US20170076106A1 - Apparatus and method to securely control a remote operation - Google Patents

Apparatus and method to securely control a remote operation Download PDF

Info

Publication number
US20170076106A1
US20170076106A1 US14/856,299 US201514856299A US2017076106A1 US 20170076106 A1 US20170076106 A1 US 20170076106A1 US 201514856299 A US201514856299 A US 201514856299A US 2017076106 A1 US2017076106 A1 US 2017076106A1
Authority
US
United States
Prior art keywords
password
software operation
software
secret key
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/856,299
Inventor
Ron Keidar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to US14/856,299 priority Critical patent/US20170076106A1/en
Assigned to QUALCOMM INCORPORATED reassignment QUALCOMM INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KEIDAR, RON
Priority to PCT/US2016/047833 priority patent/WO2017048458A1/en
Priority to CN201680051484.XA priority patent/CN108027865A/en
Publication of US20170076106A1 publication Critical patent/US20170076106A1/en
Priority to US15/486,673 priority patent/US9973485B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Definitions

  • the present invention relates to an apparatus and method to securely control a remote operation.
  • the device may comprise: a processor to transmit a software operation including an operation parameter; and a security verification device.
  • the security verification device may be coupled to the processor and may be configured to: receive a secret key selection and a first password; select a secret key; receive the software operation including the operation parameter; and implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter. Further, the security verification device may be configured to determine if the second password matches the first password, and if so, authorize the performance of the software operation.
  • FIG. 1 is a diagram of a computing device in which embodiments may be practiced.
  • FIG. 2 is a diagram of a system in which embodiments may be practiced.
  • FIG. 3A is a diagram of a system to implement the security verification device including a key derivation function (KDF) device.
  • KDF key derivation function
  • FIG. 3B is a diagram illustrating examples of software operations and operation parameters.
  • FIG. 4 is a diagram of system to generate a new secret key.
  • computing system may be used interchangeably and may refer to any form of computing device including but not limited to laptop computers, tablets, smartphones, televisions, desktop computers, home appliances, cellular telephones, watches, wearable devices, Internet of Things (IoT) devices, personal television devices, personal data assistants (PDA's), palm-top computers, wireless electronic mail receivers, multimedia Internet enabled cellular telephones, Global Positioning System (GPS) receivers, wireless gaming controllers, receivers within vehicles (e.g., automobiles), interactive game devices, notebooks, smartbooks, netbooks, mobile television devices, system on a chip (SoC), or any computing device or data processing apparatus.
  • GPS Global Positioning System
  • SoC system on a chip
  • FIG. 1 An example device 100 (hereinafter referred to as a computing device) that may utilize a security verification device 112 to securely activate or revoke software operations, as will be hereinafter described in detail, is illustrated in FIG. 1 .
  • the computing device 100 is shown comprising hardware elements that can be electrically coupled via a bus 105 (or may otherwise be in communication, as appropriate).
  • the hardware elements may include one or more processors 102 , including without limitation one or more general-purpose processors and/or one or more special-purpose processors (such as digital signal processing chips, graphics acceleration processors, and/or the like); one or more input devices 115 (e.g., keyboard, keypad, touchscreen, mouse, etc.); one or more output devices 122 , such as a display device 120 , and can further include without limitation other output devices, such as, a speaker, a printer, and/or the like. Additionally, computing device 100 may include a wide variety of sensors 123 .
  • Sensors 123 may include: a clock, an ambient light sensor (ALS), a biometric sensor (e.g., blood pressure monitor, etc.), an accelerometer, a gyroscope, a magnetometer, an orientation sensor, a fingerprint sensor, a weather sensor (e.g., temperature, wind, humidity, barometric pressure, etc.), a Global Positioning Sensor (GPS), an infrared (IR) sensor, a proximity sensor, near field communication (NFC) sensor, a microphone, a camera.
  • ALS ambient light sensor
  • a biometric sensor e.g., blood pressure monitor, etc.
  • an accelerometer e.g., a gyroscope, a magnetometer, an orientation sensor, a fingerprint sensor, a weather sensor (e.g., temperature, wind, humidity, barometric pressure, etc.), a Global Positioning Sensor (GPS), an infrared (IR) sensor, a proximity sensor, near field communication (NFC) sensor, a microphone, a camera
  • the computing device 100 may further include (and/or be in communication with) one or more non-transitory storage devices 125 , which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable, and/or the like.
  • RAM random access memory
  • ROM read-only memory
  • Such storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
  • the computing device 100 may also include a communication subsystem and/or interface 130 , which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a Bluetooth device, an 802.11 device, a Wi-Fi device, a WiMax device, cellular communication devices, etc.), and/or the like.
  • the communications subsystem and/or interface 130 may permit data to be exchanged with a network, other computer systems, and/or any other devices described herein.
  • the computing device 100 will further comprise a working memory 135 , which can include a RAM or ROM device, as described above.
  • the computing device 100 may also comprise firmware elements, software elements, shown as being currently located within the working memory 135 , including an operating system 140 , applications 145 , device drivers, executable libraries, and/or other code.
  • an application may be designed to implement methods, and/or configure systems, to implement embodiments, as described herein.
  • code and/or instructions can be used to configure and/or adapt a computing device 100 to perform one or more operations in accordance with the described methods, according to embodiments described herein.
  • a set of these instructions and/or code might be stored on a non-transitory computer-readable storage medium, such as the storage device(s) 125 described above.
  • the storage medium might be incorporated within a computer system, such as computing device 100 .
  • the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure, and/or adapt a general purpose computer with the instructions/code stored thereon.
  • These instructions might take the form of executable code, which is executable by the computerized computing device 100 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computing device 100 (e.g., using any of a variety of generally available compilers, installation programs, compression/decompression utilities, etc.), then takes the form of executable code.
  • security verification device 112 may be utilized by computing device 100 to securely authorize or revoke software operations from a processor 102 .
  • the security verification device 112 may implement a key derivation function (KDF) device and may perform an atomic operation that performs at least three operations: 1) Selecting a KDF input to the KDF device; 2) Including the software command ID in the KDF input so that it is impossible to attack one operation using another operation; and 3) setting the output of the security verification device 112 to include the software command to be performed by the requesting processor.
  • KDF key derivation function
  • the security verification device 112 either authorizes or revokes the software operation of the requesting processor.
  • computing device 100 may comprise a plurality of processors 102 and a security verification device 112 coupled together via bus 105 .
  • a plurality of hardware attributes 202 may be coupled to the security verification device 112 via bus 105 .
  • These hardware attributes may include: a secret key 204 ; a device key 206 ; and a master identifier (MID) 208 .
  • the secret key 204 and device key 206 may be implemented as one time programmable (OTP) memories.
  • the secret key 204 may be implemented as resistor transistor logic (RTL), ROM, or any suitable type of storage device to store a secret key.
  • MID 208 may be an identifier of a commanding processor 102 that is transmitting a software operation including an operation parameter, as well as, one or more commands to be performed, as will be described. It should be appreciated that there may be multiple secret keys, device keys, MIDs, etc.
  • a processor 102 may transmit a software operation 210 to be performed to the security verification device 112 .
  • the software operation 210 may include a plurality of commands.
  • a processor 102 may transmit a software operation 210 to the security verification device 112 that includes an operation parameter and a first password to the security verification device 112 .
  • the security verification device 112 is configured to receive a secret key selection from the software operation. Based upon the secret key selection, the security verification device 112 selects a secret key 204 from the hardware attributes 202 . The security verification device 112 additionally receives the operation parameter from the processor 102 .
  • the security verification device 112 is configured to implement a key derivation function (KDF) to generate a second password based upon the selected secret key 204 and the software operation 210 including the operation parameter.
  • KDF key derivation function
  • the security verification device 112 determines if the second password matches the first password, and, if so, the security verification device 112 authorizes the performance of the software operation. In this way, the commands of the software operation may be authorized to be performed by the processor 102 . However, if the security verification device 112 determines that the second password does not match the first password, the performance of the software operation is revoked.
  • the second password may be referred to as the hardware password as it is generated by the security verification device 112 and the first password may be referred to as the command password as it generated by the software.
  • the terms hardware password and command password will be utilized.
  • the security verification device 112 is configured to determine if the hardware password matches the command password, such that that the software operation 210 is authorized for execution by the processor 102 , within a single atomic operation. Also, it should be appreciated that the security verification device 112 is configured to receive and provide routing information for the execution of the commands of the software operation, within a single atomic operation.
  • a master identifier (MID 208 ) identifying the commanding processor 102 that is transmitting the software operation 210 and the operation parameter is transmitted via bus 105 to the security verification device 112 .
  • the security verification device 112 is configured to: implement a key derivation function to generate a hardware password (e.g., the second password) based upon the selected secret key 204 , the MID 208 , and the software operation 210 including the operation parameter.
  • the security verification device 112 is configured to determine if the hardware password (e.g., the second password) matches the command password (e.g., the first password) of the commanding processor 102 , and, if so, the performance of the software operation 210 is authorized for execution by the commanding processor 102 . Alternatively, if the hardware password does not match the command password, the software operation 210 is revoked. Also, the security verification device 112 is configured to receive and provide routing information for the software operation including at least routing information for the commanding processor 102 and routing information for the software, as well as other types of hardware and software routing information. Therefore, the routing information includes hardware destination routing information and software destination routing information,
  • the software operation 210 triggers a sequence of hardware operations in which hardware inputs are selected to be utilized by the security verification device 112 and software inputs are set as inputs to the hardware of the security verification device 112 , including the commands themselves, the command password, etc.
  • the operation parameter is set as both an input to the KDF device of the security verification device 112 for authentication and as part of the software operation 210 that can be authorized to be performed if the command password is authenticated and approved.
  • the software operation 210 may be authenticated and approved for execution by the commanding processor 102 .
  • KDF output routings e.g., software and hardware destinations
  • password pass/fail routings are set as software inputs to the hardware of the security verification device 112 .
  • the software operation 210 is either approved or revoked (e.g., if the passwords of the hardware and software match or do not match). If the command password is approved by the security verification device 112 , the software operation 210 is approved and the commands are routed back to the commanding processor 102 for execution, and if not, the software operation 210 is revoked, and the commands are rejected and not allowed to be executed by the commanding processor 102 . In this manner, the operation parameter of the software operation 210 is utilized as an input to the KDF device such that the hardware password is tied to a pre-defined operation parameter and is utilized in the password approval or disapproval process. Also, the MID is used as a hardware indication of the commanding processor 102 and serves as an input to the KDF device (e.g., different results for different commanding processors) and the commands can be routed back to the commanding processor.
  • the main hardware component being the security verification device 112 including a KDF device. All of the decisions are linked together so that the software needs little protection while the hardware of the security verification device 112 may prevent attacks. Also, the security verification device 112 decides on routing and keys based upon the commanding processor 102 —removing the need for access control. Additionally, the atomicity of all of the above operations into one software operation 210 , makes the security verification device 112 an extremely powerful tool to perform many operations. In particular, this implementation replaces many previous security solutions.
  • a system 300 to implement the security verification device 112 including a key derivation function (KDF) device 307 is shown. It should be noted that functions implemented by hardware are in dashed lines and functions implemented by software are in solid lines.
  • KDF key derivation function
  • a commanding processor 102 may transmit a software operation 210 to the hardware components of the security verification device 112 .
  • the software operation 210 may include an operation parameter 212 .
  • the operation parameter may include particular parameters associated with the software operation.
  • MID 208 identifying the commanding processor 102 may be transmitted via the bus.
  • the software operation 210 may include a command that is being requested to be performed by the commanding processor 102 based upon authorization by the security verification device 112 .
  • the software operation 210 may transmit an input selection to a hardware data selector 306 to select a secret key 204 . It should be appreciated that the input selection may select a particular secret key 204 and/or other device keys 206 that are selected by hardware data selector 306 . Further, software operation 210 includes data input to a key derivation function (KDF) device 307 . The data input includes the software command itself and the operation parameter.
  • KDF key derivation function
  • KDF device 307 Based upon this data input and the secret key selection, KDF device 307 implements a key derivation function to generate a hardware password based upon the selected secret key and the software operation 210 , operation parameter 212 , and the MID 208 .
  • the hardware password of KDF device 307 is transmitted through hardware data selection router 308 as hardware password 320 to a hardware comparator 330 .
  • security verification device 112 compares the hardware password 320 to the command password 214 transmitted by the software operation 210 utilizing the hardware comparator 330 . If comparator 330 determines that the hardware password 320 matches the command password 214 , then the password pass/fail decision routing device 332 selects the perform operation selector 350 , which allows for authorization of the software operation 210 such that the software operation 210 is allowed to be executed by the commanding processor 102 . In this way, the software operation 210 is approved or authenticated by the security verification device 112 and is transmitted back to the commanding processor 102 for execution.
  • the password pass/fail decision routing device 332 selects the revoke operation selector 352 , which revokes the authentication of the software operation 210 .
  • the software operation 210 is revoked by the security verification device 112 such that the requested software operation 210 by the commanding processor 102 is not allowed and is terminated.
  • hardware data selection router 308 of the security verification device 112 based upon received output routing data from the software operation 210 may further include software destinations (1 . . . n) 310 and hardware destinations (1 . . . n) 312 for the commands from the commanding processor 102 . Therefore, if the software operation 210 is approved, various software destinations and/or hardware destinations utilized by the commands may be routed. It should be appreciated that such destinations may include processors, memory, software, firmware, sensors, or any software or hardware component.
  • Examples 390 of software operations may include: key activation; key revocation; debug re-enable; feature activation; and feature deactivation.
  • the operation parameters or parameters may be the index or bitmap of the predefined keys to activate or revoke.
  • the operation parameters or parameters may include a list of debug or monitoring facilities to re-enable.
  • the operation parameters or parameters may be the list of product features to activate or deactivate.
  • Examples of these features for activation or deactivation may include: The number of CPU cores to be utilized and/or their maximum operation frequencies (MHz); Various performance points for Graphic Processor Units GPUs; Various radio interfaces (e.g., Bluetooth, WiFi, Cellular, etc.); The settings for maximum resolution supportable by a video player or camera and/or other related features, such as, frame per second, color depth and dynamic brightness range. Further, example features for activation or deactivation may apply to the device that incorporates the chip (e.g., a SoC), such as: Automotive—the Horse Power the engine can generate; Drones—the upper height limit and distance the Drone may go, etc. It should be appreciated that these are just examples of software operations and corresponding operation parameters and that any suitable software operation may be securely controlled and implemented. Further, it should be appreciated that any type of software operation may be securely controlled remotely utilizing embodiment disclosed herein.
  • a SoC SoC
  • the software operation 210 triggers a sequence of hardware operations in which hardware inputs are selected to be utilized by the security verification device 112 and software inputs are set as inputs to the hardware of the security verification device 112 including the software operation 210 itself and the operation parameter 212 , as well as, the MID 208 .
  • the operation parameter 212 is set as both an input to the KDF device 307 of the security verification device 112 for authentication purposes, and, as an operation parameter for the software operation 210 to be performed, if the command password 214 is authenticated and approved—in which case the software operation 210 is authenticated and approved for execution by the commanding processor 102 (e.g., perform operation 350 ).
  • KDF output routings e.g., software and hardware destinations 310 and 312
  • password pass/fail routings are set as software inputs to the hardware of the security verification device 112 .
  • the software operation 210 is either approved or revoked by the hardware (e.g., if the passwords of the hardware and software match or do not match at the hardware comparator 330 ).
  • the password pass/fail decision routing device 332 selects the perform operation selector 350 , which allows for authorization of the software operation 210 such that the software operation 210 is allowed to be executed by the commanding processor 102 . In this way, the software operation 210 is approved or authenticated by the security verification device 112 and is transmitted back to the commanding processor 102 for execution.
  • the password pass/fail decision routing device 332 selects the revoke operation selector 352 , which revokes the authentication of the software operation 210 .
  • the software operation 210 is revoked by the security verification device 112 such that the requested software operation 210 by the commanding processor 102 is not allowed and is terminated.
  • the operation parameter 212 is utilized as an input to the KDF device 307 such that the hardware password 320 is tied to a pre-defined operation parameter 212 and is utilized in the password approval or disapproval process.
  • the MID 208 is used as a hardware indication of the commanding processor 102 and serves as an input to the KDF device 307 (e.g., different results for different commanding processors) and the commands can be routed back to the commanding processor 120 .
  • software is enabled to do many operations at the hardware level with a very small chipset fingerprint (e.g., the main hardware component being the security verification device 112 including the KDF device 307 ). All of the decisions are linked together so that the software needs little protection while the hardware of the security verification device 112 may prevent attacks.
  • the security verification device 112 decides on routing and keys based upon the commanding processor 102 —removing the need for access control.
  • the atomicity of all of the above operations into one software operation 210 makes the security verification device 112 an extremely powerful tool to perform many operations. In particular, this implementation replaces many previous security solutions.
  • the secret key 204 may be based upon a wrapped secret key that is generated and transmitted from a server 402 to the computing device 100 , as a wrapped secret key 408 .
  • a first software operation 210 by processor 102 of the computing device may command a new secret key from a server 402 .
  • the new secret key 204 may be generated at the server 402 , but may be transmitted as a wrapped secret key 408 to the computing device 100 .
  • the server 402 repeating the KDF calculation 403 , generates a new secret key 204 for the computing device 100 that is transmitted as wrapped secret key 408 , such that the computing device 100 may generate the secret key 204 , based upon the KDF device 307 of the computing device 100 , utilizing only the wrapped secret key 408 .
  • the wrapped key implementation provides a method in which the new secret key is not exposed in delivery or even to the computing device's software.
  • a software operation 210 of the computing device 100 may request a new secret key from the server 402 .
  • computing device 100 may transmit a new secret key request through communication interface 130 (e.g., a transceiver) to server 402 .
  • server 402 may request an identifier of the computing device 100 , such as, the computing device's 100 serial number (S/N) and/or original equipment manufacturer ID (OEM_ID) 406 .
  • Computing device 100 may then transmit its SN and OEM_ID 406 to server 402 .
  • server 402 may include an appropriate processor, memory, transceiver, etc., to implemented the previous and hereinafter described functionality.
  • server 403 implements a KDF calculation 403 that is similar/linked and/or the same as the KDF calculation of KDF 307 of the computing device 100 , to implement this functionality.
  • server 402 may generate a new secret key 204 utilizing KDF calculation 403 .
  • server 402 utilizing KDF calculation 403 may generate a new secret key 204 .
  • the new secret key 204 may be generated by a key derivation function of at least the wrapped secret key, the S/N of the computing device 100 , and the OEM_ID of the computing device 100 .
  • server 402 may transmit the wrapped secret key 408 to the computing device 100 .
  • only the wrapped secret key 408 may be transmitted to the computing device.
  • new secret key 204 itself is not transmitted (e.g., only the wrapped secret key).
  • the processor 102 of computing device 100 commands a second software operation 210 to the KDF 307 to unwrap the wrapped secret key 408 .
  • the KDF 307 of the computing device 100 generates an unwrapped secret key 204 , based upon the received wrapped key 408 , along with the known S/N and OEM_ID, and via hardware router 308 and bus 411 , transmits the new secret key 204 for storage in a storage device (see FIG. 3A ).
  • the secret key 204 may be stored in OTP, ROM, etc.
  • This secret key 204 may then be utilized by software operations for further commands and function, as previously described in detail. It should be appreciated that other factors such as the ID of the command processor, global keys, etc., may be utilized as additional KDF inputs. In this way, a secret key may be sent over the air (OTA) in a secure and low cost fashion.
  • the new secret key may be generated and transmitted at any instance when computing device 100 requests a new secret key from server 402 .
  • the wrapped key implementation provides a method in which the new secret key is not exposed in delivery or even to the computing device's software.
  • processors e.g., processor 102
  • the devices e.g., computing device 100
  • circuitry of the devices may operate under the control of a program, routine, or the execution of instructions to execute methods or processes in accordance with embodiments of the invention (e.g., the processes and functions of FIGS. 2-4 ).
  • a program may be implemented in firmware or software (e.g. stored in memory and/or other locations) and may be implemented by processors and/or other circuitry of the devices.
  • the terms device, processor, microprocessor, circuitry, controller, SoC, etc. refer to any type of logic or circuitry capable of executing logic, commands, instructions, software, firmware, functionality, etc.
  • the devices are wireless devices that they may communicate via one or more wireless communication links through a wireless network that are based on or otherwise support any suitable wireless communication technology.
  • the wireless device and other devices may associate with a network including a wireless network.
  • the network may comprise a body area network or a personal area network (e.g., an ultra-wideband network).
  • the network may comprise a local area network or a wide area network.
  • a wireless device may support or otherwise use one or more of a variety of wireless communication technologies, protocols, or standards such as, for example, 3G, LTE, Advanced LTE, 4G, 5G, CDMA, TDMA, OFDM, OFDMA, WiMAX, and WiFi.
  • a wireless device may support or otherwise use one or more of a variety of corresponding modulation or multiplexing schemes.
  • a wireless device may thus include appropriate components (e.g., air interfaces) to establish and communicate via one or more wireless communication links using the above or other wireless communication technologies.
  • a device may comprise a wireless transceiver with associated transmitter and receiver components (e.g., a transmitter and a receiver) that may include various components (e.g., signal generators and signal processors) that facilitate communication over a wireless medium.
  • a wireless device may therefore wirelessly communicate with other mobile devices, cell phones, other wired and wireless computers, Internet web-sites, etc.
  • the teachings herein may be incorporated into (e.g., implemented within or performed by) a variety of apparatuses (e.g., devices).
  • a phone e.g., a cellular phone
  • PDA personal data assistant
  • a tablet e.g., a wearable device
  • IoT Internet of Things
  • mobile computer e.g., a laptop computer
  • an entertainment device e.g., a music or video device
  • a headset e.g., headphones, an earpiece, etc.
  • a medical device e.g., a biometric sensor, a heart rate monitor, a pedometer, an EKG device, etc.
  • a user I/O device e.g., a computer, a wired computer, a fixed computer, a desktop computer, a server, a point-of-sale device, a set-top box, or any other type of computing device.
  • These devices may have different power and data requirements.
  • a wireless device may comprise an access device (e.g., a Wi-Fi access point) for a communication system.
  • an access device may provide, for example, connectivity to another network (e.g., a wide area network such as the Internet or a cellular network) via a wired or wireless communication link.
  • the access device may enable another device (e.g., a WiFi station) to access the other network or some other functionality.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • SoC system on a chip
  • a general purpose processor may be a microprocessor or may be any type of processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may be integral to the processor.
  • the processor and the storage medium may reside in an ASIC.
  • the ASIC may reside in a user terminal.
  • the processor and the storage medium may reside as discrete components in a user terminal.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • any connection is properly termed a computer-readable medium.
  • the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

Abstract

Disclosed is a device to securely authorize a software operation. The device may comprise: a processor to transmit a software operation including an operation parameter; and a security verification device. The security verification device may be coupled to the processor and may be configured to: receive a secret key selection and a first password; select a secret key; receive the software operation including the operation parameter; and implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter. Further, the security verification device may be configured to determine if the second password matches the first password, and if so, authorize the performance of the software operation.

Description

    BACKGROUND
  • Field
  • The present invention relates to an apparatus and method to securely control a remote operation.
  • Relevant Background
  • When many different security requirements are required for a computing device, it is common place today that many different security solutions are implemented by a chip that consumes a large amount of chip space, are very complex, and are not unified in implementation.
  • For small computing devices (e.g., Internet of Thing (IoT) devices), lightweight, low cost security solutions that have maximized sets of security features and simple operations, that provide unified implementations, and that consume a very efficient amount of chip space, are desirable.
  • SUMMARY
  • Aspects may relate to a device to securely authorize a software operation. The device may comprise: a processor to transmit a software operation including an operation parameter; and a security verification device. The security verification device may be coupled to the processor and may be configured to: receive a secret key selection and a first password; select a secret key; receive the software operation including the operation parameter; and implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter. Further, the security verification device may be configured to determine if the second password matches the first password, and if so, authorize the performance of the software operation.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram of a computing device in which embodiments may be practiced.
  • FIG. 2 is a diagram of a system in which embodiments may be practiced.
  • FIG. 3A is a diagram of a system to implement the security verification device including a key derivation function (KDF) device.
  • FIG. 3B is a diagram illustrating examples of software operations and operation parameters.
  • FIG. 4 is a diagram of system to generate a new secret key.
  • DETAILED DESCRIPTION
  • The word “exemplary” or “example” is used herein to mean “serving as an example, instance, or illustration.” Any aspect or embodiment described herein as “exemplary” or as an “example” in not necessarily to be construed as preferred or advantageous over other aspects or embodiments.
  • As used herein, the terms “computing system”, “computing device”, or “device” may be used interchangeably and may refer to any form of computing device including but not limited to laptop computers, tablets, smartphones, televisions, desktop computers, home appliances, cellular telephones, watches, wearable devices, Internet of Things (IoT) devices, personal television devices, personal data assistants (PDA's), palm-top computers, wireless electronic mail receivers, multimedia Internet enabled cellular telephones, Global Positioning System (GPS) receivers, wireless gaming controllers, receivers within vehicles (e.g., automobiles), interactive game devices, notebooks, smartbooks, netbooks, mobile television devices, system on a chip (SoC), or any computing device or data processing apparatus.
  • An example device 100 (hereinafter referred to as a computing device) that may utilize a security verification device 112 to securely activate or revoke software operations, as will be hereinafter described in detail, is illustrated in FIG. 1. The computing device 100 is shown comprising hardware elements that can be electrically coupled via a bus 105 (or may otherwise be in communication, as appropriate). The hardware elements may include one or more processors 102, including without limitation one or more general-purpose processors and/or one or more special-purpose processors (such as digital signal processing chips, graphics acceleration processors, and/or the like); one or more input devices 115 (e.g., keyboard, keypad, touchscreen, mouse, etc.); one or more output devices 122, such as a display device 120, and can further include without limitation other output devices, such as, a speaker, a printer, and/or the like. Additionally, computing device 100 may include a wide variety of sensors 123. Sensors 123 may include: a clock, an ambient light sensor (ALS), a biometric sensor (e.g., blood pressure monitor, etc.), an accelerometer, a gyroscope, a magnetometer, an orientation sensor, a fingerprint sensor, a weather sensor (e.g., temperature, wind, humidity, barometric pressure, etc.), a Global Positioning Sensor (GPS), an infrared (IR) sensor, a proximity sensor, near field communication (NFC) sensor, a microphone, a camera. It should be appreciated that computing device 100 may include any type of sensor.
  • The computing device 100 may further include (and/or be in communication with) one or more non-transitory storage devices 125, which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable, and/or the like. Such storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
  • The computing device 100 may also include a communication subsystem and/or interface 130, which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a Bluetooth device, an 802.11 device, a Wi-Fi device, a WiMax device, cellular communication devices, etc.), and/or the like. The communications subsystem and/or interface 130 may permit data to be exchanged with a network, other computer systems, and/or any other devices described herein. In many embodiments, the computing device 100 will further comprise a working memory 135, which can include a RAM or ROM device, as described above.
  • The computing device 100 may also comprise firmware elements, software elements, shown as being currently located within the working memory 135, including an operating system 140, applications 145, device drivers, executable libraries, and/or other code. In one embodiment, an application may be designed to implement methods, and/or configure systems, to implement embodiments, as described herein. Merely by way of example, one or more procedures described with respect to the method(s) discussed below may be implemented as code and/or instructions executable by a computing device (and/or a processor within a computing device); in an aspect, then, such code and/or instructions can be used to configure and/or adapt a computing device 100 to perform one or more operations in accordance with the described methods, according to embodiments described herein.
  • A set of these instructions and/or code might be stored on a non-transitory computer-readable storage medium, such as the storage device(s) 125 described above. In some cases, the storage medium might be incorporated within a computer system, such as computing device 100. In other embodiments, the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure, and/or adapt a general purpose computer with the instructions/code stored thereon. These instructions might take the form of executable code, which is executable by the computerized computing device 100 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computing device 100 (e.g., using any of a variety of generally available compilers, installation programs, compression/decompression utilities, etc.), then takes the form of executable code.
  • It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used, and/or particular elements might be implemented in hardware, firmware, software, or combinations thereof, to implement embodiments described herein. Further, connection to other computing devices such as network input/output devices may be employed.
  • Aspects may relate to utilizing a security verification device 112 in a computing device 100 that implements a key derivation function to provide security features for the device. Such security features may include: passwords; feature control attestation, and other security services. In particular, security verification device 112 may be utilized by computing device 100 to securely authorize or revoke software operations from a processor 102. As an example, in one embodiment, the security verification device 112 may implement a key derivation function (KDF) device and may perform an atomic operation that performs at least three operations: 1) Selecting a KDF input to the KDF device; 2) Including the software command ID in the KDF input so that it is impossible to attack one operation using another operation; and 3) setting the output of the security verification device 112 to include the software command to be performed by the requesting processor. In an atomic operation, the security verification device 112 either authorizes or revokes the software operation of the requesting processor.
  • With additional reference to FIG. 2, in one embodiment, computing device 100 may comprise a plurality of processors 102 and a security verification device 112 coupled together via bus 105. A plurality of hardware attributes 202 may be coupled to the security verification device 112 via bus 105. These hardware attributes may include: a secret key 204; a device key 206; and a master identifier (MID) 208. The secret key 204 and device key 206 may be implemented as one time programmable (OTP) memories. Further, the secret key 204 may be implemented as resistor transistor logic (RTL), ROM, or any suitable type of storage device to store a secret key. MID 208 may be an identifier of a commanding processor 102 that is transmitting a software operation including an operation parameter, as well as, one or more commands to be performed, as will be described. It should be appreciated that there may be multiple secret keys, device keys, MIDs, etc.
  • As an example, a processor 102 may transmit a software operation 210 to be performed to the security verification device 112. The software operation 210 may include a plurality of commands. In particular, a processor 102 may transmit a software operation 210 to the security verification device 112 that includes an operation parameter and a first password to the security verification device 112. Further, the security verification device 112 is configured to receive a secret key selection from the software operation. Based upon the secret key selection, the security verification device 112 selects a secret key 204 from the hardware attributes 202. The security verification device 112 additionally receives the operation parameter from the processor 102. Based upon these software operation inputs 210, the security verification device 112 is configured to implement a key derivation function (KDF) to generate a second password based upon the selected secret key 204 and the software operation 210 including the operation parameter. In particular, the security verification device 112 determines if the second password matches the first password, and, if so, the security verification device 112 authorizes the performance of the software operation. In this way, the commands of the software operation may be authorized to be performed by the processor 102. However, if the security verification device 112 determines that the second password does not match the first password, the performance of the software operation is revoked. In one embodiment, the second password may be referred to as the hardware password as it is generated by the security verification device 112 and the first password may be referred to as the command password as it generated by the software. Hereinafter, the terms hardware password and command password will be utilized. It should be appreciated that, in one embodiment, the security verification device 112 is configured to determine if the hardware password matches the command password, such that that the software operation 210 is authorized for execution by the processor 102, within a single atomic operation. Also, it should be appreciated that the security verification device 112 is configured to receive and provide routing information for the execution of the commands of the software operation, within a single atomic operation.
  • Also, in one embodiment, a master identifier (MID 208) identifying the commanding processor 102 that is transmitting the software operation 210 and the operation parameter is transmitted via bus 105 to the security verification device 112. In this implementation, the security verification device 112 is configured to: implement a key derivation function to generate a hardware password (e.g., the second password) based upon the selected secret key 204, the MID 208, and the software operation 210 including the operation parameter. Further, based upon this, the security verification device 112 is configured to determine if the hardware password (e.g., the second password) matches the command password (e.g., the first password) of the commanding processor 102, and, if so, the performance of the software operation 210 is authorized for execution by the commanding processor 102. Alternatively, if the hardware password does not match the command password, the software operation 210 is revoked. Also, the security verification device 112 is configured to receive and provide routing information for the software operation including at least routing information for the commanding processor 102 and routing information for the software, as well as other types of hardware and software routing information. Therefore, the routing information includes hardware destination routing information and software destination routing information,
  • As previously described, the software operation 210 triggers a sequence of hardware operations in which hardware inputs are selected to be utilized by the security verification device 112 and software inputs are set as inputs to the hardware of the security verification device 112, including the commands themselves, the command password, etc. In particular, the operation parameter is set as both an input to the KDF device of the security verification device 112 for authentication and as part of the software operation 210 that can be authorized to be performed if the command password is authenticated and approved. In this case, the software operation 210 may be authenticated and approved for execution by the commanding processor 102. Further, KDF output routings (e.g., software and hardware destinations) and password pass/fail routings are set as software inputs to the hardware of the security verification device 112. Based upon these software inputs, the software operation 210 is either approved or revoked (e.g., if the passwords of the hardware and software match or do not match). If the command password is approved by the security verification device 112, the software operation 210 is approved and the commands are routed back to the commanding processor 102 for execution, and if not, the software operation 210 is revoked, and the commands are rejected and not allowed to be executed by the commanding processor 102. In this manner, the operation parameter of the software operation 210 is utilized as an input to the KDF device such that the hardware password is tied to a pre-defined operation parameter and is utilized in the password approval or disapproval process. Also, the MID is used as a hardware indication of the commanding processor 102 and serves as an input to the KDF device (e.g., different results for different commanding processors) and the commands can be routed back to the commanding processor.
  • Therefore, utilizing these aspects, software is enabled to do many operations at the hardware level with a very small chipset fingerprint (e.g., the main hardware component being the security verification device 112 including a KDF device). All of the decisions are linked together so that the software needs little protection while the hardware of the security verification device 112 may prevent attacks. Also, the security verification device 112 decides on routing and keys based upon the commanding processor 102—removing the need for access control. Additionally, the atomicity of all of the above operations into one software operation 210, makes the security verification device 112 an extremely powerful tool to perform many operations. In particular, this implementation replaces many previous security solutions.
  • With additional reference to FIG. 3A, a system 300 to implement the security verification device 112 including a key derivation function (KDF) device 307 is shown. It should be noted that functions implemented by hardware are in dashed lines and functions implemented by software are in solid lines.
  • In this example, a commanding processor 102 may transmit a software operation 210 to the hardware components of the security verification device 112. The software operation 210 may include an operation parameter 212. The operation parameter may include particular parameters associated with the software operation. Also, MID 208 identifying the commanding processor 102 may be transmitted via the bus. The software operation 210 may include a command that is being requested to be performed by the commanding processor 102 based upon authorization by the security verification device 112.
  • In particular, the software operation 210 may transmit an input selection to a hardware data selector 306 to select a secret key 204. It should be appreciated that the input selection may select a particular secret key 204 and/or other device keys 206 that are selected by hardware data selector 306. Further, software operation 210 includes data input to a key derivation function (KDF) device 307. The data input includes the software command itself and the operation parameter.
  • Based upon this data input and the secret key selection, KDF device 307 implements a key derivation function to generate a hardware password based upon the selected secret key and the software operation 210, operation parameter 212, and the MID 208. The hardware password of KDF device 307 is transmitted through hardware data selection router 308 as hardware password 320 to a hardware comparator 330.
  • At this point, security verification device 112 compares the hardware password 320 to the command password 214 transmitted by the software operation 210 utilizing the hardware comparator 330. If comparator 330 determines that the hardware password 320 matches the command password 214, then the password pass/fail decision routing device 332 selects the perform operation selector 350, which allows for authorization of the software operation 210 such that the software operation 210 is allowed to be executed by the commanding processor 102. In this way, the software operation 210 is approved or authenticated by the security verification device 112 and is transmitted back to the commanding processor 102 for execution.
  • On the other hand, if hardware comparator 330 determines that the hardware password 320 does not match the command password 214, then the password pass/fail decision routing device 332 selects the revoke operation selector 352, which revokes the authentication of the software operation 210. In this way, the software operation 210 is revoked by the security verification device 112 such that the requested software operation 210 by the commanding processor 102 is not allowed and is terminated.
  • Also, it should be appreciated that hardware data selection router 308 of the security verification device 112 based upon received output routing data from the software operation 210 may further include software destinations (1 . . . n) 310 and hardware destinations (1 . . . n) 312 for the commands from the commanding processor 102. Therefore, if the software operation 210 is approved, various software destinations and/or hardware destinations utilized by the commands may be routed. It should be appreciated that such destinations may include processors, memory, software, firmware, sensors, or any software or hardware component.
  • With additional reference to FIG. 3B, a diagram is shown that provides examples 390 of software operations and operation parameters. Examples 390 of software operations may include: key activation; key revocation; debug re-enable; feature activation; and feature deactivation. For the key activation and key revocation software operations, the operation parameters or parameters may be the index or bitmap of the predefined keys to activate or revoke. For the debug re-enable software operation, the operation parameters or parameters may include a list of debug or monitoring facilities to re-enable. For the feature activation and deactivation software operations, the operation parameters or parameters may be the list of product features to activate or deactivate. Examples of these features for activation or deactivation may include: The number of CPU cores to be utilized and/or their maximum operation frequencies (MHz); Various performance points for Graphic Processor Units GPUs; Various radio interfaces (e.g., Bluetooth, WiFi, Cellular, etc.); The settings for maximum resolution supportable by a video player or camera and/or other related features, such as, frame per second, color depth and dynamic brightness range. Further, example features for activation or deactivation may apply to the device that incorporates the chip (e.g., a SoC), such as: Automotive—the Horse Power the engine can generate; Drones—the upper height limit and distance the Drone may go, etc. It should be appreciated that these are just examples of software operations and corresponding operation parameters and that any suitable software operation may be securely controlled and implemented. Further, it should be appreciated that any type of software operation may be securely controlled remotely utilizing embodiment disclosed herein.
  • In particular, as previously described, the software operation 210 triggers a sequence of hardware operations in which hardware inputs are selected to be utilized by the security verification device 112 and software inputs are set as inputs to the hardware of the security verification device 112 including the software operation 210 itself and the operation parameter 212, as well as, the MID 208. The operation parameter 212 is set as both an input to the KDF device 307 of the security verification device 112 for authentication purposes, and, as an operation parameter for the software operation 210 to be performed, if the command password 214 is authenticated and approved—in which case the software operation 210 is authenticated and approved for execution by the commanding processor 102 (e.g., perform operation 350). Further, KDF output routings (e.g., software and hardware destinations 310 and 312) and password pass/fail routings are set as software inputs to the hardware of the security verification device 112. Based upon these software inputs, the software operation 210 is either approved or revoked by the hardware (e.g., if the passwords of the hardware and software match or do not match at the hardware comparator 330). If the command password 214 is approved by the hardware of security verification device 112 (i.e., at the comparator 330 compared to hardware password 320), then the password pass/fail decision routing device 332 selects the perform operation selector 350, which allows for authorization of the software operation 210 such that the software operation 210 is allowed to be executed by the commanding processor 102. In this way, the software operation 210 is approved or authenticated by the security verification device 112 and is transmitted back to the commanding processor 102 for execution. On the other hand, if hardware comparator 330 determines that the hardware password 320 does not match the command password 214, then the password pass/fail decision routing device 332 selects the revoke operation selector 352, which revokes the authentication of the software operation 210. In this way, the software operation 210 is revoked by the security verification device 112 such that the requested software operation 210 by the commanding processor 102 is not allowed and is terminated.
  • In this way, the operation parameter 212 is utilized as an input to the KDF device 307 such that the hardware password 320 is tied to a pre-defined operation parameter 212 and is utilized in the password approval or disapproval process. Also, the MID 208 is used as a hardware indication of the commanding processor 102 and serves as an input to the KDF device 307 (e.g., different results for different commanding processors) and the commands can be routed back to the commanding processor 120.
  • Thus, utilizing these aspects, software is enabled to do many operations at the hardware level with a very small chipset fingerprint (e.g., the main hardware component being the security verification device 112 including the KDF device 307). All of the decisions are linked together so that the software needs little protection while the hardware of the security verification device 112 may prevent attacks. In particular, the security verification device 112 decides on routing and keys based upon the commanding processor 102—removing the need for access control. Additionally, the atomicity of all of the above operations into one software operation 210, makes the security verification device 112 an extremely powerful tool to perform many operations. In particular, this implementation replaces many previous security solutions.
  • With additional reference to FIG. 4, in conjunction with FIG. 3A, in one embodiment, the secret key 204 may be based upon a wrapped secret key that is generated and transmitted from a server 402 to the computing device 100, as a wrapped secret key 408. For example, in one embodiment, a first software operation 210 by processor 102 of the computing device may command a new secret key from a server 402. In this embodiment, the new secret key 204 may be generated at the server 402, but may be transmitted as a wrapped secret key 408 to the computing device 100. In this way, based upon a request by the computing device 100, the server 402, repeating the KDF calculation 403, generates a new secret key 204 for the computing device 100 that is transmitted as wrapped secret key 408, such that the computing device 100 may generate the secret key 204, based upon the KDF device 307 of the computing device 100, utilizing only the wrapped secret key 408. The wrapped key implementation provides a method in which the new secret key is not exposed in delivery or even to the computing device's software.
  • For example, a software operation 210 of the computing device 100 may request a new secret key from the server 402. In this example, computing device 100 may transmit a new secret key request through communication interface 130 (e.g., a transceiver) to server 402. Based upon this, server 402 may request an identifier of the computing device 100, such as, the computing device's 100 serial number (S/N) and/or original equipment manufacturer ID (OEM_ID) 406. Computing device 100 may then transmit its SN and OEM_ID 406 to server 402. It should be appreciated that server 402 may include an appropriate processor, memory, transceiver, etc., to implemented the previous and hereinafter described functionality. In particular, server 403 implements a KDF calculation 403 that is similar/linked and/or the same as the KDF calculation of KDF 307 of the computing device 100, to implement this functionality.
  • Based upon the received SN and OEM_ID 406, server 402 may generate a new secret key 204 utilizing KDF calculation 403. In particular, server 402 utilizing KDF calculation 403 may generate a new secret key 204. The new secret key 204 may be generated by a key derivation function of at least the wrapped secret key, the S/N of the computing device 100, and the OEM_ID of the computing device 100. Based upon this, server 402 may transmit the wrapped secret key 408 to the computing device 100. Thus, only the wrapped secret key 408 may be transmitted to the computing device. It should be noted that new secret key 204 itself is not transmitted (e.g., only the wrapped secret key).
  • Based upon the received wrapped secret key 408, the processor 102 of computing device 100 commands a second software operation 210 to the KDF 307 to unwrap the wrapped secret key 408. Because the computing device 100 and the server 402 utilize the same KDF and utilize the same S/N and OEM_ID, the KDF 307 of the computing device 100 generates an unwrapped secret key 204, based upon the received wrapped key 408, along with the known S/N and OEM_ID, and via hardware router 308 and bus 411, transmits the new secret key 204 for storage in a storage device (see FIG. 3A). As previously described, the secret key 204 may be stored in OTP, ROM, etc. This secret key 204 may then be utilized by software operations for further commands and function, as previously described in detail. It should be appreciated that other factors such as the ID of the command processor, global keys, etc., may be utilized as additional KDF inputs. In this way, a secret key may be sent over the air (OTA) in a secure and low cost fashion. The new secret key may be generated and transmitted at any instance when computing device 100 requests a new secret key from server 402. The wrapped key implementation provides a method in which the new secret key is not exposed in delivery or even to the computing device's software.
  • It should be appreciated that aspects of the invention previously described may be implemented in conjunction with the execution of instructions by processors (e.g., processor 102) of the devices (e.g., computing device 100), as previously described. Particularly, circuitry of the devices, including but not limited to processors, may operate under the control of a program, routine, or the execution of instructions to execute methods or processes in accordance with embodiments of the invention (e.g., the processes and functions of FIGS. 2-4). For example, such a program may be implemented in firmware or software (e.g. stored in memory and/or other locations) and may be implemented by processors and/or other circuitry of the devices. Further, it should be appreciated that the terms device, processor, microprocessor, circuitry, controller, SoC, etc., refer to any type of logic or circuitry capable of executing logic, commands, instructions, software, firmware, functionality, etc.
  • It should be appreciated that when the devices are wireless devices that they may communicate via one or more wireless communication links through a wireless network that are based on or otherwise support any suitable wireless communication technology. For example, in some aspects the wireless device and other devices may associate with a network including a wireless network. In some aspects the network may comprise a body area network or a personal area network (e.g., an ultra-wideband network). In some aspects the network may comprise a local area network or a wide area network. A wireless device may support or otherwise use one or more of a variety of wireless communication technologies, protocols, or standards such as, for example, 3G, LTE, Advanced LTE, 4G, 5G, CDMA, TDMA, OFDM, OFDMA, WiMAX, and WiFi. Similarly, a wireless device may support or otherwise use one or more of a variety of corresponding modulation or multiplexing schemes. A wireless device may thus include appropriate components (e.g., air interfaces) to establish and communicate via one or more wireless communication links using the above or other wireless communication technologies. For example, a device may comprise a wireless transceiver with associated transmitter and receiver components (e.g., a transmitter and a receiver) that may include various components (e.g., signal generators and signal processors) that facilitate communication over a wireless medium. As is well known, a wireless device may therefore wirelessly communicate with other mobile devices, cell phones, other wired and wireless computers, Internet web-sites, etc.
  • The teachings herein may be incorporated into (e.g., implemented within or performed by) a variety of apparatuses (e.g., devices). For example, one or more aspects taught herein may be incorporated into a phone (e.g., a cellular phone), a personal data assistant (“PDA”), a tablet, a wearable device, an Internet of Things (IoT) device, a mobile computer, a laptop computer, an entertainment device (e.g., a music or video device), a headset (e.g., headphones, an earpiece, etc.), a medical device (e.g., a biometric sensor, a heart rate monitor, a pedometer, an EKG device, etc.), a user I/O device, a computer, a wired computer, a fixed computer, a desktop computer, a server, a point-of-sale device, a set-top box, or any other type of computing device. These devices may have different power and data requirements.
  • In some aspects a wireless device may comprise an access device (e.g., a Wi-Fi access point) for a communication system. Such an access device may provide, for example, connectivity to another network (e.g., a wide area network such as the Internet or a cellular network) via a wired or wireless communication link. Accordingly, the access device may enable another device (e.g., a WiFi station) to access the other network or some other functionality.
  • Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
  • Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, firmware, or combinations of both. To clearly illustrate this interchangeability of hardware, firmware, or software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware, firmware, or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
  • The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a system on a chip (SoC), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor or may be any type of processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in firmware, in a software module executed by a processor, or in a combination thereof. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
  • In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
  • The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (29)

What is claimed is:
1. A device comprising:
a processor to transmit a software operation including an operation parameter;
a security verification device, coupled to the processor, the security verification device configured to:
receive a secret key selection and a first password;
select a secret key;
receive the software operation including the operation parameter;
implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
determine if the second password matches the first password, and if so, authorize the performance of the software operation.
2. The device of claim 1, wherein, if the security verification device determines that the second password does not match the first password, the performance of the software operation is revoked.
3. The device of claim 1, wherein, the security verification device is further configured to receive routing information for the software operation.
4. The device of claim 1, wherein, the security verification device is further configured to determine if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
5. The device of claim 1, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted to the security verification device by a bus.
6. The device of claim 5, wherein, the security verification device is further configured to:
implement the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
determine if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
7. The device of claim 1, wherein the software operation includes at least one of: a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
8. A method to securely activate commands comprising:
receiving a software operation including an operation parameter;
receiving a first password;
selecting a secret key;
implementing a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
determining if the second password matches the first password, and if so, authorize the performance of the software operation by a processor.
9. The method of claim 8, wherein, if the second password does not match the first password, further comprising revoking the performance of the software operation by the processor.
10. The method of claim 8, further comprising receive routing information for the software operation.
11. The method of claim 8, further comprising determining if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
12. The method of claim 8, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted by a bus.
13. The method of claim 12, further comprising:
implementing the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
determining if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
14. The method of claim 12, wherein the software operation includes at least one of:
a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
15. A device comprising:
means for receiving a software operation including an operation parameter;
means for receiving a first password;
means for selecting a secret key;
means for implementing a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
means for determining if the second password matches the first password, and if so, means for authorizing the performance of the software operation.
16. The device of claim 15, wherein, if the second password does not match the first password, further comprising means for revoking the performance of the software operation.
17. The device of claim 15, further comprising means for receive routing information for the software operation.
18. The device of claim 15, further comprising means for determining if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
19. The device of claim 15, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted by a bus.
20. The device of claim 19, further comprising:
means for implementing the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
means for determining if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
21. The device of claim 15, wherein the software operation includes at least one of:
a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
22. A device comprising:
a transceiver configured to:
transmit a command for a secret key to a server;
transmit an identifier to the server;
receive a wrapped secret key from the server;
a storage device; and
a processor coupled to the transceiver and the storage device, the processor configured to:
receive the wrapped secret key from the transceiver;
unwrap the wrapped secret key to obtain the secret key; and
store the secret key in the storage device.
23. The device of claim 22, wherein unwrapping the wrapped secret key further comprises utilizing a key derivation function with the wrapped secret key and the identifier as inputs.
24. The device of claim 23, wherein the identifier includes at least one of a serial number or a manufacturer identifier.
25. The device of claim 24, wherein the identifier further comprises at least one of an identifier of a command processor or a global key.
26. The device of claim 23, wherein a first software operation by the processor commands the secret key from the server.
27. The device of claim 26, wherein a second software operation by the processor commands unwrapping the wrapped secret utilizing the key derivation function implemented by a key derivation device and storing the secret key in the storage device.
28. The device of claim 27, wherein the server utilizes a key derivation function to generate the wrapped secret key that is linked to the key derivation function of the computing device.
29. The device of claim 22, wherein the storage device is a one time programmable (OTP) memory or a ROM.
US14/856,299 2015-09-16 2015-09-16 Apparatus and method to securely control a remote operation Abandoned US20170076106A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US14/856,299 US20170076106A1 (en) 2015-09-16 2015-09-16 Apparatus and method to securely control a remote operation
PCT/US2016/047833 WO2017048458A1 (en) 2015-09-16 2016-08-19 Apparatus and method to securely control a remote operation
CN201680051484.XA CN108027865A (en) 2015-09-16 2016-08-19 Safely control remote-operated apparatus and method
US15/486,673 US9973485B2 (en) 2015-09-16 2017-04-13 Apparatus and method to securely receive a key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/856,299 US20170076106A1 (en) 2015-09-16 2015-09-16 Apparatus and method to securely control a remote operation

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/486,673 Division US9973485B2 (en) 2015-09-16 2017-04-13 Apparatus and method to securely receive a key

Publications (1)

Publication Number Publication Date
US20170076106A1 true US20170076106A1 (en) 2017-03-16

Family

ID=56853835

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/856,299 Abandoned US20170076106A1 (en) 2015-09-16 2015-09-16 Apparatus and method to securely control a remote operation
US15/486,673 Active US9973485B2 (en) 2015-09-16 2017-04-13 Apparatus and method to securely receive a key

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/486,673 Active US9973485B2 (en) 2015-09-16 2017-04-13 Apparatus and method to securely receive a key

Country Status (3)

Country Link
US (2) US20170076106A1 (en)
CN (1) CN108027865A (en)
WO (1) WO2017048458A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9973485B2 (en) 2015-09-16 2018-05-15 Qualcomm Incorporated Apparatus and method to securely receive a key
WO2019071126A1 (en) * 2017-10-06 2019-04-11 Stealthpath, Inc. Methods for internet communication security
US10361859B2 (en) 2017-10-06 2019-07-23 Stealthpath, Inc. Methods for internet communication security
US10367811B2 (en) 2017-10-06 2019-07-30 Stealthpath, Inc. Methods for internet communication security
US10374803B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10375019B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10397186B2 (en) 2017-10-06 2019-08-27 Stealthpath, Inc. Methods for internet communication security
US10489579B2 (en) * 2015-12-03 2019-11-26 Nuvoton Technology Corporation Authentication system and method for electronic governor of unmanned aerial vehicle
US10630642B2 (en) 2017-10-06 2020-04-21 Stealthpath, Inc. Methods for internet communication security
CN112436935A (en) * 2019-08-26 2021-03-02 英飞凌科技股份有限公司 Password device, method of operating password device, vehicle, and storage medium
US11188239B2 (en) * 2019-03-28 2021-11-30 Western Digital Technologies, Inc. Host-trusted module in data storage device
WO2022096982A1 (en) * 2020-11-06 2022-05-12 International Business Machines Corporation Sharing insights between pre and post deployment to enhance cloud workload security
US11558423B2 (en) 2019-09-27 2023-01-17 Stealthpath, Inc. Methods for zero trust security with high quality of service

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10993110B2 (en) * 2018-07-13 2021-04-27 Nvidia Corp. Connectionless fast method for configuring Wi-Fi on displayless Wi-Fi IoT device
US11038671B2 (en) 2018-09-04 2021-06-15 International Business Machines Corporation Shared key processing by a storage device to secure links
US10833856B2 (en) 2018-09-04 2020-11-10 International Business Machines Corporation Automatic re-authentication of links using a key server
US11025413B2 (en) 2018-09-04 2021-06-01 International Business Machines Corporation Securing a storage network using key server authentication
US10764291B2 (en) 2018-09-04 2020-09-01 International Business Machines Corporation Controlling access between nodes by a key server
US10833860B2 (en) * 2018-09-04 2020-11-10 International Business Machines Corporation Shared key processing by a host to secure links
US11088829B2 (en) 2018-09-04 2021-08-10 International Business Machines Corporation Securing a path at a node
US11038698B2 (en) 2018-09-04 2021-06-15 International Business Machines Corporation Securing a path at a selected node

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208851B1 (en) * 1997-02-04 2001-03-27 National Telemanagement Corporation Prepay telecommunications system
US20010011228A1 (en) * 1998-07-31 2001-08-02 Grigory Shenkman Method for predictive routing of incoming calls within a communication center according to history and maximum profit/contribution analysis
US20020087393A1 (en) * 1998-07-31 2002-07-04 Laurent Philonenko Dynamically updated QoS parameterization according to expected business revenue
US20040215564A1 (en) * 1989-12-08 2004-10-28 Online Resources & Communications Corp Method and system for remote delivery of retail banking services
USRE38715E1 (en) * 1995-05-16 2005-03-22 Bmc Resources, Inc. Automated interactive bill payment system using debit cards
US6885857B1 (en) * 1998-01-07 2005-04-26 Verisign, Inc. System and method for real-time bundled telecommunications account processing and billing
US7076656B2 (en) * 2001-04-05 2006-07-11 Lucent Technologies Inc. Methods and apparatus for providing efficient password-authenticated key exchange
US20070125840A1 (en) * 2005-12-06 2007-06-07 Boncle, Inc. Extended electronic wallet management
US20080040786A1 (en) * 2006-08-14 2008-02-14 Samsung Electronics Co., Ltd. Client computer, remote control system, and remote control method
US20080162951A1 (en) * 2007-01-02 2008-07-03 Kenkare Prashant U System having a memory voltage controller and method therefor
US20090154675A1 (en) * 1997-02-04 2009-06-18 Freedom Wireless, Inc. System and method of real-time call processing and billing
US20090171752A1 (en) * 2007-12-28 2009-07-02 Brian Galvin Method for Predictive Routing of Incoming Transactions Within a Communication Center According to Potential Profit Analysis
US20110123026A1 (en) * 2009-06-10 2011-05-26 Rebuli David Duplication means for an electronically coded key and related method
US20110289591A1 (en) * 2010-05-20 2011-11-24 Kyocera Mita Corporation Software Validity Period Changing Apparatus, Method,and Installation Package
US20130042111A1 (en) * 2011-08-09 2013-02-14 Michael Stephen Fiske Securing transactions against cyberattacks
US20130166820A1 (en) * 2011-12-22 2013-06-27 Fusion-Io, Inc. Methods and appratuses for atomic storage operations
US20130246260A1 (en) * 2011-12-01 2013-09-19 Barclays Bank Plc Mobile Payment Transaction System
US20130326601A1 (en) * 2011-12-07 2013-12-05 Sharp Kabushiki Kaisha Communication system
US20140047555A1 (en) * 2011-04-14 2014-02-13 In-Webo Technologies Sas Method and system for securing a software program
US20140250508A1 (en) * 2013-03-04 2014-09-04 Dell Products, Lp System and Method for Creating and Managing Object Credentials for Multiple Applications
US8832807B1 (en) * 2010-08-05 2014-09-09 Christine E. Kuo Method and apparatus for asynchronous dynamic password
US20140279477A1 (en) * 2013-03-15 2014-09-18 John Sheets Account provisioning authentication
US20140317417A1 (en) * 2013-04-23 2014-10-23 Qualcomm Incorporated Generation of working security key based on security parameters
US20150128234A1 (en) * 2009-02-03 2015-05-07 Inbay Technologies Inc. System and method for generating passwords using key inputs and contextual inputs
US20150317634A1 (en) * 2014-05-01 2015-11-05 Fredrick Hugo Robinson Angoy Secure text initiated payment processing system
US9246686B1 (en) * 2014-06-17 2016-01-26 Amazon Technologies, Inc. Salt value service
US20160036825A1 (en) * 2014-07-29 2016-02-04 Time Warner Cable Enterprises Llc Communication management and policy-based data routing
US20160065550A1 (en) * 2014-08-28 2016-03-03 Yordan Kanov Different authentication profiles
US20170161486A1 (en) * 2015-12-08 2017-06-08 Electronics And Telecommunications Research Instit Ute Apparatus and method for api authentication using two api tokens

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7293289B1 (en) * 2002-09-10 2007-11-06 Marvell International Ltd. Apparatus, method and computer program product for detection of a security breach in a network
US7216238B2 (en) * 2003-06-30 2007-05-08 Symbol Technologies, Inc. System and method for controlling usage of software on computing devices
US8126145B1 (en) * 2005-05-04 2012-02-28 Marvell International Ltd. Enhanced association for access points
US8254571B1 (en) * 2007-12-21 2012-08-28 Voltage Security, Inc. Cryptographic system with halting key derivation function capabilities
CA2743958C (en) 2008-11-24 2016-11-08 Certicom Corp. System and method for hardware based security
US20100306530A1 (en) * 2009-06-02 2010-12-02 Johnson Robert A Workgroup key wrapping for community of interest membership authentication
US8935529B2 (en) * 2009-11-30 2015-01-13 Telefonaktiebolaget L M Ericsson (Publ) Methods and systems for end-to-end secure SIP payloads
US8799994B2 (en) * 2011-10-11 2014-08-05 Citrix Systems, Inc. Policy-based application management
US9330245B2 (en) 2011-12-01 2016-05-03 Dashlane SAS Cloud-based data backup and sync with secure local storage of access keys
US8850543B2 (en) * 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
CN103220271A (en) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103220270A (en) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
US9607177B2 (en) 2013-09-30 2017-03-28 Qualcomm Incorporated Method for securing content in dynamically allocated memory using different domain-specific keys
WO2015070160A1 (en) 2013-11-08 2015-05-14 MustBin Inc. Bin enabled data object encryption and storage apparatuses, methods and systems
EP3869730A1 (en) * 2015-02-13 2021-08-25 Visa International Service Association Confidential communication management
US9602279B1 (en) * 2015-06-09 2017-03-21 Amazon Technologies, Inc. Configuring devices for use on a network using a fast packet exchange with authentication
US20170076106A1 (en) 2015-09-16 2017-03-16 Qualcomm Incorporated Apparatus and method to securely control a remote operation

