Remotely modifying data in memory in a mobile device
First Claim
1. A method for remotely modifying data stored in a mobile device comprising:
- receiving a message from a remote source in the mobile device;
comparing the message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; and
in response to the message matching the secret message, modifying data stored in memory in the mobile device,wherein the comparing the message to the secret message, wherein the secret message is a hash value output by the hash function, wherein inputs to the hash function include the text string and the secret text string, and further wherein the hash function is operable for preprocessing the text string and the secret text string to produce blocks, and generating the hash value from the blocks using word operations and working variables.
31 Assignments
0 Petitions
Accused Products
Abstract
Methods and corresponding systems in a mobile device for remotely modifying data stored in the mobile device include receiving a message in the mobile device. The message can be a short message service (SMS) message. The message is compared to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string. The text string can be an e-mail address, and the secret text string can be a password of the mobile device. In response to the message matching the secret message, data stored in memory in the mobile device is modified to prevent unauthorized access. A secret message cancellation can be received in the mobile device to cancel a scheduled memory modification. Memory modification can include erasing data, replacing data, or encrypting data.
-
Citations
21 Claims
-
1. A method for remotely modifying data stored in a mobile device comprising:
-
receiving a message from a remote source in the mobile device; comparing the message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; and in response to the message matching the secret message, modifying data stored in memory in the mobile device, wherein the comparing the message to the secret message, wherein the secret message is a hash value output by the hash function, wherein inputs to the hash function include the text string and the secret text string, and further wherein the hash function is operable for preprocessing the text string and the secret text string to produce blocks, and generating the hash value from the blocks using word operations and working variables. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for remotely modifying data stored in a mobile device comprising:
-
receiving a first message in the mobile device; comparing the first message to a secret message, wherein the secret message is a hash value output by a hash function, wherein inputs to the hash function include a text string and a secret text string; in response to the first message matching the secret message, scheduling a memory modification operation for execution in response to scheduled conditions; receiving a second message in the mobile device; comparing the second message to a secret message cancellation; in response to the second message matching the secret message cancellation, cancelling the memory modification operation; and in response to the scheduled conditions being met, modifying data stored in memory in the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for remotely modifying data in a mobile device comprising:
-
a memory; a mobile transceiver for receiving messages from a remote source; a message processor coupled to the mobile transceiver for processing the messages; a hash function having inputs coupled to a text string and a secret text string, and having a hash function output coupled to the message processor; a message string identifier coupled to the message processor for comparing a message received by the mobile transceiver to a secret message output by the hash function output; and a memory controller coupled to the memory and coupled to the message string identifier, wherein the memory controller is adapted to modify data in the memory in response to a match between the message received by the mobile transceiver and the secret message output by the hash function output, wherein the hash function is operable for preprocessing the text string and the secret text string to produce blocks, and generating the secret message from the blocks using word operations and working variables. - View Dependent Claims (19, 20, 21)
-
Specification