System and method for security using a sibling smart card
First Claim
1. A device, comprising:
- a first subscriber identity module having a first time-synchronized key;
a memory configured to store data;
a communications module coupled to the memory and configured to detect a remote device; and
a controller coupled to the memory and configured to;
operate the communications module to establish a pairing relationship with the remote device;
determine a common time reference as a function of an initial time for said pairing and a random value;
calculate said first time-synchronized key as a function of the common time reference;
operate the communications module to transfer the random value to the remote device, said remote device operable to calculate a second time-synchronized key using the transferred random value; and
determine if the remote device includes a second subscriber identity module having the second time-synchronized key that matches the first time-synchronized key of the first subscriber identity module.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this respect, both the mobile device (which may be a mobile phone, for example) and the paired remote device (which may be a keychain, for example) include a SIM card that may have identification data stored therein. Once paired, the two devices may communicate encrypted security messages back and forth in order to implement various security measures to protect data and wireless communications. Such messages may be generated from initial information known only to each respective device such as a randomly generated offset number and a common time reference.
20 Citations
25 Claims
-
1. A device, comprising:
-
a first subscriber identity module having a first time-synchronized key; a memory configured to store data; a communications module coupled to the memory and configured to detect a remote device; and a controller coupled to the memory and configured to; operate the communications module to establish a pairing relationship with the remote device; determine a common time reference as a function of an initial time for said pairing and a random value; calculate said first time-synchronized key as a function of the common time reference; operate the communications module to transfer the random value to the remote device, said remote device operable to calculate a second time-synchronized key using the transferred random value; and determine if the remote device includes a second subscriber identity module having the second time-synchronized key that matches the first time-synchronized key of the first subscriber identity module. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A remote device, comprising:
-
a first subscriber identity module having a first time-synchronized key; a communications module coupled to the first subscriber identity module and configured to; wirelessly communicate with a second device to establish a pairing relationship; receive from said second device a random value, wherein said random value is used by said second device to calculate a second time-synchronized key derived from a common time reference set as a function of an initial time for said pairing and said random value; and a controller coupled to the communications module and configured to calculate the first time-synchronized key as a function of the received random value for use in determining if the second device includes a second subscriber identity module that is synchronized with the first subscriber identity module by the first and second time-synchronized keys matching. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
a first device, comprising; a first controller; a first subscriber identity module coupled to the first controller; a memory coupled to the first controller configured to store data; and a first communications module coupled to the first controller; wherein the first controller is configured to; establish a pairing relationship with a second device; determine a common time reference as a function of an initial time for said pairing and a random value; calculate a first time-synchronized key as a function of the common time reference; and transfer the random value to the second device, said second device operable to calculate a second time-synchronized key using the transferred random value; and the second device comprising; a second controller; a second subscriber identity module coupled to the second controller; and a second communications module coupled to the second controller; wherein the second controller is configured to calculate a second time-synchronized key using the transferred random value; wherein matching of the first and second time-synchronized keys facilitates communications between the first communications module to the second communications module.
-
-
15. A method, comprising:
-
establishing a pairing relationship between a remote device and a device having encrypted data; determining, by the device, a common time reference as a function of an initial time for said pairing and a random value; calculating a first time-synchronized key by said device as a function of the common time reference; transferring, by the device, the random value to said remote device; calculating a second time-synchronized key by said remote device as a function of the transferred random value; determining, by the device, if the first and second time-synchronized keys match; and if the first and second time-synchronized keys match, then decrypting by the device of the encrypted data. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method, comprising:
-
initiating a wireless transaction at a device, the wireless transaction protected by a security protocol; detecting a remote device having a key for the security protocol; determining if the remote device includes a subscriber identity module that is time-synchronized with a subscriber identity module in the device; and if the remote device is synchronized, then allowing the wireless transaction; wherein determining time-synchronization between the subscriber identity modules comprises; determining, by the device, a common time reference as a function of an initial time for said detecting and a random value; calculating a first time-synchronized key by said device as a function of the common time reference; transferring, by the device, the random value to said remote device; calculating a second time-synchronized key by said remote device as a function of the transferred random value; and determining, by the device, if the first and second time-synchronized keys match. - View Dependent Claims (21, 22, 23)
-
-
24. A non-transitory computer readable storage medium having computer executable instructions that, when executed by a device, are operable to:
-
establishing a pairing relationship between a remote device and the device having encrypted data; determining, by the device, a common time reference as a function of an initial time for said pairing and a random value; calculating a first time-synchronized key by said device as a function of the common time reference; transferring, by the device, the random value to said remote device; calculating a second time-synchronized key by said remote device as a function of the transferred random value; determining, by the device, if the first and second time-synchronized keys match remote; and if the first and second time-synchronized keys match, then decrypting by the device of the encrypted data.
-
-
25. A non-transitory computer readable storage medium having computer executable instructions that, when executed by a device, are operable to:
-
initiate a wireless transaction at the device, the wireless transaction protected by a security protocol; detect a remote device having a key for the security protocol; determine if the remote device includes a subscriber identity module that is time-synchronized with a subscriber identity module in the device; and if the remote device is synchronized, then allow the wireless transaction; wherein the time-synchronization determination between the subscriber identity modules comprises; determining, by the device, a common time reference as a function of an initial time for said detecting and a random value; calculating a first time-synchronized key by said device as a function of the common time reference; transferring, by the device, the random value to said remote device; calculating a second time-synchronized key by said remote device as a function of the transferred random value; and determining, by the device, if the first and second time-synchronized keys match.
-
Specification