摘要:
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit supports secure and non-secure accesses. When non-securely accessed, it is operable only to verify the stored usage restriction data, and, when securely accessed, it is operable to generate a new message authentication code for changed usage restriction data, for subsequent authentication of that data. The usage restriction data may be stored in non-secure memory and may include static and dynamic parts. One or more embodiments include a secure circuit indicating whether the device has been initialized. The cryptographic circuit outputs a message authentication code for the static part using a permanent device key from the secure circuit, only if the device has not been initialized, and outputs a message authentication code for the dynamic part as needed to support authorized changes to the dynamic part.
摘要:
The method and apparatus described herein transfers soft SIM credentials from a transferring mobile device to a target mobile device while ensuring that only one mobile device contains active soft SIM credentials at a time. Broadly, a transferring mobile device securely transfers the soft SIM credentials to a target mobile device either directly or via a network server. Before the target mobile device receives or activates the soft SIM credentials, the transferring mobile device deactivates the soft SIM credentials to ensure that only one mobile device contains the active soft SIM credentials.
摘要:
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity protects a data value, PD. A random challenge word, RND, is received from a source that is external to the electronic circuit. A first function G(RND,K) is evaluated that generates a first encrypted value, K′, from RND and K, wherein K is a secret key value that is stored on the electronic circuit. A second function F(RND,K) is evaluated that generates a second encrypted value, K″, from RND and K. The MAC is then generated in accordance with MAC=K″+m1K′+m2K′2+ . . . +MlK′l, wherein m1, m2, . . . , ml are derived by representing the data value, PD, as an l-tuple of elements in a field, GF(2n), wherein n is an integer greater than zero. A hardware-efficient arrangement is also disclosed for generating this and other MACs.
摘要翻译:在电子电路中生成消息认证码MAC,其中MAC完整性保护数据值PD。 从电子电路外部的源接收随机询问字RND。 评估从RND和K生成第一加密值K'的第一函数G(RND,K),其中K是存储在电子电路上的秘密密钥值。 评估从RND和K生成第二加密值K“的第二函数F(RND,K)。然后根据<?in-line-formula description =”In-Line Formulas“生成MAC end =“lead”?> MAC = K“+ m <1> K'+ m 2 K'2 +。 。 。 其中m <1> i> u> u> u>在线公式描述=“在线公式”end =“tail” / SUB>,m 2 2。 。 。 通过将数据值PD表示为字段中的元素的1元组GF(2≤n≤0)来导出,其中n是更大的整数 比零。 还公开了一种用于生成该MAC和其他MAC的硬件高效布置。
摘要:
A unique identifier of a remote device is not sent in clear text on a local interlace between the remote device and a device that can communicate with a wireless network, but a procedure for establishing an encryption key in both devices is still based on the unique identifier. Thus, secure binding between the established key and the identifier is achieved. Moreover, the identifier of the remote device is not exposed even to the device that can communicate with a wireless network.
摘要:
A device (e.g., mobile device) and method are described herein that can protect data stored in a rewritable openly accessible memory from replay attacks by using an integrity key and an encryption key to en/decrypt the data, integrity protect the data via a MAC calculation, and verify the data.
摘要:
A method is described herein which enables a mobile device and a smart card (SIM, UICC) to establish a shared secret KE which can then be used to secure an interface between themselves. A mobile operator helps in the establishment of the shared secret (KE) by taking part in a key exchange between the mobile device and smart card. The mobile operator's involvement is desirable since they can keep track of mobile device-smart card pairs and if necessary they can block the security establishment between the mobile device and the smart card in order to prevent fraudulent behavior.
摘要:
A system and method for encrypting data communications between a client and server utilizes an untrusted proxy server to perform computationally expensive encryption calculations which would otherwise be performed by the client. Prior to transmitting the data message to the proxy server, the client masks the data message such that the data message is indecipherable to the untrusted proxy. The untrusted proxy performs the computationally expensive encryption calculations prior to transmitting the data message to the intended receiver.
摘要:
A method is provided for achieving admission control to a public connectionless packet network. This provides a method of access control which allows service differentiation in a form which permits a user to receive a quality of service guarantee which is better than a “best effort” service. Each transmission by a user across the network includes a ticket message sent to the user from the network. The ticket message includes information about the priority level of the transmission, and can be used in a connectionless network to determine the resources available for future transmission requests.