USER-INITIATED MIGRATION OF ENCRYPTION KEYS
    1.
    发明申请

    公开(公告)号:US20170338948A1

    公开(公告)日:2017-11-23

    申请号:US15159216

    申请日:2016-05-19

    Applicant: NXP B.V.

    Abstract: Aspects of various embodiments are directed to applications utilizing secret keys for authentication and/or encrypted communication. In certain embodiments, authentication data is provided from a source network communication device to a target network communication device that allows a computing server to verify that the key migration has been is authorized by the source network communication device. The authentication data also enables the data provider and the target network communication device to independently determine a temporary key for establishing a secure communication channel between the service provider and the target network communication device and/or determine a new key for the target network communication device. In some implementations, the authentication data may be exchanged between the source and target network communication devices between offline without involvement of the computing server. When the target network communication device later connects to the computing server, the authentication data may be used to verify that the key migration is authorized and/or generate key(s).

    Efficient calculation of message authentication codes for related data

    公开(公告)号:US10608822B2

    公开(公告)日:2020-03-31

    申请号:US15497419

    申请日:2017-04-26

    Applicant: NXP B.V.

    Abstract: A method of computing a message authentication code (MAC) for a message having a common part and an independent part using a constrained processor, including: performing a MAC function on the common part of the message using a first secret key to produce a first output; performing a pseudorandom function on the independent part of the message using a second key to produce a second output, wherein the computation time of the pseudorandom function is significantly less than the computation time of the MAC function; and combining the first output and the second output to produce a computed MAC for the message.

    User-initiated migration of encryption keys

    公开(公告)号:US10171235B2

    公开(公告)日:2019-01-01

    申请号:US15159216

    申请日:2016-05-19

    Applicant: NXP B.V.

    Abstract: Embodiments utilizing secret keys for authentication and/or encrypted communication are described. In certain embodiments, authentication data is provided from a source network communication device to a target network communication device that allows a computing server to verify that the key migration is authorized by the source network communication device. The authentication data also enables the data provider and the target network communication device to independently determine a temporary key for establishing a secure communication channel between the service provider and the target network communication device and/or determine a new key for the target network communication device. In some implementations, the authentication data may be exchanged between the source and target network communication devices between offline without involvement of the computing server. When the target network communication device later connects to the computing server, the authentication data may be used to verify that the key migration is authorized and/or generate key(s).

    Deterministic digital signature method without using a hash function

    公开(公告)号:US10790991B2

    公开(公告)日:2020-09-29

    申请号:US16117714

    申请日:2018-08-30

    Applicant: NXP B.V.

    Abstract: A white-box system and method for producing a digital signature of a message m, including: a white-box implementation of a symmetric cipher configured to produce a deterministic nonce value by encrypting the message m using a secret key; and a digital signature algorithm configured to produce a digital signature of the message m based upon the deterministic nonce, the message m, and a secret signing key.

Patent Agency Ranking