Abstract:
A method and system for securely monitoring an operating system of a mobile wireless communication device for unauthorized modifications. A secure application is provided on universal integrated circuit card of the mobile wireless communication device. The secure application is configured to control the wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network. A monitoring application is provided in a trusted sub-processor of the processor of the mobile wireless communication device. A secure communication link is established between the secure application and the monitoring application. A heartbeat token is generated by the trusted sub-processor, based on a modification status for the operating system and at least one system variable. The secure application receives the heartbeat token, and determines that an unauthorized software modification exists based on the heartbeat token. The secure application activates at least one countermeasure when an unauthorized software modification exists.
Abstract:
Method and apparatus for associating a subscriber identity module to a group of mobile communications devices is provided. One embodiment provides a method including receiving the hashed value from the SIM card and decrypting, using the trusted electronic processor, the hashed value based on a second key stored on the mobile communications device to generate a response. The method also includes sending, using the trusted electronic processor, the response to the SIM card and receiving, at the trusted electronic processor, an acknowledgement from the SIM card indicating that the response matches an expected response.
Abstract:
Portable communication device and method for mitigating interference. One example portable communication device includes a frequency-modulated (FM) communication subsystem, a cellular communication subsystem, a first electronic processor, and a second electronic processor. The FM communication subsystem includes an FM modem and at least one FM antenna. The cellular communication subsystem includes a plurality of cellular antennas, a plurality of antenna tuners, and a cellular modem. The first electronic processor is configured to generate an alert signal responsive to detecting one of an audio signal reception by the FM communication subsystem and an audio signal transmission by the FM communication subsystem. The second electronic processor is configured to receive the alert signal from the first electronic processor. The second electronic processor is also configured to responsively cause the cellular communication subsystem to set substantially constant impedances for the plurality of cellular antennas.
Abstract:
A method and system for securely monitoring an operating system of a mobile wireless communication device for unauthorized modifications. A secure application is provided on universal integrated circuit card of the mobile wireless communication device. The secure application is configured to control the wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network. A monitoring application is provided in a trusted sub-processor of the processor of the mobile wireless communication device. A secure communication link is established between the secure application and the monitoring application. A heartbeat token is generated by the trusted sub-processor, based on a modification status for the operating system and at least one system variable. The secure application receives the heartbeat token, and determines that an unauthorized software modification exists based on the heartbeat token. The secure application activates at least one countermeasure when an unauthorized software modification exists.
Abstract:
A first Mobile Repeater System (MRS), configured to serve as an access point associated with a Basic Service Set (BSS), broadcasts a Basic Service Set Identifier (BSSID). Other Mobile Repeater Systems (MRSs) join the BSS to create a local ad hoc trunked site in which each of the MRSs are communicatively coupled via at least one WLAN communication link. These MRSs include the first MRS and a second MRS. The first MRS can be configured to provide a control channel for communication with a first subscriber unit, and the second MRSs can be configured to provide a first trunked traffic channel for communication with the first subscriber unit.