SECURE STORAGE OF PROTECTED DATA IN A WIRELESS COMMUNICATION DEVICE
First Claim
1. A wireless communication device comprising:
- first processing circuitry configured to execute a radio frequency (RF) operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to second processing circuitry;
the second processing circuitry configured to execute an open operating system and a plurality of user applications executing on the open operating system;
the RF operating system configured to receive protected data and unprotected data and store the protected data and the unprotected data in the secure memory device;
the open operating system configured to receive a first request for the unprotected data from one of the user applications and transfer the first request to the RF operating system;
in response to the first request for the unprotected data, the RF operating system configured to retrieve the unprotected data from the secure memory device and transfer the unprotected data to the open operating system for delivery to the one of the user applications associated with the first request;
the open operating system configured to receive a second request for the protected data from one of the user applications and transfer the second request to the RF operating system; and
in response to the second request for the protected data, the RF operating system configured to retrieve the protected data from the secure memory device, encrypt the protected data, and transfer the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the second request.
6 Assignments
0 Petitions
Accused Products
Abstract
A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to execute an open operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to the second processing circuitry. The RF operating system is configured to receive protected data and store the protected data in the secure memory device. The open operating system is configured to receive a request for the protected data from one of a plurality of user applications and transfer the request to the RF operating system. In response to the request for the protected data, the RF operating system is configured to retrieve the protected data from the secure memory device, encrypt the protected data, and transfer the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the request.
-
Citations
20 Claims
-
1. A wireless communication device comprising:
-
first processing circuitry configured to execute a radio frequency (RF) operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to second processing circuitry; the second processing circuitry configured to execute an open operating system and a plurality of user applications executing on the open operating system; the RF operating system configured to receive protected data and unprotected data and store the protected data and the unprotected data in the secure memory device; the open operating system configured to receive a first request for the unprotected data from one of the user applications and transfer the first request to the RF operating system; in response to the first request for the unprotected data, the RF operating system configured to retrieve the unprotected data from the secure memory device and transfer the unprotected data to the open operating system for delivery to the one of the user applications associated with the first request; the open operating system configured to receive a second request for the protected data from one of the user applications and transfer the second request to the RF operating system; and in response to the second request for the protected data, the RF operating system configured to retrieve the protected data from the secure memory device, encrypt the protected data, and transfer the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the second request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a wireless communication device comprising first processing circuitry configured to execute a radio frequency (RF) operating system and second processing circuitry configured to execute an open operating system and a plurality of user applications executing on the open operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to the second processing circuitry, the method comprising:
-
in the RF operating system, receiving protected data and unprotected data and storing the protected data and the unprotected data in the secure memory device; in the open operating system, receiving a first request for the unprotected data from one of the user applications and transferring the first request to the RF operating system; in the RF operating system, in response to the first request for the unprotected data, retrieving the unprotected data from the secure memory device and transferring the unprotected data to the open operating system for delivery to the one of the user applications associated with the first request; in the open operating system, receiving a second request for the protected data from one of the user applications and transferring the second request to the RF operating system; and in the RF operating system, in response to the second request for the protected data, retrieving the protected data from the secure memory device, encrypting the protected data, and transferring the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the second request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A wireless communication device comprising:
-
first processing circuitry configured to execute a radio frequency (RF) operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to second processing circuitry; the second processing circuitry configured to execute an open operating system and a plurality of user applications executing on the open operating system; the RF operating system configured to receive protected data and unprotected data and store the protected data and the unprotected data in the secure memory device; the open operating system configured to receive a first request for the unprotected data from one of the user applications and transfer the first request to the RF operating system; in response to the first request for the unprotected data, the RF operating system configured to retrieve the unprotected data from the secure memory device and transfer the unprotected data to the open operating system for delivery to the one of the user applications associated with the first request; the open operating system configured to receive a second request for the protected data from one of the user applications and transfer the second request to the RF operating system; and the RF operating system configured to receive the second request from the open operating system, and in response to the second request for the protected data, retrieve the protected data from the secure memory device, encrypt the protected data using a shared secret based on receiving the second request from the open operating system, and transfer the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the second request.
-
Specification