SYSTEMS AND METHODS FOR ENHANCING MOBILE DEVICE SECURITY WITH A PROCESSOR TRUSTED ZONE
First Claim
Patent Images
1. A method for enhancing mobile device security, the method comprising:
- providing a trusted zone of a processor; and
configuring at least one of the following in the trusted zone of a processor to facilitate enhanced mobile device security;
a specialized debugging interface;
a remote auditing tool;
an inter-process communication mechanism;
a secure daemon;
a package manager;
a virtual machine;
a configuration function;
a device management system;
a touch screen software; and
a geo-localization function.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems described herein relate to enhancing security on a mobile device. A method for enhancing mobile device security includes providing a trusted zone of a processor, and configuring various items in the trusted zone. Such items may include a specialized debugging interface; a remote auditing tool; an inter-process communication mechanism; a secure daemon; a package manager; a virtual machine, a configuration function, a device management system, touch screen management software, and a geo-localization function.
33 Citations
21 Claims
-
1. A method for enhancing mobile device security, the method comprising:
-
providing a trusted zone of a processor; and configuring at least one of the following in the trusted zone of a processor to facilitate enhanced mobile device security; a specialized debugging interface; a remote auditing tool; an inter-process communication mechanism; a secure daemon; a package manager; a virtual machine; a configuration function; a device management system; a touch screen software; and a geo-localization function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for enforcing security of a mobile device, comprising:
-
a processor enabled to provide a trusted zone enabled to execute a trusted application and a trusted inter-process communication bus, and an application zone enabled to execute an application and inter-process communication bus; and a hardware bus enabled to communicate with the inter-process communication bus and the trusted inter-process communication bus. - View Dependent Claims (19, 20, 21)
-
Specification