Abstract:
A system for providing a trusted bearer communication link in a long term evolution (LTE) wireless network. The system attaches a mobile communication device to the long term wireless network. An enhanced node B processes a trust zone request from the mobile communication device. The enhanced node B processes a trust zone service request from the mobile communication device. The enhanced node B interworks with a home subscription server (HSS) and a policy control rules function (PCRF) server to verity the mobile communication device has a right to execute the requested trusted network service. The system established a trusted bearer communication link between the mobile communication device and the long term evolution wireless network.
Abstract:
A mobile communication device promoting an extendable display. The mobile communication device comprises a software application stored in a memory of the electronic device, when executed by a processor of the electronic device in response to detecting the second proximate display screen, communicates with the second display screen and ad hoc collaborates with the second display screen. The software application further adapts a graphic to display it on the first display screen and the second display screen, with one part of the graphic displayed on the first display screen and the rest of the graphic displayed on the second display screen, without displaying an opaque bar at an edge where display screens touch, wherein the graphic is scaled based on a size of the combined single display screen.
Abstract:
A method of transmitting digital content via a communication network. The method comprises receiving by a computer a request for a uniform resource identifier (URI), determining by a computer based on the request for the uniform resource identifier a communication service provider associated with a communication device, and when the communication service provider is affiliated with a digital content custom delivery offer building system, transmitting by a computer an image file to be presented by the communication device.
Abstract:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
Abstract:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.