The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 15, 2017

Filed:

Jul. 21, 2015
Applicant:

Motorola Solutions, Inc., Schaumburg, IL (US);

Inventor:

Eilon Eyal, Galil Elyon, IL;

Assignee:

MOTOROLA SOLUTIONS, INC., Chicago, IL (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04M 1/66 (2006.01); H04W 12/08 (2009.01); H04L 12/26 (2006.01); H04L 29/08 (2006.01); H04W 4/00 (2009.01); H04W 8/18 (2009.01); H04W 12/06 (2009.01); H04L 29/06 (2006.01); H04W 12/12 (2009.01);
U.S. Cl.
CPC ...
H04W 12/08 (2013.01); H04L 43/10 (2013.01); H04L 63/1433 (2013.01); H04L 67/34 (2013.01); H04W 4/003 (2013.01); H04W 8/183 (2013.01); H04W 12/06 (2013.01); H04W 12/12 (2013.01);
Abstract

A method and system for securely monitoring an operating system of a mobile wireless communication device for unauthorized modifications. A secure application is provided on universal integrated circuit card of the mobile wireless communication device. The secure application is configured to control the wireless connectivity of the mobile wireless communication device, and communicate with a wireless communications network. A monitoring application is provided in a trusted sub-processor of the processor of the mobile wireless communication device. A secure communication link is established between the secure application and the monitoring application. A heartbeat token is generated by the trusted sub-processor, based on a modification status for the operating system and at least one system variable. The secure application receives the heartbeat token, and determines that an unauthorized software modification exists based on the heartbeat token. The secure application activates at least one countermeasure when an unauthorized software modification exists.


Find Patent Forward Citations

Loading…