SECURE MOBILE DEVICE TRANSACTIONS
First Claim
Patent Images
1. A mobile computing device having a processor and a memory, wherein the processor is programmed with a mobile transaction application, wherein:
- the memory comprises a local database to hold data items for use by the mobile transaction application;
wherein the mobile transaction application is adapted to encrypt data items for storage in the local database and to decrypt data items stored in the local database using white-box cryptographic techniques.
2 Assignments
0 Petitions
Accused Products
Abstract
A mobile computing device has a processor and a memory. The processor is programmed with a mobile transaction application 101. The memory comprises a local database 102 to hold data items for use by the mobile transaction application 101. The mobile transaction application 101 is adapted to encrypt data items for storage in the local database 102 and to decrypt data items stored in the local database 102 using white-box cryptographic techniques.
-
Citations
20 Claims
-
1. A mobile computing device having a processor and a memory, wherein the processor is programmed with a mobile transaction application, wherein:
-
the memory comprises a local database to hold data items for use by the mobile transaction application; wherein the mobile transaction application is adapted to encrypt data items for storage in the local database and to decrypt data items stored in the local database using white-box cryptographic techniques. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of operating a mobile transaction application at a mobile computing device, wherein the mobile computing device comprises a processor adapted to execute the mobile transaction application and a memory comprising a local database to hold data items for use by the mobile transaction application, the method comprising:
-
identifying one or more data items for storage in or retrieval from the local database; and
eitherencrypt the one or more data items for storage in the local database using white-box cryptographic techniques, or decrypt the one or more data items stored in the local database using white-box cryptographic techniques. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification