Data access and ownership management

    公开(公告)号:US10122718B2

    公开(公告)日:2018-11-06

    申请号:US14832428

    申请日:2015-08-21

    IPC分类号: H04W12/02 H04L29/06 H04L29/08

    摘要: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    Data access and ownership management

    公开(公告)号:US10735428B2

    公开(公告)日:2020-08-04

    申请号:US16149796

    申请日:2018-10-02

    IPC分类号: H04L29/06 H04W12/02 H04L29/08

    摘要: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    DATA ACCESS AND OWNERSHIP MANAGEMENT
    5.
    发明申请

    公开(公告)号:US20190036928A1

    公开(公告)日:2019-01-31

    申请号:US16149796

    申请日:2018-10-02

    IPC分类号: H04L29/06 H04L29/08 H04W12/02

    摘要: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    Method of establishing trust between a device and an apparatus

    公开(公告)号:US10911245B2

    公开(公告)日:2021-02-02

    申请号:US15549505

    申请日:2016-01-25

    摘要: There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted by the verification apparatus and/or device data relating to the agent device; transmitting, from the agent device to the verification apparatus, the trust credential; obtaining, at the verification apparatus, the trust credential; analysing, at the verification apparatus, the trust credential; determining, at the verification apparatus, whether the agent device is trusted based on the analysis; and responsive to determining the agent device is trusted, establishing trust between the agent device and the verification apparatus.

    DATA ACCESS AND OWNERSHIP MANAGEMENT
    7.
    发明申请
    DATA ACCESS AND OWNERSHIP MANAGEMENT 审中-公开
    数据访问和所有权管理

    公开(公告)号:US20170054721A1

    公开(公告)日:2017-02-23

    申请号:US14832428

    申请日:2015-08-21

    IPC分类号: H04L29/06 H04L29/08

    摘要: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    摘要翻译: 在一个示例中,方法包括由数据处理设备获得与第一用户相关联并对应于远程资源的第一位置的第一秘密数据。 该方法还包括使用第一秘密数据生成可用于获得第一位置的第一统一资源定位符(URL),以及使用第一URL访问第一位置。 该方法还包括响应于数据处理设备从第一用户到第二用户的使用权限的传送而获得与第二用户相关联并对应于远程资源的第二位置的第二秘密数据。 该方法还包括使用第二秘密数据生成可用于获得第二位置的第二URL,以及使用第二URL访问第二位置。 第二个位置无法通过第一个URL访问。 第一个位置无法通过第二个URL访问。

    Secure configuration data storage

    公开(公告)号:US11366904B2

    公开(公告)日:2022-06-21

    申请号:US15748788

    申请日:2016-08-01

    申请人: ARM IP LIMITED

    摘要: A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.

    Ephemeral Broadcast Key Agreement

    公开(公告)号:US20210203489A1

    公开(公告)日:2021-07-01

    申请号:US17057373

    申请日:2019-05-01

    申请人: Arm IP Limited

    IPC分类号: H04L9/08

    摘要: A method for securely distributing content from a distributor to a plurality of receiving devices, each recipient creating recipient trusted ephemeral public private key pair and making the recipient trusted ephemeral public key available, the method comprising: generating a content encryption key for encrypting content to be distributed and encrypting content using the content encryption key; generating, for each recipient trusted ephemeral public key, a shared secret using the recipient trusted ephemeral public key and the distributor ephemeral private key; generating a plurality of encrypted per-recipient key slots, each encrypted per-recipient key slot generated by encrypting the content encryption key using a different shared secret of the plurality of shared secrets; creating a data structure comprising the distributor ephemeral public key, the encrypted content, and one or more encrypted per-recipient key slots; and transmitting the data structure to deliver the content to recipients associated with the device public keys from which the one or more encrypted per-recipient key slots are derived.

    Device obfuscation in electronic networks

    公开(公告)号:US10924934B2

    公开(公告)日:2021-02-16

    申请号:US16191024

    申请日:2018-11-14

    申请人: Arm IP Limited

    IPC分类号: H04W12/12 H04L29/06 G06F21/57

    摘要: A method, electronic apparatus and computer program for device obfuscation in electronic networks, comprising determining at least one device type of at least one physical device operable to be at least intermittently attached to a wireless network; generating a pattern of wireless network activity associated with the at least one device type; exposing over the wireless network a plurality of non-functional messages conforming to the pattern; and operating a purported sender and receiver of each of the plurality of messages to obscure at least one of an exploitable characteristic and an exploitable state of the at least one device type with respect to the wireless network.