System Utilizing a Secure Element
First Claim
1. An electronic device comprising:
- a receiver configured to receive, from an entity, a request to perform a function;
a secure element to verify the request to perform the function, the secure element including;
hardware programmed with instructions to verify that a security of the secure element has not been breached; and
software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.
6 Assignments
0 Petitions
Accused Products
Abstract
An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.
-
Citations
20 Claims
-
1. An electronic device comprising:
-
a receiver configured to receive, from an entity, a request to perform a function; a secure element to verify the request to perform the function, the secure element including; hardware programmed with instructions to verify that a security of the secure element has not been breached; and software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for performing a secure operation, comprising:
-
receiving a request from an entity to perform a time dependent secure operation in a device; obtaining temporal parameters and verification information from a remote server to verify the current time; comparing the received verification information from the remote server with internal verification information for the remote server stored in the device to verify an integrity of the obtained temporal parameters; and performing the secure operation in accordance with the temporal parameters when the received verification information matches the internal verification information. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for performing a secure operation, comprising:
-
receiving a command from an entity to run a script with a secure element of a device, the secure element having a software component and a hardware component, the script including instructions for executing an initialization function, instructions for executing an entity verification function, instructions for executing a device security function, and instructions for executing a secure operation function to be performed at a specified time; executing the initialization function of the script with the software component to begin execution of the script; executing the entity verification function with the software component after the initialization function to determine whether the entity has access rights to command execution of the secure operation function; executing the device security function of the script with the hardware component after the initialization function to determine that a security of the device has not been breached; determining when the specified time occurs by obtaining time information from a server; and executing the secure operation function of the script with the software component when the software component determines that the entity has access rights to command execution of the secure operation function, the hardware component determines that the security of the device has not been breached, and the specified time occurs. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification