×

Provisioning techniques

  • US 9,525,548 B2
  • Filed: 10/21/2010
  • Issued: 12/20/2016
  • Est. Priority Date: 10/21/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by a provisioning service, the method comprising:

  • locating a particular public key of a plurality of public keys that are stored by the provisioning service, the particular public key corresponding to a particular mobile communication device and located using a particular identifier of the particular mobile communication device that is included in a request received via a network, wherein the particular identifier identifies a secure element of the particular mobile communication device that stores a particular private key corresponding to the particular public key;

    communicating the particular public key of the particular mobile communication device via the network to a service provider; and

    supporting protected communications between the service provider and the particular mobile communication device using the provisioning service as an intermediary,wherein the particular public key is configured to encrypt the protected communications,wherein the secure element of the particular mobile computing device is implemented using hardware and is configured to decrypt the protected communications using the particular private key,wherein the particular private key is not exposed outside of the hardware that implements the secure element, andwherein the provisioning service is verified as being prevented from decrypting the protected communications.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×