Collaborative computation of HMAC

    公开(公告)号:US10547447B2

    公开(公告)日:2020-01-28

    申请号:US15694883

    申请日:2017-09-04

    Abstract: In one embodiment, a first apparatus includes a processor and an interface, wherein the interface is operative to receive a request from a second apparatus to commence a keyed-hash message authentication code (HMAC) computation, the processor is operative to perform a first computation computing a first part of the HMAC computation using a secret key K as input yielding a first value, the interface is operative to send the first value to the second apparatus, the interface is operative to receive a second value from the second apparatus, the second value resulting from the second apparatus processing the first value with at least part of a message M, the processor is operative to perform a second computation based on the second value and the secret key K yielding an HMAC value, and the interface is operative to send the HMAC value to the second apparatus.

    Compressing indices in a video stream

    公开(公告)号:US09971800B2

    公开(公告)日:2018-05-15

    申请号:US15096297

    申请日:2016-04-12

    Abstract: In one embodiment a system, apparatus, and method for optimizing index value lengths when indexing data items in an array of data items is described, the method including producing, at a first processor, an ordered series of index values, sending the ordered series of index values to an indexing processor, receiving, at the indexing processor, a data object including the array of data items, associating, at the indexing processor, a first part of one of the index values with a first one data item of the array of data items, associating, at the indexing processor, a second part of the one of the index values with a next one data item of the array of data items, repeating the steps of associating a first part of one of the index values and associating a second part of the one of the index values until all of the data items in the array of data items are indexed.

    SMART HOME SECURITY SYSTEM
    3.
    发明申请

    公开(公告)号:US20180069879A1

    公开(公告)日:2018-03-08

    申请号:US15256651

    申请日:2016-09-05

    Abstract: In one embodiment, a system is described, the system including a network gateway in communication with a plurality of original equipment manufacturer (OEM) servers, a household behavior model processor which models a household behavior model based at least on expected usage of each of a plurality of OEM network appliances, wherein each one appliance of the plurality of OEM network appliances is associated with one of the plurality of OEM servers, and behavior of users associated with the network gateway, an anomaly detector which determines, on the basis of the household behavior model, if an anomalous control message which has been sent to one of the plurality of OEM network appliances from one of the OEM servers has been received at the network gateway, and a notification server which sends a notification to an application on an administrator's device upon receipt of the anomalous control message at the network gateway. Related systems, apparatus, and methods are also described.

    Split chain of trust for secure device boot

    公开(公告)号:US11580227B2

    公开(公告)日:2023-02-14

    申请号:US17392869

    申请日:2021-08-03

    Abstract: The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame.

    Split chain of trust for secure device boot

    公开(公告)号:US11113403B2

    公开(公告)日:2021-09-07

    申请号:US16379532

    申请日:2019-04-09

    Abstract: The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame.

    Secure differential insertion of secondary content

    公开(公告)号:US09788033B1

    公开(公告)日:2017-10-10

    申请号:US15196068

    申请日:2016-06-29

    Abstract: In one embodiment, a consumer device is assigned, at a broadcast headend to one of at least two groups of consumer devices, the two groups including a first group of consumer devices which is required to play content of a second type in order to view content of a first type and a second group of consumer devices which is not required to play content of the second type in order to view content of the first type. A video broadcast stream is sent from the broadcast headend to the consumer device, the video broadcast stream comprising content of the first type sent associated with a first packet ID (PID) and content of the second type sent associated with a second PID, wherein the first PID and the second PID are processed at the consumer device at the same time. An entitlement management message (EMM) is sent from the broadcast headend to the consumer device according to its group of consumer devices, the EMM being of one of a first type of EMM for devices of the first device type and a second type of EMM for devices of the second device type. An entitlement control message (ECM) stream is sent from the broadcast headend to the consumer device, the ECM stream including comprising three types of ECMs: ECM_P_i_start which enables the consumer device to produce a control word which decrypts a first portion of the content of the first type; ECM_A_(i−1) which enables the consumer device to produce a control word which decrypts content of the second type; and ECM_P_i_rest which enables the consumer device to produce a control word which decrypts a second portion of the content of the first type. Related hardware, systems and methods are also described.

    LFSR watermark system
    8.
    发明授权
    LFSR watermark system 有权
    LFSR水印系统

    公开(公告)号:US09208352B2

    公开(公告)日:2015-12-08

    申请号:US14176400

    申请日:2014-02-10

    Abstract: In one embodiment, a system including a processor is operative to receive a content item including a watermark encoding a series of data values of an output stream of a linear feedback shift register initialized with a seed including an information element and an assurance value, the shift register having a plurality of states each including a first and second value, identify at least part of the watermark in the content item, extract at least some of the data values from the at least part of the identified watermark, process at least some of the extracted data values yielding the initial state of shift register, and authenticate the first value of the initial state using the second value of the initial state in order to confirm that the first value is indeed the information element included in the seed processed by the shift register.

    Abstract translation: 在一个实施例中,包括处理器的系统可操作以接收内容项目,该内容项目包括编码由包括信息元素和保证值的种子初始化的线性反馈移位寄存器的输出流的一系列数据值的水印, 具有多个状态的寄存器,每个状态包括第一和第二值,识别内容项中的水印的至少一部分,从所识别的水印的至少一部分中提取至少一些数据值,处理至少一些 提取的数据值产生移位寄存器的初始状态,并且使用初始状态的第二值来认证初始状态的第一值,以便确认第一值确实是包括在由移位寄存器处理的种子中的信息元素 。

    Glitch Resistant Device
    9.
    发明申请
    Glitch Resistant Device 有权
    防毛刺装置

    公开(公告)号:US20140143552A1

    公开(公告)日:2014-05-22

    申请号:US14082842

    申请日:2013-11-18

    CPC classification number: G06F21/10 G06F2221/0797

    Abstract: A system and method for device security is described, the system and method including at least one integrated circuit including a CPU, a key register storing a hardware enabling key, the key including a large number of bits, such that each bit of the large number of bits has a correct value, and if any one bit of the large number of bits is set to an incorrect value the key will not function correctly a combination circuit for performing a function, f, the function f being essential for correct functionality of the CPU, such that the combination circuit is activated by the key, the combination circuit only performing function f if each of the large number of bits of the key is set to the correct value, and there exists no set of intermediate or output bits derived from the large number of bits of the key, which determine if the combination circuit performs function f, the set intermediate or output bits including fewer bits than are included in the key. Related apparatus, methods, and systems are also described.

    Abstract translation: 描述了一种用于设备安全性的系统和方法,所述系统和方法包括至少一个集成电路,包括CPU,存储硬件使能密钥的密钥寄存器,包括大量位的密钥,使得大数量的每个位 的位具有正确的值,并且如果大量位的任何一位被设置为不正确的值,则该键将不能正常地用于执行功能的组合电路f,功能f对于正确的功能是必要的 CPU,使得组合电路由键激活,组合电路仅在键的大量位中的每一个被设置为正确的值时才执行功能f,并且不存在来自 键的大量位,其确定组合电路是否执行功能f,所设置的中间或输出位包括比包括在键中的位数少。 还描述了相关装置,方法和系统。

Patent Agency Ranking