Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for automatic secret generation and distribution for secure systems

A technology for confidential information and security systems, applied in the field of automatic generation and release of confidential information for security systems

Active Publication Date: 2010-12-08
MATSUSHITA ELECTRIC WORKS LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

An example is a sensor that has no local interface, but allows remote control of its behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for automatic secret generation and distribution for secure systems
  • Systems and methods for automatic secret generation and distribution for secure systems
  • Systems and methods for automatic secret generation and distribution for secure systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the invention will now be described with reference to the drawings, in which like reference numerals indicate identical or functionally similar elements. Embodiments of the invention may be arranged and designed in a variety of different configurations, as shown in the drawings and generally described herein. Accordingly, the following more detailed description of several exemplary embodiments of the invention represented in the accompanying drawings is not intended to limit the scope of the claimed invention, but is merely representative of embodiments of the invention.

[0039] Herein, the word "exemplary" is only used to mean "serving as an example, instance, or illustration." Any embodiment described herein as "typical" is not necessarily to be construed as preferred or preferred over other embodiments. While the drawings illustrate aspects of the embodiments, the drawings are not necessarily drawn to scale unless specifically indicated.

[0040] Ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication program on a network authenticator establishes a secure communication channel with an embedded device. The authentication program receives security credentials from an embedded device. The authentication program receives from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device. The authentication program registers the secret for the embedded device.

Description

technical field [0001] The present invention relates generally to computer equipment. More specifically, the present invention relates to systems and methods for automatically generating and distributing secrets for use in security systems. Background technique [0002] Computer technology and communication technology are advancing at a rapid pace. In fact, computer technology and communication technology involve many aspects of people's daily life. For example, many devices that customers use today have a small computer inside the device. These small computers vary in size and complexity. These small computers include everything from a microcontroller to a full-featured turnkey computer system. For example, these small computers may be single-chip computers such as microcontrollers, single-board computers such as controllers, typical desktop computers such as IBM-PC compatibles, and the like. [0003] A computer typically has one or more processors at its core. Proce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F40/00
CPCH04L63/08H04L63/062
Inventor 托马斯·米利根布赖恩特·伊斯特汉
Owner MATSUSHITA ELECTRIC WORKS LTD