Secure embedded microcontroller image load

    公开(公告)号:US11409882B2

    公开(公告)日:2022-08-09

    申请号:US16700708

    申请日:2019-12-02

    Abstract: A system and method for providing a secure image load. The system includes a microcontroller. The microcontroller has a plurality of physically modifiable internal components (PMIC). Each of the plurality of PMICs can only be modified one time. The system further includes an image loader configured to load a boot image from the memory of the microcontroller, and a checksum calculator configured to calculate a checksum value for the boot image. The system further includes a checksum burner configured to modify the plurality of PMICs to create a binary representation of the checksum value for the image. A checksum value is calculated for the image. This checksum value is written to the microcontroller. The value is burned into the microcontroller using the PMICs. Further, responses to the checksum mismatch are burned into the microcontroller using the PMICs that are present in the microcontroller.

    PAIRING DEVICES FOR ENHANCED SECURITY
    3.
    发明公开

    公开(公告)号:US20230308261A1

    公开(公告)日:2023-09-28

    申请号:US17656685

    申请日:2022-03-28

    CPC classification number: H04L9/0825 H04L9/0866 H04L9/0872 H04L9/14 G06F21/72

    Abstract: A system and method to tie a removable component to a host device. A first pairing key is stored into a security module on a host device such as a server rack. A removable component is inserted into the server rack for the first time. In response to this first insertion the first pairing key is burned into the removable component using a plurality of physically modifiable internal components. The server rack/security module receives a request form the removable component to operate on the server rack, the request includes a burned in pairing key. The security module compares the received pairing key with the first pairing key and permits operation of the removable component in response to a match between the received pairing key and the first pairing key.

    Content access based on location token

    公开(公告)号:US11729472B2

    公开(公告)日:2023-08-15

    申请号:US16701306

    申请日:2019-12-03

    CPC classification number: H04N21/4753 H04L9/3213 H04L9/3234 H04N21/4126

    Abstract: A system and method for providing content to a user outside of a home region. A portable device displays content to a user through a network connection. A home content provider provides content to the portable device from the home region. Some of the content provided is region restricted content. A location verifier determines that the portable device and the user are both physically located within the home region. The location verifier issues to the user a location token when the user and the portable device are in the home region. A token verifier verifies the location token when the user requests the region restricted content outside of the home region. The token verifier further instructs the home content provider to provide region restricted content to the user when the user has the location token.

    CONTENT ACCESS BASED ON LOCATION TOKEN

    公开(公告)号:US20210168455A1

    公开(公告)日:2021-06-03

    申请号:US16701306

    申请日:2019-12-03

    Abstract: A system and method for providing content to a user outside of a home region. A portable device displays content to a user through a network connection. A home content provider provides content to the portable device from the home region. Some of the content provided is region restricted content. A location verifier determines that the portable device and the user are both physically located within the home region. The location verifier issues to the user a location token when the user and the portable device are in the home region. A token verifier verifies the location token when the user requests the region restricted content outside of the home region. The token verifier further instructs the home content provider to provide region restricted content to the user when the user has the location token.

    Secure modification of controlled devices

    公开(公告)号:US12231536B2

    公开(公告)日:2025-02-18

    申请号:US17656680

    申请日:2022-03-28

    Abstract: A system and method of securely controlling a device from another device. The user of the device attempts to modify the device in some way. In response to the attempted modification a request is generated and sent to a controlling device. The request includes information related to the desired modification. The controlling device analyzes the request and a determination on how to respond to the request is made. This response is encrypted at the controlling device and transmitted to the device. The device then decrypts the response and implements the indicated response to the request. The encryption and decryption keys are burned into the corresponding devices such that information needed to decrypt the response is not transmitted to the device.

    SECURE MODIFICATION OF CONTROLLED DEVICES
    10.
    发明公开

    公开(公告)号:US20230318806A1

    公开(公告)日:2023-10-05

    申请号:US17656680

    申请日:2022-03-28

    CPC classification number: H04L9/0819 H04L9/3073 H04L63/0428

    Abstract: A system and method of securely controlling a device from another device. The user of the device attempts to modify the device in some way. In response to the attempted modification a request is generated and sent to a controlling device. The request includes information related to the desired modification. The controlling device analyzes the request and a determination on how to respond to the request is made. This response is encrypted at the controlling device and transmitted to the device. The device then decrypts the response and implements the indicated response to the request. The encryption and decryption keys are burned into the corresponding devices such that information needed to decrypt the response is not transmitted to the device.

Patent Agency Ranking