System and method for securely controlling communications
First Claim
Patent Images
1. A system comprising:
- a controller module comprising instructions for controlling a first component; and
a second component with a security system that interacts with the controller module to implement a security protocol before a second component can control the first component based on executing the instructions in the controller module.
7 Assignments
0 Petitions
Accused Products
Abstract
System and method for enabling arbitrary components to control communications without having or requiring prior knowledge of each other. The system includes a first component that creates controller objects and provides the objects to other components. The controller objects include instructions which when executed by the other components enable the components to generate user interfaces for controlling the first component. Further, the controller objects are encrypted and are used to authenticate the senders or receivers of the objects.
60 Citations
33 Claims
-
1. A system comprising:
-
a controller module comprising instructions for controlling a first component; and
a second component with a security system that interacts with the controller module to implement a security protocol before a second component can control the first component based on executing the instructions in the controller module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
providing a controller module comprising instructions for controlling a first component; and
interacting with the controller module to implement a security protocol before a second component can control the first component based on executing the instructions in the controller module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-readable medium having stored thereon instructions, which when executed by at least one processor, causes the processor to perform:
-
providing a controller module comprising instructions for controlling a first component; and
interacting with the controller module to implement a security protocol before a second component can control the first component based on executing the instructions in the controller module. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification