×

SYSTEMS AND METHODS FOR AUTHENTICATING APPLICATIONS FOR ACCESS TO SECURE DATA USING IDENTITY MODULES

  • US 20130310003A1
  • Filed: 05/17/2012
  • Published: 11/21/2013
  • Est. Priority Date: 05/17/2012
  • Status: Active Grant
First Claim
Patent Images

1. A mobile station, comprising:

  • a wireless transceiver configured to provide communication for the mobile station via a mobile wireless communication network;

    an identity module configured to provide secure storage for information relating to different identities of the mobile station associated with mobile station communication via the mobile wireless communication network;

    at least one user interface element;

    a processor coupled to the wireless transceiver and the at least one user interface element;

    a memory accessible by the processor configured for program and data storage;

    application programs stored in the memory; and

    a secure domain controller program stored in the memory, wherein execution of the secure domain controller program by the processor configures the processor to perform functions, including functions to;

    associate each of the application programs with a selected one of a plurality of personas to be implemented on the mobile station, each persona corresponding to one of the identities of the mobile station and at least one persona corresponding to each identity of the mobile station;

    associate different secure data with each of the plurality of personas;

    when executing each respective application program, allow the respective application program to access the secure data associated with the associated persona but prevent the respective application program from accessing the secure data associated with the other persona,wherein allowing the respective application program to access the secure data associated with the associated persona includes performing, upon receiving from the respective application program a request to access the secure data associated with the associated persona, authentication of the respective application program using a first authentication key retrieved from the secure data and a second authentication key associated with the respective application program and included in the request to access the secure data; and

    while implementing each respective persona, provide communication for the mobile station via the mobile wireless communication network utilizing information relating to the corresponding identity from the identity module.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×