Encrypted SMS Wipe
- SECURECRYPT

- Mar 26
- 3 min read

Overview
Encrypted SMS Wipe uses standard SMS transport to deliver an authenticated command to a target device. This allows our Authorized Distributors the ability to manage their client's devices using a secure Control Number. Once sent, the message contains a cryptographically generated payload—structured as a long, non-human-readable string—that is validated locally on the device. Upon successful verification, the device initiates a secure wipe sequence automatically.
The feature is compatible with:
Devices using traditional SIM cards
Devices configured with data-only SIMs or eSIMs that retain SMS capability at the carrier level
System Workflow
1. Payload Generation
A wipe command is generated using pre-shared cryptographic material. The payload may include elements such as:
Encrypted command data
Locked to the Control Number exclusively, if sent from any other number, commands will be ignored
The result is a compact encrypted string suitable for SMS delivery.
2. Transmission Layer
The payload is transmitted as a standard SMS message through the cellular network. This does not require an active data session and operates over signaling channels available to the device.
3. Message Monitoring
On the target device, a background service monitors incoming SMS messages at the system level. Messages are parsed and evaluated against expected cryptographic structures.
4. Verification and Execution
When a message matches the required format, the payload is decrypted and authenticated locally. If validation succeeds, the device immediately initiates the wipe process according to SECURECRYPT’s secure deletion protocols.
Offline and Power-State Handling
Encrypted SMS Wipe accounts for device availability and delivery timing at the network layer:
No Active Signal: SMS messages are retained by the carrier and delivered once the device reconnects to the network.
Device Powered Off: Messages are delivered upon power restoration. During device initialization, the system processes queued messages, allowing the wipe command to execute before standard device interaction resumes.
This behavior ensures that command delivery and execution remain consistent across varying device states.
Security Characteristics
Cryptographic Authentication: All commands are verified using pre-established keys, ensuring that only authorized payloads can trigger execution.
Local Validation: The device performs all verification steps internally without requiring external communication.
Replay Resistance: Payload structures can include unique identifiers or timing constraints to prevent reuse.
Automated Execution: The wipe process is initiated without user interaction once a payload is validated.
Integration with Remote Wipe
Encrypted SMS Wipe operates alongside SECURECRYPT’s Remote Wipe capability. Each method provides a distinct command delivery path:
Remote Wipe: Executes via network-based communication channels
Encrypted SMS Wipe: Executes via SMS-based delivery
This allows administrators to issue wipe commands through multiple pathways depending on operational requirements.
Deployment Context
Encrypted SMS Wipe is applicable in environments where:
Devices may transition between connected and disconnected states
SMS delivery remains available
Redundant command delivery mechanisms are required
Summary
Encrypted SMS Wipe provides a secure, SMS-based mechanism for initiating device data destruction using authenticated encrypted payloads. By combining carrier-level message delivery with on-device cryptographic validation, it ensures that wipe commands can be received and executed across a wide range of device conditions and configurations, including those using data-only SIMs or eSIMs.


