Resource access in a microcontroller

    公开(公告)号:US12137081B2

    公开(公告)日:2024-11-05

    申请号:US17470528

    申请日:2021-09-09

    Abstract: A microcontroller is provided and comprises a central repository, a processing device, and a firewall. Rule repository memory in the central repository stores one or more access rules defining an access permission of a software context to one or more target resources of the microcontroller. The firewall receives a bus transaction initiated based on an instruction and determines whether any access rule stored in memory of the firewall defines the access permission of the software context to a destination resource. If no access rule stored in the firewall memory defines the access permission, the firewall communicates a miss query condition to the central repository. The central repository searches the rule repository memory for an access rule defining the access permission of the software context to the destination resource, and if a related access rule is found, the related access rule is stored in the firewall memory.

    ID-based control unit-key fob pairing
    2.
    发明授权
    ID-based control unit-key fob pairing 有权
    基于ID的控制单元 - 钥匙扣配对

    公开(公告)号:US09479932B2

    公开(公告)日:2016-10-25

    申请号:US14858434

    申请日:2015-09-18

    Abstract: A key fob includes a transceiver to send and receive signals, a memory to store a key fob identification (KFID), and a processor coupled to said transceiver and memory. The processor is to execute, along with a pairing device, an identification (ID) authenticated key agreement protocol based on the KFID to authenticate a pairing device and to generate a common secret encryption key known only by the processor and the pairing device. The Processor receives a control unit identification (CUID) encrypted by the pairing device with the common secret encryption key, execute along with the control unit associated with the CUID an ID authenticated key agreement protocol based on the CUID to authenticate the control unit, generates a second common secret encryption key known only by the processor and the control unit, and receives an operation key encrypted by the control unit with the second common secret encryption key.

    Abstract translation: 密钥卡包括用于发送和接收信号的收发器,用于存储密钥卡标识(KFID)的存储器以及耦合到所述收发器和存储器的处理器。 处理器将与配对设备一起执行基于KFID的识别(ID)认证的密钥协商协议,以验证配对设备并生成仅由处理器和配对设备知道的公用密钥。 处理器通过公用秘密加密密钥接收由配对设备加密的控制单元标识(CUID),与基于CUID的ID认证密钥协商协议与CUID相关联的控制单元一起执行以认证控制单元,生成 第二公共秘密加密密钥,仅由处理器和控制单元知道,并且接收由控制单元用第二公共秘密加密密钥加密的操作密钥。

    ID-based control unit-key fob pairing

    公开(公告)号:US10358113B2

    公开(公告)日:2019-07-23

    申请号:US15337170

    申请日:2016-10-28

    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.

    RESOURCE ACCESS IN A MICROCONTROLLER

    公开(公告)号:US20230076376A1

    公开(公告)日:2023-03-09

    申请号:US17470528

    申请日:2021-09-09

    Abstract: A microcontroller is provided and comprises a central repository, a processing device, and a firewall. Rule repository memory in the central repository stores one or more access rules defining an access permission of a software context to one or more target resources of the microcontroller. The firewall receives a bus transaction initiated based on an instruction and determines whether any access rule stored in memory of the firewall defines the access permission of the software context to a destination resource. If no access rule stored in the firewall memory defines the access permission, the firewall communicates a miss query condition to the central repository. The central repository searches the rule repository memory for an access rule defining the access permission of the software context to the destination resource, and if a related access rule is found, the related access rule is stored in the firewall memory.

    ID-based control unit-key fob pairing

    公开(公告)号:US10857975B2

    公开(公告)日:2020-12-08

    申请号:US16519779

    申请日:2019-07-23

    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.

    Certificate-based pairing of key fob device and control unit

    公开(公告)号:US10293785B2

    公开(公告)日:2019-05-21

    申请号:US16011892

    申请日:2018-06-19

    Abstract: A control unit, in a disclosed embodiment, includes a transceiver, memory, and a processor. The processor is coupled to the transceiver and memory and executes instructions from the memory to cause the control unit to receive a first transmission containing a certificate, verify the authenticity of the certificate, and, after verifying authenticity of the certificate, execute a public key agreement protocol to generate a first common secret encryption key, receive a second transmission containing an encrypted first public key that is encrypted by the first common secret encryption key, decrypt the encrypted first public key using the first common secret encryption key to determine the first public key, execute a public key agreement protocol to generate a second common secret encryption key, generate an operational key, encrypt the operational key using the second common secret encryption key, and transmit the encrypted operational key.

Patent Agency Ranking