Efficient provisioning of devices

    公开(公告)号:US10440122B2

    公开(公告)日:2019-10-08

    申请号:US15200450

    申请日:2016-07-01

    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums that provide for the configuration and provisioning of computing devices. In particular, computing devices with limited user interfaces, such as some IoT devices. The functionality of the IoT devices is thus improved to allow for more efficient, more secure, and faster configuration.

    Registration of devices in secure domain

    公开(公告)号:US10575273B2

    公开(公告)日:2020-02-25

    申请号:US15087106

    申请日:2016-03-31

    Abstract: Embodiments are directed to enrollment of an endpoint device in a secure domain. An enrollment request is sent to a delegated registrar (DR) device to initiate a trust-establishment procedure with the DR device to establish initial connectivity and an initial symmetric key to be shared between the DR and the endpoint device. The DR device provides to the endpoint device limited-use credentials for group-access key establishment, and group connectivity parameters for accessing a group administrator (GA) device. The endpoint device and the GA device perform a group-enrollment procedure in which the endpoint device provides the limited-use credentials to the GA device and receives, from the GA device, the group-access key.

    EFFICIENT PROVISIONING OF DEVICES

    公开(公告)号:US20210084106A1

    公开(公告)日:2021-03-18

    申请号:US17109341

    申请日:2020-12-02

    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums that provide for the configuration and provisioning of computing devices. In particular, computing devices with limited user interfaces, such as some IoT devices. The functionality of the IoT devices is thus improved to allow for more efficient, more secure, and faster configuration.

    EFFICIENT CRYPTOGRAPHICALLY SECURE CONTROL FLOW INTEGRITY PROTECTION

    公开(公告)号:US20180183574A1

    公开(公告)日:2018-06-28

    申请号:US15392324

    申请日:2016-12-28

    Abstract: Embodiments include a computing processor control flow enforcement system including a processor, a block cipher encryption circuit, and an exclusive-OR (XOR) circuit. The control flow enforcement system uses a block cipher encryption to authenticate a return address when returning from a call or interrupt. The block cipher encryption circuit executes a block cipher encryption on a first number including an identifier to produce a first encrypted result and executes a block cipher encryption on a second number including a return address and a stack location pointer to produce a second encrypted result. The XOR circuit performs an XOR operation on the first encrypted result and the second encrypted result to produce a message authentication code tag.

Patent Agency Ranking