Abstract:
A method of boot-loading an electronic device. The method comprises boot-loading a trusted execution environment (TEE) in a trusted security zone of a processor of the electronic device, where the TEE boot-loads before a rich execution environment (REE) boot-loads, launching a boot-loader authentication application by the TEE in the trusted security zone, determining a signature value of an REE boot-loader by the boot-loader authentication application over the instructions of the REE boot-loader, comparing the signature value of the REE boot-loader to an authentication signature value stored in the TEE, and, in response to the signature value of the REE boot-loader not matching the authentication signature value, taking action by the boot-loader authentication application.
Abstract:
A method of authenticating access of an electronic device to an application server based on a subscriber identity module (SIM) associated with the electronic device. The method receiving an authentication challenge from an application executing on the device by a SIM application toolkit (SAT) executing on the device, transmitting a random number and an authentication value of the challenge to a SIM of the device by the SAT, receiving a response from the SIM by the SAT, transmitting an authentication response to the application by the SAT, where the authentication response comprises the response received from the SIM, generating an application key by the SAT based at least in part on the response received from the SIM, and transmitting the application key to the application by the SAT, whereby the application executing on the electronic device establishes a communication session with an application server via an access communication network.
Abstract:
A method of operating a reference network comprising a plurality of Internet-of-things (IoT) devices. The method comprises monitoring reference activities of a plurality of IoT devices in a reference network by a first IoT device, wherein the monitoring comprises detecting events of reference rations being delivered to the IoT devices and detecting events of references being transmitted by the IoT devices, maintaining a reference ration account balance by the first IoT device for each of the IoT devices, determining by the first IoT device that a second IoT device transmits a reference while the reference ration account balance of the second IoT device is below a threshold value, and transmitting a report by the first IoT device, where the report identifies the second IoT device, identifies the reference transmitted by the second IoT device, and identifies the value of the reference ration account balance of the second IoT device.
Abstract:
A method of storing device information, provisioning data, and event information using distributed ledger technology (DLT). a manufacturer creates a first block of a first category comprising wireless communication device information, the block stored in a non-transitory memory of the device, a wireless communication service provider provisions device on a network, a server maintained by the wireless communication service provider creates a second block of a second category comprising information associated with the provisioning of the device, an application executing on the device stores the second block by in the non-transitory memory, creating a chain of blocks, the application uses at least part of the chain of blocks to provide authentication of the device to the network, and the block foundry server creates at least one block of a third category.
Abstract:
A user equipment (UE). The UE comprises a motherboard comprising a communication bus, a cellular radio frequency transceiver, a processor, a radio frequency identity (RFID) chip, and a memory storing an application. The RFID chip is connected to the communication bus and comprises an RFID near field communication (NFC) transceiver, an RFID internal processor, an RFID internal memory, and an RFID application. When executed by the processor, the application receives a request from the RFID chip to establish a virtual private network (VPN) tunnel via the cellular radio frequency transceiver based on information encapsulated in the request. The RFID application, when executed by the RFID internal processor, receives a message from an NFC device comprising a command to open the VPN tunnel and sends the request to establish the VPN tunnel to the application executed on the processor.
Abstract:
A method of organizing components of a mobile communication device. The method comprises orienting a radio frequency identity chip of the mobile communication device relative to a general purpose near field communication transceiver of the mobile communication device, locating the radio frequency identity chip in a null region of an electromagnetic field radiated by the general purpose near field communication transceiver, whereby, the null region of the electromagnetic field may be below a threshold required to activate the radio frequency identity chip.
Abstract:
A method of transmitting digital content via a communication network. The method comprises receiving by a computer a request for a uniform resource identifier (URI), determining by a computer based on the request for the uniform resource identifier a communication service provider associated with a communication device, and when the communication service provider is affiliated with a digital content custom delivery offer building system, transmitting by a computer an image file to be presented by the communication device.
Abstract:
Systems and methods disclosed herein relate to the protection of a plurality of protected personas on a protected network that may be isolated from a telecommunication service provider's network that supports a portable electronic device. The plurality of personas may be generated by the owners and/or administrators of the network on which the personas reside. Activating a persona on a device, whether that device is owned and maintained by the business or businesses affiliated with the protected network, enables access to a plurality of data on the business's network and restricts access to at least some of the capabilities and functionality of the device available under the original persona. Data created or modified while the protected persona is activated on the device may not be accessed while the original persona is active and may be uploaded dynamically or manually to the protected network.
Abstract:
A cellular wireless modem. The cellular wireless modem comprises a cellular radio transceiver, a short range communication interface, a processor, wherein the processor comprises a trusted security zone, a memory, wherein the memory stores an input forwarding application, and a trusted security zone extension application stored in the memory. When executed by the processor, the extension application provisions the input forwarding application to an intelligent appliance via the short range communication interface, receives input from the input forwarding application executing on the intelligent appliance via the short range communication interface, and transmits a message based on the input via the cellular radio transceiver.
Abstract:
An electronic device. The device comprises an anti-trusted-security-zone in the trusted security zone that, when installed and managed by the trusted security zone manager, places non-trusted applications into the anti-trusted-security-zone for execution, restricts access of the non-trusted applications to at least some resources of the electronic device outside the anti-trusted-security-zone, alerts the user when the non-trusted application inside the anti-trusted-security-zone desires access to any restricted resource of the electronic device outside the anti-trusted-security-zone, asks the user for permission to access the desired resource outside the anti-trusted-security-zone, grants access for the non-trusted application to requested resources outside the anti-trusted-security-zone upon the permission by the user, moves the applications from the anti-trusted-security-zone to the normal zone that are determined not to be malicious, keeps the applications within the anti-trusted-security-zone that do not need to execute outside the anti-trusted-security-zone, and deletes the applications that are determined to be malicious.