Apparatus and methods for secure architectures in wireless networks
First Claim
Patent Images
1. A method for securely exchanging information, comprising:
- authenticating, at a wireless device, an identity of a client application resident on the wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, the remotely received information retrieval configuration being distinct from the client application; and
providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information securely with resident device resources, and in other aspects, with a remote server over a wireless network.
28 Citations
27 Claims
-
1. A method for securely exchanging information, comprising:
-
authenticating, at a wireless device, an identity of a client application resident on the wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, the remotely received information retrieval configuration being distinct from the client application; and providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for securely exchanging information, comprising:
-
authenticating an identity of a client application resident on the wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration; and providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication, wherein authenticating the identity of the client application comprises; receiving a random message from the client application comprising a request for a specific access level; receiving an application message digest transmitted by the client application, the application message digest comprising a result of the client application applying a first security mechanism to the random message; generating a device message digest, the device message digest comprising a result of the wireless device applying a second security mechanism to the received random message, the second security mechanism comprising a predetermined authentication security mechanism; and authenticating the client application if the application message digest matches the device message digest.
-
-
15. A non-transitory machine-readable medium comprising instructions which, when executed by a machine, cause the machine to perform operations comprising:
-
authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, the remotely received information retrieval configuration being distinct from the client application; and providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
16. At least one processor configured to perform the actions of:
-
authenticating an identity of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, the remotely received information retrieval configuration being distinct from the client application; and providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
17. A wireless device, comprising:
-
means for authenticating an identity of a client application resident on the wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, the remotely received information retrieval configuration being distinct from the client application; and means for providing the client application with access to a predetermined portion of the device resource based upon a result of the authentication.
-
-
18. A wireless communication device, comprising:
-
a non-transitory device resource comprising at least one of device-related data or network-related data; and a non-transitory resource interface module operable to receive an access request for access to the device resource, wherein the access request is based on a remotely received information retrieval configuration, wherein the access request comprises a client application module identification and a security mechanism, wherein the remotely received information retrieval configuration is distinct from the client application module identified by the client application module identification, the resource interface module operable to authenticate the client application module identification and a corresponding predetermined access level to the device resource based on the security mechanism. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A non-transitory computer program product residing on a non-transitory processor-readable medium and comprising instructions configured to cause a processor to:
-
authenticate identity information of a client application resident on a wireless device based upon a request by the client application to access a device resource on the wireless device, wherein the request is based on a remotely received information retrieval configuration, wherein the identity information is resident on the wireless device independent of the request, and wherein the remotely received information retrieval configuration is distinct from the client application; and provide the client application with access to a predetermined portion of the device resource based upon a result of the authentication. - View Dependent Claims (25, 26, 27)
-
Specification