TWI264912B - Method and apparatus for building operational radio firmware using incrementally certified modules - Google Patents
Method and apparatus for building operational radio firmware using incrementally certified modulesInfo
- Publication number
- TWI264912B TWI264912B TW091136499A TW91136499A TWI264912B TW I264912 B TWI264912 B TW I264912B TW 091136499 A TW091136499 A TW 091136499A TW 91136499 A TW91136499 A TW 91136499A TW I264912 B TWI264912 B TW I264912B
- Authority
- TW
- Taiwan
- Prior art keywords
- incrementally
- operational radio
- building operational
- radio firmware
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Circuits Of Receivers In General (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/028,467 US20030115471A1 (en) | 2001-12-19 | 2001-12-19 | Method and apparatus for building operational radio firmware using incrementally certified modules |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200304317A TW200304317A (en) | 2003-09-16 |
TWI264912B true TWI264912B (en) | 2006-10-21 |
Family
ID=21843603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW091136499A TWI264912B (en) | 2001-12-19 | 2002-12-18 | Method and apparatus for building operational radio firmware using incrementally certified modules |
Country Status (7)
Country | Link |
---|---|
US (1) | US20030115471A1 (zh) |
EP (1) | EP1457016A2 (zh) |
KR (1) | KR100647172B1 (zh) |
CN (1) | CN100456765C (zh) |
AU (1) | AU2002352943A1 (zh) |
TW (1) | TWI264912B (zh) |
WO (1) | WO2003055174A2 (zh) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030067902A1 (en) * | 2001-09-21 | 2003-04-10 | Skeba Kirk W. | Method for providing multiple certified radio modules with a baseband |
KR100604828B1 (ko) * | 2004-01-09 | 2006-07-28 | 삼성전자주식회사 | 펌웨어 암호화 방법 및 해독 방법과 그 처리 장치 |
KR100703535B1 (ko) * | 2004-04-06 | 2007-04-03 | 삼성전자주식회사 | Iota-sd 서비스의 세그멘테이션 기법에서 사용자에의해 홀 크기를 조절 하는 방법 |
US20080168435A1 (en) * | 2007-01-05 | 2008-07-10 | David Tupman | Baseband firmware updating |
KR101393307B1 (ko) | 2007-07-13 | 2014-05-12 | 삼성전자주식회사 | 보안 부팅 방법 및 그 방법을 사용하는 반도체 메모리시스템 |
US9069990B2 (en) * | 2007-11-28 | 2015-06-30 | Nvidia Corporation | Secure information storage system and method |
US20090204801A1 (en) * | 2008-02-11 | 2009-08-13 | Nvidia Corporation | Mechanism for secure download of code to a locked system |
US9158896B2 (en) * | 2008-02-11 | 2015-10-13 | Nvidia Corporation | Method and system for generating a secure key |
US9069706B2 (en) * | 2008-02-11 | 2015-06-30 | Nvidia Corporation | Confidential information protection system and method |
US8719585B2 (en) * | 2008-02-11 | 2014-05-06 | Nvidia Corporation | Secure update of boot image without knowledge of secure key |
US20090204803A1 (en) * | 2008-02-11 | 2009-08-13 | Nvidia Corporation | Handling of secure storage key in always on domain |
US9613215B2 (en) | 2008-04-10 | 2017-04-04 | Nvidia Corporation | Method and system for implementing a secure chain of trust |
WO2009153387A1 (en) * | 2008-06-16 | 2009-12-23 | Nokia Siemens Networks Oy | Software loading method and apparatus |
US8880879B2 (en) | 2008-09-04 | 2014-11-04 | Intel Corporation | Accelerated cryptography with an encryption attribute |
US9240883B2 (en) | 2008-09-04 | 2016-01-19 | Intel Corporation | Multi-key cryptography for encrypting file system acceleration |
US20100064125A1 (en) * | 2008-09-11 | 2010-03-11 | Mediatek Inc. | Programmable device and booting method |
US8887144B1 (en) | 2009-09-04 | 2014-11-11 | Amazon Technologies, Inc. | Firmware updates during limited time period |
US9565207B1 (en) | 2009-09-04 | 2017-02-07 | Amazon Technologies, Inc. | Firmware updates from an external channel |
US10177934B1 (en) | 2009-09-04 | 2019-01-08 | Amazon Technologies, Inc. | Firmware updates inaccessible to guests |
US8214653B1 (en) * | 2009-09-04 | 2012-07-03 | Amazon Technologies, Inc. | Secured firmware updates |
US8102881B1 (en) | 2009-09-08 | 2012-01-24 | Amazon Technologies, Inc. | Streamlined guest networking in a virtualized environment |
US8971538B1 (en) | 2009-09-08 | 2015-03-03 | Amazon Technologies, Inc. | Firmware validation from an external channel |
US8601170B1 (en) | 2009-09-08 | 2013-12-03 | Amazon Technologies, Inc. | Managing firmware update attempts |
US8959611B1 (en) | 2009-09-09 | 2015-02-17 | Amazon Technologies, Inc. | Secure packet management for bare metal access |
US8640220B1 (en) | 2009-09-09 | 2014-01-28 | Amazon Technologies, Inc. | Co-operative secure packet management |
US8300641B1 (en) | 2009-09-09 | 2012-10-30 | Amazon Technologies, Inc. | Leveraging physical network interface functionality for packet processing |
US8381264B1 (en) | 2009-09-10 | 2013-02-19 | Amazon Technologies, Inc. | Managing hardware reboot and reset in shared environments |
EP2507991B1 (en) * | 2009-12-04 | 2017-08-30 | LG Electronics Inc. | Digital broadcast receiver and booting method of digital broadcast receiver |
CN101894233B (zh) * | 2010-07-23 | 2012-10-31 | 北京工业大学 | 一种可信赖的可重构器件及其使用方法 |
FR2989197B1 (fr) * | 2012-04-05 | 2014-05-02 | Toucan System | Procede de securisation d'acces a un dispositif informatique |
US9489924B2 (en) | 2012-04-19 | 2016-11-08 | Nvidia Corporation | Boot display device detection and selection techniques in multi-GPU devices |
US10659234B2 (en) * | 2016-02-10 | 2020-05-19 | Cisco Technology, Inc. | Dual-signed executable images for customer-provided integrity |
US10467415B2 (en) * | 2017-03-28 | 2019-11-05 | T-Mobile Usa, Inc. | Conditional updating based on bootloader unlock status |
KR102126931B1 (ko) * | 2018-11-07 | 2020-06-25 | 시큐리티플랫폼 주식회사 | 시큐어 부팅 장치 및 방법 |
RU2720220C1 (ru) * | 2019-06-21 | 2020-04-28 | Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") | Способ загрузки программного обеспечения |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4442486A (en) * | 1981-11-25 | 1984-04-10 | U.S. Philips Corporation | Protected programmable apparatus |
US5604806A (en) * | 1995-01-20 | 1997-02-18 | Ericsson Inc. | Apparatus and method for secure radio communication |
JPH10301773A (ja) * | 1997-04-30 | 1998-11-13 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
CA2306842A1 (en) * | 1997-11-03 | 1999-05-14 | Harris Corporation | Receiver for a reconfigurable radio system and method therefor |
CN1221916A (zh) * | 1997-11-10 | 1999-07-07 | 廖汉青 | 无线数据网中安全轻量事务处理的方法与系统 |
US6983374B2 (en) * | 2000-02-14 | 2006-01-03 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor |
US6785556B2 (en) * | 2000-08-11 | 2004-08-31 | Novatel Wireless, Inc. | Method and apparatus for a software configurable wireless modem adaptable for multiple modes of operation |
JP3893881B2 (ja) * | 2001-02-16 | 2007-03-14 | 株式会社日立製作所 | ソフトウェア無線機および無線システム、ソフトウェア無線機の認定方式 |
-
2001
- 2001-12-19 US US10/028,467 patent/US20030115471A1/en not_active Abandoned
-
2002
- 2002-11-27 WO PCT/US2002/037979 patent/WO2003055174A2/en not_active Application Discontinuation
- 2002-11-27 AU AU2002352943A patent/AU2002352943A1/en not_active Abandoned
- 2002-11-27 EP EP02789903A patent/EP1457016A2/en not_active Withdrawn
- 2002-11-27 KR KR1020047009775A patent/KR100647172B1/ko not_active IP Right Cessation
- 2002-11-27 CN CNB028255100A patent/CN100456765C/zh not_active Expired - Fee Related
- 2002-12-18 TW TW091136499A patent/TWI264912B/zh not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
US20030115471A1 (en) | 2003-06-19 |
TW200304317A (en) | 2003-09-16 |
EP1457016A2 (en) | 2004-09-15 |
WO2003055174A3 (en) | 2004-02-26 |
CN1606854A (zh) | 2005-04-13 |
KR100647172B1 (ko) | 2006-11-23 |
CN100456765C (zh) | 2009-01-28 |
KR20040073502A (ko) | 2004-08-19 |
AU2002352943A1 (en) | 2003-07-09 |
AU2002352943A8 (en) | 2003-07-09 |
WO2003055174A2 (en) | 2003-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI264912B (en) | Method and apparatus for building operational radio firmware using incrementally certified modules | |
HK1062243A1 (en) | A system and method for supporting multiple certificate authorities on a mobile communication device | |
TW200618572A (en) | Tokens/keys for wireless communications | |
MXPA03007737A (es) | Distribucion segura de claves de encriptacion. | |
TW429721B (en) | Method for two party authentication and key agreement | |
GB2388680B (en) | Method and apparatus for encrypting data | |
DE60326092D1 (de) | Speichern und authentifizierung von datentransaktionen | |
MXPA05008896A (es) | Procedimiento para la creacion y distribucion de claves criptograficas en un sistema de radio movil y sistema de radio movil correspondiente. | |
DE602005011639D1 (de) | Bootstrapping-authentifikation unter verwendung distinguierter zufallsabfragen | |
WO2004099921A3 (en) | Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device | |
DE60334614D1 (de) | Verfahren zum authentifizieren und verifizieren von sms-übermittlungen | |
WO2008080800A3 (en) | Securing communication | |
SG124291A1 (en) | Block cipher apparatus using auxuiliary transformation | |
WO2004073234A3 (en) | Key expansion for qkd | |
IL177796A0 (en) | Key-based encryption | |
WO2003039094A3 (en) | Methods and apparatus for securely communicating a message | |
WO2006113524A3 (en) | Roaming encryption key rekeying apparatus and method | |
WO2010010336A3 (en) | Mulitipad encryption | |
WO2007139706A3 (en) | Authenticating a tamper-resistant module in a base station router | |
SE0001044D0 (sv) | Metod och system för kryptering och autentisiering | |
MXPA05012481A (es) | Dispositivo y metodo para encriptar y desencriptar un bloque de datos. | |
DE60302631D1 (de) | System und Verfahren zum Verteilen von kryptographischen Schlüsseln, Zugangspunkt und System zum Verteilen eines Authentifizierungskodes | |
WO2007107976A3 (en) | Period keys | |
WO2001069843A3 (en) | Method and system for coordinating secure transmission of information | |
WO2005006628A3 (en) | Shared secret generation for symmetric key cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |