The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 08, 2015

Filed:

Apr. 17, 2013
Applicant:

Google Technology Holdings Llc, Mountain View, CA (US);

Inventors:

Madjid Nakhjiri, San Diego, CA (US);

Tat Keung Chan, San Diego, CA (US);

Alexander Medvinsky, San Diego, CA (US);

Eric J. Sprunk, Carlsbad, CA (US);

Assignee:

GOOGLE TECHNOLOGY HOLDINGS LLC, Mountain View, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/32 (2006.01); H04L 29/06 (2006.01); H04L 9/30 (2006.01); H04W 8/20 (2009.01); H04L 9/08 (2006.01); H04W 12/04 (2009.01); H04W 12/02 (2009.01);
U.S. Cl.
CPC ...
H04L 63/0435 (2013.01); H04L 9/0822 (2013.01); H04L 9/0841 (2013.01); H04L 9/3066 (2013.01); H04W 8/205 (2013.01); H04W 12/04 (2013.01); H04L 63/0442 (2013.01); H04L 63/0478 (2013.01); H04L 2209/80 (2013.01); H04L 2463/061 (2013.01); H04W 12/02 (2013.01);
Abstract

A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.


Find Patent Forward Citations

Loading…