发明名称 Security key based authorization of transceivers in wireless communication devices
摘要 Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method of operating a wireless communication is provided. In security circuitry of the wireless communication device, the method includes receiving a request from processing circuitry for an application to access a first communication network with a first communication transceiver, and processing the request and a security key to authorize the application to use the first communication transceiver to access the first communication network. In the first communication transceiver, the method includes exchanging communications over the first communication network for the application responsive to the authorization. In the security circuitry, the method also includes identifying that the application is using a second unauthorized communication transceiver, and in response, terminating the authorization for the application to use the first communication transceiver to access the first communication network.
申请公布号 US8965343(B1) 申请公布日期 2015.02.24
申请号 US201314018857 申请日期 2013.09.05
申请人 Sprint Communications Company L.P. 发明人 Paczkowski Lyle Walter;Schlesener Matthew C.;Parsel William M.;Persson Carl Joseph
分类号 H04M11/00;H04W12/04 主分类号 H04M11/00
代理机构 代理人
主权项 1. A method of operating a wireless communication device comprising security circuitry that stores one or more security keys, processing circuitry that executes applications, and a plurality of communication transceivers to communicate over a plurality of communication networks, the method comprising: in the security circuitry, receiving a request from the processing circuitry for an application to access a first communication network with a first communication transceiver; in the security circuitry, processing the request and a security key to authorize the application to use the first communication transceiver to access the first communication network; in the first communication transceiver, exchanging communications over the first communication network for the application responsive to the authorization; and in the security circuitry, identifying that the application is using a second unauthorized communication transceiver, and in response, terminating the authorization for the application to use the first communication transceiver to access the first communication network.
地址 Overland Park KS US