$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for providing access control to local services of mobile devices 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-015/173
출원번호 US-0118640 (1998-07-17)
발명자 / 주소
  • Liao Hanqing
  • King Peter F.
  • Martin
  • Jr. Bruce K.
출원인 / 주소
  • Openwave Systems Inc.
대리인 / 주소
    Beyer Weaver & Thomas, LLP
인용정보 피인용 횟수 : 150  인용 특허 : 10

초록

Techniques for ensuring secure access to local service of mobile devices of a wireless communication system are disclosed. The techniques control access to local services of mobile devices such that only authorized services are able to remotely alter the local services of the mobile devices. Before

대표청구항

[ What is claimed is:] [1.]1. A method for restricting access to local services of a mobile device, said method comprising:(a) receiving a message from a computing device through a network, the message having a service identity associated therewith;(b) determining whether the message seeks access to

이 특허에 인용된 특허 (10)

  1. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  2. Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for preventing unauthorized monitoring of wireless data transmissions.
  3. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  4. Araki Hidenori,JPX ; Kusumoto Kiyoshi,JPX ; Nomura Susumu,JPX ; Yamashita Yasuhiro,JPX, Method of restricting data access to WWW server so as to permit specific user to refer to successive pages while entrance page is freely acquired by any user.
  5. Willens Steven M., Network access control system and process.
  6. Orenshteyn Alexander S., Secured system for accessing application services from a remote station.
  7. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.
  8. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  9. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  10. Payne John M. ; Von Kaenel Tim ; Wang Jeffrey ; Odell Jeffrey ; Starr David ; Katz Jason, System and method for transmission of data.

이 특허를 인용한 특허 (150)

  1. Nino,Yuichi; Hosomi,Itaru, Access method and system with restricted number of address indentifiers in domain areas for identifying server addresses.
  2. Kuhn, Brian Gerald, Activation of mobile computing device.
  3. Skinner, Craig S., Activation of mobile computing device on a cellular network.
  4. Skinner, Craig S., Activation of mobile computing device on a cellular network.
  5. Srinivasan, Venkatachary; Boerries, Marco; Breuer, Matthias; Meyer, Markus; Schulz, Torsten, Alert mechanism for notifying multiple user devices sharing a connected-data-set.
  6. Montalvo, Robinson; Willard, Hugh C.; Hayes, Jr., John J., Apparatus and method for automatically prioritizing telephone dialing strings.
  7. Strong,Jack B; Lehner,John N; Kleid,Jonathan J; Patel,Vivek, Apparatus and method for supplying electronic content to network appliances.
  8. Madams, Peter H. C.; Salesky, Joseph H.; Zadok, Ayelet, Apparatus for executing an application function using a mail link and methods therefor.
  9. Madams, Peter H. C.; Salesky, Joseph H.; Zadek, Ayelet, Apparatus for executing an application function using a smart card and methods therefor.
  10. Hirayama, Tomoshi, Apparatus, system and method for secure information dissemination.
  11. Hirayama, Tomoshi, Apparatus, system and method for secure information dissemination.
  12. Mirza Baig,Attaullah, Approach for configuring wireless devices.
  13. Madams, Peter H. C.; Salesky, Joseph H., Architecture for general purpose trusted personal access system and methods therefor.
  14. Myles,Colin; Owen,Richard, Authentication method for enabling a user of a mobile station to access to private data or services.
  15. Tung Loo,Elise Y.; Lee,Chi Cheng; Agarwal,Sachin, Blocking cache flush requests until completing current pending requests in a local server and remote server.
  16. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  17. Fishman, Neil; Kadyk, Don; Curtis, Brent; Seinfeld, Marc; Ledsome, Mark, Caching transformed content in a mobile gateway.
  18. Shiga, Kenta; Murakami, Toshihiko; Nakatsuka, Daiki, Computer system and method of updating authentication information of computer system.
  19. Hirayama,Tomoshi, Content distribution with content tagging and third party verification.
  20. Chéné, Marc; Craddock, Julian; Haskins, Paul; Yerxa, Barry, Content management across shared, mobile file systems.
  21. Parupudi,Gopal; Reus,Edward F., Context aware computing devices and methods.
  22. Parupudi,Gopal; Reus,Edward F., Context aware computing devices and methods.
  23. Parupudi,Gopal; Reus,Edward F.; Evans,Stephen S., Context aware computing devices having a common interface and related methods.
  24. Parupudi,Gopal; Reus,Edward F.; Evans,Stephen S., Context aware computing devices having a common interface and related methods.
  25. Parupudi, Gopal; Evans, Stephen S.; Holtgrewe, Burdette J.; Reus, Edward F., Context aware systems and methods utilizing hierarchical tree structures.
  26. Parupudi,Gopal; Reus,Edward F.; Evans,Stephen S., Context translation methods and systems.
  27. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Context-aware and location-aware cellular phones and methods.
  28. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Context-aware and location-aware cellular phones and methods.
  29. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Context-aware systems and methods location-aware systems and methods context-aware vehicles and methods of operating the same and location-aware vehicles and methods of operating the same.
  30. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Context-aware systems and methods location-aware systems and methods context-aware vehicles and methods of operating the same and location-aware vehicles and methods of operating the same.
  31. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Context-aware systems and methods, location-aware systems and methods, context-aware vehicles and methods of operating the same, and location-aware vehicles and methods of operating the same.
  32. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Context-aware systems and methods, location-aware systems and methods, context-aware vehicles and methods of operating the same, and location-aware vehicles and methods of operating the same.
  33. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Context-aware systems and methods, location-aware systems and methods, context-aware vehicles and methods of operating the same, and location-aware vehicles and methods of operating the same.
  34. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Context-aware systems and methods, location-aware systems and methods, context-aware vehicles and methods of operating the same, and location-aware vehicles and methods of operating the same.
  35. Pombo, Alvaro; Sultan, Karim A.; Haskins, Paul; McGuire, Kevin H.; Zamfir, Adrian, Contextual computing system.
  36. DiPasquo, Daniel, Cross UI platform alerting of security status.
  37. Denton, Guy S.; Lackey, Joshua, Detection of intrusion in a wireless network.
  38. Denton, Guy S.; Lackey, Joshua, Detection of intrusion in a wireless network.
  39. Delany, Shawn P.; Ahmed, Sajeed, Determining a user's groups.
  40. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Determining group membership.
  41. Langen, Anno R.; Connelly, David; Khan, Rao Nasir; Cosmadopoulos, Ioannis; Wilkiewicz, Jaroslaw, Diameter protocol and SH interface support for SIP server architecture.
  42. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  43. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  44. Leonard, Glenda Ann; Eisener, Thane; Craddock, Julian; Rachow, Waldo; Haskins, Paul, Distributed scalable policy based content management.
