Power management for wireless networks
    31.
    发明授权
    Power management for wireless networks 有权
    无线网络的电源管理

    公开(公告)号:US09226240B2

    公开(公告)日:2015-12-29

    申请号:US14094666

    申请日:2013-12-02

    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.

    Abstract translation: 实施例提供了无线网络中设备电源管理的技术。 例如,设备可以包括电源管理模块和收发器模块。 电源管理模块确定信标间隔和唤醒间隔。 收发器模块向包括信标间隔和唤醒间隔的一个或多个远程设备发送传输。 信标间隔指示设备的连续信标传输之间的时间间隔,并且唤醒间隔指示设备从对等设备接收两个连续的信标之间的时间间隔。

    TECHNIQUES FOR EXTENDING COMMUNICATIONS CHAIN OF TRUST TO CLIENT APPLICATIONS
    32.
    发明申请
    TECHNIQUES FOR EXTENDING COMMUNICATIONS CHAIN OF TRUST TO CLIENT APPLICATIONS 审中-公开
    扩大通信链条的客户应用技术

    公开(公告)号:US20150358320A1

    公开(公告)日:2015-12-10

    申请号:US14369219

    申请日:2013-11-26

    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.

    Abstract translation: 各种实施例通常涉及在两个计算设备之间形成安全通信的技术,其中这些通信的信任链被扩展到由两个计算设备之一执行的特定应用程序。 一种装置包括处理器组件; 验证组件,用于验证从服务器接收到的链接认证凭证,以验证服务器形成安全流水线的能力,以及通过验证组件的验证结果的指示来向应用程序发信号; 以及散列组件,用于生成与所述应用程序相关联的返回签名的返回散列,以向所述服务器指示所述应用程序也已验证所述链接证明凭证以在所述服务器和所述应用程序之间形成所述安全流水线。 描述和要求保护其他实施例。

    System and method for correct execution of software based on a variance between baseline and real time information
    33.
    发明授权
    System and method for correct execution of software based on a variance between baseline and real time information 有权
    基于基线和实时信息之间的差异来正确执行软件的系统和方法

    公开(公告)号:US09146833B2

    公开(公告)日:2015-09-29

    申请号:US13722158

    申请日:2012-12-20

    CPC classification number: G06F11/3636 G06F8/70 G06F11/36 G06F11/3616

    Abstract: In an embodiment a software application may include a “baseline trace” indicating proper application execution. The baseline trace may include counts for various types of instructions (e.g., how many times each of a LR instruction and a MV instruction occurs during an execution of code). The finished application includes the baseline trace. Upon execution the application randomly selects which of the various types of instructions to count during execution (e.g., LR or MV instruction) to produce a “real time trace”. The application executes and produces the real-time trace. The baseline trace is then compared to the real-time trace, which is specific to the randomly chosen type of instruction. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are described herein.

    Abstract translation: 在一个实施例中,软件应用可以包括指示正确应用执行的“基线迹线”。 基线迹线可以包括各种类型的指令的计数(例如,在执行代码期间,LR指令和MV指令的每一个发生多少次)。 完成的应用程序包括基线轨迹。 一旦执行,应用程序随机选择在执行期间计数各种类型的指令(例如,LR或MV指令)以产生“实时跟踪”。 应用程序执行并产生实时跟踪。 然后将基线轨迹与随机选择的指令类型特有的实时跟踪进行比较。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 本文描述了其它实施例。

    Power Management for Wireless Networks

    公开(公告)号:US20210352584A1

    公开(公告)日:2021-11-11

    申请号:US17210856

    申请日:2021-03-24

    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.

    Technologies for secure bootstrapping of virtual network functions
    38.
    发明授权
    Technologies for secure bootstrapping of virtual network functions 有权
    用于安全引导虚拟网络功能的技术

    公开(公告)号:US09578008B2

    公开(公告)日:2017-02-21

    申请号:US14709170

    申请日:2015-05-11

    Abstract: Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function (VNF) bootstrap service (VBS) in secure network communication with a VBS agent of a VNF instance. The VBS agent is configured to execute a secure VNF bootstrap capture protocol in the NFV network architecture. Accordingly, the VBS agent can be configured to register with the VBS via secure communications transmitted between the VBS and the VBS agent. The secure communications include transmitting a security quote from a TEE of a platform on which the VNF instance is instantiated and a security credential request to the VBS, as well as receiving a security credential in response to validating the security quote and the security credential request. Other embodiments are described and claimed.

    Abstract translation: 在网络功能虚拟化(NFV)网络架构中引导虚拟网络功能的技术包括与VNF实例的VBS代理进行安全网络通信的虚拟网络功能(VNF)引导服务(VBS)。 VBS代理被配置为在NFV网络架构中执行安全的VNF引导捕获协议。 因此,VBS代理可以被配置为通过在VBS和VBS代理之间传输的安全通信来向VBS注册。 安全通信包括从VBS实例的平台的TEE发送安全报价以及向VBS发送安全凭证请求,以及响应于验证安全报价和安全凭证请求而接收安全凭证。 描述和要求保护其他实施例。

    Cryptographic key generation based on multiple biometrics
    39.
    发明授权
    Cryptographic key generation based on multiple biometrics 有权
    基于多个生物特征的加密密钥生成

    公开(公告)号:US09407435B2

    公开(公告)日:2016-08-02

    申请号:US14126469

    申请日:2013-09-30

    CPC classification number: H04L9/0866 G06F21/60

    Abstract: In an embodiment, an apparatus includes a processor including a first core. The first core includes multi-biometric logic to output first biometric data wi (i=1 to n, n≧2), each wi determined based on a corresponding one of first biometric input Mi (i=1 to n, n≧2) received during a first time period. The apparatus also includes setup logic to transform a cryptographic key k via a transformation that uses the first biometric data wi, where transformation of the cryptographic key k results in output of helper data hi (i=1 to n). Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,一种装置包括包括第一核的处理器。 第一核心包括用于输出第一生物特征数据wi(i = 1至n,n≥2)的多生物统计学逻辑,每个wi基于第一生物特征输入Mi(i = 1至n,n≥2)中相应的一个确定, 在第一时期收到。 该装置还包括通过使用第一生物特征数据wi的变换来加密密钥k的设置逻辑,其中密码密钥k的变换导致帮助数据hi(i = 1至n)的输出。 描述和要求保护其他实施例。

    Method of anonymous entity authentication using group-based anonymous signatures
    40.
    发明授权
    Method of anonymous entity authentication using group-based anonymous signatures 有权
    使用基于组的匿名签名的匿名实体身份验证方法

    公开(公告)号:US09344284B2

    公开(公告)日:2016-05-17

    申请号:US14077772

    申请日:2013-11-12

    Abstract: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).

    Abstract translation: 提出匿名认证和密钥交换的方法。 在一个实施例中,一种方法包括在第一实体和第二实体之间发起双向相互认证。 执行验证后,第一个实体对第二个实体保持匿名。 该方法还包括建立相互共享的会话密钥,用于实体之间的安全通信,其中启动和建立结合直接匿名认证(DAA)。

Patent Agency Ranking