US20110010543A1 - Platform validation and management of wireless devices - Google Patents
Platform validation and management of wireless devices Download PDFInfo
- Publication number
- US20110010543A1 US20110010543A1 US12/718,480 US71848010A US2011010543A1 US 20110010543 A1 US20110010543 A1 US 20110010543A1 US 71848010 A US71848010 A US 71848010A US 2011010543 A1 US2011010543 A1 US 2011010543A1
- Authority
- US
- United States
- Prior art keywords
- validation
- pvm
- tre
- pve
- components
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
Definitions
- This application is related to communications.
- PVM platform validation and management
- FIG. 1 shows an example block diagram showing domain separation of trusted subsystems
- FIG. 2 shows an example block diagram showing trust between platforms is mediated by organizational and technical methods
- FIG. 3 shows an example flowchart of semi-autonomous validation with a home enhanced node-B (H(e)NB);
- FIG. 4 shows an example flow diagram of a method of four-stage secure start-up
- FIG. 5A shows a block diagram of an example set of entities and their relationships and interfaces for platform validation and management (PVM);
- PVM platform validation and management
- FIG. 5B shows another block diagram of an example set of entities and their relationships and interfaces for PVM
- FIGS. 6A , 6 B and 6 C show a signal diagram of an example method of validation using a platform validation entity
- FIG. 7 shows an example block diagram showing a H(e)NB communication scenario
- FIG. 8 shows an example block diagram of a “thin” trusted environment (TrE) in an H(e)NB;
- FIG. 9A shows an example diagram and method of indirect device connection
- FIG. 9B shows an example diagram and method of direct device connection
- FIG. 10 shows an example flowchart of processing separate certificates
- FIG. 11A shows an example method of validation with a failure of integrity verification followed by device remediation facilitated by a fallback code base
- FIG. 11B shows an example flowchart in accordance with the method of FIG. 11A ;
- FIG. 12 shows an example format for a reference integrity metrics shielding header
- FIG. 13 shows an example flow diagram of validation using a virtual platform configuration register value
- FIG. 14 shows an example diagram of module hierarchy when loading components during full semi-autonomous validation
- FIG. 15 shows an example functional block diagram of a wireless transmit/receive unit and a base station, each configured to provide, perform and implement PVM.
- wireless transmit/receive unit includes but is not limited to a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a computer, or any other type of device capable of operating in a wireless environment.
- base station includes but is not limited to a Node-B, a site controller, an access point (AP), a gateway, a customer premise equipment (CPE), or any other type of interfacing device capable of operating in a wireless or wireline environment.
- HMS includes, but is not limited to, a Home NodeB Management System (HMS), Home Enhanced-NodeB Management System (HeMS), where the two may be collectively referred to as H(e)MS, a Device Management System (DMS), a Configuration Server (CS), an Auto Configuration Server (ACS), or any other type of system that manages configuration or functionality of a “base station”.
- HMS Home NodeB Management System
- HeMS Home Enhanced-NodeB Management System
- CS Configuration Server
- ACS Auto Configuration Server
- WTRU and “base station” are not mutually exclusive.
- a WTRU may be an enhanced Home Node-B (H(e)NB).
- H(e)NB enhanced Home Node-B
- the term “information-theoretically secure” includes but is not limited to perfectly secure, unconditionally secure, and nearly information-theoretically secure.
- trust “trusted”, and “trustworthy”, as well as variations thereof, indicate a quantifiable and observable manner
- PVM platform validation and management
- PVE platform validation entity
- HMS home node-B management system
- CN core network
- the PVM operations are self-contained and concurrently allow for many variants, and manifold embodiments in different technical contexts.
- Example mappings to protocols such as the Internet Key Exchange (IKE) are provided for special cases where it may be necessary to describe an embodiment, but are not to be interpreted as limiting or restricting the overall scope of this disclosure.
- IKE Internet Key Exchange
- the PVM is also not restricted to H(e)NBs, although they are used in some places as examples.
- PVM extends without change of concepts, and with straightforward technical adaptations, to machine to machine (M2M) and other wireless and/or networked devices.
- M2M machine to machine
- TCG Trusted Computing Group
- TrE Trusted Environment
- RIMs Reference Integrity Metrics
- PVM embodies notions of trust integrated into a synthetic definition of trust in technical systems, wherein the emphasis is on means for establishing trust in systems.
- PVM uses de-centralization and separation of duties as core paradigms. This permits scalable trust as is needed for evolving communication networks and the Internet, where nodes become ever more heterogeneous and connections more ephemeral.
- Predictability designates a priori knowledge about a system that may be used to a) assess the risk incurred in interacting with that system, and b) allow obtaining knowledge about the system during the interaction by reasoning on observations.
- Observability specifies the means by, and extent to which knowledge about a system can be gained in interactions. It is closely linked to predictability, in that observations, together with predictions yield further knowledge on a systems state and future behavior.
- Contextuality designates information delineating the scope of interactions with the system in which predictions hold and observations can be made. Taken together, they allow an assessment of the trustworthiness of it, or reciprocally, the risk it poses to an interacting entity.
- the building blocks of a trusted system establish its trust boundary, and sometimes provide methods to extend it, and to convey trust to an outside entity by making its behavior and operation predictable and observable to a certain extent.
- the building blocks may include (hardware) security anchors, Roots of Trust (RoT), Trusted (Sub-) systems and ownership, secure storage and paths, authorization, authenticated and secure boot processes, and attestation.
- a hardware security anchor is important to the protection of the system behavior. This is a part of the system which is protected against unauthorized access by hardware measures known to be secure enough for the intended purpose to effectively mitigate risks of attacks against it. It holds, in particular, the RoT for its secure operation.
- the RoT is an abstract system element which enables a) securing of the internal system operation, and b) exposing properties and/or the identity (individually or as a member of a group such as make and model) of the system to external entities in a secure and authentic way.
- a system may contain more than one RoT for distinct purposes.
- RoTs are asymmetric key pairs together with digital certificates of a trusted third party for them.
- SIM Subscriber Identification Module
- the Trusted Computing Base comprises such components of a system which cannot be examined for their operational trust properties when the system is deployed in the field and during operation, but only by out-of-band processes like compliance and conformance testing, and certification.
- This kind of certification is usually carried out by an independent evaluator, for instance on behalf of the manufacturer of a certain technical element of the TCB or the TCB as a whole, according to established security evaluation standards.
- the TCB respectively, its elements should be endowed with information identifying them as such certified pieces of technology.
- TS Trusted System
- TSS Trusted Subsystems
- TPM Trusted Platform Module hardware
- TRs trusted resources
- Two kinds of TRs must be generally distinguished: 1) TRs which belong to the TCB; and 2) TRs which are outside the TCB. Examples for the latter are trusted parts of the operating system, and trusted applications which build on the TCB by using its capabilities. While assertions about the trustworthiness of the TR in the TCB depend on the defined security of the TCB, the trustworthiness of the other TRs can, at most, be derived from that of the TCB.
- the TCB must provide certain internal TRs that allow extension of the trust boundary, i.e., the totality of components of a TS that are considered trustworthy in a given context, to the TRs outside the TCB, for instance authenticated or secure boot as described below.
- TRs within the TCB often share the same hardware protection with the RoT, for instance, reside on the same tamper-resistant chip.
- TRs outside the TCB may be realized as logical units in software. Note that the trust boundaries, especially involving TRs that are outside of the TCB, may be ephemeral. They may exist for some time for certain purposes, and then may cease to exist afterwards.
- a general model of a process to extend the trust boundary beyond the TCB is verification.
- This is itself a TR implementing the verification process.
- This is identified as the verification process and the corresponding TR verification entity, or verifier, to distinguish it from the process of validation of a TS by an external entity, i.e., the validator.
- Verification as a process includes a new component in the trust boundary that may come in at least two different forms. First, the verifier measures a new component at the time of its initialization. That is, the component, its status and configuration is uniquely identified. The result of this measurement is then stored. As an extension of this, the verifier may compare the measurements with reference values and decide whether or not to extend the trust boundary. That is, the verifier may make and enforce a policy decision.
- verification corresponds to predictability of the TS, as it can be assumed to be in a certain, pre-defined state after the verification process is completed.
- Validation makes this property observable and therefore trustworthy. It means that a reporting entity transfers the results of verification to another party.
- the third, intermediate step performed by the reporting entity is that of attestation. Attestation is a logical consequence of verification and a logical precondition for validation. It is the process of vouching for the accuracy of measurement information, such that a relying party—the validator—can use it to decide whether it trusts the remote TS.
- Verification, attestation, and validation are core concepts for operational trust, which are tied to the lifecycle of a TS.
- a TS is owned by an entity (a person or other technical system) who or which is authorized to access certain TRs within the trust boundary, for instance the RoT. Ownership may be implicitly realized by physical possession of the TS, i.e., the platform containing it, or explicitly, for instance, by authentication of the owner through certain credentials. In the context of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) specifications, the provisioning of such authentication data is called taking of ownership.
- TCG Trusted Computing Group
- TPM Trusted Platform Module
- An owner interacting directly with a TS is called a local owner, whereas an owner whose interaction with the TS is mediated in any way, e.g., through a communication network, is called a remote owner.
- TSS Trusted Computing Group
- each may or may not have a different owner.
- FIG. 1 shows the separation of computing domains of several TSSs 110 , 130 , 150 and 170 .
- TSSs 110 , 130 , 150 and 170 each consist of dedicated Mobile Trusted Modules (MTM) 112 , 132 , 152 and 172 , respectively.
- MTM Mobile Trusted Modules
- the hardware security anchor of Mobile Phone Work Group (MPWG) specifications contains the mentioned RoTs, TRs (trusted resources 114 , 134 , 154 and 174 ) and trusted services 116 , 136 , 156 and 176 .
- the normal software services and components 118 , 138 , 158 and 178 are outside the trust boundary 120 , 140 , 160 and 180 , respectively.
- the so called trusted engine 122 , 142 , 162 and 182 , respectively, in which all these reside is a secure computing environment, based on the RoTs providing, in particular, separation and controlled communication between different TSS 110 , 130 , 150 , and 170 , respectively.
- TSS can share TRs and even functions of MTMs with other TSS, conditioned by inter-domain validation and authorization.
- Trusted engines, but also some of the MTMs may be realized in software as long as at least one hardware protected RoT is present from which the RoTs of the software based MTMs are derived.
- Each TSS may be under the control of a local or remote stakeholder or owner. In the lifecycle of a mobile device, not all stakeholder TSS are present and processes exist in which a (remote) stakeholder may initialize the creation of a new TSS and take ownership of it.
- PVM is, in part, based on the establishment of trust. Between trust and enforcement, the main bridging concept is separation of duties. Separation of duties is normally understood as referring to duties on enforcement. But there is a natural relationship to trust. The relying party may delegate the enforcement to the other system only if it is operationally trustworthy. The establishment of operational trust between TS rests on the controlled exchange of information to enable observability and the pre-establishment of predictability. The latter can only be done outside of the TS.
- FIG. 2 shows an example model exhibiting the roles of external entities providing organizational assurance to TS 200 , 202 .
- TS 200 , 202 includes normal applications 260 , 262 external to trust boundaries 270 , 272 .
- TCB 216 , 218 which in turn includes RoTs 208 , 210 and TRs 212 , 214 .
- the trust boundary 270 , 272 can further include trusted operating systems 230 , 232 or parts thereof which need protection and trusted applications 234 , 236 .
- the security properties of a TS 200 , 202 are rooted in the hardware trust anchors 204 , 206 and the RoTs 208 , 210 . These technical components cannot be examined while the system is deployed and operational. Therefore, they undergo a security evaluation during design and development. This is performed by an independent authority which, upon successful evaluation, issues certificates of security to the manufacturer of the security critical components.
- security processes may also include other TRs 212 , 214 in the TCB 216 , 218 and involve different certification authorities 220 , 222 .
- certification authorities 224 may, for instance, be para-statal or private entities with state permits.
- the accreditation authorities 224 may also serve to provide bridging information between certification authorities 220 , 222 .
- These credentials 226 , 228 are certificates in the sense that they are verifiable in their integrity and provenance.
- a prime example is the Endorsement Key (EK) certificate issued to the TPM's main RoT (the EK) by its manufacturer, as well as the Platform Certificate and other components' certificates.
- EK Endorsement Key
- These credentials and secrets derived from them by cryptographic means, are then also used in the interaction with external entities, in particular other TS'.
- Validation 240 of the TSs 200 , 202 generally needs authentication and, in many cases, also confidentiality.
- secrets and credentials with trust inherited from the TS credentials are essential for operating systems 230 , 232 and trusted applications 234 , 236 to build security associations 242 , 244 , respectively, that is, channels which provide authentication, confidentiality, and integrity of communication.
- security associations 242 , 244 applications within the extended trust boundary can build secure communication channels with well defined operational trust properties.
- a mediation entity 250 facilitates trust establishment between the various interactions shown in FIG. 2 .
- a Privacy Certification Authority (PCA) is an example of a mediation entity 250 .
- Mediation entity 250 issues fundamental statements about the trustworthiness of a TS to another TS or relying party.
- the mediation entity identifies the TCB 216 , 218 or selected elements, e.g., the trust anchor 204 , 206 as such, as trusted and certified components.
- the mediation entity 250 needs to know the certificates issued by the certification entities, verify them when it receives it from a TS, and issue an assurance statement to a relying party.
- the mediation entity 250 may facilitate subsequent security association and secure communication, similarly to a Certification Authority (CA) in Public Key Infrastructures (PKI).
- CA Certification Authority
- PKI Public Key Infrastructures
- Verification is, in essence, a recording and controlling of state changes of a TS to the desired granularity. As such, it may be tightly bound to the operational cycle of the platform on which a TS resides, from initialization to shutdown. Therefore, practical verification methods are mostly integrated with the boot process and operational cycle of platforms that are implemented by on or more processors of the physical device, such as the WTRU.
- One method for the internal verification of a TS is authenticated boot, and uses capabilities of the TCB to assess the trustworthiness of loaded or started software or hardware components at the time the TS is initialized, e.g., when powering on a WTRU.
- Authenticated boot is realized by starting certain functions of the RoT and the TCB before starting other parts of the TS. These parts operate as a RoT for Measurement (RTM).
- RTM RoT for Measurement
- the measurement values may be stored in secure storage. Together with data necessary to retrace the system state from them, e.g., software names and versions, they form the Stored Measurement Log(SML) of the TS.
- authenticated boot may include all components from the BIOS to the Operating System (OS) loader and the OS itself.
- a system state is measured by a reporting process, with a TPM as central authority, receiving measurement values and calculating a unique representation of the state using hash values.
- the TPM may receive 1) a hash value of an application or file, i.e., the application's measurement value, calculated by an external (software) implementation, or 2) the TPM may calculate the hash value, i.e., the measurement value itself using an internal hash algorithm implementation.
- the TPM has several protected Platform Configuration Registers (PCRs).
- a measurement value e.g., a hash value over the BIOS
- the active PCR is updated by an extend procedure, which means that the measurement value is appended to the current PCR value, a digest value is built over this data, and stored in the PCR.
- a transitive chain of trust is built containing all started and loaded components. Where a single PCR stores only one value, it can only provide “footprint-like” integrity validation data. This value allows a validator to verify this chain of trust by recalculating this footprint, only in conjunction with the SML.
- Secure boot is an extension of authenticated boot. It is of particular importance for devices like set-top boxes or mobile handsets that necessarily have some stand-alone and offline functional requirements.
- the common characteristic of devices equipped with secure boot is that they are required to operate in a trustworthy set of states when they are not able to communicate assertions on their trustworthiness to the exterior, e.g. before network access.
- the TS is equipped with a local verifier (a verification entity) and local enforcer supervising the boot process, which establishes the combination of a Policy Enforcement Point (PEP) and Policy Decision Point (PDP) to control the secure boot process.
- PEP Policy Enforcement Point
- PDP Policy Decision Point
- the local verifier compares measurement values of newly loaded or started components with Trusted Reference Values (TRVs) which reside in the TCB, or are protected within the TS by a TR, e.g., they are located in protected storage space, and decides whether they are loaded, started, or not started.
- TRVs Trusted Reference Values
- Trusted reference data is data which is used to compare validation data to known good values. Those values, which constitute trusted reference data, are called Trusted Reference Values (TRVs). Their best-known example is Reference Integrity Metrics (RIMs), as specified in the TCG's MPWG specifications. They may be used genuinely, a) by the platform itself in secure start-up, to ensure that only components whose measurements conform to a TRV are started, or b) by the validator, to compare validation data to known good values and thereby assess the platform state in validation. The term RIM may be used in the description as a non-limiting example of a trusted reference data.
- trusted reference data becomes trusted through certain security assertions about it, which are verifiable by the validator or the agent using the TRV in question.
- verifiable assertions may be realized for instance by digital certificates issued by a trusted third party (TTP), giving rise, in the example, to the so called RIM certificates.
- TTP trusted third party
- the trust assertions of trusted reference data may also contain additional information for instance about external evaluation (e.g., according to a Common Criteria Evaluation Assurance Level, EAL) of a component or platform.
- EAL Common Criteria Evaluation Assurance Level
- TRVs serve the local verification in a secure boot process.
- TRV provisioning infrastructure that allows, for instance, updates of measured components, by provisioning of new TRVs corresponding to the updated software to the TS.
- TRVs and according certificates play an important role not only in verification, but also in validation.
- Freshness of the attestation information is an important issue for validation. This necessitates extending the verification process from boot to operation time of the TS, which is a technically hard task in complex open systems.
- the mentioned separation of duties is also present on the process of validating a TS. Namely, based on the result of verification, the trustworthiness of the system may be assessed and, accordingly policy decisions may be made in the validation.
- the separation of tasks in this process between TS and validator leads to three categories of validation. A common base concept needed for any kind of validation is first described herein.
- a validation process of a TS must be supported by a validation identity which is exhibited to the validator.
- the validation identity must come directly or indirectly from a RoT, namely a RoT for Reporting (RTR). Validation may not be possible without a mediator.
- This validation identity provider has the task to assert that the holder of the validation identity is a TS.
- Provisioning of a validation identity is an extension of identity provisioning in identity management (IdM) systems. The provider has to perform checks on credentials of the TS, including some or all TRs in the TCB, to assess if the TS is in a trustworthy state for validation.
- the provisioning of validation identities must be performed in a secure process, e.g., a security protocol on a dedicated secure channel. In case of remote validation, the validation identity may coincide with a global identity of the TS.
- Validation using unique persistent validation identities is important with regard to security. Validation may occur frequently and indiscriminately to many validators for varied purposes. Though the validation identities used may each not be easily associated to a user identity, they generally allow a tracing of the TS' behavior. Using the same validation identity for a group or all TS is not an option to resolve this for security reasons. Such a group identity would be a single point of attack/failure, that is, if one TS of the group is compromised, then all others cannot perform validation any more as well. The other option is to use ephemeral validation identities generated, for instance, once in each boot cycle, with determined frequency, or generated by the RTR for each validation.
- Autonomous validation is a procedure where the validation of the TS by an external validator is implicitly done based on an assumption that the verification of the TS must have been performed entirely locally, i.e., within the confines of the device itself, i.e., in a way that does not depend upon external entities.
- successful verification is assumed to have occurred before the TS will allow further communication attempts with the exterior or other operation.
- the verification process is assumed to be absolutely secure in this case, as no direct evidence of the verification is provided to the outside world.
- the outside world makes the assumption that, due to the way in which TS are specified and implemented, a TS which fails verification will be prevented by its TCB from performing other tasks that would be visible to the external world, e.g., attaching itself to a network or obtaining an authenticated connection to a remote entity.
- Autonomous validation lays all enforcement duties on the TS.
- Autonomous validation is applying a closed, immutable system model to the TS, which is essentially the trust model used in smart cards.
- the TS verifies itself using the TCB, and the result is a binary value of “success” or “failure”.
- Validation is then an implicit process by which the TS allows certain interaction with the exterior, such as a network attachment.
- a typical example is the release of an authentication secret, e.g., a cryptographic key, by a smart card.
- Autonomous validation delivers little information for advanced security requirements; in particular, if the TS is partially compromised, the exterior cannot gain any knowledge about its state. Labeling of rogue devices is therefore impossible, meaning that an exploit might proliferate without being noticed and cause significant damage to other stakeholders, such as network operators, before it can be contained. Autonomous validation may be realized in such a way that verification is reactive to certain conditions, e.g., by not allowing certain functions, or by closing the device down and going to re-boot, depending on failure policy. This avoids network connection and seems advantageous. But this is also a vector for denial-of-service (DoS) attacks.
- DoS denial-of-service
- the device must not attach to the network in a compromised state and, thus, has little chance to revert to a secure state.
- Remote management is also difficult; specifically there may be a loss of security in software download and installation since it potentially delivers values (software, secrets) to rogue devices.
- autonomous validation is prone to entailing out-of-band maintenance. For instance, failure of the update of software of a TR may lead to a state in which network connection is impossible.
- autonomous validation With autonomous validation, the freshness of the attestation data is not by itself guaranteed. For this security property to be fulfilled, autonomous validation may have to take place automatically on every system state change. As autonomous validation happens infrequently in practice, e.g., during network attachment, the TS′ state may change significantly during operation of the TS, in a manner unobservable by the validator. Thus, an attacker may use this gap, for instance, to introduce malicious software. Autonomous validation is extremely prone to this kind of timing attack.
- the validator In remote validation, the validator directly assesses the validity of the TS based on the evidence for the verification it receives.
- the verification is only passive in this case, and the full SML must be conveyed to the validator.
- the model case for this is verification by authenticated boot and following validation. All policy decisions rest with the validator.
- the current state of the art for validation technology is remote validation and particularly that of TCG remote attestation.
- a TCG trusted platform exhibits SML and PCR, the validation and verification data of remote ateestation, signed by an Attestation Identity Key (AIK) to the external validator.
- AIKs are ephemeral asymmetric key pairs, certified by a PCA which acts as validation identity provider.
- the pseudonym provided in remote attestation may not be sufficient in all cases.
- the TCG has additionally defined Direct Anonymous Attestation (DAA), which is based on zero-knowledge proofs.
- DAA Direct Anonymous Attestation
- remote validation As both remote and autonomous validation are extremes of a spectrum of options which are subsumed in semi-autonomous validation, remote validation also has disadvantages.
- Remote validation as represented by remote attestation, poses practical problems with respect to scalability and complexity, as it lays the full computational load for validation on (central) access points to networks or services.
- the validation of an SML may be very costly for platforms like personal computers with a large number of software and hardware components in numerous versions and configurations.
- TRVs such as RIMs
- run-time verifications are desirable with remote validation, as otherwise only the state after boot is exhibited to the validator.
- the SML can be “withered” at time of validation.
- run-time verification becomes meaningless if it is not directly followed by validation, which would necessitate very frequent remote validations.
- remote validation of complex open TS' compromises privacy, in spite of usage of a PCA, since the revealed SML might be almost unique to a TS.
- remote attestation that is, the threat that only recent versions of software of major vendors enters into TPV databases such as RIM databases, forcing users of other programs to switch to these or loose service access.
- Some of the disadvantages may be alleviated by refined forms of remote attestation, such as semantic or property-based attestation, aiming at exhibiting the characteristics of components rather than a concrete implementation.
- Semi-autonomous validation is another procedure where the TS' validity is assessed during verification locally on the device within itself without depending on external entities, and policy decisions are made during verification. But in this case, certain information, herein called a “validation message”, such as the result of the verification and required evidence, is signaled to the validator, who can make decisions based on the content of the validation messages from the TS. The signaling from TS to validator must be protected to provide authentication, integrity, and confidentiality if desired.
- a model case for semi-autonomous validation is secure boot, followed by a signaling of the event structure and indication of TRVs, such as RIMs, to the validator.
- Semi-autonomous validation distributes verification and enforcement tasks between TS and validator. Specifically, in secure boot, the former makes decisions at load time of components, while the latter can enforce decisions on the interactions permitted to the TS upon validation, based on the state evidence provided.
- Semi-autonomous validation may provide advantages over the other two options. It may potentially transport the validation information more efficiently in the form of indicators of the RIMs used in verification. This may also be used to protect privacy, for instance, when such an indication designates a group of components with the same functionality and trustworthiness (such as versions). This is similar to semantic and property-based attestation, and semi-autonomous validation may be combined with the mentioned advanced forms of remote validation. The interplay of enforcement in verification on the part of the validator also provides options for remote management of a TS.
- remediation may be utilized, to obtain “support for the isolation and remediation of ARs (Access Requestors) which do not succeed in obtaining network access permission due to failures in integrity verification.”
- ARs Access Requestors
- This allows, in principle, bringing the AR up to date in all integrity-related information, as defined by the current policy for authorization. Examples include OS patches, Antivirus (AV) updates, firmware upgrades and other similar software or firmware updates.
- AV Antivirus
- Concrete concepts for realization of remote management may have to rely on an infrastructure for the efficient representation and communication of TRV information, such as RIM information, as is described herein for PVM.
- RIM certificates are provided by a certification authority which has assessed, directly or by delegation, the corresponding TR. Certification methods and bodies may be diverse and lead to different levels of operational trustworthiness. This leads to further flexibility for a semi-autonomous validator who gets more fine-grained information on the TS. As noted herein, RIM certificates are used as an example for data that may support an on-device validation of components. Although a RIM certificate based SAV method is described herein, other SAV variations may be used.
- Semi-autonomous validation is also the only practical validation option for systems which are resource limited so that a) they lack the processing capabilities to do autonomous validation, and b) lack the memory and/or communication capabilities to perform the extensive reporting needed for remote validation.
- both limitations may hold for the sensor nodes.
- one approach is to send memory probing code to the sensors that calculate a digest value of the static memory content (code and parameters) which leads to a predictable result which is returned to the base station for validation. An attacker could obviously try to circumvent this “attestation” by using saved, original memory contents to produce the correct outcome.
- a H(e)NB's validity is assessed internally during secure start up without depending on external entities, and policy decisions are made during this assessment, in particular on which components to load/start and which not, based on their measured integrity.
- the result of the assessment and required evidence are signaled to a platform validation entity (PVE), which may make its own decisions based on the content of the validation messages.
- PVE platform validation entity
- the signaling to the PVE should be protected to provide authentication, integrity, and, if desired, freshness and confidentiality.
- Semi-autonomous validation distributes integrity verification and enforcement tasks between H(e)NBs and external validating entity such as the PVE.
- the H(e)NB makes decisions locally at load/start time of components, while the PVE can enforce decisions on the interactions permitted to the H(e)NB upon validation, based on the state evidence provided.
- the PVE can enforce decisions on the interactions permitted to the H(e)NB upon validation, based on the state evidence provided.
- either full access to a network and services is granted or more limited measures such as quarantined network access and forced configuration changes may be provided.
- the H(e)NB may perform a semi-autonomous validation of the integrity of the H(e)NB as illustrated by flowchart 300 of FIG. 3 .
- the TrE of the H(e)NB Before proceeding to perform a device authentication procedure, the TrE of the H(e)NB first performs a check of the integrity of certain pre-designated components (such as boot codes) of the H(e)NB ( 305 ). The integrity check results are then recorded or stored at least temporarily ( 310 ).
- This may be initiated autonomously by the TrE itself before the first instance of authentication (for the purpose of setting up a secure backhaul link, for example) after power-on of the H(e)NB. This may be considered as ‘secure boot’.
- the TrE ensures the integrity of the H(e)NB by enforcing that only registered components may be loaded and/or started into an integrity-proven state. If the trust built needs to be reassessed, for instance because of a change in configuration of the H(e)NB that is made after a previous successful network connection session, then this check of the attainment of the integrity-proven start-up state may reoccur in two ways. In the first case, the check may be initiated autonomously by the TrE itself. Alternatively, it may be initiated by a request from the network (e.g., a Secure Gateway (SeGW) or platform validation entity (PVE)), which request the TrE is then required to fulfill.
- SeGW Secure Gateway
- PVE platform validation entity
- the TrE may then check if a pre-defined portion of the rest of the H(e)NB has achieved a state of secure start-up ( 315 ). Further checks may take place either by the TrE itself or by a measuring component in the H(e)NB external to the TrE but integrity-protected by the TrE ( 320 ). In such later-stage checks, integrity of other components, configurations, or parameters of the rest of the H(e)NB is checked when they are loaded or started, or at other, pre-defined run-time events, wherever such are available to the measuring component.
- the secure start up check results are recorded or stored at least temporarily ( 325 ).
- the secure start-up check results as well as the integrity check results are recorded, preferably, in ways that utilize protected storage provided by the TrE or other forms of integrity protection such as keyed hash values.
- the results i.e., the single measurements themselves, may additionally be equipped with secure time-stamps to provide freshness and replay protection for the measurements themselves, in addition to the freshness already provided in the protocol with the PVE.
- a freshness information may for example be achieved by including the value of the time-stamp into the measurement by concatenating the values before applying the hash function and then storing the result in a protected register, for instance a PCR.
- the TrE then processes the results of the checks to form a validation message out of such results, to be conveyed to the PVE ( 330 ).
- the PVE upon receipt of such a message, may then use it to assess the trust state of the H(e)NB ( 335 ).
- the TrE signs a statement, using a signing key protected by the TrE and hence protecting the integrity of the statement, that the H(e)NB has passed an autonomous validation check.
- the statement may also include evidence that may be used by the PVE to assess the state or result of the integrity check performed by the TrE on the pre-designated components of the H(e)NB and may also include evidence of any binding between the autonomous validation check and of a subsequent procedure of device authentication.
- the TrE may also put a time-stamp on such a statement to ensure freshness.
- a signed statement attests to the fact that the message that the TrE makes out of the re-ordered data or results and transferred to the PVE comes from the H(e)NB's TrE after a secure start up procedure.
- the validation should be bound to device authentication, or otherwise a separate TrE identity should be used.
- This signing adds to the security of the purely autonomous validation check by adding some traceability, backed up by the fact that the results of the TrE's autonomous checks of the H(e)NB's start-up configuration are trusted.
- the TrE forwards the signed statement to the PVE via the SeGW, which can then use the signed statement from the H(e)NB and may decide whether to allow the H(e)NB to move forward with authentication ( 340 ).
- the PVE may use information in the signed statement in various ways.
- the PVE may check the integrity of the TrE itself against a single, static configuration, and reject access connections in case of failure.
- the PVE may be configured to make fine-grained decisions on access control. That means in particular that access can be denied based on the presence/absence and integrity of single/multiple components inside or outside the TrE.
- the PVE may be configured to fetch information on the integrity and security properties of components of the H(e)NB from trusted third parties. This means that the PVE may be configured to fetch information on reference values, i.e. validation data, for components on the device. The information on actual integrity of components is then derived by the comparison process of validation data to the data received from the device. The PVE would not directly fetch the statements on component integrity from TTPs, but only TRVs to which the reported values can be compared. In still another embodiment, PVE may be configured to mandate configuration changes before allowing access. Such remediation procedures may include forced software updates.
- the TrE may be capable of making trusted and accurate time-stamps and can sign them with key(s) protected within or by it.
- the external validator could verify the ‘time’ when the local autonomous device integrity check was performed by the TRE. This may mean one time-stamp is taken at the time of the first or last measurement. It may alternatively mean that the time-stamp is applied at the time of the protocol run with the PVE. It may also mean inclusion of a time-stamp in every measurement. A desired ‘time-granularity’ may direct which alternative is applicable.
- the TrE may be configured to insert two time-stamps, one taken before and the other taken after, the local autonomous device integrity check is performed by the TRE.
- Such a pair of time-stamps effectively ‘binds’ the range of time when the local autonomous device integrity check really occurred, and the TrE, by sending such time stamps along with the data that indicates the outcome or process of the local autonomous integrity check, may enable the external validator to not only assess the device integrity state but also know the temporal history of when and how the H(e)NB's integrity was measured and verified locally by the TrE.
