摘要:
A system for propagating encryption key information between wireless communication devices without the requirement of pairing each and every device. A wireless communication device may be paired with at least one device in a group of devices. When a secure link is established between these devices, a determination may be made as to whether encryption key information should be passed from one device to another. The additional encryption key information may allow a wireless communication device to create a secure link with other devices without having to first establish a trusted relationship (e.g., go through a pairing process) with the other devices.
摘要:
A computer system, method, and computer program product for performing device detection and service discovery in a mobile ad hoc communications network. The method comprises conducting an inquiry of the mobile ad hoc communications network to discover nearby devices. If the inquiry indicates that the nearby devices may include a middleware layer, the method further comprises creating a connection to each of the nearby devices and confirming whether each of the nearby devices include the middleware layer. For each of the nearby devices that include the middleware layer, the method further comprises executing the middleware layer to perform application and service discovery, and to launch applications and services.
摘要:
The invention provides a method, system, and computer program product to control the access, copying, and/or transfer of a digital asset (136) by mobile, wireless devices (100, 140) using a digital voucher (137). The digital voucher (137) references a primary content that contains all of the expression for that particular asset (136) and a secondary content that contains information that can be distilled out as a preview. The information in the primary content can be limited to a specified duration or a specific number of viewings. The author, owner, or possessor of the digital asset (136) specifies the terms and conditions for distribution of the digital asset (136). The digital voucher (137) authorizes the mobile, wireless device (140) to access a specified primary or secondary content that may be located elsewhere in the network. The mobile, wireless device (140) can download a copy of portions or all of the content (136) depending on the terms specified in the voucher (137).
摘要:
Various methods for implementing memory segment access control in a distributed memory environment are provided. One example method may comprise during a first write state for a memory segment receiving a cryptographic key stream in association with a request from a first device for use of shared storage capacity of a second device and causing the cryptographic key stream to be stored in the memory segment. Further, during the second write state for the memory segment, the example method may comprise receiving data content, transforming the date content using the cryptographic key stream to form encrypted data content, and causing the encrypted data content to be stored in the memory segment. Finally, during the first read state, the example method may comprise causing the encrypted data content to be provided to one or more requesting devices. Similar and related example methods, example apparatuses, and example computer program products are also provided.
摘要:
Method, system and computer program product for achieving integrity-protected storage in a personal communication device (100) by implementing DRM in a personal communication device (100). In particular, the method, system and computer program product utilizes cryptography and an external, read-write storage device (103) that stores important state information that need not be secret, but should be unmodifable or replayable without detection. Using the present invention, the integrity of data storage in a personal communication can be assured even if data is stored in an insecure storage device (105).