Secure garbage collection on a mobile device
First Claim
Patent Images
1. A method for performing secure garbage collection involving unreferenced data objects on a computing device, the method comprising:
- receiving information over a network;
creating a first data object corresponding to the received information;
storing the first data object in an addressable storage memory on the computing device;
extracting a second data object from the first data object, wherein the second data object is accessible using a third data object;
unreferencing the third data object;
in response to determining that the third data object has become unreferenced, calling a wipe function to overwrite the addressable storage memory of the computing device where the first, second, and third data objects are stored; and
reclaiming the addressable storage memory where the first, second, and third data objects were stored.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
57 Citations
20 Claims
-
1. A method for performing secure garbage collection involving unreferenced data objects on a computing device, the method comprising:
-
receiving information over a network; creating a first data object corresponding to the received information; storing the first data object in an addressable storage memory on the computing device; extracting a second data object from the first data object, wherein the second data object is accessible using a third data object; unreferencing the third data object; in response to determining that the third data object has become unreferenced, calling a wipe function to overwrite the addressable storage memory of the computing device where the first, second, and third data objects are stored; and reclaiming the addressable storage memory where the first, second, and third data objects were stored. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more nontransitory computer readable media storing computer executable instructions that, when executed by a processor, cause a computing device to perform secure garbage collection involving unreferenced data objects on the computing device by:
-
receiving information over a network; creating a first data object corresponding to the received information; storing the first data object in an addressable storage memory on the computing device; extracting a second data object from the first data object, wherein the second data object is accessible using a third data object; unreferencing the third data object; in response to determining that the third data object has become unreferenced, calling a wipe function to overwrite the addressable storage memory of the computing device where the first, second, and third data objects are stored; and reclaiming the addressable storage memory where the first, second, and third data objects were stored. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A mobile device, comprising:
-
a processor; and memory storing computer readable instructions that, when executed by the processor, cause the mobile device to perform secure garbage collection by; receiving, wirelessly, information over a network; creating a first data object corresponding to the received information; storing the first data object in an addressable storage memory on the mobile device; extracting a second data object from the first data object, wherein the second data object is accessible using a third data object; unreferencing the third data object; in response to determining that the third data object has become unreferenced, calling a wipe function to overwrite the addressable storage memory of the mobile device where the first, second, and third data objects are stored; and reclaiming the addressable storage memory where the first, second, and third data objects were stored. - View Dependent Claims (17, 18, 19, 20)
-
Specification