US 11,748,470 B2
Tamper-evident devices equipped with secure re-image file(s)
Vijaya L. Vemireddy, Plano, TX (US); Brandon Sloane, Charlotte, NC (US); Harvey Summers, Richmond, VA (US); and Eileen D. Bridges, Fort Mill, SC (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Apr. 7, 2022, as Appl. No. 17/715,191.
Application 17/715,191 is a continuation of application No. 16/928,843, filed on Jul. 14, 2020, granted, now 11,334,662.
Prior Publication US 2022/0229898 A1, Jul. 21, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/50 (2013.01); G06F 21/32 (2013.01); G06F 21/70 (2013.01); G06F 21/60 (2013.01); G06F 1/14 (2006.01); G06F 21/31 (2013.01)
CPC G06F 21/50 (2013.01) [G06F 1/14 (2013.01); G06F 21/31 (2013.01); G06F 21/32 (2013.01); G06F 21/606 (2013.01); G06F 21/70 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A mobile device comprising enhanced travel security features, the mobile device comprising:
a memory;
a settable time clock, said time clock that operates to store a start device confiscation time in the memory and to store an end device confiscation time in the memory;
at least one monitor device, said monitor device for detecting tampering with the mobile device, the tampering occurring between the start device confiscation time and the end device confiscation time, said tampering that creates mobile device breach condition;
an executable re-image file for re-imaging, upon a command from the mobile device, a software image of the mobile device, said re-image file stored in the memory prior to the start device confiscation time;
a secure input/output (i/o) pathway through the memory to the re-image file, the secure i/o pathway passes through the memory, is not secure at an i/o point to the memory, but is secure at an i/o point to the re-image file;
wherein, after the end device confiscation time and in response to the detecting of said tampering, the mobile device prompts the user for a secure identifier;
wherein, upon receipt of said secure identifier, said mobile device opens the secure i/o pathway and executes said re-image file; and
wherein the secure i/o pathway is traversable only in response to an input to the mobile device of a user biometric parameter.