×

Method, apparatus and system for software management

  • US 9,064,098 B2
  • Filed: 02/05/2013
  • Issued: 06/23/2015
  • Est. Priority Date: 08/05/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for software management of a communication device comprising:

  • receiving by a communication connection of the communication device a software installation command sent by a first control device;

    installing software according to the software installation command on a non-transitory computer readable storage medium of the communication device;

    generating with the communication device first identification information of the software after the software is installed;

    saving first authentication information required in managing the software to the non-transitory computer readable storage medium of the communication device, wherein the first authentication information comprises an identification of the first control device;

    receiving by the communication connection of the communication device a software management command for managing the software sent by a second control device, wherein the software management command comprises second authentication information and second identification information of the software, wherein the second authentication information comprises an identification of the second control device, wherein the software management command comprises a software uninstall command, wherein the software uninstall command is received by the second control device in a TR-069 protocol from an Automatic Configuration Server (ACS), wherein the second control device converts the uninstall command in the TR-069 protocol to a Universal Plug and Play (UPnP) protocol and adds the second authentication information and the second identification information to the uninstall command;

    acquiring the second authentication information corresponding to the software management command; and

    executing with the communication device the software management command when the second authentication information is consistent with the first authentication information and when the second identification information of the software is consistent with the first identification information of the software.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×