Supercharge Your Innovation With Domain-Expert AI Agents!

Method and arrangement relating to a communication device

A technology of equipment and equipment models, applied in security devices, wireless communications, computer security devices, etc., can solve the problems that third parties cannot propose MIDlets, and there is no safe way

Inactive Publication Date: 2011-02-23
SONY ERICSSON MOBILE COMM AB
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. The MIDlet is in its original state (i.e. it has not been modified by third parties)
[0009] 2. Ensure that a (malicious) third party cannot propose a MIDlet that differs from the original MIDlet
In general, this is satisfactory; however, it may not be satisfactory in all situations, for example one of which is when an application developer wishes to restrict the use of one or more applications to a specific phone model or operator
Currently, there is no secure way to do this

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and arrangement relating to a communication device
  • Method and arrangement relating to a communication device
  • Method and arrangement relating to a communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the following, the invention will be illustrated with reference to a mobile telephone operating in a telecommunications network. A mobile phone is usually associated with a subscriber and a specific phone number using a SIM card, which is an active (smart) card inserted into the phone. However, a built-in special memory can also be used for the same purpose. The mobile phone is provided with a reader for obtaining information from the ISM card, and can also write information to the card (eg using the card as memory for storing telephone numbers etc. as is known in the art). Applications can be downloaded to the phone and run on a special platform (a so-called virtual machine, usually implemented as a Java environment). The present invention does not exclude any kind of third-party applications like native code, and the phone can be an open phone based on any operating system, which can implement mechanisms similar to the Java environment. Also, the present inventio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for handling applications in a device (10) by associating an application signed by a domain certificate (16, 17) to a pre-defined entity in a device. The device comprises: a module reader for reading subscriber identity, a virtual machine (14) for running at least one applicat ion, a memory (11, 12) containing a root certificate (16 - 19), the method comprising: using a data set for aggregating a sub set of data, modifying portion of said data set such that said portion includes reference to said entity. The invention also relates to a device for implementing the method.

Description

technical field [0001] The present invention relates to communication devices, and in particular to the management of applications executable on such devices. Background technique [0002] Functions of electronic devices such as mobile phones, PDAs, etc. can be enhanced or additional functions introduced by adding applications for executing specific instructions. [0003] With MIDlets (MIDlet is a term for applications in the Java environment), applications are enabled by allowing applications to access devices through interfaces. Control over the device may depend on the source of the application. The source is verified and validated by a signature and certificate chained to a root certificate in the device. Depending on the application, the manufacturer or operator can be the source of the application. [0004] The fact that the MIDlet is signed by e.g. the author proves two problems: [0005] 1. The author actually creates the MIDlet, [0006] 2. The MIDlet is in its...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04W12/08G06F21/51H04W88/02H04W12/35
Inventor 马克斯·利维尔斯特凡·安德森
Owner SONY ERICSSON MOBILE COMM AB
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More