Abstract:
Disclosed is an apparatus and method to securely activate or revoke a key. For example, the apparatus may comprise: a storage device to store a plurality of pre-stored keys; a communication interface to receive an activate key command and a certificate associated with one of the pre-stored keys; and a processor. The processor may be coupled to the storage device and the communication interface and may be configured to: implement the activate key command to reboot the apparatus with the pre-stored key and the certificate; and determine if the reboot is successful.
Abstract:
A mobile wireless communication device includes: a communication device housing; an antenna module configured to provide an antenna pattern having a directional beam to transmit electromagnetic energy of outgoing signals and to receive electromagnetic energy of incoming signals; a beam-altering module communicatively coupled to the antenna module and configured to alter a three-dimensional direction that the directional beam is pointing; and a three-dimensional orientation sensor module communicatively coupled to the beam-altering module and configured to provide at least one indication of three-dimensional orientation information associated with the communication device; where the beam-altering module is configured to receive the at least one indication of three-dimensional orientation information associated with the communication device and to use the at least one indication of three-dimensional orientation information associated with the communication device to alter the three-dimensional direction that the directional beam is pointing.
Abstract:
A system and a method are provided for supporting a hard handoff procedure for a call from a wireless local area network (WLAN) to a cellular telephone network. The method includes: establishing a link between a user terminal (UT) and a serving WLAN, and a call via the WLAN link; simultaneously monitoring a serving cellular telephone network; forwarding information identifying the UT within the cellular network, to the serving WLAN; in response to losing the link with the serving WLAN, performing a hard handoff to the cellular network; and, continuing the call via the cellular network. Generally, the hard handoff can be performed if the WLAN is able to communicate the UT's identity to the cellular telephone, as the UT's position can be determined by the cellular network. The hard handoff is performed with the UT receiving resource allocations in a common control channeLmessage, such as a Short Message Ser vice (SMS) or paging message.
Abstract:
Techniques for preventing circumvention of digital rights management protections on electronic content are provided. A method according to these techniques includes receiving a content stream, obtaining samples from the content stream, generating a histogram based on the samples from the content stream, classifying the content stream as including audio content or non-audio content based on the histogram, and modifying portions of the content stream responsive to classifying the content stream as including non-audio content. The content stream can be modified such that any video content included in the content stream would be rendered unplayable, while audio content included in the content stream remains playable.
Abstract:
A of a method of securely transferring information between execution environments includes: receiving, at a crypto engine, original plaintext from a first execution environment; obtaining a first cryptographic key by the crypto engine, the first cryptographic key being retained in memory such that the first cryptographic key is associated with the first execution environment and a second execution environment that is not the first execution environment; encrypting the original plaintext by the crypto engine using the first cryptographic key to produce encrypted information, and storing the encrypted information in an intermediate storage location; obtaining, at the crypto engine, the encrypted information from the intermediate storage location; decrypting the encrypted information by the crypto engine using the first cryptographic key to produce reconstituted plaintext; and making the reconstituted plaintext available to the second execution environment by the crypto engine.
Abstract:
Disclosed is an apparatus and method to determine usage rules for video content by buffer tracking. A computing device may include a secure processor configured to: store digital rights management (DRM) rules associated with a DRM key and usage rules for a session; command a cryptoprocessor to decrypt video content with the DRM key and to log an output buffer designation of the command to decrypt the video content. The secure processor may command a buffer tracking table to store the output buffer designation of the cryptoprocessor of the command to decrypt and the associated usage rules and a plurality of input and output buffer designations from a plurality of video content drivers, such that, based upon a buffer designation from an output driver to display video content received by the secure processor, the secure processor may determine usage rules to be applied to the decrypted video content for display.
Abstract:
Disclosed is an apparatus and method to protect against key tampering. A computing device may include a cryptoprocessor that is configured to: write a first word including a first portion of a key; and write a plurality of subsequent words each including a portion of the key. If a same word is written more than once, the key is reset and not validated.
Abstract:
Disclosed is an apparatus and method to set the speed of a clock. A computing device may include a processor and a scheduler of the processor, the scheduler may be configured to: receive a plurality of votes for requested bandwidths from a plurality of different execution environments; sum the requested bandwidths; and set the clock speed based upon the sum of the requested bandwidths.
Abstract:
The subject matter disclosed herein relates to a system and method for transmitting messages between a mobile station and a base station in a wireless communication network. In one example, a mobile station is adapted to selectively transmit an origination message in response to receipt of a page message from a base station attempting to initiate a mobile-terminated call. The origination message may initiate a mobile-originated call or session enabling a bi-directional exchange of messages in a single call.
Abstract:
Methods, apparatus, and computer program products for securely writing patch code to a memory of a system-on-chip (SoC) are described. An example of a method for securely writing patch code to the memory of the SoC includes determining an authentication status of a patch code image, if the authentication status of the patch code image is authenticated, then writing the patch code from the patch code image into a one-time programmable (OTP) memory and generating a system reset signal, and if the authentication status of the patch code image is unauthenticated, then booting the SoC without writing the patch code from the patch code image into the OTP memory.