Abstract:
A user equipment (UE) is disclosed. The UE comprises a radio frequency transceiver, processor, a memory, and an application stored to the memory. The application, when executed by the processor establishes a communication link from the UE to a communication terminal. The application sends a validation message to the communication terminal over the communication link, wherein a passcode is appended to the validation message send to the communication terminal. The application receives the validation message back from the communication terminal via the communication link, wherein the received validation message has an appended aggregate security signature on the message that shows that the message was read and validated by the communication terminal. The application sends a short message over the communication link to the communication terminal. The application then tears down the communication link.
Abstract:
Embodiments of the disclosure relate generally to methods and systems for pre-downloading at least a portion of a media event to a mobile device and the protection of the media content once it is downloaded to the device. Media content may be pre-downloaded to a mobile device before the official release of the media event and/or before a user has purchased the media event. The pre-downloaded media may be protected by one or more disruption to the presentation of the media content and/or by storing the pre-downloaded media in a trusted security zone of a mobile device. After the media event is released and purchased, the remaining media may be downloaded and a user may gain access to the full media content on the mobile device.
Abstract:
A method of managing a lifecycle of a mobile communication device. The method comprises storing a biographical digest in a radio frequency identity chip of the mobile communication device at the time of manufacture of the communication device, wherein the biographical digest comprises information about the device and comprises a static portion and a dynamic portion. The method further comprises activating the device for wireless communication service; after activating the device, deactivating the device for wireless communication service; and after deactivating the device, writing a device status of the dynamic portion of the biographical digest in the radio frequency identity chip of the device to a value of dead, whereby the device is prevented from being activated for wireless communication service after once having the device status of the dynamic portion of the biographical digest in the radio frequency identity chip of the device written to the dead value.
Abstract:
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
Abstract:
A mobile communication device that monitors and reports consumption of multi-tiered communication services is disclosed. The mobile communication device comprises a radio frequency transceiver, a processor, a memory, and an application stored in the memory. The application, when executed by the processor in a trusted security zone, wherein the trusted security zone provides hardware assisted trust; monitors a tier of communication service consumption, wherein a tier of communication service is associated to at least one of the amount of data, the data throughput, the latency, or the jitter; creates logs of communication service consumption differentiated by tier, and transmits a message containing the logs of the communication service consumption to a billing data store in a network of a service provider associated with the mobile communication device, whereby a bill is created by a billing server accessing the billing data store.
Abstract:
A method of communicating with a computing device having a trusted security zone comprises mapping a unique identifier for a computing device with a trust zone access control (TZAC) address, composing a message comprising the trust zone access control address, and routing the message to the computing device based on the unique identifier. The computing device comprises a normal security zone and a trusted security zone that is separate from the normal security zone, and the trust zone access control address is a unique identifier associated with a hardware component of the trusted security zone within the computing device. The message is internally routed to the trusted security zone within the computing device using on the trust zone access control address.
Abstract:
A method of extending trust from a trusted processor to a graphics processing unit to expand trusted processing in an electronic device comprises inserting a trusted kernel into the graphics processing unit, monitoring the activity level of the graphics processing unit, suspending graphics processing on at least a portion of the graphics processing unit, repurposing a portion of the graphics processing unit to perform trusted processing, and releasing the portion of the graphics processing unit from trusted processing.
Abstract:
A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure element; a web browser; a near field communications system; an over-the-air proxy; an application programming interface layer; and a web server residing on a secure storage area of the mobile access terminal, wherein the web browser is provided with exclusive access to the web server.
Abstract:
An electronic device. The electronic device comprises a processor, a memory, a radio transceiver, and an application stored in the memory. When executed by the processor, the application establishes a communication link via the radio transceiver with an Internet of things (IoT) device, wherein the IoT device is associated with a block chain comprising event blocks that capture information about a state of the IoT device, receives a heartbeat message via the communication link from the IoT device, determines a period of time that passes after receiving the heartbeat message, determines that the period of time exceeds a predefined threshold, and transmits an end-of-life message via the radio transceiver to a server computer, wherein the end-of-life message identifies the IoT device, whereby the server computer is enabled to add an end-of-life block to the block chain associated with the IoT device to finalize the block chain.
Abstract:
A method of using a digital notary in distributed ledger technology for block construction and verification is disclosed that comprises creating, via a birth block creator server in a network, a birth block comprising electronic device information associated with an electronic device and an instruction set. The method also comprises confirming, by a digital notary server in the network, that the instruction set was built in trust and adding, by the digital notary server, a digital notary component to the birth block in response to the confirmation. The method further comprises creating a subsequent block for the electronic device that comprises the instruction set and the digital notary component, validating the subsequent block based on the digital notary component without consensus from a plurality of consensus servers in the network, and storing the subsequent block in response to the validation.