Abstract:
A system, method, and computer program for providing an application catalog of served applications and data to wireless devices on a wireless network seeking to download the applications and/or data. The application catalog is displayable to a wireless device across the wireless network, and the application catalog lists at least a plurality of applications and/or data downloadable to wireless devices and the application catalog is optimized based upon predetermined criteria such that the preferred application and/or data to be downloaded by a wireless device is initially displayed to a wireless device attempting to access the application catalog.
Abstract:
The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.
Abstract:
A system, method, and computer program for providing an application catalog of served applications and data to wireless devices on a wireless network seeking to download the applications and/or data. The application catalog is displayable to a wireless device across the wireless network, and the application catalog lists at least a plurality of applications and/or data downloadable to wireless devices and the application catalog is optimized based upon predetermined criteria such that the preferred application and/or data to be downloaded by a wireless device is initially displayed to a wireless device attempting to access the application catalog.
Abstract:
A method for operating a device to protect an application from unauthorized operation is provided. The application will fail to operate on the device when the device is defined outside a selected operating region. The method includes transmitting the selected operating region for the application, and receiving the application and a geographic identifier associated with the application. The geographic identifier is configured to identify the selected operating region wherein the application will operate on the device. The method further includes transmitting a request to execute the application on the device. The request includes the geographic identifier. Further included in the method is receiving a code. The code prevents an execution of the application on the device if the code is a disable code. The disable code indicates that the device is operating outside the selected operating region. An apparatus for content protection in a wireless network is also provided.
Abstract:
Methods, devices, systems and computer program products are described for implementing on a communication device customized caller ID and remote functional management of a communication device via shared secret exchange between calling and called parties. Customized caller ID provides for a calling party to identify themself regardless of the device they are using to place to call. Other remote functional management, such as call priority tagging, provides for the calling party to prioritize the call or otherwise customize a call ID message to the called party. By exchanging shared secrets amongst the calling and called parties, the customized caller ID method and remote functional management are secure, thereby eliminating the likelihood of unauthorized tampering by unknown parties. Shared secret exchange also provides for authorized callers to remotely access and manage the communication device, such as, for example, to remotely lock down or place the communication device in an off state.