Unlock instant, AI-driven research and patent intelligence for your innovation.

Controlling data download to subscriber equipment

A cellular communication system and database technology, applied in the field of application software adjustment, can solve problems such as endangering server security, user unit or server overflow, rough firewall/proxy mechanism, etc.

Inactive Publication Date: 2009-01-14
GOOGLE TECH HLDG LLC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first type of security attack is not as easy to deal with based on providing a secure communication link
[0008] The second type of security attack directly changes functionality (by breaking code) in the subscriber unit or host processor
Second, so-called Trojan horse attacks can cause the processing system to appear to be doing / executing the requested program, but the processing system is actually doing something nefarious and in addition to the requesting program, such as Control is effectively taken over by a third party unrelated to the legal owner
Third, uplink messages for software downloads are intercepted and a fake addressing server (by a third party) causes malicious or hostile code to be downloaded to the processor requesting the download
Fourth, the associated user unit or server downloading the software may overflow due to pseudocode
Fifth, third-party hackers can compromise the security of the server by modifying the software and content on the server before the software download process begins
This kind of firewall / proxy mechanism for the Internet is very crude (for example, filtering all javaScript, blocking all access to http: / / hackedcodc.com), and cannot meet the needs of various channels in today's developing communication environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling data download to subscriber equipment
  • Controlling data download to subscriber equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Referring to Fig. 1, there is a block diagram of a communication system 10 according to a preferred embodiment of the present invention. Many of the components in communication system 10 are of conventional design.

[0037] An unsecured network 12, such as the Internet, provides a (typically) packet-switched transport domain over which data traffic is transported between a home network 13 (possibly a LAN) and selected peripheral entities 14-18. By way of example, and not limitation, a peripheral entity may take the form of a service provider comprising application-based code 20 (ie, software and firmware) and billing information 22 . Alternatively, the peripheral entity may take the form of a content provider 16 that typically provides services and access to e-commerce 24 or information 26 . A third form 18 of peripheral entities may be a manufacturer's server with a data site for storing Java applets or similar forms of firmware 28 .

[0038] With respect to any serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Code that is to be downloaded to a node (50) from across an unsecure network (12), such as the internet, is routed to a sanity check-point function (44) supporting an emulator of the node (50). Only after an interoperability and compatibility assessment has been undertaken (112, 128) by having the downloaded code run (122-126) on the emulator does the code get passed (116, 134) to the node for software upgrade, application augmentation or content review purposes. A system operator (or system administrator) can therefore regulate software upgrades to mitigate potentially catastrophic software upgrades that would otherwise adversely affect, for example, mobile unit operation. Once code has been assessed, then it can either be stored (108, 132) in a code and fault repository (46) for future use with identical node-originating requests or it can be discarded and labelled as operating-system incompatible within code and fault repository (46).

Description

field of invention [0001] The present invention relates generally to communication systems for controlling the downloading of data to adaptable user equipment, and is particularly, but not exclusively, applicable to applications used in downloadable terminals such as third generation wireless communication devices. adjust. Background technique [0002] With the development of communication technologies, users' requirements for personalized user equipment functions that meet individual (or group) requirements continue to increase. Such user equipment may take many forms, including (but not limited to): i) so-called software-defined radio proposed in third-generation cellular systems, such as Universal Mobile Telecommunications System (UMTS); and ii) programmable terminal equipment , such as computers on a local area network (LAN). [0003] For quite some time, downloading software was an aspiration. Now, with the development of Internet access and packet transmission techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/00G06F1/00G06F9/445G06F21/51G06F21/53H04L29/06H04W12/12
CPCG06F21/51H04L63/08G06F2221/2115H04W12/12G06F21/53H04L63/145H04L63/1441H04W12/122
Inventor 石荣马丁·约翰·埃利斯马克·卡塔托
Owner GOOGLE TECH HLDG LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More