Method and apparatus for creating a remotely activated secure backup service for mobile handsets
First Claim
1. A method for securing data files on a mobile handset, comprising:
- receiving an activation command message via a wireless network directing the mobile handset to encrypt the data files;
obtaining an encryption key upon recognizing the activation command message by;
receiving a public key in the activation command message; and
generating a symmetric key and encrypting it using the public key;
encrypting the data files using the symmetric key to generate an encrypted data file;
storing the encrypted data files in memory of the mobile handset;
transmitting the encrypted symmetric key to a server via the cellular telephone network; and
deleting the symmetric key from a memory of the mobile handset after the data files have been encrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and systems for protecting data on a mobile handset when remotely activated by a user involve encrypting the data using an encryption key, storing the encrypted data, and deleting the non-encrypted data along with the encryption key. Data may also be uploaded to a server to via a cellular data call for use in backing up the mobile handset. A mobile handset application configures the handset to receive activation commands from a server to encrypt, upload or download data. The encryption key is either received from the server or generated by the mobile handset and communicated to the server. Mock data files may be generated and stored on the mobile handset to enable handset applications to function normally after the data files have been encrypted.
-
Citations
8 Claims
-
1. A method for securing data files on a mobile handset, comprising:
-
receiving an activation command message via a wireless network directing the mobile handset to encrypt the data files; obtaining an encryption key upon recognizing the activation command message by; receiving a public key in the activation command message; and generating a symmetric key and encrypting it using the public key; encrypting the data files using the symmetric key to generate an encrypted data file; storing the encrypted data files in memory of the mobile handset; transmitting the encrypted symmetric key to a server via the cellular telephone network; and deleting the symmetric key from a memory of the mobile handset after the data files have been encrypted. - View Dependent Claims (2, 4)
-
-
3. A mobile handset, comprising:
-
a processor; a wireless transceiver coupled to the processor and configured to connect to a wireless network; and a memory coupled to the processor, the memory having stored therein software instructions configured to cause the processor to perform operations comprising; receiving an activation command message via the wireless network directing the mobile handset to encrypt data files; obtaining an encryption key upon recognizing the activation command message by; receiving a public key in the activation command message; and generating a symmetric key and encrypting it using the public key; encrypting the data files using the symmetric key; storing the encrypted data files in the memory; transmitting the encrypted symmetric key to a server via the cellular telephone network; and deleting the symmetric key from the memory after the data files have been encrypted.
-
-
5. A mobile handset, comprising:
-
means for receiving an activation command message via a wireless network directing the mobile handset to encrypt data files; means for obtaining an encryption key upon recognizing the activation command message comprising; means for receiving a public key in the activation command message; and means for generating a symmetric key and encrypting it using the public key; means for encrypting the data files using the symmetric key; means for storing the encrypted data files in a memory of the mobile handset; means for transmitting the encrypted symmetric key to a server via the cellular telephone network; and means for deleting the symmetric key from the memory of the mobile handset after the data files have been encrypted. - View Dependent Claims (6)
-
-
7. A non-transitory, processor-readable storage medium having stored thereon processor executable software instructions configured to cause a processor of a mobile handset to perform operations comprising:
-
receiving an activation command message via a wireless network directing the mobile handset to encrypt data files; obtaining an encryption key upon recognizing the activation command message by; receiving a public key in the activation command message; and generating a symmetric key and encrypting it using the public key; encrypting the data files using the encryption key; storing the encrypted data files in a memory of the mobile handset; transmitting the encrypted symmetric key to a server via the cellular telephone network; and deleting the encryption key from the memory of the mobile handset after the data files have been encrypted. - View Dependent Claims (8)
-
Specification