摘要:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
摘要:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
摘要:
A method of transmitting digital content via a communication network. The method comprises receiving by a computer a request for a uniform resource identifier (URI), determining by a computer based on the request for the uniform resource identifier a communication service provider associated with a communication device, and when the communication service provider is affiliated with a digital content custom delivery offer building system, transmitting by a computer an image file to be presented by the communication device.
摘要:
A method of transmitting digital content. The method comprises receiving an electronic shopping cart identifying at least a first shopping item and determining that the first shopping item is an item of digital content based on analyzing the electronic shopping cart. The method further comprises analyzing a demand for communication network resources and estimating a congestion of a communication network, building a plurality of offers for wirelessly transmitting the first shopping item to a wireless communication device based on analyzing the demand for communication network resources and based on estimating the congestion of the communication network. The method further comprises transmitting the plurality of offers, receiving a selection of one of the offers, and transmitting the digital content based on the selected offer.
摘要:
A method of transmitting digital content via a communication network. The method comprises receiving by a computer a request for a plurality of options for delivering the digital content via a communication network, determining by a computer a demand for resources of the communication network, and creating a congestion model modeling a congestion of the communication network. The method further comprises building by a computer a plurality of options for delivering the digital content based on the determined demand for resources of the communication network and based on the congestion model, transmitting by a computer the plurality of options, receiving by a computer a boundary reservation, creating by a computer at least one uncommitted reservation based on the boundary reservation, modifying by a computer the determined demand for resources of the communication network based on the uncommitted reservation.
摘要:
In a wireless communication device, first micro-processing circuitry drives a user interface and drives a wireless transceiver to exchange IP communications. A detection system detects a malicious condition related to the IP communications and responsively generates a circuit transfer signal. Switching circuitry de-couples the first micro-processing circuitry from the user interface and from the wireless transceiver responsive to the circuit transfer signal. Second micro-processing circuitry then drives the user interface and drives the wireless transceiver to exchange non-IP communications.