×

Hybrid integration of software development kit with secure execution environment

  • US 10,511,583 B2
  • Filed: 10/19/2018
  • Issued: 12/17/2019
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A portable communication device comprising:

  • one or more processor circuits; and

    one or more memory units coupled to the one or more processor circuits and storing computer readable code implementing a secure application in a trusted execution environment, which when executed by the one or more processor circuits, performs operations including;

    receiving, by the secure application from a mobile application executing in an application execution environment of the portable communication device, a first storage request to store first sensitive data, the first sensitive data being a first token or a cryptogram generation key, the first storage request including a first encrypted data type identifier and first encrypted sensitive data;

    decrypting, by the secure application, the first encrypted data type identifier and the first encrypted sensitive data using a transport key;

    determining, by the secure application, whether the first decrypted data type identifier indicates that the first sensitive data is a token or a cryptogram generation key;

    re-encrypting, by the secure application based on the first decrypted data type identifier, the first sensitive data using a key to generate re-encrypted first sensitive data; and

    storing the re-encrypted first sensitive data outside the trusted execution environment,wherein the first sensitive data is the first token, wherein the first decrypted data type identifier indicates that the first sensitive data is a token, wherein the key is a token-storage key, and wherein the operations further include;

    receiving, by the secure application from the mobile application, a second storage request to store second sensitive data, the second storage request including a second encrypted data type identifier and second encrypted sensitive data;

    decrypting, by the secure application, the second encrypted data type identifier and the second encrypted sensitive data using the transport key;

    determining, by the secure application, that the second decrypted data type identifier indicates the second sensitive data to store is a token;

    re-encrypting, by the secure application, the second sensitive data using the token-storage key to generate a re-encrypted token; and

    storing the re-encrypted token outside the trusted execution environment.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×