Secure garbage collection on a mobile device
First Claim
Patent Images
1. A method for performing secure garbage collection involving unreferenced data objects on a computing device, the method comprising:
- determining that a particular data object has become unreferenced; and
in response to determining that the particular data object has become unreferenced;
calling a wipe function to overwrite the addressable storage memory of the computing device where a first, second, and third data objects are stored, wherein the third data object is the particular data object, andreclaiming the addressable storage memory where the first, second, and third data objects were stored.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
-
Citations
19 Claims
-
1. A method for performing secure garbage collection involving unreferenced data objects on a computing device, the method comprising:
-
determining that a particular data object has become unreferenced; and in response to determining that the particular data object has become unreferenced; calling a wipe function to overwrite the addressable storage memory of the computing device where a first, second, and third data objects are stored, wherein the third data object is the particular data object, and reclaiming the addressable storage memory where the first, second, and third data objects were stored. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory computer readable media comprising computer readable instructions that, when executed, cause a computing device to perform:
-
determining that a particular data object has become unreferenced; and in response to determining that the particular data object has become unreferenced; calling a wipe function to overwrite the addressable storage memory of the computing device where a first, second, and third data objects are stored, wherein the third data object is the particular data object, and reclaiming the addressable storage memory where the first, second, and third data objects were stored. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a processor; and memory storing computer readable instructions that, when executed, cause the system to perform; determining that a particular data object has become unreferenced; and in response to determining that the particular data object has become unreferenced; calling a wipe function to overwrite the addressable storage memory of the computing device where a first, second, and third data objects are stored, wherein the third data object is the particular data object, and reclaiming the addressable storage memory where the first, second, and third data objects were stored.
-
Specification