×

System and method for managing secure information within a hybrid portable computing device

  • US 8,700,908 B2
  • Filed: 08/24/2010
  • Issued: 04/15/2014
  • Est. Priority Date: 08/24/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing secure information within a portable computing device by selective establishment of a secure communication channel within the portable computing device, the method comprising:

  • initializing a program module of a central processing unit of the portable computing device for communicating with a secure element of the portable computing device;

    receiving a password at the central processing unit of the portable computing device for gaining access to the secure element of the portable computing device;

    initializing a password based encryption algorithm with the password, wherein;

    if the password is correct, initializing the password based encryption algorithm with the password generates a correct series of cryptographic keys; and

    if the password is incorrect, initializing the password based encryption algorithm with the password generates an incorrect series of cryptographic keys;

    exchanging messages between the central processing unit of the portable computing device and the secure element of the portable computing device using the generated series of cryptographic keys to request that a secure communication channel be established between the secure element of the portable computing device and the central processing unit of the portable computing device, wherein;

    if the generated series of cryptographic keys is correct, the secure communication channel is established; and

    if the generated series of cryptographic keys is incorrect, the request to establish the secure communication channel is denied;

    if the generated series of cryptographic keys is incorrect, then determining if a predetermined threshold number of requests to establish a secure communication channel has been achieved; and

    authenticating the portable computing device to a server located remotely from the portable computing device with a first substantial encryption key for server authentication, wherein the first substantial encryption key comprises an asymmetric key having a bit length of greater than or equal to 1024 bits.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×