Systems and methods for encrypting mobile device communications
First Claim
1. A computer-implemented method for encrypting communications from a mobile device comprising one or more processors, the method comprising:
- receiving, by the one or more processors, derivation information associated with a first symmetric key, from a trusted service manager;
deriving, by the one or more processors, the first symmetric key, wherein the first symmetric key is derived independently from a second symmetric key derived by the trusted service manager;
receiving, by the one or more processors, an asymmetric key encrypted by the independently derived second symmetric key;
decrypting, by the one or more processors, the asymmetric key using the independently derived first symmetric key;
generating, by the one or more processors executing a first application stored on a first memory of the mobile device, a message to be communicated to an intended recipient;
providing, by the first application to an authentication application stored on a secure element of the mobile device, the message, wherein the secure element is an embedded or separate securitized memory;
encrypting, by the one or more processors executing the authentication application, using the asymmetric key, the message;
providing, by the authentication application to the first application, the encrypted message; and
directing, by the first application, communication of the message to the intended recipient.
8 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.
147 Citations
20 Claims
-
1. A computer-implemented method for encrypting communications from a mobile device comprising one or more processors, the method comprising:
-
receiving, by the one or more processors, derivation information associated with a first symmetric key, from a trusted service manager; deriving, by the one or more processors, the first symmetric key, wherein the first symmetric key is derived independently from a second symmetric key derived by the trusted service manager; receiving, by the one or more processors, an asymmetric key encrypted by the independently derived second symmetric key; decrypting, by the one or more processors, the asymmetric key using the independently derived first symmetric key; generating, by the one or more processors executing a first application stored on a first memory of the mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a secure element of the mobile device, the message, wherein the secure element is an embedded or separate securitized memory; encrypting, by the one or more processors executing the authentication application, using the asymmetric key, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for encrypting communications from a mobile device, the system comprising:
-
at least one secure element, wherein the at least one secure element is an embedded or separate securitized memory storing an authentication application; at least one memory configured to store computer-executable instructions; and at least one processor configured to access the at least one memory and execute the computer-executable instructions to; receive, by the at least one processor, from a trusted service manager derivation information associated with a first symmetric key; derive, by the at least one processor, the first symmetric key, wherein the first symmetric key is derived independently from a second symmetric key derived by the trusted service manager; receive, by the at least one processor, an asymmetric key encrypted by the independently derived second symmetric key; decrypt, by the at least one processor, the asymmetric key using the independently derived first symmetric key; generate, by the at least one processor executing a first application stored on a first memory of the mobile device, a message to be communicated to an intended recipient; provide, by the first application to the authentication application, the message; encrypt, by the at least one processor executing the authentication application, using the asymmetric key, the message; provide, by the authentication application to the first application, the encrypted message; and direct, by the first application, communication of the message to the intended recipient. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
receiving, by at least one processor of a mobile device, from a trusted service manager derivation information associated with a first symmetric key; deriving, by the at least one processor, the first symmetric key, wherein the first symmetric key is derived independently from a second symmetric key derived by the trusted service manager; receiving, by the at least one processor, an asymmetric key encrypted by the independently derived second symmetric key; decrypting, by the at least one processor, the asymmetric key using the independently derived first symmetric key; generating, by the at least one processor executing at least one application stored in at least one memory of the mobile device, a message to be communicated to an intended recipient; providing, by the at least one application to an authentication application stored in at least one secure element of the mobile device, the message, wherein the at least one secure element is an embedded or separate securitized memory; encrypting, by the at least one processor executing the authentication application, using the asymmetric key, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient. - View Dependent Claims (18, 19, 20)
-
Specification