Method and system for secure activation of web clipping applications
First Claim
1. In a portable information device (PID) having previously installed software therein for accessing a server, a method comprising the steps of:
- a) preventing a user from accessing web applications that are previously installed on said PID and located within said installed software;
b) said user registering said PID with said server using a registration application of said installed software; and
c) upon authorized registration of said PID with said server, allowing said web applications to be made available for use by said user and otherwise preventing access of said web applications by said user.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention disclosed is a method and system for the secure activation of web clipping applications upon a portable information device (PID). In an embodiment of the invention, the method first provides for preventing a user from accessing web clipping applications that are installed on the PID and located within installed software. The method then continues with a user registering the PID with a proxy server by using a registration application within the installed software. Upon the authorized registration of the PID with the proxy server, the web clipping applications are revealed to the user, and with the web clipping applications thus revealed, the user may retrieve information from the proxy server through the implementation of any of the web clipping applications. The invention further provides for a method and system for the secure access of a proxy server by a PID such that the recurring step of device identification can be eliminated. This provides for reduced overhead in recurring data transmissions and affords more efficient communications.
-
Citations
20 Claims
-
1. In a portable information device (PID) having previously installed software therein for accessing a server, a method comprising the steps of:
-
a) preventing a user from accessing web applications that are previously installed on said PID and located within said installed software; b) said user registering said PID with said server using a registration application of said installed software; and c) upon authorized registration of said PID with said server, allowing said web applications to be made available for use by said user and otherwise preventing access of said web applications by said user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for secure access of a server by a portable information device (PID) wherein recurring device identification is eliminated, comprising the steps of:
-
a) loading a software package onto said PID wherein said software package comprises a registration application and multiple hidden web applications; b) registering said PID by the implementation of said registration application by a user; c) upon said registering said PID, commanding by said proxy server to said PID to reveal said web applications; d) initiating a browser command for data from said PID, wherein said initiating is a result of an activation by said user of at least one of said revealed web applications; and e) transmitting said data to said PID. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An electronic system, comprising:
-
a server coupled to the Internet; and an electronic device comprising a processor coupled to a bus and a memory coupled to said bus, said memory having previously installed software for accessing said server and having stored therein instructions for implementing a method comprising the steps of; a) preventing a user from accessing previously installed web applications that are installed on said electronic device and located within said installed software; b) said user registering said electronic device with said server using a registration application of said installed software; and c) upon authorized registration of said electronic device with said server, allowing said web applications to be made available for use by said user and otherwise preventing access of said web applications by said user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification