The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 19, 2016

Filed:

Apr. 23, 2013
Applicant:

Qualcomm Incorporated, San Diego, CA (US);

Inventor:

Asaf Ashkenazi, San Diego, CA (US);

Assignee:

QUALCOMM Incorporated, San Diego, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/51 (2013.01); H04L 9/08 (2006.01); H04W 12/10 (2009.01); H04L 9/32 (2006.01); G06F 21/57 (2013.01); G06F 21/79 (2013.01); H04L 29/06 (2006.01); H04W 12/12 (2009.01); H04W 88/02 (2009.01);
U.S. Cl.
CPC ...
G06F 21/51 (2013.01); H04L 9/0866 (2013.01); H04W 12/10 (2013.01); G06F 21/575 (2013.01); G06F 21/79 (2013.01); H04L 9/3247 (2013.01); H04L 63/123 (2013.01); H04L 2463/061 (2013.01); H04W 12/12 (2013.01); H04W 88/02 (2013.01);
Abstract

Techniques for improving security of an electronics device are disclosed. In one aspect of the present disclosure, security of a device may be improved by generating a working key based on a hardware secret key and at least one security parameter of the device, e.g., with a key derivation function. The security parameter(s) may be related to software to be authenticated on the device and/or other aspects of security for the wireless device. The security parameter(s) may indicate whether the software is authorized and/or at least one operating function authorized for the software. At least one security function may be performed for the device based on the working key. For example, the working key may be used to encrypt, sign, decrypt, or verify data for the device. The working key may be used directly or indirectly by the software for the at least one security function.


Find Patent Forward Citations

Loading…