SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK
    2.
    发明申请
    SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK 审中-公开
    用于保护无线网络内容的系统和方法

    公开(公告)号:US20090183264A1

    公开(公告)日:2009-07-16

    申请号:US12329273

    申请日:2008-12-05

    IPC分类号: H04L9/32

    摘要: A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license.

    摘要翻译: 公开了提供对用户设备内的内容的访问的方法,并且可以包括确定内容的位置,确定内容是否在允许区域内,以及选择性地提示用户购买访问内容的许可。 在特定方面,当内容不在允许的区域内时,可以提示用户购买许可以访问内容。 如果购买许可证,则可能允许用户访问该内容。 许可证可能是无限制许可证,有限许可证或转让许可证。

    SYSTEMS AND METHODS FOR STREAMLINING OVER-THE-AIR AND OVER-THE-WIRE DEVICE MANAGEMENT
    5.
    发明申请
    SYSTEMS AND METHODS FOR STREAMLINING OVER-THE-AIR AND OVER-THE-WIRE DEVICE MANAGEMENT 审中-公开
    用于流动空气和电线设备管理的系统和方法

    公开(公告)号:US20110010383A1

    公开(公告)日:2011-01-13

    申请号:US12551561

    申请日:2009-08-31

    摘要: Methods and systems streamline remote device management by eliminating the need to download device configuration data when no configuration changes have been made since the last device management session. A device may record data enabling it to determine whether configurations have changed since a last session with a device management server. Device management servers may record configurations of devices. While initiating a device management session, a device can inform the device management server whether an intervening configuration change has occurred. If no intervening configuration changes have occurred, the device management server can forgo obtaining the device's configuration data, saving communication time and bandwidth. If an intervening configuration change has occurred, the remote device may inform the server of the URI of the changed configuration item, enabling the server to request download of just the changed item. Alternatively, the remote device may provide changed configuration data to the device management server.

    摘要翻译: 方法和系统通过在上一次设备管理会话后没有进行配置更改时,不需要下载设备配置数据来简化远程设备管理。 设备可以记录数据,使其能够确定自从与设备管理服务器的最后一次会话以来配置是否已更改。 设备管理服务器可以记录设备的配置。 在启动设备管理会话时,设备可以通知设备管理服务器是否发生了介入配置更改。 如果没有发生干预配置更改,设备管理服务器可以放弃获取设备的配置数据,节省通信时间和带宽。 如果发生了介入配置更改,则远程设备可以向服务器通知改变的配置项的URI,使得服务器仅请求下载更改的项目。 或者,远程设备可以向设备管理服务器提供改变的配置数据。

    APPARATUS AND METHODS FOR PROVIDING AUTHORIZED DEVICE ACCESS
    7.
    发明申请
    APPARATUS AND METHODS FOR PROVIDING AUTHORIZED DEVICE ACCESS 有权
    提供授权设备访问的装置和方法

    公开(公告)号:US20100269156A1

    公开(公告)日:2010-10-21

    申请号:US12641305

    申请日:2009-12-17

    IPC分类号: H04L9/32

    摘要: Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.

    摘要翻译: 描述了用于向存取器设备提供访问凭证以与被访问设备上的设备资源进行交互的方法,设备和系统。 具有与被访问者设备或链接的从属授权实体的信任关系的授权实体生成访问凭证。 访问凭证包括修改检测指示符,至少一个访问权限和访问者公钥。 至少一个访问权限对应于接入设备上的至少一个设备资源。 授权实体将访问凭证转发到访问器设备,该设备将访问凭证呈现给受访者设备进行认证。 一旦被认证,接入设备允许对一个或多个设备资源的访问,并且控制请求以确保它们在至少一个访问权限的范围内。