-
公开(公告)号:US20160212137A1
公开(公告)日:2016-07-21
申请号:US15001750
申请日:2016-01-20
Applicant: ARM IP Limited , ARM Ltd.
Inventor: Remy Pottier , Hugo John Martin Vincent , Amyas Edward Wykes Phillips , Christopher Mark Paola , Milosch Meriac
IPC: H04L29/06
CPC classification number: H04L63/101 , H04L63/0823 , H04L63/104
Abstract: A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method comprising: obtaining, at the permissions management resource, input data; generating, at the permissions management resource, at least one permission relating to accessing the subject device in response to the input data; transmitting, from the permissions management resource to the subject device and/or the at least one processing device, a communication comprising the at least one permission.
Abstract translation: 在权限管理资源上创建与至少一个数据处理设备的主题设备相关的访问许可的方法,所述方法包括:在所述许可管理资源处获取输入数据; 在所述许可管理资源处产生响应于所述输入数据访问所述主题设备的至少一个许可; 从所述许可管理资源向所述主体设备和/或所述至少一个处理设备发送包括所述至少一个许可的通信。
-
公开(公告)号:US11003508B2
公开(公告)日:2021-05-11
申请号:US15572692
申请日:2016-04-21
Applicant: ARM IP LIMITED , ARM LIMITED
Inventor: Christopher Mark Paola , Milosch Meriac , Remy Pottier
IPC: G06F15/173 , G06F9/50 , H04L29/08 , G06F11/34
Abstract: A system provided at nodes within a network of nodes enabling the nodes to migrate activities to other nodes within its communication range to provide load balancing across the network. The other nodes having power and processing capabilities and capacity enabling them to undertake the migrated activities.
-
公开(公告)号:US10333938B2
公开(公告)日:2019-06-25
申请号:US15001750
申请日:2016-01-20
Applicant: ARM IP Limited , ARM Limited
Inventor: Remy Pottier , Hugo John Martin Vincent , Amyas Edward Wykes Phillips , Christopher Mark Paola , Milosch Meriac
IPC: H04L29/06
Abstract: A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method comprising: obtaining, at the permissions management resource, input data; generating, at the permissions management resource, at least one permission relating to accessing the subject device in response to the input data; transmitting, from the permissions management resource to the subject device and/or the at least one processing device, a communication comprising the at least one permission.
-
公开(公告)号:US10122718B2
公开(公告)日:2018-11-06
申请号:US14832428
申请日:2015-08-21
Applicant: ARM IP Limited , ARM Limited
Inventor: Milosch Meriac , Geraint Luff , William Allen Curtis , Remy Pottier
Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
-
公开(公告)号:US10911245B2
公开(公告)日:2021-02-02
申请号:US15549505
申请日:2016-01-25
Applicant: ARM IP Limited , ARM LIMITED
Inventor: Remy Pottier , Amyas Edward Wykes Phillips , Milosch Meriac
Abstract: There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted by the verification apparatus and/or device data relating to the agent device; transmitting, from the agent device to the verification apparatus, the trust credential; obtaining, at the verification apparatus, the trust credential; analysing, at the verification apparatus, the trust credential; determining, at the verification apparatus, whether the agent device is trusted based on the analysis; and responsive to determining the agent device is trusted, establishing trust between the agent device and the verification apparatus.
-
公开(公告)号:US20170054721A1
公开(公告)日:2017-02-23
申请号:US14832428
申请日:2015-08-21
Applicant: ARM IP Limited , ARM Limited
Inventor: Milosch Meriac , Geraint Luff , William Allen Curtis , Remy Pottier
CPC classification number: H04L63/10 , H04L63/0421 , H04L67/02 , H04L67/10 , H04W12/02
Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
Abstract translation: 在一个示例中,方法包括由数据处理设备获得与第一用户相关联并对应于远程资源的第一位置的第一秘密数据。 该方法还包括使用第一秘密数据生成可用于获得第一位置的第一统一资源定位符(URL),以及使用第一URL访问第一位置。 该方法还包括响应于数据处理设备从第一用户到第二用户的使用权限的传送而获得与第二用户相关联并对应于远程资源的第二位置的第二秘密数据。 该方法还包括使用第二秘密数据生成可用于获得第二位置的第二URL,以及使用第二URL访问第二位置。 第二个位置无法通过第一个URL访问。 第一个位置无法通过第二个URL访问。
-
公开(公告)号:US10924475B2
公开(公告)日:2021-02-16
申请号:US15536518
申请日:2015-11-30
Applicant: ARM IP Limited , ARM Limited
Inventor: Hannes Tschofenig , Remy Pottier
Abstract: An authentication device is used to create a secure connection between an Internet of Things (IoT) device and a service provider, so that the IoT device is not limited to only the services of one specific provider or the specific services of the provider of the IoT device. In addition, multiple IoT devices purchased from several different providers can all be connected to the same service provider.
-
公开(公告)号:US10735428B2
公开(公告)日:2020-08-04
申请号:US16149796
申请日:2018-10-02
Applicant: ARM IP Limited , ARM Limited
Inventor: Milosch Meriac , Geraint Luff , William Allen Curtis , Remy Pottier
Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
-
公开(公告)号:US20190036928A1
公开(公告)日:2019-01-31
申请号:US16149796
申请日:2018-10-02
Applicant: ARM IP Limited , ARM Limited
Inventor: Milosch Meriac , Geraint Luff , William Allen Curtis , Remy Pottier
Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
-
-
-
-
-
-
-
-