Methods and apparatus to provide for efficient and secure software updates

    公开(公告)号:US10715335B2

    公开(公告)日:2020-07-14

    申请号:US16026657

    申请日:2018-07-03

    Abstract: In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs.

    Power Management for Wireless Networks
    22.
    发明申请

    公开(公告)号:US20190342835A1

    公开(公告)日:2019-11-07

    申请号:US15911540

    申请日:2018-03-05

    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.

    Technologies for CCM encryption with 64-bit block ciphers

    公开(公告)号:US10404468B2

    公开(公告)日:2019-09-03

    申请号:US15351606

    申请日:2016-11-15

    Abstract: Technologies for counter with CBC-MAC (CCM) mode encryption include a computing device that performs a CBC-MAC authentication operation on a message with an encryption key, using a 64-bit block cipher to generate a message authentication code. The computing device generates a first 64-bit authentication block including an 8-bit flag field and a length field of between 11 and 32 bits. The flag field indicates the length of the length field. Performing the CBC-MAC authentication operation includes formatting the message into one or more 64-bit authentication blocks. The computing device performs a counter mode encryption operation on the message with the encryption key using the 64-bit block cipher to generate a cipher text. Performing the counter mode encryption includes generating multiple 64-bit keystream blocks. The computing device generates an authentication tag based on the message authentication code and a first keystream block of keystream blocks. Other embodiments are described and claimed.

    Techniques for extending communications chain of trust to client applications

    公开(公告)号:US10187385B2

    公开(公告)日:2019-01-22

    申请号:US14369219

    申请日:2013-11-26

    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.

    System, Apparatus And Method For Key Provisioning Delegation

    公开(公告)号:US20170272415A1

    公开(公告)日:2017-09-21

    申请号:US15070166

    申请日:2016-03-15

    CPC classification number: H04L63/061 H04L63/0807 H04L63/0884 H04W12/06

    Abstract: In one embodiment, a computing device includes at least one hardware processor to execute instructions, a network interface to enable communication with a second computing device and a third computing device, and at least one storage medium. Such medium may store instructions that when executed by the computing device enable the computing device to request delegation of a key provisioning privilege for the second computing device from the third computing device via a parent-guardian delegation protocol comprising a three-party key distribution protocol with the second computing device and the third computing device, the three-party key distribution protocol having interposed therein a two-party authenticated key exchange protocol between the computing device and the third computing device. Other embodiments are described and claimed.

    Barcode authentication for resource requests
    29.
    发明授权
    Barcode authentication for resource requests 有权
    资源请求的条形码验证

    公开(公告)号:US09378352B2

    公开(公告)日:2016-06-28

    申请号:US13763116

    申请日:2013-02-08

    Abstract: Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and a token extractor. The token extractor may be coupled to the camera and configured to analyze an image, captured by the camera. The captured image may contain a barcode and may be displayed on a client device in response to a request of a server for access to a resource. The barcode may contain a token, which may be extracted by the token extractor to be used to gain access to a resource requested from a server. Other embodiments may be described and/or claimed.

    Abstract translation: 描述了与客户机 - 服务器认证相关联的移动设备,客户端设备和服务器。 在实施例中,移动设备可以包括相机和令牌提取器。 令牌提取器可以耦合到相机并且被配置为分析由相机捕获的图像。 捕获的图像可以包含条形码,并且可以响应于服务器访问资源的请求而在客户端设备上显示。 条形码可以包含令牌,其可以由令牌提取器提取以被用于获得对从服务器请求的资源的访问。 可以描述和/或要求保护其他实施例。

Patent Agency Ranking