Apparatus and method for securely managing the accessibility to content and applications
First Claim
1. A communication device, comprising:
- a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising storing secret information and non-secret information in the secure element memory;
a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising;
providing a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via a server;
receiving the first verification which is generated by the secure element based on the secret information without the secure element providing the secret information to the secure device processor, wherein the secure device processor does not have access to the secret information;
receiving the non-secret information from the secure element; and
generating a second verification for the access to the content based on the non-secret information; and
a device processor that is separate from the secure element and the secure device processor, wherein the device processor facilitates wireless communications between the communication device and the server, and wherein the content is accessed from the server by the device processor based on the first and second verifications;
wherein the second operations further comprise;
generating consumption information by monitoring the access to the content;
providing the consumption information associated with the access to the content to the secure element, the consumption information indicating that the content has been presented by the communication device;
receiving access instructions from the secure element responsive to the consumption information; and
preventing the communication device from accessing the content according to the access instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed.
156 Citations
20 Claims
-
1. A communication device, comprising:
-
a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising storing secret information and non-secret information in the secure element memory; a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising; providing a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via a server; receiving the first verification which is generated by the secure element based on the secret information without the secure element providing the secret information to the secure device processor, wherein the secure device processor does not have access to the secret information; receiving the non-secret information from the secure element; and generating a second verification for the access to the content based on the non-secret information; and a device processor that is separate from the secure element and the secure device processor, wherein the device processor facilitates wireless communications between the communication device and the server, and wherein the content is accessed from the server by the device processor based on the first and second verifications; wherein the second operations further comprise; generating consumption information by monitoring the access to the content; providing the consumption information associated with the access to the content to the secure element, the consumption information indicating that the content has been presented by the communication device; receiving access instructions from the secure element responsive to the consumption information; and preventing the communication device from accessing the content according to the access instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
storing, by a secure element of a communication device, secret information and non-secret information in a secure element memory of the secure element; providing, by a secure device processor of the communication device, a request for a first verification to the secure element, wherein the secure device processor is separate from the secure element and is in communication with the secure element, and wherein the first verification is associated with access to an application that is sourced via a secure download application function; receiving, by the secure device processor, the first verification which is generated by the secure element based on the secret information without the secure element providing the secret information to the secure device processor, wherein the secure device processor does not have access to the secret information; receiving, by the secure device processor, the non-secret information from the secure element; generating, by the secure device processor, a second verification for the access to the application based on the non-secret information, wherein the application is accessed by the communication device responsive to the first and second verifications; generating, by the secure device processor, consumption information by monitoring the access to the application; providing, by the secure device processor, the consumption information associated with the access to the application to the secure download application function, the consumption information indicating that the application has been executed by the communication device; receiving, by the secure device processor, access instructions from the secure download application function responsive to the consumption information; and preventing, by the secure device processor, the communication device from accessing the application according to the access instructions; wherein a device processor of the communication device facilitates wireless communications for the communication device, wherein the device processor is separate from the secure element and the secure device processor, wherein the secure element has a highest level of security relative to the secure device processor and the device processor, wherein the device processor has a lowest level of security relative to the secure element and the secure device processor, and wherein the secure device processor has an intermediate level of security relative to the secure element and the device processor. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving, by a communication device comprising a secure element having a secure element memory and a secure device processor having a secure device processor memory, secret information and non-secret information from a secure download application function, wherein the secure download application function is remote from the communication device, wherein the secure device processor is separate from the secure element and wherein the communication device includes a device processor that is separate from the secure element and the secure device processor; storing, by the communication device, the secret information and the non-secret information in the secure element memory; providing, within the communication device, a request for a first verification to the secure element, the first verification being associated with access to content that is sourced via the secure download application function; generating, within the communication device, the first verification by the secure element based on the secret information without the secure element providing the secret information to the secure device processor, wherein the secure device processor does not have access to the secret information; obtaining, within the communication device, the non-secret information from the secure element; generating, within the communication device, a second verification for the access to the content based on the non-secret information; generating, within the communication device, consumption information by monitoring the access to the content; providing, by the communication device, the consumption information associated with the access to the content to the secure download application function, the consumption information indicating that the content has been presented by the communication device; receiving by the communication device, responsive to the consumption information, access instructions from the secure download application function; and preventing within the communication device access to the content according to the access instructions. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification