-
公开(公告)号:US12261835B2
公开(公告)日:2025-03-25
申请号:US18408969
申请日:2024-01-10
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20210152546A1
公开(公告)日:2021-05-20
申请号:US17159016
申请日:2021-01-26
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US11909730B2
公开(公告)日:2024-02-20
申请号:US17963411
申请日:2022-10-11
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/0884
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US10938803B2
公开(公告)日:2021-03-02
申请号:US16252262
申请日:2019-01-18
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20250168159A1
公开(公告)日:2025-05-22
申请号:US19028935
申请日:2025-01-17
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20230032116A1
公开(公告)日:2023-02-02
申请号:US17963411
申请日:2022-10-11
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US11470077B2
公开(公告)日:2022-10-11
申请号:US17159016
申请日:2021-01-26
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20240146717A1
公开(公告)日:2024-05-02
申请号:US18408969
申请日:2024-01-10
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/0884
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20190245844A1
公开(公告)日:2019-08-08
申请号:US16252262
申请日:2019-01-18
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/0884
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US10187376B2
公开(公告)日:2019-01-22
申请号:US15222524
申请日:2016-07-28
Applicant: Texas Instruments Incorporated
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
-
-
-
-
-
-
-
-