System and method for verifying integrity of software package in mobile terminal

    公开(公告)号:US09832651B2

    公开(公告)日:2017-11-28

    申请号:US12761874

    申请日:2010-04-16

    IPC分类号: H04W12/10 G06F21/57 H04L29/06

    CPC分类号: H04W12/10 G06F21/57 H04L63/12

    摘要: A method and system for verifying integrity of a software package in a mobile terminal is provided. The method includes receiving a catalog of available software packages from a distributor and displaying the catalog, if a desired software package to be installed is selected from the displayed catalog, acquiring a software package IDentifier (ID) corresponding to the selected software package from the catalog, transmitting the software package ID to the distributor to receive the selected software package corresponding to the software package ID and to transmit the software package ID to a verification authority, receiving, from the verification authority, integrity evidence information corresponding to the software package ID and verifying the integrity of the selected software package, and outputting a notification for notifying a user of a result of the verification and managing the selected software package according to a received user selection.

    Method and apparatus for remotely verifying memory integrity of a device
    4.
    发明授权
    Method and apparatus for remotely verifying memory integrity of a device 有权
    用于远程验证设备的存储器完整性的方法和装置

    公开(公告)号:US08429469B2

    公开(公告)日:2013-04-23

    申请号:US11593520

    申请日:2006-11-07

    IPC分类号: G11C29/38 G11C29/54

    CPC分类号: G06F21/645

    摘要: A device and method for verifying the integrity of a memory in a remote device are provided. An exemplary memory integrity verification method compares, based on a verification parameter received from a verifier, the time for retrieving data block of a memory of a remote device with a maximum threshold time allowed to read the memory, and transmits to the verifier a remote verification code and a data status according to the result of comparison so that the verifier can verify the integrity of the memory. Instead of relying on the verifier, the remote device provides data status information for integrity verification by using the memory retrieval time. As a result, accurate integrity verification is provided, and no independent hardware is required to verify integrity.

    摘要翻译: 提供了用于验证远程设备中的存储器的完整性的设备和方法。 示例性的存储器完整性验证方法基于从验证器接收的验证参数,将用于检索远程设备的存储器的数据块的时间与允许读取存储器的最大阈值时间进行比较,并向验证者发送远程验证 代码和根据比较结果的数据状态,使得验证者可以验证存储器的完整性。 远程设备不是依赖于验证者,而是通过使用存储器检索时间提供用于完整性验证的数据状态信息。 因此,提供了精确的完整性验证,并且不需要独立的硬件来验证完整性。

    System and method of data verification
    5.
    发明申请
    System and method of data verification 有权
    数据验证的系统和方法

    公开(公告)号:US20090022180A1

    公开(公告)日:2009-01-22

    申请号:US12003708

    申请日:2007-12-31

    IPC分类号: H04J3/06 G10L19/00

    摘要: A data verification method and system is provided. The data verification method includes the steps of transmitting data from a sender to a receiver over a signaling channel, transmitting a first set of bits to the receiver over a voice channel, wherein the first set of bits is generated using the data in the sender, and verifying the data through comparison between the first set of bits and a second set of bits that is generated based on the data in the receiver. The first and the second sets of bits may be a group of bits that are selected from a hash value using a selection mask in the sender and the receiver respectively, wherein the section mask has the same length as the hash value and the hash value is calculated based on the data, and the selection mask may be pre-defined between the sender and the receiver.

    摘要翻译: 提供了一种数据验证方法和系统。 数据验证方法包括以下步骤:通过信令信道从发送方向接收者发送数据,通过语音信道向接收者发送第一组比特,其中使用发送方的数据生成第一组比特, 以及通过比较第一组比特和基于接收机中的数据生成的第二组比特来验证数据。 第一和第二组位可以是分别使用发送器和接收器中的选择掩码的哈希值中选择的一组比特,其中,所述片段掩码具有与所述散列值相同的长度,所述散列值是 基于数据计算,并且选择掩码可以在发送者和接收者之间预先定义。

    System and method of data verification
    6.
    发明授权
    System and method of data verification 有权
    数据验证的系统和方法

    公开(公告)号:US08036249B2

    公开(公告)日:2011-10-11

    申请号:US12003708

    申请日:2007-12-31

    IPC分类号: H04J3/12

    摘要: A data verification method and system is provided. The data verification method includes the steps of transmitting data from a sender to a receiver over a signaling channel, transmitting a first set of bits to the receiver over a voice channel, wherein the first set of bits is generated using the data in the sender, and verifying the data through comparison between the first set of bits and a second set of bits that is generated based on the data in the receiver. The first and the second sets of bits may be a group of bits that are selected from a hash value using a selection mask in the sender and the receiver respectively, wherein the section mask has the same length as the hash value and the hash value is calculated based on the data, and the selection mask may be pre-defined between the sender and the receiver.

    摘要翻译: 提供了一种数据验证方法和系统。 数据验证方法包括以下步骤:通过信令信道从发送方向接收者发送数据,通过语音信道向接收者发送第一组比特,其中使用发送方的数据生成第一组比特, 以及通过比较第一组比特和基于接收机中的数据生成的第二组比特来验证数据。 第一和第二组位可以是分别使用发送器和接收器中的选择掩码的哈希值中选择的一组比特,其中,所述片段掩码具有与所述散列值相同的长度,所述散列值是 基于数据计算,并且选择掩码可以在发送者和接收者之间预先定义。

    METHOD AND SYSTEM FOR PROVIDING SECURITY POLICY FOR LINUX-BASED SECURITY OPERATING SYSTEM
    7.
    发明申请
    METHOD AND SYSTEM FOR PROVIDING SECURITY POLICY FOR LINUX-BASED SECURITY OPERATING SYSTEM 有权
    用于基于LINUX的安全操作系统提供安全策略的方法和系统

    公开(公告)号:US20100287598A1

    公开(公告)日:2010-11-11

    申请号:US12776826

    申请日:2010-05-10

    IPC分类号: G06F17/00 H04L29/06

    摘要: A system for providing security policy for a Linux-based security operating system, which includes a template policy module configured to set an authority using policy information of a downloaded application so that the template policy module can set an access control rule for accessing a system resource of the application, a base policy module executing the access control rule for the system resource in accordance with the access control rule set by the template policy module, and a template policy module editor generating a custom application for the corresponding application using information output from the template policy module.

    摘要翻译: 一种用于为基于Linux的安全操作系统提供安全策略的系统,其中包括模板策略模块,该模板策略模块被配置为使用下载的应用的策略信息来设置权限,使得模板策略模块可以设置用于访问系统资源的访问控制规则 所述基本策略模块根据由所述模板策略模块设置的所述访问控制规则执行所述系统资源的所述访问控制规则;以及模板策略模块编辑器,使用从所述应用程序输出的信息生成相应应用的定制应用程序 模板策略模块。

    Method and apparatus for remotely verifying memory integrity of a device
    8.
    发明申请
    Method and apparatus for remotely verifying memory integrity of a device 有权
    用于远程验证设备的存储器完整性的方法和装置

    公开(公告)号:US20070150857A1

    公开(公告)日:2007-06-28

    申请号:US11593520

    申请日:2006-11-07

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F21/645

    摘要: A device and method for verifying the integrity of a memory in a remote device are provided. An exemplary memory integrity verification method compares, based on a verification parameter received from a verifier, the time for retrieving data block of a memory of a remote device with a maximum threshold time allowed to read the memory, and transmits to the verifier a remote verification code and a data status according to the result of comparison so that the verifier can verify the integrity of the memory. Instead of relying on the verifier, the remote device provides data status information for integrity verification by using the memory retrieval time. As a result, accurate integrity verification is provided, and no independent hardware is required to verify integrity.

    摘要翻译: 提供了用于验证远程设备中的存储器的完整性的设备和方法。 示例性的存储器完整性验证方法基于从验证器接收的验证参数,将用于检索远程设备的存储器的数据块的时间与允许读取存储器的最大阈值时间进行比较,并向验证者发送远程验证 代码和根据比较结果的数据状态,使得验证者可以验证存储器的完整性。 远程设备不是依赖于验证者,而是通过使用存储器检索时间提供用于完整性验证的数据状态信息。 因此,提供了精确的完整性验证,并且不需要独立的硬件来验证完整性。

    Authentication method for fast handover in a wireless local area network
    9.
    发明授权
    Authentication method for fast handover in a wireless local area network 有权
    无线局域网快速切换的认证方法

    公开(公告)号:US07158777B2

    公开(公告)日:2007-01-02

    申请号:US10682237

    申请日:2003-10-09

    IPC分类号: H04M1/66

    摘要: Disclosed is a method for authenticating a mobile node in a wireless local area network including at least two access points and an authentication server. When the mobile node associates with a first access point and performs initial authentication, the mobile node receives a first session key for secure communication from the authentication server by using a first private key generated with a secret previously shared with the authentication server, and the first access point receives the first session key from the authentication server by using a second private key previously shared with the authentication server. When the mobile node is handed over from the first access point to a second access point and performs re-authentication, the mobile node receives a second session key for secure communication from the authentication server by using a third private key generated with authentication information generated during previous authentication and shared with the authentication server and the second access point receives the second session key from the authentication server by using the second private key previously shared with the authentication server.

    摘要翻译: 公开了一种用于在包括至少两个接入点和认证服务器的无线局域网中认证移动节点的方法。 当移动节点与第一接入点相关联并执行初始认证时,移动节点通过使用以前与认证服务器共享的秘密生成的第一私有密钥从认证服务器接收用于安全通信的第一会话密钥,并且第一 接入点通过使用先前与认证服务器共享的第二私钥从认证服务器接收第一会话密钥。 当移动节点从第一接入点切换到第二接入点并执行重新认证时,移动节点通过使用由认证信息生成的第三私钥从认证服务器接收用于安全通信的第二会话密钥, 先前认证并与认证服务器和第二接入点共享,通过使用先前与认证服务器共享的第二私钥从认证服务器接收第二会话密钥。

    Method of searching for broadcasting channel of specific program in a DMB receiving terminal

    公开(公告)号:US20060153104A1

    公开(公告)日:2006-07-13

    申请号:US11330764

    申请日:2006-01-12

    摘要: A method of searching for a broadcasting channel of a specific program in a digital multimedia broadcasting (DMB) receiving terminal. The method includes detecting a program number input by a user, determining whether particular bits in a header of a received transport stream (TS) packet are identical to fixed values for the particular bits in the header, if the particular bits in the header are identical to the fixed values for the particular bits in the header, determining whether particular bits in a payload of the TS packet are identical to fixed values for the particular bits in the payload, and if the particular bits in the payload are identical to the fixed values for the particular bits in the payload, determining that the TS packet has program map table (PMT) information, and analyzing the PMT information to detect a packet identifier (PID) of an audio/video packetized elementary stream (PES) constituting the specific program.