MOBILE HANDSET EXTENSION TO A DEVICE
1 Assignment
0 Petitions
Accused Products
Abstract
Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the device. Extension of mobile operation is secured via delivery of credentials associated with the mobile to the device. Delivery of credentials is temporary and typically spans the period during which mobile operation is extended to the device. Application(s) and content(s) can be conveyed to the device for utilization therein. An emulation component that can reside at least in part on the client component within the device can emulate mobile operation. Client component within the mobile can include at least in part (i) a component that downloads drivers for communication with, and utilization of, the device to which mobile operation is extended, and (ii) a component that can scan for wireless-capable devices to extend mobile service thereto.
-
Citations
21 Claims
-
1. (canceled)
-
2. A mobile device, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; sending security data representing a security credential associated with the mobile device to a remote device; as a function of the security credential represented by the security data, sending instruction data representing an instruction to the remote device to facilitate an emulation of a function associated with the mobile device by the remote device; and in response to determining that the remote device has initiated a logical termination of a connection established between the mobile device and the remote device to send the instruction data to the remote device and receiving command data representing a revocation command from the remote device, revoking the security credential. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable storage device comprising executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
receiving a security credential associated with a mobile device; emulating a function associated with the mobile device in response to receiving an instruction from the mobile device, wherein the instruction has been biometrically encrypted by the mobile device as a function of the security credential; initiating a logical termination of a connection established to the mobile device; and sending a revocation command to the mobile device in response to initiating the logical termination, wherein the revocation command is encrypted as a function of the security credential. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method, comprising:
-
sending, by a system comprising a processor, instruction information to a remote device to facilitate the remote device to emulate a function associated with a mobile device on the remote device as a function of security credential information; and in response to determining, by the system, that the remote device has initiated a logical termination of a connection established between the mobile device and the remote device and receiving revocation command information from the remote device, revoking the security credential information. - View Dependent Claims (19, 21)
-
-
20. The method of 18, further comprising forwarding, by the system, traffic received from the remote device to a radio access network device as a function of the security credential information.
Specification