会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • DEVICE AUTHENTICATION USING A PHYSICALLY UNCLONABLE FUNCTIONS BASED KEY GENERATION SYSTEM
    • 使用基于物理不可靠函数的密钥生成系统的设备认证
    • WO2014105310A1
    • 2014-07-03
    • PCT/US2013/071346
    • 2013-11-21
    • INTEL CORPORATIONKOEBERL, PatrickLI, Jiangtao
    • KOEBERL, PatrickLI, Jiangtao
    • G06F21/30
    • G06F21/70G06F21/44G06F21/73
    • At least one machine accessible medium having instructions stored thereon for authenticating a hardware device is provided. When executed by a processor, the instructions cause the processor to receive two or more device keys from a physically unclonable function (PUF) on the hardware device, generate a device identifier from the two or more device keys, obtain a device certificate from the hardware device, perform a verification of the device identifier, and provide a result of the device identifier verification. In a more specific embodiment, the instructions cause the processor to perform a verification of a digital signature in the device certificate and to provide a result of the digital signature verification. The hardware device may be rejected if at least one of the device identifier verification and the digital signature verification fails.
    • 提供了至少一个具有存储在其上用于认证硬件设备的指令的机器可访问介质。 当处理器执行时,指令使处理器从硬件设备上的物理不可克隆功能(PUF)接收两个或多个设备密钥,从两个或多个设备密钥生成设备标识符,从硬件获得设备证书 设备,执行设备标识符的验证,并提供设备标识符验证的结果。 在更具体的实施例中,指令使处理器执行设备证书中的数字签名的验证并提供数字签名验证的结果。 如果设备标识符验证和数字签名验证中的至少一个失败,则硬件设备可能被拒绝。
    • 7. 发明申请
    • SECURE PAIRING FOR COMMUNICATION ACROSS DEVICES
    • 安全交付用于通信设备
    • WO2014200496A1
    • 2014-12-18
    • PCT/US2013/045690
    • 2013-06-13
    • INTEL CORPORATIONNEGI, AnusyaJOHNSON, ErikLI, Jiangtao
    • NEGI, AnusyaJOHNSON, ErikLI, Jiangtao
    • H04L9/30
    • H04L9/3268H04L9/0841
    • Technologies for securely pairing a first computing device with a second computing device include the first computing device to generate a session message key based on a key exchange with the second computing device. The first computing device receives a message including a hardware key certificate, 5 a cryptographically-signed communication, and a message authentication code from the second computing device. The cryptographically-signed communication is signed with a private hardware key of the second computing device. The first computing device validates the message authentication code, the certificate, and the signature received from the second computing device. After validation, the first computing device 10 identifies a user of the second computing device based on user-identifying data received from the second computing device.
    • 用于将第一计算设备与第二计算设备安全地配对的技术包括:第一计算设备,用于基于与第二计算设备的密钥交换来生成会话消息密钥。 第一计算设备从第二计算设备接收包括硬件密钥证书,密码签名的通信和消息认证码的消息。 密码签名的通信使用第二计算设备的专用硬件密钥进行签名。 第一计算设备验证从第二计算设备接收的消息认证码,证书和签名。 在验证之后,第一计算设备10基于从第二计算设备接收的用户识别数据来识别第二计算设备的用户。