Patent application number | Description | Published |
20080244685 | Method and Apparatus for Providing Dynamic Security Management - Methods and devices provide dynamic security management in an apparatus, such as a mobile telephone terminal. The apparatus includes a platform for running an application; a security manager for handling access of the application to functions existing in the apparatus; an application interface (API) between the platform and the application; a set of access permissions stored in the apparatus and used by the security manager for controlling access of the application to functions through the application interface. Methods can include downloading into the apparatus an object containing access permissions applicable to at least one function; verifying the object; and installing the access permissions together with the existing permissions. | 10-02-2008 |
20080307229 | Method And Apparatus For Certificate Roll-Over - A method and an electronic apparatus for rolling over from a first to second trusted certificate in the electronic apparatus. Information containing identification data for identifying the second trusted certificate is acquired in the electronic apparatus. Also, the second trusted certificate, which is preinstalled in the electronic apparatus, is activated based on said identification data. | 12-11-2008 |
20090193026 | INTEGRATED DATABASE REPLAY PROTECTION - An apparatus and method for providing replay protection integrity protection of a database accessible by an electronic device is provided, wherein the database is capable of protecting a plurality of records. When at least one protected record in the database is modified in an authorized manner, a record tag corresponding to the at least one protected record is stored in the database, and the at least one protected record and the corresponding record tag are copied into a cache. Upon retrieval of the at least one protected record from the database, the copied record tag stored in the cache is compared with the corresponding record tag stored in the database. Use of the retrieved protected record is inhibited if the copied record tag stored in the cache does not correspond to the record tag stored in the database, and otherwise use of the retrieved protected record is enabled. | 07-30-2009 |
20090193265 | FAST DATABASE INTEGRITY PROTECTION APPARATUS AND METHOD - An apparatus and method of protecting the integrity of a database is provided. Protection of the database is implemented by randomly selecting part of the database that is to be authenticated, the part of the database being less than the entire database to be authenticated. Then, only the selected part of the database is processed through a security function to generate a representation of authentication of the database for comparison with another representation of authentication of the database. Based on a comparison of the representation of authentication and the another representation of authentication, it is determined if integrity of the database has been maintained. | 07-30-2009 |
20090204537 | Payment Method for Content, Mobile Equipment and Content Item Implementing the Method - The invention relates to a payment method for content, e.g. a content item protected by a Digital Rights Management (DRM) scheme. The content item contains a payment directive that automatically invokes a payment procedure before the content item may be used. The payment directive specifies how to utilise payment methods in the wireless network in order to grant access to the content downloaded in the device. The content item may be downloaded first but is not enabled until a payment has been initiated. The invention also relates to mobile equipment implementing the method and the corresponding content item. | 08-13-2009 |
20090249487 | METHOD AND ARRANGEMENT RELATING TO A COMMUNICATION DEVICE - The present invention relates to a novel method for handling applications in a device by associating an application signed by a domain certificate to a pre-defined entity in a device, said device comprising: a module reader for reading subscriber identity, a virtual machine for running at least one application, a memory containing a root certificate, the method comprising: using a data set for aggregating a sub set of data, modifying portion of said data set such that said portion includes reference to said entity. The invention also relates to a device for implementing the method. | 10-01-2009 |
20100153667 | METHOD, COMPUTER PROGRAM AND ELECTRONIC DEVICE - A method for utilizing a secure memory in an electronic device for launching/running an application may include copying at least a portion of the application into the secure memory of the electronic device, and permanently storing the at least one portion of the application in the secure memory. The permanent storage of the at least one portion of the application in the secure memory obviates the need re-copy the application to the secure memory if/when the application is subsequently executed by the electronic device. | 06-17-2010 |
20120124653 | Certificate Based Access Control in Open Mobile Alliance Device Management - A wireless communication device provides a method of certificate-based access control. Particularly, the device establishes a secure communications session with a device management server. Rather than use access control lists to control access to the functions and services on the device, however, the device uses the certificate that was employed to establish the secure session to control access. | 05-17-2012 |
20120131348 | METHOD FOR SIGNING DOCUMENTS USING A PC AND A PERSONAL TERMINAL DEVICE - A method for obtaining a digital signature is disclosed. Upon receipt of request for a digital signature within a customer computer, a Mobile electronic transaction proxy within the customer PC notifies a web browser of the request for the digital signature and assists in obtaining a digital signature on a data string included within the request. After the digital signature is obtained, the data string along with an appended digital signature is transmitted back to a requesting party. | 05-24-2012 |
20120190338 | METHOD FOR CHANGING AN OPERATING MODE OF A MOBILE DEVICE - A method for changing an operating mode of a mobile device is provided. According to the method, a request from the user of the mobile device to change from a first operating mode to a second operating mode is received. In response to the received request a credential is requested from the user. Next, the credential (RCK) is received from the user and validated. If the received credential (RCK) is valid, the second operating mode is set and an indication of the mobile device indicating that the second operating mode has been set is set. If the second operating mode has been set, a reset of the indication is prohibited. | 07-26-2012 |
20140059357 | System and Method for Providing Secure Inter-Process Communications - A user device provides a mechanism for securing messages communicated between trusted processes along an established Inter-Process Communication (IPC) channel. The mechanism permits the trusted processes to determine which messages to protect, and executes independently of platform-dependent IPC mechanisms. | 02-27-2014 |