Unlock instant, AI-driven research and patent intelligence for your innovation.

Security module for performing security functions on untrusted platforms

A technology for security functions and security modules, which is applied in user identity/authority verification, countermeasures to attack encryption mechanisms, encryption devices with shift registers/memory, etc., and can solve problems such as difficulty in finding and extracting information.

Active Publication Date: 2018-08-24
NXP BV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The idea behind it is that it is more difficult to extract information just by looking at the code
So it's more difficult to find code that handles access and admission control for example for secure applications and change it accordingly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security module for performing security functions on untrusted platforms
  • Security module for performing security functions on untrusted platforms
  • Security module for performing security functions on untrusted platforms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]The description and drawings illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements not explicitly described or shown herein but which embody the principles of the invention and are included within its scope. In addition, the examples cited herein are in principle intended for demonstration purposes to help readers understand the principles of the present invention and the ideas contributed by inventors to advance technology, and are not to be construed as being limited to these specifically cited examples and conditions. Furthermore, as used herein, the term "or" is non-exclusive (ie, and / or) unless otherwise indicated (eg, "otherwise" or "alternatively"). Furthermore, the embodiments described herein are not necessarily mutually exclusive, and some embodiments may be combined with one or more other embodiments to form new embodiments.

[0033] In the deployment of secure softwar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for performing a security function on a data input by a security module, comprising: receiving an encrypted data value by the security module; decrypting the encrypted data value using a white-box decryption block cipher, and encoding the decrypted data value, wherein said data value is invisible to an attacker; performs a function on an encoded data value and produces an encoded result of said function, wherein said data value and result are invisible to said attacker; programs an encoded result of a function is decoded, and the result is then encrypted using a white-box encrypted block cipher, wherein the result is invisible to the attacker.

Description

technical field [0001] Embodiments disclosed herein relate generally to security modules for performing security functions on untrusted platforms. Background technique [0002] The Internet provides users with convenient and ubiquitous access to digital content. Since the Internet is a powerful distribution channel, many user devices strive to directly access the Internet. User devices may include personal computers, laptops, set-top boxes, Internet-capable media players, mobile phones, smartphones, tablets, mobile hotspots, or any other Internet-capable device. The use of the Internet as a distribution medium for copyrighted content presents powerful challenges to protecting the interests of content providers. Increasingly, user equipment operates using a processor loaded with appropriate software for rendering (playing back) digital content, such as audio and / or video. Control of playback software is one way to achieve the interests of content owners, including the term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCH04L9/002H04L63/1466H04L2209/16H04L2209/24
Inventor 威赫穆斯·P·A·J·米歇尔简·胡格布鲁格
Owner NXP BV