Mobile communications device providing secure element data management features and related methods
First Claim
Patent Images
1. A mobile communications device comprising:
- a near field communications (NFC) device;
an input device configured to generate a memory wipe command;
a memory; and
a memory controller coupled with the NFC device, the input device, and the memory, the memory controller being configured to;
provide a plurality of sequence count values,receive secure data from a provisioning server to the memory,receive wiping instruction data from the provisioning server to the memory for wiping the secure data from the memory, the wiping instruction data including a plurality of wiping instruction scripts each having a different sequence count value associated therewith, andwipe the secure data from the memory without an over-the-air (OTA) connection to the provisioning server, based upon the memory wipe command and the received wiping instruction data, in response to receiving the memory wipe command from the input device.
4 Assignments
0 Petitions
Accused Products
Abstract
A mobile communications device may include a near field communications (NFC) device, an input device configured to generate a memory wipe command, a memory, and a memory controller coupled with the NFC device, the input device, and the memory. The memory controller may be capable of receiving secure data from a provisioning server to the memory, receiving wiping instruction data from the provisioning server to the memory for wiping the secure data from the memory, and wiping the secure data from the memory based upon the memory wipe command and the received wiping instruction data.
13 Citations
27 Claims
-
1. A mobile communications device comprising:
-
a near field communications (NFC) device; an input device configured to generate a memory wipe command; a memory; and a memory controller coupled with the NFC device, the input device, and the memory, the memory controller being configured to; provide a plurality of sequence count values, receive secure data from a provisioning server to the memory, receive wiping instruction data from the provisioning server to the memory for wiping the secure data from the memory, the wiping instruction data including a plurality of wiping instruction scripts each having a different sequence count value associated therewith, and wipe the secure data from the memory without an over-the-air (OTA) connection to the provisioning server, based upon the memory wipe command and the received wiping instruction data, in response to receiving the memory wipe command from the input device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A communications method for a mobile wireless communications device comprising a memory, a near field communications (NFC) device, and an input device configured to generate a memory wipe command, the method comprising:
-
providing a plurality of sequence count values; receiving secure data from a provisioning server to the memory; receiving wiping instruction data from the provisioning server to the memory for wiping the secure data from the memory, the wiping instruction data including a plurality of wiping instruction scripts each having a different sequence count value associated therewith; responsive to receiving the memory wipe command from the input device, wiping the secure data from the memory without an over-the-air (OTA) connection to the provisioning server, based upon the memory wipe command and the received wiping instruction data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium for a mobile communications device comprising a memory, a near field communications (NFC) device, and an input device configured to generate a memory wipe command, the non-transitory computer-readable medium having computer-executable instructions for causing the mobile communications device to perform steps comprising:
-
providing a plurality of sequence count values; receiving secure data from a provisioning server to the memory; receiving wiping instruction data from the provisioning server to the memory for wiping the secure data from the memory, the wiping instruction data including a plurality of wiping instruction scripts each having a different sequence count value associated therewith; and responsive to receiving the memory wipe command from the input device, wiping the secure data from the memory without an over-the-air (OTA) connection to the provisioning server, based upon the memory wipe command and the received wiping instruction data. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification