Abstract:
According to one aspect of the invention, a method is disclosed. The method comprises generating an asymmetric cryptographic key pair comprising first and second keys; encrypting a boot loader program for a baseband module with said first key; storing said second key in said baseband module; and distributing said encrypted boot loader program boot loader program together with said second key.
Abstract:
According to one aspect of the invention, a method is disclosed. The method comprises generating an asymmetric cryptographic key pair comprising first and second keys; encrypting a boot loader program for a baseband module with said first key; storing said second key in said baseband module; and distributing said encrypted boot loader program together with said second key.
Abstract:
According to one aspect of the invention, a method is disclosed. The method comprises generating an asymmetric cryptographic key pair comprising first and second keys; encrypting a boot loader program for a baseband module with said first key; storing said second key in said baseband module; and distributing said encrypted boot loader program together with said second key.
Abstract:
Described herein are techniques related to managing mobile applications (“apps”) of a mobile device based, at least in part, upon the determined location of the device. The techniques described herein are especially suited for situations where the present location differs from the locations associated with particular apps that are already installed on the mobile device. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
Described herein are technologies for geo-fencing based upon semantic locations. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.