Abstract:
A method for providing a trusted communication link in a wireless network. A mobility management entity (MME) interface of a MME virtualized network function (VNF) receives a trusted communication request. A MME interface trustlet is allocated to execute in a trusted security zone of compute resources provided by a virtual computing environment in which the MME VNF executes. The MME interface trustlet establishes trusted signaling with two or more different VNFs provided by virtual servers executing in the virtual computing environment. The MME interface trustlet sends a trust token to the eNB to establish the trusted communication link from the eNB via a virtualized network function path through the virtual computing environment.
Abstract:
A security monitor processing server is disclosed. The server comprises a plurality of processors, a memory, and a security monitor application that, when executed by a first processor checks for a message that requests establishment of a secure communication link between a different server and the server directed to it by the different server. The application sends a request to an operating system (OS) to suspend functionality of the other processors except for the first processor. The application sends a request to the OS to suspend a process executing on the first processor. The application conducts a communication session with the different server. The application, responsive to completion of the communication session sends a request to the OS to allow the other processors to resume functionality. The application sends a request to the OS to resume execution of the suspended process on the first processor.
Abstract:
A mobile communication device. The mobile communication device comprises a motherboard comprising a communication bus, a cellular radio frequency transceiver connected to the communication bus, a plurality of antennas, at least one of the antennas communicatively coupled to the cellular radio frequency transceiver, and a processor connected to the communication bus. The mobile communication device further comprises a radio frequency identity (RFID) chip connected to the communication bus, wherein the RFID chip comprises a memory, provides wireless read access to the memory, and provides write access to the memory to the communication bus. The mobile communication device further comprises an antenna switch to selectably couple at least one of the antennas to the RFID chip and an application that selects the antenna switch to couple one of the antennas to the RFID chip based on a state of the mobile communication device.
Abstract:
A visually readable electronic label is disclosed. The system comprises a radio frequency identity (RFID) component that is operable to store data, an antenna coupled to the radio frequency identity component that is operable for deriving electrical power from an incident radio frequency field, where the derived electrical power is the sole electrical power available to the electronic label and a display coupled to the radio frequency identity component that is operable to present a visual indication of the data when commanded by the radio frequency identity component and when electrical power derived from an incident radio frequency field is available.
Abstract:
Systems and methods for transmitting information between virtual environments comprising: copying a first virtual environment, wherein the first virtual environment comprises a plurality of original applications, a first clock, and a first trusted security zone to create a second virtual environment, wherein the second virtual environment comprises a copy of at least some applications of the plurality of original applications, a second clock, and a second trusted security zone. The first trusted security zone may receive a request from a copied application to engage in a transmission with an original application. The first trusted security zone may then determine if a nonce associated with the copied application is a verified nonce, wherein determining if the nonce is a verified nonce comprises comparing, by the first trusted security zone, the nonce associated with the copied application to a nonce associated with the at least one original application.
Abstract:
A method of maintaining a biographical digest of information stored in a radio frequency identity chip communicatively coupled to a motherboard of a mobile communication device. The method comprises determining and writing inception information to the radio frequency identity chip once and preventing later modification of the inception information by a biographical digest software layer stored in a memory of the mobile communication device and executed by a processor of the device. The method further comprises determining and writing current information to the radio frequency identity chip by the biographical digest software layer in response to triggering events.
Abstract:
Embodiments relate generally to methods and systems for creating and using a watermark for verification of operation in a trusted security zone of a mobile device. The watermark may be created or chosen by a user and may be unique to the user. The watermark may be stored in a trusted security zone of the mobile device and may not be accessible from any other area of the mobile device. The watermark may comprise one or more of an image, an audio file, a video, a shape, a signature, a word, a phrase, or a number. The watermark may be verified by a user before operation of a secure application executed in the trusted security zone of the mobile device, and the watermark may also be present throughout the use of a secure application.
Abstract:
A visually readable electronic label is disclosed. The system comprises a radio frequency identity (RFID) component that is operable to store data, an antenna coupled to the radio frequency identity component that is operable for deriving electrical power from an incident radio frequency field, where the derived electrical power is the sole electrical power available to the electronic label and a display coupled to the radio frequency identity component that is operable to present a visual indication of the data when commanded by the radio frequency identity component and when electrical power derived from an incident radio frequency field is available.
Abstract:
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
Abstract:
Embodiments relate generally to systems and methods for providing access to a trusted security zone container within a trusted security zone of a mobile device. An application may receive trusted service manager validation data from a trusted service manager. The application may also receive a trusted security zone master key, wherein the trusted security zone master key provides access to a plurality of trusted security zone containers within the trusted security zone. The application may hash the trusted service manager validation data with the trusted security zone master key. The application may generate the trusted security zone sub key based on hashing to access one or more containers. One or more signal may be transmitted to provision the set of one or more trusted security zone containers with the trusted security zone sub key. The application may provide the sub key to the trusted service manager to access a container.