System, method and computer program product for identifying, configuring and accessing a device on a network
First Claim
Patent Images
1. A method, comprising:
- associating a universal device locator (UDL) with a unique identifier of a device connected to a network;
identifying the UDL on the network; and
accessing the device utilizing the UDL;
wherein the association between the UDL and the unique identifier of the device is specific to a first user that is an owner of the device, and wherein a transfer of ownership of the device to a second user is made by changing the association of the unique identifier of the device from being with the UDL to being with another UDL associated with the second user;
wherein the changing the association of the unique identifier of the device from being with the UDL to being with another UDL associated with the second user is utilized as a trigger for a commerce transaction.
3 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for identifying, configuring, and accessing a device connected to a network. In operation, a device connected to a network is automatically identified. Additionally, the device is automatically configured. Strictly as an option, the device may be accessed on the network.
-
Citations
16 Claims
-
1. A method, comprising:
-
associating a universal device locator (UDL) with a unique identifier of a device connected to a network; identifying the UDL on the network; and accessing the device utilizing the UDL; wherein the association between the UDL and the unique identifier of the device is specific to a first user that is an owner of the device, and wherein a transfer of ownership of the device to a second user is made by changing the association of the unique identifier of the device from being with the UDL to being with another UDL associated with the second user; wherein the changing the association of the unique identifier of the device from being with the UDL to being with another UDL associated with the second user is utilized as a trigger for a commerce transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification