Movatterモバイル変換


[0]ホーム

URL:


US20170076106A1 - Apparatus and method to securely control a remote operation - Google Patents

Apparatus and method to securely control a remote operation
Download PDF

Info

Publication number
US20170076106A1
US20170076106A1US14/856,299US201514856299AUS2017076106A1US 20170076106 A1US20170076106 A1US 20170076106A1US 201514856299 AUS201514856299 AUS 201514856299AUS 2017076106 A1US2017076106 A1US 2017076106A1
Authority
US
United States
Prior art keywords
password
software operation
software
secret key
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/856,299
Inventor
Ron Keidar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm IncfiledCriticalQualcomm Inc
Priority to US14/856,299priorityCriticalpatent/US20170076106A1/en
Assigned to QUALCOMM INCORPORATEDreassignmentQUALCOMM INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KEIDAR, RON
Priority to CN201680051484.XAprioritypatent/CN108027865A/en
Priority to PCT/US2016/047833prioritypatent/WO2017048458A1/en
Publication of US20170076106A1publicationCriticalpatent/US20170076106A1/en
Priority to US15/486,673prioritypatent/US9973485B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Disclosed is a device to securely authorize a software operation. The device may comprise: a processor to transmit a software operation including an operation parameter; and a security verification device. The security verification device may be coupled to the processor and may be configured to: receive a secret key selection and a first password; select a secret key; receive the software operation including the operation parameter; and implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter. Further, the security verification device may be configured to determine if the second password matches the first password, and if so, authorize the performance of the software operation.

Description

Claims (29)

What is claimed is:
1. A device comprising:
a processor to transmit a software operation including an operation parameter;
a security verification device, coupled to the processor, the security verification device configured to:
receive a secret key selection and a first password;
select a secret key;
receive the software operation including the operation parameter;
implement a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
determine if the second password matches the first password, and if so, authorize the performance of the software operation.
2. The device ofclaim 1, wherein, if the security verification device determines that the second password does not match the first password, the performance of the software operation is revoked.
3. The device ofclaim 1, wherein, the security verification device is further configured to receive routing information for the software operation.
4. The device ofclaim 1, wherein, the security verification device is further configured to determine if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
5. The device ofclaim 1, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted to the security verification device by a bus.
6. The device ofclaim 5, wherein, the security verification device is further configured to:
implement the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
determine if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
7. The device ofclaim 1, wherein the software operation includes at least one of: a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
8. A method to securely activate commands comprising:
receiving a software operation including an operation parameter;
receiving a first password;
selecting a secret key;
implementing a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
determining if the second password matches the first password, and if so, authorize the performance of the software operation by a processor.
9. The method ofclaim 8, wherein, if the second password does not match the first password, further comprising revoking the performance of the software operation by the processor.
10. The method ofclaim 8, further comprising receive routing information for the software operation.
11. The method ofclaim 8, further comprising determining if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
12. The method ofclaim 8, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted by a bus.
13. The method ofclaim 12, further comprising:
implementing the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
determining if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
14. The method ofclaim 12, wherein the software operation includes at least one of:
a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
15. A device comprising:
means for receiving a software operation including an operation parameter;
means for receiving a first password;
means for selecting a secret key;
means for implementing a key derivation function to generate a second password based upon the selected secret key and the software operation including the operation parameter; and
means for determining if the second password matches the first password, and if so, means for authorizing the performance of the software operation.
16. The device ofclaim 15, wherein, if the second password does not match the first password, further comprising means for revoking the performance of the software operation.
17. The device ofclaim 15, further comprising means for receive routing information for the software operation.
18. The device ofclaim 15, further comprising means for determining if the second password matches the first password such that the software operation is authorized to be performed, within a single atomic operation.
19. The device ofclaim 15, wherein, a master identifier identifying a commanding processor that has commanded the software operation is transmitted by a bus.
20. The device ofclaim 19, further comprising:
means for implementing the key derivation function to generate the second password based upon the selected secret key, the master identifier, and the software operation including the operation parameter; and
means for determining if the second password matches the first password of the commanding processor, and if so, authorizing the performance of the software operation.
21. The device ofclaim 15, wherein the software operation includes at least one of:
a key activation operation, a key revocation operation, a feature activation operation, or a feature deactivation operation.
22. A device comprising:
a transceiver configured to:
transmit a command for a secret key to a server;
transmit an identifier to the server;
receive a wrapped secret key from the server;
a storage device; and
a processor coupled to the transceiver and the storage device, the processor configured to:
receive the wrapped secret key from the transceiver;
unwrap the wrapped secret key to obtain the secret key; and
store the secret key in the storage device.
23. The device ofclaim 22, wherein unwrapping the wrapped secret key further comprises utilizing a key derivation function with the wrapped secret key and the identifier as inputs.
24. The device ofclaim 23, wherein the identifier includes at least one of a serial number or a manufacturer identifier.
25. The device ofclaim 24, wherein the identifier further comprises at least one of an identifier of a command processor or a global key.
26. The device ofclaim 23, wherein a first software operation by the processor commands the secret key from the server.
27. The device ofclaim 26, wherein a second software operation by the processor commands unwrapping the wrapped secret utilizing the key derivation function implemented by a key derivation device and storing the secret key in the storage device.
28. The device ofclaim 27, wherein the server utilizes a key derivation function to generate the wrapped secret key that is linked to the key derivation function of the computing device.
29. The device ofclaim 22, wherein the storage device is a one time programmable (OTP) memory or a ROM.
US14/856,2992015-09-162015-09-16Apparatus and method to securely control a remote operationAbandonedUS20170076106A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US14/856,299US20170076106A1 (en)2015-09-162015-09-16Apparatus and method to securely control a remote operation
CN201680051484.XACN108027865A (en)2015-09-162016-08-19Safely control remote-operated apparatus and method
PCT/US2016/047833WO2017048458A1 (en)2015-09-162016-08-19Apparatus and method to securely control a remote operation
US15/486,673US9973485B2 (en)2015-09-162017-04-13Apparatus and method to securely receive a key

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US14/856,299US20170076106A1 (en)2015-09-162015-09-16Apparatus and method to securely control a remote operation

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/486,673DivisionUS9973485B2 (en)2015-09-162017-04-13Apparatus and method to securely receive a key

Publications (1)

Publication NumberPublication Date
US20170076106A1true US20170076106A1 (en)2017-03-16

Family

ID=56853835

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/856,299AbandonedUS20170076106A1 (en)2015-09-162015-09-16Apparatus and method to securely control a remote operation
US15/486,673ActiveUS9973485B2 (en)2015-09-162017-04-13Apparatus and method to securely receive a key

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/486,673ActiveUS9973485B2 (en)2015-09-162017-04-13Apparatus and method to securely receive a key

Country Status (3)

CountryLink
US (2)US20170076106A1 (en)
CN (1)CN108027865A (en)
WO (1)WO2017048458A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9973485B2 (en)2015-09-162018-05-15Qualcomm IncorporatedApparatus and method to securely receive a key
WO2019071126A1 (en)*2017-10-062019-04-11Stealthpath, Inc.Methods for internet communication security
US10361859B2 (en)2017-10-062019-07-23Stealthpath, Inc.Methods for internet communication security
US10367811B2 (en)2017-10-062019-07-30Stealthpath, Inc.Methods for internet communication security
US10374803B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10375019B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10397186B2 (en)2017-10-062019-08-27Stealthpath, Inc.Methods for internet communication security
US10489579B2 (en)*2015-12-032019-11-26Nuvoton Technology CorporationAuthentication system and method for electronic governor of unmanned aerial vehicle
US10630642B2 (en)2017-10-062020-04-21Stealthpath, Inc.Methods for internet communication security
CN112436935A (en)*2019-08-262021-03-02英飞凌科技股份有限公司Password device, method of operating password device, vehicle, and storage medium
US11188239B2 (en)*2019-03-282021-11-30Western Digital Technologies, Inc.Host-trusted module in data storage device
CN114026876A (en)*2019-10-082022-02-08索尼集团公司Secure distribution of multi-resolution point clouds
WO2022096982A1 (en)*2020-11-062022-05-12International Business Machines CorporationSharing insights between pre and post deployment to enhance cloud workload security
US11558423B2 (en)2019-09-272023-01-17Stealthpath, Inc.Methods for zero trust security with high quality of service

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10993110B2 (en)*2018-07-132021-04-27Nvidia Corp.Connectionless fast method for configuring Wi-Fi on displayless Wi-Fi IoT device
US10833860B2 (en)*2018-09-042020-11-10International Business Machines CorporationShared key processing by a host to secure links
US11038698B2 (en)2018-09-042021-06-15International Business Machines CorporationSecuring a path at a selected node
US10764291B2 (en)2018-09-042020-09-01International Business Machines CorporationControlling access between nodes by a key server
US11991273B2 (en)2018-09-042024-05-21International Business Machines CorporationStorage device key management for encrypted host data
US10833856B2 (en)2018-09-042020-11-10International Business Machines CorporationAutomatic re-authentication of links using a key server
US11025413B2 (en)2018-09-042021-06-01International Business Machines CorporationSecuring a storage network using key server authentication
US11038671B2 (en)2018-09-042021-06-15International Business Machines CorporationShared key processing by a storage device to secure links
US11088829B2 (en)2018-09-042021-08-10International Business Machines CorporationSecuring a path at a node

Citations (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6208851B1 (en)*1997-02-042001-03-27National Telemanagement CorporationPrepay telecommunications system
US20010011228A1 (en)*1998-07-312001-08-02Grigory ShenkmanMethod for predictive routing of incoming calls within a communication center according to history and maximum profit/contribution analysis
US20020087393A1 (en)*1998-07-312002-07-04Laurent PhilonenkoDynamically updated QoS parameterization according to expected business revenue
US20040215564A1 (en)*1989-12-082004-10-28Online Resources & Communications CorpMethod and system for remote delivery of retail banking services
USRE38715E1 (en)*1995-05-162005-03-22Bmc Resources, Inc.Automated interactive bill payment system using debit cards
US6885857B1 (en)*1998-01-072005-04-26Verisign, Inc.System and method for real-time bundled telecommunications account processing and billing
US7076656B2 (en)*2001-04-052006-07-11Lucent Technologies Inc.Methods and apparatus for providing efficient password-authenticated key exchange
US20070125840A1 (en)*2005-12-062007-06-07Boncle, Inc.Extended electronic wallet management
US20080040786A1 (en)*2006-08-142008-02-14Samsung Electronics Co., Ltd.Client computer, remote control system, and remote control method
US20080162951A1 (en)*2007-01-022008-07-03Kenkare Prashant USystem having a memory voltage controller and method therefor
US20090154675A1 (en)*1997-02-042009-06-18Freedom Wireless, Inc.System and method of real-time call processing and billing
US20090171752A1 (en)*2007-12-282009-07-02Brian GalvinMethod for Predictive Routing of Incoming Transactions Within a Communication Center According to Potential Profit Analysis
US20110123026A1 (en)*2009-06-102011-05-26Rebuli DavidDuplication means for an electronically coded key and related method
US20110289591A1 (en)*2010-05-202011-11-24Kyocera Mita CorporationSoftware Validity Period Changing Apparatus, Method,and Installation Package
US20130042111A1 (en)*2011-08-092013-02-14Michael Stephen FiskeSecuring transactions against cyberattacks
US20130166820A1 (en)*2011-12-222013-06-27Fusion-Io, Inc.Methods and appratuses for atomic storage operations
US20130246260A1 (en)*2011-12-012013-09-19Barclays Bank PlcMobile Payment Transaction System
US20130326601A1 (en)*2011-12-072013-12-05Sharp Kabushiki KaishaCommunication system
US20140047555A1 (en)*2011-04-142014-02-13In-Webo Technologies SasMethod and system for securing a software program
US20140250508A1 (en)*2013-03-042014-09-04Dell Products, LpSystem and Method for Creating and Managing Object Credentials for Multiple Applications
US8832807B1 (en)*2010-08-052014-09-09Christine E. KuoMethod and apparatus for asynchronous dynamic password
US20140279477A1 (en)*2013-03-152014-09-18John SheetsAccount provisioning authentication
US20140317417A1 (en)*2013-04-232014-10-23Qualcomm IncorporatedGeneration of working security key based on security parameters
US20150128234A1 (en)*2009-02-032015-05-07Inbay Technologies Inc.System and method for generating passwords using key inputs and contextual inputs
US20150317634A1 (en)*2014-05-012015-11-05Fredrick Hugo Robinson AngoySecure text initiated payment processing system
US9246686B1 (en)*2014-06-172016-01-26Amazon Technologies, Inc.Salt value service
US20160036825A1 (en)*2014-07-292016-02-04Time Warner Cable Enterprises LlcCommunication management and policy-based data routing
US20160065550A1 (en)*2014-08-282016-03-03Yordan KanovDifferent authentication profiles
US20170161486A1 (en)*2015-12-082017-06-08Electronics And Telecommunications Research Instit UteApparatus and method for api authentication using two api tokens

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7293289B1 (en)*2002-09-102007-11-06Marvell International Ltd.Apparatus, method and computer program product for detection of a security breach in a network
US7216238B2 (en)*2003-06-302007-05-08Symbol Technologies, Inc.System and method for controlling usage of software on computing devices
US8126145B1 (en)*2005-05-042012-02-28Marvell International Ltd.Enhanced association for access points
US8254571B1 (en)*2007-12-212012-08-28Voltage Security, Inc.Cryptographic system with halting key derivation function capabilities
CA2743958C (en)2008-11-242016-11-08Certicom Corp.System and method for hardware based security
US20100306530A1 (en)*2009-06-022010-12-02Johnson Robert AWorkgroup key wrapping for community of interest membership authentication
US8935529B2 (en)*2009-11-302015-01-13Telefonaktiebolaget L M Ericsson (Publ)Methods and systems for end-to-end secure SIP payloads
US9043480B2 (en)*2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US9330245B2 (en)2011-12-012016-05-03Dashlane SASCloud-based data backup and sync with secure local storage of access keys
US8850543B2 (en)*2012-12-232014-09-30Mcafee, Inc.Hardware-based device authentication
CN103220271A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103220270A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
US9607177B2 (en)2013-09-302017-03-28Qualcomm IncorporatedMethod for securing content in dynamically allocated memory using different domain-specific keys
US9369445B2 (en)2013-11-082016-06-14MustBin Inc.Bin enabled data object encryption and storage apparatuses, methods and systems
AU2016218981B2 (en)*2015-02-132020-03-05Visa International Service AssociationConfidential communication management
US9602279B1 (en)*2015-06-092017-03-21Amazon Technologies, Inc.Configuring devices for use on a network using a fast packet exchange with authentication
US20170076106A1 (en)2015-09-162017-03-16Qualcomm IncorporatedApparatus and method to securely control a remote operation

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040215564A1 (en)*1989-12-082004-10-28Online Resources & Communications CorpMethod and system for remote delivery of retail banking services
USRE38715E1 (en)*1995-05-162005-03-22Bmc Resources, Inc.Automated interactive bill payment system using debit cards
US20090154675A1 (en)*1997-02-042009-06-18Freedom Wireless, Inc.System and method of real-time call processing and billing
US6208851B1 (en)*1997-02-042001-03-27National Telemanagement CorporationPrepay telecommunications system
US7162220B2 (en)*1997-02-042007-01-09Verisign, Inc.Prepay telecommunications system
US6885857B1 (en)*1998-01-072005-04-26Verisign, Inc.System and method for real-time bundled telecommunications account processing and billing
US20010011228A1 (en)*1998-07-312001-08-02Grigory ShenkmanMethod for predictive routing of incoming calls within a communication center according to history and maximum profit/contribution analysis
US20020087393A1 (en)*1998-07-312002-07-04Laurent PhilonenkoDynamically updated QoS parameterization according to expected business revenue
US7076656B2 (en)*2001-04-052006-07-11Lucent Technologies Inc.Methods and apparatus for providing efficient password-authenticated key exchange
US20070125840A1 (en)*2005-12-062007-06-07Boncle, Inc.Extended electronic wallet management
US20080040786A1 (en)*2006-08-142008-02-14Samsung Electronics Co., Ltd.Client computer, remote control system, and remote control method
US20080162951A1 (en)*2007-01-022008-07-03Kenkare Prashant USystem having a memory voltage controller and method therefor
US20090171752A1 (en)*2007-12-282009-07-02Brian GalvinMethod for Predictive Routing of Incoming Transactions Within a Communication Center According to Potential Profit Analysis
US20150128234A1 (en)*2009-02-032015-05-07Inbay Technologies Inc.System and method for generating passwords using key inputs and contextual inputs
US20110123026A1 (en)*2009-06-102011-05-26Rebuli DavidDuplication means for an electronically coded key and related method
US20110289591A1 (en)*2010-05-202011-11-24Kyocera Mita CorporationSoftware Validity Period Changing Apparatus, Method,and Installation Package
US8832807B1 (en)*2010-08-052014-09-09Christine E. KuoMethod and apparatus for asynchronous dynamic password
US20140047555A1 (en)*2011-04-142014-02-13In-Webo Technologies SasMethod and system for securing a software program
US20130042111A1 (en)*2011-08-092013-02-14Michael Stephen FiskeSecuring transactions against cyberattacks
US20130246260A1 (en)*2011-12-012013-09-19Barclays Bank PlcMobile Payment Transaction System
US20130326601A1 (en)*2011-12-072013-12-05Sharp Kabushiki KaishaCommunication system
US20130166820A1 (en)*2011-12-222013-06-27Fusion-Io, Inc.Methods and appratuses for atomic storage operations
US20140250508A1 (en)*2013-03-042014-09-04Dell Products, LpSystem and Method for Creating and Managing Object Credentials for Multiple Applications
US20140279477A1 (en)*2013-03-152014-09-18John SheetsAccount provisioning authentication
US20140317417A1 (en)*2013-04-232014-10-23Qualcomm IncorporatedGeneration of working security key based on security parameters
US20150317634A1 (en)*2014-05-012015-11-05Fredrick Hugo Robinson AngoySecure text initiated payment processing system
US9246686B1 (en)*2014-06-172016-01-26Amazon Technologies, Inc.Salt value service
US20160036825A1 (en)*2014-07-292016-02-04Time Warner Cable Enterprises LlcCommunication management and policy-based data routing
US20160065550A1 (en)*2014-08-282016-03-03Yordan KanovDifferent authentication profiles
US20170161486A1 (en)*2015-12-082017-06-08Electronics And Telecommunications Research Instit UteApparatus and method for api authentication using two api tokens

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
US RE38,715 E*

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9973485B2 (en)2015-09-162018-05-15Qualcomm IncorporatedApparatus and method to securely receive a key
US10489579B2 (en)*2015-12-032019-11-26Nuvoton Technology CorporationAuthentication system and method for electronic governor of unmanned aerial vehicle
US10965646B2 (en)2017-10-062021-03-30Stealthpath, Inc.Methods for internet communication security
US11463256B2 (en)2017-10-062022-10-04Stealthpath, Inc.Methods for internet communication security
US10374803B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10375019B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10397186B2 (en)2017-10-062019-08-27Stealthpath, Inc.Methods for internet communication security
US10361859B2 (en)2017-10-062019-07-23Stealthpath, Inc.Methods for internet communication security
US10630642B2 (en)2017-10-062020-04-21Stealthpath, Inc.Methods for internet communication security
US11930007B2 (en)2017-10-062024-03-12Stealthpath, Inc.Methods for internet communication security
WO2019071126A1 (en)*2017-10-062019-04-11Stealthpath, Inc.Methods for internet communication security
US11729143B2 (en)2017-10-062023-08-15Stealthpath, Inc.Methods for internet communication security
US11245529B2 (en)2017-10-062022-02-08Stealthpath, Inc.Methods for internet communication security
US10367811B2 (en)2017-10-062019-07-30Stealthpath, Inc.Methods for internet communication security
US11188239B2 (en)*2019-03-282021-11-30Western Digital Technologies, Inc.Host-trusted module in data storage device
CN112436935A (en)*2019-08-262021-03-02英飞凌科技股份有限公司Password device, method of operating password device, vehicle, and storage medium
US11558423B2 (en)2019-09-272023-01-17Stealthpath, Inc.Methods for zero trust security with high quality of service
CN114026876A (en)*2019-10-082022-02-08索尼集团公司Secure distribution of multi-resolution point clouds
WO2022096982A1 (en)*2020-11-062022-05-12International Business Machines CorporationSharing insights between pre and post deployment to enhance cloud workload security
GB2615677A (en)*2020-11-062023-08-16IbmSharing insights between pre and post deployment to enhance cloud workload security
US11947444B2 (en)2020-11-062024-04-02International Business Machines CorporationSharing insights between pre and post deployment to enhance cloud workload security
GB2615677B (en)*2020-11-062025-03-05IbmSharing insights between pre and post deployment to enhance cloud workload security

Also Published As

Publication numberPublication date
CN108027865A (en)2018-05-11
US20170222994A1 (en)2017-08-03
WO2017048458A1 (en)2017-03-23
US9973485B2 (en)2018-05-15

Similar Documents

PublicationPublication DateTitle
US9973485B2 (en)Apparatus and method to securely receive a key
JP6453486B2 (en) Accelerated passphrase verification
US9798887B2 (en)Computing device to securely activate or revoke a key
US9264413B2 (en)Management of network devices utilizing an authorization token
US11470092B2 (en)Expendable network access
US20150278506A1 (en)Authentication of a device
US9697385B2 (en)Security adjustments in mobile devices
US20180039817A1 (en)Method to authenticate or identify a user based upon fingerprint scans
US20180035293A1 (en)Authenticating a device utilizing a secure display
US10284653B2 (en)Method and apparatus for utilizing NFC to establish a secure connection
US20150121474A1 (en)Processor security authentication area
JP6440721B2 (en) Authenticating the use of applications by computing devices
US20170163417A1 (en)Apparatus and method for key provisioning
US20180152307A1 (en)Device to provide trusted time assurance
US20180019870A1 (en)Device to limit access to storage to authenticated actors only
KR102071281B1 (en)Method for intergraged authentication thereof
US20180101669A1 (en)Device to perform secure biometric authentication
US20240421981A1 (en)Key distribution using key duplication policies
US20180241778A1 (en)Device to perform policy verification

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:QUALCOMM INCORPORATED, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KEIDAR, RON;REEL/FRAME:036664/0141

Effective date:20150920

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO PAY ISSUE FEE


[8]ページ先頭

©2009-2025 Movatter.jp