said session keys; encrypting said hash using said symmetric key algorithm with said first session key; sending a second request to said server; authenticating said second request; encrypting said remaining segment keys using said symmetric key algorithm with said remaining session keys; sending second response to said client; decrypting said second response using said symmetric key algorithm with said session keys to recover said encrypted segment keys; and using said segment keys to decrypt digital content.
-
-
21. A method for conveying digital content comprising the steps of:
-
providing a server; providing a client; requesting a content key from said server; authenticating said request; sending an encrypted session key to said client; decrypting said encrypted session key; sending a second request to said server; authenticating said second request; sending said content key encrypted with said encrypted session key to said client; using said encrypted session key to recover said content key; and using said encrypted session key to decrypt digital content.
-
Specification