METHOD AND APPARATUS TO ADJUST SYSTEM SECURITY POLICIES BASED ON SYSTEM STATE

    公开(公告)号:US20210406381A1

    公开(公告)日:2021-12-30

    申请号:US17341627

    申请日:2021-06-08

    Applicant: NXP B.V.

    Abstract: A system, method, and apparatus are provided for securely controlling operations of a data processing system in which security subsystem is activated to provide security services by responding to a security service request, evaluating the request against an adjustable set of system security policies to determine if the security service request is granted access to a protected asset, by generating a response to the security service request using the protected asset if the security service request is granted access to the protected asset, by adjusting a security access policy for the protected asset in the adjustable set of system security policies, and by sending the response from the security subsystem to the external application subsystem.

    APPARATUSES AND METHODS FOR VERIFICATION OF UPDATED DATA-SET

    公开(公告)号:US20240031143A1

    公开(公告)日:2024-01-25

    申请号:US18342856

    申请日:2023-06-28

    Applicant: NXP B.V.

    CPC classification number: H04L9/0869 H04L9/32

    Abstract: In one example, a circuit includes a secure chip storing one of an enclave of key values linked to an update code; a memory to store an updatable data set including the update value which corresponds to and is revised with the update code; and a logic circuit. The logic circuit is to: provide a key value, based to a revision to the update code, from among the enclave of key values, generate an authentication tag as a function of the provided key value, use the authentication tag to verify that the updatable data set is valid and up to date before using the updatable data set in an application specified for the updatable data set, and update the data set by storing a replacement updatable data set in the memory circuit and including, in the replacement updatable data set, a revised update value which corresponds to a revised update code that is used to provide another key value from among the enclave of key values.

    Secure activation of functionality in a data processing system

    公开(公告)号:US10944557B2

    公开(公告)日:2021-03-09

    申请号:US15962495

    申请日:2018-04-25

    Applicant: NXP B.V.

    Inventor: Sören Heisrath

    Abstract: A method is provided for securely activating or deactivating functionality in a data processing system. The method includes determining to activate or deactivate a selected functional block of a plurality of functional blocks in the data processing system. An authentication key and a unique identifier are provided to a key derivation function of a function control circuit to produce a derived key value. The key derivation function is iteratively input with a sequence of function set identifiers, where each function set identifier is for identifying one or more of the functional blocks. Each function set identifier is paired with a previously derived key value from a previous iteration. A final iteration of the key derivation function provides a verification key for verifying the authenticity of the derived key value corresponding to the selected functional block to be activated or deactivated.

    METHODS AND SYSTEMS FOR COMMITTING TRANSACTIONS UTILIZING RF RANGING WHILE PROTECTING USER PRIVACY

    公开(公告)号:US20210377741A1

    公开(公告)日:2021-12-02

    申请号:US17302275

    申请日:2021-04-29

    Applicant: NXP B.V.

    Abstract: There is described a system and method of committing a transaction within a UWB network comprising a plurality of anchors, the UWB network covering a predetermined area having at least one trigger area, the method comprising waking up a mobile device upon entering the predetermined area, receiving initial network data at the mobile device, verifying that the UWB network is genuine based on the initial network data, initiating communication between the mobile device and an anchor, including partial mutual authentication, generating a session key for secure communication between the mobile device and the UWB network, tracking the location of the mobile device within the predetermined area based on secure communication between the mobile device and one or more anchors within the UWB network using the session key, and committing the transaction, if the location of the mobile device is within the at least one trigger area.

    RF system and method for implementing role switching of transceiver nodes

    公开(公告)号:US10903868B2

    公开(公告)日:2021-01-26

    申请号:US16718061

    申请日:2019-12-17

    Applicant: NXP B.V.

    Abstract: Disclosed is a RF system (100) having at least one transceiver node device (110, 112, 114, 116, 118, 120) that is capable to assume, at a controllable point in time and/or for a controllable time period, each one of the following roles (210, 220, 230, 240): a first role (210) comprising listening or answering to a message from an active communication session, in particular ranging sessions, a second role (220) comprising listening for new communication sessions, in particular ranging sessions, a third role (230) comprising staying idle, and optionally a third role (230) comprising scanning for ongoing communication sessions, in particular ranging sessions, of other RF systems. The RF system (100) further comprises a controller device (134) communicatively interlinked with the at least one, in particular each, transceiver node device (110, 112, 114, 116, 118, 120) and capable to control an assignment of roles to the at least one, in particular each, transceiver node device, in particular to control for a transceiver node device a point in time to assume a role and/or a duration of performing a role and/or a duty cycle of performing a role (210, 220, 230, 240).

    Method and apparatus to adjust system security policies based on system state

    公开(公告)号:US11989302B2

    公开(公告)日:2024-05-21

    申请号:US17341627

    申请日:2021-06-08

    Applicant: NXP B.V.

    CPC classification number: G06F21/575 G06F2221/034

    Abstract: A system, method, and apparatus are provided for securely controlling operations of a data processing system in which security subsystem is activated to provide security services by responding to a security service request, evaluating the request against an adjustable set of system security policies to determine if the security service request is granted access to a protected asset, by generating a response to the security service request using the protected asset if the security service request is granted access to the protected asset, by adjusting a security access policy for the protected asset in the adjustable set of system security policies, and by sending the response from the security subsystem to the external application subsystem.

Patent Agency Ranking