18179554. EXECUTABLE COMMAND SECURITY simplified abstract (T-MOBILE INNOVATIONS LLC)
Contents
- 1 EXECUTABLE COMMAND SECURITY
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 EXECUTABLE COMMAND SECURITY - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about User Communication Devices
- 1.13 Original Abstract Submitted
EXECUTABLE COMMAND SECURITY
Organization Name
Inventor(s)
Marouane Balmakhtar of Fairfax VA (US)
Lyle Walter Paczkowski of Mission Hills KS (US)
EXECUTABLE COMMAND SECURITY - A simplified explanation of the abstract
This abstract first appeared for US patent application 18179554 titled 'EXECUTABLE COMMAND SECURITY
Simplified Explanation
A user communication device processes executable commands by storing code segments in isolated memories, validating them with digital certificates and cryptographic keys, retrieving and assembling the code segments, and executing the commands to access networks, servers, databases, and content.
Key Features and Innovation
- User communication device stores code segments in isolated memories.
- Digital certificates and cryptographic keys validate code segments.
- Assembles and executes executable commands for accessing various items.
Potential Applications
This technology can be used in various industries such as telecommunications, cybersecurity, IoT devices, and software development.
Problems Solved
This technology ensures the security and integrity of executable commands by validating code segments with digital certificates and cryptographic keys.
Benefits
- Enhanced security for executing commands.
- Efficient access to networks, servers, and databases.
- Reliable execution of commands without compromising data integrity.
Commercial Applications
Title: Secure Execution of Commands in User Communication Devices This technology can be commercialized in the telecommunications industry for secure communication, in cybersecurity for protecting sensitive data, in IoT devices for secure interactions, and in software development for ensuring code integrity.
Prior Art
Readers can explore prior art related to cryptographic key validation, secure execution of commands, and isolated memory storage in electronic devices.
Frequently Updated Research
Stay updated on advancements in cryptographic key validation, secure communication protocols, and memory isolation techniques for electronic devices.
Questions about User Communication Devices
1. How does the user communication device ensure the security of executable commands?
The user communication device validates code segments with digital certificates and cryptographic keys to ensure their authenticity and integrity before executing them.
2. What are the potential applications of this technology beyond user communication devices?
This technology can be applied in various industries such as cybersecurity, IoT devices, and software development to enhance security and data integrity.
Original Abstract Submitted
A user communication device or another type of electronic device handles executable commands. The user communication device stores individual code segments of the executable commands in isolated memories. The user communication device identifies individual digital certificates for the individual code segments. The user communication device validates the individual digital certificates for the individual code segments with individual cryptographic keys for the individual code segments. In response to successful validation, the user communication device retrieves the individual code segments from the isolated memories. The user communication device assembles the executable commands from the retrieved individual code segments. The user communication device executes the assembled executable commands. The assembled executable commands enable the user communication device to access networks, servers, databases, content, and/or some other items.