Infrastructure for secure short message transmission
First Claim
1. A method of secure communication using short messages, comprising:
- establishing a communication link from a user equipment (UE) to a communication terminal by the UE, the communication link comprising a plurality of nodes that include a trusted security zone and operate in trusted operation mode, wherein the trusted security zone runs a separate operating system that is not accessible to device users and the trusted security zone is implemented by partitioning hardware and software resources into a secure partition and a normal partition with sensitive resources placed in the secure partition, and wherein normal partition applications run on a first virtual processor, secure partition applications run on a second virtual processor, and the first and second virtual processors run on a single physical processor executing in a time sliced fashion;
sending a validation message to the communication terminal over the communication link by the UE, wherein a passcode is appended to the validation message sent to the communication terminal, and wherein the communication terminal determines that the UE is a trusted source based on the passcode;
receiving the validation message back from the communication terminal via the communication link by the UE, wherein the received validation message has an appended aggregate security signature on the validation message indicating that the communication terminal read and validated the validation message;
in response to receiving the validation message back from the communication terminal, sending a short message over the communication link to the communication terminal by the UE; and
tearing down the communication link by the UE.
6 Assignments
0 Petitions
Accused Products
Abstract
A user equipment (UE) is disclosed. The UE comprises a radio frequency transceiver, processor, a memory, and an application stored to the memory. The application, when executed by the processor establishes a communication link from the UE to a communication terminal. The application sends a validation message to the communication terminal over the communication link, wherein a passcode is appended to the validation message send to the communication terminal. The application receives the validation message back from the communication terminal via the communication link, wherein the received validation message has an appended aggregate security signature on the message that shows that the message was read and validated by the communication terminal. The application sends a short message over the communication link to the communication terminal. The application then tears down the communication link.
-
Citations
20 Claims
-
1. A method of secure communication using short messages, comprising:
-
establishing a communication link from a user equipment (UE) to a communication terminal by the UE, the communication link comprising a plurality of nodes that include a trusted security zone and operate in trusted operation mode, wherein the trusted security zone runs a separate operating system that is not accessible to device users and the trusted security zone is implemented by partitioning hardware and software resources into a secure partition and a normal partition with sensitive resources placed in the secure partition, and wherein normal partition applications run on a first virtual processor, secure partition applications run on a second virtual processor, and the first and second virtual processors run on a single physical processor executing in a time sliced fashion; sending a validation message to the communication terminal over the communication link by the UE, wherein a passcode is appended to the validation message sent to the communication terminal, and wherein the communication terminal determines that the UE is a trusted source based on the passcode; receiving the validation message back from the communication terminal via the communication link by the UE, wherein the received validation message has an appended aggregate security signature on the validation message indicating that the communication terminal read and validated the validation message; in response to receiving the validation message back from the communication terminal, sending a short message over the communication link to the communication terminal by the UE; and tearing down the communication link by the UE. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of secure communication using short messages, comprising:
-
establishing a communication link from a user equipment (UE) to a communication terminal by the UE, the communication link comprising a plurality of nodes that include a trusted security zone and operate in trusted operation mode, wherein the trusted security zone runs a separate operating system that is not accessible to device users and the trusted security zone is implemented by partitioning hardware and software resources into a secure partition and a normal partition with sensitive resources placed in the secure partition, and wherein normal partition applications run on a first virtual processor, secure partition applications run on a second virtual processor, and the first and second virtual processors run on a single physical processor executing in a time sliced fashion; sending a validation message to the communication terminal over the communication link by the UE, the validation message being tagged by each of the plurality of nodes that it passes through over the communication link from the UE to the communication terminal, wherein a passcode is appended to the validation message sent to the communication terminal, and wherein the communication terminal determines that the UE is a trusted source based on the passcode; receiving the validation message back from the communication terminal via the communication link by the UE, wherein the validation message comprises an appended aggregate security signature that includes the compiled tags and indicates that the communication terminal read and validated the validation message, and wherein the validation message returns to the UE along the same communication link; in response to receiving the validation message back from the communication terminal, sending an SMS message over the communication link from the UE to the communication terminal by the UE; and tearing down the communication link by the UE. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A user equipment (UE), comprising:
-
a radio frequency transceiver, a processor, a memory, an application stored to the memory that, when executed by the processor, establishes a communication link from the UE to a communication terminal, the communication link comprising a plurality of nodes that include a trusted security zone and operate in trusted operation mode, wherein the trusted security zone runs a separate operating system that is not accessible to device users and the trusted security zone is implemented by partitioning hardware and software resources into a secure partition and a normal partition with sensitive resources placed in the secure partition, and wherein normal partition applications run on a first virtual processor, secure partition applications run on a second virtual processor, and the first and second virtual processors run on a single physical processor executing in a time sliced fashion, sends a validation message to the communication terminal over the communication link, wherein a passcode is appended to the validation message sent to the communication terminal, and wherein the communication terminal determines that the UE is a trusted source based on the passcode, receives the validation message back from the communication terminal via the communication link, wherein the received validation message comprises an aggregate security signature indicating that the communication terminal read and validated the validation message, in response to receipt of the validation message back from the communication terminal, sends a message over the communication link to the communication terminal, and tears down the communication link. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification