1.
    发明专利
    未知

    公开(公告)号:DE602005001167T2

    公开(公告)日:2008-01-24

    申请号:DE602005001167

    申请日:2005-03-24

    Applicant: MOTOROLA INC

    Abstract: An encryption apparatus (200) comprises an elapsed time processor (205) which determines an elapsed time from a transmission of a previous encryption synchronisation message such as a synchronisation initialisation value. Encryption synchronisation messages are transmitted by replacing user data transmissions, e.g. by slot stealing. A priority processor (207) determines a first priority of the current user data transmission and a time threshold function (209) provides a corresponding first time. A transmit unit (201) transmits a new encryption synchronisation message when the elapsed time exceeds the first time threshold. The apparatus (200) further comprises a function controller (211) which is operable to modify the function between the first priority and the first time threshold during the call. The invention is particularly applicable to TETRA and may provide a dynamic trade-off between the speed of encryption re-synchronisation and late entry and the audio quality degradation.

    Decryption for mixed groups of users

    公开(公告)号:GB2418575A

    公开(公告)日:2006-03-29

    申请号:GB0421006

    申请日:2004-09-22

    Applicant: MOTOROLA INC

    Abstract: In a cellular communication system (eg. TETRA), a receiver can continue to decrypt signals despite checksum errors arising from synchronisation verification failures on behalf of transmitters which do not use real time clocks to calculate the checksum. Synchronisation verification values are transmitted via half-slot stealing and verified according to a local time base, and a fall back mode is entered if the verification value is invalid which allows continued communication, perhaps with a warning that it may comprise a replay attack. Synchronisation may proceed on the basis of previously received parameters (eg a flywheel process). This method allows flexible interoperability in mixed groups of transceivers, some of which incorporate real time clocks and some of which don't. Such failures or errors would usually terminate the communication to protect against replay attacks.

    4.
    发明专利
    未知

    公开(公告)号:DE602005001167D1

    公开(公告)日:2007-07-05

    申请号:DE602005001167

    申请日:2005-03-24

    Applicant: MOTOROLA INC

    Abstract: An encryption apparatus (200) comprises an elapsed time processor (205) which determines an elapsed time from a transmission of a previous encryption synchronisation message such as a synchronisation initialisation value. Encryption synchronisation messages are transmitted by replacing user data transmissions, e.g. by slot stealing. A priority processor (207) determines a first priority of the current user data transmission and a time threshold function (209) provides a corresponding first time. A transmit unit (201) transmits a new encryption synchronisation message when the elapsed time exceeds the first time threshold. The apparatus (200) further comprises a function controller (211) which is operable to modify the function between the first priority and the first time threshold during the call. The invention is particularly applicable to TETRA and may provide a dynamic trade-off between the speed of encryption re-synchronisation and late entry and the audio quality degradation.

    5.
    发明专利
    未知

    公开(公告)号:AT363165T

    公开(公告)日:2007-06-15

    申请号:AT05251869

    申请日:2005-03-24

    Applicant: MOTOROLA INC

    Abstract: An encryption apparatus (200) comprises an elapsed time processor (205) which determines an elapsed time from a transmission of a previous encryption synchronisation message such as a synchronisation initialisation value. Encryption synchronisation messages are transmitted by replacing user data transmissions, e.g. by slot stealing. A priority processor (207) determines a first priority of the current user data transmission and a time threshold function (209) provides a corresponding first time. A transmit unit (201) transmits a new encryption synchronisation message when the elapsed time exceeds the first time threshold. The apparatus (200) further comprises a function controller (211) which is operable to modify the function between the first priority and the first time threshold during the call. The invention is particularly applicable to TETRA and may provide a dynamic trade-off between the speed of encryption re-synchronisation and late entry and the audio quality degradation.

    METHOD AND APPARATUS FOR ENFORCING INDEPENDENCE OF PROCESSORS ON A SINGLE IC
    6.
    发明申请
    METHOD AND APPARATUS FOR ENFORCING INDEPENDENCE OF PROCESSORS ON A SINGLE IC 审中-公开
    用于执行处理器在单个IC上的独立性的方法和装置

    公开(公告)号:WO2007030211A3

    公开(公告)日:2007-12-21

    申请号:PCT/US2006028652

    申请日:2006-07-24

    Abstract: A single-chip integrated circuit (100) comprising a first processor (103) for executing a plurality of applications, a second processor (104) for executing a plurality of applications, at least one of a) at least one embedded peripheral (105) and b) at least one memory (106), and a bus monitor (102) for allowing access to the at least one of a) the at least one embedded peripheral (105) and the at least one memory (106), if the access is allowed, wherein the bus monitor (102) comprises a mapping of access rights to the least one of a) the at least one embedded peripheral (105) and b) the at least one memory (106) for the first processor (103) and the second processor (104) is disclosed.

    Abstract translation: 一种单芯片集成电路(100),包括用于执行多个应用的​​第一处理器(103),用于执行多个应用的​​第二处理器(104),至少一个嵌入式外围设备(105) 以及b)至少一个存储器(106)和总线监视器(102),用于允许访问所述至少一个嵌入式外围设备(105)和所述至少一个存储器(106)中的至少一个,如果 允许访问,其中总线监视器(102)包括对至少一个嵌入式外围设备(105)中的至少一个的访问权限的映射,以及b)用于第一处理器(103)的至少一个存储器(106) )和第二处理器(104)。

    METHOD TO CONSTRUCT A HIGH-ASSURANCE IPSEC GATEWAY USING AN UNMODIFIED COMMERCIAL IMPLEMENTATION
    7.
    发明申请
    METHOD TO CONSTRUCT A HIGH-ASSURANCE IPSEC GATEWAY USING AN UNMODIFIED COMMERCIAL IMPLEMENTATION 审中-公开
    使用未经修改的商业实施来构建高保真IPSEC网关的方法

    公开(公告)号:WO2010059341A3

    公开(公告)日:2010-08-12

    申请号:PCT/US2009062003

    申请日:2009-10-26

    CPC classification number: H04L63/0485 H04L63/0263 H04L63/164

    Abstract: A system and method of providing secure communications is provided. Messages are encrypted or decrypted in protected memory of a processor. Outbound messages from a secure network are prepared for encryption by adding a header outside of the protected memory and then encrypted in the protected memory. The encryption is performed by retrieving a key from a key cache as designated by rules in the header. The encrypted message is sent to the unsecure network. An inbound message from an unsecure network that is received in unprotected memory is sent to a decryption module in protected memory. The inbound message is decrypted using a key designated in its header and retrieved from the key cache. The decrypted message is returned to the unprotected memory, where it is stripped of the encryption header and then sent to its destination within the secure network.

    Abstract translation: 提供了提供安全通信的系统和方法。 消息在处理器的受保护的存储器中被加密或解密。 来自安全网络的出站消息通过在受保护的存储器之外添加头部然后在受保护的存储器中加密来准备加密。 通过从标题中的规则指定的密钥缓存中检索密钥来执行加密。 加密的消息被发送到不安全的网络。 在未受保护的存储器中接收到的来自不安全网络的入站消息被发送到受保护存储器中的解密模块。 使用在其报头中指定的并从密钥高速缓存中检索的密钥解密入站消息。 解密的消息被返回到不受保护的存储器,其中它被剥离加密头部,然后在安全网络内发送到其目的地。

    METHOD FOR SECURELY EXCHANGING PUBLIC KEY CERTIFICATES IN AN ELECTRONIC DEVICE
    8.
    发明申请
    METHOD FOR SECURELY EXCHANGING PUBLIC KEY CERTIFICATES IN AN ELECTRONIC DEVICE 审中-公开
    在电子设备中安全地交换公共关键证书的方法

    公开(公告)号:WO2007030213A3

    公开(公告)日:2009-04-23

    申请号:PCT/US2006028721

    申请日:2006-07-24

    CPC classification number: H04L9/3263

    Abstract: A method for securely exchanging public key certificates in an electronic device (400) using a single or dual level of public key includes obtaining a replacement public key certificate (401) to replace an original public key certificate. The replacement public key certificate is signed (403) using the private key of the original public key certificate. The signature of the original public key certificate is validated (407) and the replacement public key certificate is written to memory where the original public key certificate cannot again be used as a default. Thus, the method of the invention uses either a single signature or combination of double signatures to permit transfer of signing authority to an independent third party. Once the original secondary public key is overwritten, the manufacturer's original secondary public key may no longer be used and the process is irreversible.

    Abstract translation: 一种使用单级或双级公开密钥在电子设备(400)中安全地交换公共密钥证书的方法包括获取替换公钥证书(401)以替换原始公开密钥证书。 使用原始公钥证书的私钥对替换公钥证书进行签名(403)。 原始公共密钥证书的签名被验证(407),替换公钥证书被写入到原始公开密钥证书不能被再次用作默认的存储器中。 因此,本发明的方法使用单个签名或双重签名的组合来允许将签名授权转移给独立的第三方。 一旦原始的二级公钥被覆盖,制造商的原始二级公钥可能不再被使用,并且该过程是不可逆转的。

Patent Agency Ranking