Method and system to provide secure exchange of data between mobile phone and computer system
First Claim
Patent Images
1. A method comprising:
- sending, by a first secure access layer operating on a mobile telephone, an authentication request to a second secure access layer operating on a computer system that is separate from, and in communication with, the mobile telephone, wherein the second secure access layer is included within a dynamic linked library comprising phone-specific functions used to access data on the mobile telephone, the first secure access layer is configured to communicate only with the dynamic linked library, and the dynamic linked library stores a first certificate of authenticity;
in response to the authentication request, receiving the first certificate from the second secure access layer;
confirming, by the first secure access layer, using the first certificate, authenticity of the second secure access layer by determining the first secure access layer and the second secure access layer are matching, wherein the confirming includes comparing a second certificate of authenticity of the first secure access layer with the first certificate; and
in response to confirming authenticity of the second secure access layer, granting, by the first secure access layer, authorization to the dynamic linked library to transmit data between the mobile telephone and the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for transmitting data between the phone and the computer system.
-
Citations
15 Claims
-
1. A method comprising:
-
sending, by a first secure access layer operating on a mobile telephone, an authentication request to a second secure access layer operating on a computer system that is separate from, and in communication with, the mobile telephone, wherein the second secure access layer is included within a dynamic linked library comprising phone-specific functions used to access data on the mobile telephone, the first secure access layer is configured to communicate only with the dynamic linked library, and the dynamic linked library stores a first certificate of authenticity; in response to the authentication request, receiving the first certificate from the second secure access layer; confirming, by the first secure access layer, using the first certificate, authenticity of the second secure access layer by determining the first secure access layer and the second secure access layer are matching, wherein the confirming includes comparing a second certificate of authenticity of the first secure access layer with the first certificate; and in response to confirming authenticity of the second secure access layer, granting, by the first secure access layer, authorization to the dynamic linked library to transmit data between the mobile telephone and the computer system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory machine-readable medium storing instructions that, when executed by a mobile telephone, cause the mobile telephone to:
-
send, by a first secure access layer operating on the mobile telephone, an authentication request to a second secure access layer operating on a computer system that is separate from, and in communication with, the mobile telephone, wherein the second secure access layer is included within a dynamic linked library comprising phone-specific functions used to access data on the mobile telephone, the first secure access layer is configured to communicate only with the dynamic linked library, and the dynamic linked library stores a first certificate of authenticity; in response to the authentication request, receive the first certificate from the second secure access layer; confirm, by the first secure access layer, using the first certificate, authenticity of the second secure access layer by determining the first secure access layer and the second secure access layer are matching, wherein the confirming includes comparing a second certificate of authenticity of the first secure access layer with the first certificate; and in response to confirming authenticity of the second secure access layer, grant, by the first secure access layer, authorization to the dynamic linked library to transmit data between the mobile telephone and the computer system. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A mobile telephone comprising:
-
a processor; and memory coupled to the processor and storing instructions that, when executed by the processor, cause the mobile telephone to; send, by a first secure access layer operating on the mobile telephone, an authentication request to a second secure access layer operating on a computer system that is separate from, and in communication with, the mobile telephone, wherein the second secure access layer is included within a dynamic linked library comprising phone-specific functions used to access data on the mobile telephone, the first secure access layer is configured to communicate only with the dynamic linked library, and the dynamic linked library stores a first certificate of authenticity; in response to the authentication request, receive the first certificate from the second secure access layer; confirm, by the first secure access layer, using the first certificate, authenticity of the second secure access layer by determining the first secure access layer and the second secure access layer are matching, wherein the confirming includes comparing a second certificate of authenticity of the first secure access layer with the first certificate; and in response to confirming authenticity of the second secure access layer, grant, by the first secure access layer, authorization to the dynamic linked library to transmit data between the mobile telephone and the computer system. - View Dependent Claims (12, 13, 14, 15)
-
Specification