System and method of secure garbage collection on a mobile device
First Claim
Patent Images
1. A method for performing secure garbage collection involving sensitive information on a mobile device, the method comprising:
- receiving secure information over a wireless network;
extracting sensitive information from the secure information;
storing the sensitive information in memory of the mobile device, wherein the sensitive information is accessible using an object;
unreferencing the object;
determining that the object has become unreachable because the object was unreferenced;
based upon the determination that the object has become unreachable, calling a wipe function to overwrite a memory of the mobile device where the unreachable object is stored; and
reclaiming the memory that the object was using.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
-
Citations
19 Claims
-
1. A method for performing secure garbage collection involving sensitive information on a mobile device, the method comprising:
-
receiving secure information over a wireless network; extracting sensitive information from the secure information; storing the sensitive information in memory of the mobile device, wherein the sensitive information is accessible using an object; unreferencing the object; determining that the object has become unreachable because the object was unreferenced; based upon the determination that the object has become unreachable, calling a wipe function to overwrite a memory of the mobile device where the unreachable object is stored; and reclaiming the memory that the object was using. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A wireless device comprising:
-
a receiver configured to receive secure information over a wireless network; a microprocessor coupled to the receiver, the microprocessor configured to extract sensitive information from the secure information; an addressable memory configured to; store the sensitive information, and store an object, wherein the sensitive information is accessible using the object when the object is executed by the microprocessor; and wherein the microprocessor is further configured to; unreference the object, determine that the object has become unreachable because the object was unreferenced, based upon the determination that the object has become unreachable, call a wipe function to overwrite the addressable memory location of the unreachable object, and reclaim the portion of the memory that the object was using. - View Dependent Claims (17, 18, 19)
-
Specification