Distributed cryptographic key insertion and key delivery

    公开(公告)号:US10237063B2

    公开(公告)日:2019-03-19

    申请号:US15377840

    申请日:2016-12-13

    Applicant: NXP B.V.

    Inventor: Jan Rene Brands

    Abstract: A method of producing a secure integrated circuit (IC), including: loading the IC with a unique identification number (UID); loading the IC with a key derivation data (KDD) that is based upon a secret value K and the UID; producing a secure application configured with a manufacturer configuration parameter (MCP) and the secret value K and configured to receive the UID from the IC; producing a manufacturer diversification parameter (MDP) based upon the MCP and the secret value K and loading the MDP into the IC; wherein secure IC is configured to calculate a device specific key (DSK) based upon the received MDP and the KDD, and wherein the secure application calculates the DSK based upon the MCP, K, and the received UID.

    DISTRIBUTED CRYPTOGRAPHIC KEY INSERTION AND KEY DELIVERY

    公开(公告)号:US20180167210A1

    公开(公告)日:2018-06-14

    申请号:US15377840

    申请日:2016-12-13

    Applicant: NXP B.V.

    Inventor: Jan Rene Brands

    Abstract: A method of producing a secure integrated circuit (IC), including: loading the IC with a unique identification number (UID); loading the IC with a key derivation data (KDD) that is based upon a secret value K and the UID; producing a secure application configured with a manufacturer configuration parameter (MCP) and the secret value K and configured to receive the UID from the IC; producing a manufacturer diversification parameter (MDP) based upon the MCP and the secret value K and loading the MDP into the IC; wherein secure IC is configured to calculate a device specific key (DSK) based upon the received MDP and the KDD, and wherein the secure application calculates the DSK based upon the MCP, K, and the received UID.

    Return-oriented programming as an obfuscation technique
    5.
    发明授权
    Return-oriented programming as an obfuscation technique 有权
    回归型编程作为一种混淆技术

    公开(公告)号:US09411597B2

    公开(公告)日:2016-08-09

    申请号:US14270558

    申请日:2014-05-06

    Applicant: NXP B.V.

    Abstract: A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a second set of instructions for at least one or more additional operations. The second set of instructions is tuned to contain instructions such that, by executing the second set of instructions, the function of the first set of instructions can be performed. Once the first and second sets of instruction are determined and tuned, a code library is created and code fragments in the library correspond to code needed to perform the function of the first set of instructions when executed. Instructions are then added to the second set of instructions such that, when executed, will cause the functionality of the first set of instructions to be achieved.

    Abstract translation: 公开了一种用于模糊计算机软件功能的方法。 在一个实施例中,该方法包括确定执行目标操作所需的第一组指令和用于至少一个或多个附加操作的第二组指令。 调整第二组指令以包含指令,使得通过执行第二组指令,可以执行第一组指令的功能。 一旦确定和调整了第一组和第二组指令,就会创建一个代码库,并且库中的代码片段与执行第一组指令的功能所需的代码相对应。 然后将指令添加到第二组指令中,使得当被执行时,将导致实现第一组指令的功能。

    PORTABLE SECURITY DEVICE, METHOD FOR SECURING A DATA EXCHANGE AND COMPUTER PROGRAM PRODUCT
    6.
    发明申请
    PORTABLE SECURITY DEVICE, METHOD FOR SECURING A DATA EXCHANGE AND COMPUTER PROGRAM PRODUCT 有权
    便携式安全装置,用于保护数据交换和计算机程序产品的方法

    公开(公告)号:US20150222607A1

    公开(公告)日:2015-08-06

    申请号:US14613287

    申请日:2015-02-03

    Applicant: NXP B.V.

    Abstract: There is disclosed a portable security device for securing a data exchange between a host device and a remote device, said portable security device comprising a processing unit, a secure element and a data interface, wherein: the secure element is arranged to store an encryption key and a decryption key; the processing unit is arranged to control the encryption of data to be transmitted from the host device to the remote device, wherein said encryption is performed using said encryption key; the processing unit is further arranged to control the decryption of data transmitted from the remote device to the host device, wherein said decryption is performed using said decryption key. Furthermore, a corresponding method for securing a data exchange between a host device and a remote device using a portable security device is disclosed, as well as a corresponding computer program product.

