18179554. EXECUTABLE COMMAND SECURITY simplified abstract (T-MOBILE INNOVATIONS LLC)

From WikiPatents
Jump to navigation Jump to search

EXECUTABLE COMMAND SECURITY

Organization Name

T-MOBILE INNOVATIONS LLC

Inventor(s)

Marouane Balmakhtar of Fairfax VA (US)

Lyle Walter Paczkowski of Mission Hills KS (US)

EXECUTABLE COMMAND SECURITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18179554 titled 'EXECUTABLE COMMAND SECURITY

Simplified Explanation

A user communication device processes executable commands by storing code segments in isolated memories, validating them with digital certificates and cryptographic keys, retrieving and assembling the code segments, and executing the commands to access networks, servers, databases, and content.

Key Features and Innovation

  • User communication device stores code segments in isolated memories.
  • Digital certificates and cryptographic keys validate code segments.
  • Assembles and executes executable commands for accessing various items.

Potential Applications

This technology can be used in various industries such as telecommunications, cybersecurity, IoT devices, and software development.

Problems Solved

This technology ensures the security and integrity of executable commands by validating code segments with digital certificates and cryptographic keys.

Benefits

  • Enhanced security for executing commands.
  • Efficient access to networks, servers, and databases.
  • Reliable execution of commands without compromising data integrity.

Commercial Applications

Title: Secure Execution of Commands in User Communication Devices This technology can be commercialized in the telecommunications industry for secure communication, in cybersecurity for protecting sensitive data, in IoT devices for secure interactions, and in software development for ensuring code integrity.

Prior Art

Readers can explore prior art related to cryptographic key validation, secure execution of commands, and isolated memory storage in electronic devices.

Frequently Updated Research

Stay updated on advancements in cryptographic key validation, secure communication protocols, and memory isolation techniques for electronic devices.

Questions about User Communication Devices

1. How does the user communication device ensure the security of executable commands?

The user communication device validates code segments with digital certificates and cryptographic keys to ensure their authenticity and integrity before executing them.

2. What are the potential applications of this technology beyond user communication devices?

This technology can be applied in various industries such as cybersecurity, IoT devices, and software development to enhance security and data integrity.


Original Abstract Submitted

A user communication device or another type of electronic device handles executable commands. The user communication device stores individual code segments of the executable commands in isolated memories. The user communication device identifies individual digital certificates for the individual code segments. The user communication device validates the individual digital certificates for the individual code segments with individual cryptographic keys for the individual code segments. In response to successful validation, the user communication device retrieves the individual code segments from the isolated memories. The user communication device assembles the executable commands from the retrieved individual code segments. The user communication device executes the assembled executable commands. The assembled executable commands enable the user communication device to access networks, servers, databases, content, and/or some other items.