VIRTUAL SUBSCRIBER IDENTITY MODULE
    3.
    发明公开
    VIRTUAL SUBSCRIBER IDENTITY MODULE 审中-公开
    VIRTUELLESTEILNEHMERIDENTITÄTSMODUL

    公开(公告)号:EP2198582A2

    公开(公告)日:2010-06-23

    申请号:EP08831437.2

    申请日:2008-09-19

    IPC分类号: H04L29/06 H04W8/26

    摘要: A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer- trusted subsystem (TSS-DM) configured to store and provide credentials related to a manufacturer of the MTP; a mobile network operator - trusted subsystem (MNO-TSS) configured to store and provide credentials related to a mobile network operator (MNO); and a device user/owner - trusted subsystem (TSS-DO/TSS-U) configured to store and provide credentials related to user of the MTP. The TSS-MNO includes a vSIM core services unit, configured to store, provide and process credential information relating to the MNO. The TSS-DO/TSS-U includes a vSIM management unit, configured to store, provide and process credential information relating to the user/owner of the MTP. The TSS-DO/TSS-U and the TSS-MNO communicate through a trusted vSIM service.

    摘要翻译: 公开了一种被配置为提供虚拟用户识别模块(vSIM)服务的移动信任平台(MTP)。 在一个实施例中,MTP包括:被配置为存储和提供与MTP的制造商有关的凭证的设备制造商信任子系统(TSS-DM); 配置为存储和提供与移动网络运营商(MNO)相关的凭证的移动网络运营商信任子系统(MNO-TSS); 以及被配置为存储和提供与MTP的用户相关的凭证的设备用户/所有者 - 信任子系统(TSS-DO / TSS-U)。 TSS-MNO包括vSIM核心服务单元,被配置为存储,提供和处理与MNO有关的凭证信息。 TSS-DO / TSS-U包括一个vSIM管理单元,用于存储,提供和处理与MTP的用户/所有者有关的凭证信息。 TSS-DO / TSS-U和TSS-MNO通过可信的vSIM服务进行通信。

    DIGITAL RIGHTS MANAGEMENT USING TRUSTED PROCESSING TECHNIQUES
    8.
    发明公开
    DIGITAL RIGHTS MANAGEMENT USING TRUSTED PROCESSING TECHNIQUES 有权
    数字版权管理使用可信处理技术

    公开(公告)号:EP2052524A2

    公开(公告)日:2009-04-29

    申请号:EP07872510.8

    申请日:2007-05-04

    IPC分类号: H04L29/06

    摘要: The present invention discloses several methods to strengthen the integrity of entities, messages, and processing related to content distribution as defined by the Open Mobile Alliance (OMA) Digital Rights Management (DRM). The methods use techniques related to the Trusted Computing Group (TCG) specifications. A first embodiment uses TCG techniques to verify platform and DRM software integrity or trustworthiness, both with and without modifications to the DRM rights object acquisition protocol (ROAP) and DRM content format specifications. A second embodiment uses TCG techniques to strengthen the integrity of ROAP messages, constituent information, and processing without changing the existing ROAP protocol. A third embodiment uses TCG techniques to strengthen the integrity of the ROAP messages, information, and processing with some changes to the existing ROAP protocol.

    METHOD AND APPARATUS FOR SECURING LOCATION INFORMATION AND ACCESS CONTROL USING THE LOCATION INFORMATION
    9.
    发明授权
    METHOD AND APPARATUS FOR SECURING LOCATION INFORMATION AND ACCESS CONTROL USING THE LOCATION INFORMATION 有权
    使用位置信息来保护位置信息和访问控制的方法和设备

    公开(公告)号:EP2127300B1

    公开(公告)日:2018-04-18

    申请号:EP08724790.4

    申请日:2008-01-25

    摘要: A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity and a subscriber identity module (SIM). The location sensing entity generates location information of the WTRU and the location information is embedded in a message in an SIM. A trusted processing module in the WTRU verifies integrity of the location information. The trusted processing module may be on the SIM. The location information may be physical location information or contextual location-related information. The trusted processing module is configured to cryptographically secure and bind the location information to the WTRU, and verify trust metrics of an external entity prior to granting an access to the location information or accepting information from the external entity. The trusted processing module may be a trusted computing group (TCG) trusted platform module (TPM) or mobile trusted module (MTM). The location information may be used for an authentication purpose or access control. The location information may be combined with time information.