METHOD OF OBFUSCATING A CODE
    1.
    发明申请
    METHOD OF OBFUSCATING A CODE 有权
    OBFUSCAING代码的方法

    公开(公告)号:US20170024331A1

    公开(公告)日:2017-01-26

    申请号:US15289164

    申请日:2016-10-08

    Applicant: NXP B.V.

    Abstract: A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation.

    Abstract translation: 提供了一种混淆代码的方法,其中所述方法包括对代码执行第一级混淆技术以产生第一混淆代码,以及对所述第一混淆代码执行第二级混淆技术。 特别地,代码可以是软件代码或软件模块。 此外,第一级混淆技术和第二混淆可以是不同的。 特别地,第二级混淆技术可以执行去混淆。

    ARCHITECTURE FOR PLATFORM SECURITY USING A DEDICATED SECURITY DEVICE FOR USER INTERACTION
    2.
    发明申请
    ARCHITECTURE FOR PLATFORM SECURITY USING A DEDICATED SECURITY DEVICE FOR USER INTERACTION 审中-公开
    使用用于交互的专用安全设备进行平台安全的架构

    公开(公告)号:US20150326558A1

    公开(公告)日:2015-11-12

    申请号:US14708107

    申请日:2015-05-08

    Applicant: NXP B.V.

    CPC classification number: H04L63/083 G06F21/74 G06F21/83 G06F21/85 H04L63/10

    Abstract: There is provided an architecture for a data processing platform using a dedicated security device for user interaction, the data processing platform (100, 200) comprising: a processing device (108); a security device (102) communicatively coupled (114) with the processing device (108), the security device (102) being adapted for receiving input data (116) and providing the input data (116) to the processing device (108) only if the input data (116) are associated with a predetermined security level range, e.g. if the processing device (108) is in a secure operating mode or if input data (116) are considered by the security device (102) to have a security level in the predetermined security level range.

    Abstract translation: 提供了一种使用专用安全设备进行用户交互的数据处理平台的架构,数据处理平台(100,200)包括:处理设备(108); 与所述处理设备(108)通信地耦合(114)的安全设备(102),所述安全设备(102)适于接收输入数据(116)并且仅将所述输入数据(116)提供给所述处理设备(108) 如果输入数据(116)与预定的安全级别范围相关联,例如, 如果处理设备(108)处于安全操作模式,或者如果安全设备(102)认为输入数据(116)具有在预定安全级别范围内的安全级别。

    SECURE SOFTWARE COMPNENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING
    3.
    发明申请
    SECURE SOFTWARE COMPNENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING 有权
    安全软件组件通过表交互进行反向工程

    公开(公告)号:US20150186627A1

    公开(公告)日:2015-07-02

    申请号:US14140938

    申请日:2013-12-26

    Applicant: NXP B.V.

    CPC classification number: G06F21/14 G06F2221/0748 H04L9/002 H04L2209/16

    Abstract: A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating a first function lookup table; encrypting the first function lookup table; sorting the first function lookup table by encrypted operand; generating a second function lookup table; encrypting the second function lookup table; sorting the second function lookup table by encrypted operand; generating a flattened lookup table from a combination of the encrypted first and second function lookup tables; permutating the flattened table indices e.g. by use of public key cryptography encryption; and sorting the flattened table by the permutated flattened table indices.

    Abstract translation: 一种在安全软件应用程序中安全地执行功能的方法,包括:由处理器确定由安全软件应用程序实现的两个功能; 生成第一个函数查找表; 加密第一个功能查找表; 通过加密操作数排序第一个函数查找表; 生成第二函数查找表; 加密第二函数查找表; 通过加密操作数排序第二个函数查找表; 从加密的第一和第二功能查找表的组合生成扁平化查找表; 排列平整的表格索引,例如 通过使用公钥密码加密; 并通过置换的平坦表索引对平坦化表进行排序。

