Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for certificate management

A certificate and processor technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve security problems, increase the cost of different service providers, heavy memory and other problems

Active Publication Date: 2021-01-29
QUALCOMM INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While this technique provides for custom certificates, the memory requirement for the key pair is onerous, causing security issues if the private key is not stored in secure memory, and specifically if the private key is stored in secure memory , then the cost of each distinct service provider subscribed by the user increases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for certificate management
  • Method, device and system for certificate management
  • Method, device and system for certificate management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Techniques for online registration of a service, for obtaining a service provider signed certificate (SP signed certificate) for obtaining a service, and for using an SP signed certificate to obtain the service are discussed herein. For example, an encryption key pair comprising a device private key and a device public key is preferably generated during manufacture of the user device. The device private key is stored in a secure storage area or secure memory of the user device, such as a trusted execution environment. The user device contacts an online registration server (OSUS) via a communication network and the OSUS authenticates the user device. The device provides the device public key to OSUS and OSUS verifies that the user device uses a secure key provision, ie the device private key corresponding to the device public key is securely stored at the user device. For example, OSUS looks for the device public key in a whitelist database or for an indication of secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method, apparatus and system for credential management, the method comprising: establishing a telecommunication link between a device and a service provider system via a telecommunication network; The network receives a device public key from said device, said device public key prior to said establishment of said telecommunication link; authenticating said device at said service provider system stores a device private key at said In the secure storage area of ​​the device, the device private key corresponds to the device public key, the device public key and the device private key are an encryption key pair; and in response to the authentication The device stores the device private key in the secure storage area of ​​the device to authorize registration of the device for service registration by the service provider system.

Description

Background technique [0001] Electronic communications are often used to obtain a wide variety of information. For example, the user may obtain current or past news, entertainment content, research information, instructional information, and the like. Additionally, the information may take a variety of forms, such as publications, images, video, audio, and combinations of these. Information may be obtained using one or more service providers that provide access and / or content services. For example, information may be obtained by a user device that communicates with a content provider via one or more access providers (eg, telecommunications networks, network gateways, etc.) and downloads the information from the content provider via the access provider. The obtained information may be freely available, or may require payment by the user (eg, a paid subscription) to the content provider and / or access provider. For example, the user may be required to pay the service provider f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0894H04L9/321H04L9/3263H04L9/3247H04L9/3268
Inventor 李攘翁阿南德·帕拉尼古德李秀范拉贾特·普拉卡什
Owner QUALCOMM INC