Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for distributed authorization for access to communications device

A technology of communication equipment and equipment, applied in the field of communication, capable of solving security threats, exposure, etc.

Inactive Publication Date: 2006-02-08
MOTOROLA INC
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once a malicious program infiltrates the device, the user's sensitive hardware, phone book, location or other data may be exposed and compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for distributed authorization for access to communications device
  • System and method for distributed authorization for access to communications device
  • System and method for distributed authorization for access to communications device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Figure 1 illustrates a distributed authorization architecture with which an embodiment of the present invention may operate. As shown in the figure, the communication device 102 can communicate wirelessly with the authorization server 118 to initiate and confirm requests made by applications running on the communication device 102 to access the device specific data 110 . For example, communication device 102 may be or include a cellular telephone, a network wireless device such as a personal digital assistant (PDA) or personal information manager (PIM) equipped with an IEEE 802.11b or other wireless interface, a laptop computer or a wireless device equipped with an 802.11b or Other laptops with other wireless interfaces, or other communication or user equipment. The communication device 102 may communicate with the authorization server 118 via the antenna 112, eg, in the 800 / 900 MHz, 1.9 GHz, 2.4 GHz or other frequency bands, or through an optical or other link.

[001...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the invention cellular telephones or other communications devices (102) may intercept requests (114) by applications (104), for instance applications received via over-the-air programming (OAP), to access sensitive device-specific data (110). That device-specific data (110) may include hardware identifiers such as IMEI or other serial or subscriber identification values, personalized settings such as phone books, contact lists, messaging or other information. The requests (114) by applications (104) for access to that type of data may be intercepted, for instance, by an application programming interface (106) executing on the communications device (102). The application programming interface (106) may communication the request (114), along with information identifying the requesting application, to a remote authorization server (118). The facility may compare the application identifier or other information against a list or table of applications authorized (120) to access device-specific data (110). A grant, denial, deferral or other determination may be communicated back to the device, to permit or deny access accordingly. The routing of requests (114) for such data to a remote host server (118) may, for example, prevent the accessing or corruption of sensitive data by viruses, rogue applications or other types of wireless intrusions.

Description

[0001] Related Application Citations [0002] The subject matter of this application is related to U.S. Application No. CM03699J (Attorney Docket), entitled "System and Method for Distributed Authorization and Deployment of Over the Air Provisioning For a Communications Device", which was filed on the same date as this application and belongs to the same inventor , assigned to the same entity and assigned to Motorola Corporation, which is hereby incorporated by reference. technical field [0003] The present invention relates to the field of communications, and more particularly to a distributed authorization system in which access by on-board applications to data on mobile units, such as phonebooks, hardware identifiers or Other data, may be managed by authorization processing performed on remote servers or other resources. Background technique [0004] Many cellular telephones and other communication devices are currently programmable in various ways. For example, many c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/00H04Q7/20G06F21/44G06F21/56H04L29/06H04W8/18H04W8/20
CPCH04L63/08H04W8/183H04W8/20H04W12/06
Inventor 李伟青林志翰罗纳尔·R·史密斯
Owner MOTOROLA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products