Secure reset of personal and service provider information on mobile devices
First Claim
1. A computer-implemented method for resetting secure memories within computing devices configured to conduct financial transactions, comprising:
- receiving an encrypted reset request message for a secure memory of a computing device configured to conduct financial transactions, the encrypted reset request message being associated with a request to change control of the secure memory from a first secure service provider to a second secure service provider, the encrypted reset request message originating from a source other than the first secure service provider;
providing a communication key within the secure memory;
decrypting the encrypted reset request message within the secure memory using the communication key;
verifying authorization for the reset request message; and
clearing parameters associated with the first secure service provider from the secure memory based on instructions provided in the verified reset request message that originated from the source other than the first secure service provider.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described herein for supporting end users of a mobile device, such as a mobile phone, to reset a secure element associated with the communication device. The reset process may include clearing the secure element, associated memories, and storage devices of any user specific or personalized information associated with the user. The reset process may also include removing or resetting keys or other identifiers within the secure element that associate the mobile device with a particular secure service provider. According to various embodiments, a computer-implemented method for resetting a secure element within a network device may include receiving an encrypted reset request message at the secure element, decrypting the encrypted reset request message using a communication key, verifying authorization for the reset request message, and atomically clearing parameters associated with the secure element.
-
Citations
27 Claims
-
1. A computer-implemented method for resetting secure memories within computing devices configured to conduct financial transactions, comprising:
-
receiving an encrypted reset request message for a secure memory of a computing device configured to conduct financial transactions, the encrypted reset request message being associated with a request to change control of the secure memory from a first secure service provider to a second secure service provider, the encrypted reset request message originating from a source other than the first secure service provider; providing a communication key within the secure memory; decrypting the encrypted reset request message within the secure memory using the communication key; verifying authorization for the reset request message; and clearing parameters associated with the first secure service provider from the secure memory based on instructions provided in the verified reset request message that originated from the source other than the first secure service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product, comprising:
a non-transitory computer-readable medium having computer-readable program instructions embodied therein that when executed by a computer cause the computer to reset secure memories within computing devices configured to conduct financial transactions, the computer-readable program instructions comprising; computer-readable program instructions to receive an encrypted reset request message for a secure memory of a computing device configured to engage in financial transactions, the encrypted reset request message being associated with a request to change control of the secure memory from a first electronic entity to a second electronic entity, the encrypted reset request message originating from a source other than the first electronic entity; computer-readable program instructions for storing a communication key within a secure certificate associated with the secure memory of the computing device; computer-readable program instructions for decrypting the encrypted reset request message within the secure memory using the communication key; computer-readable program instructions for verifying authorization for the reset request message; and computer-readable program instructions for clearing parameters associated with the first electronic entity from the secure memory. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
23. A system for resetting secure memories within computing devices, comprising:
-
a storage device; a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive an encrypted reset request message for a secure memory of a computing device configured to engage in financial transactions, the encrypted reset request message being associated with a request to change control of the secure memory from a first electronic entity to a second electronic entity, the encrypted reset request message originating from a source other than the first electronic entity; store a communication key within a secure certificate associated with the secure memory of the computing device; decrypt the encrypted reset request message within the secure memory using the communication key; verify authorization for the reset request message; and clear parameters associated with the first electronic entity from the secure memory. - View Dependent Claims (24, 25, 26, 27)
-
Specification