Patent application number | Description | Published |
20090061934 | Service Provider Activation with Subscriber Identity Module Policy - Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket encoded with SIM policy data that corresponds to the combination of the device and one of a number of SIM cards belonging to a set of SIM cards defined by the SIM policy data. The activation ticket is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card in accordance with the SIM policy in the activation ticket, and initiates activation when the verification of the activation ticket is successful. | 03-05-2009 |
20090063108 | Compatible trust in a computing device - A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image. | 03-05-2009 |
20090070122 | ESCROW SERVICE FOR PROVIDING LICENSED DIGITAL CONTENT - Physical media containing digital content can be exchanged for a license to download an electronic copy of the digital content. In an implementation, the physical media is received at a kiosk and secured such that it is not accessible to the user after the license is granted. The license provides the user with rights to download the digital content to a personal computer, set-top box, gaming device, portable video player or portable image viewer having digital rights enforcement. | 03-12-2009 |
20090144341 | Ad Hoc Data Storage Network - One or more devices on a network are detected by an offsite data backup system. Upon detection of a given device, the data backup system authenticates the device and determines whether the device is authorized and capable to receive backup data. The backup system identifies data to be backed up, and one or more devices to receive the data backup, based on the combined unused storage capacity of the devices and a data backup policy that takes into account the value of the data. The data backup system can generate a database of synchronization information, which can be used to fully or partially restore data from the devices. | 06-04-2009 |
20090300758 | PROVISIONING SECRETS IN AN UNSECURED ENVIRONMENT - A method and apparatus for generating provisioning data to provision a device are described. A provisioning bundle is validated according to a relationship between a configuration and a bundle sequence number identifying the provisioning bundle. A provisioning request includes a device hardware identifier identifying the device. An authorization for the provisioning request is determined for generating provisioning data including the provisioning bundle personalized by the device hardware identifier for the device. | 12-03-2009 |
20100023778 | Ticket Authorized Secure Installation And Boot - A method and apparatus for secure software installation to boot a device authorized by a ticket are described herein. A ticket request including a device identifier of the device is sent for the ticket which includes attributes for one or more components to boot the device into an operating state. The ticket is cryptographically validated to match the one or more components with corresponding attributes included in the ticket. If successfully matched, the one or more components are executed to boot the device. | 01-28-2010 |
20100029247 | Service Provider Activation - Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful. | 02-04-2010 |
20110195751 | Service Provider Activation - Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful. | 08-11-2011 |
20110258426 | BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor. | 10-20-2011 |
20120021805 | SERVICE PROVIDER ACTIVATION WITH SUBSCRIBER IDENTITY MODULE POLICY - Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket encoded with SIM policy data that corresponds to the combination of the device and one of a number of SIM cards belonging to a set of SIM cards defined by the SIM policy data. The activation ticket is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card in accordance with the SIM policy in the activation ticket, and initiates activation when the verification of the activation ticket is successful. | 01-26-2012 |
20120131317 | TICKET AUTHORIZED SECURE INSTALLATION AND BOOT - A method and apparatus for secure software installation to boot a device authorized by a ticket are described herein. A ticket request including a device identifier of the device is sent for the ticket which includes attributes for one or more components to boot the device into an operating state. The ticket is cryptographically validated to match the one or more components with corresponding attributes included in the ticket. If successfully matched, the one or more components are executed to boot the device. | 05-24-2012 |
20120278597 | COMPATIBLE TRUST IN A COMPUTING DEVICE - A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image. | 11-01-2012 |
20120309377 | OVER-THE-AIR DEVICE CONFIGURATION - Methods, program products, and systems of over-the-air device configuration are disclosed. In general, in one aspect, a mobile device can determine, in an application subsystem of the mobile device, that the mobile device requests an initial setup. The application subsystem can send a request to a baseband subsystem of the mobile device. The request can include an indicator specifying that the baseband subsystem is to operate in a service configuration mode. The mobile device can request the configuration information from a registration server using the baseband subsystem that operates under the service configuration mode. Requesting the configuration information from the server can include connecting to the server over the air using a cellular network, through a specified carrier and under a specified data transfer cap. The mobile device can then configure the mobile device using configuration information received from the server. | 12-06-2012 |
20130260833 | SERVICE PROVIDER ACTIVATION - Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful. | 10-03-2013 |