摘要:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
摘要:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
摘要:
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
摘要:
A method of performing a trusted dynamic host configuration protocol (DHCPT). The method comprises receiving a trusted dynamic host configuration protocol request message, wherein the request message was created in and transmitted from a trusted security zone of a computing device, and wherein the request message requests an internet protocol (IP) address and routing information for the computing device, allocating an internet protocol address and determining routing information for the computing device, wherein the allocating and determining are performed by a dynamic host configuration protocol server while executing in a trusted security zone of the server, and transmitting the internet protocol address and routing information to the computing device over a trusted end-to-end communication link.
摘要:
A method of downloading trusted content. The method comprises sending by a mobile device a request for a trusted content to a server, wherein the mobile device comprises a first mobile device trusted security zone and builds the request while executing in the first mobile device trusted security zone and wherein the server comprises a server trusted security zone and wherein the server handles the request for the trusted content at least partly in the server trusted security zone. The method comprises receiving the trusted content by the first mobile device trusted security zone, storing the trusted content in a second mobile device trusted security zone of the mobile device, inspecting the trusted content in the second mobile device trusted security zone, and when the trusted content passes inspection, at least one of executing or presenting a portion of the trusted content by the first mobile device trusted security zone.
摘要:
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
摘要:
Multimedia services are provided to a subscriber within a domain of a communication network, wherein the subscriber utilizes one or more predetermined access terminals to access the multimedia services according to a network presence configuration of the subscriber. Each access terminal has respective multimedia capabilities, and the domain includes an application server for accessing the multimedia services. A user profile is established for the subscriber relating respective presence identifiers to a respective user service definition, wherein each user service definition specifies a set of the predetermined access terminals and respective multimedia services to be available for a respective network presence configuration. A current presence identifier of the subscriber is registered. The application server accesses the user profile to determine a user service definition corresponding to the current presence identifier. The subscriber initiates one of the multimedia services by sending a request to the application server from one of the access terminals in the set of predetermined access terminals. The application server interfaces with the multimedia service to obtain multimedia content from the initiated multimedia service. The application server then determines rules of service delivery according to the set of predetermined access terminals. The application server re-formats received multimedia content according to the rules of service delivery for the set of predetermined access terminals. The application server transmits re-formatted multimedia content to the corresponding access terminals.
摘要:
A system for policy and charging enforcement function on a mobile access terminal. The system comprises a radio transceiver, a processor, a memory, and an application stored in the memory. The application stored in the memory, when executed by the processor, receives policy and charging rules via the radio transceiver, and enforces the policy and charging rules when the mobile access terminal initiates a wireless communication.
摘要:
A method of transmitting digital content. The method comprises receiving an electronic shopping cart identifying at least a first shopping item and determining that the first shopping item is an item of digital content based on analyzing the electronic shopping cart. The method further comprises analyzing a demand for communication network resources and estimating a congestion of a communication network, building a plurality of offers for wirelessly transmitting the first shopping item to a wireless communication device based on analyzing the demand for communication network resources and based on estimating the congestion of the communication network. The method further comprises transmitting the plurality of offers, receiving a selection of one of the offers, and transmitting the digital content based on the selected offer.
摘要:
A mobile access terminal (MAT) for use in an internet protocol multimedia system (IMS). The mobile access terminal comprises a first region of memory, a device application stored in the first region of memory, a second region of memory that implements a trusted security sector, and a centralized media controller application stored in the trusted security sector. The centralized media controller application is mated and paired with an incident internet protocol multimedia system network and wherein the centralized media controller application authenticates the device application and provides the device application with communications connectivity with the incident internet protocol multimedia system network.