Method and system for enrolling and authenticating computing devices for data usage accounting
First Claim
1. A method for authenticating a computing device for data usage accounting, comprising:
- on a computing device that includes secure applications and unsecure applications, receiving a data session request for a secure application;
in response to the data session request, initiating a data session connection;
as part of initiating the data session connection, sending an authentication package uniquely associated with the computing device to an authentication server;
if the computing device is authenticated, establishing the data session connection to enable data exchange and data accounting, wherein the authenticating is performed exclusively for the secure applications; and
receiving a second profile that includes an exclusion list that identifies one or more secure applications installed on the computing device for which the data usage accounting is not to be performed.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a computing device for data usage accounting are described herein. As an example, the method can be practiced on a computing device that includes secure applications and unsecure applications. A data session request for a secure application can be received, and in response to the data session request, a data session connection can be initiated. As part of initiating the data session connection, an authentication package uniquely associated with the computing device can be sent to the authentication server. If the computing device is authenticated, the data session connection can be established to enable data exchange and data accounting in which the authenticating may be performed exclusively for the secure applications.
-
Citations
16 Claims
-
1. A method for authenticating a computing device for data usage accounting, comprising:
-
on a computing device that includes secure applications and unsecure applications, receiving a data session request for a secure application; in response to the data session request, initiating a data session connection; as part of initiating the data session connection, sending an authentication package uniquely associated with the computing device to an authentication server; if the computing device is authenticated, establishing the data session connection to enable data exchange and data accounting, wherein the authenticating is performed exclusively for the secure applications; and receiving a second profile that includes an exclusion list that identifies one or more secure applications installed on the computing device for which the data usage accounting is not to be performed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for authenticating a computing device, comprising:
-
generating a data session request through a secure application, wherein data consumed as a result of the data session request is to be individually calculated and the data session request is directed to an external entity; prior to permitting data exchange to occur for the data session request, providing an authentication package for purposes of having the computing device authenticated; and if the computing device is authenticated, establishing a connection for the data exchange for the data session request; wherein providing the authentication package and establishing the connection is performed transparently with respect to the secure application associated with the data session request; receiving a failed authentication notification in response to providing the authentication package; and establishing a direct connection for the data session request such that the intended data usage accounting will not occur. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computing device, comprising:
-
a display that is configured to display one or more secure applications; and a processing unit, wherein the display is communicatively coupled to the processing unit, wherein the processing unit is configured to; receive a data session request from a secure application for a data exchange with an external entity; cause a connection to be initiated, wherein the connection will enable the data exchange between the secure application and the external entity and an accounting of the data exchange; and as part of the initiation of the connection, cause an authentication of the computing device to be performed prior to an establishment of the initiated connection; wherein the initiation of the connection and the authentication of the computing device are transparent to the secure application; and an interface that is configured to receive a profile that includes an exclusion list, wherein the exclusion list contains applications that are barred from the accounting of the data exchange. - View Dependent Claims (15, 16)
-
Specification