Deleting confidential information used to secure a communication link
First Claim
1. A first device comprising:
- a communication interface compatible with a wireless communication protocol; and
a processor,wherein in the event that a wireless communication link between the first device and a second device has been established via the communication interface and the wireless communication link has been secured using confidential information stored at the first device, the processor is operative to delete the confidential information from the first device in response to a lack of communication between the first device and the second device over the wireless communication link for at least a predefined period of time while the wireless communication link remains enabled.
4 Assignments
0 Petitions
Accused Products
Abstract
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device.
-
Citations
23 Claims
-
1. A first device comprising:
-
a communication interface compatible with a wireless communication protocol; and a processor, wherein in the event that a wireless communication link between the first device and a second device has been established via the communication interface and the wireless communication link has been secured using confidential information stored at the first device, the processor is operative to delete the confidential information from the first device in response to a lack of communication between the first device and the second device over the wireless communication link for at least a predefined period of time while the wireless communication link remains enabled. - View Dependent Claims (2, 3)
-
-
4. A first device comprising:
-
a communication interface compatible with a wireless communication protocol; a processor, the first device including smart card reader functionality, wherein in the event that a wireless communication link between the first device and a second device has been established via the communication interface and the wireless communication link has been secured using confidential information stored at the first device, the processor is operative to delete the confidential information from the first device responsive to removal of a smart card from the first device for at least a predefined period of time. - View Dependent Claims (5, 6, 7)
-
-
8. A method at a first device, the method comprising:
-
using confidential information stored at the first device to secure a wireless communication link between the first device and a second device; detecting, while the wireless communication link remains enabled, a lack of communication between the first device and the second device over the wireless communication link for at least a predefined period of time; and deleting the confidential information from the first device responsive to detecting the lack of communication for at least the predefined period of time. - View Dependent Claims (9)
-
-
10. A method at a first device, the method comprising:
-
using confidential information stored at the first device to secure a wireless communication link between the first device and a second device, the first device including smart card reader functionality; detecting removal of a smart card from the first device; and deleting the confidential information from the first device responsive to detecting the removal. - View Dependent Claims (11)
-
-
12. A method at a first device, the method comprising:
-
using confidential information stored at the first device to secure a wireless communication link between the first device and a second device, the first device including smart card reader functionality; detecting removal of a smart card from the first device for at least a predefined period of time; and deleting the confidential information from the first device responsive to detecting the removal for at least the predefined period of time. - View Dependent Claims (13)
-
-
14. A first device comprising:
-
a communication interface compatible with a wireless communication protocol; and a processor, wherein in the event that a wireless communication link between the first device and a second device has been established via the communication interface and the wireless communication link has been secured using confidential information stored at the first device, the processor is operative to delete the confidential information from the first device responsive to a predefined number of transactions between the first device and the second device over the wireless communication link having occurred. - View Dependent Claims (15, 16, 17)
-
-
18. A method at a first device, the method comprising:
-
using confidential information stored at the first device to secure a wireless communication link between the first device and a second device, the second device also storing the confidential information; performing transactions with the second device over the wireless communication link; and deleting the confidential information from the first device responsive to a predefined number of transactions between the first device and the second device over the wireless communication link having occurred. - View Dependent Claims (19, 20, 21)
-
-
22. A first device comprising:
-
a communication interface compatible with a wireless communication protocol; and a processor, wherein in the event that a wireless communication link between the first device and a second device has been established via the communication interface and the wireless communication link has been secured using confidential information stored at the first device, the processor is operative to delete the confidential information from the first device responsive to a strength of signals received at the first device from the second device over the wireless communication link having dropped below a predefined threshold.
-
-
23. A method at a first device, the method comprising:
-
using confidential information stored at the first device to secure a wireless communication link between the first device and a second device, the second device also storing the confidential information; detecting at the first device that a strength of signals received at the first device from the second device over the wireless communication link has dropped below a predefined threshold; and deleting the confidential information from the first device responsive to detecting that the strength has dropped below the predefined threshold.
-
Specification