Apparatus and methods for securing architectures in wireless networks
A wireless network and device technology, applied in the device field of security architecture, can solve problems such as mobile phone network damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] refer to figure 1 , in some aspects, secure communication system 100 may include mechanisms and procedures for securely exchanging data / information between predetermined wireless devices and corresponding predetermined remote network devices located across wireless networks. For example, in some aspects, a first server can be associated with a first group of wireless devices and a second server can be associated with a second group of wireless devices. The aspect provides security mechanisms that, for example, prevent unintended communication between the first server and the second group of devices and between the second server and the first group of devices. Communication is authorized, thereby providing a secure client / server interface. In further aspects, system 100 may include mechanisms and procedures for securely exchanging data / information within a wireless device (eg, between a client application and wireless device resources). For example, in some aspects, t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 