US 12,169,587 B2
Systems and methods for data security on a mobile device
James Hoelsworth, Philadelphia, PA (US); Christopher Zarcone, Marlton, NJ (US); Sai Sreenath Adabala, Wayne, PA (US); Thomas Kilgallon, Coatesville, PA (US); Anvesh Paidipala, Norristown, PA (US); Herbert Marti, Townsend, DE (US); and Hugo Allexis Cardona Escalante, Philadelphia, PA (US)
Assigned to Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed by Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed on Apr. 6, 2021, as Appl. No. 17/301,534.
Prior Publication US 2022/0318438 A1, Oct. 6, 2022
Int. Cl. G06F 21/78 (2013.01); G06F 16/14 (2019.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01); H04W 12/30 (2021.01)
CPC G06F 21/78 (2013.01) [G06F 16/148 (2019.01); G06F 21/602 (2013.01); H04L 9/0894 (2013.01); H04W 12/30 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a mobile device and from a first mobile application executing on the mobile device, a first request to store data in a memory on the mobile device, wherein the first request comprises the data and a group identifier associated with a group of mobile applications executing on the mobile device, wherein the first mobile application is one of the group of mobile applications;
determining a symmetric key associated with the group identifier;
encrypting, using the symmetric key, the data;
receiving, from a second mobile application executing on the mobile device, a second request to access the data received from the first mobile application in the first request, wherein the second request from the second mobile application comprises the group identifier;
decrypting, by the mobile device and based at least in part on a determination that the second request to access the data comprises the group identifier, and using the symmetric key, the encrypted data; and
granting the second mobile application access to the decrypted data.