    OPTIMIZED HARDWARE ARCHITECTURE AND METHOD FOR ECC POINT DOUBLING USING JACOBIAN COORDINATES OVER SHORT WEIERSTRASS CURVES
    5.
    发明申请
    OPTIMIZED HARDWARE ARCHITECTURE AND METHOD FOR ECC POINT DOUBLING USING JACOBIAN COORDINATES OVER SHORT WEIERSTRASS CURVES 有权
    优化的硬件结构和方法用于使用JACOBIAN坐标的ECC点重复使用短边曲线

    公开(公告)号:US20150178503A1

    公开(公告)日:2015-06-25

    申请号:US14139849

    申请日:2013-12-23

    Applicant: NXP B.V.

    CPC classification number: H04L9/3066 G06F7/725 G06F7/726

    Abstract: An optimized hardware architecture and method introducing a simple arithmetic processor that allows efficient implementation of an Elliptical Curve Cryptography point doubling algorithm for Jacobian coordinates. The optimized architecture additionally reduces the required storage for intermediate values to one intermediate value.

    Abstract translation: 一种优化的硬件架构和方法,引入简单的算术处理器,可以高效地实现雅可比坐标的椭圆曲线加密点加倍算法。 优化的架构还将中间值所需的存储空间减少到一个中间值。

    Apparatuses and methods with secure configuration update

    公开(公告)号:US12265626B2

    公开(公告)日:2025-04-01

    申请号:US17830197

    申请日:2022-06-01

    Applicant: NXP B.V.

    Abstract: One example securely updates an integrated circuit to mitigate undesirable modifications and this involves an application circuit accessing an external network while a (e.g., nonvolatile) program memory is write protected; and a reset-boot circuit resetting and booting the application circuit while access to the external network is disabled, and causing an update for the application circuit. In response to an indication that an update is downloaded for installation, the downloaded update is installed in the memory while access to the external network is disabled, and execution of the reset mode is permitted after the update is installed. Also, a retrieval module may download, in response to an indication that an update is not downloaded, an update provided via the external network while the memory is write-protected and thereby permitting execution of the reset mode after the update is downloaded.

    APPARATUSES AND METHODS WITH SECURE CONFIGURATION UPDATE

    公开(公告)号:US20230395110A1

    公开(公告)日:2023-12-07

    申请号:US17830197

    申请日:2022-06-01

    Applicant: NXP B.V.

    CPC classification number: G11C7/24 G11C7/1096 G11C7/20 G06F21/572

    Abstract: One example securely updates an integrated circuit to mitigate undesirable modifications and this involves an application circuit accessing an external network while a (e.g., nonvolatile) program memory is write protected; and a reset-boot circuit resetting and booting the application circuit while access to the external network is disabled, and causing an update for the application circuit. In response to an indication that an update is downloaded for installation, the downloaded update is installed in the memory while access to the external network is disabled, and execution of the reset mode is permitted after the update is installed. Also, a retrieval module may download, in response to an indication that an update is not downloaded, an update provided via the external network while the memory is write-protected and thereby permitting execution of the reset mode after the update is downloaded.

    DEVICE, INTEGRATED CIRCUIT AND METHODS THEREFOR

    公开(公告)号:US20210133362A1

    公开(公告)日:2021-05-06

    申请号:US17081589

    申请日:2020-10-27

    Applicant: NXP B.V.

    Abstract: A device and methods are described that comprise at least one host application and a rich execution environment. At least one interface is operably coupled to the REE for communicating with a remote server. A security sub-system comprises a security monitoring and control circuit coupled to the REE and connectable to the remote server via the REE and the at least one interface. The security monitoring and control circuit comprises an analytics circuit configured to detect an anomaly following a compromisation of the device. The security monitoring and control circuit is arranged to treat the REE as an untrusted component and in response to a detection of a compromisation of the REE or a component in the device that is accessible by the REE by the analytics circuit, the security monitoring and control circuit is configured to re-establish a secure connection to the remote server that tunnels through the REE and at least partially removes the compromisation from the device.

Patent Agency Ranking