The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 18, 2020

Filed:

Mar. 27, 2019
Applicant:

Sprint Communications Company L.p., Overland Park, KS (US);

Inventors:

Ronald R. Marquardt, Woodinville, WA (US);

Lyle Walter Paczkowski, Mission Hills, KS (US);

Arun Rajagopal, Leawood, KS (US);

Assignee:

Sprint Communications Company L.P., Overland Park, KS (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/32 (2006.01); G06F 21/44 (2013.01); G06F 21/57 (2013.01); G06F 21/60 (2013.01); G06F 21/72 (2013.01);
U.S. Cl.
CPC ...
H04L 63/0428 (2013.01); G06F 21/44 (2013.01); G06F 21/57 (2013.01); G06F 21/602 (2013.01); G06F 21/606 (2013.01); G06F 21/72 (2013.01); H04L 9/3263 (2013.01); H04L 9/3271 (2013.01); H04L 63/0272 (2013.01); H04L 63/0485 (2013.01); H04L 63/0823 (2013.01); H04L 63/0876 (2013.01); H04L 63/126 (2013.01); G06F 2221/2103 (2013.01);
Abstract

A data communication system exchanges user data between a first System-On-Chip (SOC) and a second SOC. The SOCs hash and transfer their read-only hardware-trust keys and receive hardware-trust digital certificates. The SOCs exchange and validate the hardware-trust digital certificates. The first SOC encrypts user data and transfers the encrypted user data responsive to the hardware-trust validations. The second SOC receives the encrypted user data, decrypts the encrypted user data, and processes the decrypted user data responsive to the hardware-trust validations. In some examples, the second SOC encrypts and transfers other user data responsive to the hardware-trust validations, and the first SOC receives, decrypts, and processes the other user data responsive to the hardware-trust validations. The first and/or the second SOC could be wireless communication devices.


Find Patent Forward Citations

Loading…