摘要:
Disclosed is a method, system and apparatus for transferring protected data having an authorizing entity's outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier. A central unit includes a receiver configured to receive from the first electronic device protected data having an authorizing entity's first outer encryption layer corresponding to the first unique, unalterable identifier and having a user-fixed inner encryption layer; a processor configured to decrypt the authorizing entity's first outer encryption layer of the protected data; a processor configured to encrypt an authorizing entity's second outer encryption layer of the protected data corresponding to the second unique, unalterable identifier; and a transmitter configured to transmit protected data to the second electronic device.
摘要:
A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
摘要:
A vehicle maintains a record of configuration elements, such as components for use in the vehicle, of the configuration of the vehicle. The vehicle also maintains a history of configuration functions for each of the configuration elements. The history may include a type of each configuration function, such as installation of a configuration element into the vehicle, and may also include a record of corresponding times at which the configuration functions have occurred, which can be utilized to determine a configuration of the vehicle at a time of an event. Additionally or alternatively, the vehicle may maintain a service history of at least one service technician performing a service operation with respect to a corresponding one of the configuration elements. The service history may include a type of each service operation, and may also include a record of a corresponding time at which the service technician performed the service operation, which may be utilized to determine a service technician having most recently performed a service operation at a time of an event.
摘要:
A communication network (10) includes any number of interconnected nodes (20), including a sending node (22), a sending gateway (24), a receiving gateway (26), and a destination node (28). A low capacity or expensive communication channel (30) resides between the sending and receiving gateways (24, 26). An original digitally signed message is sent from the sending node (22) toward the destination node (28). When the original message arrives at the sending gateway (24), the original signature is verified. If verified, the sending gateway (24) shrinks the original message into a reduced message and re-signs the message with a gateway digital signature before sending the message onward through the communication channel (30) toward the destination node (28). The destination node (28) verifies the gateway digital signature against the reduced message and is not required to de-compress the reduced message into a precise duplicate of the original message.
摘要:
A soft logic cryptographic circuit that can be reprogrammed with various cipher algorithms. The cryptographic circuit can be manufactured in a non-secure environment because a security sensitive cipher algorithm can be programmed after the manufacturing process.
摘要:
A system and method for accessing digital content purchased by a rights owner for a first computing device. The method receives a proxy from the rights owner that includes rights to the digital content granted to the rights owner, stores the proxy on a second computing device, and determines whether the rights owner is present at the second computing device. When the rights owner is present at the second computing device, the method enables the proxy, and accesses the digital content on the second computing device through the proxy.
摘要:
A system and method to securely create, distribute, install and execute selected features of software on wireless devices combines three different types of licenses, a validation license, a digital rights management (DRM) license, and a feature license with a software application. Each of these three licenses work independent of each other, where the validation license helps prevent malicious code from executing on wireless devices, the DRM license prevents unauthorized copying of the software application and the feature license securely enables or disables specific features of the software application. The system also allows a wireless device to unwrap a DRM protected software application, to validate the software application, to enforce DRM usage rules and to execute selected features of the software application.
摘要:
A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.
摘要:
A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.
摘要:
Apparatus in form of a microelectronic assembly including an integrated circuit (IC) for execution of an embedded modular exponentiation program utilizing a square-and-multiply algorithm, wherein in the modular exponentiation program a secret exponent having a plurality of bits characterizes a private key, a method of providing a digital signature to prevent the detection of the secret exponent when monitoring power variations during the IC execution, the method comprising the steps of for a first operation in the modular exponentiation, selecting at least one predetermined bit, wherein the at least one predetermined bit is a bit other than a least significant bit (LSB) and the most significant bit (MSB); using the square-and-multiply algorithm, sequentially selecting bits to the left of the at least one predetermined bit for exponentiation until the MSB is selected; subsequent to selecting the MSB, sequentially selecting bits to the right of the at least one predetermined bit for exponentiation until the LSB is selected.