    Abstract translation: 公开了一种用于保护主机设备和远程设备之间的数据交换的便携式安全设备,所述便携式安全设备包括处理单元,安全元件和数据接口,其中:安全元件被设置为存储加密密钥 和解密密钥; 处理单元被配置为控制要从主机设备发送到远程设备的数据的加密,其中使用所述加密密钥执行所述加密; 所述处理单元还被配置为控制从所述远程设备发送到所述主机设备的数据的解密,其中使用所述解密密钥执行所述解密。 此外,公开了一种用于使用便携式安全设备来保护主机设备和远程设备之间的数据交换的相应方法,以及相应的计算机程序产品。

    RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE
    7.
    发明申请
    RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE 有权
    面向方面的面向对象编程作为一种障碍技术

    公开(公告)号:US20150324585A1

    公开(公告)日:2015-11-12

    申请号:US14270558

    申请日:2014-05-06

    Applicant: NXP B.V.

    Abstract: A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a second set of instructions for at least one or more additional operations. The second set of instructions is tuned to contain instructions such that, by executing the second set of instructions, the function of the first set of instructions can be performed. Once the first and second sets of instruction are determined and tuned, a code library is created and code fragments in the library correspond to code needed to perform the function of the first set of instructions when executed. Instructions are then added to the second set of instructions such that, when executed, will cause the functionality of the first set of instructions to be achieved.

    Abstract translation: 公开了一种用于模糊计算机软件功能的方法。 在一个实施例中,该方法包括确定执行目标操作所需的第一组指令和用于至少一个或多个附加操作的第二组指令。 调整第二组指令以包含指令,使得通过执行第二组指令,可以执行第一组指令的功能。 一旦确定和调整了第一组和第二组指令,就会创建一个代码库,并且库中的代码片段与执行第一组指令的功能所需的代码相对应。 然后将指令添加到第二组指令中,使得当被执行时,将导致实现第一组指令的功能。

    DISPLAY DEVICE, METHOD OF OPERATING A DISPLAY DEVICE, AND COMPUTER PROGRAM PRODUCT
    8.
    发明申请
    DISPLAY DEVICE, METHOD OF OPERATING A DISPLAY DEVICE, AND COMPUTER PROGRAM PRODUCT 有权
    显示设备,操作显示设备的方法和计算机程序产品

    公开(公告)号:US20150042446A1

    公开(公告)日:2015-02-12

    申请号:US14331134

    申请日:2014-07-14

    Applicant: NXP B.V.

    Abstract: There is provided a display device comprising a processing unit, a display unit coupled to the processing unit and a near field communication unit coupled to the processing unit, wherein said processing unit is arranged to synchronize display messages to be displayed by the display unit with corresponding near field communication messages to be stored in the near field communication unit. Furthermore, a corresponding method of operating a display device is conceived. Furthermore, a corresponding computer program product is provided.

    Abstract translation: 提供了一种显示装置,包括处理单元,耦合到处理单元的显示单元和耦合到处理单元的近场通信单元,其中所述处理单元被布置为使显示单元显示的显示消息与相应的 近场通信消息被存储在近场通信单元中。 此外,构想了相应的操作显示装置的方法。 此外,提供了相应的计算机程序产品。

    Method for generating a public/private key pair and public key certificate for an internet of things device

    公开(公告)号:US10341329B2

    公开(公告)日:2019-07-02

    申请号:US15641480

    申请日:2017-07-05

    Applicant: NXP B.V.

    Inventor: Jan Rene Brands

    Abstract: A method is provided for generating a public/private key pair and certificate. The method includes providing an integrated circuit (IC) with an IC specific initial public and private key pair and a public key certificate signed by a manufacturer of the IC. A smartcard having stored thereon customer unique configuration data related to the IC is provided to a customer of the IC manufacturer. The smartcard enables the customer to generate a customization value and a customized public key using the customer unique configuration data. In response to the customer receiving the public key certificate signed by the IC manufacturer from the IC, the customer is enabled to provide the customization value, the customized public key, and a public key certificate signed by the customer to the IC. The IC is thus enabled to generate a customized private key, thus providing an IoT device with a public/private key pair and a certificate signed by the device manufacturer without the use of a trusted party.

Patent Agency Ranking