Binding microprocessor to memory chips to prevent re-use of microprocessor
    11.
    发明申请
    Binding microprocessor to memory chips to prevent re-use of microprocessor 审中-公开
    将微处理器绑定到内存芯片,以防止微处理器重复使用

    公开(公告)号:US20140101368A1

    公开(公告)日:2014-04-10

    申请号:US13644816

    申请日:2012-10-04

    CPC classification number: G06F21/73 G06F21/44 G11C7/20

    Abstract: A processor is provided that binds itself to a circuit such that the processor cannot be subsequently reused in other circuits. On a first startup of the processor, a memory segment of an external volatile memory device is read to obtain information prior to initialization of the memory segment. An original/initial identifier may be generated from the information read from the memory segment. The original/initial identifier may then be stored in a non-volatile storage of the processor. On subsequent startups of the processor, it verifies that the processor is still coupled to the same external volatile memory device by using the stored identifier. For instance, on a subsequent startup, the processor again reads the same memory segment of the external memory device and generates a new identifier. If the identifier matches the previously stored identifier, then the processor may continue its operations; otherwise the processor is disabled/halted.

    Abstract translation: 提供了一种处理器,其将其自身绑定到电路,使得处理器不能随后在其他电路中重复使用。 在处理器的第一启动时,读取外部易失性存储器件的存储器段,以在存储器段的初始化之前获得信息。 可以从从存储器段读取的信息生成原始/初始标识符。 原始/初始标识符然后可以存储在处理器的非易失性存储器中。 在处理器的后续启动时,它通过使用存储的标识来验证处理器仍然耦合到相同的外部易失性存储器设备。 例如,在随后的启动中,处理器再次读取外部存储器件的相同存储器段并产生新的标识符。 如果标识符与先前存储的标识符匹配,则处理器可以继续其操作; 否则处理器被禁用/停止。

    SECURE RECEPTION REPORTING
    12.
    发明申请

    公开(公告)号:US20130267202A1

    公开(公告)日:2013-10-10

    申请号:US13791879

    申请日:2013-03-08

    Abstract: In a first configuration, a UE receives, from a service provider, a certificate authority list. The certificate authority list is at least one of integrity protected or encrypted based on a credential known by the UE and the service provider and stored on a smartcard in the UE. The UE authenticates a server using the received certificate authority list. In a second configuration, the UE receives a user service discovery/announcement including a reception report configuration and an address of a server. The UE sends a protected reception report to the server based on the reception report configuration. In a third configuration, the UE receives a protected broadcast announcement and communicates based on the broadcast announcement. The broadcast announcement is at least one of integrity protected or encrypted based on a credential known by the UE and stored on a smartcard in the UE.

    Providing Secure Communications Between Computing Devices

    公开(公告)号:US20210051473A1

    公开(公告)日:2021-02-18

    申请号:US16880897

    申请日:2020-05-21

    Abstract: Embodiments include devices and methods for providing secure communications between a first computing device and a second computing device are disclosed. A processor of the first computing device may determine in a first application software first security key establishment information. The processor may provide the first security key establishment information to a communication layer of the first computing device for transmission to the second computing device. The processor may receive, in the first application software from the communication layer of the first computing device, second security key establishment information received from the second computing device. The processor may determine a first security key by the first application software based at least in part on the second security key establishment information. The processor may provide the first security key to the communication layer for protecting messages from the first application software to the second computing device.

    WWAN-WLAN AGGREGATION SECURITY
    16.
    发明申请

    公开(公告)号:US20200236543A1

    公开(公告)日:2020-07-23

    申请号:US16843592

    申请日:2020-04-08

    Abstract: One feature pertains to a method for secure wireless communication at an apparatus of a network. The method includes receiving a user equipment identifier identifying a user equipment and a cryptographic key from a wireless wide area network node, and using the cryptographic key as a pairwise master key (PMK). A PMK identifier (PKMID) is generated based on the PMK and the two are stored at the network. A PMK security association is initialized by associating the PMK with at least the PMKID and an access point identifier identifying an access point of the apparatus. An association request is received that includes a PMKID from the user equipment, and it's determined that the PMKID received from the user equipment matches the PMKID stored. A key exchange is initiated with the user equipment based on the PMK to establish a wireless local area network security association with the user equipment.

    NETWORK ARCHITECTURE AND SECURITY WITH SIMPLIFIED MOBILITY PROCEDURE

    公开(公告)号:US20200220850A1

    公开(公告)日:2020-07-09

    申请号:US16825963

    申请日:2020-03-20

    Abstract: In an aspect, a network supporting a number of client devices includes a network device that generates a context for a client device. The client device context may include network state information for the client device that enables the network to communicate with the client device. The client device may obtain, from a network device that serves a first service area of the network, information that includes a first client device context. The client device may enter a second service area of the network served by a second network device. Instead of performing a service area update procedure with the network, the client device may transmit a packet in the different service area with the information that includes the client device context. The client device may receive a service relocation message including information associated with the different network device in response to the transmission.

    NETWORK ACCESS PRIVACY
    18.
    发明申请

    公开(公告)号:US20190394650A1

    公开(公告)日:2019-12-26

    申请号:US16563275

    申请日:2019-09-06

    Abstract: The present disclosure provides techniques that may be applied, for example, in a multi-slice network for maintaining privacy when attempting to access the network. An exemplary method generally includes transmitting a registration request message to a serving network to register with the serving network; receiving a first confirmation message indicating a secure connection with the serving network has been established; transmitting, after receiving the first confirmation message, a secure message to the serving network comprising an indication of at least one configured network slice that the UE wants to communicate over, wherein the at least one configured network slice is associated with a privacy flag that is set; and receiving a second confirmation message from the serving network indicating that the UE is permitted to communicate over the at least one configured network slice.

    NETWORK SECURITY ARCHITECTURE
    19.
    发明申请

    公开(公告)号:US20190306140A1

    公开(公告)日:2019-10-03

    申请号:US16445059

    申请日:2019-06-18

    Abstract: In an aspect, a network supporting client devices includes one or more network nodes implementing network functions. Such network functions enable a client device to apply a security context to communications with the network when the client device is not in a connected mode. The client device obtains a user plane key shared with a user plane network function implemented at a first network node and/or a control plane key shared with a control plane network function implemented at a second network node. The client device protects a data packet with the user plane key or a control packet with the control plane key. The data packet includes first destination information indicating the first network node and the control packet includes second destination information indicating the second network node. The client device transmits the data packet or control packet.

    METHOD AND APPARATUS FOR MULTIPLE REGISTRATIONS

    公开(公告)号:US20190223063A1

    公开(公告)日:2019-07-18

    申请号:US16246349

    申请日:2019-01-11

    Abstract: A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.

Patent Agency Ranking