SYSTEMS AND METHODS FOR MONITORING AN OPERATING SYSTEM OF A MOBILE WIRELESS COMMUNICATION DEVICE FOR UNAUTHORIZED MODIFICATIONS
First Claim
1. A method for secure monitoring an operating system of a mobile wireless communication device for unauthorized modifications, the mobile wireless communication device including an electronic processor and a universal integrated circuit card, the method comprising:
- providing a secure application in the universal integrated circuit card, the secure application configured to disable or block wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network;
providing a monitoring application in a trusted sub-processor of the electronic processor; and
establishing a secure communication link between the secure application and the monitoring application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for securely monitoring an operating system of a mobile wireless communication device for unauthorized modifications. A secure application is provided on universal integrated circuit card of the mobile wireless communication device. The secure application is configured to control the wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network. A monitoring application is provided in a trusted sub-processor of the processor of the mobile wireless communication device. A secure communication link is established between the secure application and the monitoring application. A heartbeat token is generated by the trusted sub-processor, based on a modification status for the operating system and at least one system variable. The secure application receives the heartbeat token, and determines that an unauthorized software modification exists based on the heartbeat token. The secure application activates at least one countermeasure when an unauthorized software modification exists.
-
Citations
19 Claims
-
1. A method for secure monitoring an operating system of a mobile wireless communication device for unauthorized modifications, the mobile wireless communication device including an electronic processor and a universal integrated circuit card, the method comprising:
-
providing a secure application in the universal integrated circuit card, the secure application configured to disable or block wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network; providing a monitoring application in a trusted sub-processor of the electronic processor; and establishing a secure communication link between the secure application and the monitoring application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for secure monitoring of an operating system of a mobile wireless communication device for unauthorized modifications, the system comprising:
-
a universal integrated circuit card configured to disable or block wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network; and an electronic processor having a trusted sub-processor, the trusted sub-processor configured to establish a secure communication link between the trusted sub-processor and the universal integrated circuit card. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for secure monitoring of an operating system of a mobile wireless communication device for unauthorized modifications, the system comprising:
-
a universal integrated circuit card that disables or blocks wireless connectivity of the mobile wireless communication device, and communicates with a wireless communications network; and an electronic processor having a trusted sub-processor, the trusted sub-processor establishes a secure communication link between the trusted sub-processor and the universal integrated circuit card.
-
Specification