×

Method and apparatus for secured access

  • US 8,204,480 B1
  • Filed: 10/01/2010
  • Issued: 06/19/2012
  • Est. Priority Date: 10/01/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for validating integrity of a mobile communication device, the method comprising:

  • provisioning the mobile communication device, wherein the provisioning comprises deleting existing software from the mobile communication device and installing trusted software on the mobile communication device;

    installing an integrity verification application on the mobile communication device, wherein the integrity verification application comprises a list of expected signatures for data on the mobile communication device;

    running the integrity verification application to validate the data based on the expected signatures;

    establishing a first pass phrase and a second pass phrase, wherein the establishing comprises;

    receiving a first instance of the first pass phrase;

    performing a first hash function calculation on non-volatile memory of the mobile communication device using the first instance of the first pass phrase as a seed value to provide a first hash result;

    receiving the second pass phrase;

    splitting a parameter of the second pass phrase against the first hash result to provide a split of the second pass phrase; and

    storing the split of the second pass phrase in the non-volatile memory of the mobile communication device;

    thereafter, receiving a second instance of the first pass phrase as a challenge for verification, and in response to receiving the second instance of the first pass phrase;

    performing a second hash function calculation on the non-volatile memory of the mobile communication device using the second instance of the first pass phrase as a seed value to provide a second hash result, the second hash function calculation being different from the first hash function calculation;

    determining the second pass phrase based on the split of the second pass phrase and the second hash value; and

    displaying the second pass phrase as an indication of the integrity.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×