Sei sulla pagina 1di 26

US008984592B1

(12) United States Patent (10) Patent N0.: US 8,984,592 B1


Paczkowski et al. (45) Date of Patent: Mar. 17, 2015

(54) ENABLEMENT OF A TRUSTED SECURITY 6,395,234 B1 5/2005 Lflursen 6t al~


ZONE AUTHENTICATION FOR REMOTE g; 3331:;
MOBILE DEVICE MANAGEMENT SYSTEMS 736503645 B1 1/2010 Langegdmf et al
AND METHODS 7,873,837 B1 1/2011 Lee et a1.
7,895,642 B1 2/2011 Larson et a1.
~ . - - - 7,921,303 B2 4/2011 Mauro, II
(71) Apphcam' ipglngiifgggggtggsa?gfpany 8,060,449 B1 11/2011 Zhu
3 (Continued)
(72) Inventors: Lyle W. Paczkowski, Mission Hills, KS
(Us); Matthew C_ sehlesenel.s FOREIGN PATENT DOCUMENTS
Shawnee KS (Us) WO W02011025433 A1 3/2011
. WO 2013170228 A2 11/2013
(73) As51gnee: Sprint Communications Company _
L.P., Overland Park, KS (U S) (commued)
_ _ _ _ _ OTHER PUBLICATIONS

(*) Notice: Subject to any disclaimer, the term ofth1s


patent is extended or adjusted under 35 Notice ofAllowance datedMay27, 2014, U.S.Appl.No. 13/482,731,
U.S.C. 154(b) by 0 days. ?led May 29, 2012
(Continued)
(21) App1.No.: 13/844,357
_ _ Primary Examiner * Joseph P Hirl
(22) Flled' Man 15 2013 Assistant Examiner * John B King
(51) Int. Cl.
H04L 29/06 (2006.01) (57) ABSTRACT
H04W12/08 (200901) A method of accessing secure data on a mobile device is
(52) us CL disclosed. The method comprises receiving a request to
CPC ................................... .. H04W 12/08 (2013.01) access a data Package stored Oh the mobile device- The
USPC ............................................... .. 726/4; 726/26 method comprises authorizing the request to access the data
(58) Field of Classi?cation Search package, Wherein authorizing comprises querying the request
USPC .................................................. .. 726/3 4 26 to Obtain one or more requeSt identi?cations The methOd
See application ?le for complete search history comprises granting a key in response to authorizing the
request, Wherein the key provides access to a secure environ
(56) References Cited ment storing one or more ?ags associated With the data pack
age. The method comprises granting access to the secure
U.S. PATENT DOCUMENTS environment, Wherein access is granted to the secure environ
ment in response to presenting the key to the secure environ
5 303,378 A 4/1994 COhen ment. The method comprises granting access to the data pack
6,131,024 A 10/2000 BoltZ . . .
6,219,712 B1 4/2001 Mann et al age, Wherein granting access to the data packages compnses
6,668,322 B 1 12/2003 wood et 31, setting the one or more ?ags associated With the data package.
6,823,454 B1 11/2004 Hind et a1.
6,824,064 B2 11/2004 Guthery et a1. 20 Claims, 8 Drawing Sheets

200

A mnbile reeeivee e reqneer in aocsss a data package eiereri


m \ on me rnebiie device

The ineeiie device euineiizee ine ieqiieei ie eeeeee me new


1 \ package. wherein enmenzing eeniprieee querying ine iequeei
lo obtaln one or more request iaeniiiieeiiene.

A Key ie greniee in response to euinenzing. wherein me key


"a \ provides access to e secure environment eienng ene or inere
?ags associaled with me data package.

1
205 \ Aeeeee ie granted in one eeeure envimnmeni, wherein eeeeee is
granted in lhe semis environment in ieeponee ie preeeniing
lhe key to me seeiiie environment.

The rneinie neviee may grant eeeeee 1e ine data package.


m \ wherein ereniing eeeeee ie we data package comprises
eeiiing the one or rnere iiege asseclatied wiin ine data
package.
US 8,984,592 B1
Page 2

(56) References Cited 2008/0014867 A1 1/2008 Finn


2008/0022374 A1 1/2008 Brown et al.
US PATENT DOCUMENTS 2008/0092213 A1 4/2008 Wei et a1.
2008/0097793 A1 4/2008 Dicks et a1.
8,073,428 B2 12/2011 Khetawat et a1. Zoos/0121687 A1 5/2008 Buhot
8,204,480 B1 6/2012 Lindteigen et a1, 2008/0159129 A1 7/2008 Songhurst et a1.
8,238,823 B2 8/2012 Nlaugars et al 2008/0159131 A1 7/2008 Hoe?in etal.
8,316,237 B1 11/2012 Felsheretal. Zoos/0162361 A1 7/2008 Squvsky
8,402,543 B1 3/2013 et a1, 2008/0176538 A1 7/2008 Ternllet a1.
8413 229 B2 4/2013 Mullick et al 2008/0188178 A1 8/2008 Maugars et a1.
8429409 B1 4/2013 Wall et 31 2008/0201212 A1 8/2008 Hammad etal.
8,443,420 B2 5/2013 Brown et a1. Zoos/0201578 A1 8/2008 Drake
834473983 B1 5/2013 Becketal 2008/0212503 A1 9/2008 Lipfordetal.
8,494,576 B1 7/2013 Bye et al 2008/0244758 A1 10/2008 Sahita et a1.
8,504,097 B1 8/2013 Cope et a1, 2009/0047923 A1 2/2009 Jain et :11.
8,631,247 B2 1/2014 OLoughlin et a1. 2009/0055278 A1 2/2009 Nmanl
8,632,000 B2 1/2014 Laracey 2009/0070272 A1 3/2009 Jaln
8,649,770 B1 2/2014 Cope et a1. 2009/0089449 A1 4/2009 Day
8 667 607 B2 3/2014 Paczkowski et a1, 2009/0113425 A1 4/2009 POITS et a1.
8707056 B2 4/2014 Felton 2009/0147958 A1 6/2009 Calcaterra et a1.
837122407 B1 4/2014 Cope et 31 2009/0154348 A1 6/2009 Newman
8,726,343 B1 5/2014 Borzyckiet 31 2009/0182634 A1 7/2009 Park et a1.
8,738,333 B1 5/2014 Beheraet a1. 2009/0193491 A1 7/2009 R110
8,750,839 B1 6/2014 Paczkowski et a1. 2009/0271321 A1 10/2009 Stafford
8,752,140 B1 6/2014 Paczkowski et a1. 2009/0281947 A1 11/2009 E491 _
8,762,298 B1 6/2014 et a1, 2009/0300599 A1 12/2009 Plotrowskl
8793 808 B2 7/2014 Boccon_GibOd 2009/0320028 A1 12/2009 Gellerich et a1.
838392460 B2 9/2014 Shirlen et 31 2010/0031325 A1 2/2010 Maigne etal.
8,850,568 B2 9/2014 Shirlen et a1. 2010/0052844 A1 3/2010 West
8,856,600 B2 10/2014 Zadigian et al 2010/0077487 A1 3/2010 Trav1s et a1.
8,862,181 B1 10/2014 Cope et a1, 2010/0082977 A1 4/2010 Boyle et al.
8863 252 B1 10/2014 Katzer et a1, 2010/0125904 A1 5/2010 Nice et a1.
838813977 B1 11/2014 Paczkowski et 31 2010/0128598 A1 5/2010 Gandhewar et a1.
2002/0095389 A1 7/2002 Gaines 2010/0130170 A1 5/2010 Liuetal.
2002/0156911 A1 10/2002 Croman et al 2010/0142517 A1 6/2010 Montemurro et al.
2002/0174344 A1 11/2002 Ting 2010/0146589 A1 6/2010 Safa _
2002/0181503 A1 12/2002 Montgomery, Jr. 2010/0153721 A1 6/2010 M91191Vlst
2002/0184325 A1 12/2002 Killcommons et a1. 2010/0162028 A1 6/2010 Frank etal
2002/0194361 A1 12/2002 11611 etal. 2010/0198943 A1 8/2010 Harrang etal
2002/0194496 A1 12/2002 Grif?n et a1. 2010/0223348 A1 9/2010 PrZybySZ etal
2003/0126225 A1 7/2003 Camble et a1. 2010/0228937 A1 9/2010 B99 etal
2003/0237002 A1 12/2003 Oishiet al 2010/0241847 A1 9/2010 vanderHorstet a1.
2004/0158840 A1 8/2004 Rothman etal. 2010/0246818 A1 9/2010 Yao
2004/0202328 A1 10/2004 Ham 2010/0269156 A1 10/2010 Hohlfeldet a1.
2004/0233844 A1 11/2004 Yu et 31 2010/0274726 A1 10/2010 Floreketal.
2004/0234049 A1 11/2004 Melideo 2010/0281139 A1 11/2010 139129411
2004/0243810 A1 12/2004 Rindborget al 2010/0299313 A1 11/2010 Or51n1etal.
2005/0015601 A1 1/2005 Tabi 2010/0306353 A1 12/2010 ancoe etal.
2005/0052994 A1 3/2005 Lee 2010/0318802 A1 12/2010 Balakrishnan
2005/0091505 A1 4/2005 Rileyetal. 2010/0328064 A1 12/2010 R0861
2005/0138433 A1 6/2005 Linetsky 2011/0010720 A1 1/2011 Smlth etal.
2005/0235166 A1 10/2005 England etal. 2011/0014948 A1 1/2011 Yeh
2005/0239481 A1 10/2005 Seligmann 2011/0021175 A1 1/2011 Floreketal.
2005/0289355 A1 12/2005 Kitariev et a1. 2011/0035604 A1 2/2011 Habmken
2006/0036851 A1 2/2006 DeTreville 2011/0055084 A1 3/2011 $111811
2006/0156026 A1 7/2006 Utin 2011/0078081 A1 3/2011 P1rzadeh et a1.
2006/0190605 A1 8/2006 Franz etal 2011/0082711 A1 4/2011 Poeze et a1.
2006/0212853 A1 9/2006 Sutardja 2011/0112968 A1 5/2011 Floreketal.
2006/0224901 A1 10/2006 Lowe 2011/0113479 A1 5/2011 Ganem
2006/0245438 A1 11/2006 Sajassi et a1. 2011/0154032 A1 6/2011 Mauro/II
2006/0259790 A1 11/2006 Asokan etal 2011/0166883 A1 7/2011 Palmeretal.
2006/0261949 A1 11/2006 Kim et a1, 2011/0202916 A1 8/2011 VoBa et a1.
2006/0277307 A1 12/2006 Bernardin et a1. 2011/0212707 A1 9/2011 Mahalal
2006/0277433 A1 12/2006 Largman etal 2011/0216701 A1 9/2011 Patel et 31.
2007/0011061 A1 1/2007 East 2011/0226853 A1 9/2011 Soh etal.
2007/0038648 A1 2/2007 Chetwoodetal. 2011/0237190 A1 9/2011 Jollvet _
2007/0061535 A1 3/2007 Xu etal 2011/0238573 A1 9/2011 Varadarajan
2007/0078988 A1 4/2007 Miloushev et a1. 2011/0238992 A1 9/2011 Jancula etal
2007/0079120 A1 4/2007 Bade et a1. 2011/0246609 A1 10/2011 Klm
2007/0094273 A1 4/2007 Fritsch et a1. 2011/0251892 A1 10/2011 Laracey
2007/0094691 A1 4/2007 Gazdznski 2011/0258462 A1 10/2011 Robenson etal.
2007/0162759 A1 7/2007 Buskey etal. 2011/0281558 A1 11/2011 Winter
2007/0177771 A1 8/2007 Tanaka et a1. 2011/0294418 A1 12/2011 Chen
2007/0180120 A1 8/2007 Bainbridge etal. 2012/0003983 A1 1/2012 Sherlock et a1.
2007/0186212 A1 8/2007 Mazzaferrietal. 2012/0011572 A1 1/2012 Chew et a1.
2007/0197261 A1 8/2007 Humbel 2012/0021683 A1 1/2012 Ma et a1.
2007/0214332 A1 9/2007 Sonoda etal. 2012/0023583 A1 1/2012 Sallam
2007/0276969 A1 11/2007 Bressy et a1. 2012/0028575 A1 2/2012 Chen et a1.
2007/0277223 A1 11/2007 Datta et a1. 2012/0029997 A1 2/2012 Khan etal.
US 8,984,592 B1
Page 3

(56) References Cited FOREIGN PATENT DOCUMENTS


U.S. PATENT DOCUMENTS WO 2014004590 A2 1/2014
WO 2014018575 A2 1/2014
2012/0036347 A1 2/2012 Swanson et a1. WO 2014025687 A2 2/2014
2012/0052801 A1 3/2012 Kulkarni WO WO2014158431 A1 10/2014
2012/0072481 A1 3/2012 Nandlall et al.
2012/0072979 A1 3/2012 Clia et al. OTHER PUBLICATIONS
2012/0084211 A1 4/2012 Petrov et al.
2012/0084438 A1 4/2012 Raleigh et al. Advisory Action dated May 29, 2014, US. Appl. No. 13/470,203,
2012/0084836 A1 4/2012 Mahaffey et al. ?led May 11, 2012,
2012/0089700 A1 4000 safrutl et al' FAIPP Pre-Interview Communication dated May 12, US. Appl. No.
2012/0102202 A1 400 Omar. . 13/294 177 ?led Nov 11 2011
2012/0123868 A1 5/2012 Brudnlckl et al. _ _ ' '
2012/0130839 A1 5/2012 Koh et a1, FlIlal Of?ce ACHOII datedApr. IO, 2014, US. NO. I3/57I,348,
2012/0131178 A1 5/2012 Zhu etal. ?led Aug 10, 2012
2012/0137119 A1 5/2012 Doerr et al. FAIPP Pre-Interview Communication dated Apr. 3, 2014, US. Appl.
2012/0143703 A1 6/2012 Wall et al. NO, 13/302,383,?1edMar, 13, 2013,
EAbOISSgn teglal' First Action Interview Of?ce Action dated May 23, 2014, US. Appl.
amma e .
2012/0159163 A1 6/2012 VOIl Behieii etal. NO' .13/802383?ledMar' 13 2013' .
2012/0159612 A1 6000 Reisgies Forelgn Communlcatlon from a-Related Counterpartilnternatlonal
2012/0163206 A1 6000 Leung et 31 Search Report andWr1tten Op1n10n, datedApr. 22, 2014, PCT/US13/
2012/0168494 A1 7/2012 Kim 53617, ?led on Aug 5, 2013
2012/0178365 A1 7/2012 Katz @1211, Not1ce of Allowance dated Nov. 29, 2013, US. Appl. No.
2012/0178366 A1 7/2012 Levy et al. l3/440,980,?1edAPr, 5, 2012,
2012/0190332 A1 7/2012 Charles Of?ce Action dated Dec. 19, 2013, US. Appl. No. 13/557,213, ?led
2012/0198519 A1 8/2012 Parla et a1. Jul. 25, 2012.
2012/0202423 A1 55/2012 Tiedemann et al~ FAIPP Pre-Interview Communication dated Nov. 27, 2013, US.
2012/0207165 A1 8/2012 Davis Appl. No. 13/610,856, ?led Sep. 11,2012.
2012/0226582 A1 9/2012 Hammad Notice ofAllowance date Jan. 31, 2014, US. Appl. No. 13/610,856,
2012/0226772 A1 9/2012 Grube et al. ?led Sep 11 2012
2012/0238206 A1 9/2012 Singh et al. C W B t l E t d d T td S .t Z Rad.
2012/0252480 A1 10/2012 Kidd et al. Ope men " e a " X en e 13 e ecu y one 1
2012/0255016 A1 10/2012 Sallam Modem, ?led Nov. 26, 2013, US. Appl. No. 14/090,667.
2012/0258690 A1 10/2012 Chen et al PacZkowski, Lyle W., et al., Trusted Security Zone Containers for
2012/0266076 A1 10/2012 Lockhart et al, the Protection andCon?dentialityofTrusted Service ManagerData,
2012/0266220 A1 10/2012 Brudnicki et al, ?led Feb. 16, 2014, PCT Application No. PCT?JSl4/l6651.
2012/ 0272306 A1 10/ 2012 Benaloh et al. Foreign Communication from a Related Counterpartilnternational
2012/ 0284195 A1 1 1/ 2012 McMillen et al. Search Report and Written Opinion, dated Dec. 2, 2013, PCT/U S 13/
2012/0291095 A1 11/2012 Narendra et al. 40673, ?led on May 10, 2013,
2012/0295588 A1 11/2012 Chen et 31' Giesecke & Devrient, The OTA Platform in the World ofLTE, Jan.
2012/0297187 A1 11/2012 paya et al' 2011, http://www.gi-de.com/gdimedia/media/en/documents/bro
1 5531111 2: if chures/mobileisecurityi2/csteil/OTA-and-LTE.pdf.
2012/0324293 A1 12/2012 Grube et a'L Pesonen, Lauri, Development of Mobile Payment Ecosystemi
2013/0014259 A1 1/2013 Gribble et al. NFC Based Payment SerVices3 Aug 27 2008
2013/0035056 A1 2/2013 prasad et al Foreign Communication from a Related Counterpartilnternational
2013/0047197 A1 2/2013 Sarin e1 31 Search Report and Written Opinion, dated Feb. 4, 2014, PCT/US13/
2013/0054474 A1 2/2013 Yeager 47729,?1ed on 111025.201}
2013/ 0062417 A1 3/2013 Lee et al. Foreign Communication from a Related Counterpartilnternational
2013/0067552 A1 3/2013 Hawkes et al. Search Report and Written Opinion, dated Feb. 4, 2014, PCT/US13/
2013/0086684 A1 4/2013 Mohler 51750, ?led on 1111241013,
2013/0097302 A9 4/2013 KhFdQUIi et al~ FAIPP Pre-Interview Communication dated Oct. 24, 2012, US.
gggg??gg 2} Slag: ettaii
e ro ae .
Appl. No. 13/463,797, ?led May 3, 2012.
-
2013/0117186 A1 5/2013 Weinstein et al Ezgcf/szigllggvlalce dated Mar. 1, 2013, US. Appl. No. 13/463,797,
2013/0136126 A1 5/2013 Wang et a1. y '. . .
ZOE/0138521 A1 5/2013 Want et al FAIPP Pre-Interv1ew Communlcatlon dated Jun. 12, 2013, US.
2013/0138959 A1 5/2013 Pelly et al. Appl N~ 13/44019801?ledAPr; 5, 2012
2013/0140360 A1 6/2013 Graylin FAIPP Pre-Interv1ew Communlcatlon dated Oct. 24, 2012, US.
2013/0143489 A1 6/2013 Meiiis etal. APP1~ NO~ l3/463,801, ?led May3, 2012,
2013/0145429 A1 6/2013 Mendel et al. Notice ofAllowance dated Mar. 14, 2013,U.S.Appl.No. 13/463,801,
2013/0159186 A1 6/2013 Burdnicki et al. ?led May 3, 2012.
2013/0159710 A1 6/2013 Khan _ FAIPPPre-InterviewCommunication datedJul.25,2013,U.S.Appl.
2013/0160120 A1 6/2013 Malav1ya et 31. NO 13/470,203,?1ed May 11, 2012
ZOE/0174147 A1 7/2013 sahlta et_ 31' FAIPP Pre-Interview Communication dated Jun. 6, 2013, US. Appl.
2013/0212704 A1 8/2013 Shablygln et al. No, 13/571,348,?1edAug' 10, 2012
2013/0263212 A1 10/2013 Faltyn etal. FAIPPP _I t . C . t. d t d] 5 2013 Us A l
2013/0305333 A1 11/2013 Katzer et al. re n emew ommumca 1 1 e n' l l ' ' PP '

