Apparatus and methods for coordination of wireless systems
First Claim
1. A method comprising:
- determining, in a mobile wireless device, privacy status of information acquired in the mobile wireless device, the information at least partially stored in the mobile wireless device, the mobile wireless device registered with a first wireless server and enabled to register with one or more other wireless servers, the one or more other wireless servers separate from the first wireless server, the mobile wireless device enabled to integrate a plurality of policies, each policy from a separate wireless server from among the first wireless server and the one or more other wireless servers such that integration of policies includes designation, in the mobile wireless device, of a primary server selected from among the first wireless server and the one or more other wireless servers;
overriding, in the mobile wireless device, policies from other servers using the policies of the primary server, each policy with each wireless server including instructions that control information flow and conduct of interaction of the mobile wireless server with the respective wireless server;
determining, in the mobile wireless device, which of the first wireless server and the one or more other wireless servers is the primary server, wherein all policy permissions and changes in the mobile wireless device is controlled by the primary server and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server; and
syncing data in the mobile wireless device with the first wireless server, based on the privacy status and verification of identities corresponding to the privacy status and one or more policies integrated in the mobile wireless device relative to the policy with the wireless server having the designation, in the mobile wireless device, of the primary server, the data associated with the information.
3 Assignments
0 Petitions
Accused Products
Abstract
Apparatus and methods for wireless systems provide a mechanism to enhance the communication capabilities of wireless users. In an embodiment, data associated with information acquired in wireless entities is synced among the wireless entities based on a privacy status and verification of identities corresponding to the privacy status. The wireless entities include a wireless server and a set of mobile wireless clients of the wireless server. In an embodiment, a mobile wireless client is configured to browse files in a wireless server. In an embodiment, a wireless server is configured to provide views of its file content to a mobile wireless client authorized to view the file content of the wireless server.
179 Citations
82 Claims
-
1. A method comprising:
-
determining, in a mobile wireless device, privacy status of information acquired in the mobile wireless device, the information at least partially stored in the mobile wireless device, the mobile wireless device registered with a first wireless server and enabled to register with one or more other wireless servers, the one or more other wireless servers separate from the first wireless server, the mobile wireless device enabled to integrate a plurality of policies, each policy from a separate wireless server from among the first wireless server and the one or more other wireless servers such that integration of policies includes designation, in the mobile wireless device, of a primary server selected from among the first wireless server and the one or more other wireless servers; overriding, in the mobile wireless device, policies from other servers using the policies of the primary server, each policy with each wireless server including instructions that control information flow and conduct of interaction of the mobile wireless server with the respective wireless server; determining, in the mobile wireless device, which of the first wireless server and the one or more other wireless servers is the primary server, wherein all policy permissions and changes in the mobile wireless device is controlled by the primary server and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server; and syncing data in the mobile wireless device with the first wireless server, based on the privacy status and verification of identities corresponding to the privacy status and one or more policies integrated in the mobile wireless device relative to the policy with the wireless server having the designation, in the mobile wireless device, of the primary server, the data associated with the information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
determining privacy status of information acquired in a wireless server, the information at least partially stored in the wireless server; automatically syncing data in the wireless server with a mobile wireless device, the mobile wireless device registered with the wireless server, the automatic syncing based on the privacy status and verification of identities corresponding to the privacy status and based on a controlling policy from a determination of the wireless server as being a secondary wireless server or a primary wireless server for the mobile wireless device, wherein the wireless server as the primary wireless server controls all policy permissions and changes and the wireless server as the secondary wireless server is unable to override policies set by the primary wireless server unless permitted by the controlling policy set by the primary wireless server. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
