Patent application number | Description | Published |
20120166799 | SYSTEM AND METHOD FOR SECURELY MOVING CONTENT - A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding to the encrypted content. The media device can provide a request for the encrypted content and the rights data. The domain controller includes a communication portion, a digital rights management portion and a memory portion. The communication portion can engage in a first bi-directional communication with the content source and can engage in a second bi-directional communication with the media device. The digital rights management portion can receive the rights data. The memory portion can store the encrypted content. The second bi-directional communication includes an authorization and authentication communication between the communication portion and the media device, a secure move message exchange between the communication portion and the media device and a content download from the communication portion to the media device. | 06-28-2012 |
20120185693 | SECURE PROGRESSIVE DOWNLOAD FOR MEDIA CONTENT PLAYBACK - In embodiments of secure progressive download for media content playback, a client device ( | 07-19-2012 |
20130091353 | APPARATUS AND METHOD FOR SECURE COMMUNICATION - A method and apparatus are for transferring a client device certificate and an associated encrypted client private key to a client device from a secure device. The secure device receives over a secure connection, a secure device certificate, a secure device private key and a plurality of client device certificates. Each client certificate is associated with a bootstrap public key but is not assigned to any particular client device. A plurality of encrypted client private keys is also received. Each of the encrypted client private keys comprises a client private key associated with one of the client device certificates encrypted with the bootstrap public key. The plurality of client device certificates is stored. The encrypted client private keys are stored in double encrypted protected form. A client device certificate and an associated encrypted client private key are transferred to a client device that has successfully registered with the secure device. | 04-11-2013 |
20130102253 | DISTRIBUTED CONTROL OF MEDICAL DEVICES TO AVOID EFFECTS OF INTERFERENCE - Certain aspects of the present disclosure provide techniques and apparatus for transmitting relatively more critical information between devices using a first wireless technology and transmitting relatively less critical information using a second wireless technology more susceptible to interference than the first wireless technology. One example method generally includes performing an association with a second apparatus via a first wireless technology, wherein the first wireless technology requires proximity between the first and second apparatuses; communicating first information with the second apparatus via the first wireless technology, a second wireless technology, or a combination of both the first and second wireless technologies, while the first and second apparatuses are still in proximity; and communicating second information with the second apparatus via the second wireless technology. | 04-25-2013 |
20130102963 | SECURE AUTOMATIC CONFIGURATION OF EQUIPMENT THROUGH REPLICATION - Certain aspects of the present disclosure provide techniques and apparatus for secure automatic configuration of equipment through replication. One example method generally includes receiving a request for configuration information used to configure at least a first device to be replicated in at least a second device; and communicating the configuration information to the second device, in response to the request. At least one of the first and second wireless devices may be a medical device, and/or the configuration information may include patient treatment information. In this manner, the amount of configuration data entry by a caregiver and the number of errors in this configuration data are most likely considerably reduced. Furthermore, in an emergency, a common medical treatment may be easily configured for many patients at once (i.e., the configuration information may be easily replicated from patient device to patient device). | 04-25-2013 |
20140020081 | Portable Token Device - Disclosed is a portable token device that may be used to assist a user in generating a PIN at one device and to then pass the PIN to another device such that the two devices can securely communicate with one another. The portable token device may include: an interface; and a processor. The processor may execute operations including: determining if a close proximity coupling through the interface to a first device has occurred; transmitting a PIN request to the first device; and obtaining a PIN. Further, the processor may determine if a close proximity coupling through the interface to a second device has occurred. If so, the processor may command transmitting the PIN to the second device. The second device may perform device registration with the first device based upon the received PIN. | 01-16-2014 |
20140101368 | Binding microprocessor to memory chips to prevent re-use of microprocessor - A processor is provided that binds itself to a circuit such that the processor cannot be subsequently reused in other circuits. On a first startup of the processor, a memory segment of an external volatile memory device is read to obtain information prior to initialization of the memory segment. An original/initial identifier may be generated from the information read from the memory segment. The original/initial identifier may then be stored in a non-volatile storage of the processor. On subsequent startups of the processor, it verifies that the processor is still coupled to the same external volatile memory device by using the stored identifier. For instance, on a subsequent startup, the processor again reads the same memory segment of the external memory device and generates a new identifier. If the identifier matches the previously stored identifier, then the processor may continue its operations; otherwise the processor is disabled/halted. | 04-10-2014 |
20140165155 | Management of network devices utilizing an authorization token - Aspects of the invention may relate to an apparatus, system, and method for the management of network devices utilizing an authorization token. In one embodiment, an authorization token received from a service provider may be verified using an authorization credential to determine if the service provider is authorized to perform requested operations with the network device. Further, operation privileges may be enforced that are contained in the authorization token. | 06-12-2014 |
20140357249 | METHODS AND APPARATUS FOR IMPROVING DEVICE FUNCTIONALITY DURING LONG BLOCKING UICC OPERATIONS - Methods and apparatuses are presented herein for improved operation of a Universal Integrated Circuit Card (UICC) of one or more user equipment (UE). For example, an example method of wireless communications is presented, which may include monitoring, by a UE, one or more items received from a UICC of the UE during a UICC operation. In addition, the example method may also include determining that at least one of (a) a number of the one or more items having a first item type exceeds a threshold number, or (b) an elapsed time since the UICC operation started exceeds a threshold time. Moreover, the example method may include providing, based on the determining, a notification to a user interface associated with the UE indicating that the UICC operation is ongoing. | 12-04-2014 |