Abstract:
Methods and systems for a handheld portable communication device for configuring connection to and use of local and remote resources are disclosed and may include discovering available networks and resources, establishing a route between the handheld wireless communication device and a selected one or more of the available resources via a selected one or more of the available networks based on user preference criteria stored in the handheld wireless communication device, and communicating multimedia data between the handheld wireless communication device and the selected one or more of the available resources via the established route. The established route may be dynamically adjusted, based on network availability and bandwidth. The handheld wireless communication device may communicate utilizing a plurality of wireless protocols. The preference criteria stored in the handheld wireless communication device may be dynamically adjusted. The resources may be local or remote to the handheld wireless communication device.
Abstract:
A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption and decryption algorithms, authentication, and public key processing. The security module also includes separate key caches for key encryption keys and application keys. A security module can also interface a cryptographic accelerator through an application key cache. The security module can authorize a public key and an associated key server. That public key can subsequently be used to authorize additional key servers. Any of the authorized key servers can use their public keys to authorize the public keys of additional key servers. Secure authenticated communications can then transpire between the client and any of these key servers. Such a connection is created by a secure handshake process that takes place between the client and the key server. A time value can be sent from the key server to the client, allowing for secure revocation of keys. In addition, secure configuration messages can be sent to the security module.
Abstract:
A mobile device collects information about application usage and associates collected application information with a location of the mobile device and a time that the application is accessed. The application is stored on the mobile device or on an external device and accessed via a network. The application information, location of the mobile device and time the application is accessed are communicated to another device and stored in a storage device which may be operated or managed by a service provider or another entity. The application information may comprise identification of a website, a network device or URL, the application and/or data that is input and/or output from the application. The location of the mobile device and/or the time, are determined utilizing a GNSS receiver and/or utilizing information from a network device. The application information, the location of the mobile device and/or the time may be utilized for targeted advertising.
Abstract:
Embodiments of the present disclosure describe a system and method for providing anti-replay protection. One embodiment describes a system comprising: a security device; and an anti-replay protected flash device comprising: a flash memory array; an authentication unit; and a secure memory, wherein the authentication unit and the secure memory are disposed in a security boundary.
Abstract:
Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
Abstract:
A multi-radio mobile device comprises a plurality of different radios. When a location update occurs, the multi-radio mobile device, at a specific location, acquires location-based radio information from a remote location server. The multi-radio mobile device selects a radio for use in the specific location based on the acquired location-based radio information comprising available radios in the specific location and radio weights. The radio is selected from the available radios based on the radio weights in the specific location. Transmissions of a desired service are received in the specific location utilizing the selected radio. Location-based radio measurements reports to the remote location server are generated utilizing signal strength measurements for the received signals. Radio quality information of the available radios is calculated by the location server utilizing location-based radio measurement reports from associated users. The radio weights of the available radios are determined based on the calculated radio quality information.
Abstract:
Systems and methods are provided that allow a secure processing system (SPS) to be implemented as a hard macro, thereby isolating the SPS from a peripheral processing system (PPS). The SPS and the PPS, combination, may form a secure element that can be used in conjunction with a host device and a connectivity device to allow the host device to engage in secure transactions, such as mobile payment over a near field communications (NFC) connection. As a result of the SPS being implemented as a hard macro isolated from the PPS, the SPS may be certified once, and re-used in other host devices without necessitating re-certification.
Abstract:
Embodiments of the present disclosure generally relate to a system, apparatus, and method for providing anti-replay protection of data stored in a non-volatile memory device. Some embodiments describe an anti-replay protection (ARP) device that may protect an external non-volatile memory device from replay attacks.
Abstract:
The present disclosure outlines various systems and methods for detecting an optical fault injection within an electronic device and/or preventing the optical fault injection from introducing an exploitable abnormality within the electronic device. These various systems and methods can include systems and methods that can detect or prevent laser injection attacks, which can include one or more small footprint complementary metal oxide silicon (CMOS) light detection circuits, or structures that can shield one or more transistors from a bottom side laser injection attack.
Abstract:
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a single universal authentication token can store the authentication credentials required to access a variety of resources, services and applications for a user. The universal authentication token includes a user interface, memory for storing a plurality of authentication records for a user, and a secure processor. The secure processor provides the required cryptographic operations to encrypt, decrypt, and/or authenticate data that is sent or received by universal token. For example, secure processor may be used to generate authentication data from seed information stored in memory.