MY144566A - Remote destroy mechanism using trusted platform module - Google Patents

Remote destroy mechanism using trusted platform module

Info

Publication number
MY144566A
MY144566A MYPI20092653A MYPI20092653A MY144566A MY 144566 A MY144566 A MY 144566A MY PI20092653 A MYPI20092653 A MY PI20092653A MY PI20092653 A MYPI20092653 A MY PI20092653A MY 144566 A MY144566 A MY 144566A
Authority
MY
Malaysia
Prior art keywords
tpm
platform module
trusted platform
processors
remote
Prior art date
Application number
MYPI20092653A
Inventor
Mohd Azuddin Bin Parman
Jamalul-Lail Ab Manan
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI20092653A priority Critical patent/MY144566A/en
Priority to PCT/MY2010/000100 priority patent/WO2010151102A1/en
Publication of MY144566A publication Critical patent/MY144566A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

A METHOD (100) AND AN APPARATUS (200) FOR PROTECTING AND ENSURING DATA SECURITY BY DESTROYING AND DISABLING FUNCTIONALITY OF A MOBILE DEVICE THROUGH A TRUSTED PLATFORM MODULE (TPM), THE APPARATUS COMPRISING AT LEAST ONE OR MORE PROCESSORS (102), A MEMORY IN COMMUNICATION WITH AT LEAST ONE OF THE PROCESSORS (104) AND A TRUSTED PLATFORM MODULE (TPM) IN COMMUNICATION WITH AT LEAST ONE OF THE PROCESSORS (106). THE AT LEAST ONE OR MORE PROCESSORS IN COMMUNICATION WITH THE MEMORY AND THE TPM HAVING MEANS FOR INITIALIZING THE TPM VIA A TPM COMMAND (202), DETECTING A STATUS OF THE TPM WHEREIN THE STATUS OF THE TPM IS A NON-ACTIVATED TPM, AN ACTIVATED TPM OR A TAMPERED TPM (204), EXTRACTING A KEY INFORMATION OF THE TPM (206), PROCESSING AN APPLICATION FOR THE MOBILE DEVICE USING THE EXTRACTED KEY INFORMATION OF THE ACTIVATED TPM (208), RECEIVING A DESTROY COMMAND AND THE KEY INFORMATION OF THE TPM (210) AND DISABLING FUNCTIONALITY OF THE MOBILE DEVICE (212).
MYPI20092653A 2009-06-23 2009-06-23 Remote destroy mechanism using trusted platform module MY144566A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI20092653A MY144566A (en) 2009-06-23 2009-06-23 Remote destroy mechanism using trusted platform module
PCT/MY2010/000100 WO2010151102A1 (en) 2009-06-23 2010-06-15 Remote destroy mechanism using trusted platform module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI20092653A MY144566A (en) 2009-06-23 2009-06-23 Remote destroy mechanism using trusted platform module

Publications (1)

Publication Number Publication Date
MY144566A true MY144566A (en) 2011-10-06

Family

ID=43386722

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI20092653A MY144566A (en) 2009-06-23 2009-06-23 Remote destroy mechanism using trusted platform module

Country Status (2)

Country Link
MY (1) MY144566A (en)
WO (1) WO2010151102A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681118A (en) * 2014-11-17 2016-06-15 中兴通讯股份有限公司 Communication device and anti-theft method for communication device
US10716168B2 (en) * 2015-12-09 2020-07-14 Hewlett-Packard Development Company, L.P. Data transmissions without connections
DE102016224256A1 (en) * 2016-12-06 2018-06-07 Bayerische Motoren Werke Aktiengesellschaft Telephony control device, means of locomotion and method for operating a mobile radio module for a means of transportation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7965702B2 (en) * 2005-12-30 2011-06-21 Intel Corporation Reliable reporting of location data
CN103124261B (en) * 2006-05-09 2016-08-03 交互数字技术公司 Wireless Telecom Equipment and the Subscriber Identity Module of extension used in WTRU
US7900058B2 (en) * 2006-08-31 2011-03-01 Intel Corporation Methods and arrangements for remote communications with a trusted platform module
CN101589596B (en) * 2007-01-26 2013-02-27 交互数字技术公司 Method and apparatus for securing location information and access control using the location information

Also Published As

Publication number Publication date
WO2010151102A1 (en) 2010-12-29

Similar Documents

Publication Publication Date Title
US20140165206A1 (en) Security parameter zeroization
GB2443984B (en) Methods and apparatus for the secure handling of data in a microcontroller
GB0711878D0 (en) Method and apparatus for data protection for mobile devices
WO2013142417A3 (en) Enhancing security of sensor data for a system via an embedded controller
TW200731074A (en) Hardware-assisted device configuration detection
EP2348440A3 (en) Collaborative malware detection and prevention on mobile devices
GB2430525A (en) Electronic lock system and method for providing access thereto
AU2011355202B2 (en) Device and method for protecting a security module from manipulation attempts in a field device
WO2009075589A3 (en) Methods and apparatus relating to a security system
WO2005074397A3 (en) Computer security apparatus and method using security input device driver
BRPI0701791A (en) automated method, information processing system, computer readable medium
WO2008060920A3 (en) Over-the-air device kill pill and lock
SE0602754L (en) Access control system, lock device, management device and associated methods and computer software products
WO2007147495A3 (en) Method and system for intrusion detection
WO2008042871A3 (en) Methods and apparatus for securely signing on to a website via a security website
WO2007148314A3 (en) Secure domain information protection apparatus and methods
WO2007000702A3 (en) Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis
WO2008067173A3 (en) Security system and related devices and methods
AR075283A1 (en) SYSTEM AND DEVICE METHOD TO PROVIDE A RELIABLE PLATFORM MODULE (TPM)
WO2008092167A3 (en) Protecting secrets in an untrusted recipient
BRPI0608054A2 (en) data processing device, data processing system and data processing method performed on a data processing device
WO2009129195A3 (en) Secure debug interface and memory of a media security circuit and method
MY144566A (en) Remote destroy mechanism using trusted platform module
TW200708985A (en) Security message authentication control instruction
WO2007038247A3 (en) Embedded patch management