  45. Leonard, Glenda Ann; Eisener, Thane; Craddock, Julian; Rochow, Waldo; Haskins, Paul, Distributed scalable policy based content management.
  46. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  47. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  48. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  49. Sinn, Richard P., Employing job code attributes in provisioning.
  50. Langen, Anno R.; Khan, Rao Nasir; Beatty, John D.; Cosmadopoulos, Ioannis, Engine near cache for reducing latency in a telecommunications environment.
  51. Xiao, Ji; Lin, Jyh-Han; Smith, Ronald R.; Zhuang, Ruiqiang, Enhanced security using service provider authentication.
  52. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Environment-interactive context-aware devices and methods.
  53. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Environment-interactive context-aware devices and methods.
  54. Monsen, Robert Charles; Mamillaplli, Sudhakar, File system for nonvolatile memory.
  55. Ackaret, Gary R., Form printing solutions web server using a java vending machine for pulling a jetsend form print job from a server and outputting to a device.
  56. Skinner, Craig S.; Wong, William Shu-Woon; Kuhn, Brian Gerald, Generic activation and registration framework for wireless devices.
  57. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  58. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  59. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  60. Langen, Anno R.; Khan, Rao Nasir; Wilkiewicz, Jaroslaw, Hitless application upgrade for SIP server architecture.
  61. Parupudi, Gopal; Reus, Edward F.; Evans, Stephen S.; Goertzel, Mario C., Identity-based context aware computing systems and methods.
  62. Villavicencio, Francisco J., Impersonation in an access system.
  63. Villavicencio,Francisco J., Impersonation in an access system.
  64. Kuhn, Brian Gerald; Skinner, Craig S., Key for a wireless-enabled device.
  65. Salesky, Joseph H.; Madams, Peter, Machine-implemented system and method for providing timed targeted promotional offers to individual payment account users with feedback.
  66. Rieschick, Gary Joel; Breau, Jeremy R.; Doerr, Raymond Robert; Belser, John Eric, Maintaining a common identifier for a user session on a communication network.
  67. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  68. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  69. Ruban,Thomas; Puhl,Alfons; Grimminger,Jochen; Bokaemper,Martin, Method and apparatus for routing in a communication or data network, or in a network of communication and data networks.
  70. Theimer,Wolfgang, Method and device for authenticating a user on a remote server.
  71. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Method and system for detecting viruses on handheld computers.
  72. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  73. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  74. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  75. Byers, Charles Calvin; Lassig, Mark Alan; Miller, Steven Mark; Paulson, William Brohmer; Posthuma, Carl Robert, Method for determining the security status of transmissions in a telecommunications network.
  76. Bouthors,Nicolas, Method of and system for controlling access to contents provided by a contents supplier.
  77. Chack, Michael A., Method of queuing requests to access a communications network.
  78. Denton, Guy S.; Lackey, Joshua, Method, system and program product for detecting intrusion of a wireless network.
  79. Parupudi,Gopal; Evans,Stephen S.; Reus,Edward F., Methods and systems for context-aware policy determination and enforcement.
  80. Morota,Satoru; Urakawa,Yasutaka; Kato,Tatsuya; Ishii,Kenji; Fujita,Masanori, Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method.
  81. Eskin, Eleazar, Mobile computing and communication.
  82. Eskin,Eleazar, Mobile computing and communication.
  83. Tamura, Noriko, Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system.
  84. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  85. Lamb,Richard H.; Guzovsky,Eduard, Network access control using network address translation.
  86. Kawai, Shosaku, Network communication system.
  87. Sinn,Richard P., Obtaining and maintaining real time certificate status.
  88. Ghatare,Sanjay P., Partitioning data access requests.
  89. Takuya Horie JP; Masaaki Yanagisawa JP, Personal digital assistant and information transmission apparatus for use with the personal digital assistant.
  90. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Policies for modifying group membership.
  91. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  92. Chéné, Marc; Peyton, Liam; McGuire, Kevin, Policy-driven mobile forms applications.
  93. Bank, Judith H.; Bradley, Lisa M.; Quirk, Aaron J.; Sun, Lin, Protecting mobile devices from malware.
  94. Kuhn, Brian Gerald, Providing user interface data on a mobile computing device.
  95. Pedersen,Claus; Hansen,Lars Bohn, Radio terminal with browser.
  96. Kuhn, Brian Gerald; Skinner, Craig S., Registration of a mobile computing device for a data service on a wireless network.
  97. Kuhn, Brian Gerald; Skinner, Craig S., Registration of a mobile computing device for a service on a wireless network.
  98. Jacob, Richard; Kussmaul, Timo; Laertz, Stephan, Remote portlet consumer with enhanced resource URL processing.
  99. Skinner, Craig S., Requesting a user account for services.
  100. Delany,Shawn P.; Ahmed,Sajeed, Runtime modification of entries in an identity system.
  101. Langen, Anno R.; Mehra, Vinod; Khan, Rao Nasir, SIP and HTTP convergence in network computing environments.
  102. Langen, Anno R.; Kramer, Reto; Connelly, David; Khan, Rao Nasir; Beatty, John; Cosmadopoulos, Ioannis; Cheenath, Manoj, SIP server architecture fault tolerance and failover.
  103. Spearman, Anthony C., Secure and seamless wireless public domain wide area network and method of using the same.
  104. Yamasaki, Yuji; Pu, Samuel; Chang, Pender; Lee, Andrew; Chen, Descartes; Yang, Jill; Yu, Charles; Chen, Vincent; Chang, Jayce, Security management device, communication system, and access control method.
  105. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  106. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  107. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  108. Lee, Chi-Cheng; Tsang, Andy M.; Remahl, Thomas B., Support for multiple data stores.
  109. Connelly, David, System and method for a SIP server with offline charging.
  110. Maguire, Michael; Pathiyal, Krishna K., System and method for an extendable mobile communications device user interface.
  111. Maguire, Michael; Pathiyal, Krishna K., System and method for an extendable mobile communications device user interface.
  112. Maguire, Michael; Pathiyal, Krishna K., System and method for an extendable mobile communications device user interface.
  113. Maguire, Michael; Pathiyal, Krishna K., System and method for an extendable mobile communications device user interface.
  114. Maguire,Michael; Pathiyal,Krishna K., System and method for an extendable mobile communications device user interface.
  115. Jakobsson, Bengt-Inge; Jansson, Andreas E., System and method for controlling access to legacy push protocols based upon a policy.
  116. Byrnes, Nigel J.; Poll, Leonard H., System and method for controlling an apparatus having a dedicated user interface from a browser.
  117. Leppinen,Mika, System and method for effective use of air link between mobile stations and gateway servers.
  118. Kramer, Reto; Langen, Anno R., System and method for managing communications sessions in a network.
  119. Kaplan,Diego; Kirbas,Bilhan, System and method for mobile configuration.
  120. Nguyen, Kevin V.; Martino, Monica Rose, System and method for providing connectivity between two different networks using different protocols.
  121. Knowles, Michael; Quinn, Liam; Bocking, Andrew; Moser, Karen; Tiegs, Mark; Scott, Sherryl Lee Lorraine, System and method for provisioning a remote resource for an electronic device.
  122. Knowles, Michael; Quinn, Liam; Bocking, Andrew; Moser, Karen; Tiegs, Mark; Scott, Sherryl Lee Lorraine, System and method for provisioning a remote resource for an electronic device.
  123. Knowles, Michael; Quinn, Liam; Bocking, Andrew; Moser, Karen; Tiegs, Mark; Scott, Sherryl Lee Lorraine, System and method for provisioning a remote resource for an electronic device.
  124. Knowles, Michael; Quinn, Liam; Bocking, Andrew; Moser, Karen; Tiegs, Mark; Scott, Sherryl Lee Lorraine, System and method for provisioning a remote resource for an electronic device.
  125. Cox, Brian R.; Haagensen, Brandt; Kim, Do, System and method for remote maintenance of handheld computers.
  126. Wang, Kuansan, System and method for selective audible rendering of data to a user based on user input.
  127. Breuer, Matthias; Boerries, Marco; Meyer, Markus; Schulz, Torsten; Srinivasan, Venkatachary, System and method for servicing a user device.
  128. Svensson, Jan Thomas, System and method for shaping traffic.
  129. Wikman, Johan, System and method for third party specified generation of web server content.
  130. Tsao, Sheng Tai (Ted), System and method for wireless device access to external storage.
  131. Kaplan,Diego; Kirbas,Bilhan, System and method for wireless device configuration.
  132. Knauerhase, Robert C.; Robinson, Scott H., System for device-access policy enforcement.
  133. White, Russell W.; Imes, Kevin R., System to communicate media.
  134. White, Russell W.; Imes, Kevin R., System to communicate media.
  135. Chan, Chung, System to support mobile visual communications.
  136. Zhigang,Qu, System, apparatus, and method for providing a mobile server.
  137. Kouznetsov,Victor; Libenzi,Davide; Fallenstedt,Martin; Palmer,David W.; Pak,Michael C., System, method and computer program product for equipping wireless devices with malware scanning capabilities.
  138. Cherry, Darrel D.; Clough, James, Systems and methods for automatically configuring a client for remote use of a network-based service.
  139. Eatough,David Arthur, Techniques for storing data on message queuing middleware servers without registration of the sending application.
  140. Teng, Joan C., Template based workflow definition.
  141. Strong, Jack B; Kleid, Jonathan J; Patel, Vivek; Champlin, David, Translating tabular data formatted for one display device to a format for display on other display device.
  142. Tendjoukian, Meher; Boerries, Marco; Srinivasan, Venkatachary; Breuer, Matthias; Schulz, Torsten, Universal calendar event handling.
  143. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Virus detection system, method and computer program product for handheld computers.
  144. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Virus detection system, method and computer program product for handheld computers.
  145. Sarkisian,Drew, Wireless communications invisible proxy and hooking systems and methods.
  146. Spearman, Anthony C; Washburn, Ernest Russell, Wireless provisioning device.
  147. Spearman,Anthony C.; Tompkins,Andrew E., Wireless provisioning device.
  148. Kuhn, Brian Gerald, Wireless services over different carrier networks.
  149. Acosta,Edward; Thompson,David, Wireless services provider network system and method.
  150. Thompson, David; Acosta, Edward, Wireless services provider network system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로