-
公开(公告)号:US20170338948A1
公开(公告)日:2017-11-23
申请号:US15159216
申请日:2016-05-19
Applicant: NXP B.V.
Inventor: Florian Boehl , Jan René Brands
CPC classification number: H04L9/0819 , H04L9/0825 , H04L9/0861 , H04L9/0891 , H04L9/14 , H04L9/321 , H04L9/3242 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/067 , H04L63/08 , H04L67/10 , H04L2463/061 , H04L2463/062 , H04W4/80
Abstract: Aspects of various embodiments are directed to applications utilizing secret keys for authentication and/or encrypted communication. In certain embodiments, authentication data is provided from a source network communication device to a target network communication device that allows a computing server to verify that the key migration has been is authorized by the source network communication device. The authentication data also enables the data provider and the target network communication device to independently determine a temporary key for establishing a secure communication channel between the service provider and the target network communication device and/or determine a new key for the target network communication device. In some implementations, the authentication data may be exchanged between the source and target network communication devices between offline without involvement of the computing server. When the target network communication device later connects to the computing server, the authentication data may be used to verify that the key migration is authorized and/or generate key(s).
-
公开(公告)号:US10608822B2
公开(公告)日:2020-03-31
申请号:US15497419
申请日:2017-04-26
Applicant: NXP B.V.
Inventor: Florian Boehl , Simon Johann Friedberger , Thierry G. C. Walrant
Abstract: A method of computing a message authentication code (MAC) for a message having a common part and an independent part using a constrained processor, including: performing a MAC function on the common part of the message using a first secret key to produce a first output; performing a pseudorandom function on the independent part of the message using a second key to produce a second output, wherein the computation time of the pseudorandom function is significantly less than the computation time of the MAC function; and combining the first output and the second output to produce a computed MAC for the message.
-
公开(公告)号:US10171235B2
公开(公告)日:2019-01-01
申请号:US15159216
申请日:2016-05-19
Applicant: NXP B.V.
Inventor: Florian Boehl , Jan René Brands
Abstract: Embodiments utilizing secret keys for authentication and/or encrypted communication are described. In certain embodiments, authentication data is provided from a source network communication device to a target network communication device that allows a computing server to verify that the key migration is authorized by the source network communication device. The authentication data also enables the data provider and the target network communication device to independently determine a temporary key for establishing a secure communication channel between the service provider and the target network communication device and/or determine a new key for the target network communication device. In some implementations, the authentication data may be exchanged between the source and target network communication devices between offline without involvement of the computing server. When the target network communication device later connects to the computing server, the authentication data may be used to verify that the key migration is authorized and/or generate key(s).
-
公开(公告)号:US10790991B2
公开(公告)日:2020-09-29
申请号:US16117714
申请日:2018-08-30
Applicant: NXP B.V.
Inventor: Joppe Willem Bos , Florian Boehl
Abstract: A white-box system and method for producing a digital signature of a message m, including: a white-box implementation of a symmetric cipher configured to produce a deterministic nonce value by encrypting the message m using a secret key; and a digital signature algorithm configured to produce a digital signature of the message m based upon the deterministic nonce, the message m, and a secret signing key.
-
公开(公告)号:US10387687B2
公开(公告)日:2019-08-20
申请号:US15482462
申请日:2017-04-07
Applicant: NXP B.V.
Inventor: Florian Boehl , Clemens Orthacker , Klaus Martin Potzmader , Andreas Daniel Sinnhofer , Christian Steger
IPC: G06F11/30 , G06F12/14 , G06F21/76 , G06F11/36 , G06F21/57 , H04L9/08 , H04L9/32 , H04L9/00 , H04L29/06 , G06F21/86
Abstract: A method of trust provisioning a device, including: receiving, by a hardware security module (HSM), a list of instructions configured to produce trust provisioning information; performing, by the HSM, a constraint check on the list of instructions including performing a symbolic execution of the list of instructions; receiving confidential inputs; executing, by the HSM, the list of instructions on the confidential inputs when the list of instructions passes the constraint check; outputting, by the HSM, trust provisioning information.
-
公开(公告)号:US20180316504A1
公开(公告)日:2018-11-01
申请号:US15497419
申请日:2017-04-26
Applicant: NXP B.V.
Inventor: Florian Boehl , Simon Johann Friedberger , Thierry G.C. Walrant
CPC classification number: H04L9/14 , H04L9/3242 , H04L2209/125
Abstract: A method of computing a message authentication code (MAC) for a message having a common part and an independent part using a constrained processor, including: performing a MAC function on the common part of the message using a first secret key to produce a first output; performing a pseudorandom function on the independent part of the message using a second key to produce a second output, wherein the computation time of the pseudorandom function is significantly less than the computation time of the MAC function; and combining the first output and the second output to produce a computed MAC for the message.
-
-
-
-
-