Method and apparatus for preventing unauthorized data from being transferred
First Claim
Patent Images
1. A method for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system, comprising:
- the WTRU recording a subject and storing the recording as data in a memory of the WTRU;
the WTRU transmitting the data to the access point; and
the access point examining the data to determine if the data is allowed for transfer to the external network and access point refuses the transfer of the data to the external network if the WTRU cannot authenticate itself.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system includes the WTRU recording a subject and storing the recording as data in a memory of the WTRU. The WTRU transmits the data to the access point. The access point examines the data to determine if the data is allowed for transfer to the external network.
71 Citations
26 Claims
-
1. A method for preventing the transfer of unauthorized data among a wireless transmit/receive unit (WTRU), an external network, and at least one access point in a wireless communication system, comprising:
-
the WTRU recording a subject and storing the recording as data in a memory of the WTRU; the WTRU transmitting the data to the access point; and the access point examining the data to determine if the data is allowed for transfer to the external network and access point refuses the transfer of the data to the external network if the WTRU cannot authenticate itself. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. In a wireless communication system comprising a plurality of wireless transmit/receive units (WTRUs), an access point, and an external network, the access point comprising:
-
a transmitter; a receiver; and a processor in communication with the transmitter and the receiver, wherein an application for preventing the unauthorized transfer of data from the WTRUs to the external network in the wireless communication system runs on the processor, the receiver receives an attempt from one of the WTRUs attempting to transfer data to the external network, the processor examines the data to determine if the transfer of data is authorized and if the WTRU is authenticated, and the processor transfers the data to the external network if the transfer is authorized and the WTRU is authenticated and the processor refuses the transfer of the data to the external network if the WTRU cannot authenticate itself. - View Dependent Claims (23, 24)
-
-
25. In a wireless communication system comprising a plurality of wireless transmit/receive units (WTRUs), an access point, and an external network, the access point including an integrated circuit (IC) comprising:
-
a transmitter; a receiver; and a processor in communication with the transmitter and the receiver, wherein an application for preventing the unauthorized transfer of data from the WTRUs to the external network in the wireless communication system runs on the processor, the receiver receives an attempt from one of the WTRUs attempting to transfer data to the external network, the processor examines the data to determine if the transfer of data is authorized, and to determine whether the WTRU has been authorized, and the processor transfers the data to the external network if the transfer is authorized and the WTRU has been authenticated and the processor refuses the transfer of the data to the external network if the WTRU cannot authenticate itself. - View Dependent Claims (26)
-
Specification