- the validator may make it possible for the validator to use its own ‘time windows’ to determine how the signed statement it has received from the TrE regarding the state of the device integrity could be processed depending on the time when 1) such a statement was obtained (which is indicated by the second, later time-stamp) as well as the validator's own marking of the time when it received the time-stamped validation message, and 2) the local autonomous integrity check occurred (which is bound between the two times indicated from the two time stamps).
- PVM may be employed to implement the strategies and methods described herein through PVM methods, apparatus and architecture described herein.
- PVM generally employs a maximal separation of duties between the active entities. This approach clearly defines the fields of activity of every entity involved in the platform validation and management processes.
- the advantages of a PVM approach are that: 1) each entity may be optimized for performance separately; 2) PVM enabled devices may operate (with limitations) asynchronously; 3) as far as possible for the network entities involved, PVM methods may be performed statelessly; 4) the entities may be separately be maintained and managed; and 5) redundancy and failover may be easier to implement.
- performance and availability are essential for the effective implementation of validation and remote management of devices.
- PVM architecture may be configured to perform validation and management of a single device by one operator, usually the SHO.
- SHO selected home operator
- special variants of PVM may have an impact on roaming access and operator change, as described herein.
- PVM provides a systematic method to validate and manage devices, when they first try to attach to a communication network and subsequent monitoring of device integrity, relying in part on security technology from Trusted Computing.
- PVM provides: 1) validating a device before network connection; 2) managing device configuration over-the-air (OtA); 3) secure start-up by checking TRVs such as RIMs on component load/start; and 4) installing new TRVs (e.g., RIMs) on a device for configuration change—TRV ingestion.
- the following technical assumptions and preconditions on the validating device and the network to which it validates With respect to the network, it is initially assumed that all entities are operated by the same mobile network operator (MNO) as a part of the same core network (CN). Thus, additional security for the establishment of channels and the actual communication between these entities (for example mutual authentication, integrity protection of messages, encryption) may not be required. Wherever necessary, additional security features are described if they are of special use. However, the scope of the applicability of PVM is broader that such examples since the PVM approach may be utilized for entities outside of the MNO's CN or even hosted by another party than the MNO.
- MNO mobile network operator
- CN core network
- the devices may come in many flavors and by many names.
- PVM is applicable to H(e)NBs of an Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (E-UTRAN) network and machine to machine (M2M) devices, and may be applicable to many other networked devices satisfying certain preconditions. These preconditions are essentially those of a Trusted System (TS).
- UMTS Evolved Universal Mobile Telecommunications System
- E-UTRAN Evolved Universal Mobile Telecommunications System
- M2M machine to machine
- TS Trusted System
- the various devices are configured to implement the PVM methods thereby becoming PVM devices.
- Validation requires an identity, to which the device can authenticate, as a precondition for the validation process.
- This authentication which is not to be confused with authentication of the device toward the CN (which may happen after validation, or bound to the validation process), is necessary to protect the PVM infrastructure from certain attacks by fake devices. This indicates, that devices are only admitted to PVM if they authenticate to device identity, preventing unknown devices, which are capable of performing the PVM protocols, to mount, for example, DoS attacks to the PVM system.
- Dev_ID is an identity bound to a Trusted Environment (TrE) in the device, a Universal Integrated Circuit Card (UICC) or smart card, or to the device, for example, an H(e)NB, itself. It is assumed that the device manages the authentication credential associated with Dev_ID securely, and is thus able to authenticate to Dev_ID.
- TrE Trusted Environment
- UICC Universal Integrated Circuit Card
- H(e)NB H(e)NB
- the Dev_ID may be a Fully Qualified Domain Name (FQDN), a Uniform Resource Identifier (URI), a Uniform Resource Locator (URI), a Uniform Resource Name (URN), a medium access control (MAC) address (such as, extended unique identifier (EUI-48), EUI-64), an IPv4 or IPv6 address, an IPv6 host identifier (such as the 64 LSBs) that comprises a subnet address, an International Mobile Equipment Identity (IMEI), an IMEISV (such as gsm/umts), an electronic serial number (ESN), a Mobile Equipment Identifier (MEID) (such as cdma), an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI) (when the device can be identified by the subscriber because of a 1:1 mapping between subscriber and device), an IMS subscriber id (such as IP Multimedia Private Identity (IMPI) or IMS User Public Identity (IMPU)), a Mobile Station
- the device may have a TrE that is trustworthy.
- the TrE in the device may be built in a secure start-up process from an immutable Root of Trust (RoT). It provides a secure execution environment and other essential, protected capabilities.
- the TrE may be a managed component, for example, not immutable, such that only the RoT remains immutable.
- a TrE may be thought of as a TCB built from a TPM or MTM extended by some secure execution environment and certain protected interfaces.
- a TrE as a TCB built from TPM or MTM is used as a non-limiting example and other trust embodiments are applicable.
- the TrE provides a TCB that can unconditionally be trusted.
- the TCB constituted by the TrE is not immutable in PVM. It is for this reason that in PVM, the TrE and its surroundings in the device are distinguished. Specific, and different, information on both parts is transferred to the infrastructure and used to validate and manage them according to different policies.
- the TrE is the primary communication partner of the PVM infrastructure and is assumed to perform tasks associated with PVM correctly.
- the H(e)NB and TrE may perform a device integrity check upon start-up and before connecting to the core network or the H(e)NB to a H(e)NB Management System (HMS).
- the device integrity check may be based on one or more trusted reference values and the TrE.
- the TrE may be required to securely store all trusted reference values at all times.
- the TrE may be required to start-up securely.
- the TrE may also be required to support either single-component or multi-component integrity check.
- the TrE may be required to load the full code necessary for the trusted operation of the device as a single-component. Before starting this component, the TrE may be required to perform an integrity check, for example, by comparing a cryptographic hash measurement of the component to a stored trusted reference value, to determine the integrity of the component. If the single-component passes its integrity check, the component may be started. If the integrity check fails, the component may not be started.
- the full code base of the device that is necessary for trusted operation of the device may be segmented and ordered into several components based upon device functionality.
- the TrE may be required to load each component sequentially and before starting any individual component, the TrE may be required to perform an integrity check, for example, by comparing a cryptographic hash measurement of the component to a stored trusted reference value, to determine the integrity of the component. If the individual component passes its integrity check, the component may be started and the TrE may continue integrity checking the next component. If any component fails its integrity check, that component may not be started but the TrE may continue checking the integrity of the next component.
- the TrE may be required to retrieve the corresponding trusted reference value from secure memory, which provides integrity protection to the TRVs and compare the integrity measurement to the trusted reference value.
- Secure memory includes, but is not limited to, the protected storage of a TrE. The integrity of the device is verified if all components necessary for trusted operation of the device are verified.
- FIG. 4 shows an example flow diagram of a Four-Stage Secure Start-Up method 400 .
- Stage 1 the TrE 410 is built from the RoT 405 in a secure start-up. All components loaded or started are verified, and only those which pass verification, are loaded and started. Control is passed to the TrE 410 to perform stage 2 of secure start-up only if stage 1 is successful.
- the TrE 410 verifies, loads and starts further components which are essential for performing PVM.
- this may comprise communication and protocol stacks, and radio access network (RAN) communication modules. All components loaded and started are verified, and only those which pass verification, are loaded and started.
- RAN radio access network
- Stage 3 of secure start-up is initiated only if stage 2 is successful.
- the TrE 410 verifies, loads and starts further components. Only components passing verification are loaded and started.
- the TrE measures and loads further components.
- FIG. 4 contains a RIM storage as an example or embodiment.
- RIMs and RIM certificates are one example form of structured data and other forms of structured data may be used.
- the description herein allows the use of variants and embodiments of structured validation data other than RIMs.
- the load order in all stages is assumed to be governed by a locally available list.
- the discrimination between components in 3a and 3b is assumed to be governed by a locally available policy.
- loading and verification may be combined into one step.
- TrE is used as a description of an entity that contains the minimal functions needed for PVM, which includes all facilities needed for secure start-up, such as measurement taking 415 , RIM storage 420 , verification engine to compare RIMs to actual measurements 425 .
- this description of the TrE is used for simplicity and a TrE may be more complex and include other components, such as a key generator or random number generator (RNG).
- the TrE as shown, may include all the facilities needed to implement the secure start-up.
- the RIMs may be stored outside of the TrE but protected by the TrE for integrity and, optionally, confidentiality.
- the engines for measurements and verification may also be implemented as components external to the TrE. The TrE may then ensure the integrity of these components and provide a secure execution environment in a way that the components may not be modified.
- stages 3a and 3b Finer granularity based on policies is possible in stage 3. For instance, components may be loaded into a sandbox environment, if they fail verification or RIMs are unavailable.
- the differentiation between stages 3a and 3b is analogous to the one between trusted services and measured services in the secure start-up of the mobile phone work group (MPWG) reference architecture.
- MPWG mobile phone work group
- a fourth stage may be added for unverified components in “user space”.
- stage 2 communication modules and other similar modules
- stage 2 communication modules and other similar modules
- the stages are understood as classes of components which belong to certain categories. As long as the most essential components of stage 2 are loaded, the device will be able to communicate its state and the failed components to the PVM system. This design allows the device to perform PVM (and thus remediation processes) without a restart if some of the components fail internal verification.
- a fallback code base may be used that allows the device to perform PVM in the case that a compromise has been detected during secure start-up. The device will then upon detection of compromise reboot using the FBC and then start into a predefined state allowing device remediation.
- FBC fallback code base
- the TrE records and protects against tampering the following information: 1) a list of loaded components (Clist); 2) the parameters of loaded components; 3) measurement values related to some or all of the components; and 4) verification data, uniquely identifying, for example, cryptographically, the outcome of some, or all, measurements, such as the platform state.
- Clist a list of loaded components
- measurement values related to some or all of the components
- verification data uniquely identifying, for example, cryptographically, the outcome of some, or all, measurements, such as the platform state.
- some or all of these records may be optional.
- autonomous validation (AuV) uses none of them.
- PVM may use the following terminology.
- the term “verification” may be used for the internal verification of device components during secure start-up, while the term “validation” is used for the whole process of checking a device by an external entity.
- validation is used for the whole process of checking a device by an external entity.
- PVM uses at least a Security GateWay (SeGW), Platform Validation Entity (PVE), and a Device Management Service (DMS). Since the TrE in the device performs the validation critical tasks inside the device, generally the TrE communicates with the other entities. While other components of the device, for example network interfaces, which are needed for this communication are not necessarily an integrated part of the TrE, it should be possible for the TrE to assess the integrity of these components to ensure end-to-end security.
- SGW Security GateWay
- PVE Platform Validation Entity
- DMS Device Management Service
- the SeGW builds the secure interface between the (un)trusted device and the MNO's CN. It acts as barrier and network access control and enforcement instance for the MNO's CN. It also performs all security related functions which are necessary to act as such a barrier, including authentication, encryption/decryption of communication with device, security association and session establishment.
- the SeGW may be used as an example of a network entity that builds the border between the MNO's CN and the outside world, such as an external device. It may be possible to perform device validation using PVM methods without the need of the SeGW. Doing so may include a direct connection of devices to the DMS using secured connections, such as Transport Layer Security (TLS).
- TLS Transport Layer Security
- the PVE acts as the validation entity in the CN and performs integrity validation. It receives integrity verification data and checks if reported values are known and good. It issues statements about device integrity to other entities in the CN.
- the DMS acts as the central entity for management of device components including software updates, configuration changes, OTA management and failure mode remediation.
- the DMS is, in taking up this function based on platform validation, similar to an enhanced version of the HMS.
- PVM also includes a RIM manager (RIMman).
- RIMman performs the following tasks including management and provisioning of trusted reference data and TRVs for comparison in validation. It also manages certificates, in particular, ingestion of foreign RIM certificates, verification of RIM certificates, generation of (operator specific) RIM certificates, and check of certificate validity by, for example, revocation, time limits and trust relationships. That is, the RIM manager is the unique entity, which is authorized to manage the validation database (V_DB).
- V_DB and RIMman are protected CN components. Write access to the V_DB is limited to the RIMman only, so that the PVE cannot write to the V_DB.
- the RIMman is of special importance with regard to security, because it manages the (SHO-CN) external trust relationships necessary for PVM. As noted herein, RIMman is an embodiment and is extendible to cover other embodiments of managers for reference values and certified reference values of (hierarchically) structured data.
- the PVM also includes a Configuration Policy manager (CPman) that performs management and provisioning of device configurations. It also manages policies, in particular, ingestion of foreign configurations and policies, for example from a trusted third party (TTP) and generation of (operator specific) target device configurations and policies. That is, the CPman is the unique entity, which is authorized to manage the configuration policy database C_DB. The CPman is of special importance with regard to security, because it manages the (SHO-CN) external trust relationships necessary for PVM.
- TTP trusted third party
- TTP trusted third party
- CPman is the unique entity, which is authorized to manage the configuration policy database C_DB.
- the CPman is of special importance with regard to security, because it manages the (SHO-CN) external trust relationships necessary for PVM.
- FIGS. 5A and 5B show examples of the minimum set of entities, their relationships and interfaces for PVM. Additional entities, such as the Authentication, Authorization & Accounting (AAA) server and the wireless transmit/receive unit (WTRU) and their interfaces, are shown.
- AAA Authentication, Authorization & Accounting
- WTRU wireless transmit/receive unit
- the PVM architecture or system 500 of FIG. 5A includes a device 505 having a TrE 510 .
- a WTRU 512 may be in communications with device 505 via an I-ue interface 514 .
- the device 505 communicates with a SeGW 520 via an I-h interface 515 .
- the interface I-h 515 between the device 505 and the SeGW 520 may be unprotected and special measures may be applied to secure this channel for authenticity, integrity and, optionally, confidentiality.
- I-h 515 may be used to establish the link between the device 505 and the SeGW 520 and thus the CN.
- the SeGW 520 may communicate with a AAA server via interface I-aaa 575 . The operator may have established appropriate measures to ensure the security of the interfaces.
- An I-pve interface 522 may be used by the SeGW 520 to contact the PVE 524 during validation.
- the PVE 524 may use I-pve interface 522 to signal the outcome of validation to the SeGW 520 .
- the I-dms interface 530 may be used for device configuration related communication between the DMS 535 and the SeGW 520 .
- the I-pd interface 532 may be used by the PVE 524 to communicate with the DMS 535 and vice-versa. This interface, the I-pd 532 , may be used during device management procedures, such as for device software updates and configuration changes.
- the interfaces I-v 526 and I-d 538 may be used by the PVE 520 to read RIMs from the V_DB 540 and by the DMS 535 to read allowed configurations from the C_DB 550 , respectively.
- the interfaces I-r 528 and I-c 534 may be used by the PVE 520 to communicate to the RIMman 560 , such as in case of missing RIMs in the V_DB 540 , and by the DMS 535 to communicate with the CPman 570 .
- the RIMman 560 and the CPman 570 may use the interfaces I-rdb 562 and I-cdb 572 to read, write, and manage the validation of the database V_DB 540 and the configuration policy database C_DB 550 , respectively.
- FIG. 5B illustrates a PVM 582 where the device 505 may connect directly to the DMS 535 .
- the DMS 535 may act as the point of first contact for the device 505 via an interface I-dms_d 584 and communicate with the PVE 524 via interfaces I-pve 586 and I-pd 588 to perform a validation, or at least to get to know which components have failed during secure start-up.
- the DMS 535 may act upon this information for remediation.
- the respective components such as the device 505 that includes the TrE 510 , the SeGW 520 , the PVE 524 and the DMS 535 are all preferably configured to employ the PVM maximal type separation of duties approach between active entities. As explained more fully below, this may be facilitated through the use of PVM tokens to pass certain information between various entities.
- PVM may use any version of validation. Described herein is an embodiment of semi-autonomous validation (SAV) that works with PVM.
- the device contains a TrE and a RoT and is capable of a secure start-up.
- the device is equipped with RIMs, which allow for a local validation of TrE components and components outside the TrE.
- the device may be a H(e)NB.
- RIMs are a form and example of structured data and is used as a non-limiting example herein.
- the device may perform a secure start-up in 3 stages, ensuring that each component is loaded, if and only if the local validation of the component to be loaded is successful.
- stage 1 the TrE is loaded via secure start-up relying on a RoT.
- stage 2 all components outside the TrE which are required to perform basic communication with the SeGW are loaded.
- stage 3 all remaining components of the device are loaded.
- the device may then begin network authentication with SeGW.
- SeGW network authentication
- one or more of the following data is sent: Dev_ID; security policies for the device; information on device modules which are integrity checked by the TrE during the secure start-up; hardware/software build version numbers; manufacturer of the device; model and version number; certification information on device and TrE; and TrE capabilities and properties.
- This data may be sent in the Notify field of the Internet Key Exchange Version 2 (IKEv2) authentication protocol and is then forwarded by the SeGW to PVE.
- IKEv2 Internet Key Exchange Version 2
- the PVE checks the received information.
- the PVE checks if the Dev_ID is listed in a blacklist, and if so, access is then denied. It checks if the security policies are mismatched with the desired policies for that device. If they are mismatched then remediation steps may be implemented.
- the PVE may check if unidentified/unwanted modules and components may have been loaded.
- the PVE may deny or otherwise limit (e.g., quarantine to restricted use or resources) network access for the device.
- PVE sends a message on the decision on the validity and trustworthiness of the device to the SeGW.
- SeGW acts in accordance with the message.
- the data is stored at a trusted third party (TTP), and the device sends a pointer to the TTP from where the PVE may retrieve the desired information.
- TTP trusted third party
- the pointer may be sent in the IKEv2 Notify payload.
- Described herein is an embodiment of a remote validation or full semi-autonomous validation (F-SAV) that works with PVM.
- the TrE may be built from the RoT in a secure start-up. All components of the TrE may be integrity verified and loaded upon successful verification.
- the TrE may verify the integrity of a predefined portion of the rest of the device and may load them.
- the integrity checked code may consist of, for example, basic OS, basic communications to SeGW, and the code which formats the performing PVM reporting messages.
- the measurement values may be stored in secure storage in the TrE.
- stage 1 or stage 2 checks fail the TrE may block authentication from proceeding. If stages 1 and 2 are successful, stage 3 may proceed.
- the remaining device modules of code including, for example, radio access code, may be integrity checked but may not be loaded.
- the validation data may be prepared and sent to the SeGW in a suitable communication protocol.
- the data may be signed, for example, by a TrE stored key, to provide authenticity and integrity of the data.
- the data may include a list of stage 3 modules that have failed the integrity checks.
- the data may be sent using the Notify payload of IKEv2 AUTH REQ message.
- the data in the Notify payload may be signed by the TrE's signing key to provide authenticity and integrity of that data in addition to the overall message protection provided by the IKE security association.
- the Notify payload may include a list of stage 3 modules that have failed the integrity checks.
- the validation data may be sent using any other suitable payload or field of a suitable IKEv2 message or any other suitable payload or field of a message of a suitable protocol other than those of IKEv2 protocol such as TLS, TR069, OMA-DM, HTTP, HTTPS or other similar protocols.
- the SeGW may forward the data to the PVE for a decision.
- the authentication process may proceed but the decision to authorize the network connection may be delayed until after the PVE has inspected the validation message and made, or obtained, a network-based policy decision regarding any modules which have been reported as having failed the validation tests.
- measurement and integrity verification of the code may be loaded without the code being loaded.
- the SeGW may forward the validation message to the PVE which may validate the received list.
- the remaining Stage 3 modules may be loaded.
- the process of measuring the integrity and waiting for the PVE to decide whether the code can be executed may include providing that the code may not be changed once it has been measured and that it may be executed if PVE gives the authorization to do so.
- a secure storage for all component code in stage 3 may be included.
- the execution environment may support the authorized execution which allows code to be loaded first and execute it later after authorization. Large amounts of code may be loaded, thus, the secure storage and execution environment should be of adequate size.
- the F-SAV may provide flexibility to the CN to be aware of what really went on in the “Local integrity checks”.
- the device may send indication of pass/fail of stages 1 and 2 code and, optionally, a list of failed modules if any.
- the F-SAV may offer finer granularity and more visibility into device security properties and validation measurements, may allow local device resources comparable to autonomous validation, may provide for faster and easier detection of compromised devices, may support network-initiated remediation for compromised devices, and may provide for flexibility for operators in device security management.
- the TrE may also put a time-stamp on messages to ensure freshness.
- An alternative to time-stamping may be for the network to supply a nonce to be used by the TrE for combining with the aforesaid message after the protocol for network access starts. That may also be a feature of binding the device authentication to the validation.
- Remediation of authentication failure could be an activation of a fallback mode after initial failure, for example, of the Stage 1 or Stage 2 integrity checks allowing enough functionality for the device to attach to the SeGW to inform it of the failure. This could then trigger operation and maintenance (OAM) procedures to allow the device software to be updated upon diagnosis.
- OAM operation and maintenance
- the fallback code would need to have enough functionality to enable the complete rebuild of the code in a secure manner under the supervision of the TrE.
- the measurement message data may be sent in the Notify field of IKEv2 AUTH Request (along with a device certification).
- the measurement message data may be sent by a suitable secure protocol prior to the start of the IKEv2 based device authentication.
- the device may be allowed to proceed/attach without loading these modules. In the meantime, some OAM procedures amy be scheduled to update the device software.
- H(e)NB devices where validation and remote management may play an important role.
- the described methods may directly be applied to the entities in the H(e)NB network architecture.
- the presented solution for platform validation and management may easily be applied or extended to other network connected devices.
- a transfer to other scenarios, such as M2M, may be implemented in a similar way if the entities are mapped according to their functions.
- SAV SAV allows CN to be protected completely from rogue devices.
- a quarantine network may effectively be established by the SeGW.
- No direct threats are posed to PVE and DMS from the device, since they receive only data limited to their tasks and only over secure connections with the SeGW, or established by the SeGW.
- the validation process in the performing PVM does not require a direct communication between devices and any entity in the CN. Only after a successful validation using SAV, connections to the CN are allowed. This ensures that only devices in a proven secure state can communicate to entities inside the CN.
- FIGS. 6A , 6 B and 6 C show a diagram of an example of a SAV validation method with a PVM infrastructure.
- the PVM infrastructure includes the entities described herein including a TrE 605 , a SeGW 607 , a PVE 609 , a DMS 611 , a V_DB 613 and C_DB 615 .
- the TrE 605 collects some or all of the following data: device information such as Dev_ID, manufacturer, Device capabilities including, but not limited to, communications capabilities such as data rates supported, transmit power levels, signaling features and other capabilities, TrE capabilities and properties including RoT; TrE_information including ID, certification info, manufacturer, build version, and model, make, serial-no.; verification data including platform configuration register (PCR) values; verification binding such as signature over PCR values; ordered list of component indicators (CInd) to components Clist and may include parameters for components; and time-stamps (trusted or not) ( 622 ).
- a validation message/data from the TrE 605 to the SeGW 607 may include the above date ( 624 ).
- SeGW 607 shall check/compare timestamps received with local time to detect variations ( 626 ). If the reported time-stamp does not match the local time, the SeGW acts according to the properties of the reported time-stamp. If the device's time-stamp is a trusted time-stamp and shows a variation, SeGW 6070 should trigger a revalidation of the TrE and its trusted time source. In the case of a non-trusted time-stamp, the SeGW 607 adds its own trusted time-stamp to the message. If the device is not capable of providing trusted time stamps, the SeGW 607 may add a trusted time-stamp as a protection against replay attacks.
- the SeGW 607 may check if verification binding if present ( 628 ). This ensures the authenticity of the verification data. The SeGW 607 then creates a PVM token (T_PVM) ( 630 ) and applies a timestamp on the T-PVM before sending it to assure freshness and prevent asynchronous message flows ( 632 ).
- T_PVM PVM token
- SeGW 607 forwards the T_PVM to the PVE 609 ( 634 ) which in turn queries the V_DB 613 using TrE-info ( 636 ). If an untrustworthy determination is returned to the PVE 609 ( 638 ), the PVE then applies a time stamp to the T_PVM ( 640 ) and forwards it to the SeGW 607 ( 642 ). The SeGW 607 then stops the device authentication, prevents the network attachment of the device and alerts the TrE 605 ( 644 ).
- the PVE queries the C_DB using Dev_ID ( 648 ) which in turn returns a configuration policy ( 650 ) to the PVE 609 .
- the PVE 609 evaluates the policy configuration ( 652 ).
- the PVE 609 determines that the configuration is untrustworthy ( 654 )
- the PVE 609 modifies the T_PVM and applies a time stamp ( 656 ).
- the PVE 609 then forwards the T_PVM to the SeGW 607 ( 658 ), which in turn stops the device authentication, prevents the network attachment of the device and alerts the TrE 605 ( 660 ).
- the PVE 609 determines that the configuration is trustworthy and allows the configuration ( 662 ), then the PVE 609 retrieves the RIMS for all entries in Clist or C_List from V-DB 613 ( 664 ). The PVE 609 recalculates the correct verification data from the RIMs ( 666 ) and compares the calculated verification data to the reported verification data ( 668 ). The PVE 609 then modifies the T_PVM and applies a time stamp ( 670 ). The PVE 609 then forwards the T_PVM to the SeGW 607 ( 672 ). The SeGW 607 inspects the T_PVM (or extracts from the T_PVM) for the PVE validation result ( 674 ). The SeGW 607 sends a denial or allowance of device authentication to the TrE 605 ( 676 ). If the PVE validation result is negative, then TrE 605 performs a re-boot and does a revalidation ( 690 ).
- the PVE 609 may send a list of failed components to the DMS 611 ( 678 ).
- the DMS 611 determines if updates can be applied ( 680 ), and if so prepares the OTA updates ( 682 ).
- the DMS 611 also ensures that RIMs for the updates exist in the V_DB 613 ( 684 ).
- the DMS 611 sends the T_PVM with an indication for revalidation to the SeGW 607 ( 686 ) and a revalidation trigger to TrE 605 ( 688 ). TrE 605 performs a re-boot and does a revalidation ( 690 ).
- the TrE collects the following data, includes them in a validation message, and communicates it to the SeGW: device information such as Dev_ID, manufacturer, TrE capabilities and properties including RoT; TrE_information including ID, certification info, manufacturer, build version, and optionally model, make, serial-no.; verification data that may include platform configuration register (PCR) values or simply a list of components that have failed local verification or a list of functionalities affected by components that have failed local verification; verification binding such as signature over PCR values or the lists of failed components or affected functionalities; ordered list of component indicators (CInd) to components Clist and may include parameters for components; and time-stamps (trusted or not).
- device information such as Dev_ID, manufacturer, TrE capabilities and properties including RoT
- TrE_information including ID, certification info, manufacturer, build version, and optionally model, make, serial-no.
- verification data that may include platform configuration register (PCR) values or simply a list of components that have failed local verification or a list of functionalities affected by components that
- the ordered list of indicators to components and their parameters would contain entries such as the following data fields: index, component_indicator CInd, component_parameters.
- CInd gives a reference to the component and may be in URN format (for example URN://vendor.path.to/component/certificate).
- the list of components will serve to identify the RIMs for validation, for example, by pointing to RIM certificates, RIMcs.
- the validation message may additionally contain device information, such as, ID, certification information, manufacturer, model, version, make, serial-no., TrE capabilities and properties including RoT, security policies of devices and modules which are integrity checked at Stage (1,2,3), hardware (HW) build version number, and may include software (SW) version number and integrity measurement data.
- device information such as, ID, certification information, manufacturer, model, version, make, serial-no.
- TrE capabilities and properties including RoT security policies of devices and modules which are integrity checked at Stage (1,2,3), hardware (HW) build version number, and may include software (SW) version number and integrity measurement data.
- TrE-specific information may be a description of how the TrE is implemented in the device.
- TrE_information may provide information on the device and separate information on the trust environment, for example, if the TrE is a certified IP component. So the certification authority for the device may be useful information.
- RIMs for validation is a preferred method for SAV, it is actually optional. It is used here as the base case, from which other options depart and deviate. For instance, there are validations without recalculating verification data from RIMs, and there is even the possibility to do the performing PVM completely without RIMs.
- Verification binding is optional if validation message is bound to authentication, for example by a secure channel.
- SeGW shall check/compare timestamp received with local time to detect variations. If the reported time-stamp does not match the local time, the SeGW acts according to the properties of the reported time-stamp. If the device's time-stamp is a trusted time-stamp and shows a variation, SeGW should trigger a revalidation of the TrE and its trusted time source. In the case of a non-trusted time-stamp, the SeGW adds its own trusted time-stamp to the message. If the device is not capable of providing trusted time stamps, the SeGW may add a trusted time-stamp as a protection against replay attacks.
- the device and TrE_info may be optional.
- Dev_ID may give a reference to the device and TrE_info. Since not all MNOs will know the devices that may attach to the network and hence all TrE's, and thus all TrE_info data, such a mapping may be provided by a database which may be queried by the MNOs to obtain the TrE_info for any given Dev_ID.
- TrE_info may be in a TrE_certificate. The TrE_certificate should be signed by the vendor of the TrE or a TTP.
- a simple version of the performing PVM may be implemented. This may be done if only the TrE's properties are to be verified. Policy decisions have to rely on the TrE_info and list of components only.
- SeGW SeGW
- device changes operators. For instance, it could have received faked RIMs previously from a faked SeGW/MNO during remote management procedures.
- URNs as indicators to components is advantageous because it concurrently allows for this unique identification of a component and the location from where a RIM or a RIM certificate may be fetched.
- the device sends the validation message to the SeGW.
- the SeGW checks the verification binding if present. This step ensures the authenticity of the verification data.
- the SeGW then creates a PVM token (T_PVM).
- T_PVM may be used as a rolling token and is passed from entity to entity during communication. Every entity puts a timestamp on the token before sending it to assure freshness and prevent asynchronous message flows. Time stamps on the token may be used to provide a method to follow the state of the token.
- the token may travel in the CN from entity to entity, even in several rounds, and therefore may be tracked by the entities.
- the entity ID should be incorporated into the chain of time stamped data.
- the T_PVM may contain the Dev_ID. If the original timestamp is not present or not trusted, the T_PVM may also contain a new timestamp issued by the SeGW. Otherwise the T_PVM may contain the original timestamp from the validation message.
- Timestamps may be used to protect against replay attacks. They may be combined with, or even replaced by nonces or monotonically increasing counters. Timestamps may also be used to assess the freshness of validation data. The combination of both purposes is advantageous and may be provided by time-stamps.
- SeGW maintains a token database T_DB containing all active T_PVM.
- T_PVM may contain a communication secret for building a secure tunnel between DMS and TrE, for instance a TLS certificate.
- the SeGW extracts the following data from the validation message: validation data, TrE_info, and Clist. Before sending this data together with the token T_PVM, the SeGW puts a timestamp on the T_PVM and forwards it to the PVE.
- the SeGW may check the format of the validation messages and parts thereof to mitigate the threat from mal-formed data attacks. Otherwise, an attacker may try to modify the data in the validation message of a compromised TrE such that the pure inspection of this data at the PVE would lead to a system error or failure.
- H(e)NB_ID It may be of use to separate between Dev_IDs and the identity of the corresponding H(e)NB, H(e)NB_ID. Though the association between both is one-to-one, such a separation may make sense from the viewpoint of separation of duties (SeGW knows TrEs, PVE knows H(e)NBs), and possibly addressing/management. In this case, there would be an intermediate step in which PVE fetches Dev_ID from a database HNB_DB, using the received H(e)NB_ID.
- the PVE is the entity deciding on the validity of a device. That is, in the language of policy systems, it is a policy decision point (PDP). Under the strict separation of duty approach, it is the only PDP in the PVM system. It relies on SeGW, and DMS to enforce policies, such as to act as a Policy Enforcement Point (PEP). PVM remains, in its general description, agnostic to the question of how policies are generated and where they are stored/managed, such as, where PVE gets the policies from. In some of the more detailed variants and subordinate methods described below (in particular parametric validation and minimal validation), some examples of policy conditions and actions are given. In general, decisions on the validation policy can be based not only on the validity of single components but also on the other data contained in Clist. In particular, allowed parameter (range), and order of load (Clist is ordered) may be evaluated.
- range allowed parameter
- Clist order of load
- failure condition F 1 indicates a “TrE invalid” scenario.
- the PVE identifies the device and/or its TrE as one which is not trustworthy.
- failure condition F 2 which indicates three scenarios for “Verification data failure”.
- Scenario F 1 a indicates integrity measurement/verification data mis-match. It indicates failure of the secure start-up process of the device, and/or presence of false and/or expired RIMs and/or RIM certificates on the device, which then starts an invalid component.
- Scenario F 2 b indicates RIM Missing, i.e., a RIM for a component is missing and needs to be fetched from elsewhere.
- Scenario F 2 c indicates an expired RIM certificate.
- Failure condition F 3 indicates two scenarios for “Clist policy failure”. For scenario F 3 a , single components are valid, but the configuration fails a policy, for instance on load order, or undesired components, or parameters. Scenario F 3 b indicates configuration is unknown, such that a ‘known good value’ for Clist is not available.
- Failure condition F 4 indicates “Pre-Validation Device Authentication Failure”, and may apply if authentication is bound to validation in a way in which device authentication precedes validation.
- the F 4 condition includes an F 4 a scenario that indicates an expired device certificate.
- the PVE queries a local validation database (V_DB) using the received TrE_Info.
- the TrE_Info structure contains detailed information on certification, manufacturer, make, model, serial number of the TrE.
- the validation database V_DB stores information on which TrEs can be considered trustworthy. For example, it may be possible to implement policies to trust a certain vendor, model, or other similar identifier. If the TrE is not trustworthy according to the outcome of the assessment of the TrE_Info, the PVE can send a message containing this information to the SeGW. The SeGW may then act appropriately on this message.
- the PVE adds a statement to the T_PVM token (for example additional data-field) containing the cause of denied access such as wrong/untrusted manufacturer.
- the PVE puts a time-stamp and signature on the T_PVM.
- the T_PVM is forwarded to the SeGW.
- the SeGW may then verify the time-stamp (replay-protection) and the signature (prevent forged sender).
- the SeGW will then deny network access and device authentication and block future authentication attempts.
- blacklisting of devices according to certain properties such as manufacturer, device version, and other properties may be possible.
- the PVE may also first trigger a V_DB update process analogous to the RIM update process, for unknown TrEs, using Dev_ID and TrE_Info.
- the PVE fetches RIMs from the V_DB for all components from the received Clist.
- the validation database V_DB only stores certified RIMs.
- the corresponding RIM certificates have to be stored securely in the V_DB.
- the RIM certificates may be inspected before ingestion to the V_DB and then discarded.
- the RIM certificates may be stored for security purposes.
- the MNO may use them to prove compliance in device management to an auditor in the sense that the MNO has performed diligently in obtaining RIMs and their certificates from trusted third parties.
- the PVE may recalculate the correct verification data from the retrieved RIMs and match it to the verification data received in the validation message.
- the secure start-up process on the device may have been compromised or wrong RIMs may be stored in the device, and invalid components may have been loaded in the secure start up process.
- the PVE may compare the measurement values, transmitted in the validation message or in answer to a separate request from PVE, to RIMs, to detect the failed components.
- the PVE may signal the outcome of the validation to the SeGW.
- the SeGW may deny network access or put the device into a quarantine network.
- the DMS may start a management process to replace the components which failed validation, according to the management procedure.
- the DMS may forward the T_PVM to the SeGW with an indicator that validation failed and that the device will revalidate.
- the DMS may send correct RIMs to the device and trigger a reboot. Upon reboot, the device may re-authenticate and revalidate using the new RIMs.
- the DMS may store the Dev_ID with a timestamp when sending the remote reboot trigger. If the DMS receives the order to perform an update again, the DMS may check if the Dev_ID is already stored. If several storage entries exist, the time-stamps may indicate short reboot cycles, indicating that the device cannot be recovered.
- the methods described for the treatment of failure condition class F 2 may be optional if RIMs are not used in validation.
- the PVE may use a special part of database V_DB, which caches trusted configurations by the PCR values.
- the PVE may look up a table of verification data, such as a hash table in the case of PCR values, for valid configurations. If a match is found, validation may be immediately successful. Storing pre-calculated PCR values for valid configurations in V_DB can be useful for classes of devices running in the same configuration, where the hash values will be the same. Instead of comparing all components against RIMs, a single composite hash value can be compared, lowering computational overhead and speeding up the process of validation.
- the PVE may signal this to the SeGW, which may allow connection to the CN.
- RIMs may be fetched from a trusted third party (TTP). If the RIM for one (or multiple) components is not stored in V_DB, PVE transfers the list of missing RIMs to RIMman. RIMman then tries to fetch (certified) RIMs from TTPs. Clist contains component indicators CInd (such as URNs), by which RIMman can identify the components and get information on where to find the corresponding RIM certificates. RIMman performs a RIM ingestion for the new RIMs including verification of the RIMc into the V_DB. RIMman performs an update of V_DB storing the CInd, RIM and the RIMc. RIMman signals the V_DB update to PVE which can then fetch the missing RIMs from V_DB.
- TTP trusted third party
- RIMs may be fetched from the device. If the device has indicated in the validation message the capability to provide the stored RIMcs (including the RIMs) to the network, the PVE may ask the device for RIMs and RIMcs, which are missing for validation. This may be used as a backdrop method for RIM fetching. Since the device has used all of them in secure start-up, all RIMs are present in the device. If the PVE cannot find RIMs for some components, the PVE forwards the list of missing RIMs and T_PVM, with a new time-stamp attached, to the SeGW. The SeGW performs a protocol with the device to retrieve the RIMcs.
- the SeGW appends the received RIMcs with a time-stamp to the T_PVM and forwards the T_PVM token to the PVE.
- PVE forwards the retrieved RIMcs to RIMman.
- RIMman verifies that the received RIMcs are issued from a trusted entity and valid.
- RIMman performs a RIM ingestion for the new RIMs including verification of the RIMcs into the V_DB.
- RIMman performs an update of V_DB and then signals the V_DB update to the PVE.
- the PVE may then fetch the verified RIMs from V_DB and proceed with validation.
- the PVE will not ask the device for RIMcs again but fetch RIMs from TTPs as described herein. Any RIMs obtained either from the device of TTP may be verified for trustworthiness along the same lines as digital certificates.
- the trust model between the PVM components determines the sequence of actions in the RIM ingestion from the device.
- the PVE will not trust the RIMs/RIMcs from the device, but wait for their ingestion to V_DB, performed only by RIMman after checking trustworthiness of that data.
- PVE may also concurrently with the RIMman's RIM ingestion operation, start to recalculate verification data based on the device received RIMs, but would have to wait for the RIMman's decision on their trustworthiness.
- the RIMcs may be sent in an additional message which is integrity protected since it is sent inside the CN only.
- the message containing the RIMcs must be linkable to the T_PVM.
- the RIM ingestion process is performed by an external entity and may be extended to a complete ingestion process for the device and PVM infrastructure. This may be identified as distributed RIM ingestion within the PVM architecture.
- All messages from PVE to RIMman are restricted in format and content, to ensure message integrity and mitigate, for example, malformed, message attacks. Essentially the messages will contain single URNs for components pointing to a location where reference metrics can be retrieved.
- the PVE fetches a policy on allowed configurations from a configuration policy database C_DB.
- This configuration policy database C_DB shall contain allowed configurations by Dev_ID.
- the C_DB is managed by CPman.
- the C_DB may also contain policy actions such as desired updates for a device which was disconnected and did not validate for a while.
- the PVE evaluates the policies received from CPman, based on the information in the Clist. If the evaluation results in any of the failure conditions F 3 a or F 3 b , different actions may apply.
- the PVE adds the message on the failed configuration policy to T_PVM, puts a time-stamp and signature on T_PVM and forwards it to the SeGW.
- the SeGW may then verify the time-stamp (replay-protection) and the signature (prevent forged sender).
- the SeGW may then deny network access and device authentication (and block future authentication attempts). If validation and authentication are bound, this may break the authentication process.
- the PVE calls CPman to search for configuration policies from TTPs. If CPman is able to retrieve new configuration policies, CPman updates the C_DB and sends a message to the PVE with an indicator to the updated configuration policies.
- the C_DB may contain a list of allowed configurations.
- the PVE forwards the received Clist to CPman which in turn matches it against the stored allowed configurations. If no match is found, failure condition F 3 b is detected.
- Checking updates may be required since the current validation process may be a revalidation after a device update during a device management process. During this management procedure, the device configuration may have changed and may have to be verified against the new configuration from the C_DB.
- the device may be such that once it has been authenticated by the network, it will rarely be rebooted barring unscheduled events such as a loss of power.
- Revalidation of the device may be a routine part of the execution environment. Periodic revalidation may enable the network to have confidence that the device is working in a defined state with reduced risk of rogue code executing. The revalidation may also enable the authentication procedure to initiate again, thereby keeping the key exchange new and re-establishing the secure communications tunnel.
- the methods of revalidation described herein may be applied to any of the validation methods.
- a device initiated revalidation may occur on a periodic basis.
- the MNO may set a periodic revalidation schedule during device setup procedures.
- the device would initiate a reboot sequence that would trigger the validation process to begin again, along with the authentication.
- the corresponding OAM process may also be initiated.
- the CN may trigger the revalidation. Operators may not have control over the revalidation process with device-only initiated revalidation. If a large amount of devices run the same schedule, such as the first day of month, this may increase the load on the CN infrastructure.
- Network initiated revalidation may occur on a periodic basis as in the device initiated case, but it also may happen at any time the network deems it necessary for security reasons.
- Revalidation may also be setup by the operator as part of the policy so that a module in the device is programmed by the operator to carry out revalidation at the programmed intervals.
- the revalidation may be triggered by sending an IKEv2 message to the device indicating a request for revalidation.
- the Notify payload may be used to carry a newly defined revalidation trigger code for the device.
- the PVE may periodically send a revalidation indicator to the SeGW. To keep track of all sent revalidation requests, the PVE stores them with DEV_ID and a timestamp. The PVE then periodically checks if any devices ignored the revalidation request. The SeGW may forward that request to the device via the IKEv2 protocol. The revalidation message may be setup based on the hosting parties request at the time of installation so as to reduce the risk of service interruption.
- the device receives an IKE message with the Notify payload indicating a request for revalidation.
- the device then initiates a reboot sequence where validation and authentication to the network are re-established. If the device is compromised such that the device ignores the revalidation request, the PVE may detect this during the monitoring of all active revalidation requests. The PVE may signal the failed revalidation to the SeGW which may act properly, for example by putting the device in a quarantine network.
- Another method for network initiated revalidation involves sending a reboot signal to the device, triggering a reboot and thus a revalidation during the secure start-up.
- the revalidation of a device may also occur by request from other network entities. If a device manufacturer suspects their device has been widely compromised, the manufacturer may contact the MNO and request a revalidation. This may be done as a back office process with the MNO deciding if revalidation may occur or not. The PVE or HMS may initiate the revalidation and re-authentication.
- the DMS is the main entity responsible for device management. Based on received and stored device information, such as, vendor, hardware/software configurations, TrE capabilities, and the like, the DMS is able to initiate software updates, configuration changes and OTA device management procedures.
- the management actions are generally determined by the transmitted validation data, validation results from the PVE, and policies in C_DB, such as, desired target configurations.
- the DMS may establish a secure tunnel with the device's TrE.
- the DMS may use the T_PVM token to retrieve the Dev_ID, the latest reported validation data and the Clist for the device.
- the DMS queries the SeGW to establish a secure tunnel to the device's TrE by sending the T_PVM with an indicator to set the device's status from ‘active’ to ‘management’.
- the SeGW keeps this token, may not provide backhaul connectivity, for example via quarantine, and waits for the DMS to confirm end of management activity.
- the device may revalidate, for example, by a reboot after a software update. Revalidation may then take place, wherein the PVM system state is maintained by using the T_PVM from the previous validation, and may not generate a new one.
- the DMS sends an updated T_PVM token to the SeGW, with the device status indicator changed from ‘management’ to ‘revalidate’.
- the SeGW keeps a list of devices awaiting revalidation, where it looks up devices when they request network access. The SeGW may then wait for the device to revalidate for a certain period of time. The outcome of the revalidation is then signaled back to the DMS to confirm successful completion of the management process.
- revalidation may arise in the system model for the device. New components downloaded from the DMS are inserted into the device configuration precisely after the next secure start up process. Therefore it is necessary to trigger revalidation as the concluding step of platform management. Since the device has to reboot, and if the platform validation is furthermore bound to the authentication of the platform, revalidation may include cutting the existing connection for platform validation and management. The SeGW may, in this case, maintain a state for the revalidation as described in the last paragraph.
- the DMS may install/uninstall software (SW) components, such as new SW components, change configurations, and trigger revalidation.
- SW software
- the device may indicate revalidation by a flag in the validation message. This avoids looking into the revalidation list for each device approaching the SeGW.
- the flag may be set in a secure process, such as, a process performed by a TrE component, so that no device can circumvent revalidation by not setting it.
- This and the previous step may take place at the SeGW and not at the PVE, otherwise the SeGW would automatically generate a new token.
- these steps include the protocol steps taken for device management, in which the SeGW has to keep track of revalidation which requires the device to re-boot. Since after device reboot, the device will reconnect and hence re-authenticate, the SeGW has to keep track of the devices which are going to reboot for revalidation, otherwise, the SeGW will consider the connection and authentication attempt as an initial connection and hence would issue a new token. Thus maintenance of the revalidation list is included for the SeGW.
- T_PVM continuously over many rounds of revalidation may be useful to detect recurring update failures and other patterns of irregular behavior.
- the DMS installs new components to the device, it may be ensured that the RIMs for the software are included in the same management message from DMS to TrE.
- the TrE may be responsible for the secure storage of the RIMs and their local management.
- the DMS triggers a revalidation after the installation of the components.
- the RIM for the new software may be sent to the PVE which stores it, via RIMman, into the V_DB.
- the DMS updates the configuration policy database C_DB accordingly, using CPman.
- the RIM for the new component may be made available in the V_DB before the device engages in revalidation, for the PVE to validate the new configuration.
- the C_DB may be updated by DMS via CPman.
- the TrE may provide a secure execution environment for a secure update and management function. This function ensures that a compromised device may at least be sent into a rescue mode in the case of a failed software or component update.
- a fallback code base (FBC) may be used for device reversion by the DMS in case of failure. This allows the device to revert to a pristine state from which the main code may be updated via DMS management methods.
- the revalidation may be triggered by a message from the DMS to the TrE, after the token passing. Otherwise the device may try to revalidate before SeGW receives the token to prepare for revalidation.
- the SeGW may keep a number ‘n’ of revalidation attempts, or failed attempts, for each device in revalidation list, after which a device may be blacklisted, quarantined, in-field maintenance is triggered, or a combination thereof.
- the communication secrets for establishment of the secure tunnel may be contained in, and extracted from, the T_PVM, avoiding involvement of SeGW.
- An additional method may be to disable components which cannot be validated and cannot be replaced or updated in PVM, without denying connectivity to the device.
- the DMS may send a disable CInd and revalidate message, which helps to mitigate the risks from operator lock-in as described below.
- the PVM may be used to fight a “battle of trust” between devices and operators. Different methods for disabling the occurrence of a “battle of trust” may be available.
- components of a device may be disabled by forcing revalidation without this component in Clist. This may apply if a valid update for a component is not available.
- the load order may be forcibly changed.
- forcibly change parameters which may or may not affect the RIM. The forced change of parameters requires the DMS to get all necessary information on all device components and not only for those for which validation failed from the PVE.
- TCG Trusted Computing Group
- MPWG Mobile Phone Working Group
- TCG Trusted Computing Group
- the DMS may send the RIMcs along with the other data and a TCG MPWG compliant device may install them according to the TCG specifications. This may be a point of difference between PVM and the device management for secure start-up defined by TCG MPWG.
- Described herein is an example of verification data.
- the sending of verification data for instance in the form of PCR values (which are aggregate hash values of single measurements) as well as binding the verification data for authentication, is the technology standard provided by TCG specifications.
- TCG specifications the technology standard provided by TCG specifications.
- creation of verification data and binding according to the TCG specification may be computationally costly, in particular, on devices with a lot of measured components. This is normally done by the cryptographic extend operation described herein—essentially creating a new hash value from two old ones. This may slow down the start-up process of a device significantly, which may be undesirable, for instance, in home environments.
- the basic assumption underlying the argument against verification data is that the secure start-up process operated correctly in comparing actual measurements to the RIMs indicated in Clist.
- verification data may add to trustworthiness of a device in validation. This is the case when the device has incorrect RIMs, or compares measurements with fake RIMs.
- An attacker may try to manipulate the validation data (Clist), replacing identifiers of less trustworthy components with (captured) CIds of more trustworthy ones (‘component trust elevation’).
- the validating device (TrE) signs the falsified data and correctly validates—without means to internally detect manipulation if it has no verification data.
- a way to mitigate this attack to some extent may be that the secure start up engine makes the data static by sealing it to the state (last PCR value). For validation, it then needs to be unsealed and the same security gap opens again. And furthermore, the system needs to stay static after the SML sealing, limiting the flexibility of such an approach.
- Verification data here is used synonymously as ‘data further processed (for example hashing) from the raw measurement data, which is then verified to have matched the RIMs’.
- the verification data identifies, after completion of secure start up, the platform's state uniquely.
- the provisioning of incorrect RIMs may be for instance from a compromised source, may have a greater impact on the PVM system as a whole and thus poses a critical risk.
- a concrete scenario is one in which a trusted source of RIMs, which may be external to the operator CN, has been compromised, for example hijacked or spoofed, by another party. Before this gets detected and corrected, the RIM source may deliver fake RIMs to a large number of devices, along with compromised components, in normal PVM platform management.
- TRV revocation may force RIM, RIMc, and component updates for a whole device population, while only a small fraction was in fact affected by the attack. This may cause heavy network traffic and inconvenience for users.
- Mechanism and protocols are supported by the device such that authorized TRV revocation may be implemented.
- the PVM system may invoke verification data usage based on a policy, for each single validating device.
- the PVE may then detect compromised devices and manage only them. This is described herein as “Minimal Validation Policy”.
- PVM as described herein is an asynchronous process. Therefore, the PVM system comprised by the various entities should be stateful, and it should be possible to recover the current state of the process, to mitigate the various well-known attacks on distributed systems and their failure conditions.
- token passing may be used to do this.
- the SeGW may be configured as the entity responsible for generation and management of a token associated uniquely to a validation process.
- the PVM token may not only be bound to the identity of the validating TrE but also to the unique validation process in question.
- the token passing approach includes replay/revalidation protection. Validation attempts are made unique preventing replay of old validations and providing measures to detect DoS attacks by frequent revalidation. By the token, a validation session is established, allowing for the unique association of PVM-relevant data and messages to a unique validation. This further is a precondition to assess freshness.
- Freshness of validation data may be controlled since the validation tokens can be made to be based on (not necessarily signed) time-stamps, initially being generated by the SeGW and appended to a time-ordered list by every entity passing the token on.
- Another method of introducing freshness may be to read the time from a secure real time communication (RTC) immediately after the RoT is loaded and use this time-stamp to create an aggregate hash chain.
- RTC real time communication
- Another alternative may be to use a sequence counter which is incremented every reboot cycle and applied by the RoT to create the hash chain.
- Yet another method of introducing freshness is to complete the Stage 1 and Stage 2 checks, commence communications with the SeGW and PVE and then use a nonce supplied by the SeGW/PVE to bind the further validation of the Stage 3 checks, before communicating the result of the Stage 3 validation data to the SeGW. This ensures freshness of the validation data.
- the SeGW may detect and act upon various conditions based on the validation token. For example, a token which stays active for too long may indicate a general failure of PVM. The SeGW may poll PVE and DMS for the token to find out its status and act upon it. This may be identified as a validation timeout. In another example, revalidation may occur while the token is active. This may indicate various conditions, such as unexpected reboot, power outage or DoS attack. In another example, time-based patterns, such as random or periodic behavior may be detected in vein of an intrusion detection system (IDS). The device may be quarantined, blacklisted, and in-field maintenance may be triggered.
- IDS intrusion detection system
- the token may also be used to protect the integrity of data passed between entities in the PVM system and between the PVM system and the device. For this, it may suffice to include a hash value of the data to be protected, for instance the Clist, or the list of missing RIMs in the treatment of failure condition Fla, and a pointer to that data.
- the data object may not be included as a whole in the T_PVM, since this may overload it and lead to incalculable overhead, which may in fact enable certain DoS attacks.
- Operator RIM shielding replaces the numerous RIM certificates for device components coming from various external sources by RIM certificates which are generated by the operator, or equivalently “selected home operator” (SHO), with which the device wishes to establish a backhaul link.
- SHO selected home operator
- SHORIMc SHO RIM certificates
- SHORIMS are installed (pushed down) by the DMS to devices to also take precedence over foreign certificates locally on the device in secure start-up of the device by the TrE.
- the SHORIMcs may serve as a “first-level cache” for fetching RIM certificates in validation. They may be associated with special Clnds pointing essentially to a technically separated, high-performance, sub-database of V_DB.
- M2M Equipment M2M Equipment
- Clnds pointing to another operator. It may accept these in a manner analogous to roaming of mobile devices or replace them as described herein.
- Operator RIM-shielding when a SHO decides not to release the public part of the signing key of the SHORIMcs generated by the SHO, it may be difficult, or even impossible for another operator to validate components of a device coming from that SHO. Such a scheme may be extended to the same level of lock-in that traditional SIM-lock procedure provides. Operator RIM shielding may be used in the initial deployment of devices in the field to remotely “brand” devices on first contact with the SHO, as a lifecycle management tool.
- the RIMman configures PVE and DMS to perform their respective functions for operator RIM shielding.
- the PVE sends (separately or combined with the message about component validity) a message containing a list of components for which now SHORIM is in V_DB.
- the DMS is configured to perform the certificate update action (without necessarily updating the component itself) on components for which the new SHORIMcs shall be installed on the device.
- the PVE identifies components for which no SHORIM is in V_DB (this is orthogonal to the availability of any RIM and RIMc for the components, such as, the normal PVM process).
- the PVE sends the list of identified candidate components, containing Clnds and actual RIMs (RIMman needs them for generating the corresponding SHORIMcs, essentially by signing them) for operator RIM shielding to RIMman.
- the RIMman decides upon a locally available policy to determine for which components of the received list to apply operator RIM shielding.
- the RIMman generates SHORIMcs for these components by signing the respective RIMs. Certificate parameters, such as validity periods, are determined by a local operator policy.
- the RIMman generates SHOCInds pointing to SHORIMcs in the V_DB.
- the RIMman appends V_DB with the new SHORIMcs and SHOCInds.
- all ‘old’ data are stored, such as original Clnds and RIMcs in V_DB for later traceability and as fallback.
- the RIMman sends the list of (CInd, SHOCInd) pairs to DMS, instructing it to force a RIM indicator update on the device in question.
- the DMS sends a RIM indicator update message with the SHO data to the device TrE, as in normal device management, but without component update. With this message, the device may be asked by the DMS to use only SHOCInds in validation henceforth.
- the DMS may force stateful revalidation of the device. Stateful revalidation is required to avoid cyclic behavior when RIMc update fails on the device.
- Operator component lock-in As an extension of operator RIM shielding, the operator may be able to control or limit the operation of a device or its components in foreign networks. This may extend to operator component lock-in in the following way.
- a part of the component that shall be locked is encrypted, for example, with a symmetric key, by the SHO.
- Operator RIM shielding is performed for this modified component.
- the decryption key is transferred to a TrE (or UICC) in a protected and controlled space, where it may only be accessed with authorization from the SHO.
- TrE or UICC
- the SHO releases the authorization data to the TrE.
- the encrypted part of the component is transferred into the TrE's secure execution space, decrypted, and executed there.
- the SHO-locked component may only function when the device validates toward the particular SHO while the same device may not be able to validate to another operator.
- the decrypted part is released for execution outside of the TrE. This is weaker in terms of security than the previous variant since the full component may then be recovered by dumping the device memory. With the obtained clear component, RIMs may be re-generated and validation toward another operator may be successful, breaking the lock-in.
- component lock-in may be implemented without encryption secrets managed in the TrE or protected by other security elements such as the Universal Integrated Circuit Card (UICC).
- UICC Universal Integrated Circuit Card
- an operator component lock-in may involve a roaming operator hijacking components or entire devices of another operator.
- the above TrE-based methods to protect otherwise free user devices from this are desirable.
- the device should alert the user/hosting party/original SHO of such procedures, and maintain a policy when to allow lock-in for components and when to disallow it.
- Described herein is an example method for individualization of devices in device management using PVM with regard to characteristics of the specific PVM system and operator.
- a device managed with PVM may be in a trustworthy state, in relationship to a specific PVM system and the governing operator.
- a question which may arise with roaming devices, when they enter the realm of another PVM system and operator, is, for the device to prove who has managed its configuration and trustworthiness before.
- One example method to enable independent measures for the device to provide evidence to that end is to provide the device with data in which the addressing to the device is signed. This individualization of a message proves the intentional signing by the sender.
- One method may be to contain the Dev_ID in data signed by the operator.
- Any party which may be presented with such signed data may then assume that the corresponding message and its content was intended for that particular device by the signing operator. This holds under the condition that the relying party believes that the signing operator correctly carried out a verification of authenticity of the device (e.g, via the Dev_ID). If this is not tenable, then the signing operator may still sign the full authentication credential of the Dev_ID instead.
- the signed data may also include the actual RIMs, adding a certain redundancy since this establishes essentially another RIMc, extended with Dev_ID.
- the RIMman contains Dev_ID in a SHORIMc, which is applicable only if RIMcs are maintained by the device and hence the SHORIMc will be stored, including the Dev_ID, inside the device.
- the RIMman or DMS applies an operator signature to (Dev_ID, CInd) pairs and if SHOCInds are used, the same operator signature on SHOCInds.
- the blacklists may include at least the Dev_ID and optionally the TrE_Info (certification, make, manufacturer, model, serial number). Such a list would typically be accessible by the DMS.
- every MNO maintains its own blacklist and the DMS may have access to this list or database. Queries use the Dev_ID to see if a given device is blacklisted. Network access is then denied to these devices.
- a global blacklist may be maintained, where every MNO can list devices as rogue and this database may be read by all MNOs. It must be assured that every MNO may only blacklist their own devices, while all MNOs may read all entries. Such a global database requires more of a management and maintenance effort.
- the above embodiments may be combined for alternative embodiments.
- the PVE When the PVE receives the token T_PVM, the PVE appends a timestamp to T_PVM and forwards it to the DMS, which can extract the Dev_ID from the token and optional gain the TrE_Info. Using the Dev_ID (and TrE_Info if needed or present), the DMS queries the blacklist. If a device is blacklisted, the DMS forwards a message, containing the T_PVM, as a blacklist entry to the SeGW. The message may be equipped with a timestamp by the DMS. The SeGW may then deny access to the CN.
- TrE_Info field may blacklist certain vendors, models, ranges of serial numbers and the like. Depending on the complexity of the blacklist behavior, a local, MNO-centric solution may be easier to implement than a central blacklist.
- White lists for devices may be established that allow network access based on the white lists.
- the white lists may typically include at least the Dev_ID and optionally the TrE_Info, such as, make, manufacturer, model, serial number. Such a list would typically be accessible by the DMS.
- the PVE When the PVE receives the token T_PVM, the PVE appends a timestamp to T_PVM and forwards it to the DMS.
- the DMS can extract the Dev_ID from the token and optionally gain access to the TrE_Info.
- the DMS queries the white list. If a device is white listed, the DMS forwards a message, containing the T_PVM, the white list entry to the SeGW. The message may be equipped with a timestamp by the DMS.
- the SeGW may then allow access to the CN.
- TrE_Info field may be implemented by using the extended information from TrE_Info field. It may be possible to white list certain vendors, models, range of serial numbers and the like. Depending on the complexity of the white list behavior, a local, MNO-centric solution may be easier to implement than a central white list. In addition, regulators may require the MNOs to maintain blacklists in place of white lists.
- every MNO may maintain a white list or database and the DMS may have access to this list. Queries may use the Dev_ID to see if a given device is white listed. Network access may then be granted to these devices.
- a global white list may be maintained, where every MNO may list its own devices as trusted and this database may be read by all MNOs. It must be assured that every MNO can only white list its own devices, while all MNOs can read all entries.
- Such a global database may require more management and maintenance effort.
- a global database of white listed devices may require the MNOs to establish additional trust relationships between them. A device which is considered trustworthy by MNO A will enter the white list and have access to MNO B. This requires a standardized and/or certified device validation process to compare trust levels of the devices.
- a combination of the above variants may be implemented.
- Quarantine network for devices may be established, requiring additional changes to the operator's network.
- the SeGW may still act as an enforcement barrier for the CN.
- the SeGW decides which devices are put into quarantine.
- Devices in quarantine have no direct access to the CN and provide no or limited service to customers.
- a validation occurs, where verification data is assessed by the PVE. New actions may be triggered depending on the outcome of the assessment. For example, the device may be considered trustworthy and may connect to the CN. In another example, the device may be detected as compromised and unrecoverable. It is put on a blacklist and further access attempts are blocked.
- the SeGW forwards the outcome of validation, together with Dev_ID and TrE_Info to the DMS. The DMS may provide appropriate updates/software changes to recover the device. The SeGW may be informed about the update and triggers a revalidation of the device. If updates are applied successfully, the validation succeeds and network access may be granted.
- the blacklist method above may be used in conjunction with a quarantine network. This may allow operators to make use of the connectivity to the device such as by supplying updates over OTA if possible. Alternatively, a blacklist may be used to block devices completely. For example, if the devices cannot be recovered by OTA measures. Such devices must be taken care of by an in-field replacement/service.
- the grey-list contains for example devices which are new to the network (those coming from another MNO); devices which have not been connected for an extended period of time; devices with suspicious behavior; and devices for which security warnings (by vendors and independent researchers) exist.
- PVM parametric validation
- One method to include parameters in the PVM process is based on the method of extending hash values, i.e., by concatenating the hash function results of the parameter to the measurement of the component.
- a parameter digest value is taken of a serialization and binary representation of the parameter values of a component, and then the existing measurement value of that component is extended by this parameter digest. Accordingly, for validation, all measurement and reference values, RIMs and RIMcs, may be treated in an analogous way, leading to various implementations of parametric validation.
- An embodiment for validation based on PVM concepts includes the option to allow components to be loaded without having RIMs in the device. It may be possible that non-security critical software has been deployed on the device and that it is safe enough to load the specific component, but the network needs to be aware of the change.
- the MNO establishes a policy that certain components (for example because of frequent changes) are always measured by the device but validation takes place by the network. Furthermore, this may be the default action for the device to load and measure unknown components and leave the validation tasks for the network.
- the network may be able to put a device in quarantine, which in turn enables the remote OAM repair of the device. For example, it may return to a pristine state, removal of components, or take other measures.
- Described herein is an example of PVM diagnosis of failure condition F 2 a .
- failed components may be found as follows.
- the device may not keep an SML that can be shown to the PVE for comparison with RIMs.
- the DMS may omit actually replacing the components on the device which failed—since it may not know them—but only replace all components in the Clist with correct ones in the normal management procedure.
- the device may then be able to include in the validation message also a list of components which were not loaded, since they failed internal verification.
- the PVE may even make this diagnosis by comparing the Clist of the previous validation with the one after RIM update.
- the components which are now missing were not loaded in secure start-up when they were locally verified against the correct RIMs.
- the missing components are the ones in need of replacement.
- the components which are in need of actual replacement may be replaced in a second management cycle.
- Another method for performing diagnostic validation is possible if the device reports that a component could not be loaded (for example RIM missing or wrong) and sends the measurement value of the component to the CN.
- an OAM repair process may be triggered to either remove or repair the component.
- Another variant allows the device to request OAM repair directly if the TrE detects that a RIM for a component is missing or wrong.
- An additional method may be to disable components, which cannot be validated and cannot be replaced/updated in PVM without denying connectivity to the device.
- the DMS may send a “disable CInd” message for components and triggers a revalidation of the device. This may apply where unknown components are loaded.
- Another method may have the DMS specify which components are allowed on a specific device. If a device loads and validates all components during secure startup, including components which are not allowed (for example because a security flaw has been discovered recently and no update is available yet), the DMS may send a message via the SeGW to the device which allows it to disable this component. The device is requested to revalidate. If the component is not loaded during revalidation, DMS signals this to the SeGW, which in turn allows authentication/validation to complete.
- a local integrity measurement, verification and enforcement process may be established on the device (for example by a secure-start-up) it may be sufficient to send only the RIMs used in this local verification process, since verification data (for example PCR values) may contain the same information as the RIM itself. A minimal validation may thus not send verification data but only the reference values used in the local verification process.
- verification data for example PCR values
- Two requirements for minimal validation include: 1) that the local measurement, verification and enforcement (MVE) process is trustworthy; and 2) that the RIM source for the RIMs stored on the device is trustworthy. It may be possible to report verification data for the local MVE process to an external entity for assessment. This is for an explicit establishment of trust.
- the MVE process may be implemented such that it cannot be compromised.
- the fact that the device reports RIMs later on implies that the MVE process is trustworthy. This is for an implicit establishment of trust.
- RIM certificates signed by vendors, other MNOs, TTPs, and other parties may be sent instead. If the signer of the RIM certificate is trustworthy, the RIM is considered trustworthy. If any of the reported RIMs cannot be trusted, measures such as putting the device in a quarantine network or on a blacklist may apply.
- Adjustments may be made to the redundancy of RIMs and verification data to gain efficiency. For instance, devices may be required to deliver verification data only in certain conditions or only at certain frequencies. For example, if compromised RIMs have been detected by the PVM system, a new device roams into this operators realm, or the SHO has not seen this device for a while. In another example, delivery of verification may be required only once in every ‘N’ validations.
- remediation may be a necessary operation for continued service of a device. There are numerous reasons a device may need remediation. Besides regular maintenance of software upgrades, bug fixes and enhancements, remediation may be an integral part of the general security process of a device. During the validation procedure, the software on the device is measured and verified for its integrity. These measurements are compared to RIMs located in the TrE. If the verification fails, either the code has been tampered with or the RIMs are incorrect for that particular code base. Remediation procedures may be initiated to update either the code base or the RIMs to ensure proper validation of the device.
- Remediation procedures may be initiated to at least indicate to the CN that the device is unable to authenticate to the SeGW, and possibly to also facilitate network-initiated update of the code base or new trusted reference values corresponding to the installed code base. Remediation may occur between the DMS and the device through the SeGW.
- the FBC may be loaded completely and unaltered into the TrE; 2) the TrE may execute the FBC securely; 3) communication for remediation with a network entity, such as the DMS, may be secured for integrity and secrecy; and 4) credentials for remediation access to the network may be protected throughout the process.
- the FBC does not have to be loaded into the TrE.
- the FBC may co-exist with the TrE, e.g., as another (trusted) code base for the single purpose of remediation.
- the trust in the FBC would be derived from the fact that it is stored in secured storage or protected by HW secured secrets. As such, the TrE may not be needed to run the FBC.
- the FBC may be self-standing and running directly without the establishment of the TrE.
- Described herein is an example of device initiated remediation.
- remediation may become an alternative to immediately quarantining a device upon detection of errors.
- the TrE is the first stage verified. If it is verified correctly it indicates the device has achieved a predefined state of secure start-up. The implication of this is that the TrE is reliable and the RIMs stored in the TrE are trustworthy. However, it may not indicate that the RIMs are correct for the particular version of code that is currently loaded on the device.
- Described herein is an example of network initiated remediation.
- the FBC may be initiated triggering a software update of the main code base including the RIMs.
- the device may send an IKEv2 message with the Notify payload indicating the device is executing in fallback mode and needs immediate remediation.
- remediation procedures would not necessarily entail a full update of software or trusted reference values (TRVs).
- TRVs trusted reference values
- the device passes stage 1 and 2 validation, but fails stage 3
- information regarding the failed modules may be sent back to the PVE in the Notify payload or certificate in the IKEv2 protocol. If the PVE deems those failed modules as non-critical, the validation and authentication could continue on with those failed modules disabled/unloaded. However, if the failed modules are critical, the PVE may send information to the DMS indicating remediation is necessary.
- Another scenario may be that the RIMs stored in the TRE are incorrect for a specific code base.
- the failed measurements may be sent back to the PVE where analysis of the information would indicate that the error is in the RIMs and only those values need to be securely updated in the TRE.
- the device may be equipped with a fallback code (FBC) image, the purpose of which is to facilitate the remediation of a device to take place in case it has failed device integrity verification.
- FBC fallback code
- the FBC may be stored in secure memory, such as read only memory (ROM).
- ROM read only memory
- the FBC may be invoked if the local device integrity verification fails.
- the FBC may contain at least all necessary functions, methods and credentials needed for communication with the entity in the CN that is responsible for remediation for the affected device.
- the FBC may also include functions necessary to receive a full software update from the network. A special, ‘remediation’ DMS may be considered.
- the device and TrE may be capable of performing the following remediation indication procedures upon failure of device integrity check.
- the TrE may initiate execution of trusted code known as fallback code (FBC).
- FBC trusted code
- the FBC may be stored in secure memory such as ROM.
- the FBC may establish a secure connection to a pre-designated, ‘remediation’ DMS.
- the FBC may send a distress signal to the DMS that may include the device ID.
- the DMS upon receipt of the distress signal may know that the device has for example, failed integrity check and requires maintenance.
- the DMS may initiate a full firmware update procedure or perform diagnostics to perform a partial code/data update, upon receipt of the signal.
- Validation without RIMs may include secure transfer of component code to secure storage under control of TrE on load, such as secure memory cards.
- Validation without RIMs may also include replacing digest values with encryption, so as to store encrypted components, such as code, in normal memory. It may also include encryption with a key protected by the TrE and shared with the DMS, or encryption keys derived from asymmetric cryptography algorithms, where the DMS and TrE may have public and private key pairs. Encrypted code may not allow for targeted alterations. Any manipulation of the code may be detected upon decryption, such as in a variant of secure start-up, since the decryption of tampered data yields nonsense. Detection of such changes may be accomplished by the inclusion of digest values into the encrypted code. Further options, such as error correcting codes may be applied.
- Some devices may be used in application scenarios, where location based information plays an important role, such as theft protection, cargo tracking, fleet monitoring, or surveillance.
- the device may be typically equipped with a global positioning system (GPS) module to provide geographic location data.
- GPS global positioning system
- the secure start-up may then include the GPS module and components, to ensure trustworthy generation and storage of location based information.
- the location data may additionally be stored securely in the TrE secure storage.
- the location information may then be included in the validation message. This may for example be used to change the device configuration by OAM procedures if the reported location does not match the desired location. If a device reports a new location, its configuration may be changed such that it uses different parameters to connect to the network, trigger software events, such as logging, reporting, or shutdown. Location information may be assumed to be securely handled by a trusted application.
- MNO mobile network operator
- H(e)NBs better known as femtocells.
- a H(e)NB is a small, portable access point providing terminal devices (such as mobile phones) access connectivity to 3G networks.
- a H(e)NB is generally placed on the premises or in the homes of a stakeholder called a Hosting Party (HP).
- HP becomes a mediator for mobile communication and services in a small, designated geographic area. This may be used to provide mobile services in hitherto inaccessible areas (due to bad radio conditions) such as in-house or factory environments. It is also an option for private households and the small office home office (SOHO) sector as a H(e)NB may be a unified access point to broadband Internet and mobile networks.
- SOHO small office home office
- H(e)NB usage scenarios three stakeholders, Users-HP-MNO, are related by Service Level and usage agreements.
- the H(e)NB stores a lot of sensitive data in this context, such as the HP's authentication data, embodied, e.g., as a mobile network subscription, the list of Wireless Transmit Receive Units (WTRU) or User Equipment (UE) which are allowed to connect to the H(e)NB, stored as a Closed Subscriber Group (CSG), and an Access Control List (ACL).
- WTRU Wireless Transmit Receive Units
- UE User Equipment
- ACL Access Control List
- Some of this data may be private to the HP and/or the users.
- the location of the H(e)NB needs to be controlled to protect the mobile network from interference and prevent illegitimate extension of services.
- FIG. 7 illustrates an example communication scenario between an H(e)NB 705 , WTRU or UE 710 , and an operator core network 730 . It introduces two network entities, one tasked with security, the other with servicing of the H(e)NB.
- the Operation, Administration and Maintenance 735 (OAM) is a function in the backhaul of the core network which provides remote management functionality to the H(e)NB 705 . In particular, it provides software downloads and updates, setting of radio and other parameters, and other similar functions.
- the Security Gateway (SeGW) 740 is the main entry point for H(e)NB 705 into the operator's core network 730 , and its main purpose is to protect the network 730 from illicit connection attempts and any kind of attacks that may emanate from rogue H(e)NBs or an attacker impersonating an H(e)NB.
- M2M Equipment Typical examples for M2M Equipment (M2ME) are vending and ticketing machines. More advanced scenarios comprise, among others, remote metering of combined heat and power plants, machine maintenance, and facility management. If M2ME are connected to back-up systems via a mobile network, MNOs will be enabled to offer value-added services to M2ME owners, beginning with over-the-air (OTA) management. Like H(e)NBs, M2ME are under the control of a stakeholder different from the MNO. The stakeholder has certain security requirements, which may be different from the MNO's. Security of H(e)NB and M2ME is an issue. The respective threats, risks, and ensuing security requirements are comparable for both cases.
- OTA over-the-air
- Threats may be grouped into six top-level groups.
- Group 1 consists of methods to compromise credentials. This includes brute force attacks on tokens and (weak) authentication algorithms, physical intrusion, side-channel attacks. And a malicious hosting party cloning an authentication token.
- Group 2 consists of physical attacks such as inserting valid authentication token into a manipulated device, booting with fraudulent software (“re-flashing”), physical tampering, and environmental/side-channel attacks.
- Group 3 consists of configuration attacks such as fraudulent software update/configuration changes, mis-configuration by the HP or user, mis-configuration or compromise of the ACL.
- Group 4 consists of protocol attacks on the device. These attacks threaten the functionality and are directed against the HP and the users.
- MNO man-in-the-middle
- DoS denial-of-service
- Group 5 consists of attacks on the core network. These are the main threats to the MNO. They include impersonation of devices, traffic tunneling between them, mis-configuration of the firewall in the modem/router, and DoS attacks against the core network.
- H(e)NB it also refers to changing locations in non-allowed ways.
- this includes attacks on the radio access network using a rogue device.
- Group 6 consists of user data and identity privacy attacks including eavesdropping of the other user's Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) or Evolved UTRAN (E-UTRAN) access data, masquerading as other users, user's network ID revealed to H(e)NB owner, masquerading as a valid H(e)NB, and providing radio access service over a CSG.
- UMTS Universal Mobile Telecommunications System
- E-UTRAN Evolved UTRAN
- the authenticity of the HP or M2ME proprietor may be made independent of device authentication to the network.
- secret data of the HP must be protected from access by another party, even the MNO.
- the device has to perform security-sensitive tasks and enforce security policies towards both the access network, and the connected WTRU. This must be possible in an at least a semi-autonomous manner, to provide service continuity and avoid unnecessary communication over the backhaul link.
- Another important security area is remote management by OAM or OTA, respectively.
- the device needs to securely download and install software updates, data, and applications.
- EAP-AKA Extensible Authentication Protocol—Authentication and Key Agreement
- HPM HP Module
- MIDs managed identities
- UICCs Universal Integrated Circuit Cards
- SIM 3G Subscriber Identity Module
- TrE may be used for these purposes.
- the TrE needs to securely interact with other parts of the system. It is interesting to look at these TrE interfaces, as they are a general model for how the TCB of a TS communicates with the rest of the platform. Basically, all TrE interfaces are initialized in the secure start-up process of the TrE, and are thus assumed to operate correctly. There are two broad security categories of TrE interfaces. First, there are unprotected interfaces. These interfaces let the TrE with general resources of the device which are not assumed to be secured against tampering and/or eavesdropping. Even unprotected interfaces may benefit from other security measures such as data encryption, or making the interface available only after the TrE checks the code of its counter-part resource across the interface, for example, during a secure boot.
- interfaces there are protected interfaces. These interfaces provide either protection of the integrity and/or confidentiality of the data carried across them, using either security protocols or secure hardware. If security protocols are used, they may also provide authentication, and message authentication and/or confidentiality.
- Unprotected interfaces may be chosen when the communicating entity does not provide protection of the communicated data.
- Protected interfaces may be chosen when there is a need to provide protection of data integrity and/or confidentiality between the TrE and another resource that the TrE needs to communicate with. Accordingly, the capabilities of the TrE may vary.
- FIG. 8 shows an embodiment for a TrE within an H(e)NB and what other resources it might connect to. This is a minimal configuration including the capability to compute and send to the SeGW the parameters needed for device authentication of the H(e)NB, functions for H(e)NB validation, including code-integrity check of the rest of the H(e)NB at boot time, and minimal crypto capabilities (a true random number generator). With regard to authentication, it is envisaged that TrE may logically contain the HPM.
- FIGS. 9A and 9B show both scenarios, H(e)NB connection through SeGW and direct connection of H(e)NB to HMS via interface I-hms d.
- the PVM architecture or system 900 of FIG. 9A includes a H(e)NB 905 having a TrE 910 .
- a WTRU 912 (or user entity (UE)) may be in communications with the H(e)NB 905 via an I-ue interface 914 .
- the H(e)NB 905 communicates with a H(e)NB gateway (GW) 918 , that includes a SeGW 920 , via an I-h interface 915 .
- GW H(e)NB gateway
- the interface I-h 915 between the H(e)NB 905 and the SeGW 920 may be unprotected and special measures may be applied to secure this channel for authenticity, integrity and, optionally, confidentiality.
- I-h 915 may be used to establish the link between the H(e)NB 905 and the SeGW 920 and thus the CN.
- the SeGW 920 may communicate with an AAA server via interface I-aaa 975 .
- the operator may have established appropriate measures to ensure the security of the interfaces.
- An I-pve interface 922 may be used by the SeGW 920 to contact the PVE 924 during validation.
- the PVE 924 may use I-pve interface 922 to signal the outcome of validation to the SeGW 920 .
- the I-dms interface 930 may be used for device configuration related communication between the H(e)NB management system (HMS) 935 and the SeGW 920 .
- the I-pd interface 932 may be used by the PVE 924 to communicate with the HMS 935 and vice-versa. This interface, the I-pd 932 , may be used during device management procedures, such as for device software updates and configuration changes.
- the interfaces I-v 926 and I-d 938 may be used by the PVE 920 to read RIMs from the V_DB 940 and by the HMS 935 to read allowed configurations from the C_DB 950 , respectively.
- the interfaces I-r 928 and I-c 934 may be used by the PVE 920 to communicate to the RIMman 960 , such as in case of missing RIMs in the V_DB 940 , and by the HMS 935 to communicate with the CPman 970 .
- the RIMman 960 and the CPman 970 may use the interfaces I-rdb 962 and I-cdb 972 to read, write, and manage the validation of the database V_DB 940 and the configuration policy database C_DB 950 , respectively.
- FIG. 9B illustrates a PVM 982 where the H(e)NB 905 may connect directly to the DMS 935 .
- the HMS 935 may act as the point of first contact for the H(e)NB 905 via an interface I-dms_d 984 and communicate with the PVE 924 via interfaces I-pve 986 and I-pd 988 to perform a validation, or at least to get to know which components have failed during secure start-up.
- the HMS 935 may act upon this information for remediation.
- Validation using PVE may directly be mapped to the H(e)NB scenario in various ways.
- the DMS' functions are performed by the HMS or an appropriately extended entity, evolved HMS (eHMS), which is capable to access the C_DB.
- eHMS evolved HMS
- the C_DB provides a policy that specifies the criticality of modules and the interoperability of the various release versions of the modules, for example, some modules may be critical for operation and some may not. This is helpful in limiting the size of the update and provides patches instead of a complete firmware update.
- the policy may be as simple as one that defines all modules as critical for operation of H(e)NB and therefore a complete firmware update is done.
- eHMS inspects the policy to check for the criticality of the module and any impacts on interoperability of modules. Based on this, a list of applicable patches is created. Patches may be collectively or individually sent to the device for application. In either case, each unit of transfer is integrity and confidentiality protected. The link has to deliver the packets in order and without loss.
- the device Upon receiving all the patches, such as when indicated by eHMS by a terminating package or flag, if required, the device sends a list of received patches along with their measurements to the eHMS to confirm the update information or if a collective and individual patch measurement is sent by the eHMS then performs local verification of the patches and begins application. Following the application of the patches, the system boots in normal mode and starts the device validation process.
- This procedure may also be followed whenever there is a new firmware release from the manufacturer, such that the eHMS sends an update notification to the device and the device boots with ECB and sends the measurements to eHMS.
- the eHMS provides the patches or a complete firmware update and the same procedure is followed.
- the HMS In the case of non-policy based updates, on any failed measurement, the HMS provides the complete new firm-ware which is sent over the secure link. The device verifies the firmware and applies it and boots in normal mode.
- the eHMS may ask it to return to a previously known good state where the patches that failed measurement are rolled back. This method may be used to bring the system back into factory state.
- the previously known good state may be a state that is certified by the PVE, eHMS or S(e)GW.
- a H(e)NB may return to a previously known good state, may provide integrity protection of system states, may provide a restore operation of previously stored system states, and may have to protect this restore operation in case of a compromised device.
- Described herein are examples of validation of devices connected over the public Internet.
- the CN For devices which are connected to the SeGW, respectively, the CN, over an insecure initial link, such as the public Internet, special requirements may apply for securing the initial steps of validation. These special requirements may also be applicable to the H(e)NB type of devices which request such a connection from the SeGW, and validate through it.
- H(e)NB counterparts of network entities such as a HMS instead of the generic entities of PVM, are described herein, it should be apparent that the same methods and apparatus may be applied in the non-H(e)NB setting.
- validation and authentication are required to be bound to the first few steps of the initial connection, or even into the same data structure. Two variants of binding validation and authentication to specific protocols such as TLS and IKEv2 are described.
- the transport protocol of IKE, ISAKMP defines a number of certificate profiles that may be used, and they allow a fully qualified domain name (FQDN) as IDs.
- the device certificate and TrE_certificate may be kept separate. However, it may be possible to nest the TrE_certificate into the device certificate. If the TrE had a separate ID (TrE_ID), the FQDN may be used but the TrE may be identified by the manufacturer rather than the operator domain names.
- one method may have the SeGW send the first authentication exchange message containing the CERTREQ payload to request Dev_CERT. Then, the device answers with two CERT payloads in the next message, one using Dev_CERT, and one for TrE_CERT. In this case, SeGW defers verification of Dev_CERT until TrE_CERT is verified and validation data evaluated by PVE. After that, authentication proceeds. In case the answer contains only Dev_CERT, SeGW falls back to AuV.
- Dev_CERT and TrE_CERT may be advantageous if the respective IDs are different for practical reasons.
- the operator may have assigned a network address, e.g., such as an IP address, to devices, which are authenticated by Dev_CERT to directly build the IPSec tunnel from.
- Some type of network addresses may be unsuitable for the TrE_CERT.
- the two IDs may be useful in the device. It may be a further task of the SeGW/PVE infrastructure to serve for the exchange of the Dev_CERT, by applying the performing PVM and a subsidiary authentication based on TrE_CERT.
- IKE authentication messages may carry any number of payloads of any type. In the header of every payload, it may include a ‘next payload type’ field. Thus, a whole chain of payloads may be sent in one ISAKNIP message. This may be used to separate the certificates into payload fields of one or more ISAKMP messages of phase 2 of the initial IKE conversation.
- An example process 1000 between a device 1005 , a SeGW 1010 and a PVE 1015 using an IKE conversation completely separating the certificates for TrE and device authentication is shown in FIG. 10 .
- a message including (TrE_Cert, VAL_DAT) is sent from device 1005 to a SeGW 1010 ( 1 ).
- the SeGW 1010 verifies the extracted TrE_certificate, TrE_Cert ( 2 ). If the TrE_Cert is successfully verified, the SeGW 1010 sends a validate data message, VAL_DAT, to the PVE 1015 ( 3 ). The PVE 1015 validates the device 1005 ( 4 ) and signals success to the SeGW 1015 ( 5 ). The SeGW 1015 sends a certification request, CERTREQ, to the device 1005 ( 6 ). In response to the certification request, the device 1005 sends at least a device certification, (Sig_Dev(Dev_ID), Dev_Cert), to the SeGW 1010 ( 7 ). The SeGW 1010 verifies the Sig(Dev_ID) ( 8 ).
- the device certification, Dev_Cert is sent to the AAA infrastructure which responds with whether the device is known.
- Dev_Cert only devices which can be trusted to validate, by transmitting validation data signed by a TrE, with identity attested by TrE_CERT, are admitted to device authentication. This provides extended protection to network components behind the SeGW and helps mitigate DoS attacks.
- a TLS handshake message for supplemental data defines an extension to TLS hello hand-shake messages which allows sending application specific data, such as, the validation message from PVM, in the TLS handshake.
- the supplemental_data may not be used by the TLS protocol but by the applications, such as the PVE validation engine. There may be a single supplemental_data handshake message allowed, but receiving more than one may be treated as a failure.
- the type and format of the carried data may be specified as SupplementalDataType and may be known to both sender and receiver.
- a double-handshake may be performed, thus providing protection for the performing PVM data carried in the SupplementalData handshake message. Further it may ensure that the parties are mutually authenticated before either party provides SupplementalData information.
- a new SupplementalDataType may be defined to carry the performing PVM validation message.
- the H(e)NB then engages in the first TLS handshake for mutual authentication with the SeGW. Then the second handshake may be protected using the first TLS session and the validation data is sent in a SupplementalData field to SeGW.
- the validation data may be sent in one handshake exchange rather than two, by sending the supplemental data in the first handshake message.
- a TLS extension which allows the server to issue a session ticket to the client to resume sessions and keep the per-client session state, may be used in validation by the SeGW to store the validation outcome in a TLS session ticket.
- Such a session ticket may be used for platform management in PVM.
- the SeGW receives this notification from the PVE, and generates the session ticket.
- the ticket is encrypted using an 128-Bit AES symmetric key, which is not disclosed to the H(e)NB, and the ticket is also integrity protected by an Hash-based Message Authentication Code (HMAC).
- HMAC Hash-based Message Authentication Code
- the TrE may then securely store the ticket and use it in new TLS sessions for platform management, without, for example, having to send validation data again.
- the SeGW may also decide on the lifetime of the session ticket.
- the AES ticket encryption key may then be included in the T_PVM for further use, or handed directly to other entities.
- the key and, for example, the ticket timestamp and detailed validation results, may then forwarded from PVE to HMS.
- H(e)NB may directly establish a secure connection for platform management. This may rely on the H(e)NB following up the platform management task timely, and to contact the HMS before the ticket expires.
- the session ticket may then be used for revalidation.
- the first step may be to establish a new TLS connection from H(e)NB to the SeGW using the old ticket.
- the SeGW may then control that this ticket comes from an H(e)NB which actually has concluded the management cycle with the HMS. It may look up and compare ticket data with the T_PVM returned from the HMS after the completed management. If a correct T_PVM is found, the revalidation attempt using the TLS ticket may be accepted, for example, to protect against DoS attacks mounted by using the TLS ticket for replay. TLS tickets may be accepted for revalidation, which would otherwise be considered expired, since remediation steps with HMS may take long. This may be done without a major loss of security, since the SeGW has the time-stamped, T_PVM available for comparison.
- AuV PVM with autonomous validation
- AuV limits the possibilities to manage devices based on the outcomes of platform validation. In particular, there is no straightforward way to distinguish between devices which are initially authenticating to the network, and which are performing AuV for revalidation after an update. Device management, if it is based on AuV, requires databases in the network carrying the history of device states. Described herein are example methods that may be effective to at least perform rudimentary device management based on AuV.
- AuV-only capable devices implement a secure start-up which allows the device to perform device authentication procedures if and only if local device integrity verification is successful. If any of the components fail their integrity check, the device may be considered as having failed its integrity check. However, by the use of the FBC image, the device may contact a designated HMS to facilitate device remediation.
- the normal code image of the H(e)NB and/or trusted reference values may be replaced.
- the H(e)NB should reboot and the integrity check process should start over again.
- PVM may use FBC if a set of predetermined requirements are in place.
- FBC is securely stored within the device.
- the FBC may be loaded and started in case of a failed secure start-up.
- the address of a designated H(e)MS is stored securely in the FBC image.
- the FBC may send a distress signal to the designated H(e)MS.
- Such a signal may include the device ID and the message may be integrity protected by a key securely stored as part of the FBC.
- the H(e)MS upon receipt of the signal may be able to ascertain that the device has failed integrity check and requires maintenance.
- the FBC may include functionality to facilitate a full code rebuild initiated by the network.
- the FBC may include functionality to facilitate replacement of TRV(s) initiated by the network.
- FIGS. 11A and 11B show an example method for a failure of integrity verification followed by device remediation facilitated by a FBC.
- a RoT 1100 checks a distress flag ( 1 ). If the flag is clear, RoT 1100 checks the integrity of TrE 1105 ( 2 ). If the flag is set, RoT 1100 loads the FBC ( 3 ). If the integrity check is successful, the RoT 1100 loads the TrE 1105 ( 4 ). If the integrity check fails, the RoT 1100 sets a distress flag and reboots ( 5 ). Once the normal code is loaded, the TrE 1105 checks the integrity of the normal code ( 6 ). If the integrity check is successful, the TrE 1105 loads the normal code image ( 7 ). If the integrity check fails, the TrE 1105 sets the distress flag and reboots ( 8 ). If the RoT has loaded the FBC, then the FBC initiates the sending of a distress signal for remediation to the HMS ( 9 ).
- Described herein is an example of a base method for revalidation and configuration change with AuV.
- one embodiment may assign a multitude of identities to a device to use them in AuV to signal a (finite number) of states such as component integrity verification failures.
- group IDs may be used that are not specific to any single device, to signal verification results.
- Management identities would be grouped according to the stages of the secure start-up process. For example, DevM_ID 3 b for signaling failure at stage 3b, DevM_ID 3 a for signaling failure at stage 3a, and DevM_ID 2 for signaling failure at stage 2. Stage 1 failure cannot be signaled since then the device lacks communication capacity.
- the device may attempt to connect to the HMS as a course of action following failure and execution of the fallback code.
- stage 2 The failure of a single or multiple components in stage 2 does not imply that the device won't be able to communicate.
- the stages are understood as classes of components which belong to certain categories. As long as the most essential components of stage 2 are loaded, the device may be able to communicate its state and the failed components to the PVM system. This may be the case if there is a policy manager on the device, maintained by the HMS, which provides a framework for the criteria under which attachment is possible.
- the DevM_IDn and associated authentication data (for example private keys) must be well protected, since otherwise attackers may subvert the management process by performing spoofing attacks. This is a dangerous threat, since the management IDs are identical for a large group of devices.
- One solution may be to model the platform management process using only this information. Binding the first validation, which signals the failure of some device of unknown identity, to the revalidation should signal success of the management process for a unique device. There are various methods to do this deterministically. In one example, after the device has authenticated to one of the management identities, the SeGW runs a supplementary protocol in which the device has to authenticate to the original Dev_ID. In another method, by exchanging certain secrets, device and PVM system, and specifically SeGW, establish a management session spanning the first validation process and the second, revalidation, process.
- Described herein is an example of a supplementary authentication protocol.
- the device and SeGW have completed the first authentication protocol with the device, in which the device authenticated to one of the management identities DevM_IDn. Therein, it is assumed, they have established an encrypted and authenticated communication session. Then, the device may simply transfer the Dev_ID and authentication data for Dev_ID. For example, a signed message and a public key certificate may be transferred over the established secure channel. This ensures that no one else may know the identity of the device calling for management and use this knowledge to spoof the management process, that is, invalidate the device before revalidation, or impersonate the device.
- the SeGW transfers the DevM_ID and Dev_ID to the PVE, which inserts it in a list of devices which are in need of management.
- PVE then signals the necessary device management action to DMS, for instance ‘install stage 2 fallback code’.
- DMS downloads the corresponding code over the secure channel, established previously by the SeGW, to the device.
- the system then initiates revalidation of the device.
- the device When the management succeeds, the device subsequently authenticates toward its original Dev_ID in AuV. This is signaled by the SeGW to the PVE, who recognizes the Dev_ID in the revalidation list and deletes it. Otherwise, the device may validate to the management ID again, which may also be recognized, and further action taken in accordance with a policy.
- Described herein is an example of a management session establishment. This embodiment differs from the other embodiment in that the PVM makes the management unique to a single device.
- a management session may be established in the communication protocol between device and SeGW. The effect of such an approach is that the device identity may remain unknown to the PVM system, essentially by establishing a pseudonym.
- D-H Diffie-Hellman
- joint key control a property, called joint key control
- SeGW and device have to establish a secret in a special protocol, for instance by using a challenge-response.
- the challenge may be posed by either device or SeGW, and the response must be such, that the second answer in the second run, the revalidation, is identical to the first round's answer.
- the device just shows a nonce obtained from the SeGW in the revalidation, and the SeGW looks it up in a table. The nonce is thus a pseudonym. More involved cryptographic protocols may be used.
- Revalidation may then proceed as above.
- the SeGW maintains the information about the device that revalidates for practical reasons, since it may be used in the protocol run belonging to revalidation, between SeGW and the device.
- OMA Device Management DM
- H(e)NB OMA Device Management
- OMA DM is a device management protocol jointly specified by the Open Mobile Alliance (OMA) Device Management (DM) Working Group and the Data Synchronization (DS) Working Group.
- OMD DM was developed for small foot-print mobile equipments, such as phones or PDAs. It lacks support for broadband wireline connectivity between the equipment and DM server and only supports short-haul wired connectivity, such as USB, or RS232C, or wireless connectivity, such as GSM, CDMA, or WLAN.
- H(e)NBs may, however, be useful as a device provisioning and management protocol for the H(e)NBs, especially for H(e)NBs that also may present itself as a WTRU to the core network while presenting itself as a bae station to the CSG and non-CSG WTRUs that connect to it.
- the OMA DM is intended to support use cases such as provisioning, including first-time device configuration and enabling or disabling features, device configuration updates, software upgrades, and diagnostics reporting and queries.
- provisioning including first-time device configuration and enabling or disabling features, device configuration updates, software upgrades, and diagnostics reporting and queries.
- the OMA DM server side may support all of these functions, although the device may optionally implement all or a subset of these features.
- the OMA specification may be optimized to support the above-listed features for small foot-print devices with constrained connectivity. It also supports integrated security, using authentication, such as by use of such protocols as EAP-AKA.
- the OMA DM uses XML, or, more accurately, a subset from SyncML, for data exchange. This may be useful for providing a standardize-able yet flexible way to define and convey attributes for software modules or functionality for the H(e)NB, for the purpose of validation.
- Device management takes place between a DM server, for example, the managing entity for the devices, and the client, such as the device being managed.
- the OMA DM supports transport layers such as WAP, HTTP, or OBEX or similar transports.
- DM communication is asynchronously initiated by the DM server, using any available methods such as WAP Push or SMS, using either a Notification or an Alert message. Once communication is set up between the server and the client, a sequence of messages can be exchanged to complete a given DM task.
- the OMA DM communication is based on a request-response protocol, where requests are normally made by the DM server, and the client may respond with a reply message.
- the server and the client are both stateful, meaning any data exchanged due to a specific sequence may occur after the built-in authentication procedure.
- DM communication may be initiated by the DM server
- PVM over DM may require a server-query-based approach to validation.
- a device authentication procedure using IKEv2 may be used, which may be initiated by the device.
- Several different message types may be considered as a conveyor of the validation data. For example, it may be sent in a list of failed software modules or device functionality.
- a Management Alert message may be sent from the device to the server.
- the user of the Generic Alert message (that can only be sent from the device to the DM server after there was a transmission of at least one Management Alert message from either the device or the server) may also be considered.
- These messages including the Alert messages may use SyncML format which provides flexibility in specifying the contents and meta data for the contents. This may be useful for validation information transmittal.
- the DM may also support segmented data transfer, which may be useful for software update where the size of the update may be large.
- the very first DM communication has to be initiated by the DM server, subsequent communication may be initiated by the DM client using a continued session.
- Such an ability of the DM client (the H(e)NB or the M2ME, as examples) to initiate in-session communication may be useful for device-initiated tasks such as device-initiated revalidation or device-initiated validation message delivery.
- the binding of validation in authentication certificates allows for a combined validation and authentication, thus automatically binding the authentic ID of the device to the validation.
- the validation message is then included in the authentication certificate in an additional field. For example, using the IKE protocol, such verification data could alternatively be embedded in the Notify Payload field.
- a new combined authentication/validation certificate must be issued every time the device configuration changes.
- the generation of the certificate must be controlled by the SeGW, since it is the entity in charge of authenticating Dev_ID for the purpose of PVM. This may be done in at least two ways. First, the SeGW, or a subordinate entity may generate the new certificate after receiving an updated Clist from DMS. Second, the device may generate the certificate itself, send this to the SeGW and PVE, which then signs it and sends it back to the device.
- the SeGW may finalize the process (either generating and sending the new certificate, or acknowledging the new one generated by the device) after successful revalidation of some sort. This is to assure the PVM system that the new configuration is actually reached by the device.
- this cycle involves all three entities in the CN and the device.
- the DMS triggers the configuration change (for example update of software and/or parameters) and saves the new desired state in the policy database C_DB. After the change is applied to the device, a revalidation will have to occur.
- the device applies the update and performs a revalidation.
- the new software is used, but the new certificate cannot be deployed to the device until a revalidation (especially of the successful update process) has completed.
- the device is running the new software configuration with an old certificate which does not match the actual device configuration.
- a new certificate is provided for device authentication to the device; provided if and only if the update has been applied; and it is ensured that the certificate cannot be used without the update being applied.
- the SeGW may indicate to the device that device authentication has failed because of certificate revocation and then delete the device from the network maintained white list, or conversely, the network maintained blacklist.
- the device upon receipt of this indication may know that its certificate has been revoked and that its identity has been removed from the white list, or conversely, added to the blacklist. The device may then perform procedures to re-establish itself as a valid entity on the network.
- the SeGW may revoke the device certificate if the device ID is invalid, the device certificate has expired, or the trusted third party operator authorized entity which issued the H(e)NB device and its associated certificate has requested the network to revoke the certificate.
- the binding certificate is a signed data-set. It is signed by the issuer, the SHO, or its SeGW or a subordinate entity responsible for managing these certificates.
- the signed data in the certificate comprises at least a Dev_ID, the device public key used for authentication and validation, and a Clist.
- This certificate may be sent in the combined validation and authentication message to the SeGW.
- the latter is a message (part of which is) signed by the device with its private key for authentication and validation.
- the message may contain other data such as a time-stamp and/or a nonce for replay protection.
- the SeGW checks the signature of message and certificate and proceeds with validation as usual.
- Described herein are example certificate exchange methods.
- two variants may be applied. These are identified as pre and post-certificate exchange. They differ in whether revalidation uses the old or the new certificate. Both variants ensure that all required steps are performed atomically, that is that either all of them are completed or none of them.
- the starting condition is where the device runs an old configuration with an old certificate and the ending condition is a new device configuration and a new device certificate.
- the authentication certificates and RIM certificates may need to be created, managed and handled by an independent TTP or the manufacturer to allow for use of devices on many networks rather than tie them to one operator.
- the new device certificates may be addressed by, for example, the Open Mobile Alliance (OMA) for device management (DM), which may be extended to include certificates.
- OMA Open Mobile Alliance
- DM device management
- the update includes the new certificate, thus the certificate is brought into the device prior to completion of the update.
- the device After applying the update, the device revalidates using the new certificate.
- the device is marked as ‘update in progress’ using an appropriate storage and data structure in the CN. For example, setting a flag in the authentication database.
- Another method is to use the validation token T_PVM.
- the DMS transfers the updated and/or changed components to the device as in standard PVM.
- the DMS then sends the new Clist to the SeGW.
- the DMS passes T_PVM to the SeGW.
- the SeGW (and thus the PVM system) enters a state where it expects a revalidation with the new configuration from the device.
- the SeGW collects necessary information (Clist, Dev_Id, device public key, and others) and generates the new device certificate.
- the SeGW collects necessary information (Clist, Dev_Id, device public key, and others) and generates the new device certificate.
- the SeGW then sends the new certificate to the device and then closes the communication session with the device.
- the SeGW is now in possession of the T_PVM obtained from DMS and thus knows to expect a revalidation from the device. It stores the T_PVM for all such devices in an internal revalidation list. Assuming that the device correctly installs the updates and new certificate, then the following process applies.
- the device initiates revalidation, sending the new certificate in the validation message.
- SeGW authenticates the device by verifying the signed data and device certificate.
- SeGW looks up the T_PVM in the revalidation list. Revalidation takes place, wherein the PVM system state is maintained by using the T_PVM from the previous validation (and not generating a new one). This and the previous step take place at the SeGW and not at the PVE, otherwise the SeGW would automatically generate a new token. Thus maintenance of the revalidation list is performed for the SeGW.
- T_PVM continuously over many rounds of revalidation is, as in standard PVM, useful to detect recurring update failures and other patterns of irregular behavior.
- the TrE has a Trusted Update Service which allows the HMS to send updates to the device which are then applied in a secure and trustworthy process.
- the secure start-up may be relied upon to ensure integrity of the update service in the TrE.
- the HMS deploys the new update, it may send a token to the SeGW containing the new updated device configuration.
- the SeGW may then create a new authentication certificate for the device and append it to the token which is sent back to the HMS.
- the HMS includes the new certificate together with the update data for the device's update service.
- This package may be encrypted for the TrE and signed by the HMS.
- the Trusted Update Service receives the update package, verifies the signature, decrypts the data, applies the update and stores the new certificate in secure storage.
- the TrE then signals the successful update to the HMS. Since the Trusted Update Service is protected by the secure start-up, the update process may be trusted, so that a revalidation is not necessary. Depending on the type of update, a reboot may be necessary. In this case, the device may authenticate with the new certificate at the SeGW. Therefore, the HMS must make sure that the SeGW is informed about the revalidation that will occur.
- the new certificate may be supplied with the new software update such that the certificate is encrypted with a key which is bound to the successful installation of the update. This method and its implications might need more consideration.
- the update may not include the new certificate containing the new device configuration.
- the device uses the old certificate and performs a revalidation.
- the CN activates the new certificate and sends the new certificate to the device.
- the new configuration is sent to the device, though it does not yet have the new certificate.
- FIG. 12 shows an example diagram of a signed message format 1200 that may allow for the download of software packages from the issuer to the device.
- the format allows one or more files, such as firmware updates or configuration packages, to be sent in a single signed package.
- the receiving device is able to authenticate the source and contains all instructions to install the contents.
- a header 1205 may contain the format version and the lengths of the command list and payload components.
- a command list 1210 contains the sequence of instructions that may be executed to install the files contained in the package.
- a signatures field 1215 may contain a digital signature whose signed message data consists of the header and the command list. Although the signed message data includes only the package header and command list, the signature assures the integrity of the entire package because all commands that refer to payload files 1220 include a hash of the file contents.
- the DMS signs the command list and includes the software packages and their respective RIMs in the payload of the message.
- the device's TrE then uses a public key to verify the DMS' signature. This public key may be made available to the TrE at manufacture or deployment time, or by an operator trusted CA. All root certificates which are needed to verify the public key may be stored securely in the TrE.
- the command list then includes the commands to install the software and for the RIM ingestion into the device. This provides an effective way for the operator to have full control over the software and RIM installation process on the device. Explicit transport of RIMcs to the device may not occur in this implementation variant.
- a FBC may be invoked, but may need to run inside the TrE, at least for the most critical functionalities cryptography and remediation protocol stack.
- FBC carrier In certain situations it may make sense to obtain the FBC from an external, secure source, called here a FBC carrier. This may be done by a process which is partially out-of band and may require human intervention such as inserting a smart card into the H(e)NB device. This procedure may provide enhanced security via use of a second secure element (smart card) as a FBC carrier, which securely stores and protects the FBC code, or by explicitly requiring human intervention in the remediation initiation procedure to mitigate simple, automated DoS attacks, and may be required contractually as a diligence from the HP.
- the external carrier FBC may be a measure to keep devices simple and cheap, and the TrE thin.
- the external carrier FBC may carry the executable binary of the FBC, including all required secrets for remediation and additionally may provide a secure execution environment for the FBC when needed. Using a separate FBC carrier may not be applicable in situations where the device is in a remote or hard to reach location.
- the process of trust establishment between the three entities described here is similar to various “transitive trust” procedures described earlier.
- the following procedure may apply with an external FBC carrier such as a UICC, a smart card or a secure memory card with its own processing unit.
- the TrE is a relying party which may require an authorized and authenticated FBC code to be loaded.
- revealing FBC code to an unauthorized party is less of a risk, as long as the credentials for remediation remain protected.
- Authentication of the TrE toward the FBC carrier is less of an issue, since an out-of-band process is performed in which the TrE and device are actually not fully trusted. That is why the carrier should not reveal to the device the credentials used for HMS access. Revealing the FCB may be necessary and less critical.
- the out-of-band or human intervention steps are only illustrative for a special use case, and may be automated or integrated in other variations where, for example, the FBC carrier is embedded in the H(e)NB.
- the communication may be very simple in such a fallback code base procedure, therefore authentication and authorization may be combined in single protocol steps.
- stage 1 start up succeeds and stage 2 start up fails.
- the TrE stalls into “waiting for FBC” state and flashes LED or provides other similar indicators of failure.
- the user/HP inserts the FBC carrier.
- the FBC carrier e.g., a smart card such as a Hosting Party Module (HPM), authorises itself to TrE using a particular physical interface to signal FBC carrier presence and/or submitting an authorization secret, for example an OTP or a signed nonce.
- a security association (SA) that is an encrypted and integrity protected communication session is set up between the TrE and FBC.
- the FBC is then loaded into a secure environment which may either be provided by the TrE or the FBC carrier or any combination of capabilities of both environments.
- the FBC may then be integrity-checked if desired and is then downloaded and started.
- the FBC uses a secret to show its successful load to the carrier and creates a fresh SA between the TrE (FBC) and carrier.
- the credentials for remediation remain in the carrier, but the FBC contains data for HMS discovery.
- the FBC contacts the HMS.
- An end-to-end SA between smart card and HMS is established, using the smart card protected credentials which remain unavailable to TrE (FBC) throughout.
- the HMS now knows that a valid TrE (FBC) is calling for remediation.
- the smart card hands over the communication session to the TrE (FBC) and the TrE (FBC) shows its ID to HMS.
- the HMS initiates remediation procedure.
- the authorization secret may be well-protected since this kind of connection may apply to many devices and thus a breach may be catastrophic.
- TPM-protected authorization secrets such as 160-Bit HW protected values
- the FBC may be started directly from the FBC carrier, which then has to provide a safe and secure execution environment. In this case, even a compromised TrE may possibly be replaced.
- an FBC carrier consists of a secure element, a micro-processing unit and memory to execute the FBC independently.
- the FBC carrier may be attached to the device via a common interface (e.g., USB, JTAG) and authenticate directly to components inside the device and then replace the compromised components and possibly parts of the TrE.
- the FBC carrier device may replace the image including the signature.
- the TrE may not be fully trustworthy to correctly load and execute the FBC in some cases, and in most cases may not be able to validate FBC loading to the FBC carrier, some security enhancement may be included such that the FBC carrier has to establish trust in a remote code base execution.
- the FBC carrier may generate a one-time-secret and embed it into the FBC using obfuscation methods.
- the carrier may transmit another authorization secret, which may be recognized and used only by a successfully started FBC. This secret is used by the successfully started FBC to obtain from some protected place in the TrE, a communication secret for the very next step of communication.
- Internal parallel code bases may include trigger mechanisms and the fallback code base needed to facilitate remediation.
- the H(e)NB may contain two code images, one normal mode and one fallback code image (FBC). Normal mode bring up may be implemented for both AuV and SAV in stages.
- the RoT in ROM verifies the TrE. If the TrE is valid then the next stage components may be checked. If any component thereafter fails its integrity check, then the code is unloaded back to the start of the TrE code. At this time, the TrE may start checking the fallback, such as remediation, code. If the fallback code passes integrity checking it can be loaded and started.
- the fallback code may contain some minimum set of device management (DM) code so as to establish connection with the HMS. Once connection to the HMS is established, the failed modules may be identified and updates sent to the HNB. Upon completion of the remediation process, the H(e)NB may be rebooted and the validation process started over again.
- the fallback code size may be kept small in order to facilitate communication with the HMS. There may be no need for a trigger mechanism or register since the code can be “rolled back” to the TrE and then loaded with the fallback code.
- Hybrid (internal/external) code base An additional variant “Hybrid (internal/external) code base” is described herein.
- the FBC may be stored inside the device as in the parallel code base case described above but the FBC is encrypted and integrity protected on the device.
- the TrE itself cannot be used to decrypt the FBC, otherwise, a compromised TrE may lead to a compromise of the FBC itself.
- the Hybrid solution stores the decryption and verification keys for the FBC image on an external secure element, such as a smart card or UICC. In the case of a start failure, the TrE signals this failure and the user/HP is required to insert the authentication token, i.e., the smart card into the device.
- the authentication token i.e., the smart card into the device.
- two options are available.
- the authentication token only stores the key material, and performs a mutual authentication with the TrE in which or after which the TrE receives the necessary key material.
- the TrE performs the integrity check and decryption of the FBC and then loads and starts the FBC.
- the authentication token is improved in the sense that it may autonomously verify and decrypt the FBC stored on the device and then execute it, either using only the device's resources (e.g., using parts of the TrE to provide a secure execution environment) or by providing a secure execution environment inside the authentication token itself, where the FBC may be executed. This variant allows the use the larger storage capacity of the device for FBC storage, combined with the security of additional external secure element.
- a device management protocol may define protocols and commands to install and change software configurations on remote devices and may include a ‘reboot’ command. It may not include the notion of the device sending a ‘remediation-needed’ message. However, combining the results of validation such as SAV and device management protocol, the HMS can use the device management protocol to initiate a re-installation, or reset, of the software components and then issue a reboot command for the revalidation.
- the FBC may be able to delete or uninstall a part of the normal codes, leaving only the rest of the normal codes, and initiate a reboot followed by a revalidation.
- the FBC may be pre-provisioned with a list of the normal codes that need to be deleted or uninstalled.
- the FBC may obtain such a list from an external secure element such as a smart card (e.g., HPM).
- the FBC may obtain such a list from a network based entity such as the H(e)MS.
- a trusted application on the device which may include the following properties: integrity protected; stored securely in the device; able to be started in case of failed secure start-up; establish a (secure) connection to HMS; capable to verify signature on software and commands from HMS; capable to install/uninstall software on the device; and capable to report that the device needs remediation
- a second, possibly redundant, code base image may be used to host this application. Following the description and adhering to the requirements stated above, the second code base brings some additional, and redundant, code into the device. All features provided by this code base may be needed in the case of a normal, successful secure start-up in the device. All features of the second code base may exist in the primary code base.
- the RoT verifies and starts the TrE, upon success.
- the TrE then verifies the remediation code, upon success.
- the TrE verifies the remaining software components, upon success. Otherwise, the TrE stores the failed modules and sets a flag that the device needs remediation.
- the TrE then triggers a reboot of the device.
- the TrE conveys control to the remediation code and releases the list of failed modules.
- the remediation code may then use this list and contact HMS for device remediation processes.
- Notifying the PVE of which modules have failed the internal integrity checks may include creating a standardized list of all SW modules for all makes and models of H(e)NBs. It may be acceptable to produce a standardized list of Security Policy Attributes (SPAs).
- SPA Security Policy Attributes
- the SPA may be a policy which tells the PVE what action is to be taken if a specific SW module fails its integrity check. The PVE does not need to know anything else about the failed module.
- SPA codes may be standardized and may include the following codes.
- a “00” module failure may indicate that network-access has to be denied. All modules of this type may be in stage 2, but having this coding in stage 3 modules allows for flexibility.
- a “01” module failure may indicate allowing temporary network access. This temporary network access may be used by the device to perform remediation, as described in the section on remediation, e.g., using a remediation centre for repair of failed SW module and it may stop network access if remediation is not successful.
- a “02” module failure may indicate allowing network access. This may refer to a remediation centre for repair of failed SW module and may continue network access if remediation is not successful.
- a “03” module failure may indicate allowing network access.
- a “04” module failure may indicate allowing network access. It may delete/disable/quarantine a failed SW module and may continue network access if action is not successful.
- a “05” module failure may indicate allowing network access and may ignore SW integrity failure.
- a “06” may indicate other failures.
- a single SPA may be associated with each stage 3 SW module in an H(e)NB.
- the actual SW module identifiers may then be proprietary to each make and model of H(e)NB.
- the H(e)NB already sends to the SeGW an H(e)NB_ID, which may be used by the network to identify the make, model and serial number of the H(e)NB.
- H(e)NB places into the Notify payload the proprietary SW module ID and the corresponding SPA. The payload is forwarded to the PVE, as per our existing SAV scheme.
- the PVE sends the H(e)NB_ID and the SW module IDs.
- the remediation centre may use the H(e)NB_ID to cross-reference the proprietary SW module IDs so that it can download the correct update to the H(e)NB.
- the PVE may not be told about modules which pass their integrity checks.
- the PVM may be expanded to include failure of stage 2 modules, if FBC supports basic communications.
- the SPA may be part of the object that includes the SW module ID. Those would have to be stored in the TrE. They may not be stored as part of the SW module, and they may not be trusted in the case of a failed integrity check of the SW module.
- the SPAs assigned to each SW module may agree with each H(e)NB supplier as part of the type-approval process for the SW stack, based on a risk-assessment process. Once a supplier has established a relationship with an operator, then it may be simple to assign SPAs to new SW modules. Established suppliers may be trusted to assign appropriate SPAs based on previous successful approvals.
- the SW structure of the H(e)NB may be defined in terms of blocks of codes, where a block is defined as a minimum atomic lump or quanta in terms of integrity checking and in terms of what may be remediated. Individual block functions may not be defined. For example, all of stage 3 SW may be a single block, from the viewpoint of integrity checking. Alternatively, the blocks may map 1:1 onto actual SW applications, or even sensitive objects within applications.
- the SPAs may be applied to the SW blocks. When the remediation centre is invoked because of an SPA of 01 or 02, it downloads the required blocks.
- the ID of a block may be related to the vendor and the architecture may not be standardized.
- the SPAs may be stored securely in the TrE and bound to the SW identifier. It may be guaranteed that, for example, a 05-SPA may not be replayed for another component with a 00-SPA. Thus the PVE may be able to verify that a received SPA really belongs to the loaded component in the H(e)NB.
- the enrollment process that is initiated upon the first, initial network connect of the device, may be used to transfer the SPAs from the device securely into the C_DB and store them for future use. Then the device could report the SW_IDs of failed components and the PVE is able to retrieve the corresponding SPA policy action from the local database. This may be useful for low-bandwidth connected devices.
- SPAs are locally stored on the TrE, the TrE may inspect all failed codes and their SPAs, process them, and send a more summarized stage integrity check.
- the failed modules and their SPAs may include those shown in Table 1.
- the TrE may process such data as shown in Table 2.
- the list of modules that failed to different degrees, which is indicated by the SPA, may be sent instead of all the SPA values.
- the compactness of the data will depend on the number of failed modules expected. For example, if on average more than 1 module will fail for most of the SPAs, then data will be more compact.
- FIG. 13 shows a diagram of an example of a method of validation via remote attestation.
- a validation entity 1300 receives a SML and a signed PCR value.
- the SML contains an ordered list of all files which were extended into the respective PCR.
- the validation entity 1300 performs the following steps for every entry in the SML.
- the validation entity 1300 queries if the given filename exists in a local database 1310 of known-good hash values (1).
- This database 1310 contains all filenames and the RIM (such as hashes) of the binaries which are considered trustworthy. If a filename cannot be found in the database, it is considered untrustworthy (2).
- the validation entity 1300 may compare the RIM to the reported measurement value from the SML (3).
- the validation entity 1300 may perform an extend operation on a virtual PCR (5). Essentially the validation entity performs the very same steps as the platform did during execution and measurement. At the end of this process, the value of the virtual PCR is compared to the reported value from the platform (6). If they do not match, the SML has been tampered with (for example, if a line from SML is deleted, but the hash-value was extended to the PCR, the virtual PCR and reported PCR will mis-match). The platform is then considered untrustworthy (7).
- the hierarchical relationship among the modules may be exploited to reduce the number of reported elements and for latency requirements.
- An example arrangement is shown in the FIG. 14 . Such an arrangement automatically induces a natural order to the modules. Since the number of possible modules may be very high due to the OS, protocol stacks, management modules and other modules, the number of modules may be large.
- PVE or SeGW After successful secure start-up, PVE or SeGW must issue a certificate that indicates a successful start-up to the device.
- a certificate will contain the information elements such as the TrE_ID, version numbers (of the Software, Hardware) or a hash of software, and secure time stamp, location of the device, hash of modules, Clist of modules and other relevant information.
- Such a certificate may be useful for a failed start-up.
- the information may be sent back to the PVE and the PVE may authentically verify that the version number reported is correct. Since the PVE is the one who had issued the certificate, it therefore may take the appropriate steps. The difference is that the PVE is not as dependent on the device for trust as in the case where the device indicates a successful start-up status. This may only work, however, if the PVE can at least trust that any information it receives from the device regarding its failed start-up case. Therefore, the device may be designed, in this case, so that its functionality detects the state of failed start-up and to report such status to the PVE that it is still intact and non-compromisable.
- the certificate may also be useful for a successful start-up.
- the device may send the hash value of the measurements or the measurements and the last secure start-up certificate issued by the PVE or a pointer to it. In doing so, the PVE may verify if there is any malicious change.
- the certificate may also be useful in cases where a device that boots in one geographic area or operator domain, moves to a new operator domain. This happens in case of geo tracking devices. In order to verify the tracking data, one needs to know if the device has successfully booted and the data generated is genuine. Such a certificate of successful start-up may be provided with the data generated by the device. Within the certificate the location of the device when the start-up was successfully achieved may be included.
- a third party recipient of such a certificate may check the then-current location of the device (using, preferably, methods that do not depend on the device's processing of location information within itself, e.g., GPS-based methods) and see if the obtained then-current location is matched to the location included in the certificate. If there is a mismatch, the recipient of the certificate may request a new secure start-up and subsequent re-validation of the integrity of the device to either the device or the network entity that manages the re-validation of the device.
- Such a certificate that includes information on the location where the last successful start-up took place may also be of use in case of failures en route, when the destination network needs to know about the context and configuration (including the location) of the last successful start-up.
- PVM may use any form of validation.
- the three main methods are AuV, SAV and remote validation (RV).
- AuV performs all three steps locally on the device.
- RV performs the measurements locally and then reports the measurements to an external entity.
- Enforcement is carried out by the external entity.
- SAV enforces a secure start-up locally, reports metrics out to an external entity and allows for re-validation.
- a device using SAV may perform direct evaluation of trust state measurements, and establish initial network connectivity.
- the results of the evaluation, along with relevant reference metrics may be reported (hereinafter, the validation report) to an external entity, such as a security gateway (SeGW).
- a security gateway SeGW
- a subset of the measurements and reference metrics may be reported.
- the validation report may enable assessment of the trust state of the H(e)NB based upon the characteristics of the H(e)NB, such as its platform architecture, security architecture, security policies, and device certification.
- the validation report may include information on the H(e)NB, the TrE capabilities, the measurement and verification practices, the TrE's security policy manager capabilities, the measurement results, platform level certification information, last boot time, or a boot counter.
- the information on the device may include, for example, a manufacturer, a make, a model number, a version number, a hardware build or version number, or a software build or version number.
- the TrE capabilities may include, for example, measurement, verification, reporting, and enforcement capabilities.
- the measurements and internal verification practice information may include methods of performing trust state measurement and internal verification during secure start-up.
- the extent of the coverage such as names, types, and sequences, of components loaded may be included.
- Methods of verification of the components such as the number and extent of the chain of trust in the verification, may be included.
- Algorithms used for the measurements and verification such as Secure Hash Algorithm 1 (SHA-1) extension, may be included.
- the range of registers, such as platform configuration registers (PCRs), that are covered in the start-up verification may also be included.
- the TrE's Security policy manager capabilities may include information regarding the implementation and enforcement of security policies.
- the measurement results may include actual measurement values internally reported and verified, such as signed PCR values.
- the platform level certification information may include information about the H(e)NB in general, or the TrE in specific.
- the last boot time may include a secure time stamp of when the last secure boot was carried out.
- the boot counter may include the value of a counter that increments every time a power cycle occurs and a secure boot operation is carried out.
- the counter may be a protected counter that cannot be reset or reversed and always counts forward.
- the counter value may be initialized to zero when the device is first initialized.
- the validation report may be bound to the H(e)NB through a combined authentication and validation procedure by binding the information into an authentication protocol, such as the Internet Key Exchange protocol version 2 (IKEv2).
- the validation report may include a certificate.
- some of the information may be included in the certificate.
- the validation report may include a pointer or reference to a trusted third party (TTP) that provides the trust state information, and the external entity may obtain the trust state information from the TTP.
- TTP trusted third party
- the validation report may include a reference to a separate device-trust certificate that includes the trust state information.
- the external entity may deny network access.
- the external entity may also evaluate the measurements and reference metrics and may detect errors not detected or reported by the H(e)NB.
- the H(e)NB may be granted limited network access (quarantined). Otherwise, the H(e)NB may be granted network access.
- the H(e)NB may perform, evaluate, and report trust state measurements in response to a request from an external device. The request may be initiated by an operator. Revalidation may validate elements that were not validated during start up.
- the external entity may send a request to the H(e)NB to perform remedial measures if a non-core validation error is detected. For example, the H(e)NB may revert to a predetermined state in response to the remedial request.
- SAV allows for detection of a compromise through indicators even if an exploit is not detected in secure start-up.
- remediation steps may be performed on compromised devices. This is possible as long as the indicators sent to the network show that the core secure start-up is not compromised and the security properties are communicated. If the core is compromised, the device will not be able to connect to the network, due to local enforcement. A compromised device is detected either by reboot or request of re-validation. Thus, there is a higher detection probability.
- Software updates may be provided OTA, and no service technicians may be needed to replace devices.
- SAV allows fine-grained access control to CN and provides lower bandwidth usage than RV due to the use of indicators and local enforcement.
- SAV combines the benefits of AuV and RV leading to finer granularity and more visibility into device security properties and validation measurements. It provides low bandwidth usage, local device resources comparable to autonomous validation, faster and easier detection of compromised devices, and enables use of quarantine networks for compromised devices.
- FIG. 15 is an exemplary block diagram of a wireless communication network 1500 including a WTRU 1510 , a H(e)NB 1520 , and a H(e)MS 1530 .
- the WTRU 1510 , the H(e)NB 1520 and the H(e)MS 1530 are configured to perform platform validation and management.
- the WTRU 1510 includes a processor 1516 with an optional linked memory 1522 , at least one transceiver 1514 , an optional battery 1520 , and an antenna 1518 .
- the processor 1516 is configured to perform complementary platform validation and management functions with respect to those PVM functions communicated to it via a base station such as a H(e)NB 1520 .
- the transceiver 1514 is in communication with the processor 1516 and the antenna 1518 to facilitate the transmission and reception of wireless communications.
- a battery 1520 is used in the WTRU 1510 , it powers the transceiver 1514 and the processor 1516 .
- the H(e)NB 1520 includes a processor 1517 with an optional linked memory 1515 , transceivers 1519 , and antennas 1521 .
- the processor 1517 is configured to perform platform validation and management functions to implement PVM methodology.
- the transceivers 1519 are in communication with the processor 1517 and antennas 1521 to facilitate the transmission and reception of wireless communications.
- the H(e)NB 1520 is connected to the H(e)MS 1530 which includes a processor 1533 with an optional linked memory 1534 .
- the SeGW and PVE may include a processor with an optional linked memory, transceiver(s), antenna(s), and communication ports.
- the processor is configured to perform platform validation and management functions to implement PVM methodology.
- the transceivers and communication ports are in communication with the processor and antennas, as needed, to facilitate the transmission and reception of communications.
- WTRUs may be configured to with complementary PVM functionality, such as with respect to verification, validation and other trust factors, to facilitate their trustworthy access to and use of a PVM enabled network and resources.
- the respective components are all configured to employ a PVM maximal type separation of duties approach between active entities. As explained herein, this may be facilitated through the use of PVM tokens to pass certain information between various entities.
- ROM read only memory
- RAM random access memory
- register cache memory
- semiconductor memory devices magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
- Suitable processors include, by way of example, a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) circuits, any other type of integrated circuit (IC), and/or a state machine.
- DSP digital signal processor
- ASICs Application Specific Integrated Circuits
- FPGAs Field Programmable Gate Arrays
- a processor in association with software may be used to implement a radio frequency transceiver for use in a wireless device, a wireless transmit receive unit (WTRU), user equipment (UE), terminal, base station, radio network controller (RNC), or any host computer.
- the WTRU may be used in conjunction with modules, implemented in hardware and/or software, such as a camera, a video camera module, a videophone, a speakerphone, a vibration device, a speaker, a microphone, a television transceiver, a hands free headset, a keyboard, a Bluetooth® module, a frequency modulated (FM) radio unit, a liquid crystal display (LCD) display unit, an organic light-emitting diode (OLED) display unit, a digital music player, a media player, a video game player module, an Internet browser, and/or any wireless local area network (WLAN) or Ultra Wide Band (UWB) module.
- WLAN wireless local area network
- UWB Ultra Wide Band
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/718,480 US20110010543A1 (en) | 2009-03-06 | 2010-03-05 | Platform validation and management of wireless devices |
US14/699,509 US9924366B2 (en) | 2009-03-06 | 2015-04-29 | Platform validation and management of wireless devices |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15824209P | 2009-03-06 | 2009-03-06 | |
US17345709P | 2009-04-28 | 2009-04-28 | |
US22206709P | 2009-06-30 | 2009-06-30 | |
US23579309P | 2009-08-21 | 2009-08-21 | |
US12/718,480 US20110010543A1 (en) | 2009-03-06 | 2010-03-05 | Platform validation and management of wireless devices |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/699,509 Continuation US9924366B2 (en) | 2009-03-06 | 2015-04-29 | Platform validation and management of wireless devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110010543A1 true US20110010543A1 (en) | 2011-01-13 |
Family
ID=42227809
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/718,480 Abandoned US20110010543A1 (en) | 2009-03-06 | 2010-03-05 | Platform validation and management of wireless devices |
US14/699,509 Expired - Fee Related US9924366B2 (en) | 2009-03-06 | 2015-04-29 | Platform validation and management of wireless devices |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/699,509 Expired - Fee Related US9924366B2 (en) | 2009-03-06 | 2015-04-29 | Platform validation and management of wireless devices |
Country Status (9)
Country | Link |
---|---|
US (2) | US20110010543A1 (ko) |
EP (2) | EP2725836A1 (ko) |
JP (4) | JP2012520027A (ko) |
KR (4) | KR20120034755A (ko) |
CN (2) | CN102342142A (ko) |
AR (1) | AR076088A1 (ko) |
AU (1) | AU2010221174A1 (ko) |
TW (3) | TW201605257A (ko) |
WO (1) | WO2010102259A2 (ko) |
Cited By (154)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100250949A1 (en) * | 2009-03-31 | 2010-09-30 | Torino Maria E | Generation, requesting, and/or reception, at least in part, of token |
US20100274930A1 (en) * | 2009-04-28 | 2010-10-28 | Samir Thakkar | Method for generically handling carrier specific provisioning for computer cellular wireless cards |
US20100291910A1 (en) * | 2009-05-17 | 2010-11-18 | Anthony Sanding | Method and apparatus for tracking the programming of a mobile device with multiple service accounts |
US20100291898A1 (en) * | 2009-05-17 | 2010-11-18 | Anthony Sanding | Method and apparatus for programming a mobile device with multiple service accounts |
US20110041003A1 (en) * | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
US20110167153A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Policy-based exposure of presence |
US20110166943A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Policy-based advertisement engine |
US20110167479A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Enforcement of policies on context-based authorization |
US20110173643A1 (en) * | 2008-10-10 | 2011-07-14 | Nicolson Kenneth Alexander | USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM |
US20110189993A1 (en) * | 2010-02-03 | 2011-08-04 | Pantech Co., Ltd. | Apparatus and method for registering temporary subscriber of small base station in wireless communication system |
US20110197257A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | On device policy enforcement to secure open platform via network and open network |
US20110197260A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | System self integrity and health validation for policy enforcement |
US20110196728A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | Service level communication advertisement business |
US20120023564A1 (en) * | 2009-04-07 | 2012-01-26 | Telefonaktiebolaget L M Ericsson (Publ) | Attaching a sensor to a wsan |
US20120030730A1 (en) * | 2010-07-28 | 2012-02-02 | Smith Ned M | Providing a multi-phase lockstep integrity reporting mechanism |
WO2012023050A2 (en) | 2010-08-20 | 2012-02-23 | Overtis Group Limited | Secure cloud computing system and method |
US20120100832A1 (en) * | 2010-10-22 | 2012-04-26 | Quallcomm Incorporated | Authentication of access terminal identities in roaming networks |
US20120115441A1 (en) * | 2010-11-03 | 2012-05-10 | Schell Stephan V | Methods and apparatus for access data recovery from a malfunctioning device |
US8204480B1 (en) * | 2010-10-01 | 2012-06-19 | Viasat, Inc. | Method and apparatus for secured access |
US20120154849A1 (en) * | 2010-12-20 | 2012-06-21 | Konica Minolta Business Technologies, Inc. | Image forming apparatus |
US8270963B1 (en) | 2010-10-01 | 2012-09-18 | Viasat, Inc. | Cross domain notification |
US20120234914A1 (en) * | 2011-03-15 | 2012-09-20 | Affiliated Computer Services Solutions France S.A.S. | System and Method for Validating That Fares Have Been Paid |
US20120278869A1 (en) * | 2009-10-15 | 2012-11-01 | Interdigital Patent Holdings, Inc. | Registration and credential roll-out for accessing a subscription-based service |
US20120276919A1 (en) * | 2011-04-29 | 2012-11-01 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US20120314248A1 (en) * | 2011-06-09 | 2012-12-13 | Xerox Corporation | System and method for multi-site cellular manufacturing with transportation delays |
US20130091552A1 (en) * | 2011-10-06 | 2013-04-11 | Industrial Technology Research Institute | Authentication method and apparatus for user equipment and lipa network entities |
US20130091556A1 (en) * | 2010-06-21 | 2013-04-11 | Nokia Siemens Networks Oy | Method for establishing a secure and authorized connection between a smart card and a device in a network |
US8458800B1 (en) | 2010-10-01 | 2013-06-04 | Viasat, Inc. | Secure smartphone |
US8479265B2 (en) | 2008-07-02 | 2013-07-02 | Oracle International Corporation | Usage based authorization |
US8495731B1 (en) * | 2010-10-01 | 2013-07-23 | Viasat, Inc. | Multiple domain smartphone |
US20130198509A1 (en) * | 2012-01-26 | 2013-08-01 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US20130212380A1 (en) * | 2012-02-10 | 2013-08-15 | Samsung Electronics Co., Ltd. | Securely upgrading or downgrading platform components |
US20130227668A1 (en) * | 2012-02-28 | 2013-08-29 | Citrix Systems, Inc. | Secure single sign-on |
US20130337777A1 (en) * | 2012-03-28 | 2013-12-19 | Steven W. Deutsch | Conditional limited service grant based on device verification |
US20140068028A1 (en) * | 2012-08-31 | 2014-03-06 | Fujitsu Limited | Network connecting method and electronic device |
US20140130124A1 (en) * | 2012-11-08 | 2014-05-08 | Nokia Corporation | Partially Virtualizing PCR Banks In Mobile TPM |
US8756256B2 (en) | 2010-05-26 | 2014-06-17 | Qualcomm Incorporated | Method and systems for the management of non volatile items and provisioning files for a communication device with multiple service accounts |
US20140189101A1 (en) * | 2013-01-02 | 2014-07-03 | Industrial Technology Research Institute | Auto-configuration server and management method of customer premises equipments |
US20140189362A1 (en) * | 2011-08-31 | 2014-07-03 | Thomson Licensing | Method for a secured backup and restore of configuration data of an end-user device, and device using the method |
US20140192192A1 (en) * | 2011-08-05 | 2014-07-10 | Honeywell International Inc. | Systems and methods for managing video data |
US20140259134A1 (en) * | 2013-03-07 | 2014-09-11 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US20140330563A1 (en) * | 2013-05-02 | 2014-11-06 | Nice-Systems Ltd. | Seamless authentication and enrollment |
US20140351903A1 (en) * | 2011-09-13 | 2014-11-27 | Nokia Solutions And Networks Oy | Authentication mechanism |
US8938621B2 (en) | 2011-11-18 | 2015-01-20 | Qualcomm Incorporated | Computing device integrity protection |
WO2015036772A1 (en) * | 2013-09-13 | 2015-03-19 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
US20150127795A1 (en) * | 2013-11-06 | 2015-05-07 | International Business Machines Corporation | Scaling a trusted computing model in a globally distributed cloud environment |
US9038179B2 (en) | 2012-08-28 | 2015-05-19 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Secure code verification enforcement in a trusted computing device |
US20150143494A1 (en) * | 2013-10-18 | 2015-05-21 | National Taiwan University Of Science And Technology | Continuous identity authentication method for computer users |
US20150180662A1 (en) * | 2012-08-17 | 2015-06-25 | Huawei Technologies Co., Ltd. | Software key updating method and device |
US20150186676A1 (en) * | 2014-01-01 | 2015-07-02 | Mohit Arora | Real-time clock (rtc) modification detection system |
US20150199204A1 (en) * | 2014-01-10 | 2015-07-16 | International Business Machines Corporation | Controlling the Configuration of Computer Systems |
US9113499B2 (en) | 2010-10-01 | 2015-08-18 | Viasat, Inc. | Multiple domain smartphone |
US20150281219A1 (en) * | 2012-10-16 | 2015-10-01 | Nokia Technologies Oy | Attested sensor data reporting |
US9154485B1 (en) * | 2013-03-15 | 2015-10-06 | Kaazing Corporation | Authentication revalidation |
US20150373015A1 (en) * | 2014-06-18 | 2015-12-24 | Ca, Inc. | Authentication and authorization using device-based validation |
US9247429B2 (en) * | 2010-12-15 | 2016-01-26 | Vodafone Ip Licensing Limited | Key derivation |
US20160036812A1 (en) * | 2014-07-31 | 2016-02-04 | International Business Machines Corporation | Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations |
US20160088093A1 (en) * | 2014-09-24 | 2016-03-24 | V5 Systems, Inc. | Dynamic data management |
US9331890B1 (en) | 2012-10-05 | 2016-05-03 | Kaazing Corporation | Extending websocket protocol |
US20160261412A1 (en) * | 2015-03-04 | 2016-09-08 | Avaya Inc. | Two-Step Authentication And Activation of Quad Small Form Factor Pluggable (QFSP+) Transceivers |
US20160280371A1 (en) * | 2015-03-27 | 2016-09-29 | Amazon Technologies, Inc. | Unmanned vehicle rollback |
WO2016163796A1 (en) * | 2015-04-08 | 2016-10-13 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading a profile in a wireless communication system |
US20160352698A1 (en) * | 2013-12-05 | 2016-12-01 | Huawei Device Co., Ltd. | Security control method for euicc and euicc |
US9524158B2 (en) * | 2015-02-23 | 2016-12-20 | Apple Inc. | Managing firmware updates for integrated components within mobile devices |
WO2016178088A3 (en) * | 2015-05-07 | 2016-12-22 | Cyber-Ark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
US9578498B2 (en) | 2010-03-16 | 2017-02-21 | Qualcomm Incorporated | Facilitating authentication of access terminal identity |
US20170054566A1 (en) * | 2014-02-20 | 2017-02-23 | Phoenix Contact Gmbh & Co. Kg | Method and system for creating and checking the validity of device certificates |
US9596574B1 (en) * | 2012-05-29 | 2017-03-14 | West Corporation | Controlling a crowd of multiple mobile station devices |
US9635545B2 (en) | 2010-07-21 | 2017-04-25 | Sensoriant, Inc. | System and method for controlling mobile services using sensor information |
US9652320B2 (en) | 2010-11-05 | 2017-05-16 | Interdigital Patent Holdings, Inc. | Device validation, distress indication, and remediation |
US20170140760A1 (en) * | 2015-11-18 | 2017-05-18 | Uniphore Software Systems | Adaptive voice authentication system and method |
US20170148291A1 (en) * | 2015-11-20 | 2017-05-25 | Hitachi, Ltd. | Method and a system for dynamic display of surveillance feeds |
US9668128B2 (en) | 2011-03-09 | 2017-05-30 | Qualcomm Incorporated | Method for authentication of a remote station using a secure element |
US9663226B2 (en) | 2015-03-27 | 2017-05-30 | Amazon Technologies, Inc. | Influencing acceptance of messages in unmanned vehicles |
US9681254B2 (en) * | 2010-07-21 | 2017-06-13 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US9692746B2 (en) | 2013-03-07 | 2017-06-27 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US9697836B1 (en) | 2015-12-30 | 2017-07-04 | Nice Ltd. | Authentication of users of self service channels |
US9705879B2 (en) | 2014-09-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Efficient and reliable attestation |
EP3193485A1 (en) * | 2016-01-18 | 2017-07-19 | Huawei Technologies Co., Ltd. | Device, server, system and method for data attestation |
US9715707B2 (en) | 2010-07-21 | 2017-07-25 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US9722775B2 (en) * | 2015-02-27 | 2017-08-01 | Verizon Patent And Licensing Inc. | Network services via trusted execution environment |
US20170236520A1 (en) * | 2016-02-16 | 2017-08-17 | Knuedge Incorporated | Generating Models for Text-Dependent Speaker Verification |
US9780952B1 (en) * | 2014-12-12 | 2017-10-03 | Amazon Technologies, Inc. | Binding digitally signed requests to sessions |
US9826335B2 (en) | 2008-01-18 | 2017-11-21 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling machine to machine communication |
US9832697B2 (en) * | 2016-04-04 | 2017-11-28 | Verizon Patent And Licensing Inc. | Providing wireless services using multiple core networks |
US9843674B2 (en) * | 2014-09-24 | 2017-12-12 | Oracle International Corporation | Managing selection and triggering of applications on a card computing device |
US20180033438A1 (en) * | 2016-07-26 | 2018-02-01 | Samsung Electronics Co., Ltd. | Electronic device and method of operating the same |
US20180053034A1 (en) * | 2014-01-15 | 2018-02-22 | Google Llc | Finger print state integration with non-application processor functions for power savings in an electronic device |
US9912655B2 (en) | 2015-03-27 | 2018-03-06 | Amazon Technologies, Inc. | Unmanned vehicle message exchange |
US20180069825A1 (en) * | 2016-09-08 | 2018-03-08 | Thomas Purves | Checkout chassis chat platform |
US20180069707A1 (en) * | 2016-09-06 | 2018-03-08 | Trustonic Limited | Future constraints for hierarchical chain of trust |
US9924366B2 (en) | 2009-03-06 | 2018-03-20 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US9930027B2 (en) | 2015-03-27 | 2018-03-27 | Amazon Technologies, Inc. | Authenticated messages between unmanned vehicles |
US20180096260A1 (en) * | 2016-09-30 | 2018-04-05 | Mcafee, Llc | Static and dynamic device profile reputation using cloud-based machine learning |
WO2018063646A1 (en) * | 2016-09-28 | 2018-04-05 | Intel Corporation | ROOT OF TRUST (RoT) APPLICATION FOR INTERNET OF THINGS (IoT) DEVICES |
US10021100B2 (en) * | 2016-09-12 | 2018-07-10 | InfoSci, LLC | Systems and methods for device authentication |
US10033756B1 (en) * | 2017-10-26 | 2018-07-24 | Hytrust, Inc. | Methods and systems for holistically attesting the trust of heterogeneous compute resources |
US10033732B1 (en) * | 2016-11-09 | 2018-07-24 | Symantec Corporation | Systems and methods for detecting cloning of security tokens |
TWI643085B (zh) * | 2017-08-01 | 2018-12-01 | 張光輝 | 利用手機imei碼做為設備操作者的識別驗證系統 |
WO2019012320A1 (en) * | 2017-07-09 | 2019-01-17 | Alsaifi Abdullah Rashid | CERTIFICATION SYSTEM |
US20190036886A1 (en) * | 2017-07-25 | 2019-01-31 | Pacesetter, Inc. | Utilizing signed credentials for secure communication with an implantable medical device |
US10211985B1 (en) | 2015-03-30 | 2019-02-19 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10216539B2 (en) | 2014-12-11 | 2019-02-26 | Amazon Technologies, Inc. | Live updates for virtual machine monitor |
US20190065750A1 (en) * | 2017-08-24 | 2019-02-28 | International Business Machines Corporation | Securing and changing immutable data in secure bootup |
US10243739B1 (en) * | 2015-03-30 | 2019-03-26 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10250624B2 (en) * | 2016-08-05 | 2019-04-02 | Oak Tree Logic, Llc | Method and device for robust detection, analytics, and filtering of data/information exchange with connected user devices in a gateway-connected user-space |
US10268500B2 (en) | 2014-12-11 | 2019-04-23 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing a virtual offload device |
US10275322B2 (en) | 2014-12-19 | 2019-04-30 | Amazon Technologies, Inc. | Systems and methods for maintaining virtual component checkpoints on an offload device |
US10333903B1 (en) * | 2015-06-16 | 2019-06-25 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
US10360061B2 (en) | 2014-12-11 | 2019-07-23 | Amazon Technologies, Inc. | Systems and methods for loading a virtual machine monitor during a boot process |
US10375055B2 (en) * | 2016-05-31 | 2019-08-06 | Airwatch Llc | Device authentication based upon tunnel client network requests |
US10382195B2 (en) | 2015-03-30 | 2019-08-13 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10390289B2 (en) | 2014-07-11 | 2019-08-20 | Sensoriant, Inc. | Systems and methods for mediating representations allowing control of devices located in an environment having broadcasting devices |
US10395200B2 (en) * | 2016-03-17 | 2019-08-27 | Ca, Inc. | Method and apparatus for repairing policies |
US20190266331A1 (en) * | 2018-02-23 | 2019-08-29 | Infineon Technologies Ag | Security processor for an embedded system |
US10409585B2 (en) * | 2018-02-14 | 2019-09-10 | Micron Technology, Inc. | Over-the-air (OTA) update for firmware of a vehicle component |
US10409628B2 (en) | 2014-12-11 | 2019-09-10 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing an offload device |
US10445503B2 (en) | 2017-07-14 | 2019-10-15 | Google Llc | Secure persistent software updates |
US10505948B2 (en) * | 2015-11-05 | 2019-12-10 | Trilliant Networks, Inc. | Method and apparatus for secure aggregated event reporting |
KR20200028786A (ko) * | 2018-09-07 | 2020-03-17 | 삼성전자주식회사 | Ssp 단말과 서버가 디지털 인증서를 협의하는 방법 및 장치 |
US10614473B2 (en) | 2014-07-11 | 2020-04-07 | Sensoriant, Inc. | System and method for mediating representations with respect to user preferences |
US10650159B1 (en) * | 2016-02-25 | 2020-05-12 | Sprint Communications Company L.P. | Electronic device security through boot cycles |
US10660002B2 (en) | 2013-11-19 | 2020-05-19 | At&T Intellectual Property I, L.P. | System and method for differentiated system continuity when changing networks |
US10701165B2 (en) | 2015-09-23 | 2020-06-30 | Sensoriant, Inc. | Method and system for using device states and user preferences to create user-friendly environments |
US10798702B2 (en) | 2017-04-21 | 2020-10-06 | Netgear, Inc. | Periodic frames for control plane data to manage multi-band wireless networking system |
US10826681B1 (en) * | 2017-03-24 | 2020-11-03 | Open Invention Network Llc | Blockchain node initialization |
US20200402337A1 (en) * | 2018-02-12 | 2020-12-24 | The Chamberlain Group, Inc. | Movable Barrier Operator Having Updatable Security Protocol |
WO2020263381A1 (en) * | 2019-06-28 | 2020-12-30 | Zebra Technologies Corporation | Methods and apparatus to renew digital certificates |
US10911432B2 (en) | 2014-02-28 | 2021-02-02 | Siemens Aktiengesellschaft | Use of certificates using a positive list |
US10938855B1 (en) * | 2017-06-23 | 2021-03-02 | Digi International Inc. | Systems and methods for automatically and securely provisioning remote computer network infrastructure |
US10999327B2 (en) | 2017-10-26 | 2021-05-04 | Alibaba Group Holding Limited | Policy deployment method, apparatus, system and computing system of trusted server |
US11003537B2 (en) | 2018-05-29 | 2021-05-11 | Micron Technology, Inc. | Determining validity of data read from memory by a controller |
US11005845B2 (en) | 2018-10-18 | 2021-05-11 | International Business Machines Corporation, Armonk, Ny | Network device validation and management |
US11113403B2 (en) * | 2019-04-09 | 2021-09-07 | Cisco Technology, Inc. | Split chain of trust for secure device boot |
US20210286868A1 (en) * | 2009-06-03 | 2021-09-16 | James F. Kragh | Method For Providing An Authenticated Digital Identity |
US11190357B2 (en) * | 2018-05-18 | 2021-11-30 | Avive Solutions, Inc. | Framework for ensuring software components are not corrupted |
US11232209B2 (en) * | 2019-01-18 | 2022-01-25 | International Business Machines Corporation | Trojan detection in cryptographic hardware adapters |
US20220029994A1 (en) * | 2018-12-06 | 2022-01-27 | Convida Wireless, Llc | Security lifecycle management of devices in a communications network |
US20220140732A1 (en) * | 2019-07-23 | 2022-05-05 | Hewlett-Packard Development Company, L.P. | Controlling buck-boost converters based on power supply identification signals |
US20220166636A1 (en) * | 2019-03-14 | 2022-05-26 | Omron Corporation | Control device and control system |
US11424921B2 (en) | 2015-11-09 | 2022-08-23 | Dealerware, Llc | Vehicle access systems and methods |
US11429457B2 (en) | 2019-09-26 | 2022-08-30 | Dell Products L.P. | System and method to securely exchange system diagnostics information between firmware, operating system and payload |
US11463439B2 (en) | 2017-04-21 | 2022-10-04 | Qwerx Inc. | Systems and methods for device authentication and protection of communication on a system on chip |
US11516256B2 (en) * | 2020-05-20 | 2022-11-29 | Dell Products L.P. | Certificate authorization policy for security protocol and data model capable devices |
US20220407714A1 (en) * | 2021-06-18 | 2022-12-22 | Dell Products L.P. | System and method of authenticating updated firmware of an information handling system |
US11558743B2 (en) * | 2018-09-05 | 2023-01-17 | Whitefox Defense Technologies, Inc. | Integrated secure device manager systems and methods for cyber-physical vehicles |
US20230014494A1 (en) * | 2020-03-27 | 2023-01-19 | Huawei Technologies Co., Ltd. | Communication method, apparatus, and system |
US20230026710A1 (en) * | 2019-09-09 | 2023-01-26 | Huawei Technologies Co., Ltd. | Base Station Switching Method and Apparatus |
US20230030816A1 (en) * | 2021-07-30 | 2023-02-02 | Red Hat, Inc. | Security broker for consumers of tee-protected services |
US20230048368A1 (en) * | 2021-08-16 | 2023-02-16 | Toyota Motor North America, Inc. | Transport onboard security check |
US11599522B2 (en) * | 2019-10-29 | 2023-03-07 | EMC IP Holding Company LLC | Hardware trust boundaries and graphs in a data confidence fabric |
US11765604B2 (en) | 2021-12-16 | 2023-09-19 | T-Mobile Usa, Inc. | Providing configuration updates to wireless telecommunication networks |
US11882176B2 (en) * | 2019-04-05 | 2024-01-23 | Cisco Technology, Inc. | Attestation-based scheme for validating peering setups for critical infrastructure protocols |
US12127016B2 (en) | 2023-05-31 | 2024-10-22 | T-Mobile Usa, Inc. | Providing configuration updates to wireless telecommunication networks |
Families Citing this family (153)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101752625B1 (ko) * | 2009-11-25 | 2017-06-29 | 인터디지탈 패튼 홀딩스, 인크 | 머신 타입 통신 사전 등록 |
EP2633450A4 (en) * | 2010-10-27 | 2017-10-11 | Hewlett-Packard Enterprise Development LP | Systems and methods for scheduling changes |
US8924715B2 (en) * | 2010-10-28 | 2014-12-30 | Stephan V. Schell | Methods and apparatus for storage and execution of access control clients |
CN102034041A (zh) * | 2010-12-07 | 2011-04-27 | 华为终端有限公司 | 一种验证绑定数据卡和移动主机的方法、装置及系统 |
US9379937B2 (en) * | 2012-02-23 | 2016-06-28 | International Business Machines Corporation | Policy-based resource management with target-driven remediation on server |
US11871901B2 (en) | 2012-05-20 | 2024-01-16 | Cilag Gmbh International | Method for situational awareness for surgical network or surgical network connected device capable of adjusting function based on a sensed situation or usage |
US8972715B2 (en) * | 2012-07-13 | 2015-03-03 | Securerf Corporation | Cryptographic hash function |
CN102891847B (zh) * | 2012-09-24 | 2016-08-03 | 汉柏科技有限公司 | 一种防止ike破解的方法 |
US20140228976A1 (en) * | 2013-02-12 | 2014-08-14 | Nagaraja K. S. | Method for user management and a power plant control system thereof for a power plant system |
US10033723B2 (en) | 2013-12-18 | 2018-07-24 | At&T Intellectual Property I, L.P. | Methods, devices, and computer readable storage devices for authenticating devices having non-SIM based clients |
WO2015122020A1 (ja) | 2014-02-17 | 2015-08-20 | 富士通株式会社 | 受信装置及び受信方法 |
US9542558B2 (en) * | 2014-03-12 | 2017-01-10 | Apple Inc. | Secure factory data generation and restoration |
US10019564B2 (en) | 2014-03-28 | 2018-07-10 | Cryptography Research, Inc. | Authentication of a device |
US11504192B2 (en) | 2014-10-30 | 2022-11-22 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US10019604B2 (en) | 2014-10-31 | 2018-07-10 | Xiaomi Inc. | Method and apparatus of verifying terminal and medium |
CN104484593B (zh) * | 2014-10-31 | 2017-10-20 | 小米科技有限责任公司 | 终端验证方法及装置 |
US10803175B2 (en) | 2015-03-06 | 2020-10-13 | Microsoft Technology Licensing, Llc | Device attestation through security hardened management agent |
US9615258B2 (en) * | 2015-05-21 | 2017-04-04 | Nokia Solutions And Networks Oy | Method and apparatus for securing timing packets over untrusted packet transport network |
US9798887B2 (en) * | 2015-08-26 | 2017-10-24 | Qualcomm Incorporated | Computing device to securely activate or revoke a key |
KR102446384B1 (ko) * | 2015-09-18 | 2022-09-22 | 삼성전자주식회사 | 사용자 단말 및 서버 장치 |
US10003463B2 (en) * | 2015-10-16 | 2018-06-19 | Dell Products L.P. | Systems and methods for revoking and replacing signing keys |
US10091190B2 (en) * | 2015-12-11 | 2018-10-02 | International Business Machines Corporation | Server-assisted authentication |
US10346147B2 (en) * | 2015-12-22 | 2019-07-09 | Samsung Electronics Co., Ltd. | Method and apparatus for providing a profile |
KR102545897B1 (ko) * | 2015-12-22 | 2023-06-22 | 삼성전자 주식회사 | 프로파일 제공 방법 및 장치 |
CN109416718B (zh) * | 2015-12-24 | 2023-05-12 | 英特尔公司 | 云数据中心中应用容器的可信部署 |
CN106560832A (zh) * | 2015-12-31 | 2017-04-12 | 哈尔滨安天科技股份有限公司 | 一种拦截Linux内核恶意进程提权的方法及系统 |
WO2017177035A1 (en) * | 2016-04-07 | 2017-10-12 | IDfusion, LLC | Identity based behavior measurement architecture |
US20190087576A1 (en) * | 2016-04-14 | 2019-03-21 | Rhombus Systems Group, Inc. | System for verification of integrity of unmanned aerial vehicles |
KR20180002349A (ko) * | 2016-06-29 | 2018-01-08 | 에스프린팅솔루션 주식회사 | 화상 형성 장치에서 실행 파일의 위변조를 검증하는 방법 및 이를 이용하는 화상 형성 장치 |
CN107634895B (zh) * | 2016-07-19 | 2020-09-22 | 上海诺基亚贝尔股份有限公司 | 用于基于文件或单个消息的批量操作处理方法和设备 |
US10911946B2 (en) * | 2017-01-04 | 2021-02-02 | Getraline | Local unit for monitoring the maintenance of an item of equipment and method for the validation of a task on the item of equipment |
JP6484270B2 (ja) * | 2017-03-14 | 2019-03-13 | アンリツ株式会社 | 測定装置及び測定方法 |
US10674358B2 (en) | 2017-04-10 | 2020-06-02 | Qualcomm Incorporated | Representing unique device identifiers in hierarchical device certificates as fully qualified domain names (FQDN) |
JP6911920B2 (ja) | 2017-07-12 | 2021-07-28 | 日本電気株式会社 | 真正性検証システム、真正性検証方法および真正性検証プログラム |
US11026687B2 (en) | 2017-10-30 | 2021-06-08 | Cilag Gmbh International | Clip applier comprising clip advancing systems |
US11911045B2 (en) | 2017-10-30 | 2024-02-27 | Cllag GmbH International | Method for operating a powered articulating multi-clip applier |
US11291510B2 (en) | 2017-10-30 | 2022-04-05 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11317919B2 (en) | 2017-10-30 | 2022-05-03 | Cilag Gmbh International | Clip applier comprising a clip crimping system |
US11311342B2 (en) | 2017-10-30 | 2022-04-26 | Cilag Gmbh International | Method for communicating with surgical instrument systems |
US11510741B2 (en) | 2017-10-30 | 2022-11-29 | Cilag Gmbh International | Method for producing a surgical instrument comprising a smart electrical system |
US11564756B2 (en) | 2017-10-30 | 2023-01-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US10959744B2 (en) | 2017-10-30 | 2021-03-30 | Ethicon Llc | Surgical dissectors and manufacturing techniques |
US11801098B2 (en) | 2017-10-30 | 2023-10-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
EP3495979A1 (de) * | 2017-12-08 | 2019-06-12 | Siemens Aktiengesellschaft | Verfahren und bestätigungsvorrichtung zur integritätsbestätigung eines systems |
US11423007B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Adjustment of device control programs based on stratified contextual data in addition to the data |
US11424027B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Method for operating surgical instrument systems |
US11659023B2 (en) | 2017-12-28 | 2023-05-23 | Cilag Gmbh International | Method of hub communication |
US11896443B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Control of a surgical system through a surgical barrier |
US11818052B2 (en) | 2017-12-28 | 2023-11-14 | Cilag Gmbh International | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11571234B2 (en) | 2017-12-28 | 2023-02-07 | Cilag Gmbh International | Temperature control of ultrasonic end effector and control system therefor |
US11076921B2 (en) | 2017-12-28 | 2021-08-03 | Cilag Gmbh International | Adaptive control program updates for surgical hubs |
US11559307B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method of robotic hub communication, detection, and control |
US10892995B2 (en) | 2017-12-28 | 2021-01-12 | Ethicon Llc | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11464559B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Estimating state of ultrasonic end effector and control system therefor |
US11633237B2 (en) | 2017-12-28 | 2023-04-25 | Cilag Gmbh International | Usage and technique analysis of surgeon / staff performance against a baseline to optimize device utilization and performance for both current and future procedures |
US11389164B2 (en) | 2017-12-28 | 2022-07-19 | Cilag Gmbh International | Method of using reinforced flexible circuits with multiple sensors to optimize performance of radio frequency devices |
US11559308B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method for smart energy device infrastructure |
US11602393B2 (en) | 2017-12-28 | 2023-03-14 | Cilag Gmbh International | Surgical evacuation sensing and generator control |
US11432885B2 (en) | 2017-12-28 | 2022-09-06 | Cilag Gmbh International | Sensing arrangements for robot-assisted surgical platforms |
US11937769B2 (en) | 2017-12-28 | 2024-03-26 | Cilag Gmbh International | Method of hub communication, processing, storage and display |
US11166772B2 (en) | 2017-12-28 | 2021-11-09 | Cilag Gmbh International | Surgical hub coordination of control and communication of operating room devices |
US11202570B2 (en) | 2017-12-28 | 2021-12-21 | Cilag Gmbh International | Communication hub and storage device for storing parameters and status of a surgical device to be shared with cloud based analytics systems |
US20190201146A1 (en) | 2017-12-28 | 2019-07-04 | Ethicon Llc | Safety systems for smart powered surgical stapling |
US20190206569A1 (en) | 2017-12-28 | 2019-07-04 | Ethicon Llc | Method of cloud based data analytics for use with the hub |
US20190201039A1 (en) | 2017-12-28 | 2019-07-04 | Ethicon Llc | Situational awareness of electrosurgical systems |
US11410259B2 (en) | 2017-12-28 | 2022-08-09 | Cilag Gmbh International | Adaptive control program updates for surgical devices |
US11132462B2 (en) | 2017-12-28 | 2021-09-28 | Cilag Gmbh International | Data stripping method to interrogate patient records and create anonymized record |