establishing communication from a mobile wireless device to a wireless server, the mobile wireless device being a registered wireless client of the wireless server; determining if a policy for the mobile wireless device associated with another wireless server is primary with respect to a control of flow of information from the mobile wireless device and determining a controlling policy with respect to the control of flow of information from the mobile wireless device, wherein all policy permissions and changes in the mobile wireless device are controlled by a primary server and all other wireless servers are secondary servers unable to override policies set by the primary less permitted by the policy set by the primary server; initiating a browser in the mobile wireless device to control browsing a file directory of the wireless server based on the determination of the controlling policy; and
generating a signal to the wireless server to select a file in the file directory. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
establishing communication in a wireless server with a mobile wireless device, the mobile wireless device being a registered wireless client of the wireless server; receiving, by the wireless server, a signal from a mobile wireless device, the signal being a browser signal to browse a directory of the wireless server; determining in the wireless server if the wireless server is a secondary wireless server or a primary wireless server for the mobile wireless device and determining a policy to control flow of information with the mobile wireless device based on designation as a secondary wireless server or a primary wireless server, wherein the primary server controls all policy permissions and changes in the mobile wireless device and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server; browsing files in the directory in response to browse commands from the mobile wireless device including a select command and based on the policy; and providing content of a file selected from the directory. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory machine-readable medium that stores instructions, which, when performed by a machine, cause the machine to perform operations comprising:
-
determining, in a mobile wireless device, privacy status of information acquired in the mobile wireless device, the information at least partially stored in the mobile wireless device, the mobile wireless device registered with a first wireless server and enabled to register with one or more other wireless servers, the one or more other wireless servers separate from the first wireless server, the mobile wireless device enabled to integrate a plurality of policies, each policy from a separate wireless server from among the first wireless server and the one or more other wireless servers such that integration of policies includes designation, in the mobile wireless device, of a primary server selected from among the first wireless server and the one or more other wireless servers; overriding, in the mobile wireless device, policies from other servers using policies of the primary server, each policy with each wireless server including instructions that control information flow and conduct of interaction of the mobile wireless server with the respective wireless server; determining, in the mobile wireless device, which of the first wireless server and the one or more other wireless servers is the primary server, wherein all policy permissions and changes in the mobile wireless device is controlled by the primary server and all other wireless servers are secondary servers unable to override policies set by the server unless permitted by the policy set by the primary server; and syncing data in the mobile wireless device with the first wireless server, based on the privacy status and verification of identities corresponding to the privacy status and one or more policies integrated in the mobile wireless device relative to the policy with the wireless server having the designation, in the mobile wireless device, of the primary server, the data associated with the information. - View Dependent Claims (32, 33, 34)
-
-
35. A non-transitory machine-readable memory that stores instructions, which, when performed by a machine, cause the machine to perform operations comprising:
-
determining privacy status of information acquired in a wireless server, the information at least partially stored in the wireless server; automatically syncing data in the wireless server with a mobile wireless device, the mobile wireless device registered with the wireless server, the automatic syncing based on the privacy status and verification of identities corresponding to the privacy status and based on a controlling policy from a determination of the wireless server as being a secondary wireless server or a primary wireless server for the mobile wireless device, wherein the primary wireless server controls all policy permissions and changes in the mobile wireless device is and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A non-transitory machine-readable memory that stores instructions, which, when performed by a machine, cause the machine to perform operations comprising:
-
establishing communication from a mobile wireless device to a wireless server, the mobile wireless device being a registered wireless client of the wireless server; determining if a policy for the mobile wireless device associated with another wireless server is primary with respect to a control of flow of information from the mobile wireless device and determining a controlling policy with respect to the control of flow of information from the mobile wireless device, wherein all policy permissions and changes in the mobile wireless device are controlled by a primary server and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server; initiating a browser in the mobile wireless device to control browsing a file directory of the wireless server based on the determination of the controlling policy; and generating a signal to the wireless server to select a file in the file directory. - View Dependent Claims (46, 47, 48, 49, 50)
-
-
51. A non-transitory machine-readable memory that stores instructions, which, when performed by a machine, cause the machine to perform operations comprising:
-
establishing communication in a wireless server with a mobile wireless device, the mobile wireless device being a registered wireless client of the wireless server; receiving a signal from a mobile wireless device, the signal being a browser signal to browse a directory of a wireless server; determining in the wireless server if the wireless server is a secondary wireless server or a primary wireless server for the mobile wireless device and determining a policy to control flow of information with the mobile wireless device based on designation as a secondary wireless server or a primary wireless server, wherein the wireless server as the primary wireless server controls all policy permissions and changes and the wireless server as the secondary wireless server is unable to override policies set by the primary wireless server unless permitted by the controlling policy set by the primary wireless server; browsing files in the directory in response to browse commands from the mobile wireless device including a select command and based on the policy; and providing content of a file selected from the directory. - View Dependent Claims (52, 53, 54, 55, 56, 57)
-
-
58. A mobile wireless apparatus comprising:
-
a controller; an identifier, the identifier being unique and providing capability to establish a registered client relationship with a wireless server; a policy agent to determine if a policy for the mobile wireless apparatus associated with another wireless server is primary with respect to a control of flow of information from the mobile wireless apparatus, wherein all policy permissions and changes in the mobile wireless device is controlled by the primary server and all other wireless servers are secondary servers unable to override policies set by the primary server unless permitted by the policy set by the primary server; and a machine-readable medium responsive to the controller, the machine-readable medium to store and retrieve data based on the determination of the controlling policy, the data including instructions to direct browse activity of files in the wireless server. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65)
-
-
66. A wireless server comprising:
-
a controller; a data storage area operable with the controller, the data storage area including one or more identifiers to uniquely establish a registered relationship with one or more mobile wireless clients, the one or more mobile wireless clients corresponding to a respective one of the identifiers, the one or more mobile wireless clients identified as belonging to a group; a policy agent to control flow of information to the one or more mobile wireless clients, for each of the one or more mobile wireless clients the policy agent is arranged to designate the wireless server as a secondary wireless server or a primary wireless server for the respective mobile wireless client and to determining a policy to control flow of information with each mobile wireless client based on the designation as a secondary wireless server or a primary wireless server for the respective mobile wireless client, wherein the wireless server as the primary wireless server controls all policy permissions and changes and the wireless server as the secondary wireless server is unable to override policies set by the primary wireless server unless permitted by the controlling policy set by the primary wireless server; a machine-readable medium responsive to the controller, the machine-readable medium to store and retrieve data, the data including instructions to browse files in the wireless server based on commands from a mobile wireless client belonging to the group based on the policy for mobile wireless client from which the commands are received in the wireless server; and an interface through which the information is transmitted to the mobile wireless client. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A wireless server comprising:
-
a controller; a data storage area operable with the controller, the data storage area including one or more identifiers to uniquely establish a registered relationship with one or more mobile wireless clients, the one or more mobile wireless clients corresponding to a respective one of the identifiers, the one or more mobile wireless clients identified as belonging to a group; a policy agent to control flow of information to the one or more mobile wireless clients, for each of the one or more mobile wireless clients the policy agent is arranged to designate the wireless server as a secondary wireless server or a primary wireless server for the respective mobile wireless client and to determining a policy to control flow of information with each mobile wireless client based on the designation as a secondary wireless server or a primary wireless server for the respective mobile wireless client, wherein the wireless server as the primary wireless server controls all policy permissions and changes and the wireless server as the secondary wireless server is unable to override policies set by the primary wireless server unless permitted by the controlling policy set by the primary wireless server; a machine-readable medium responsive to the controller, the machine-readable medium to store and retrieve data, the data including instructions to automatically download informational content to a mobile wireless client belonging to the group, based on storage of the informational content in a folder accessible by the wireless server and based on the policy for mobile wireless client to which the informational content is to be automatically download from the wireless server, the folder associated with the mobile wireless client corresponding to its identifier; and an interface through which the informational content is transmitted to the mobile wireless client. - View Dependent Claims (77, 78, 79, 80, 81, 82)
-
Specification