Method and system for secure activation of web clipping applications

ABSTRACT

The invention disclosed is a method and system for the secure activation of web clipping applications upon a portable information device (PID). In an embodiment of the invention, the method first provides for preventing a user from accessing web clipping applications that are installed on the PID and located within installed software. The method then continues with a user registering the PID with a proxy server by using a registration application within the installed software. Upon the authorized registration of the PID with the proxy server, the web clipping applications are revealed to the user, and with the web clipping applications thus revealed, the user may retrieve information from the proxy server through the implementation of any of the web clipping applications. The invention further provides for a method and system for the secure access of a proxy server by a PID such that the recurring step of device identification can be eliminated. This provides for reduced overhead in recurring data transmissions and affords more efficient communications.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of application Ser. No.09/727,908, entitled “METHOD AND SYSTEM FOR SECURE ACTIVATION OF WEBCLIPPING APPLICATIONS”, filed Nov. 30, 2000, to be issued as U.S. Pat.No. 7,237,269, and assigned to the assignee of the present application.The subject matter in the above-identified and commonly ownedapplication is incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to wireless communications and softwareactivation. More particularly, the present invention pertains to amethod and system for the secure activation of web clipping applicationsupon handheld organizers and other portable information devices (PID's).

BACKGROUND OF THE INVENTION

The use and presence of handheld organizers and other such compact andlightweight portable information devices (PID's), including laptopcomputers, cellular phones, and pagers, has burgeoned in recent years.The availability of these items to the average consumer has placed manyinto use and into all aspects of one's business and daily life. Thepresence of these devices has become common in the home and office, onthe streets, in shops and restaurants, and in places of travel.

With the growth in usage of such PID's has come the desire to providethese devices with access to the Internet. Handheld organizers can beconnected to personal computers (PC's) that have Internet access andinformation can be downloaded from the Internet and into the handhelddevice, and because of the portability of these handheld devices, thewireless access to the Internet is often desired.

Recently, handheld devices have been implemented with radio frequency(RF) communications ability. Wireless transceivers with short to mediumrange communications ability are being incorporated into the handhelddevices. In conjunction with the incorporation of transceivers withinthese PID's, various wireless communications protocols, such as theBluetooth, WAP (Wireless Application Protocol) and I.E.E.E. (Instituteof Electrical and Electronics Engineers) 802.11 protocols, have beendeveloped to provide standardized methods for establishing low-to-mediumpower, short-to-intermediate range radio frequency (RF) communicationsbetween RF enabled devices.

With the establishment of a capability for handheld organizers tocommunicate with the Internet using modems or wireless connections, atechnological need to efficiently manage the data flow between thehandheld device and the Internet has arisen. Because the Internet andInternet web-sites have been structured for data communications anddelivery to desktop systems and servers, the volume of data and thedelivery of the data may often be overwhelming to the handheld deviceand the associated data delivery system. The data display and datastorage components within handheld devices are relatively small andlimited when compared with those within desktop systems. Additionally,the ability to transfer data wirelessly is presently significantly morebandwidth limited than with the hardline communications of the Internet.

To address the needs of handheld devices in accessing the Internet, webclipping processes have been developed. Upon request of a handhelddevice, an Internet server acts as a proxy for the handheld device andgathers web-site data. In so doing, applications upon the proxy serverclip the web-site content down to the core information upon the site,such as the news headlines and text within a news web-page. The coreinformation is then transferred to the handheld device. Web clippingapplications resident upon the handheld device effect the essentialframework of the clipped web-site and incorporate the core informationclipped from the web-site. The result is a condensed version of theweb-site that is displayable upon the relatively small screen of thehandheld device.

In wireless communications, data transfer can be relatively expensiveand time consuming, therefore it is desirable to minimize the overheadin data transfer. Graphics and logos not essential to relaying theinformative content of a web-site are removed during the web-siteclipping process. It is also of benefit to remove other data commonlytransferred in the communications between computing devices when it isnot of an informative nature to the user.

One such non-informative data entity is the device and/or useridentification information that is commonly transferred from a clientdevice to a server device. This information is commonly transferred atevery instance of a client device acquiring access to a server devicefor information. This data transfer burden becomes substantial,especially in a cumulative sense, when data bit transfer costs are highas they often are in wireless communications systems. Eliminating thisidentification information transfer would significantly improve theoverall communications efficiency with regard to informative content insuch wireless communications.

There remain, however, strong needs for retaining secure access to theservices of the proxy server, whether accessed by communications line orwirelessly. Capacity planning requires the ability to track the numberof users that are utilizing the proxy server services. Services that areoften provided free of charge during the early stages of theestablishment of a service market are often later subject tosubscription charges and an ability to restrict access to authorizedusers becomes necessary.

Therefore, there is a need for a method and system for the secureactivation of web clipping applications upon handheld organizers andother portable information devices (PID's) that reduce or eliminate thedata transmission overhead associated with device log-in activities.

SUMMARY OF THE INVENTION

Accordingly, embodiments of the invention disclosed are directed at amethod and system for the secure activation of web clipping applicationsupon a portable information device (PID). Embodiments further providefor a method and system for the secure access of a proxy server by a PIDsuch that the recurring step of device identification (upon eachcommunication) can be eliminated, thus allowing for reduced overhead inrecurring data transmissions and affording more efficientcommunications.

In an embodiment of the invention, the method for the secure activationof web clipping applications upon a PID begins with the loading of asoftware package onto a PID where the software package comprises aregistration application and multiple hidden web clipping applications(WCA's). The method then follows with the registering of the PID upon aproxy server by the implementation of the registration application. Uponthe registration of the PID, the PID accepts a command from the proxyserver to reveal the previously hidden web clipping applications.Without the authorized registration of the PID, the web clippingapplications are not activated and remain hidden, and the PID is unableto access the proxy server.

In a further embodiment the method is performed such that theacquisition and loading of the software package onto the PID isperformed by the PID by the downloading of the software package from theproxy server via the Internet and is performed without cost and withoutrestriction to the user of the PID.

In an embodiment of the invention as a method for secure wireless accessof a proxy server by a PID, the need for recurring device identificationis eliminated. In the embodiment, the access of data and services fromthe proxy server may be performed without cost to the user and withoutregistration or identification of the device or user during the accessof the proxy server. In this embodiment, the PID need only be identifiedonce, that is during the registration process. Following theregistration of the PID and revealing of the WCA's, no further deviceidentification or registration is necessary yet the usage of the WCA'sremains secure with the registered PID.

The method is well suited for preventing the unauthorized access to theproxy server from modem based or wireless clients while improving theefficiency of the communications, especially for wireless users.

BRIEF DESCRIPTION OF THE DRAWINGS

The operation of this invention can be visualized by reference to thefollowing drawings described below.

FIG. 1 illustrates a block diagram of the system for secure wirelessaccess of a proxy server by a portable information device (PID) whereinrecurring device identification is eliminated, in accordance with anembodiment of the invention.

FIG. 2 is a block diagram depicting an exemplary portable informationdevice upon which the invention may be practiced in accordance with anembodiment of the invention.

FIG. 3 is a flow diagram depicting a method for the secure activation ofweb clipping applications upon a portable information device inaccordance with an embodiment of the invention.

FIG. 4 is a flow diagram depicting a method for secure wireless accessof a proxy server by a portable information device (PID) whereinrecurring device identification is eliminated, in accordance with anembodiment of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Described in detail below is a method and apparatus for the secureactivation of web clipping applications upon handheld organizers andother portable information devices (PID's). In the followingdescription, for purposes of explanation, numerous specific details areset forth in order to provide a thorough understanding of the presentinvention. It will be obvious, however, to one skilled in the art thatthe present invention may be practiced without these specific details.In other instances, well-known structures and devices are shown in blockdiagram form in order to avoid obscuring the present invention.

The embodiments of the invention address the needs of handheld devicesin accessing the Internet and particularly in the usage of web clippingprocesses in a method and system where the overhead in data transfer isreduced. The embodiments provide for a system where a client handhelddevice may be authorized for access and use of the web clipping servicesof a proxy server upon a single registration event. The embodiments ofthe invention allow for a continued secure access of a handheld deviceto a proxy server but without the continued transfer of device and/oruser identification information between the client device and the serverdevice, and thus significantly improves the overall communicationsefficiency with regard to informative content in such wirelesscommunications. The inventive system retains secure access to theservices of the proxy server so that capacity planning and subscriptioncharging may be effected.

FIG. 1 illustrates a block diagram of the system for secure wirelessaccess of a proxy server by a portable information device (PID) whereinrecurring device identification is eliminated, in accordance with anembodiment of the invention.

In FIG. 1 an embodiment is shown where handheld devices 120 communicatewith a proxy server 110 in various ways. Exemplary communications modesshown are by access via modem 122 to the Internet 130, by access viamodem 122 to the proxy server 110 directly, through a connection to apersonal computer 125 where the computer accesses the proxy server 110directly or through the Internet 130, or directly via RF communications.The RF communications mode of communication between the handheld deviceand the proxy server may employ the Mobitex radio communicationsnetwork.

Proxy server 110 may access any number of multiple web-sites 140 via theInternet 130. In the embodiment any handheld device 120 loads a softwarepackage containing a registration application and multiple hidden webclipping applications. The handheld device registers its identity withthe proxy server 110 by implementing the registration application. Proxyserver 110, upon successfully registering handheld device 120, commandsthe handheld device to reveal the web clipping applications hiddenwithin the loaded software package. With the web clipping applicationsrevealed and available to a user of handheld device 120, requests forweb-site data may be made upon the handheld device 120 by activating anyof the web clipping applications. The activation of a WCA causes abrowser on the handheld device 120 to request web-site data from theproxy server 110. Proxy server 110 then accesses data on a web-site 140corresponding to the particular WCA activated. Proxy server 110 clipsthe data from web-site 140 down to a form and content manageable by thehandheld device 120. Proxy server 110 transmits the clipped data tohandheld device 120 via RF communications. Upon receipt of the clippeddata, the WCA upon handheld device 120 incorporates the clipped datainto a web-page framework stored within the WCA and displays the resultfor the user.

FIG. 2 illustrates an exemplary configuration of a portable informationdevice (PID) 800 upon which the present invention may be implemented orpracticed. It is appreciated that the PID 800 of FIG. 2 is exemplaryonly and that the present invention can operate upon a number ofdifferent information devices and computer systems, portable andstationary. PID 800 of FIG. 2 includes an address/data bus 801 forconveying digital information between the various components, a centralprocessor unit (CPU) 802 for processing the digital information andinstructions, a main memory 804 comprised of random access memory (RAM)for storing the digital information and instructions, a read only memory(ROM) 811 for storing information and instructions of a more permanentnature.

In addition, PID 800 may include a data storage device 807 (e.g., amagnetic, optical, floppy, or tape drive) and a data communicationsinput/output port 850. A transmitter 830 and a receiver 840 areadditionally included within the PID 800 shown. It should be noted thatthe client program for performing the functions of the invention can bestored either in main memory 804, data storage device 807, or in anexternal storage device. Devices which may be coupled to PID 800 includea display device 821 for displaying information to a PID user, analphanumeric input device 822 (e.g., a keyboard), and a cursor controldevice 823 (e.g., mouse, trackball, light pen, etc.) for inputting dataand selections. A modem 851 may also be coupled to the PID 800 forproviding hardline communications to the Internet or directly to a proxyserver.

In another embodiment, the invention is an apparatus providing for thesecure activation of web clipping applications and secure wirelessaccess of a proxy server where recurring device identification iseliminated. The apparatus first comprises a means for loading a softwarepackage onto the apparatus where the software package includes aregistration application and multiple hidden web clipping applications.The apparatus also comprises a means for registering the apparatus bythe implementation of the registration application. Additionally, theapparatus comprises a means for accepting a command to reveal the webclipping applications upon the successful registration of the apparatus.

In another embodiment of the invention, a computer-usable medium, suchas ROM 811, RAM 811, and/or data storage device 807 of FIG. 2, hasstored thereon computer-readable code for causing a computer, such asprocessor 802 of FIG. 2, or portable information device, e.g. PID 800described in FIG. 2, to provide secure activation of web clippingapplications upon a portable information device. The code also enablesthe device to interact with a proxy server such that the secure accessof the proxy server by the PID is achieved and where recurring deviceidentification is eliminated.

In an embodiment of the invention the components of PID 800 of FIG. 2are resident within a device, such as a handheld organizer, for whichsecure activation of web clipping applications is desired, and thecomputer-readable code described above is downloaded to acomputer-usable medium within the device so to allow it to respond assuch a device.

In another embodiment of the invention, a device such as PID 800 has thecomputer-readable code described above stored on a computer-usablemedium within the device a priori, and then this device is attached to asecond device, such as a cellular phone, for which secure activation ofweb clipping applications is desired.

The embodiments of the invention as a method for the secure activationof web clipping applications upon a portable information device aredescribed below. Additionally described are the embodiments of theinvention as a method for the secure access of a proxy server by a PIDsuch that the recurring step of device identification can be eliminated.The resulting method thus allows for reduced overhead in recurring datatransmissions and affords more efficient wireless and hardlinecommunications.

FIG. 3 is a flow diagram depicting a method 300 for the secureactivation of web clipping applications upon a portable informationdevice in accordance with an embodiment of the invention. Method 300begins with step 310 where a software package containing a registrationapplication and multiple hidden web clipping applications is loaded ontoa handheld device. The device may be one of any type of appropriatelyenabled portable information devices including handheld organizers, cellphones, and laptop computers. The software package may be such that theweb clipping applications are hidden within the registrationapplication. However constructed, the software package is such that theweb clipping applications are not apparent or accessible by the user atthis step in the method. This prevents the user from gainingunauthorized access of the proxy server and its services from thehandheld device.

The loading of the software package onto the handheld device in step 310may be performed by various means. In example, the handheld device maybe connected to a personal computer and the software downloaded frompermanent storage media, such as a floppy disk or CD (compact disk).Alternatively, the software may be downloaded to the personal computervia a modem connection to the Internet and thereafter loaded onto thehandheld device. Or for example, the software may be loaded onto thehandheld device via a peripheral device attached directly to thehandheld device.

For any method for loading the software package onto the handhelddevice, the method 300 provides that step 310 need not require acontrolled access to the software or software media for maintainingsecure activation of the web clipping applications upon the handhelddevice, nor for maintaining secure access of a proxy server by thehandheld device where recurring device identification is eliminated.

The method 300 of FIG. 3 follows with step 320 where the handheld deviceis registered with a proxy server so to authorize the device to accessand use the web clipping services of the proxy server. This registrationprocess is performed through the implementation of the registrationapplication loaded onto the handheld device in step 310. Thisregistration process may be performed by the handheld devicecommunicating directly to the proxy server wirelessly or via theInternet.

The method 300 of FIG. 3 concludes with step 330 where upon theregistration of the handheld device with the proxy server, the proxyserver commands the handheld device to reveal the hidden web clippingapplications loaded onto the device in step 310. This step may beperformed by the proxy server issuing commands to the handheld device inthe context of the registration application. Upon the successfulregistration of the handheld device, the proxy server issues commands tothe registration application to reveal the web clipping applicationspresent on the handheld device, but hidden and previously inaccessibleby the user of the handheld device. This step may include the unpackingand loading of the web clipping applications into memory and/orpermanent storage on the handheld device from a compressed and/orencrypted form.

Another exemplary manner for the proxy server to effect the step 330 andcommand the handheld device to reveal the web clipping applicationscould be where the proxy server issues activation codes to the WCA'shidden on the handheld device. Once the activation codes are obtained,the WCA's complete an implementation routine on the handheld device andmake their presence and accessibility known to the user, such as by thedisplay of icons on the display screen of the handheld device.

It is appreciated that prior to the device registration step 330 andwithout completion of step 330, the user is unable to gain access to theproxy server and its services by using the handheld device. The webclipping applications are necessary for activating the browser on thePID which is necessary for gaining access to the proxy server. Until theWCA's are revealed, the user of the handheld device has no means forissuing commands to the proxy server and therefore access to the proxyserver is unavailable.

Once the WCA's are revealed and made accessible to the user, no furtherdevice identification or registration steps are necessary for the deviceto have repeated access to the proxy server for gaining the services andclipped web-site data from the proxy server. This aspect of theinvention is discussed further below in reference to FIG. 4.

FIG. 4 is a flow diagram depicting a method 400 for secure access of aproxy server by a portable information device wherein recurring deviceidentification is eliminated, in accordance with an embodiment of theinvention. The method 400 begins with steps 410, 420, and 430 which arecomparable to steps 310, 320, and 330 of method 300 of FIG. 3. In method400, step 410 provides for the loading of a software package containinga registration application and multiple hidden web clipping applicationsonto a handheld device. Step 420 follows and provides for theregistration of the handheld device with the proxy server forauthorizing use of the proxy server's web clipping services. Thisregistration process is effected by the implementation of theregistration application loaded onto the handheld device in step 410.Step 430 then follows and is comprised of the proxy server, upon thesuccessful registration of the handheld device, commanding the handhelddevice to reveal the hidden web clipping applications loaded onto thehandheld device in step 410.

The method 400 then continues thereafter and provides for the secureaccess of the proxy server by the handheld device wherein recurringdevice identification is eliminated. In step 440 the proxy serveraccepts a browser command for web-site data from the handheld device.The browser command is initiated by the activation of one of the webclipping applications. In one variation of the method, the browser isunavailable for direct application by the user of the handheld deviceand can be implemented only through the activation of any of the webclipping applications.

In step 450, the proxy server accesses the web-site data per the browsercommand. In one embodiment, each web clipping application corresponds toa particular web-site and the activation of a particular web clippingapplication results in the access of data from a particular web-site bythe proxy server.

Next in step 460 of FIG. 4, the proxy server clips the web-site data toa form and content acceptable by the handheld device. In the clippingprocess, the basic information content and significant text are gleanedfrom the web-site. Logos and graphics may and are often left behind. Thedata retained is of a form and content that can be displayed within theweb-page framework of the particular web clipping application activatedon the handheld device.

Following in step 470, the proxy server transmits the clipped web-sitedata to the handheld device. The web clipping application may thenreceive the clipped data and incorporate it into the web-page frameworkof the web clipping application. The secure access of the proxy serverby the handheld device is thus complete at the completion of step 470.Further steps provide for the display of the received data and thefurther access of the proxy server where the recurring deviceidentification is eliminated.

In step 480, the web clipping application displays the received clippeddata upon the handheld device. The web clipping application may providevarious web-page frameworks for the display of the clipped data,depending on the type of clipped data received.

Step 490 provides for a reaccess of the proxy server by returning tostep 440 or to an end to the method. In a return to step 440, a newbrowser command is issued to the proxy server through the activation ofa web clipping application upon the handheld device. In so doing, nodevice identification is needed and thus this common necessity formaintaining secure access to a proxy server is eliminated.

Hence, a method and system for the secured activation of web clippingapplications upon handheld organizers and other portable informationdevices is disclosed. The foregoing descriptions of specific embodimentsof the present invention have been presented for purposes ofillustration and description. They are not intended to be exhaustive orto limit the invention to the precise forms disclosed, and obviouslymany modifications and variations are possible in light of the aboveteaching. The embodiments were chosen and described in order to bestexplain the principles of the invention and its practical application,to thereby enable others skilled in the art to best utilize theinvention and various embodiments with various modifications as aresuited to the particular use contemplated. It is intended that the scopeof the invention be pre-defined by the claims appended hereto and theirequivalents.

1. In a portable information device (PID) having previously installedsoftware therein for accessing a server, a method comprising the stepsof: a) preventing a user from accessing web applications that arepreviously installed on said PID and located within said installedsoftware; b) said user registering said PID with said server using aregistration application of said installed software; and c) uponauthorized registration of said PID with said server, allowing said webapplications to be made available for use by said user and otherwisepreventing access of said web applications by said user.
 2. The methodof claim 1 wherein said PID comprises handheld organizers, cellularphones, laptop computers, and pagers.
 3. The method of claim 1 whereinsaid step a) of preventing a user from accessing web applications iscomprised of: preventing a user from accessing web applications that areinstalled on said PID and located within said installed software byhiding said web applications within said installed software until suchtime that said device is registered with said server.
 4. The method ofclaim 3 wherein said step c) of allowing said web applications to bemade available is comprised of: upon authorized registration of said PIDwith said server, revealing said web applications to said user andotherwise preventing access of said web applications by said user. 5.The method of claim 1 further comprising the step of: d) said userimplementing at least one of said web applications to access andretrieve information from a web-site via said server.
 6. The method ofclaim 5 wherein said step d) of said user implementing at least one ofsaid web applications to access and retrieve information is comprised ofsteps: d1) said user implementing at least one of said web applications;d2) said at least one web clipping application commanding a browserapplication within said installed software to seek web-site dataassociated with said at least one web application; d3) said browseraccessing said server and requesting data from said web-site associatedwith said at least one web application; and d4) said PID receiving saiddata requested by said browser from said proxy server.
 7. The method ofclaim 5 wherein said step d) of said user implementing at least one ofsaid web applications to access and retrieve information is performedwithout registration of said PID during said accessing and without atransfer of user authorization information.
 8. The method of claim 1wherein said installed software upon said PID is a result of a steppreceding said step a) of preventing a user from accessing webapplications, said step preceding comprising: downloading said softwarefrom said proxy server onto said PID.
 9. A method for secure access of aserver by a portable information device (PID) wherein recurring deviceidentification is eliminated, comprising the steps of: a) loading asoftware package onto said PID wherein said software package comprises aregistration application and multiple hidden web applications; b)registering said PID by the implementation of said registrationapplication by a user; c) upon said registering said PID, commanding bysaid proxy server to said PID to reveal said web applications; d)initiating a browser command for data from said PID, wherein saidinitiating is a result of an activation by said user of at least one ofsaid revealed web applications; and e) transmitting said data to saidPID.
 10. The method of claim 9 further comprising the steps of: d1)accessing data on a web-site corresponding to said at least one of saidrevealed web applications; and d2) viewing content on said web-site toselect data acceptable to said PID.
 11. The method of claim 9 whereinsaid step a) of loading a software package onto said PID is comprised ofthe step of: downloading a software package from said server via theInternet onto said PID.
 12. The method of claim 9 wherein said step ofloading a software package onto said PID is without cost to said userand without restriction to acquirement of said software package by saiduser.
 13. The method of claim 9 wherein said web applications allow auser of said PID to access data and services on a server without cost tosaid user and without registration of said user during said accessing ofdata and services.
 14. The method of claim 9 wherein said webapplications are hidden inside said registration application.
 15. Anelectronic system, comprising: a server coupled to the Internet; and anelectronic device comprising a processor coupled to a bus and a memorycoupled to said bus, said memory having previously installed softwarefor accessing said server and having stored therein instructions forimplementing a method comprising the steps of: a) preventing a user fromaccessing previously installed web applications that are installed onsaid electronic device and located within said installed software; b)said user registering said electronic device with said server using aregistration application of said installed software; and c) uponauthorized registration of said electronic device with said server,allowing said web applications to be made available for use by said userand otherwise preventing access of said web applications by said user.16. The system of claim 15, wherein said electronic device is a personalinformation device (PID) comprising at least one of a handheldorganizer, a cellular phone, a laptop computer, or a pager.
 17. Thesystem of claim 15, wherein said step a) of preventing a user fromaccessing web applications implemented by said electronic device iscomprised of: preventing a user from accessing web applications that areinstalled on said electronic device and located within said installedsoftware by hiding said web applications within said installed softwareuntil such time that said device is registered with said server.
 18. Thesystem of claim 15 wherein said step c) of allowing said web clippingapplications to be made available for use by said user is comprised of:upon authorized registration of said electronic device with said server,revealing said web applications to said user and otherwise preventingaccess of said web applications by said user.
 19. The system of claim 15wherein said method implemented by said electronic device furthercomprises the step of: d) said user implementing at least one of saidweb applications to access and retrieve information from a web-site viasaid server.
 20. The system of claim 15, wherein said installed softwareupon said electronic device is a result of a step preceding step a) ofpreventing a user from accessing web applications, comprising the stepof: downloading said software from said server onto said electronicdevice.