Abstract:
Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.
Abstract:
Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.
Abstract:
A machine implemented method of activating a mobile device, the method comprising: storing in the mobile device a signed activation record comprising the device data and a SIM policy data describing a set of Subscriber Identity Module (SIM) cards that may be used with the mobile device; evaluating whether an inserted SIM card belongs to the set of SIM cards that may be used with the mobile device; and only registering the device with a communications network using the inse5rted SIM card if the evaluation is successful.