BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM
    11.
    发明申请
    BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM 有权
    绑定移动设备安全软件组件到SIM卡

    公开(公告)号:US20160134629A1

    公开(公告)日:2016-05-12

    申请号:US14995924

    申请日:2016-01-14

    Applicant: NXP B.V.

    Abstract: Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a subscriber identity module (SIM) card, including transmitting, by the processor, an authentication challenge to the SIM card; receiving an authentication response from the SIM card; verifying the authentication response from the SIM card; and enabling the secure software application when the authentication response from the SIM card is verified.

    Abstract translation: 各种实施例包括用于将安全软件应用程序绑定到移动设备的方法,其中移动设备包括处理器和订户身份模块(SIM)卡,包括由处理器向SIM卡发送认证挑战; 从SIM卡接收认证响应; 验证来自SIM卡的认证响应; 并且当验证来自SIM卡的认证响应时,启用安全软件应用。

    RESTRICTING SOFTWARE TO AUTHORIZED WIRELESS ENVIRONMENTS
    13.
    发明申请
    RESTRICTING SOFTWARE TO AUTHORIZED WIRELESS ENVIRONMENTS 有权
    限制软件授权无线环境

    公开(公告)号:US20150172917A1

    公开(公告)日:2015-06-18

    申请号:US14105526

    申请日:2013-12-13

    Applicant: NXP B.V.

    Abstract: An apparatus for restricting execution of software is disclosed. The apparatus includes a telecommunication device configured to communicate with a wireless device (e.g., an RFID device) using a first wireless communication protocol. The telecommunication device is configured to determine whether or not the telecommunication device is located in an authorized wireless environment, based on wireless devices detected by the telecommunication device. The telecommunication device is also configured to execute a program in response to determining that it is located in an authorized wireless environment. Conversely, the telecommunication device is also configured to inhibit execution of the program in response to determining that it is not located in an authorized wireless environment.

    Abstract translation: 公开了一种用于限制软件执行的装置。 该装置包括被配置为使用第一无线通信协议与无线设备(例如,RFID设备)进行通信的电信设备。 电信设备被配置为基于由电信设备检测到的无线设备来确定电信设备是否位于授权的无线环境中。 电信设备还被配置为响应于确定其位于授权的无线环境中来执行程序。 相反,电信设备还被配置为响应于确定其不位于授权无线环境中而禁止程序的执行。

    Digital wallet bridge
    14.
    发明授权

    公开(公告)号:US10102522B2

    公开(公告)日:2018-10-16

    申请号:US13855621

    申请日:2013-04-02

    Applicant: NXP B.V.

    Abstract: A smartcard communicating simultaneously with a smart phone and a point of sale, thereby allowing the smartcard to act as a bridge between the point of sale and the smart phone. The smart card is typically powered by the point of sale and typically communicates with the smart phone using BLUETOOTH Low Energy (BLE).

    Diversifying Control Flow of White-Box Implementation
    18.
    发明申请
    Diversifying Control Flow of White-Box Implementation 审中-公开
    白盒实施多样化控制流程

    公开(公告)号:US20160350520A1

    公开(公告)日:2016-12-01

    申请号:US14725801

    申请日:2015-05-29

    Applicant: NXP B.V.

    Abstract: A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: instructions for receiving input data for a round of the keyed cryptographic operation; instructions for determining the order of computing output portions for the round of the cryptographic function based upon portions of the input data; and instructions for computing the portions of the output data in the determined order based upon the input data.

    Abstract translation: 一种非暂时的机器可读存储介质,其编码有用于通过将输入消息映射到输出消息的加密系统通过密钥加密操作执行的指令,包括:用于接收用于一轮密钥加密操作的输入数据的指令; 用于基于所述输入数据的部分来确定所述加密函数的所述一轮计算输出部分的顺序的指令; 以及用于基于输入数据以确定的顺序计算输出数据的部分的指令。

    Flexible instruction sets for obfuscated virtual machines
    19.
    发明授权
    Flexible instruction sets for obfuscated virtual machines 有权
    混淆虚拟机的灵活指令集

    公开(公告)号:US09501301B2

    公开(公告)日:2016-11-22

    申请号:US14632879

    申请日:2015-02-26

    Applicant: NXP B.V.

    Inventor: Philippe Teuwen

    CPC classification number: G06F9/455 G06F8/74 G06F21/14 G06F21/563

    Abstract: A method for protecting computer software code is disclosed. In the embodiment, the method involves receiving instructions corresponding to computer software code for an application, the instructions including a first section of instructions to protect that is indicated by a first indicator and a second section of the instructions to protect that is indicated by a second indicator, rewriting the first section of instructions into a first section of virtual instructions, and rewriting the second section of instructions into a second section of virtual instructions, wherein the first section of instructions includes a first virtual instruction that corresponds to a first handler and the second section of virtual instructions includes a second virtual instruction that corresponds to a second handler, the first handler having different properties than the second handler.

    Abstract translation: 公开了一种保护计算机软件代码的方法。 在该实施例中,该方法涉及接收与应用程序的计算机软件代码相对应的指令,该指令包括用于保护的指令的第一部分由第一指示符指示,以及用于保护的指令的第二部分由第二指示符指示 指示符,将所述指令的第一部分重写为虚拟指令的第一部分,以及将所述指令的第二部分重写为虚拟指令的第二部分,其中所述第一指令部分包括对应于第一处理程序的第一虚拟指令, 虚拟指令的第二部分包括对应于第二处理程序的第二虚拟指令,第一处理程序具有与第二处理程序不同的属性。

    FLEXIBLE INSTRUCTION SETS FOR OBFUSCATED VIRTUAL MACHINES
    20.
    发明申请
    FLEXIBLE INSTRUCTION SETS FOR OBFUSCATED VIRTUAL MACHINES 有权
    柔性虚拟机的灵活指令集

    公开(公告)号:US20160253189A1

    公开(公告)日:2016-09-01

    申请号:US14632879

    申请日:2015-02-26

    Applicant: NXP B.V.

    Inventor: Philippe Teuwen

    CPC classification number: G06F9/455 G06F8/74 G06F21/14 G06F21/563

    Abstract: A method for protecting computer software code is disclosed. In the embodiment, the method involves receiving instructions corresponding to computer software code for an application, the instructions including a first section of instructions to protect that is indicated by a first indicator and a second section of the instructions to protect that is indicated by a second indicator, rewriting the first section of instructions into a first section of virtual instructions, and rewriting the second section of instructions into a second section of virtual instructions, wherein the first section of instructions includes a first virtual instruction that corresponds to a first handler and the second section of virtual instructions includes a second virtual instruction that corresponds to a second handler, the first handler having different properties than the second handler.

    Abstract translation: 公开了一种保护计算机软件代码的方法。 在该实施例中,该方法涉及接收与应用程序的计算机软件代码相对应的指令,该指令包括用于保护的指令的第一部分由第一指示符指示,以及用于保护的指令的第二部分由第二指示符指示 指示符,将所述指令的第一部分重写为虚拟指令的第一部分,以及将所述指令的第二部分重写为虚拟指令的第二部分,其中所述第一指令部分包括对应于第一处理程序的第一虚拟指令, 虚拟指令的第二部分包括对应于第二处理程序的第二虚拟指令,第一处理程序具有与第二处理程序不同的属性。

Patent Agency Ranking