摘要:
Methods and apparatus are disclosed to provide protection against Unsolicited Communication (UC) in a network, such as, without limitation, an Internet Protocol (IP) Multimedia Subsystem (IMS). A communication may originate from a sending device and may be intended for delivery to a receiving device. A network may determine authentication information associated with the sending device. The network may send the authentication information to a receiving entity to evaluate if the communication is unsolicited using the authentication information. If the communication is determined to be acceptable, a connection associated with the communication may be allowed.
摘要:
A method and system for performing trust evaluation for a mobile software agent on a trusted computing platform are disclosed. A sending entity, which includes a mobile software agent, verifies if a receiving entity is trustworthy before transferring the mobile software agent to the receiving entity. The receiving entity may verify the state and details of the mobile software agent and/or the state of the sending entity, and receive the mobile software agent if the state of the mobile software agent and the sending entity are trustworthy. The mobile software agent may include its own virtual trusted platform module (TPM) which is tied to an agent's identity. The agent's virtual TPM is part of the agent and transferred along with the mobile code when the mobile code is transferred.
摘要:
A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source is in a commercial scenario. The techniques also take into account that the number of different paths and number of hops between the device and the trusted external time source may vary. A local clock related value which is protected by a TPM securely bound to an external clock. A system of Accuracy Statements (AS) is added to introduce time references to the audit data provided by other maybe cheaper sources than the time source providing the initial time.
摘要:
A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key Agreement (AKA) and application level generic bootstrapping architecture (GBA) with UICC-based enhancements (GBA_U) procedures is improved. A secure shared session key is used to encrypt communications between the UICC and the Terminal. The secure shared session key generated using authenticating or non-authenticating procedures.
摘要:
The present application discloses a method and apparatus for using trusted platform modules (TPM) for integrity measurements of multiple subsystems. The state of the platform configuration registers (PCR) after boot up are stored as the base state of the system. Base state in this context is defined as the state of the system when the startup of the system is complete and can only be changed when new software is loaded at the kernel level. This state itself can be reported to challengers who are interested in verifying the integrity of the operating system. Also disclosed is a method where the application that is to be verified, requests that its state be extended from the base state of the system. When such a request is received, the state of the system is extended directly from the base state PCR contents and not from the system state.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method and apparatus for password management and single sign-on (SSO) access based on trusted computing (TC) technology. The methods implement the Trusted Computing Group (TCG)'s trusted platform module (TPM), which interacts with both proxy SSO unit and web-accessing applications to provide a secure, trusted mechanism to generate, store, and retrieve passwords and SSO credentials. The various embodiments of the present invention allow a user to hop securely and transparently from one site to another that belong to a pre-identified group of sites, after signing on just once to a secured proxy residing at the user's device.
摘要:
A method and apparatus for a flexible physical random access channel (PRACH) preamble are disclosed. A wireless transmit/receive unit (WTRU) transmits a PRACH preamble generated by using a scrambling code and a signature code to a Node B to access the channel. The WTRU incorporates PRACH access information and preamble channel resources into the preamble, thereby providing flexibility and efficiency in transmission of the PRACH preamble. The method and apparatus may also be applied to an acquisition indicator channel preamble, a high speed uplink packet access channel preamble, an orthogonal frequency division multiplexing preamble, or an orthogonal frequency division multiple access preamble.
摘要:
A smart antenna steering algorithm operates in response to different functions monitored by the media access control (MAC) layer within a client station. One function is when the MAC layer indicates that the client station has been placed in a power savings mode. In response, the antenna algorithm stores an index of the currently selected antenna. Another function is when the MAC layer indicates that the client station has not been synchronized, associated and authenticated with an access point. In response, the algorithm selects an omni-directional antenna beam as the default antenna beam. Another function is when the MAC layer provides beacon period synchronization information to the antenna steering algorithm so that the algorithm can update its own timer.
摘要:
A method and apparatus for selecting an antenna mapping in multiple-in/multiple-out (MIMO) enabled wireless communication networks. A candidate set of currently available antenna mappings is determined based upon measured long term channel conditions. An antenna mapping is selected from the candidate set, and the mapping is calibrated with a selected antenna mapping of a receiving wireless transmit/receive unit (WTRU). When the selected mappings are calibrated, packet data transmission begins. In an alternative embodiment, a calibration training frame (CTF) is used to calibrate multiple antenna mappings simultaneously or sequentially. Also disclosed are physical layer and medium access control layer frame formats for implementing antenna mapping selection according to the invention.