Abstract:
Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates the code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device.
Abstract:
Devices and methods use close range communication links, e.g., near field communication (NFC) links, to authenticate communication devices to one another to create or join a new device to a trust domain. Once two devices establish a close range communication peer-to-peer link the devices exchange credential information that provide an infrastructure for the trust domain. Medium or long range wireless or wired network communication links can then be used for secure and trusted communications. Proximity limits of the close range communication P2P link enables mutual trust to be presumed among devices, providing added security to the process of extending a trust domain and reducing the need for security and authentication signaling. Embodiments provide a variety of methods for extending credential infrastructure among devices. Embodiments further enable simple to use virtual cables that can provide secure point-to-point communications that are configured merely by touching two communication devices together.
Abstract:
Multimode mobile station includes mobile configuration manager, device interface, and network interface to dynamically provision network configuration for mobile TE2-type mobile terminals and accomodates multiple protocils over multiple carrier access methods over Um interface and multiple access methods ove Rm interface. A method for communicating between endpoints, where a mobile node obtains a unique configuration from a network for a managed device. The mobile node dynamically provisions the configuration for the connected managed device, in response to device request or network notice. The node adapts messages over Rm interface for TE2 signals and over Um interface for a wireless protocol.
Abstract:
Multimode mobile station includes mobile configuration manager, device interface, and network interface to dynamically provision network configuration for mobile TE2-type mobile terminals and accommodates multiple protocils over multiple carrier access methods over Um interface and multiple access methods ove Rm interface. A method for communicating between endpoints, where a mobile node obtains a unique configuration from a network for a managed device. The mobile node dynamically provisions the configuration for the connected managed device, in response to device request or network notice. The node adapts messages over Rm interface for TE2 signals and over Um interface for a wireless protocol.
Abstract:
Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates the code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device.
Abstract:
Providing for management of a dynamic mobile coupon (DMC) at a mobile device is described herein. Particularly, dynamic characteristics associated with the DMC, such as a redeemable value, can be utilized to browse, sort, search, recall, or redeem the DMC utilizing a user interface of the mobile device. In other aspects, a DMC management application can interact with server components to backup and store DMC data, synchronize dynamic information (e.g., a dynamic redeemable value), access or manage a user profile, interface with other mobile devices to accomplish sharing, trading, exchanging, selling the DMC, and so on. Accordingly, provided is an efficient and personable way to manage mobile coupons in a mobile operating environment and provide increased value and utility for a user of such coupons.
Abstract:
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
Abstract:
For Mobile IP supporting inter-technology handoffs, a logical interface is provided at an abstraction layer, which resides between a network layer and a link layer. The logical interface performs processing to provide an interface between the network layer and the link layer, but communicates with physical interfaces instead of directly with the link layer. One physical interface is provided for each communication network (e.g., each radio network of a different wireless technology). Each physical interface performs technology-dependent processing for the associated communication network and communicates with a respective link layer module. Each link layer module performs link layer processing for the associated communication network. The logical interface is associated with one physical interface at any given moment. The logical interface is also associated with an IP address that does not change and is used by IP in the network layer for communication with the multiple communication networks.
Abstract:
Certain embodiments of the present disclosure relate to a method and an apparatus for managing and optimizing service discovery in a peer-to-peer (P2P) wireless network. Nodes of the P2P network advertise their capabilities to their peers in the form of services. Efficient propagation and management of node's services to other nodes is proposed in the present disclosure. An embodiment relates in particular to a method for wireless node in a peer-to-peer (P2P) network, comprising: receiving one or more advertisements of services offered by one or more other wireless nodes in the P2P network; generating a prioritized list of services, based on one or more services offered by the wireless node and services listed in the received advertisements of services; and distributing the prioritized list of services to other wireless nodes in the P2P network.