System and method of secure garbage collection on a mobile device
First Claim
Patent Images
1. One or more non-transitory computer readable media comprising computer readable instructions that, when executed, cause a mobile device to perform:
- receiving secure information over a wireless network;
extracting sensitive information from the secure information;
storing the sensitive information in memory of the mobile device, wherein the sensitive information is accessible using an object;
unreferencing the object;
determining that the object has become unreachable because the object was unreferenced;
based upon the determination that the object has become unreachable, calling a wipe function to overwrite a memory of the mobile device where the unreachable object is stored; and
reclaiming the memory that the object was using.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
57 Citations
15 Claims
-
1. One or more non-transitory computer readable media comprising computer readable instructions that, when executed, cause a mobile device to perform:
-
receiving secure information over a wireless network; extracting sensitive information from the secure information; storing the sensitive information in memory of the mobile device, wherein the sensitive information is accessible using an object; unreferencing the object; determining that the object has become unreachable because the object was unreferenced; based upon the determination that the object has become unreachable, calling a wipe function to overwrite a memory of the mobile device where the unreachable object is stored; and reclaiming the memory that the object was using. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification