Method and System to Provide Secure Exchange of Data Between Mobile Phone and Computer System
First Claim
Patent Images
1. A method comprising:
- a first secure access layer stored within a mobile telephone, coupled to a separate computer system, sending an authentication request to a second secure access layer stored within the separate computer system, to determine if the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system, are matching, wherein the second secure access layer of the separate computer system is stored within a dynamic linked library comprising of executable program modules including phone-specific functions used to access data on the mobile phone connected to the computer system;
the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer are matching; and
in response to the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system are matching, the first secure access layer of the mobile telephone granting authorization to the dynamic linked library to transmit data between the mobile telephone and the separate computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for transmitting data between the phone and the computer system.
19 Citations
18 Claims
-
1. A method comprising:
-
a first secure access layer stored within a mobile telephone, coupled to a separate computer system, sending an authentication request to a second secure access layer stored within the separate computer system, to determine if the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system, are matching, wherein the second secure access layer of the separate computer system is stored within a dynamic linked library comprising of executable program modules including phone-specific functions used to access data on the mobile phone connected to the computer system;
the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer are matching; and
in response to the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system are matching, the first secure access layer of the mobile telephone granting authorization to the dynamic linked library to transmit data between the mobile telephone and the separate computer system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A machine-readable medium, having stored thereon a set of instructions, which when executed, cause a machine to perform a method comprising:
-
a first secure access layer stored within a mobile telephone, coupled to a separate computer system, sending an authentication request to a second secure access layer stored within the separate computer system, to determine if the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system, are matching, wherein the second secure access layer of the separate computer system is stored within a dynamic linked library comprising of executable program modules including phone-specific functions used to access data on the mobile phone connected to the computer system;
the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer are matching; and
in response to the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system are matching, the first secure access layer of the mobile telephone granting authorization to the dynamic linked library to transmit data between the mobile telephone and the separate computer system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A mobile telephone comprising:
-
a processor;
a connector to couple the mobile phone with a separate computer system;
a unit to have a first secure access layer send an authentication request to a second secure access layer stored within the separate computer system, to determine if the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system are matching, wherein the second secure access layer of the separate computer system is stored within a dynamic linked library comprising of executable program modules including phone-specific functions used to access data on the mobile phone connected to the computer system;
a unit to have the first secure access layer within the mobile telephone confirm authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer are matching; and
a unit to have the first secure access layer of the mobile telephone grant authorization to the dynamic linked library to transmit data between the mobile telephone and the separate computer system, in response to the first secure access layer within the mobile telephone confirming authenticity of the second secure access layer within the separate computer system by determining the first secure access layer of the mobile telephone and the second secure access layer of the separate computer system are matching. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification