JAMMER RESILIENT RANGING SCHEME
    21.
    发明公开

    公开(公告)号:US20240192307A1

    公开(公告)日:2024-06-13

    申请号:US18079473

    申请日:2022-12-12

    Applicant: NXP B.V.

    CPC classification number: G01S5/14

    Abstract: In an ultra-wideband (UWB) communication network, a controller anchor changes which anchor of a group of anchors serves as initiator for each of multiple ranging rounds. Based on the capabilities of the anchors in the UWB communication network, the controller selects among multiple modes for designating which anchor serves as initiator for each ranging round. In a first mode, the anchors take turns serving as the initiator for successive ranging rounds in round robin fashion. In a second mode, the anchors randomly take turns serving as the initiator for ranging rounds. By dynamically selecting an initiator for each ranging round, launching a successful jamming attack becomes significantly more complicated.

    CLIENT PRIVACY PRESERVING SESSION RESUMPTION

    公开(公告)号:US20220330016A1

    公开(公告)日:2022-10-13

    申请号:US17851609

    申请日:2022-06-28

    Applicant: NXP B.V.

    Abstract: Various embodiments relate to a method and system for resuming a secure communication session with a server by a device, including: sending a message to the server requesting the resumption of a secure communication session; receiving from the server a server identifier, a server nonce, and a salt; determining that the device has a shared key with the server based upon the server identifier; determining that the received salt is valid; calculating a salted identifier based upon the shared key and the salt; sending the salted identifier to the server; and resuming the secure communication session with the server.

    Compilation scheme for tagged global variables

    公开(公告)号:US11055202B1

    公开(公告)日:2021-07-06

    申请号:US16715656

    申请日:2019-12-16

    Applicant: NXP B.V.

    Abstract: A system and method for accessing a tagged global variable in software, including: randomly generating tags for global variables in the software; tagging the global variables with the random tags; creating a pointer to each global variable with the random tags in unused bits of the pointer wherein the pointer points to the associated global variable; accessing one global variable indirectly using the tagged pointer; determining whether tag on the accessed global variable matches the tag on the accessed pointer; and indicating a fault when the tag on the accessed global variable does not match the tag on the accessed pointer.

    Securing a cryptographic device
    25.
    发明授权

    公开(公告)号:US10567155B2

    公开(公告)日:2020-02-18

    申请号:US15143259

    申请日:2016-04-29

    Applicant: NXP B.V.

    Abstract: Methods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.

    SECURING A CRYPTOGRAPHIC DEVICE
    26.
    发明申请
    SECURING A CRYPTOGRAPHIC DEVICE 审中-公开
    保护CRYPTOGRAPHIC设备

    公开(公告)号:US20160323097A1

    公开(公告)日:2016-11-03

    申请号:US15143259

    申请日:2016-04-29

    Applicant: NXP B.V.

    Abstract: Methods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.

    Abstract translation: 描述了保护加密设备免遭实施攻击的方法。 所公开的方法包括以下步骤:使用伪随机发生器(510)产生秘密值(324); 提供密钥(330),具有多个块的输入(324)和秘密值给加密模块(340); 索引大块和秘密值(324); 通过使用密钥(330)和加密模块(340)加密由块索引的秘密值(324)来处理输入块; 为每个块生成加密模块(340)的伪随机输出(330'),在处理下一个块时提供伪随机输出作为密钥(330'); 并且通过使用它作为加密固定明文的密钥,对前一步骤的最后伪随机输出(330')执行最终变换。

Patent Agency Ranking