OVER THE AIR MANAGEMENT OF PAYMENT APPLICATION INSTALLED IN MOBILE DEVICE
First Claim
1. A computer-implemented method, comprising:
- receiving, by a mobile device, an input indicative of a password to access an application installed on the mobile device;
determining, by the mobile device, that a predetermined number of password entry attempts has been reached based on the input;
transmitting, by the mobile device to a remote computer, a request message to disable access to the application;
receiving, by the mobile device from the remote computer, one or more lock instructions for disabling access to the application; and
executing, by the mobile device, the one or more lock instructions to disable access the application by modifying control data within a secure memory of the mobile device.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit unauthorized use of the application, for example, when the mobile device is lost, stolen, or otherwise subject to unauthorized use. An input indicative of a password to access the application can be received. It may be determined that a predetermined number of password entry attempts has been reached based on the input. A request message to disable access to the application can be transmitted from the mobile device to a remote computer. One or more lock instructions for disabling access to the application can be received by the mobile device from the remote computer. The one or more lock instructions can be executed by the mobile device by modifying control data within a secure memory of the mobile device.
3 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a mobile device, an input indicative of a password to access an application installed on the mobile device; determining, by the mobile device, that a predetermined number of password entry attempts has been reached based on the input; transmitting, by the mobile device to a remote computer, a request message to disable access to the application; receiving, by the mobile device from the remote computer, one or more lock instructions for disabling access to the application; and executing, by the mobile device, the one or more lock instructions to disable access the application by modifying control data within a secure memory of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device, comprising:
-
a memory that stores one or more computer-executable instructions; and a processor configured to access the memory and execute the computer-executable instructions to implement a method comprising; receiving an input indicative of a password to access an application installed on the mobile device; determining that a predetermined number of password entry attempts has been reached based on the input; transmitting, to a remote computer, a request message to disable access to the application; receiving, from the remote computer, one or more lock instructions for disabling access to the application; and executing the one or more instructions to disable access the application by modifying control data within a secure memory of the mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium comprising one or more computer-executable instructions to implement a method, the method comprising:
-
receiving, by a mobile device, an input indicative of a password to access an application installed a mobile device; determining, by the mobile device, that a predetermined number of password entry attempts has been reached based on the input; transmitting, by the mobile device to a remote computer, a request message to disable access to the application; receiving, by the mobile device from the remote computer, one or more lock instructions for disabling access to the application; and executing, by the mobile device, the one or more lock instructions to disable access the application by modifying control data within a secure memory of the mobile device. - View Dependent Claims (17, 18, 19, 20)
-
Specification