Method and system for securely interacting with managed data from multiple devices
CAFCFirst Claim
1. A method for accessing managed data contained in a data network system, the method comprising:
- executing a first set of program instructions in a wireless telephone of a subscriber, the wireless telephone having a display screen and being in communication, over a wireless data network, with a server hosting the managed data, the managed data being uniquely associated with the wireless telephone of the subscriber and being accessible by a computing device executing a second set of program instructions and coupled to the server through a wired data network, the computing device being able to alter the managed data at the server via the wired data network, wherein the wireless data network and the data network utilize a first communication protocol and a second communication protocol, respectively;
sending a request to the server to retrieve the managed data after activation of a predefined key of the wireless telephone;
receiving, at the wireless telephone, the managed data from the server via the wireless data network, the managed data being presented in a first markup language interpretable by the first set of program instructions when presented to the wireless telephone and being presented in a second markup language interpretable by the second set of program instructions when presented to the computing device; and
displaying the managed data on the display screen of the wireless telephone.
6 Assignments
Litigations
0 Petitions
Accused Products
Abstract
The present invention has been made in consideration of thin devices efficiently communicating ideas and transactions into data networks by using other devices with fill functional user interface in the networks. According to one aspect of the present invention, the thin device exclusively controls the authentication of a rendezvous that is associated with a user account in a server. The thin device running a micro-browser provisions the rendezvous with a set of credential information in an authenticated and secure communication session so that the provisioning process is truly proprietary. To access the user account, the other devices equipped with well known browsers must submit the correct credential information to the rendezvous for verification in the server. Once admitted, the other devices can update managed information in the user account, individually and respectively, thereby the thin device is able to conduct desired transactions based on the managed information in the user account without the need to key in pertinent information of the transactions.
-
Citations
50 Claims
-
1. A method for accessing managed data contained in a data network system, the method comprising:
-
executing a first set of program instructions in a wireless telephone of a subscriber, the wireless telephone having a display screen and being in communication, over a wireless data network, with a server hosting the managed data, the managed data being uniquely associated with the wireless telephone of the subscriber and being accessible by a computing device executing a second set of program instructions and coupled to the server through a wired data network, the computing device being able to alter the managed data at the server via the wired data network, wherein the wireless data network and the data network utilize a first communication protocol and a second communication protocol, respectively;
sending a request to the server to retrieve the managed data after activation of a predefined key of the wireless telephone;
receiving, at the wireless telephone, the managed data from the server via the wireless data network, the managed data being presented in a first markup language interpretable by the first set of program instructions when presented to the wireless telephone and being presented in a second markup language interpretable by the second set of program instructions when presented to the computing device; and
displaying the managed data on the display screen of the wireless telephone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
wherein the managed data comprises a plurality of selectable hyperlinks, each of the hyperlinks providing access to a resource in the data network; - and
wherein the displaying comprises displaying at least one of the selectable hyperlinks on the display screen of the wireless telephone using the first set of program instructions.
-
-
8. The method as recited in claim 7, wherein the first set of program instructions is included in a first browser being operated in the wireless telephone and the second set of program instructions is included in a second browser being operated in the computing device.
-
9. The method as recited in claim 8, the method further comprising:
sending a new request from the wireless telephone to the server using the first set of program instructions to fetch information identified by one of the hyperlinks when the one of the hyperlinks being displayed is selected.
-
10. A method for accessing data contained in a data network system, the method comprising:
-
hosting, at a server, data associated with an account for a wireless telephone having a display screen, the data comprising a plurality of information categories and being accessible by a computing device remotely located and coupled to a data network selected from a group consisting of the Internet, a private network and a network of private networks;
receiving a request from the wireless telephone through a wireless data network to access the data, the request comprising a selection of one of the information categories;
retrieving information pertaining to the selected category if such information is co-located with the account and after the request is authenticated with respect to the account; and
forwarding the information to the wireless telephone in a first format displayable on the display screen of the wireless telephone. - View Dependent Claims (11, 12, 13, 14, 15)
prompting the computing device for credential information when the computing device accesses the data;
providing access to the data in a second format after the credential information is verified; and
updating the data upon receiving updated information from the computing device.
-
-
13. The method as recited in claim 12, wherein the first format is in a first markup language and the second format is in a second markup language.
-
14. The method as recited in claim 10, wherein the data comprises a plurality of hyperlinks, and the selected category is one of the hyperlinks;
- and wherein the retrieving further comprises;
contacting a resource identified by the one of the hyperlinks over the data network;
fetching the information in a second format from the resource; and
converting the respective information in the second format to the first format.
- and wherein the retrieving further comprises;
-
15. The method as recited in claim 14, wherein the first format is a first markup language and the second format is a second markup language.
-
16. A method for interacting with managed data from a wireless computing device or a wired computing device, the managed data being stored on a server coupled to a data network, said method comprising:
-
permitting access to the managed data in a secure manner via the wired computing device;
receiving user input from the wired computing device;
altering the managed data being stored at the server based on the user input from the wired computing device; and
thereafter permitting access to the managed data in a secure manner via the wireless computing device and then forwarding the managed data to the wireless computing device for use therein. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
wherein the managed data is personalized information of the user.
-
-
21. A method as recited in claim 16, wherein said method further comprises:
altering the managed data being stored at the server based on the user input from the wireless computing device.
-
22. A method as recited in claim 16, wherein the wired computing device is a personal computer.
-
23. A method as recited in claim 16, wherein said permitting access to the managed data in a secure manner via the wireless computing device comprises:
-
authenticating the wireless computing device to the server; and
authenticating the server to the wireless computing device.
-
-
24. A method as recited in claim 16, wherein the wired computing device is a personal computer having a standard size keyboard, and the wireless computing device is a small, handheld device having a telephone-type keypad.
-
25. A method as recited in claim 24, wherein the managed data represents frequently requested data, thereby improving ease of use of the wireless computing device by allowing entry of the frequently requested data through use of the standard size keyboard, yet being for use by the wireless computing device.
-
26. A method as recited in claim 16, wherein the wired computing device is a personal computer having a substantially more powerful user input mechanism than the wireless computing device which is a small, handheld device,
wherein the managed data represents frequently requested data, and wherein said method improves ease of use by allowing entry of the frequently requested data through use of the more powerful input mechanism of the wired computing device, yet the frequently requested data so entered being for use by the wireless computing device. -
27. A method as recited in claim 26, wherein a user input mechanism for the wireless computing device has ambiguous keys that require several key strokes to input a particular key, whereas the more powerful input mechanism has non-ambiguous keys require only a single keystroke to input a particular key.
-
28. A method as recited in claim 16, wherein the wireless computing device is a cellular telephone.
-
29. A method as recited in claim 28, wherein the wired computing device is a personal computer.
-
30. A method as recited in claim 16, wherein said permitting access to the managed data in a secure manner via the wired computing device uses a self-provisioning rendezvous.
-
31. A method as recited in claim 30, wherein the self-provisioning rendezvous is accessed by an address identifier.
-
32. A method as recited in claim 31, wherein the address identifier is a universal resource locator (URL).
-
33. A computer readable medium containing program code for accessing data contained in a data network system, the computer readable medium comprising:
-
first program code for displaying the data on a display screen of a wireless device, the data comprising a plurality of selectable information categories and hosted in a server with at least one of the information categories hyperlinking to a resource on a data network, the data also being accessible though a computing device remotely located and coupled to the data network;
second program code for receiving a selection of one of the information categories when the one of the information categories is selected by a user;
third program code, executable in response to the selection, for sending a request for information identified by the selection to the server;
fourth program code for receiving the information from the server in a first format; and
fifth program code for displaying the respective information on the display screen. - View Dependent Claims (34, 35, 36)
sixth computer program code for receiving updated information entered from a telephone keypad; and
seventh computer program code for sending the updated information to the server, the data being updated with the updated information.
-
-
37. A computer readable medium containing program code for accessing data in a data network system, the program code comprising:
-
a first program code for receiving a request, through a wireless data network, sent from a first browser being executed in a wireless telephone to access the data hosted in a database;
the data associated with the wireless telephone and being accessible via a second browser executing on a computing device coupled to a data network that is part of the data network system;
a second program code for authenticating the request with respect to an account associated to the wireless telephone; and
a third program code for forwarding the data in a format supported by the first browser, through the wireless data network, to the wireless telephone. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46)
a fourth program code for retrieving information identified by the one of the hyperlinks from the data network.
-
-
43. The computer readable medium as recited in claim 37, wherein if the credential information is different from an existing credential information after the wireless telephone is authenticated, the program code further comprises a fourth program code for updating the account with the new credential information.
-
44. The computer readable medium as recited in claim 43, wherein the new credential information must be provided when the second browser executing on the computing device attempts to access the data.
-
45. The computer readable medium as recited in claim 44, wherein the format is in a first markup language supported by the first browser and the data is in a second markup language supported by the second browser.
-
46. The computer readable medium as recited in claim 45, wherein the second markup language provides a graphic user interface so that said data can be updated from the computing device.
-
47. A wireless telephone for accessing data in a data network system the wireless telephone comprising:
-
a display screen;
a memory containing a set of program code for a first browser;
a processor, coupled to the display screen and the memory, executing the set of program code to enable the first browser to perform operations of;
sending a request to retrieve the data from a wireless data network, the data being hosted in a server coupled between the wireless data network utilizing a first communication protocol and a data network utilizing a second communication protocol;
receiving the data presented in a first markup language;
displaying the data on the display screen; and
wherein the data is accessible by a computing device operating a second browser and coupled to the data network, and wherein the data presented to the computing device is in a second markup language. - View Dependent Claims (48, 49, 50)
-
Specification