Patent application number | Description | Published |
20130227641 | SYSTEMS AND METHODS TO ENFORCE SECURITY POLICIES ON THE LOADING, LINKING, AND EXECUTION OF NATIVE CODE BY MOBILE APPLICATIONS RUNNING INSIDE OF VIRTUAL MACHINES - Methods and systems described herein relate to enhancing security on a device by enforcing one or more policies on the loading, linking, and/or executing of native code by one or more applications executing on the device. | 08-29-2013 |
20130268997 | SYSTEMS AND METHODS FOR ENFORCING ACCESS CONTROL POLICIES ON PRIVILEGED ACCESSES FOR MOBILE DEVICES - Methods and systems described herein relate to enhancing security on a device by enforcing security and access control policies on privileged code execution. | 10-10-2013 |
20140059347 | SYSTEMS AND METHODS FOR RESTRICTING ACCESS TO NETWORK RESOURCES VIA IN-LOCATION ACCESS POINT PROTOCOL - Methods and systems described herein relate to enhancing security on a mobile device. Systems and methods for mobile device security include restricting access to network resources via an in-location access point device, based on whether the mobile device is in proximity of the in-location access point device. | 02-27-2014 |
20140157355 | SYSTEMS AND METHODS FOR ENHANCING MOBILE DEVICE SECURITY WITH A PROCESSOR TRUSTED ZONE - Methods and systems described herein relate to enhancing security on a mobile device. A method for enhancing mobile device security includes providing a trusted zone of a processor, and configuring various items in the trusted zone. Such items may include a specialized debugging interface; a remote auditing tool; an inter-process communication mechanism; a secure daemon; a package manager; a virtual machine, a configuration function, a device management system, touch screen management software, and a geo-localization function. | 06-05-2014 |
20140201807 | SYSTEMS AND METHODS FOR ENFORCING SECURITY IN MOBILE COMPUTING - Methods and systems described herein relate to enhancing security on a device by configuring one or more software functions in a trusted zone of a processor using object firewalls, IPC mechanisms, and/or a policy engine. An inter-process communication mechanism and inter-process communication bus enable secure inter-process communication between inter-process communication applications within the trusted zone and inter-process communication applications external to the trusted zone. Adapting, filtering, blocking, redirecting, or otherwise modifying inter-process communications is enabled by the inter-process communications mechanism. Modifications may be controlled by a policy engine within the trusted zone. | 07-17-2014 |
20140269284 | SYSTEM AND METHOD FOR DISTRIBUTED DATA MANAGEMENT IN WIRELESS NETWORKS - Described are systems and methods for managing data traffic to a plurality of mobile devices over a wireless network. For each mobile device, a facility is provided that is capable of:
| 09-18-2014 |
20140273857 | SYSTEMS AND METHODS TO SECURE SHORT-RANGE PROXIMITY SIGNALS - A system for short-range communications includes a device and a server. The mobile device receives information via short range wireless signals, processes that information, and transmits information to the server. The server uses the information to verify that the information from the device is consistent with a device currently located in the location. Such verification may be done using cryptographic or signal processing techniques. | 09-18-2014 |
20140274104 | SYSTEM AND METHOD FOR HETEROGENOUS SPECTRUM SHARING BETWEEN COMMERCIAL CELLULAR OPERATORS AND LEGACY INCUMBENT USERS IN WIRELESS NETWORKS - Described herein are systems and methods for telecommunications spectrum sharing between multiple heterogeneous users, which leverage a hybrid approach that includes both distributed spectrum sharing, spectrum-sensing, and use of geo-reference databases. | 09-18-2014 |
20140280973 | SYSTEM AND METHOD FOR NETWORK SHARING BETWEEN PUBLIC SAFETY USERS AND COMMERCIAL USERS - Described herein are systems and methods for sharing public safety network resources between public safety devices and commercial devices. A request for network resources is received from a commercial device for an application running on the commercial device. It is determined that the request is for a first type of traffic that is tolerant to time delays caused by resource fluctuations. Resources are allocated from a public safety network instead of resources from a commercial network, so that the commercial device can use resources from the public safety network. | 09-18-2014 |
20140282857 | SYSTEMS AND METHODS TO SYNCHRONIZE DATA TO A MOBILE DEVICE BASED ON A DEVICE USAGE CONTEXT - A method, system, and computer-readable medium for synchronizing policy data on a device based on device usage context. By synchronizing policy data on the device based on device usage context, security, bandwidth and energy efficiency concerns associated with the current data synchronization art by intelligently organizing and prioritizing the updating of policy data in compliance with policy data. | 09-18-2014 |
20140282992 | SYSTEMS AND METHODS FOR SECURING THE BOOT PROCESS OF A DEVICE USING CREDENTIALS STORED ON AN AUTHENTICATION TOKEN - Methods and systems are provided for securing devices in which a secure external authentication token is used to verify user credentials prior to enabling the operating system of the device by loading or decrypting the operating system. Suitable external authentication tokens can include smartcards such as a common access card and may be verified by cryptographic processes either at a local server or via a remote credentials processor. | 09-18-2014 |
20140283136 | SYSTEMS AND METHODS FOR SECURING AND LOCATING COMPUTING DEVICES - Methods and systems are provided for identifying a computing device and/or the user of such a device and granting or prohibit access to one or more devices based on the location of the computing device. User devices include receivers and emitters for localization signals, and behavior of user devices or user interaction devices are modified according to received localization signals. Example systems may provide tracking media streaming to local devices, automatic configuration of transmitters, or adaptation of multi-user interactions based on user location. | 09-18-2014 |