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040215564A1 (en) * 1989-12-08 2004-10-28 Online Resources & Communications Corp Method and system for remote delivery of retail banking services
USRE38715E1 (en) * 1995-05-16 2005-03-22 Bmc Resources, Inc. Automated interactive bill payment system using debit cards
US20090154675A1 (en) * 1997-02-04 2009-06-18 Freedom Wireless, Inc. System and method of real-time call processing and billing
US6208851B1 (en) * 1997-02-04 2001-03-27 National Telemanagement Corporation Prepay telecommunications system
US7162220B2 (en) * 1997-02-04 2007-01-09 Verisign, Inc. Prepay telecommunications system
US6885857B1 (en) * 1998-01-07 2005-04-26 Verisign, Inc. System and method for real-time bundled telecommunications account processing and billing
US20010011228A1 (en) * 1998-07-31 2001-08-02 Grigory Shenkman Method for predictive routing of incoming calls within a communication center according to history and maximum profit/contribution analysis
US20020087393A1 (en) * 1998-07-31 2002-07-04 Laurent Philonenko Dynamically updated QoS parameterization according to expected business revenue
US7076656B2 (en) * 2001-04-05 2006-07-11 Lucent Technologies Inc. Methods and apparatus for providing efficient password-authenticated key exchange
US20070125840A1 (en) * 2005-12-06 2007-06-07 Boncle, Inc. Extended electronic wallet management
US20080040786A1 (en) * 2006-08-14 2008-02-14 Samsung Electronics Co., Ltd. Client computer, remote control system, and remote control method
US20080162951A1 (en) * 2007-01-02 2008-07-03 Kenkare Prashant U System having a memory voltage controller and method therefor
US20090171752A1 (en) * 2007-12-28 2009-07-02 Brian Galvin Method for Predictive Routing of Incoming Transactions Within a Communication Center According to Potential Profit Analysis
US20150128234A1 (en) * 2009-02-03 2015-05-07 Inbay Technologies Inc. System and method for generating passwords using key inputs and contextual inputs
US20110123026A1 (en) * 2009-06-10 2011-05-26 Rebuli David Duplication means for an electronically coded key and related method
US20110289591A1 (en) * 2010-05-20 2011-11-24 Kyocera Mita Corporation Software Validity Period Changing Apparatus, Method,and Installation Package
US8832807B1 (en) * 2010-08-05 2014-09-09 Christine E. Kuo Method and apparatus for asynchronous dynamic password
US20140047555A1 (en) * 2011-04-14 2014-02-13 In-Webo Technologies Sas Method and system for securing a software program
US20130042111A1 (en) * 2011-08-09 2013-02-14 Michael Stephen Fiske Securing transactions against cyberattacks
US20130246260A1 (en) * 2011-12-01 2013-09-19 Barclays Bank Plc Mobile Payment Transaction System
US20130326601A1 (en) * 2011-12-07 2013-12-05 Sharp Kabushiki Kaisha Communication system
US20130166820A1 (en) * 2011-12-22 2013-06-27 Fusion-Io, Inc. Methods and appratuses for atomic storage operations
US20140250508A1 (en) * 2013-03-04 2014-09-04 Dell Products, Lp System and Method for Creating and Managing Object Credentials for Multiple Applications
US20140279477A1 (en) * 2013-03-15 2014-09-18 John Sheets Account provisioning authentication
US20140317417A1 (en) * 2013-04-23 2014-10-23 Qualcomm Incorporated Generation of working security key based on security parameters
US20150317634A1 (en) * 2014-05-01 2015-11-05 Fredrick Hugo Robinson Angoy Secure text initiated payment processing system
US9246686B1 (en) * 2014-06-17 2016-01-26 Amazon Technologies, Inc. Salt value service
US20160036825A1 (en) * 2014-07-29 2016-02-04 Time Warner Cable Enterprises Llc Communication management and policy-based data routing
US20160065550A1 (en) * 2014-08-28 2016-03-03 Yordan Kanov Different authentication profiles
US20170161486A1 (en) * 2015-12-08 2017-06-08 Electronics And Telecommunications Research Instit Ute Apparatus and method for api authentication using two api tokens

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
US RE38,715 E *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9973485B2 (en) 2015-09-16 2018-05-15 Qualcomm Incorporated Apparatus and method to securely receive a key
US10489579B2 (en) * 2015-12-03 2019-11-26 Nuvoton Technology Corporation Authentication system and method for electronic governor of unmanned aerial vehicle
US10965646B2 (en) 2017-10-06 2021-03-30 Stealthpath, Inc. Methods for internet communication security
US11463256B2 (en) 2017-10-06 2022-10-04 Stealthpath, Inc. Methods for internet communication security
US10374803B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10375019B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10397186B2 (en) 2017-10-06 2019-08-27 Stealthpath, Inc. Methods for internet communication security
US10361859B2 (en) 2017-10-06 2019-07-23 Stealthpath, Inc. Methods for internet communication security
US10630642B2 (en) 2017-10-06 2020-04-21 Stealthpath, Inc. Methods for internet communication security
US11930007B2 (en) 2017-10-06 2024-03-12 Stealthpath, Inc. Methods for internet communication security
WO2019071126A1 (en) * 2017-10-06 2019-04-11 Stealthpath, Inc. Methods for internet communication security
US10367811B2 (en) 2017-10-06 2019-07-30 Stealthpath, Inc. Methods for internet communication security
US11245529B2 (en) 2017-10-06 2022-02-08 Stealthpath, Inc. Methods for internet communication security
US11729143B2 (en) 2017-10-06 2023-08-15 Stealthpath, Inc. Methods for internet communication security
US11188239B2 (en) * 2019-03-28 2021-11-30 Western Digital Technologies, Inc. Host-trusted module in data storage device
CN112436935A (en) * 2019-08-26 2021-03-02 英飞凌科技股份有限公司 Password device, method of operating password device, vehicle, and storage medium
US11558423B2 (en) 2019-09-27 2023-01-17 Stealthpath, Inc. Methods for zero trust security with high quality of service
WO2022096982A1 (en) * 2020-11-06 2022-05-12 International Business Machines Corporation Sharing insights between pre and post deployment to enhance cloud workload security
GB2615677A (en) * 2020-11-06 2023-08-16 Ibm Sharing insights between pre and post deployment to enhance cloud workload security
US11947444B2 (en) 2020-11-06 2024-04-02 International Business Machines Corporation Sharing insights between pre and post deployment to enhance cloud workload security

Also Published As

Publication number Publication date
US20170222994A1 (en) 2017-08-03
WO2017048458A1 (en) 2017-03-23
CN108027865A (en) 2018-05-11
US9973485B2 (en) 2018-05-15

Similar Documents

Publication Publication Date Title
US9973485B2 (en) Apparatus and method to securely receive a key
JP6453486B2 (en) Accelerated passphrase verification
US11470092B2 (en) Expendable network access
US9264413B2 (en) Management of network devices utilizing an authorization token
US9798887B2 (en) Computing device to securely activate or revoke a key
US9749329B2 (en) Network connection managing device, system and method
US20150278506A1 (en) Authentication of a device
CN103634109A (en) Operation right authentication method and device
US9697385B2 (en) Security adjustments in mobile devices
US20180035293A1 (en) Authenticating a device utilizing a secure display
WO2018026664A1 (en) Method to authenticate or identify a user based upon fingerprint scans
US20150121474A1 (en) Processor security authentication area
JP6440721B2 (en) Authenticating the use of applications by computing devices
US20180152307A1 (en) Device to provide trusted time assurance
US20180019870A1 (en) Device to limit access to storage to authenticated actors only
KR102071281B1 (en) Method for intergraged authentication thereof
US20180101669A1 (en) Device to perform secure biometric authentication
US20170163417A1 (en) Apparatus and method for key provisioning
US20180241778A1 (en) Device to perform policy verification
CN117407848A (en) Authorization mechanism optimization method, device and equipment for custom authority and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: QUALCOMM INCORPORATED, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KEIDAR, RON;REEL/FRAME:036664/0141

Effective date: 20150920

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE