SYSTEM AND METHOD FOR MANAGING SECURE INFORMATION WITHIN A HYBRID PORTABLE COMPUTING DEVICE
First Claim
1. A method for managing secure information within a portable computing device, the method comprising:
- initializing a program module of a central processing unit for communicating with a secure element that is part of the portable computing device;
receiving a password for gaining access to the secure element;
initializing a password based encryption algorithm with the password;
establishing a secure communication channel between the secure element and the central processing unit based on the password based encryption algorithm; and
if the password is incorrect, then determining if a predetermined threshold number of password attempts has been achieved.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing secure information within a portable computing device are disclosed. The portable computing device includes a program module for communicating with a secure element that is part of the portable computing device. The secure element may receive messages utilizing the decrypted crypto keys derived from a non-padded cipher in order to establish a secure communications channel. The secure element may store at least one of a substantial encryption key for server authentication and a substantial encryption key for decrypting encrypted data stored locally within the portable computing device. If an incorrect password is entered after a predetermined number of times, the secure element may activate security measures which may permanently disable the secure element. To establish secure communications between the secure element and a CPU of the portable computing device, a password based encryption algorithm utilizing a non-padded cipher may be employed.
29 Citations
40 Claims
-
1. A method for managing secure information within a portable computing device, the method comprising:
-
initializing a program module of a central processing unit for communicating with a secure element that is part of the portable computing device; receiving a password for gaining access to the secure element; initializing a password based encryption algorithm with the password; establishing a secure communication channel between the secure element and the central processing unit based on the password based encryption algorithm; and if the password is incorrect, then determining if a predetermined threshold number of password attempts has been achieved. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system for managing secure information within a portable computing device, the system comprising:
a processor operable to; initialize a program module of a central processing unit for communicating with a secure element that is part of the portable computing device; initialize a password based encryption algorithm with the password; establish a secure communication channel between the secure element and the central processing unit based on the password based encryption algorithm if the password is correct; and determine if a predetermined threshold number of password attempts has been achieved if the password is incorrect. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A computer system for managing secure information within a portable computing device, the system comprising:
-
means for initializing a program module of a central processing unit for communicating with a secure element that is part of the portable computing device; means for receiving a password for gaining access to the secure element; means for initializing a password based encryption algorithm with the password; means for establishing a secure communication channel between the secure element and the central processing unit based on the password based encryption algorithm; and means for determining if a predetermined threshold number of password attempts has been achieved if the password is incorrect. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer program product comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for managing secure information within a portable computing device, said method comprising:
-
initializing a program module of a central processing unit for communicating with a secure element that is part of the portable computing device; receiving a password for gaining access to the secure element; initializing a password based encryption algorithm with the password; establishing a secure communication channel between the secure element and the central processing unit based on the password based encryption algorithm; and if the password is incorrect, then determining if a predetermined threshold number of password attempts has been achieved. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification