Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Patches Without Changing Keys

A key and patching technology, which is applied in the field of security patches without changing the key, can solve problems such as the difficulty of extracting information and the difficulty of finding and processing security applications

Active Publication Date: 2019-04-16
NXP BV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The idea behind this is that it will be more difficult to extract information through code inspection alone
Therefore, it is more difficult to find and change the code that handles access and permission controls for secure applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Patches Without Changing Keys
  • Security Patches Without Changing Keys
  • Security Patches Without Changing Keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The description and drawings illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise numerous arrangements (although not explicitly described or shown herein) which embody the principles of the invention and are included within its scope. Furthermore, all examples set forth herein are clearly intended primarily for teaching purposes to assist the reader in understanding the principles of the invention and ideas contributed by the inventors to advance the state of the art and are not to be considered limited to the examples and conditions specifically described. Furthermore, the term "or" as used herein refers to a non-exclusive or (ie and / or), unless otherwise indicated (eg, "or other" or "or in the alternative"). Furthermore, the various embodiments described herein are not necessarily mutually exclusive, and some embodiments can be combined with one or more other embodiments to form new embodiments. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation, wherein the first message uses a first portion of the cryptographic implementation; deciding to patch the cryptographic implementation; sending a second message from a second message set to the cryptographic implementation after deciding to patch the cryptographic implementation, wherein the second message use a second portion of the cryptographic implementation that is not used for any messages in the first message set.

Description

technical field [0001] Various exemplary embodiments disclosed herein generally relate to security patching in white-box implementations without changing cryptographic keys. Background technique [0002] The Internet has brought users easy and pervasive access to digital content. Because the Internet is a powerful distribution channel, many user devices strive to have direct Internet access. User devices may include personal computers, laptops, set-top boxes, Internet-enabled media players, mobile phones, smartphones, tablets, mobile hotspots, or any other device capable of accessing the Internet. The use of the Internet as a distribution medium for copyrighted content presents significant challenges in securing the interests of content providers. It is increasingly common for user devices to render (play back) digital content (such as audio and / or video) using a processor loaded with appropriate software. Control over playback software is a means of enforcing the interes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L63/0428G06F21/16H04L63/062
Inventor W·P·A·J·米歇尔斯简·胡格布鲁格
Owner NXP BV