Access techniques using a mobile communication device
First Claim
1. A system comprising:
- one or more modules implemented at least partially in hardware, the one or more modules configured to perform operations comprising;
provisioning credentials on a secure element implemented in tamper-resistant hardware of the mobile communication device having telephone functionality using a public key to encrypt the credentials for communication to the mobile communication device, the secure element configured to decrypt the encrypted credentials using a corresponding private key stored within the secure element without exposing the credentials or the private key outside of the secure element and the secure element being resistant to physical removal from the mobile communication device; and
forming a communication for transmission by the mobile communication device that includes data that describes a function to be performed by a physical lock or vehicle and also includes data generated using the provisioned credentials that is usable to verify that the mobile communication device is authorized to cause the function to be performed.
3 Assignments
0 Petitions
Accused Products
Abstract
Access techniques using a mobile communication device are described. In implementations, a mobile communication device comprises a processor, hardware configured to implement multi-mode wireless communication in which at least one of the modes involves telephone communication, tamper-resistant hardware implementing a secure element as storing one or more credentials, and memory having instructions stored therein. The instructions are executable by the processor to cause the mobile communication device to perform operations comprising forming a communication having data that was generated using the one or more credentials stored in the secure element, the communication to be transmitted wirelessly using the hardware implementing the multi-mode wireless communication to initiate function of a physical lock or vehicle.
142 Citations
20 Claims
-
1. A system comprising:
one or more modules implemented at least partially in hardware, the one or more modules configured to perform operations comprising; provisioning credentials on a secure element implemented in tamper-resistant hardware of the mobile communication device having telephone functionality using a public key to encrypt the credentials for communication to the mobile communication device, the secure element configured to decrypt the encrypted credentials using a corresponding private key stored within the secure element without exposing the credentials or the private key outside of the secure element and the secure element being resistant to physical removal from the mobile communication device; and forming a communication for transmission by the mobile communication device that includes data that describes a function to be performed by a physical lock or vehicle and also includes data generated using the provisioned credentials that is usable to verify that the mobile communication device is authorized to cause the function to be performed. - View Dependent Claims (2, 3, 4, 5)
-
6. A device comprising:
-
a processor; hardware configured to implement multi-mode wireless communication; tamper-resistant hardware implementing a secure element as storing one or more credentials that include one or more cryptographic keys usable to encrypt or decrypt data, the tamper-resistant hardware including an integrated circuit that is resistant to physical removal from the device; and memory having instructions stored therein, the instructions being executable by the processor to cause the device to perform operations comprising; receiving, from a mobile device, a communication having data that describes a function to be performed by a physical lock or vehicle, the communication received wirelessly using the hardware implementing the multi-mode wireless communication; and initiating the function of the physical lock or the vehicle based, at least in part, on the data of the received communication and the one or more credentials stored in the secure element of the device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving, by a computing device, a communication transmitted by a mobile communication device, the communication including first data that describes a function to be performed by a vehicle or a physical lock and second data usable to verify that the mobile communication device is authorized to cause the function to be performed, the second data being generated using credentials provisioned in a secure element implemented in tamper-resistant hardware of the mobile communication device the secure element of the mobile communication device being resistant to physical removal from the mobile communication device; verifying that the mobile communication device is authorized to cause the function to be performed; and responsive to verifying that the mobile communication device is authorized to cause the function to be performed, initiating performance of the function of the vehicle or the physical lock. - View Dependent Claims (17, 18, 19, 20)
-
Specification