PROVISIONING TECHNIQUES
First Claim
Patent Images
1. A method implemented by a provisioning service, the method comprising:
- locating a particular one of a plurality of public keys using an identifier included in a request received via a network; and
communicating the located public key via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
3 Assignments
0 Petitions
Accused Products
Abstract
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
-
Citations
20 Claims
-
1. A method implemented by a provisioning service, the method comprising:
-
locating a particular one of a plurality of public keys using an identifier included in a request received via a network; and communicating the located public key via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
transmitting a request including an identifier of a secure element implemented in hardware of the mobile communication device; receiving a response to the request that includes data that is encrypted using a public key that corresponds to the private key; decrypting the data by the secure element using the private key; and provisioning functionality of the mobile communication device using the data. - View Dependent Claims (13, 14, 15, 16)
-
- 17. A mobile communication device comprising a secure element implemented in hardware that is configured to decrypt credentials using a private key included in the secure element and store the credentials once decrypted in the secure element, the credentials configured to secure communications with the mobile communication device.
Specification