Apparatus and method for securely managing the accessibility to content and applications
First Claim
1. A communication device comprising:
- a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising;
receiving secret information and non-secret information from a secure download application function, wherein the secure download application function is remote from the communication device; and
storing the secret information and the non-secret information in the secure element memory;
a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising;
providing a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via the secure download application function;
receiving the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor;
receiving the non-secret information from the secure element; and
generating a second verification for the access based on the non-secret information,wherein the non-secret information includes device permissions, wherein the content includes file permissions, and wherein presentation of the content by the communication device is according to the device permissions and the file permissions.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed.
121 Citations
20 Claims
-
1. A communication device comprising:
-
a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising; receiving secret information and non-secret information from a secure download application function, wherein the secure download application function is remote from the communication device; and storing the secret information and the non-secret information in the secure element memory; a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising; providing a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via the secure download application function; receiving the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor; receiving the non-secret information from the secure element; and generating a second verification for the access based on the non-secret information, wherein the non-secret information includes device permissions, wherein the content includes file permissions, and wherein presentation of the content by the communication device is according to the device permissions and the file permissions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a secure element of a communication device, secret information and non-secret information from a secure download application function that is remote from the communication device; storing the secret information in a secure element memory of the secure element; providing, by a secure device processor of the communication device, a request for a first verification to the secure element, wherein the secure device processor is separate from the secure element and is in communication with the secure element, and wherein the first verification is associated with access to an application that is sourced via the secure download application function; receiving, by the secure device processor, the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor; receiving, by the secure device processor, the non-secret information from the secure element; generating a second verification for the access based on the non-secret information, wherein the application is accessible by the communication device responsive to the first and second verifications providing, by the secured device processor, consumption information to at least one of the secure element or the secure download application function, the consumption information indicating that the application has been executed by the communication device; receiving, at the secure device processor, access instructions from the at least one of the secure element or the secure download application function responsive to the consumption information; and preventing the communication device from accessing the application according to the access instructions. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving, by a communication device comprising a secure element having a secure element memory and a secure device processor having a secure device processor memory, secret information and non-secret information from a secure download application function, wherein the secure download application function is remote from the communication device; and storing, by the communication device, the secret information and the non-secret information in the secure element memory; providing, by the communication device, a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via the secure download application function; receiving, by the communication device, the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor; receiving, by the communication device, the non-secret information from the secure element; and generating, by the communication device, a second verification for the access based on the non-secret information, wherein the non-secret information includes device permissions, wherein the content includes file permissions, and wherein presentation of the content by the communication device is according to the device permissions and the file permissions. - View Dependent Claims (17, 18, 19, 20)
-
Specification