2013/0332456 A1 12/2013 AIklIl N_~ 1355630911! 114/2012


2013/0345530 A1 12/2013 McRObeI-ts et 31 n 600/323 FlrSt Actlon Interv1ew Of?ce Actlon datedAug. 19,2013,U.S.Appl.
2013/0347103 A1 12/2013 Veteikis et al. N0~ 13/556,200,?1ed 111124.2012.
2014/0033316 A1 1 /2() 14 Paczkowski e1 31, ,,,,,,,,, H 726/26 First Action Interview Pre-Interview Communication dated Dec. 27,
2014/0047543 A1 2/2014 Bye e131, 2011, US. Appl. No. 12/486,873, ?led Jun. 18, 2009.
2014/0074508 A1 3/2014 Ying @131, First Action Interview Of?ce Action dated Feb. 13, 2012, US. Appl.
2014/0188738 A1 7/2014 Huxham No. 12/486,873, ?led Jun. 18,2009.
2014/0245444 A1 8/2014 Lutas et a1. Of?ce Action dated Jul. 5, 2012, US. Appl. No. 12/486,873, ?led
2014/0281544 A1 9/2014 Paczkowski et al. Jun. 18,2009.
US 8,984,592 B1
Page 4

(56) References Cited Network Based on Event Triggers Generated by the Portable Com
munication Device, ?led Mar. 15, 2013, US. Appl. No. 13/844,282.
OTHER PUBLICATIONS PacZkowski, Lyle W., et al., JTAG Fuse Vulnerability Determination
and Protection Using a Trusted Execution Environment, ?led Mar.
Final Of?ce Action dated Feb. 1, 2013, US. Appl. No. 12/486,873, 15, 2013, US. Appl. No. 13/844,325.
?led Jun. 18,2009. PacZkowski, Lyle W., et al., Trusted Security Zone Containers for
Cope, Warren B., et al., Electronic Purchase Transaction Trust Infra the Protection and Con?dentiality of Trusted Service Manager Data,
structure, ?led May 29, 2012, US. Appl. No. 13/482,731. ?led Mar. 14, 2013, US. Appl. No. 13/831,463.
Cope, Warren B., et al., Alternative hardware and Software Con Bye, Stephen James, et al., Delivering Digital Content to a Mobile
?guration for Near Field Communication, ?led May 4, 2012, US. Device via a Digital Rights Clearing House, ?ledApr. 10, 2013, US.
Appl. No. 13/463,797. Appl. No. 13/860,338.
Cope, Warren B., et al., Multiple Secure Elements in Mobile Elec PacZkowski, Lyle W., et al., Method for Enabling Hardware Assisted
tronic Device with Near Field Communication Capability, ?led Apr. Operating System Region for Safe Execution of Untrusted Code
5, 2012, US. Appl. No. 13/440,980. Using Trusted Transitional Memory, ?led May 20, 2013, US. Appl.
Bye, Stephen James, et al., Near Field Communication Authentica No. 13/898,435.
tion and Validation to Access Corporate Data, ?led May 3, 2012, PacZkowski, Lyle W., et al., Verifying Applications Using a Trusted
US. Appl. No. 13/463,801. Security Zone, ?led Aug. 12, 2013, US. Appl. No. 13/964,112.
Katzer, Robin D., et al., Web Server Bypass of Backend Process on PacZkowski, Lyle W., et a1 ., Mobile Access Terminal with Local Call
Near Field Communications and Secure Elements Chips, ?led May Session Control Function, ?led Jun. 18, 2009, US. Appl. No.
11, 2012, US. Appl. No. 13/470,203. 12/486, 873.
Katzer, Robin D., et al., Web Server Bypass of Backend Process on Zimmerman, Ann, Check Out the Future of Shopping, The Wall
Near Field Communications and Secure Elements Chips, ?led May Street Journal, Business, May 18, 2011, http://online.wsj,com/ar
10, 2013, PCT Application No. PCT/US13/40673. ticle/SB10001424052748703421204576329253050634700.html.
Katzer, Robin D., et al., Secure Placement of Centralized Media Garry, Michael, Kroger Test Prepares for Mobile Futurez, SN, Super
Controller Application in Mobile Access Terminal, ?led Nov. 11, market News, Jun. 13, 2011, http://supermarketnews.com/technol
2011, US. Appl. No. 13/294,177. ogy/kroger-test-prepares-mobile-future.
Mcroberts, Leo Michael, et al., End-to-End Trusted Communica Jones, Sally, Industry Trends in POS Hardware for Mobile
tions Infrastructure, ?led Jun. 25, 2012, US. Appl. No. 13/532,588. Devices, Aug. 31, 2011, http://pointofsale.com/20110831734/Mo
Mcroberts, Leo Michael, et al., End-to-End Trusted Communica bile-POS-News/industry-trends-in-pos-hardware-for-mobile-de
tions Infrastructure, ?led on Jun. 25, 2013, PCT Serial No. PCT/ vices.html.
US 13/47729. Final Of?ce Action dated Sep. 9, 2013, US. Appl. No. 13/440,980,
PacZkowski, Lyle W., et al., Trusted Policy and Charging Enforce ?led Apr. 5,2012.
ment Function, ?led Jun. 27, 2012, US. Appl. No. 13/533,969. Of?ce Action dated Sep. 25, 2013, US. Appl. No. 13/571,348, ?led
Bye, Stephen James, et al., Systems and Methods for Provisioning Aug. 10,2012.
and Using Multiple Trusted Security Zones on an Electronic Device, Notice of Allowance dated Aug. 30, 2013; US. Appl. No.
?led Aug. 10, 2012, US. Appl. No. 13/571,348. 13/540,437, ?led Jul. 2,2012.
Bye, Stephen James, et al., Systems and Methods for Provisioning Restriction Requirement dated Nov. 1, 2013, US. Appl. No.
and Using Multiple Trusted Security Zones on an Electronic Device, 13/557,213 ?led Jul. 25, 2012.
?led on Aug. 5,2013, PCT Serial No. PCT/US13/53617. Notice ofAllowance dated Oct. 16, 2013, US. Appl. No. 13/556,200,
Bye, Stephen James, et al., Trusted Signaling in Long Term Evolu ?led Jul. 24, 2012.
tion (LTE) 4G Wireless Communication, ?led Feb. 7, 2013, US. FAIPP Pre-Interview Communication dated Mar. 20, 2014, US.
Appl. No. 13/762,319. Appl. No. 13/482,731, ?led May 29,2012.
Cope, Warren B., et al., Extended Trusted Security Zone Radio Final Of?ce Action dated Mar. 27, 2014, US. Appl. No. 13/470,203,
Modem, ?led Jul. 2, 2012, US. Appl. No. 13/540,437. ?led May 11, 2012.
Katzer, Robin D., et al., Trusted Access to Third Party Applications Notice ofAllowance dated Jan. 28, 2014, US. Appl. No. 12/486,873,
Systems and Methods, ?led Jul. 25, 2012, US. Appl. No. ?led Jun. 18, 2009.
13/ 557,213. PacZkowski, Lyle W., et al., Trusted Security Zone Access to Periph
PacZkowski, Lyle W., et al., System and Methods for Trusted eral Devices, ?led Jan. 6, 2014, US. Appl. No. 14/148,714.
Internet Domain Networking, ?led Sep. 11, 2012, US. Appl. No. Advisory Action dated Jun. 23, 2014, US. Appl. No. 13/571,348,
13/ 610,856. ?led Aug. 10,2012.
PacZkowski, Lyle W., et al., Trusted Security Zone Access to Periph Notice ofAllowance dated Jun. 4, 2014, US. Appl. No. 13/557,213,
eral Devices, ?led Jul. 24, 2012, US. Appl. No. 13/556,200. ?led Jul. 25, 2012.
PacZkowski, Lyle W., et al., Trusted Security Zone Access to Periph Notice ofAllowance dated Jul. 8, 2014, US. Appl. No. 13/802,383,
eral Devices, ?led Jul. 24, 2013, PCT Application No. PCT/US13/ ?led Mar. 13,2013.
5 1750. Restriction Requirement dated Aug. 14, 2014, US. Appl. No.
PacZkowski, Lyle W., et al., Trusted Security Zone Communication 13/594,777, ?led Aug. 25, 2012.
Addressing on an Electronic Device, ?led Mar. 15, 2013, US. Appl. FAIPP Pre-Interview Communication dated Jul. 17, 2014, U. S. Appl.
No.13/844,145. No. 13/594,778, ?led Aug. 25, 2012.
Bye, Stephen James, et al., Protection for Multimedia Files Pre FAIPP Pre-Interview Communication dated Jul. 17, 2014, U. S. Appl.
Downloaded to a Mobile Device, ?led Apr. 15, 2013, US. Appl. No. No. 13/594,779, ?led Aug. 25, 2012.
13/ 863,376. Of?ce Action dated May 5, 2014, US. Appl. No. 13/786,450, ?led
PacZkowski, Lyle W., et al., Point-of-Sale and Automated Teller Mar. 5, 2013.
Machine Transactions Using Trusted Mobile Access Device, ?led FAIPP Pre-Interview Communication dated Aug. 6, 2014, U. S. Appl.
Mar. 13, 2013, US. Appl. No. 13/802,383. No. 13/831,486, ?led Mar. 14,2013.
PacZkowski, Lyle W., et al., Trusted Security Zone Re-Provisioning Foreign Communication from a Related CounterpartiInternational
and Re-Use Capability for Refurbished Mobile Devices, ?led Mar. Search Report and Written Opinion, dated Jul. 11, 2014, PCT/U S 14/
14, 2013, US. Appl. No. 13/831,486. 16651, ?led on Feb. 16,2014.
PacZkowski, Lyle W., et al., Trusted Security Zone Enhanced with Kunkel, Philip M., et al., Secure Peer-to-Peer Call Forking Facili
Trusted Hardware Drivers, ?led Mar. 13, 2013, US. Appl. No. tated by Trusted 3rd Party Voice Server Provisioning, ?led Oct. 29,
13/ 802,404. 2013, US. Appl. No. 14/066,661.
PacZkowski, Lyle W., et al., Restricting Access of a Portable Com BertZ, Lyle T., et al., Framework for Real -Time Brokering of Digital
munication Device to Con?dential Data or Applications via a Remote Content Delivery, ?led Aug. 25, 2012, US. Appl. No. 13/594,777.
US 8,984,592 B1
Page 5

