Remotely modifying data in memory in a mobile device
First Claim
1. A method for remotely modifying data stored in a mobile device comprising:
- receiving a message in the mobile device;
comparing the message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; and
in response to the message matching the secret message, modifying data stored in memory in the mobile device.
31 Assignments
0 Petitions
Accused Products
Abstract
Methods and corresponding systems in a mobile device for remotely modifying data stored in the mobile device include receiving a message in the mobile device. The message can be a short message service (SMS) message. The message is compared to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string. The text string can be an e-mail address, and the secret text string can be a password of the mobile device. In response to the message matching the secret message, data stored in memory in the mobile device is modified to prevent unauthorized access. A secret message cancellation can be received in the mobile device to cancel a scheduled memory modification. Memory modification can include erasing data, replacing data, or encrypting data.
27 Citations
22 Claims
-
1. A method for remotely modifying data stored in a mobile device comprising:
-
receiving a message in the mobile device; comparing the message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; and in response to the message matching the secret message, modifying data stored in memory in the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for remotely modifying data stored in a mobile device comprising:
-
receiving a first message in the mobile device; comparing the first message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; in response to the first message matching the secret message, scheduling a memory modification operation for execution in response to scheduled conditions; receiving a second message in the mobile device; comparing the second message to a secret message cancellation; in response to the second message matching the secret message cancellation, cancelling the memory modification operation; and in response to the scheduled conditions being met, modifying data stored in memory in the mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for remotely modifying data in a mobile device comprising:
-
a memory; a mobile transceiver for receiving messages; a message processor coupled to the mobile transceiver for processing the messages; a hash function having inputs coupled to a text string and a secret text string, and having a hash function output coupled to the message processor; a message string identifier coupled to the message processor for comparing a message received by the mobile transceiver to a secret message output by the hash function output; and a memory controller coupled to the memory and coupled to the message string identifier, wherein the memory controller is adapted to modify data in the memory in response to a match between the message received by the mobile transceiver and the secret message output by the hash function output. - View Dependent Claims (20, 21, 22)
-
Specification