(56) References Cited Ahmed, Farid, et al., Correlation-based Watermarking Method for
Imagine Authentication Applications, Society of Photo-Optical
OTHER PUBLICATIONS Instrumentation Engineers, Feb. 17, 2004, pp. 1834-1838.
Of?ce Action dated Aug. 29, 2014, U.S. Appl. No. 13/470,203, ?led
BertZ, Lyle T., et al.,Reservations in Real-Time Brokering of Digital on May 11, 2012.
Content Delivery, ?led Aug. 25, 2012, U.S. Appl. No. 13/594,778. Notice ofAllowance dated Oct. 8, 2014, U.S. Appl. No. 13/294, 177,
BertZ, Lyle T., et al., File Retrieval in Real-Time Brokering of
Digital Content Delivery, ?led Aug. 25, 2012, U.S. Appl. No. ?led on Nov. 11,2011.
13/ 594,779. FAIPP Pre-Interview Communication dated Sep. 25, 2014, U.S.
PacZkowski, Lyle W., et al., Trusted Security Zone Watermark, Appl. No. 13/533,969, ?led on Jun. 27, 2012.
?led Mar. 5, 2013, U.S. Appl. No. 13/786,450. FAIPP Pre-Interview Communication dated Nov. 12, 2014, U.S.
PacZkowski, Lyle W., et al., Trusted Processing Location Within a Appl. No. 13/844,145, ?led on Mar. 15, 2013.
Graphics Processing Unit, ?led Jul. 10, 2013, U.S. Appl. No. Notice ofAllowance dated Sep. 19, 2014, U.S. Appl. No. 13/594,778,
13/939,175. ?led on Aug. 25, 2012.
McCracken, Billy Gene, Jr., et a1. Mobile Communication Device Final Of?ce Action dated Nov. 7, 2014, U.S. Appl. No. 13/786,450,
Profound Identity Brokering Framework, ?led Jun. 6, 2013, U.S. ?led on Mar. 5,2013.
Appl. No. 13/912,190. Notice ofAllowance dated Sep. 26, 2014, U.S. Appl. No. 13/831,486,
Urbanek, Robert E, Subscriber Identity Module Virtualizationz, ?led ?led on Mar. 14, 2013.
Nov. 20, 2013, U.S. Appl. No. 14/085,474. FAIPP Pre-Interview Communication dated Nov. 7, 2014, U.S. Appl.
Krieger, Michael D., et al., Billing Varied Service Based on Tier, No. 13/802,404, ?led on Mar. 13,2013.
?led Nov. 8, 2013, U.S. Appl. No. 14/075,663. FAIPP Pre-Interview Communication dated Oct. 29, 2014, U.S.
PacZkowski, Lyle W., et al., Trusted Display and Transmission of Appl. No. 13/844,282, ?led on Mar. 15,2013.
Digital Ticket Documentation, ?led Jan. 24, 2014, U.S. Appl. No. FAIPP Pre-Interview Communication dated Oct. 21, 2014, U.S.
14/ 163,047. Appl. No. 13/844,325, ?led on Mar. 15,2013.
Loman, Clint H., et al., Veri?cation of Mobile Device Integrity Foreign Communication from a Related CounterpartiInternational
During Activation, ?led Mar. 28, 2014, U.S. Appl. No. 14/229,532. Preliminary Report on Patentability, dated Nov. 20, 2014, PCT/
PacZkowski, Lyle W., et al., Network Based Temporary Trust Exten US13/40673, ?led on May 10, 2013.
sion to a Remote or Mobile Device Enabled via Specialized Cloud Perrig, Adrian, et al., SPINS: Security Protocols for Sensor Net
Services, ?led Jul. 29, 2014, U.S. Appl. No. 14/446,330. works, ACM, Sep. 2002, vol. 8, pp. 521-534.
Cordes, Kevin R., et al., Digest of Biographical Information for an Clark, CJ., et a1. Anti-tamper JTAG TAP design enables DRM to
Electronic Device with Static and Dynamic Portions, ?led Apr. 4, JTAG registers and P1687 on-chip instruments, 2010 IEEE, Inter
2013,U.S.Appl.No.13/857,141. national Symposium on Hardware-Oriented Security and Trust
Cordes, Kevin R., et al., Radio Frequency Identity (RFID) Chip (HOST). Pub. Date: 2010. Relevant pp. 19-24. http://ieeexploreieee.
Electrically and Communicatively Coupled to Motherboard of org/stamp/stamp.j sp?tp:&arnumber:55 131 19.
Mobile Communication Device, ?led Apr. 4, 2013, U.S. Appl. No. Lee, Jeremy, et al., A Low-Cost Solution for Protecting IPs Against
13/ 857,139. Scan-Based Side Channel Attacks, 24th IEEE VLSI Test Sympo
Cordes, Kevin R., et al., System for Managing a Digest of Bio sium. Pub. Date: 2006. http//ieeexplore.ieee.org/ stamp/ stamp.
graphical Information Stored in a Radio Frequency Identity Chip jsp?tp:&arnumber:1617569.
Coupled to a Mobile Communication Device, ?led Apr. 4, 2013,
U.S.Appl.No.13/857,138. * cited by examiner
US. Patent Mar. 17, 2015 Sheet 1 0f8 US 8,984,592 B1

10

12

\ a
Mobile Device A 14
20 '\
\ Radio XCVR / BTS
22
\\ User Interface

Memory 25 r s r \i J 4 \\~?/~ 15
24 f 1'. xx
\\ Data Package J, \
i, Network
,7 \\
Secure Environment \\
26 \\ /~ 27 1~~ A ' Q,

50 40

Data paCKage Access Server


Administering Server
"' Processor
421

FIG. 1
US. Patent Mar. 17, 2015 Sheet 2 0f8 US 8,984,592 B1

200

f
@
A mobile receives a request to access a data package stored
202 \ on the mobile device.

The mobile device authorizes the request to access the data


204 \ package, wherein authorizing comprises querying the request
to obtain one or more request identifications.

A key is granted in response to authorizing, wherein the key


206 _\ provides access to a secure environment storing one or more
flags associated with the data package.

208 \ Access is granted to the secure environment, wherein access is


granted to the secure environment in response to presenting
the key to the secure environment.

l
The mobile device may grant access to the data package,
210 \ wherein granting access to the data package comprises
setting the one or more flags associated with the data
package.

FIG. 2
US. Patent Mar. 17, 2015 Sheet 3 0f8 US 8,984,592 B1

300

The mobile device enables a user to secure one or more data


packages from wireless access, wherein securing one or more
302 _\ data packages comprises setting one or more data package
flags associated with the one or more data packages using a
mobile device interface, wherein at least the one or more data
package flags are stored in a secure environment on the
mobile device.

l
The mobile device receives a wireless request to access the
304 \
one or more data packages.

The mobile device queries the wireless request to access the


306 \ one or more data packages, wherein querying comprises
requesting one or more wireless request identifications.

l
Access to the one or more data packages is denied based on
querying the wireless request to access the one or more data
308 -\ packages, wherein denying access to the one or more data
packages comprises denying access to the secure
environment storing at least the one or more data package
flags.

FIG. 3
US. Patent Mar. 17, 2015 Sheet 4 0f8 US 8,984,592 B1

400

The mobile device receives a request to install one or more


data package flags in a secure environment on the mobile
402 \ device, wherein the one or more data package flags are
associated with one or more data packages.

l
The mobile device authorizes the request to install the one or
more data package flags in the secure environment, wherein
404 \
authorizing comprises querying the request to obtain one or
more request identifications.

l
The mobile device grants a key based on the authorization of
405 -\ the request to install the one or more data package flags in the
secure environment, wherein the key provides access to install
one or more data package flags in the secure environment.

l
The mobile stores one or more installed data package flags in
the securement environment through the use of the key,
408 \ wherein storing the one or more installed data package flags
secures one or more associated data packages on the mobile
device.

FIG. 4
US. Patent Mar. 17, 2015 Sheet 5 0f8 US 8,984,592 B1

500

502
\

40>
504 \ v
IIIUU
DUE
DUE
_ DUE

FIG. 5
US. Patent Mar. 17, 2015 Sheet 6 0f8 US 8,984,592 B1

500

506 \ Antenna & Front End

508 \ RF Transceiver

512 '\ Microphone _> f51 0

514 -\ Earpiece _ Basebancl


P .
516 \ Headset 0 rocessmg GPS f538

520 \
'\ Card
Memory H
4., "O
ch H DSPi

522 \ USB 0 532 \ Touch Screen/LCD

524 \ Infrared 4_> i


530 -\
526 \ Vibrator 0 Touch Screen/LCD

536 \ Camera

i
534 '\ Camera

FIG. 6
US. Patent Mar. 17, 2015 Sheet 7 0f8 US 8,984,592 B1

702

608 610 612

Web Media JAVA

A L k

606 \ Application Management Services (AMS)


k
r
704 \ Operating System Software

FIG. 7A

620

622 \ Applications

624 \ Application Framework

626 \ Libraries _ Runtime / 630

628 \ OS Kernel

FIG. YB
US. Patent Mar. 17, 2015 Sheet 8 0f8 US 8,984,592 B1

380

382

384 \ Secondary

Network / 392

FIG. 8
US 8,984,592 B1
1 2
ENABLEMENT OF A TRUSTED SECURITY access to the data packages comprises setting the one or more
ZONE AUTHENTICATION FOR REMOTE ?ags associated with the data package.
MOBILE DEVICE MANAGEMENT SYSTEMS A method of securing data on a mobile device is disclosed.
AND METHODS The method comprises enabling a user to secure one or more
data packages from wireless access, wherein securing one or
CROSS-REFERENCE TO RELATED more data packages comprises setting one or more data pack
APPLICATIONS age ?ags associated with the one or more data packages using
a mobile device interface, wherein at least the one or more
None. data package ?ags are stored in a secure environment on the
mobile device, wherein the secure environment prevents
STATEMENT REGARDING FEDERALLY unauthorized access to the one or more ?ags, wherein the
SPONSORED RESEARCH OR DEVELOPMENT secure environment comprises a trusted security zone or a
secure element, wherein the trusted security zone comprise
Not applicable. one or more chipsets with a hardware root of trust, a secure
execution environment for applications, and secure access to
REFERENCE TO A MICROFICHE APPENDIX peripherals, and wherein the secure element comprises a
secure operating environment comprising a microprocessor,
Not applicable. memory, and operating system. The method further com
prises receiving a wireless request to access the one or more
BACKGROUND 20 data packages. The method also comprises querying the wire
less request to access the one or more data packages, wherein
Electronic communications may carry a wide variety of querying comprises requesting one or more wireless request
content, for example electronic mail, medical records, ?nan identi?cations. The method comprises denying access to the
cial transactions, and other con?dential information. The one or more data packages based on querying the wireless
electronic communications may travel for some of the com 25 request to access the one or more data packages, wherein
munication end-to-end path over unsecured communication denying access to the one or more data packages comprises
links where the content may be subject to tampering or intru denying access to the secure environment storing at least the
sion. A variety of security measures have been applied to one or more data package ?ags.
provide increased security and to raise the level of dif?culty A method of installing secure data on a mobile device is
for nefarious actors attempting to access the con?dential 30 disclosed. The method comprises receiving a request to
information. Applications are sometimes uploaded to com install one or more data package ?ags in a secure environment
puting platforms and/or communication devices from sources on the mobile device, wherein the one or more data package
that make no warranty of the integrity of the applications. For ?ags are associated with one or more data packages, wherein
example, sometimes individual application developers may the secure environment prevents unauthorized access to the
upload an application that they offer for free or for a purchase 35 one or more ?ags, wherein the secure environment comprises
price to the source, such as an application repository. These a trusted security zone or a secure element, wherein the
applications may be deliberately or unknowingly infected trusted security zone comprise one or more chipsets with a
with malware. When one of these applications is downloaded hardware root of trust, a secure execution environment for
to a computing platform and/ or a mobile communication applications, and secure access to peripherals, and wherein
device, the computing platform and/ or the mobile communi 40 the secure element comprises a secure operating environment
cation device may have a negative experience because of comprising a microprocessor, memory, and operating system.
malware carried in the downloaded application. The method further comprises authorizing the request to
install the one or more data package ?ags in the secure envi
SUMMARY ronment, wherein authorizing comprises querying the request
45 to obtain one or more request identi?cations. The method also
A method of accessing secure data on a mobile device is comprises granting a key based on the authorization of the
disclosed. The method comprises receiving a request to request to install the one or more data package ?ags in the
access a data package stored on the mobile device. The secure environment, wherein the key provides access to
method further comprises authorizing the request to access install one or more data package ?ags in the secure environ
the data package, wherein authorizing comprises querying 50 ment. The method comprises storing one or more installed
the request to obtain one or more request identi?cations. The data package ?ags in the secure environment through the use
method also comprises granting a key in response to autho of the key, wherein storing the one or more installed data
rizing the request, wherein the key provides access to a secure package ?ags secured one or more associated data packages
environment storing one or more ?ags associated with the on the mobile device.
data package, wherein the secure environment prevents unau 55 These and other features will be more clearly understood
thorized access to the one or more ?ags, wherein the secure from the following detailed description taken in conjunction
environment comprises a trusted security zone or a secure with the accompanying drawings and claims.
element, wherein the trusted security zone comprise one or
more chipsets with a hardware root of trust, a secure execu BRIEF DESCRIPTION OF THE DRAWINGS
tion environment for applications, and secure access to 60
peripherals, and wherein the secure element comprises a For a more complete understanding of the present disclo
secure operating environment comprising a microprocessor, sure, reference is now made to the following brief description,
memory, and operating system. The method comprises grant taken in connection with the accompanying drawings and
ing access to the secure environment, wherein access is detailed description, wherein like reference numerals repre
granted to the secure environment in response to presenting 65 sent like parts.
the key to the secure environment. The method further com FIG. 1 is an illustration of a communication system accord
prises granting access to the data package, wherein granting ing to an embodiment of the disclosure.
US 8,984,592 B1
3 4
FIG. 2 is a ?ow chart of a method according to an embodi deleting the information associated with the personal per
ment of the disclosure. sona. Using the system disclosed, the mobile device user may
FIG. 3 is a ?ow chart of another method according to an prevent a nefarious entity from accessing the con?dential
embodiment of the disclosure. information before the user gets back to the coffee shop to
FIG. 4 is a ?ow chart of another method according to an retrieve their mobile device. Additionally, if the mobile
embodiment of the disclosure. device user does recover their mobile device, the user retains
FIG. 5 is an illustration of a mobile phone according to an all the data associated with the personal persona. Further
embodiment of the disclosure. more, even though the personal persona is protected because
FIG. 6 is a block diagram of a mobile phone according to an the ?ags have been set, authorized entities (i.e. non-nefarious
embodiment of the disclosure. entities) may access one or more data packages associated
FIG. 7A is an illustration of a software architecture for a with the persona persona by providing credentials to obtain
mobile phone according to an embodiment of the disclosure. authorization.
FIG. 7B is an illustration of another software architecture This may be accomplished by creating a secure environ
for a mobile phone according to an embodiment of the dis ment on a mobile device. The secure environment may pro
closure. tect data, instructions, and/or ?ags associated with data stored
FIG. 8 is an illustration of a computer system according to in an unsecured memory environment and/ or data stored in
an embodiment of the disclosure. the secured environment on the mobile device. Flags stored in
the secure environment may be set so that a server such as
DETAILED DESCRIPTION a data package administering server may access, manipulate,
20 update, delete, and/or the like, one or more data packages
It should be understood at the outset that although illustra associated with the one or more set ?ags. In an embodi
tive implementations of one or more embodiments are illus ment, data packages may comprise one or more bits of data
trated below, the disclosed systems and methods may be utilized for example by an application, logic instructions for
implemented using any number of techniques, whether cur an application such as a device management application,
rently known or not yet in existence. The disclosure should in 25 and/or the like.
no way be limited to the illustrative implementations, draw A data package administering server may desire to install,
ings, and techniques illustrated below, but may be modi?ed for example, an update to one or more data packages stored in
within the scope of the appended claims along with their full the memory of a mobile device. The data package adminis
scope of equivalents. tering server and/or an entity associated with the data package
Systems and methods are taught herein that may be used to 30 administering server may have been given one or more
secure mobile device management software, applications request identi?cation such as security codes to access data
managed by mobile device management software, and/or one packages stored in the memory of the mobile device. The data
or more persona of a mobile device. In an embodiment, the package administering server may have also given a network
systems and methods taught herein may be used to secure any administrator additional information which may be used to
application such as a mobile device management application 35 create a login account. For example, the data package admin
stored at the layer 7 level of a mobile device. In an embodi istering server may have informed a network administrator of
ment, a layer 7 level may comprise an application layer of a the types of access, such as updating, installing, deleting,
plurality of abstraction layers of a mobile device utilizing the and/or the like, that a data package administrator would desire
Open System Interconnection (OSI) model or other commu to carry out in a secure environment on the mobile device as
nication layered model (e. g., TCP/IP stack model) as known 40 well as which data ?les it would store in the secure environ
in the art. ment on the mobile device. The network administrator may
Generally, the systems and methods disclosed allow a create a login account for that particular data package admin
mobile device user to remotely access, control, and/ or protect istering server and store the login account in the memory of an
particular applications and/or persona on a mobile device, for access server for example. Thus, when the data package
example, if the mobile device has been lost. For example, a 45 administering server sends a request to access a data package
mobile device comprising the systems disclosed herein may stored on the mobile device, the access server and/ or the
be left by the mobile device owner in a coffee shop. The owner mobile device may receive the request and attempt to autho
of the mobile device may not have realized that their mobile rize the request. The access server and/or the mobile device
was left in the coffee shop until hours later. The mobile device may authorize the request by querying the request to obtain
may comprise a business persona with con?dential informa 50 one or more request identi?cations. The access server and/or
tion and/or applications concerning their business stored on the mobile device may access a look-up table with one or
the mobile device. The con?dential information and/ or appli more login accounts. The access server may compare the
cations associated with the business persona may be backed request identi?cation with the login accounts to ?nd a match.
up by a server at the business location and thus easily re If a match is found, the access server may grant one or more
obtained if deleted. Additionally, the mobile device may 55 keys to the data package administering server who sent the
comprise a personal persona with a list of personal contacts request to access a data package. The one or more keys may
and a personal email account, neither of which are backed-up provide access to a secure environment on one or more mobile
by a server and/ or other back-up storage devices and di?icultdevices, the secure environment may store one or more ?ags
to replace if deleted. Thus, when the mobile device user which may provide access to one or more data packages
realizes that the mobile device was left at the coffee shop, the
60 stored on one or more of the mobile devices. The mobile
mobile device user may access remotely and set one or more device(s) and/or the access server may grant access to the
?ags associated with the personal persona and/or may have secure environment in response to the data package adminis
previously accessed and set the one or more ?ags associated tering server presenting the key(s) to the secure environment.
with the personal persona and implement a remote wipe (i.e. In an embodiment, the key may be con?gured to expire after
a deletion of all unprotected and/or accessible data on the 65 a predetermined time and/or a predetermined number of
mobile device) deleting the applications and/or con?dential access attempts. In an embodiment, the access server may
information associated with the business persona without the con?gure the secure environment so that key(s) allow access
US 8,984,592 B1
5 6
to the secure environment for a predetermined period of time hardware and software architecture. The trusted execution
and/or a predetermined number of access attempts. Once a environment is an execution environment that is parallel to
data package administering server accesses the secure envi the execution environment of the main mobile device operat
ronment, the data package administering server may set ing system. The trusted execution environment and/or the
and/or unset one or more ?ags to access one or more data trusted security zone may provide a base layer of functional
packages. ity and/or utilities for use of applications that may execute in
It should be understood that depending on the application, the trusted security zone. For example, in an embodiment,
a user preference, a service provider preference, and/ or a data trust tokens may be generated by the base layer of function
package administering servicer preference, one or more ?ags ality and/or utilities of the trusted execution environment
27 may initially be set allowing access to one or more and/or trusted security zone for use in trusted end-to-end
associated data packages, for example. Thus, unsetting the communication links to document a continuity of trust of the
?ags 27 may prevent access to one or more associated data communications. For more details on establishing trusted
packages. Alternatively, one or more ?ag 27 may initially be end-to-end communication links relying on hardware
unset preventing access to one or more associated data assisted security, see US. patent application Ser. No. 13/532,
packages, for example. Thus, setting the ?ags 27 may allow 588, ?led Jun. 25, 2012, entitled End-to-end Trusted Com
access to one or more associated data packages. Furthermore, munications Infrastructure, by Leo Michael McRoberts, et
depending on the application, a user preference, a service al., which is hereby incorporated by reference in its entirety.
provider preference, and/or a data package administering ser Through standardization of application programming inter
vicer preference, one or more ?ag 27 may initially be set faces (APIs), the trusted execution environment becomes a
preventing access to one or more associated data packages, 20 place to which scalable deployment of secure services can be
for example. Thus, unsetting the ?ags 27 may allow access targeted. A device which has a chipset that has a trusted
to one or more associated data packages. Alternatively, one or execution environment on it may exist in a trusted services
more ?ags 27 may initially be unset allowing access to one environment, where devices in the trusted services environ
or more associated data packages, for example. Thus, set ment are trusted and protected against attacks. The trusted
ting the ?ags 27 may prevent access to one or more associ 25 execution environment can be implemented on mobile
ated data packages. phones and tablets as well as extending to other trusted
Similar embodiments may be used to install data packages devices such as personal computers, servers, sensors, medical
in the secure environment of the mobile device. Additionally, devices, point-of-sale terminals, industrial automation, hand
the display on the mobile device may provide a window held terminals, automotive, etc.
listing one or more applications which may be protected by 30 The trusted security zone is implemented by partitioning
setting and/or unsetting one or more ?ags in the secure all of the hardware and software resources of the mobile
environment. The window may be displayed in response to device into two partitions: a secure partition and a normal
installing one or more applications and/or updating one or partition. Placing sensitive resources in the secure partition
more applications. The window may also be provided by can protect against possible attacks on those resources. For
selecting an icon on the display of the mobile device. The user 35 example, resources such as trusted software applications may
of the mobile device may then select which data packages the run in the secure partition and have access to hardware periph
user wants protected. This feature may allow a mobile device erals such as a touchscreen or a secure location in memory.
user to protect certain content stored on the mobile device Less secure peripherals such as wireless radios may be dis
while allowing other content to be remotely deleted, for abled completely while the secure partition is being accessed,
example, in the event that a mobile device is lost and/or 40 while other peripherals may only be accessed from the secure
stolen. partition. While the secure partition is being accessed through
A trusted security zone provides chipsets with a hardware the trusted execution environment, the main mobile operating
root of trust, a secure execution environment for applications, system in the normal partition is suspended, and applications
and secure access to peripherals. A hardware root of trust in the normal partition are prevented from accessing the
means the chip set should only execute programs intended by 45 secure peripherals and data. This prevents corrupted applica
the device manufacturer or vendor and resists software and tions or malware applications from breaking the trust of the
physical attacks, and therefore remains trusted to provide the device.
intended level of security. The chipset architecture is The trusted security zone is implemented by partitioning
designed to promote a programmable environment that the hardware and software resources to exist in a secure
allows the con?dentiality and integrity of assets to be pro 50 subsystem which is not accessible to components outside the
tected from speci?c attacks. Trusted security zone capabili secure subsystem. The trusted security zone is built into the
ties are becoming features in both wireless and ?xed hard processor architecture at the time of manufacture through
ware architecture designs. Providing the trusted security zone hardware logic present in the trusted security zone which
in the main mobile device chip set and protecting the hardware enables a perimeter boundary between the secure partition
root of trust removes the need for separate secure hardware to 55 and the normal partition. The trusted security zone may only
authenticate the device or user. To ensure the integrity of the be manipulated by those with the proper credential and, in an
applications requiring trusted data, such as a mobile ?nancial embodiment, may not be added to the chip after it is manu
services application, the trusted security zone also provides factured. Software architecture to support the secure partition
the secure execution environment where only trusted appli may be provided through a dedicated secure kernel running
cations can operate, safe from attacks. Security is further trusted applications. Trusted applications are independent
promoted by restricting access of non-trusted applications to secure applications which can be accessed by normal appli
peripherals, such as data inputs and data outputs, while a cations through an application programming interface in the
trusted application is running in the secure execution envi trusted execution environment on a chipset that utilizes the
ronment. In an embodiment, the trusted security zone may be trusted security zone.
conceptualized as hardware assisted security. 65 In an embodiment, the normal partition applications run on
A complete trusted execution environment (TEE) may be a ?rst virtual processor, and the secure partition applications
implemented through the use of the trusted security zone run on a second virtual processor. Both virtual processors
US 8,984,592 B1
7 8
may run on a single physical processor, executing in a time and microSD. The UICC and microSD may comprise remov
sliced fashion, removing the need for a dedicated physical able form factors from, for example, a handset and/or mobile
security processor. Time-sliced execution comprises switch device. The utilization of different form factors, for example,
ing contexts between the two virtual processors to share pro may link applications utilizing secure element to different
cessor resources based on tightly controlled mechanisms business implementations and/or satisfy different market
such as secure software instructions or hardware exceptions. needs.
The context of the currently running virtual processor is Generally, secure element may provide a secure operating
saved, the context of the virtual processor being switched to is environment for ?nancial transactions, transit ticketing, iden
restored, and processing is restarted in the restored virtual ti?cation and authentication, physical security access, and
processor. Time-sliced execution protects the trusted security other functions through near ?eld communication (NFC). A
zone by stopping the execution of the normal partition while secure element generally includes its own operating environ
the secure partition is executing. ment with a tamper-proof microprocessor, memory, and oper
The two virtual processors context switch via a processor ating system. For example, a trusted service manager among
mode called monitor mode when changing the currently run other things, installs, provisions, and personalizes the secure
ning virtual processor. The mechanisms by which the proces element. The secure element may have one or more access
sor can enter monitor mode from the normal partition are keys that are typically installed at manufacture time. A cor
tightly controlled. The entry to monitor mode canbe triggered responding key may be shared by the trusted service manager
by software executing a dedicated instruction, the Secure so that the TSM can establish a cryptographically secure
Monitor Call (SMC) instruction, or by a subset of the hard channel to the secure element for installation, provisioning,
ware exception mechanisms such as hardware interrupts, 20 and personalization of the secure element while the device
which can be con?gured to cause the processor to switch into having the secure element is in the possession of an end user.
monitor mode. The software that executes within monitor In this way, the secure element can remain secure even if the
mode then saves the context of the running virtual processor host CPU in the device has been compromised.
and switches to the secure virtual processor. Turning now to FIG. 1, a communication system 10 is
The trusted security zone runs a separate operating system 25 described. In an embodiment, the system 10 may comprise a
that is not accessible to the device users. For security pur mobile device 12, a base transceiver station (BTS) 14, a
poses, the trusted security zone is not open to users for install network 16, an access server 40, and a data package admin
ing applications, which means users do not have access to istering server 50. The base transceiver station 14, the access
install applications in the trusted security zone. This prevents server 40, and the data package administering server 50 may
corrupted applications or malware applications from execut 30 be communicatively coupled to the network 16. The base
ing powerful instructions reserved to the trusted security zone transceiver station 14 may provide a wireless communication
and thus preserves the trust of the device. The security of the link to couple the mobile device 12 to the network 16. While
system is achieved at least inpart by partitioning the hardware a single base transceiver station 14 is shown in FIG. 1, it is
and software resources of the mobile phone so they exist in understood that the system 10 may comprise any number of
one of two partitions, the secure partition for the security 35 base transceiver stations 14 and any number of mobile
subsystem and the normal partition for everything else. Plac devices 12. The access server 40 may be a computer system.
ing the trusted security zone in the secure partition and Computer systems are described further hereinafter. The data
restricting access from the normal partition protects against package administering server 50 may store one or more data
software and basic hardware attacks. Hardware logic ensures packages, data package updates, and/ or data instructions con
that no secure partition resources can be accessed by the 40 ?gured for one or more data packages 25 on one or more
normal partition components or applications. A dedicated mobile devices 12. Although the embodiment illustrated in
secure partition operating system runs in a virtual processor FIG. 1 depicts a data package administering server 50, a
separate from the normal partition operating system that like plurality of server types, such as a mobile device management
wise executes in its own virtual processor. Users may install server, may be alternatively and/or additionally implemented
applications on the mobile device which may execute in the 45 with the system 10. In an embodiment, the data package
normal partition operating system described above. The administering servers 50 may be the source of one or more
trusted security zone runs a separate operating system for the data packages 25 (i.e. the server of origination of one or more
secure partition that is installed by the mobile device manu data packages 25). In an embodiment, data packages 25 may
facturer or vendor, and users are not able to install new appli comprise data for one or more applications, data for one or
cations in or alter the contents of the trusted security zone. 50 more mobile device management systems, logic instructions,
A secure element (SE) comprises a tamper-resistant hard and/or the like.
ware platform (typically a one chip secure microcontroller) The mobile device 12 may comprise a mobile phone, a
capable of securely hosting applications and their con?den personal digital assistant, a media player, a radio frequency
tial and cryptographic data (e.g. key management) in accor wireless enabled laptop computer, a radio frequency wireless
dance with one or more rules and/or security requirements. 55 enabled notebook computer, a wireless enabled tablet com
The one or more rules and/or security requirements may be puter, or other electronic device enabled to conduct mobile
set forth by a set of one or more well-identi?ed trusted radio frequency communication. In an embodiment, the
authorities, such as a mobile service provider, a credit card mobile device 12 may be implemented as a handset. Details of
provider, a third party manager/managing system, a mobile handsets are discussed further hereinafter. The base trans
device user, and/or the like. In an embodiment, multiple 60 ceiver station 14 provides a communication link to the mobile
secure elements may be linked together so that one or more device 12 and couples the mobile device 12 to the network 16.
related applications stored in different secure elements may In an embodiment, the base transceiver station 14 may pro
communicate between each other. Secure element may be vide wireless communication links to the mobile device 12
implemented with mobile devices, personal computers, according to one or more of a code division multiple access
mobile electronics, and/or the like. Secure element may uti 65 (CDMA) wireless protocol, a global system for mobile com
lize at least one of three different form factors: Universal munications (GSM) wireless protocol, a long term evolution
Integrated Circuit Card (UICC), embedded secure element, (LTE) wireless protocol, a worldwide interoperability for
US 8,984,592 B1
9 10
microwave access (WiMAX) wireless protocol, or another ticular data package 25 on the memory 24 of the mobile
wireless protocol. The network 16 may be a public commu device 12 in order to update the operating system of the
nication network, a private communication network, or a mobile device 12. The data package administering server 50
combination thereof. may gain access to one or more ?ags 27 associated with one
In an embodiment, the mobile device 12 comprises a radio or more data packages of the data package administering
transceiver 20, a user interface 22, a memory 24, and a secure server 50. The data package administering server 50 may set
environment 26. The radio transceiver 20 may collaborate one or more of the ?ags 27 to access the one or more pack
with the base transceiver station 14 to establish a wireless ages. While FIG. 1 depicts that data packages 25 are stored in
communication link between the mobile device 12 and the memory 24, in an embodiment, data packages 25 may be
base transceiver station 14. The memory 24 may comprise a additionally and/or alternatively stored in the secure environ
plurality of data packages 25. For example, the data packages ment 26.
25 may comprise a mobile device operating system, one or In an embodiment, an application administrator may desire
more applications, one or more data processing instructions, to install a new version of a mobile device application on the
and/ or the like. In an embodiment, the data packages 25 may mobile device 12. The application administrator may desire
be accessed, manipulated, updated, deleted, and/or the like to restrict access to the mobile device application because the
only by setting one or more ?ags 27 as will be disclosed mobile device application may be, for example, populated
further herein. with con?dential information. The application administrator
The radio transceiver 20 is con?gured to establish a wire may install one or more ?ags 27 in the secure environment 26
less communication link with the base transceiver station 14. to protect the data package associated with the mobile device
The base transceiver station 14 may communicatively couple 20 application from access or manipulation by nefarious entities.
the radio transceiver 20 and/or the mobile device 12 to the In an embodiment, the ?ags 27 may be con?gured to pro
network 16 and to devices that are connected to the network vide access to a particular set of data packages 25 stored in the
16, for example the access server 40. In an embodiment, the memory 24 of the mobile device 12. For example, a particular
radio transceiver 20 and the base transceiver station 14 estab set of data packages 25 may be associated with a particular
lish a wireless communication link according to one of a code 25 persona. In an embodiment, a persona may comprise a group
division multiple access (CDMA) wireless protocol, a global of one or more applications associated with one or more
system for mobile communication (GSM) wireless protocol, categories. The persona may de?ne rules for accessing data
a long term evolution (LTE) wireless protocol, a worldwide and/or may provide authorization for accessing data. For
interoperability for microwave access (WiMAX) wireless example, a mobile device 12 may have a business persona
protocol, or another wireless communication protocol. 30 which comprises one or more applications associated with the
The user interface 22 of the mobile device 12 may, in some mobile device users employment and/or business ventures.
embodiments, comprise a display, an input system, a speaker Alternatively or additionally, the mobile device 12 may have
system, and/ or a microphone. In some embodiments, the a ?nancial persona which comprises one or more applications
display may comprise a screen, and the input system may associated with the mobile device users bank accounts,
comprise a keypad and/or a touch screen, for example. The 35 credit cards, and/or investments. Alternatively or addition
speaker system may communicate audio (such as media, mes ally, the mobile device 12 may comprise a personal persona
sages, or phone call audio) to a user of the mobile device 12. which comprises a personal email account and contact list
The microphone may receive voice and/or audio from a user which stores the names, phone numbers, and addresses of the
and/ or communicate audio to a user. In an embodiment, a user mobile device users family and friends. In an embodiment,
may utilize the user interface 22 to communicate with the 40 one or more applications may be associated with one or more
mobile device 12, for example, to initiate the execution of a persona, for example a business persona and a personal per
device application and/or a secure application. Additionally, a sona.
user may receive communication from the mobile device 12 As an example, the mobile device 12 may comprise at least
via the user interface 22, such as messages, emails, contact two persona, for example, a business persona and a personal
information, caller identi?cation, call history, intemet access, 45 persona. The owner of the mobile device 12 may have mis
etc. A user may additionally employ the user interface 22 for placed his mobile device 12 while at a coffee shop. The
viewing and/or listening to media such as music, movies, business persona may have highly con?dential information
shows, videos, photos, games etc. such as trade secret information and/or company data security
The mobile device 12 may also comprise a secure environ codes stored which may be easily repopulated within the
ment 26. In an embodiment, the secure environment 26 may 50 mobile device 12 if found, but dangerous and/or detrimental
comprise secure element zone, a trusted security zone, and/or in the wrong hands. Conversely, the personal persona may
the like. The secure environment 26 may be accessed only comprise addresses and phone numbers of friends and family
with a particular key 48 con?gured to provide access into the members which have little or no con?dential information, but
secure environment 26. The secure environment 26 may also may be more dif?cult to repopulate. Thus, if the owner of the
store one or more ?ags 27. The ?ags 27 may be manipulated, 55 mobile device 12 desires to delete the business persona to
for example set, so that setting the ?ag 27 may allow a protect the con?dential information but does not desire to
server, such as the data package administering server 50, to delete the personal person, the owner of the mobile device 12
access, manipulate, update, delete, and/or the like one or more may be able to remotely set (e.g. via a secured webpage
data packages 25 on the memory 24 of the mobile device 12. and/or by calling a customer care representative of a mobile
In an embodiment, setting may comprise preventing access 60 service provider and providing one or more security codes)
to one or more data packages, so that by unsetting one or the one or more ?ags associated only with the personal per
more ?ags 27, access may be obtained to one or more data sona. By setting only the one or more ?ags associated with the
packages and/or one or more persona. personal persona, one or more data packages associated with
In an embodiment, the ?ags 27 may be con?gured to pro the personal persona may for example be protected during,
vide access to a particular data package 25 stored in the 65 for example, a remote wipe, such that all the data packages
memory 24 of the mobile device 12. For example, the data which has ?ags 27 which were not set, and thus unprotected,
package administering server 50 may desire to access a par such as the data packages associated with the business per
US 8,984,592 B1
11 12
sona, may be deleted by the remote wipe without also deleting one or more request identi?cations. For example, upon
the data packages associated with the personal persona. It receiving a request to access one or more data packages 25
should be understood that a remote wipe comprises stored on the mobile device 12, the mobile device may query
remotely deleting and/or wiping out all unprotected and/or the data package administering server 50 to provide one or
accessible data packages (e.g. data packages associated with more security codes as well as identify which actions the data
applications) and/or data instructions. In this example, if a package administering server 50 purports to take with one or
nefarious entity ?nds the mobile device 12, the nefarious more data packages 25. The data package administering
entity may not be able to obtain the con?dential information server 50 may transmit the request identi?cations to the
of the business persona. However, if the mobile device 12 is mobile device 12 for veri?cation. In an embodiment, the data
found by the owner, the owner will not have lost his personal package administering server 50 may provide request identi
information stored in the personal persona. The owner of the ?cation used by the mobile device 12 to verify the authenti
mobile device 12 may then be able to repopulate the con? cation of the data package administering server 50 in the
dential data associated with the business persona later at his request to access a data package 25. The mobile device 12
company facility, for example. may access a look-up table to verify that the one or more
The access server 40 may comprise a processor 42, a security codes matches one or more codes in an approved list
memory 44, an application 46, and a plurality of keys 48 of security codes or to verify that the one or more codes
stored in the memory 44. The access server 40 may also provided are associated with a particular trusted data package
comprise a plurality of processors 42 located in a plurality of administering server 50. It should be understood that a
computers. Computers are discussed in more detail hereinaf trusted data package administering server 50 may be a data
ter. The application 46, when executed by the processor 42 of 20 package administering server 50 that is approved and/or
the access server 40, may receive a request message from, for authorized by, for example a mobile service provider, to
example a mobile device 12 and/or data package administer access one or more data packages 25 stored in the memory 24
ing server 50, to obtain a key 48 providing access to the secure of the mobile device 12. Thus, for example, by matching a
environment 26 and/or a particular set of one or more ?ags 27 security code provided in an access request with a security
on the secure environment 26. In response to the request 25 code in a look-up table that is associated with an approved
message, the application 46 may identify at least one key 48 and/or authenticated data package administering server 50,
stored in the memory 44 of the access server 40, for example the data package administering server 50 may be considered
a key associated with a particular ?ag and/ or a key associated a trusted data package administering server 50.
with the secure environment 26 of the mobile device 12. In an embodiment, the mobile device 12 and/ or the access
Turning now to FIG. 2, a method 200 is described. At block 30 server 40 may also examine how much additional memory an
202, a mobile device 12 and/or the access server 40 receives update and/ or an installation of an access request purports to
a request to access a data package 25 stored on one or more consume on the memory 24 of the mobile device 12. For
mobile devices 12. In an embodiment, the data package 25 example, the mobile device 12 may access a look-up table
may be associated with one or more applications, one or more which matches a security code provided in response to iden
mobile device management applications, and/or a particular 35 ti?cation request with a security code in the look-up table
persona of two more personas. For example, a data package associated with a trusted data package administering server
administering server 50 may desire access to a data package 50. The look-up table may also indicate that the data package
25 stored in the memory 24 of the mobile device 12. The data administering server 50 that provides a particular security
package 25 may have been provided by the data package code is allocated ?xed amount of memory space on the
administering server 50 and/or a data package management 40 memory 24 of the mobile device 12, for example for this
server administrator. The data package administering server particular access attempt. Thus, if the access request or the
50 may have a data package update to install with the data request identi?cation provides a different memory require
package 25 that the data package administering server 50 ment than what is indicated in the look-up table, then the data
desires to access. The mobile device 12 may receive a request package administering server 50 may not be provided access
from the data package administering server 50 identifying, 45 to one or more data packages 25. In an embodiment the
for example, which set of one or more data packages 25 the look-up tables may be located on the mobile device 12 and/or
data package administering server 50 desires to access, how on the access server 40. Additionally, in an embodiment, the
much additional memory an update will consume on the access server 40 may query the request to receive access to a
mobile device 12, the identity of the data package adminis data package 25 stored on the mobile device 12.
tering server 50, which action or actions the data package 50 In an embodiment, the mobile device 12 and/ or the access
administering server 50 desires to take, the IP address of the server 40 may also examine if the IP address the data package
set of one or more mobile device 12 the data package admin administering server 50 requests to access is an authorizele
istration server 50 desires to access, and/or one or more access address for that particular data package administering server
codes verifying that the data package administering server 50 50. For example, through one or more means disclosed
is a trusted server. In an embodiment, the term access 55 herein, the access request and/or in response to querying
and/ or accessed may be construed to comprise the follow request identi?cation(s), the mobile device 12 may examine if
ing actions: accessed, viewed, manipulated, updated, modi the data package administering server 50 is authorized to
?ed, deleted, and/ or the like. Thus, if the data package admin access the IP address of the mobile device 12 that the data
istering server 50 sends a request to a mobile device to package administering server 50 desires to access. Although
access one or more data packages 25 stored on the mobile 60 the data package administering server 50 may be authorized
device 12, access may comprise one or more of the above to access the memory 24 of a ?rst set of mobile devices 12, the
interpretations. In an embodiment, the access server 40 may data package administering server 50 may not be permitted to
receive the request to access a data package 25 stored on the access the memory 24 of a different set of mobile devices 12.
mobile device 12. Thus, for example, by referring to a look-up table the mobile
At block 204, the mobile device 12 and/or the access server 65 device 12 may determine if the data package administering
40 authorizes the request to access the data package 25, server 50 is authorized to access particular IP address asso
wherein authorizing comprises querying the request to obtain ciated with mobile devices 12.
US 8,984,592 B1
13 14
In an embodiment, the mobile device 12 and/ or the access packages 25. However, when the time on the key 48 expires,
server 40 may examine the action the data package adminis the one or more ?ags 27 may unset preventing the data
tering server 50 purports to take is an authorized action. For package administering server 50 from accessing the set of one
example, data package administering server 50 may be autho or more data packages and also preventing the data package
rized to update data packages 25 on the memory 24 of the administering server 50 from accessing the secure environ
mobile device 12 and install additional data packages 25 on ment 26 again. Depending on the application, a user prefer
the memory 24 of the mobile device 12. However, the data ence, a service provider preference, and/or a data package
package administering server 50 may not be authorized to administering servicer preference, one or more ?ag 27 may
delete data packages on the memory of a mobile device 12. initially be set allowing access to one or more associated
Thus, if the data package administering server 50 provides an data packages, for example. Thus, unsetting the ?ags 27
identi?cation, for example to the mobile device 12 and/or the may prevent access to one or more associated data packages.
access server 40, to delete one or more data packages 25 Alternatively, one or more ?ag 27 may initially be unset
stored on the memory 24 of the mobile device 12, the data preventing access to one or more associated data packages,
package administering server 50 may be denied access to one for example. Thus, setting the ?ags 27 may allow access to
or more data packages 25 on a particular mobile device 12. In one or more associated data packages. Furthermore, depend
an embodiment, by using for example, a look-up table, the ing on the application, a user preference, a service provider
mobile device 12 and/or the access server 40 may verify that preference, and/ or a data package administering servicer
the access request from a data package administering server preference, one or more ?ag 27 may initially be set pre
50 is authorized and comprise an approved request based on venting access to one or more associated data packages, for
one or more request identi?cations given by a data package 20 example. Thus, unsetting the ?ags 27 may allow access to
administering server 50. one or more associated data packages. Alternatively, one or
At block 206, a key 48 is granted in response to authorizing more ?ag 27 may initially be unset allowing access to one
the request, wherein the key 48 provides access to a secure or more associated data packages, for example. Thus, set
environment 26 storing one or more ?ags 27 associated with ting the ?ags 27 may prevent access to one or more associ
the data package 25. For example, if the mobile device 12 25 ated data packages. In an embodiment, the data package
and/ or the access server 40 authorizes a data package admin administering server 50 may have to send another request, for
istering server 50 to access one or more data packages 25 on example to the mobile device 12 and/ or the access server 40 to
the memory 24 of a set of one or more mobile devices 12, the access the one or more data packages 25 on the memory 24.
access server 40 may provide one or more keys 48 stored, for In an embodiment, the time limit may comprise the time
example, in the memory 44, of the access server 40 to access 30 limit that a data package administering server 50 may have to
a secure environment 26 on a set of one or more mobile access the secure environment 26. For example, an access
devices 12. In an embodiment, when the mobile device 12 server 40 may provide one or more keys 48 to a data package
authorizes the request to access the data package 25, the administering server 50 with a time limit, however, the data
mobile device 12 may transmit one or more signals to the package administering server 50 does not use the one or more
access server 40 to con?gure one or more keys 48 for the data 35 keys 48 until after the time expires. Thus, because the one or
package administering server 50. In an embodiment, the more keys 48 were not used, the data package administering
secure environment 26 may store one or more ?ags 27 asso server 50 may have to send another request, for example to the
ciated with one or more data packages 25 stored on the mobile device 12 and/ or the access server 40 to access the one
memory 24. For example, a ?rst set of one or more ?ags 27 or more data packages 25 on the memory 24. Conversely, if
may be associated with a ?rst set of one or more data packages 40 the data package administering server 50 accesses the secure
25 such that by setting the one or more ?ags 27 a data environment 26 with the one or more keys 48 before the time
package administering server 50 may access one or more data limit expires, the data package administering server 50 may
package 25 associated with the set of one or more ?ags. continue to access one or more data packages 25 even after the
In an embodiment, one or more keys 48 granted in response time expires with the one or more keys 48 because the one or
to authorizing the request may provide access to only a set of 45 more ?ags 27 have already been set. In an embodiment, the
one or more ?ags 27 stored in the secure environment 26. one or more ?ags 27 which were set by the data package
Thus, in this embodiment, an access server 40 may be able to administering server 50 may automatically unset when the
protect a ?rst set of one or more ?ags 27 from a data package data package administering server 50 no longer desires access
administering server 50 that is not authorized to access a ?rst to the memory 24 of the mobile device 12.
set of one or more data packages 25 while providing access to 50 In an embodiment, the one or more keys 48 may expire
a second set of one or more ?ags 27 and thus a second set of after a predetermined number of access attempts. For
one or more data packages 25 that the data package adminis example, the one or more ?ags 27 may not automatically
tering server 50 is authorized to access. In an embodiment, the unset when the data package administering server 50 no
one or more keys 48 may provide access to the entire secure longer desires access to the memory 24 and/or one or more
environment 26. 55 data packages 25 stored on the memory 24. The one or more
In an embodiment, the access server 40 may grant one or keys 48 may expire after two access attempts. Thus, after the
more keys 48 which expire after a time limit and/ or a prede data package administering server 50 uses the one or more
termined number of access attempts. In an embodiment, the keys 48 a ?rst time to set one or more ?ags 27, and the data
access server 40 may generate a key 48 that limits the amount package administering server 50 may use the one or more
of time a data package administering server 50 may access a 60 keys 48 a second time to unset the one or more ?ags 27,
set of one or more data packages 25. For example, a key 48 preventing further access to one or more data packages 25.
may be granted to a data package administering server 50 that At block 208, access is granted to the secure environment
sets a ?xed amount of time that a data package administering 26, wherein access is granted to the secure environment 26 in
server 50 may access a set of one or more data packages 25. response to presenting the key 48 to the secure environment
Thus, for example, the data package administering server 50 65 26. In an embodiment, access may be granted to a particular
may use a key 48 to access the secure environment 26 to set set of one or more ?ags 27 such that access is granted to only
one or more ?ags 27 associated with a set of one or more data the particular set of one or more ?ags 27 by presenting the key

Potrebbero piacerti anche