US12062442B2 (en) | 2017-12-28 | 2024-08-13 | Cilag Gmbh International | Method for operating surgical instrument systems |
US11317937B2 (en) | 2018-03-08 | 2022-05-03 | Cilag Gmbh International | Determining the state of an ultrasonic end effector |
US11666331B2 (en) | 2017-12-28 | 2023-06-06 | Cilag Gmbh International | Systems for detecting proximity of surgical end effector to cancerous tissue |
US11844579B2 (en) | 2017-12-28 | 2023-12-19 | Cilag Gmbh International | Adjustments based on airborne particle properties |
US11896322B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Sensing the patient position and contact utilizing the mono-polar return pad electrode to provide situational awareness to the hub |
US11612408B2 (en) | 2017-12-28 | 2023-03-28 | Cilag Gmbh International | Determining tissue composition via an ultrasonic system |
US11446052B2 (en) | 2017-12-28 | 2022-09-20 | Cilag Gmbh International | Variation of radio frequency and ultrasonic power level in cooperation with varying clamp arm pressure to achieve predefined heat flux or power applied to tissue |
US11540855B2 (en) | 2017-12-28 | 2023-01-03 | Cilag Gmbh International | Controlling activation of an ultrasonic surgical instrument according to the presence of tissue |
US11672605B2 (en) | 2017-12-28 | 2023-06-13 | Cilag Gmbh International | Sterile field interactive control displays |
US11419630B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Surgical system distributed processing |
US11589888B2 (en) | 2017-12-28 | 2023-02-28 | Cilag Gmbh International | Method for controlling smart energy devices |
US11786251B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Method for adaptive control schemes for surgical network control and interaction |
US11903601B2 (en) | 2017-12-28 | 2024-02-20 | Cilag Gmbh International | Surgical instrument comprising a plurality of drive systems |
US11291495B2 (en) | 2017-12-28 | 2022-04-05 | Cilag Gmbh International | Interruption of energy due to inadvertent capacitive coupling |
US11744604B2 (en) | 2017-12-28 | 2023-09-05 | Cilag Gmbh International | Surgical instrument with a hardware-only control circuit |
US11464535B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Detection of end effector emersion in liquid |
US11832840B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical instrument having a flexible circuit |
US11969142B2 (en) | 2017-12-28 | 2024-04-30 | Cilag Gmbh International | Method of compressing tissue within a stapling device and simultaneously displaying the location of the tissue within the jaws |
US20190201139A1 (en) | 2017-12-28 | 2019-07-04 | Ethicon Llc | Communication arrangements for robot-assisted surgical platforms |
US11786245B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Surgical systems with prioritized data transmission capabilities |
US11998193B2 (en) | 2017-12-28 | 2024-06-04 | Cilag Gmbh International | Method for usage of the shroud as an aspect of sensing or controlling a powered surgical device, and a control algorithm to adjust its default operation |
US11266468B2 (en) | 2017-12-28 | 2022-03-08 | Cilag Gmbh International | Cooperative utilization of data derived from secondary sources by intelligent surgical hubs |
US11864728B2 (en) | 2017-12-28 | 2024-01-09 | Cilag Gmbh International | Characterization of tissue irregularities through the use of mono-chromatic light refractivity |
US11857152B2 (en) | 2017-12-28 | 2024-01-02 | Cilag Gmbh International | Surgical hub spatial awareness to determine devices in operating theater |
US11376002B2 (en) | 2017-12-28 | 2022-07-05 | Cilag Gmbh International | Surgical instrument cartridge sensor assemblies |
US11419667B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Ultrasonic energy device which varies pressure applied by clamp arm to provide threshold control pressure at a cut progression location |
US11311306B2 (en) | 2017-12-28 | 2022-04-26 | Cilag Gmbh International | Surgical systems for detecting end effector tissue distribution irregularities |
US11529187B2 (en) | 2017-12-28 | 2022-12-20 | Cilag Gmbh International | Surgical evacuation sensor arrangements |
US11832899B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical systems with autonomously adjustable control programs |
US11364075B2 (en) | 2017-12-28 | 2022-06-21 | Cilag Gmbh International | Radio frequency energy device for delivering combined electrical signals |
US11308075B2 (en) * | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical network, instrument, and cloud responses based on validation of received dataset and authentication of its source and integrity |
US10758310B2 (en) | 2017-12-28 | 2020-09-01 | Ethicon Llc | Wireless pairing of a surgical device with another device within a sterile surgical field based on the usage and situational awareness of devices |
US11324557B2 (en) | 2017-12-28 | 2022-05-10 | Cilag Gmbh International | Surgical instrument with a sensing array |
US11969216B2 (en) | 2017-12-28 | 2024-04-30 | Cilag Gmbh International | Surgical network recommendations from real time analysis of procedure variables against a baseline highlighting differences from the optimal solution |
US11678881B2 (en) | 2017-12-28 | 2023-06-20 | Cilag Gmbh International | Spatial awareness of surgical hubs in operating rooms |
US11257589B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Real-time analysis of comprehensive cost of all instrumentation used in surgery utilizing data fluidity to track instruments through stocking and in-house processes |
US11109866B2 (en) | 2017-12-28 | 2021-09-07 | Cilag Gmbh International | Method for circular stapler control algorithm adjustment based on situational awareness |
US12096916B2 (en) | 2017-12-28 | 2024-09-24 | Cilag Gmbh International | Method of sensing particulate from smoke evacuated from a patient, adjusting the pump speed based on the sensed information, and communicating the functional parameters of the system to the hub |
US11304745B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical evacuation sensing and display |
US11576677B2 (en) | 2017-12-28 | 2023-02-14 | Cilag Gmbh International | Method of hub communication, processing, display, and cloud analytics |
US11253315B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Increasing radio frequency to create pad-less monopolar loop |
KR102485368B1 (ko) | 2018-01-15 | 2023-01-05 | 삼성전자주식회사 | 전자 장치, 그 제어 방법 및 컴퓨터 판독가능 기록 매체 |
US11683685B2 (en) | 2018-02-09 | 2023-06-20 | Intel Corporation | Trusted IoT device configuration and onboarding |
CN110213778B (zh) * | 2018-02-28 | 2021-11-05 | 中兴通讯股份有限公司 | 一种网元主备智能配对的方法及装置 |
US11337746B2 (en) | 2018-03-08 | 2022-05-24 | Cilag Gmbh International | Smart blade and power pulsing |
US11259830B2 (en) | 2018-03-08 | 2022-03-01 | Cilag Gmbh International | Methods for controlling temperature in ultrasonic device |
US11399858B2 (en) | 2018-03-08 | 2022-08-02 | Cilag Gmbh International | Application of smart blade technology |
US11259806B2 (en) | 2018-03-28 | 2022-03-01 | Cilag Gmbh International | Surgical stapling devices with features for blocking advancement of a camming assembly of an incompatible cartridge installed therein |
US11090047B2 (en) | 2018-03-28 | 2021-08-17 | Cilag Gmbh International | Surgical instrument comprising an adaptive control system |
US11471156B2 (en) | 2018-03-28 | 2022-10-18 | Cilag Gmbh International | Surgical stapling devices with improved rotary driven closure systems |
US11197668B2 (en) | 2018-03-28 | 2021-12-14 | Cilag Gmbh International | Surgical stapling assembly comprising a lockout and an exterior access orifice to permit artificial unlocking of the lockout |
US11278280B2 (en) | 2018-03-28 | 2022-03-22 | Cilag Gmbh International | Surgical instrument comprising a jaw closure lockout |
EP3561709B1 (en) * | 2018-04-25 | 2020-07-29 | Siemens Aktiengesellschaft | Data processing apparatus, system, and method for proving or checking the security of a data processing apparatus |
CN108683492B (zh) * | 2018-04-28 | 2021-09-03 | 全球能源互联网研究院有限公司 | 一种可信无线传感器及控制方法 |
JP6997378B2 (ja) * | 2018-10-26 | 2022-01-17 | 日本電信電話株式会社 | 推定方法、推定装置及び推定プログラム |
US11068598B2 (en) * | 2018-11-01 | 2021-07-20 | Dell Products L.P. | Chassis internal device security |
CN111125648B (zh) * | 2018-11-01 | 2022-03-29 | 大唐移动通信设备有限公司 | 一种设备变更方法和装置 |
EP3657760A1 (en) * | 2018-11-23 | 2020-05-27 | Nagravision SA | Method of managing network access of a device and device |
US10915632B2 (en) * | 2018-11-27 | 2021-02-09 | International Business Machines Corporation | Handling of remote attestation and sealing during concurrent update |
US11356425B2 (en) * | 2018-11-30 | 2022-06-07 | Paccar Inc | Techniques for improving security of encrypted vehicle software updates |
US11369377B2 (en) | 2019-02-19 | 2022-06-28 | Cilag Gmbh International | Surgical stapling assembly with cartridge based retainer configured to unlock a firing lockout |
US11357503B2 (en) | 2019-02-19 | 2022-06-14 | Cilag Gmbh International | Staple cartridge retainers with frangible retention features and methods of using same |
US11298129B2 (en) | 2019-02-19 | 2022-04-12 | Cilag Gmbh International | Method for providing an authentication lockout in a surgical stapler with a replaceable cartridge |
US11751872B2 (en) | 2019-02-19 | 2023-09-12 | Cilag Gmbh International | Insertable deactivator element for surgical stapler lockouts |
US11317915B2 (en) | 2019-02-19 | 2022-05-03 | Cilag Gmbh International | Universal cartridge based key feature that unlocks multiple lockout arrangements in different surgical staplers |
CN111858114B (zh) * | 2019-04-30 | 2024-06-14 | 阿里巴巴集团控股有限公司 | 设备启动异常处理,设备启动控制方法、装置及系统 |
CN112134692B (zh) * | 2019-06-24 | 2022-02-15 | 华为技术有限公司 | 一种远程证明方式的协商方法及装置 |
USD964564S1 (en) | 2019-06-25 | 2022-09-20 | Cilag Gmbh International | Surgical staple cartridge retainer with a closure system authentication key |
USD950728S1 (en) | 2019-06-25 | 2022-05-03 | Cilag Gmbh International | Surgical staple cartridge |
USD952144S1 (en) | 2019-06-25 | 2022-05-17 | Cilag Gmbh International | Surgical staple cartridge retainer with firing system authentication key |
US10846383B2 (en) | 2019-07-01 | 2020-11-24 | Advanced New Technologies Co., Ltd. | Applet-based account security protection method and system |
US20220342992A1 (en) * | 2019-10-28 | 2022-10-27 | Hewlett-Packard Development Company, L.P. | Authorising component updates |
US11334655B2 (en) | 2019-11-19 | 2022-05-17 | Micron Technology, Inc. | Authenticating a device using a remote host |
US11184160B2 (en) * | 2020-02-26 | 2021-11-23 | International Business Machines Corporation | Channel key loading in a computing environment |
US11533320B2 (en) | 2020-03-04 | 2022-12-20 | Pulse Secure, Llc | Optimize compliance evaluation of endpoints |
EP3929785B1 (en) * | 2020-06-24 | 2022-05-04 | Axis AB | Remote resetting to factory default settings; a method and a device |
US20230292131A1 (en) * | 2020-07-24 | 2023-09-14 | Nokia Technologies Oy | Rogue network function re-authorization in a communication network |
US20230289478A1 (en) * | 2020-08-28 | 2023-09-14 | Hewlett-Packard Development Company, L.P. | Generating signed measurements |
WO2022096139A1 (en) * | 2020-11-09 | 2022-05-12 | Advantest Corporation | A method for determining whether a measurement system is used in a valid state, a method to support a determination whether a measurement system is used in a valid state, a measurement system configured to perform these methods and a computer program for performing these methods |
US20220255928A1 (en) * | 2021-02-05 | 2022-08-11 | Dish Wireless L.L.C. | Systems and methods for device location verification |
US11722492B1 (en) * | 2021-04-08 | 2023-08-08 | T-Mobile Innovations Llc | System and method for dynamically neutralizing malicious ones of communicating electronic devices |
US12074983B2 (en) * | 2021-11-09 | 2024-08-27 | Samsung Electronics Co., Ltd. | Trusted computing device and operating method thereof |
US20230230101A1 (en) * | 2022-01-19 | 2023-07-20 | Dell Products L.P. | Method for validating a product portfolio |
US20230308439A1 (en) * | 2022-03-22 | 2023-09-28 | Cisco Technology, Inc. | Distributed hierarchical authentication of system component identities |
WO2023217383A1 (en) * | 2022-05-13 | 2023-11-16 | Huawei Technologies Co., Ltd. | Apparatus and method for efficient secure channel re-attestation without server-side state |
AT526697A2 (de) * | 2022-11-07 | 2024-05-15 | Track Machines Connected Ges M B H | Verfahren zur Bewertung eines Betriebszustandes einer Maschine zur Instandhaltung einer Eisenbahnstrecke |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050132358A1 (en) * | 2001-12-05 | 2005-06-16 | Microsoft Corporation | Installing software on a mobile computing device using the rollback and security features of a configuration manager |
US20060074600A1 (en) * | 2004-09-15 | 2006-04-06 | Sastry Manoj R | Method for providing integrity measurements with their respective time stamps |
US20080076425A1 (en) * | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for resource management |
US20080301784A1 (en) * | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Native Use Of Web Service Protocols And Claims In Server Authentication |
US7653819B2 (en) * | 2004-10-01 | 2010-01-26 | Lenovo Singapore Pte Ltd. | Scalable paging of platform configuration registers |
US7711960B2 (en) * | 2006-08-29 | 2010-05-04 | Intel Corporation | Mechanisms to control access to cryptographic keys and to attest to the approved configurations of computer platforms |
US7752465B2 (en) * | 2004-04-09 | 2010-07-06 | International Business Machines Corporation | Reliability platform configuration measurement, authentication, attestation and disclosure |
US7853804B2 (en) * | 2007-09-10 | 2010-12-14 | Lenovo (Singapore) Pte. Ltd. | System and method for secure data disposal |
US20110041003A1 (en) * | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
US7930733B1 (en) * | 2006-04-10 | 2011-04-19 | At&T Intellectual Property Ii, L.P. | Method and system for execution monitor-based trusted computing |
US8108668B2 (en) * | 2006-06-26 | 2012-01-31 | Intel Corporation | Associating a multi-context trusted platform module with distributed platforms |
Family Cites Families (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8347086B2 (en) | 2000-12-18 | 2013-01-01 | Citibank, N.A. | System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium |
US6731932B1 (en) | 1999-08-24 | 2004-05-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and systems for handling subscriber data |
US6779120B1 (en) * | 2000-01-07 | 2004-08-17 | Securify, Inc. | Declarative language for specifying a security policy |
US7076797B2 (en) | 2001-10-05 | 2006-07-11 | Microsoft Corporation | Granular authorization for network user sessions |
FI114276B (fi) | 2002-01-11 | 2004-09-15 | Nokia Corp | Verkkovierailun järjestäminen |
US7240830B2 (en) | 2002-02-15 | 2007-07-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Layered SIM card and security function |
GB0211644D0 (en) | 2002-05-21 | 2002-07-03 | Wesby Philip B | System and method for remote asset management |
DE10223248A1 (de) | 2002-05-22 | 2003-12-04 | Siemens Ag | Verfahren zum Registrieren eines Kommunikationsendgeräts |
FI117586B (fi) | 2002-08-02 | 2006-11-30 | Nokia Corp | Menetelmä SIM-toiminteen järjestämiseksi digitaaliseen langattomaan päätelaitteeseen sekä vastaava päätelaite ja palvelin |
JP4041492B2 (ja) * | 2002-08-22 | 2008-01-30 | 株式会社エヌ・ティ・ティ・ドコモ | アドホックネットワークにおけるネットワークノード群の再設定 |
KR20050100603A (ko) | 2002-12-31 | 2005-10-19 | 모토로라 인코포레이티드 | 통신 디바이스를 위한 오버 더 에어 프로비저닝의 분산된인증 및 전개를 위한 시스템 및 방법 |
US7634807B2 (en) | 2003-08-08 | 2009-12-15 | Nokia Corporation | System and method to establish and maintain conditional trust by stating signal of distrust |
DE60306931T2 (de) | 2003-09-16 | 2007-03-01 | Research In Motion Ltd., Waterloo | Aktualisierungsbereitsstellung auf Bedarfsbasis für eine mobile Kommunikationsvorrichtung |
US7539156B2 (en) | 2003-10-17 | 2009-05-26 | Qualcomm Incorporated | Method and apparatus for provisioning and activation of an embedded module in an access terminal of a wireless communication system |
EP1533695B1 (en) | 2003-11-19 | 2013-08-07 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | Updating data in a mobile terminal |
KR100554172B1 (ko) * | 2003-11-27 | 2006-02-22 | 한국전자통신연구원 | 네트워크 보안성을 강화한 무결성 관리 시스템, 이를구비한 무결성 네트워크 시스템 및 그 방법 |
US20050138355A1 (en) | 2003-12-19 | 2005-06-23 | Lidong Chen | System, method and devices for authentication in a wireless local area network (WLAN) |
US7350072B2 (en) | 2004-03-30 | 2008-03-25 | Intel Corporation | Remote management and provisioning of a system across a network based connection |
US7558966B2 (en) | 2004-06-09 | 2009-07-07 | Intel Corporation | Notifying remote administrator of platform integrity determination |
WO2005125261A1 (en) | 2004-06-17 | 2005-12-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Security in a mobile communications system |
US7747862B2 (en) | 2004-06-28 | 2010-06-29 | Intel Corporation | Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks |
CA2577142A1 (en) | 2004-08-20 | 2006-02-23 | Telefonaktiebolaget L M Ericsson (Publ) | Fast network attachment |
US8266676B2 (en) | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
US7818585B2 (en) | 2004-12-22 | 2010-10-19 | Sap Aktiengesellschaft | Secure license management |
US7725703B2 (en) | 2005-01-07 | 2010-05-25 | Microsoft Corporation | Systems and methods for securely booting a computer with a trusted processing module |
US8555345B2 (en) | 2005-01-28 | 2013-10-08 | Telefonaktiebolaget Lm Ericsson (Publ) | User authentication and authorisation in a communications system |
JP4293155B2 (ja) * | 2005-03-31 | 2009-07-08 | サクサ株式会社 | コードレス電話機 |
US7907531B2 (en) | 2005-06-13 | 2011-03-15 | Qualcomm Incorporated | Apparatus and methods for managing firmware verification on a wireless device |
US7707480B2 (en) | 2005-07-01 | 2010-04-27 | Qnx Software Systems Gmbh & Co. Kg | System employing data verification operations of differing computational costs |
US7809777B2 (en) | 2005-07-01 | 2010-10-05 | Qnx Software Systems Gmbh & Co. Kg | File system having deferred verification of data integrity |
US20070050678A1 (en) | 2005-08-25 | 2007-03-01 | Motorola, Inc. | Apparatus for self-diagnosis and treatment of critical software flaws |
JP4093494B2 (ja) | 2005-09-08 | 2008-06-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 秘密情報へのアクセスを制御するシステムおよびその方法 |
CN1933651B (zh) | 2005-09-12 | 2010-05-12 | 北京三星通信技术研究有限公司 | Lte系统中的会话接入方法 |
JP4708143B2 (ja) | 2005-09-30 | 2011-06-22 | シスメックス株式会社 | 自動顕微鏡及びこれを備える分析装置 |
GB0520254D0 (en) | 2005-10-05 | 2005-11-16 | Vodafone Plc | Telecommunications networks |
US7580701B2 (en) | 2005-12-27 | 2009-08-25 | Intel Corporation | Dynamic passing of wireless configuration parameters |
JP2007184938A (ja) | 2006-01-04 | 2007-07-19 | Asustek Computer Inc | 無線通信システムにおけるユーザー端の完全性保護設定方法及び装置 |
US8413209B2 (en) * | 2006-03-27 | 2013-04-02 | Telecom Italia S.P.A. | System for enforcing security policies on mobile communications devices |
US20070239748A1 (en) | 2006-03-29 | 2007-10-11 | Smith Ned M | Management of reference data for platform verification |
KR101055712B1 (ko) | 2006-06-30 | 2011-08-11 | 인터내셔널 비지네스 머신즈 코포레이션 | 모바일 장치에서의 메시지 핸들링 |
US7827397B2 (en) | 2006-07-13 | 2010-11-02 | Aristocrat Technologies Australia Pty, Ltd. | Gaming machine having a secure boot chain and method of use |
US7617423B2 (en) | 2006-08-14 | 2009-11-10 | Kyocera Corporation | System and method for detecting, reporting, and repairing of software defects for a wireless device |
KR20080023841A (ko) | 2006-09-12 | 2008-03-17 | 카시와야마 토요히테 | 펌웨어 업그레이드와 손상된 펌웨어 자동 복구 시스템 및방법 |
US20080076419A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for discovery |
US20080101400A1 (en) | 2006-10-30 | 2008-05-01 | Nokia Corporation | Managing attachment of a wireless terminal to local area networks |
US7683630B2 (en) | 2006-11-30 | 2010-03-23 | Electro Scientific Industries, Inc. | Self test, monitoring, and diagnostics in grouped circuitry modules |
KR101368327B1 (ko) | 2006-12-22 | 2014-02-26 | 삼성전자주식회사 | 프로그램 실행흐름 보고 시스템 및 방법 |
TWI599259B (zh) * | 2006-12-27 | 2017-09-11 | 無線創新信號信託公司 | 基地台自行配置方法及裝置 |
US20080163212A1 (en) | 2006-12-29 | 2008-07-03 | Zimmer Vincent J | Paralleled management mode integrity checks |
WO2008110996A1 (en) | 2007-03-12 | 2008-09-18 | Nokia Corporation | Apparatus, method and computer program product providing auxillary handover command |
EP1983771B1 (en) * | 2007-04-17 | 2011-04-06 | Alcatel Lucent | A method for interfacing a Femto-Cell equipment with a mobile core network |
US8064597B2 (en) | 2007-04-20 | 2011-11-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for mobile device credentialing |
CN100583768C (zh) * | 2007-04-27 | 2010-01-20 | 中国科学院软件研究所 | 基于安全需求的远程证明方法及其系统 |
US8365018B2 (en) | 2007-06-19 | 2013-01-29 | Sand Holdings, Llc | Systems, devices, agents and methods for monitoring and automatic reboot and restoration of computers, local area networks, wireless access points, modems and other hardware |
US20090149200A1 (en) | 2007-12-10 | 2009-06-11 | Symbol Technologies, Inc. | System and method for device or system location optimization |
US8200736B2 (en) | 2007-12-24 | 2012-06-12 | Qualcomm Incorporated | Virtual SIM card for mobile handsets |
EP3346669A1 (en) | 2008-01-18 | 2018-07-11 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling machine to machine communication |
US8300829B2 (en) | 2008-06-23 | 2012-10-30 | Nokia Corporation | Verification key handling |
KR20120034755A (ko) | 2009-03-06 | 2012-04-12 | 인터디지탈 패튼 홀딩스, 인크 | 무선 장치들의 플랫폼 입증 및 관리 |
EP2288195B1 (en) | 2009-08-20 | 2019-10-23 | Samsung Electronics Co., Ltd. | Method and apparatus for operating a base station in a wireless communication system |
TW201741925A (zh) | 2010-04-12 | 2017-12-01 | 內數位專利控股公司 | 啟洞程序中階段控制釋放 |
EP2635991B1 (en) | 2010-11-05 | 2015-09-16 | InterDigital Patent Holdings, Inc. | Device validation, distress indication, and remediation |
-
2010
- 2010-03-05 KR KR1020127001848A patent/KR20120034755A/ko not_active Application Discontinuation
- 2010-03-05 EP EP14152043.7A patent/EP2725836A1/en not_active Withdrawn
- 2010-03-05 CN CN2010800107598A patent/CN102342142A/zh active Pending
- 2010-03-05 AU AU2010221174A patent/AU2010221174A1/en not_active Abandoned
- 2010-03-05 US US12/718,480 patent/US20110010543A1/en not_active Abandoned
- 2010-03-05 TW TW104123781A patent/TW201605257A/zh unknown
- 2010-03-05 EP EP10709609A patent/EP2404459A2/en not_active Withdrawn
- 2010-03-05 KR KR1020157030014A patent/KR101681136B1/ko active IP Right Grant
- 2010-03-05 KR KR1020167032791A patent/KR20160138587A/ko not_active Application Discontinuation
- 2010-03-05 WO PCT/US2010/026436 patent/WO2010102259A2/en active Application Filing
- 2010-03-05 JP JP2011553155A patent/JP2012520027A/ja not_active Ceased
- 2010-03-05 TW TW105132449A patent/TW201728195A/zh unknown
- 2010-03-05 KR KR1020117023478A patent/KR101386097B1/ko not_active IP Right Cessation
- 2010-03-05 TW TW099106424A patent/TW201129129A/zh unknown
- 2010-03-05 CN CN201410020579.8A patent/CN103716797A/zh active Pending
- 2010-03-05 AR ARP100100673A patent/AR076088A1/es active IP Right Grant
-
2013
- 2013-12-19 JP JP2013263015A patent/JP5795622B2/ja not_active Expired - Fee Related
-
2015
- 2015-04-29 US US14/699,509 patent/US9924366B2/en not_active Expired - Fee Related
- 2015-08-13 JP JP2015159857A patent/JP6231054B2/ja not_active Expired - Fee Related
-
2017
- 2017-07-21 JP JP2017142112A patent/JP2017188965A/ja not_active Withdrawn
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050132358A1 (en) * | 2001-12-05 | 2005-06-16 | Microsoft Corporation | Installing software on a mobile computing device using the rollback and security features of a configuration manager |
US7752465B2 (en) * | 2004-04-09 | 2010-07-06 | International Business Machines Corporation | Reliability platform configuration measurement, authentication, attestation and disclosure |
US20060074600A1 (en) * | 2004-09-15 | 2006-04-06 | Sastry Manoj R | Method for providing integrity measurements with their respective time stamps |
US7653819B2 (en) * | 2004-10-01 | 2010-01-26 | Lenovo Singapore Pte Ltd. | Scalable paging of platform configuration registers |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
US7930733B1 (en) * | 2006-04-10 | 2011-04-19 | At&T Intellectual Property Ii, L.P. | Method and system for execution monitor-based trusted computing |
US8108668B2 (en) * | 2006-06-26 | 2012-01-31 | Intel Corporation | Associating a multi-context trusted platform module with distributed platforms |
US7711960B2 (en) * | 2006-08-29 | 2010-05-04 | Intel Corporation | Mechanisms to control access to cryptographic keys and to attest to the approved configurations of computer platforms |
US20080076425A1 (en) * | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for resource management |
US20080301784A1 (en) * | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Native Use Of Web Service Protocols And Claims In Server Authentication |
US7853804B2 (en) * | 2007-09-10 | 2010-12-14 | Lenovo (Singapore) Pte. Ltd. | System and method for secure data disposal |
US20110041003A1 (en) * | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
Non-Patent Citations (6)
Title |
---|
M. van Dijk, L. F. G. Sarmenta, J. Rhodes, and S. Devadas. Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS. Technical report, MIT CSAIL CSG Technical Memo 498, May 2007. * |
Pearson, et al. (Trusted Computing Platforms: TCPA Technology in Context By: Siani Pearson, et aI., Pub. Date: July 22,2002), Chapter 6, pages 106-107 * |
Pearson, et al. (Trusted Computing Platforms: TCPA Technology in Context By: Siani Pearson, et aI., Pub. Date: July 22,2002), page 39 * |
Pearson, et al. (Trusted Computing Platforms: TCPA Technology in Context By: Siani Pearson, et al., Pub. Date: July 22, 2002), Chapter 6, pages 106-109 * |
Trusted Computing Challenges. AMD presentation, Leendert van Doorn, November 2007 * |
Trusted Computing Platforms: TCPA Technology in Context, Siani Pearson, et al., 07-22-2002, Prentice Hall; pp. 40,50,52,57,59,60,111,143,144,153,184,209 * |
Cited By (291)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9826335B2 (en) | 2008-01-18 | 2017-11-21 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling machine to machine communication |
US8479265B2 (en) | 2008-07-02 | 2013-07-02 | Oracle International Corporation | Usage based authorization |
US20110173643A1 (en) * | 2008-10-10 | 2011-07-14 | Nicolson Kenneth Alexander | USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM |
US20110041003A1 (en) * | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
US9253643B2 (en) | 2009-03-05 | 2016-02-02 | Interdigital Patent Holdings, Inc. | Method and apparatus for H(e)NB integrity verification and validation |
US9924366B2 (en) | 2009-03-06 | 2018-03-20 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US20100250949A1 (en) * | 2009-03-31 | 2010-09-30 | Torino Maria E | Generation, requesting, and/or reception, at least in part, of token |
US20120023564A1 (en) * | 2009-04-07 | 2012-01-26 | Telefonaktiebolaget L M Ericsson (Publ) | Attaching a sensor to a wsan |
US9154476B2 (en) * | 2009-04-07 | 2015-10-06 | Telefonaktiebolaget L M Ericsson (Publ) | Attaching a sensor to a WSAN |
US20100274930A1 (en) * | 2009-04-28 | 2010-10-28 | Samir Thakkar | Method for generically handling carrier specific provisioning for computer cellular wireless cards |
US8453140B2 (en) | 2009-04-28 | 2013-05-28 | Qualcomm Incorporated | Method for generically handling carrier specific provisioning for computer cellular wireless cards |
US20100291910A1 (en) * | 2009-05-17 | 2010-11-18 | Anthony Sanding | Method and apparatus for tracking the programming of a mobile device with multiple service accounts |
US8417234B2 (en) | 2009-05-17 | 2013-04-09 | Qualcomm Incorporated | Method and apparatus for tracking the programming of a mobile device with multiple service accounts |
US8417231B2 (en) * | 2009-05-17 | 2013-04-09 | Qualcomm Incorporated | Method and apparatus for programming a mobile device with multiple service accounts |
US20100291898A1 (en) * | 2009-05-17 | 2010-11-18 | Anthony Sanding | Method and apparatus for programming a mobile device with multiple service accounts |
US20210286868A1 (en) * | 2009-06-03 | 2021-09-16 | James F. Kragh | Method For Providing An Authenticated Digital Identity |
US11928197B2 (en) * | 2009-06-03 | 2024-03-12 | James F. Kragh | Method for providing an authenticated digital identity |
US20120278869A1 (en) * | 2009-10-15 | 2012-11-01 | Interdigital Patent Holdings, Inc. | Registration and credential roll-out for accessing a subscription-based service |
US9203846B2 (en) * | 2009-10-15 | 2015-12-01 | Interdigital Patent Holdings, Inc. | Registration and credential roll-out for accessing a subscription-based service |
US9391981B2 (en) | 2009-10-15 | 2016-07-12 | Interdigital Patent Holdings, Inc. | Registration and credential roll-out for accessing a subscription-based service |
US20110167479A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Enforcement of policies on context-based authorization |
US9509791B2 (en) | 2010-01-07 | 2016-11-29 | Oracle International Corporation | Policy-based exposure of presence |
US20110167153A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Policy-based exposure of presence |
US20110166943A1 (en) * | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Policy-based advertisement engine |
US8472953B2 (en) * | 2010-02-03 | 2013-06-25 | Pantech Co., Ltd. | Apparatus and method for registering temporary subscriber of small base station in wireless communication system |
US20110189993A1 (en) * | 2010-02-03 | 2011-08-04 | Pantech Co., Ltd. | Apparatus and method for registering temporary subscriber of small base station in wireless communication system |
US20110196728A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | Service level communication advertisement business |
US20110197260A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | System self integrity and health validation for policy enforcement |
US20110197257A1 (en) * | 2010-02-05 | 2011-08-11 | Oracle International Corporation | On device policy enforcement to secure open platform via network and open network |
US9467858B2 (en) | 2010-02-05 | 2016-10-11 | Oracle International Corporation | On device policy enforcement to secure open platform via network and open network |
US9495521B2 (en) * | 2010-02-05 | 2016-11-15 | Oracle International Corporation | System self integrity and health validation for policy enforcement |
US9578498B2 (en) | 2010-03-16 | 2017-02-21 | Qualcomm Incorporated | Facilitating authentication of access terminal identity |
US8756256B2 (en) | 2010-05-26 | 2014-06-17 | Qualcomm Incorporated | Method and systems for the management of non volatile items and provisioning files for a communication device with multiple service accounts |
US20130091556A1 (en) * | 2010-06-21 | 2013-04-11 | Nokia Siemens Networks Oy | Method for establishing a secure and authorized connection between a smart card and a device in a network |
US9681254B2 (en) * | 2010-07-21 | 2017-06-13 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US9730232B2 (en) | 2010-07-21 | 2017-08-08 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US10602314B2 (en) | 2010-07-21 | 2020-03-24 | Sensoriant, Inc. | System and method for controlling mobile services using sensor information |
US9913071B2 (en) | 2010-07-21 | 2018-03-06 | Sensoriant, Inc. | Controlling functions of a user device utilizing an environment map |
US11140516B2 (en) | 2010-07-21 | 2021-10-05 | Sensoriant, Inc. | System and method for controlling mobile services using sensor information |
US9763023B2 (en) | 2010-07-21 | 2017-09-12 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US10405157B2 (en) | 2010-07-21 | 2019-09-03 | Sensoriant, Inc. | System and method for provisioning user computing devices based on sensor and state information |
US10104518B2 (en) | 2010-07-21 | 2018-10-16 | Sensoriant, Inc. | System and method for provisioning user computing devices based on sensor and state information |
US9635545B2 (en) | 2010-07-21 | 2017-04-25 | Sensoriant, Inc. | System and method for controlling mobile services using sensor information |
US9949060B2 (en) | 2010-07-21 | 2018-04-17 | Sensoriant, Inc. | System allowing or disallowing access to resources based on sensor and state information |
US9930522B2 (en) | 2010-07-21 | 2018-03-27 | Sensoriant, Inc. | System and method for controlling mobile services using sensor information |
US9686630B2 (en) | 2010-07-21 | 2017-06-20 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US9913070B2 (en) | 2010-07-21 | 2018-03-06 | Sensoriant, Inc. | Allowing or disallowing access to resources based on sensor and state information |
US9913069B2 (en) | 2010-07-21 | 2018-03-06 | Sensoriant, Inc. | System and method for provisioning user computing devices based on sensor and state information |
US9715707B2 (en) | 2010-07-21 | 2017-07-25 | Sensoriant, Inc. | System and method for control and management of resources for consumers of information |
US8516551B2 (en) * | 2010-07-28 | 2013-08-20 | Intel Corporation | Providing a multi-phase lockstep integrity reporting mechanism |
US20140359754A1 (en) * | 2010-07-28 | 2014-12-04 | Intel Corporation | Providing A Multi-Phase Lockstep Integrity Reporting Mechanism |
US9245106B2 (en) * | 2010-07-28 | 2016-01-26 | Intel Corporation | Providing a multi-phase lockstep integrity reporting mechanism |
US8844021B2 (en) | 2010-07-28 | 2014-09-23 | Intel Corporation | Providing a multi-phase lockstep integrity reporting mechanism |
US20120030730A1 (en) * | 2010-07-28 | 2012-02-02 | Smith Ned M | Providing a multi-phase lockstep integrity reporting mechanism |
WO2012023050A2 (en) | 2010-08-20 | 2012-02-23 | Overtis Group Limited | Secure cloud computing system and method |
US8270963B1 (en) | 2010-10-01 | 2012-09-18 | Viasat, Inc. | Cross domain notification |
US8412175B2 (en) | 2010-10-01 | 2013-04-02 | Viasat, Inc. | Cross domain notification |
US8495731B1 (en) * | 2010-10-01 | 2013-07-23 | Viasat, Inc. | Multiple domain smartphone |
US8594652B2 (en) * | 2010-10-01 | 2013-11-26 | Viasat, Inc. | Cross domain notification |
US8498619B2 (en) * | 2010-10-01 | 2013-07-30 | Viasat, Inc. | Method and apparatus for validating integrity of a mobile communication |
US8458800B1 (en) | 2010-10-01 | 2013-06-04 | Viasat, Inc. | Secure smartphone |
US9113499B2 (en) | 2010-10-01 | 2015-08-18 | Viasat, Inc. | Multiple domain smartphone |
US8204480B1 (en) * | 2010-10-01 | 2012-06-19 | Viasat, Inc. | Method and apparatus for secured access |
US8301119B2 (en) * | 2010-10-01 | 2012-10-30 | Viasat, Inc. | Method and apparatus for validating integrity of a mobile communication device |
US20120231764A1 (en) * | 2010-10-01 | 2012-09-13 | Viasat, Inc. | Method and apparatus for validating integrity of a mobile communication device |
US20120100832A1 (en) * | 2010-10-22 | 2012-04-26 | Quallcomm Incorporated | Authentication of access terminal identities in roaming networks |
US9112905B2 (en) * | 2010-10-22 | 2015-08-18 | Qualcomm Incorporated | Authentication of access terminal identities in roaming networks |
US9560693B2 (en) * | 2010-11-03 | 2017-01-31 | Apple Inc. | Methods and apparatus for access data recovery from a malfunctioning device |
US20120115441A1 (en) * | 2010-11-03 | 2012-05-10 | Schell Stephan V | Methods and apparatus for access data recovery from a malfunctioning device |
US8913992B2 (en) * | 2010-11-03 | 2014-12-16 | Stephan V. Schell | Methods and apparatus for access data recovery from a malfunctioning device |
US9652320B2 (en) | 2010-11-05 | 2017-05-16 | Interdigital Patent Holdings, Inc. | Device validation, distress indication, and remediation |
US9247429B2 (en) * | 2010-12-15 | 2016-01-26 | Vodafone Ip Licensing Limited | Key derivation |
US20120154849A1 (en) * | 2010-12-20 | 2012-06-21 | Konica Minolta Business Technologies, Inc. | Image forming apparatus |
US9552488B2 (en) * | 2010-12-20 | 2017-01-24 | Konica Minolta Business Technologies, Inc. | Image forming apparatus |
US9668128B2 (en) | 2011-03-09 | 2017-05-30 | Qualcomm Incorporated | Method for authentication of a remote station using a secure element |
US20120234914A1 (en) * | 2011-03-15 | 2012-09-20 | Affiliated Computer Services Solutions France S.A.S. | System and Method for Validating That Fares Have Been Paid |
US8523061B2 (en) * | 2011-03-15 | 2013-09-03 | Affiliated Computer Services Solutions France S.A.S. | System and method for validating that fares have been paid |
US9445394B2 (en) * | 2011-04-29 | 2016-09-13 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US8892082B2 (en) * | 2011-04-29 | 2014-11-18 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US20150038176A1 (en) * | 2011-04-29 | 2015-02-05 | AT&T Intellectual Proprty I, L.P. | Automatic response to localized input |
US9888355B2 (en) * | 2011-04-29 | 2018-02-06 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US20120276919A1 (en) * | 2011-04-29 | 2012-11-01 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US20180132069A1 (en) * | 2011-04-29 | 2018-05-10 | At&T Intellectual Property I, L.P. | Automatic response to localized input |
US20120314248A1 (en) * | 2011-06-09 | 2012-12-13 | Xerox Corporation | System and method for multi-site cellular manufacturing with transportation delays |
US10732913B2 (en) * | 2011-06-09 | 2020-08-04 | Xerox Corporation | System and method for multi-site cellular manufacturing with transportation delays |
US20140192192A1 (en) * | 2011-08-05 | 2014-07-10 | Honeywell International Inc. | Systems and methods for managing video data |
US10038872B2 (en) * | 2011-08-05 | 2018-07-31 | Honeywell International Inc. | Systems and methods for managing video data |
US20140189362A1 (en) * | 2011-08-31 | 2014-07-03 | Thomson Licensing | Method for a secured backup and restore of configuration data of an end-user device, and device using the method |
US20140351903A1 (en) * | 2011-09-13 | 2014-11-27 | Nokia Solutions And Networks Oy | Authentication mechanism |
US20130091552A1 (en) * | 2011-10-06 | 2013-04-11 | Industrial Technology Research Institute | Authentication method and apparatus for user equipment and lipa network entities |
US9137661B2 (en) * | 2011-10-06 | 2015-09-15 | Industrial Technology Research Institute | Authentication method and apparatus for user equipment and LIPA network entities |
US8938621B2 (en) | 2011-11-18 | 2015-01-20 | Qualcomm Incorporated | Computing device integrity protection |
US9680869B2 (en) * | 2012-01-26 | 2017-06-13 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US9026784B2 (en) * | 2012-01-26 | 2015-05-05 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US20130198509A1 (en) * | 2012-01-26 | 2013-08-01 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US20160014152A1 (en) * | 2012-01-26 | 2016-01-14 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US20130212380A1 (en) * | 2012-02-10 | 2013-08-15 | Samsung Electronics Co., Ltd. | Securely upgrading or downgrading platform components |
US8667270B2 (en) * | 2012-02-10 | 2014-03-04 | Samsung Electronics Co., Ltd. | Securely upgrading or downgrading platform components |
US20130227668A1 (en) * | 2012-02-28 | 2013-08-29 | Citrix Systems, Inc. | Secure single sign-on |
US9032496B2 (en) * | 2012-02-28 | 2015-05-12 | Citrix Systems, Inc. | Secure single sign-on |
US20130337777A1 (en) * | 2012-03-28 | 2013-12-19 | Steven W. Deutsch | Conditional limited service grant based on device verification |
US9338656B2 (en) * | 2012-03-28 | 2016-05-10 | Intel Corporation | Conditional limited service grant based on device verification |
US9596574B1 (en) * | 2012-05-29 | 2017-03-14 | West Corporation | Controlling a crowd of multiple mobile station devices |
US20150180662A1 (en) * | 2012-08-17 | 2015-06-25 | Huawei Technologies Co., Ltd. | Software key updating method and device |
US9038179B2 (en) | 2012-08-28 | 2015-05-19 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Secure code verification enforcement in a trusted computing device |
US20140068028A1 (en) * | 2012-08-31 | 2014-03-06 | Fujitsu Limited | Network connecting method and electronic device |
US9660863B2 (en) * | 2012-08-31 | 2017-05-23 | Fujitsu Fsas Inc. | Network connecting method and electronic device |
US9331890B1 (en) | 2012-10-05 | 2016-05-03 | Kaazing Corporation | Extending websocket protocol |
US9736008B1 (en) | 2012-10-05 | 2017-08-15 | Kaazing Corporation | Communication rate adjustment extension |
US9787667B2 (en) * | 2012-10-16 | 2017-10-10 | Nokia Technologies Oy | Attested sensor data reporting |
US20150281219A1 (en) * | 2012-10-16 | 2015-10-01 | Nokia Technologies Oy | Attested sensor data reporting |
US20140130124A1 (en) * | 2012-11-08 | 2014-05-08 | Nokia Corporation | Partially Virtualizing PCR Banks In Mobile TPM |
US9307411B2 (en) * | 2012-11-08 | 2016-04-05 | Nokia Technologies Oy | Partially virtualizing PCR banks in mobile TPM |
US9438469B2 (en) * | 2013-01-02 | 2016-09-06 | Industrial Technology Research Institute | Auto-configuration server and management method of customer premises equipments |
US20140189101A1 (en) * | 2013-01-02 | 2014-07-03 | Industrial Technology Research Institute | Auto-configuration server and management method of customer premises equipments |
US9692746B2 (en) | 2013-03-07 | 2017-06-27 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US9641498B2 (en) * | 2013-03-07 | 2017-05-02 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US20140259134A1 (en) * | 2013-03-07 | 2014-09-11 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US10142321B2 (en) | 2013-03-07 | 2018-11-27 | Fiserv, Inc. | Single sign-on processing for associated mobile applications |
US9154485B1 (en) * | 2013-03-15 | 2015-10-06 | Kaazing Corporation | Authentication revalidation |
US11842740B2 (en) * | 2013-05-02 | 2023-12-12 | Nice Ltd. | Seamless authentication and enrollment |
US20210074301A1 (en) * | 2013-05-02 | 2021-03-11 | Nice Ltd. | Seamless authentication and enrollment |
US20140330563A1 (en) * | 2013-05-02 | 2014-11-06 | Nice-Systems Ltd. | Seamless authentication and enrollment |
US9620123B2 (en) * | 2013-05-02 | 2017-04-11 | Nice Ltd. | Seamless authentication and enrollment |
US10854204B2 (en) * | 2013-05-02 | 2020-12-01 | Nice Ltd. | Seamless authentication and enrollment |
US20170194005A1 (en) * | 2013-05-02 | 2017-07-06 | Nice Ltd. | Seamless authentication and enrollment |
WO2015036772A1 (en) * | 2013-09-13 | 2015-03-19 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
US10630646B2 (en) * | 2013-09-13 | 2020-04-21 | Vodafone Ip Licensing Limited | Methods and systems for communicating with an M2M device |
US11044234B2 (en) | 2013-09-13 | 2021-06-22 | Vodafone Ip Licensing Ltd | Communicating with a device |
US10439991B2 (en) | 2013-09-13 | 2019-10-08 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
US10673820B2 (en) | 2013-09-13 | 2020-06-02 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
US10313307B2 (en) | 2013-09-13 | 2019-06-04 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
US10412052B2 (en) | 2013-09-13 | 2019-09-10 | Vodafone Ip Licensing Limited | Managing machine to machine devices |
US11063912B2 (en) * | 2013-09-13 | 2021-07-13 | Vodafone Ip Licensing Limited | Methods and systems for communicating with an M2M device |
US20160226847A1 (en) * | 2013-09-13 | 2016-08-04 | Vodafone Ip Licensing Limited | Methods and systems for communicating with an m2m device |
US20150143494A1 (en) * | 2013-10-18 | 2015-05-21 | National Taiwan University Of Science And Technology | Continuous identity authentication method for computer users |
US9614875B2 (en) | 2013-11-06 | 2017-04-04 | International Business Machines Corporation | Scaling a trusted computing model in a globally distributed cloud environment |
US20150127795A1 (en) * | 2013-11-06 | 2015-05-07 | International Business Machines Corporation | Scaling a trusted computing model in a globally distributed cloud environment |
US9401954B2 (en) * | 2013-11-06 | 2016-07-26 | International Business Machines Corporation | Scaling a trusted computing model in a globally distributed cloud environment |
US10660002B2 (en) | 2013-11-19 | 2020-05-19 | At&T Intellectual Property I, L.P. | System and method for differentiated system continuity when changing networks |
US20160352698A1 (en) * | 2013-12-05 | 2016-12-01 | Huawei Device Co., Ltd. | Security control method for euicc and euicc |
US20150186676A1 (en) * | 2014-01-01 | 2015-07-02 | Mohit Arora | Real-time clock (rtc) modification detection system |
US20150268973A1 (en) * | 2014-01-10 | 2015-09-24 | International Business Machines Corporation | Controlling the Configuration of Computer Systems |
US9542206B2 (en) * | 2014-01-10 | 2017-01-10 | International Business Machines Corporation | Controlling the configuration of computer systems |
US9940146B2 (en) * | 2014-01-10 | 2018-04-10 | International Business Machines Corporation | Controlling the configuration of computer systems |
US9678766B2 (en) | 2014-01-10 | 2017-06-13 | International Business Machines Corporation | Controlling the configuration of computer systems |
US20150199204A1 (en) * | 2014-01-10 | 2015-07-16 | International Business Machines Corporation | Controlling the Configuration of Computer Systems |
US10402621B2 (en) * | 2014-01-15 | 2019-09-03 | Google Technology Holdings LLC | Finger print state integration with non-application processor functions for power savings in an electronic device |
US20180053034A1 (en) * | 2014-01-15 | 2018-02-22 | Google Llc | Finger print state integration with non-application processor functions for power savings in an electronic device |
US10841102B2 (en) * | 2014-02-20 | 2020-11-17 | Phoenix Contact Gmbh & Co. Kg | Method and system for creating and checking the validity of device certificates |
US20170054566A1 (en) * | 2014-02-20 | 2017-02-23 | Phoenix Contact Gmbh & Co. Kg | Method and system for creating and checking the validity of device certificates |
US20210044441A1 (en) * | 2014-02-20 | 2021-02-11 | Phoenix Contact Gmbh & Co. Kg | Method and system for creating and checking the validity of device certificates |
US11743054B2 (en) * | 2014-02-20 | 2023-08-29 | Phoenix Contact Gmbh & Co. Kg | Method and system for creating and checking the validity of device certificates |
US10911432B2 (en) | 2014-02-28 | 2021-02-02 | Siemens Aktiengesellschaft | Use of certificates using a positive list |
US20150373015A1 (en) * | 2014-06-18 | 2015-12-24 | Ca, Inc. | Authentication and authorization using device-based validation |
US9769167B2 (en) * | 2014-06-18 | 2017-09-19 | Ca, Inc. | Authentication and authorization using device-based validation |
US10614473B2 (en) | 2014-07-11 | 2020-04-07 | Sensoriant, Inc. | System and method for mediating representations with respect to user preferences |
US10390289B2 (en) | 2014-07-11 | 2019-08-20 | Sensoriant, Inc. | Systems and methods for mediating representations allowing control of devices located in an environment having broadcasting devices |
US20160036841A1 (en) * | 2014-07-31 | 2016-02-04 | International Business Machines Corporation | Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations |
US20160036812A1 (en) * | 2014-07-31 | 2016-02-04 | International Business Machines Corporation | Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations |
US9705879B2 (en) | 2014-09-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Efficient and reliable attestation |
US20160088093A1 (en) * | 2014-09-24 | 2016-03-24 | V5 Systems, Inc. | Dynamic data management |
US9843674B2 (en) * | 2014-09-24 | 2017-12-12 | Oracle International Corporation | Managing selection and triggering of applications on a card computing device |
US10768972B2 (en) | 2014-12-11 | 2020-09-08 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing a virtual offload device |
US10409628B2 (en) | 2014-12-11 | 2019-09-10 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing an offload device |
US10360061B2 (en) | 2014-12-11 | 2019-07-23 | Amazon Technologies, Inc. | Systems and methods for loading a virtual machine monitor during a boot process |
US11106456B2 (en) | 2014-12-11 | 2021-08-31 | Amazon Technologies, Inc. | Live updates for virtual machine monitor |
US10268500B2 (en) | 2014-12-11 | 2019-04-23 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing a virtual offload device |
US10216539B2 (en) | 2014-12-11 | 2019-02-26 | Amazon Technologies, Inc. | Live updates for virtual machine monitor |
US10585662B2 (en) | 2014-12-11 | 2020-03-10 | Amazon Technologies, Inc. | Live updates for virtual machine monitor |
US10142111B2 (en) * | 2014-12-12 | 2018-11-27 | Amazon Technologies, Inc. | Binding digitally signed requests to sessions |
US20180026797A1 (en) * | 2014-12-12 | 2018-01-25 | Amazon Technologies, Inc. | Binding digitally signed requests to sessions |
US9780952B1 (en) * | 2014-12-12 | 2017-10-03 | Amazon Technologies, Inc. | Binding digitally signed requests to sessions |
US11068355B2 (en) | 2014-12-19 | 2021-07-20 | Amazon Technologies, Inc. | Systems and methods for maintaining virtual component checkpoints on an offload device |
US10275322B2 (en) | 2014-12-19 | 2019-04-30 | Amazon Technologies, Inc. | Systems and methods for maintaining virtual component checkpoints on an offload device |
US9524158B2 (en) * | 2015-02-23 | 2016-12-20 | Apple Inc. | Managing firmware updates for integrated components within mobile devices |
US9722775B2 (en) * | 2015-02-27 | 2017-08-01 | Verizon Patent And Licensing Inc. | Network services via trusted execution environment |
US20160261412A1 (en) * | 2015-03-04 | 2016-09-08 | Avaya Inc. | Two-Step Authentication And Activation of Quad Small Form Factor Pluggable (QFSP+) Transceivers |
US20160280371A1 (en) * | 2015-03-27 | 2016-09-29 | Amazon Technologies, Inc. | Unmanned vehicle rollback |
US10979415B2 (en) | 2015-03-27 | 2021-04-13 | Amazon Technologies, Inc. | Unmanned vehicle message exchange |
US9930027B2 (en) | 2015-03-27 | 2018-03-27 | Amazon Technologies, Inc. | Authenticated messages between unmanned vehicles |
US9714088B2 (en) * | 2015-03-27 | 2017-07-25 | Amazon Technologies, Inc. | Unmanned vehicle rollback |
US9912655B2 (en) | 2015-03-27 | 2018-03-06 | Amazon Technologies, Inc. | Unmanned vehicle message exchange |
US9663226B2 (en) | 2015-03-27 | 2017-05-30 | Amazon Technologies, Inc. | Influencing acceptance of messages in unmanned vehicles |
US10382195B2 (en) | 2015-03-30 | 2019-08-13 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10211985B1 (en) | 2015-03-30 | 2019-02-19 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10243739B1 (en) * | 2015-03-30 | 2019-03-26 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10638314B2 (en) | 2015-04-08 | 2020-04-28 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading a profile in a wireless communication system |
US10111089B2 (en) | 2015-04-08 | 2018-10-23 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading a profile in a wireless communication system |
WO2016163796A1 (en) * | 2015-04-08 | 2016-10-13 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading a profile in a wireless communication system |
US9866568B2 (en) | 2015-05-07 | 2018-01-09 | Cyberark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
EP3213209A4 (en) * | 2015-05-07 | 2017-09-20 | Cyber-Ark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
US9866566B2 (en) | 2015-05-07 | 2018-01-09 | Cyberark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
US9866567B2 (en) | 2015-05-07 | 2018-01-09 | Cyberark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
WO2016178088A3 (en) * | 2015-05-07 | 2016-12-22 | Cyber-Ark Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
US10333903B1 (en) * | 2015-06-16 | 2019-06-25 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
US11258769B2 (en) | 2015-06-16 | 2022-02-22 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
US10701165B2 (en) | 2015-09-23 | 2020-06-30 | Sensoriant, Inc. | Method and system for using device states and user preferences to create user-friendly environments |
US11178240B2 (en) | 2015-09-23 | 2021-11-16 | Sensoriant, Inc. | Method and system for using device states and user preferences to create user-friendly environments |
US10505948B2 (en) * | 2015-11-05 | 2019-12-10 | Trilliant Networks, Inc. | Method and apparatus for secure aggregated event reporting |
US11424921B2 (en) | 2015-11-09 | 2022-08-23 | Dealerware, Llc | Vehicle access systems and methods |
US11451384B2 (en) | 2015-11-09 | 2022-09-20 | Dealerware, Llc | Vehicle access systems and methods |
US11463246B2 (en) * | 2015-11-09 | 2022-10-04 | Dealerware, Llc | Vehicle access systems and methods |
US9940934B2 (en) * | 2015-11-18 | 2018-04-10 | Uniphone Software Systems | Adaptive voice authentication system and method |
US20170140760A1 (en) * | 2015-11-18 | 2017-05-18 | Uniphore Software Systems | Adaptive voice authentication system and method |
US20170148291A1 (en) * | 2015-11-20 | 2017-05-25 | Hitachi, Ltd. | Method and a system for dynamic display of surveillance feeds |
US9697836B1 (en) | 2015-12-30 | 2017-07-04 | Nice Ltd. | Authentication of users of self service channels |
EP3193485A1 (en) * | 2016-01-18 | 2017-07-19 | Huawei Technologies Co., Ltd. | Device, server, system and method for data attestation |
US20170236520A1 (en) * | 2016-02-16 | 2017-08-17 | Knuedge Incorporated | Generating Models for Text-Dependent Speaker Verification |
US10650159B1 (en) * | 2016-02-25 | 2020-05-12 | Sprint Communications Company L.P. | Electronic device security through boot cycles |
US10395200B2 (en) * | 2016-03-17 | 2019-08-27 | Ca, Inc. | Method and apparatus for repairing policies |
US9832697B2 (en) * | 2016-04-04 | 2017-11-28 | Verizon Patent And Licensing Inc. | Providing wireless services using multiple core networks |
US10375055B2 (en) * | 2016-05-31 | 2019-08-06 | Airwatch Llc | Device authentication based upon tunnel client network requests |
US20180033438A1 (en) * | 2016-07-26 | 2018-02-01 | Samsung Electronics Co., Ltd. | Electronic device and method of operating the same |
US11404067B2 (en) * | 2016-07-26 | 2022-08-02 | Samsung Electronics Co., Ltd. | Electronic device and method of operating the same |
US10762904B2 (en) * | 2016-07-26 | 2020-09-01 | Samsung Electronics Co., Ltd. | Electronic device and method of operating the same |
US10250624B2 (en) * | 2016-08-05 | 2019-04-02 | Oak Tree Logic, Llc | Method and device for robust detection, analytics, and filtering of data/information exchange with connected user devices in a gateway-connected user-space |
CN107798233B (zh) * | 2016-09-06 | 2022-01-07 | 信特尼有限公司 | 用于配置分级信任链的目标域的方法和电子设备 |
US10594493B2 (en) * | 2016-09-06 | 2020-03-17 | Trustonic Limited | Future constraints for hierarchical chain of trust |
CN107798233A (zh) * | 2016-09-06 | 2018-03-13 | 信特尼有限公司 | 分级信任链的未来约束 |
US20180069707A1 (en) * | 2016-09-06 | 2018-03-08 | Trustonic Limited | Future constraints for hierarchical chain of trust |
US11032233B2 (en) | 2016-09-08 | 2021-06-08 | Visa International Service Association | Checkout chassis chat platform |
US10536424B2 (en) * | 2016-09-08 | 2020-01-14 | Visa International Service Association | Checkout chassis chat platform |
US20180069825A1 (en) * | 2016-09-08 | 2018-03-08 | Thomas Purves | Checkout chassis chat platform |
US10542002B2 (en) | 2016-09-12 | 2020-01-21 | InfoSci, LLC | Systems and methods for device authentication |
US10021100B2 (en) * | 2016-09-12 | 2018-07-10 | InfoSci, LLC | Systems and methods for device authentication |
WO2018063646A1 (en) * | 2016-09-28 | 2018-04-05 | Intel Corporation | ROOT OF TRUST (RoT) APPLICATION FOR INTERNET OF THINGS (IoT) DEVICES |
US20180096260A1 (en) * | 2016-09-30 | 2018-04-05 | Mcafee, Llc | Static and dynamic device profile reputation using cloud-based machine learning |
US11049039B2 (en) * | 2016-09-30 | 2021-06-29 | Mcafee, Llc | Static and dynamic device profile reputation using cloud-based machine learning |
US10033732B1 (en) * | 2016-11-09 | 2018-07-24 | Symantec Corporation | Systems and methods for detecting cloning of security tokens |
US10826681B1 (en) * | 2017-03-24 | 2020-11-03 | Open Invention Network Llc | Blockchain node initialization |
US11849021B1 (en) | 2017-03-24 | 2023-12-19 | International Business Machines Corporation | Blockchain node initialization |
US11463439B2 (en) | 2017-04-21 | 2022-10-04 | Qwerx Inc. | Systems and methods for device authentication and protection of communication on a system on chip |
US10999834B2 (en) | 2017-04-21 | 2021-05-04 | Netgear, Inc. | Method and apparatus for generating and maintaining an accurate network map in a communications network |
US11229023B2 (en) * | 2017-04-21 | 2022-01-18 | Netgear, Inc. | Secure communication in network access points |
US10986626B2 (en) | 2017-04-21 | 2021-04-20 | Netgear, Inc. | Robust control plane for management of a multi-band wireless networking system |
US10798702B2 (en) | 2017-04-21 | 2020-10-06 | Netgear, Inc. | Periodic frames for control plane data to manage multi-band wireless networking system |
US10938855B1 (en) * | 2017-06-23 | 2021-03-02 | Digi International Inc. | Systems and methods for automatically and securely provisioning remote computer network infrastructure |
US10841294B2 (en) | 2017-07-09 | 2020-11-17 | Abdullah Rashid Alsaifi | Certification system |
WO2019012320A1 (en) * | 2017-07-09 | 2019-01-17 | Alsaifi Abdullah Rashid | CERTIFICATION SYSTEM |
US10445503B2 (en) | 2017-07-14 | 2019-10-15 | Google Llc | Secure persistent software updates |
US20190036886A1 (en) * | 2017-07-25 | 2019-01-31 | Pacesetter, Inc. | Utilizing signed credentials for secure communication with an implantable medical device |
US10541977B2 (en) * | 2017-07-25 | 2020-01-21 | Pacesetter, Inc. | Utilizing signed credentials for secure communication with an implantable medical device |
TWI643085B (zh) * | 2017-08-01 | 2018-12-01 | 張光輝 | 利用手機imei碼做為設備操作者的識別驗證系統 |
US11074348B2 (en) * | 2017-08-24 | 2021-07-27 | International Business Machines Corporation | Securing and changing immutable data in secure bootup |
US20190065750A1 (en) * | 2017-08-24 | 2019-02-28 | International Business Machines Corporation | Securing and changing immutable data in secure bootup |
US10999327B2 (en) | 2017-10-26 | 2021-05-04 | Alibaba Group Holding Limited | Policy deployment method, apparatus, system and computing system of trusted server |
US10033756B1 (en) * | 2017-10-26 | 2018-07-24 | Hytrust, Inc. | Methods and systems for holistically attesting the trust of heterogeneous compute resources |
US11851939B2 (en) * | 2018-02-12 | 2023-12-26 | The Chamberlain Group Llc | Movable barrier operator having updatable security protocol |
US20200402337A1 (en) * | 2018-02-12 | 2020-12-24 | The Chamberlain Group, Inc. | Movable Barrier Operator Having Updatable Security Protocol |
US20190391802A1 (en) * | 2018-02-14 | 2019-12-26 | Micron Technology, Inc. | Over-the-air (ota) update for firmware of a vehicle component |
US10409585B2 (en) * | 2018-02-14 | 2019-09-10 | Micron Technology, Inc. | Over-the-air (OTA) update for firmware of a vehicle component |
US11144301B2 (en) * | 2018-02-14 | 2021-10-12 | Micron Technology, Inc. | Over-the-air (OTA) update for firmware of a vehicle component |
US20190266331A1 (en) * | 2018-02-23 | 2019-08-29 | Infineon Technologies Ag | Security processor for an embedded system |
US10719606B2 (en) * | 2018-02-23 | 2020-07-21 | Infineon Technologies Ag | Security processor for an embedded system |
US11190357B2 (en) * | 2018-05-18 | 2021-11-30 | Avive Solutions, Inc. | Framework for ensuring software components are not corrupted |
US11003537B2 (en) | 2018-05-29 | 2021-05-11 | Micron Technology, Inc. | Determining validity of data read from memory by a controller |
US11558743B2 (en) * | 2018-09-05 | 2023-01-17 | Whitefox Defense Technologies, Inc. | Integrated secure device manager systems and methods for cyber-physical vehicles |
US12022289B2 (en) | 2018-09-05 | 2024-06-25 | Whitefox Defense Technologies, Inc. | Integrated secure device manager systems and methods for cyber-physical vehicles |
US11849317B2 (en) * | 2018-09-07 | 2023-12-19 | Samsung Electronics Co., Ltd. | Apparatus and method for SSP device and server to negotiate digital certificates |
US11153752B2 (en) * | 2018-09-07 | 2021-10-19 | Samsung Electronics Co., Ltd. | Apparatus and method for SSP device and server to negotiate digital certificates |
KR102657876B1 (ko) | 2018-09-07 | 2024-04-17 | 삼성전자주식회사 | Ssp 단말과 서버가 디지털 인증서를 협의하는 방법 및 장치 |
KR20200028786A (ko) * | 2018-09-07 | 2020-03-17 | 삼성전자주식회사 | Ssp 단말과 서버가 디지털 인증서를 협의하는 방법 및 장치 |
US20220038894A1 (en) * | 2018-09-07 | 2022-02-03 | Samsung Electronics Co., Ltd. | Apparatus and method for ssp device and server to negotiate digital certificates |
US11005845B2 (en) | 2018-10-18 | 2021-05-11 | International Business Machines Corporation, Armonk, Ny | Network device validation and management |
US20220029994A1 (en) * | 2018-12-06 | 2022-01-27 | Convida Wireless, Llc | Security lifecycle management of devices in a communications network |
US20240064144A1 (en) * | 2018-12-06 | 2024-02-22 | Convida Wireless, Llc | Security lifecycle management of devices in a communications network |
US11824643B2 (en) * | 2018-12-06 | 2023-11-21 | Convida Wireless, Llc | Security lifecycle management of devices in a communications network |
US11232209B2 (en) * | 2019-01-18 | 2022-01-25 | International Business Machines Corporation | Trojan detection in cryptographic hardware adapters |
US20220166636A1 (en) * | 2019-03-14 | 2022-05-26 | Omron Corporation | Control device and control system |
US11882176B2 (en) * | 2019-04-05 | 2024-01-23 | Cisco Technology, Inc. | Attestation-based scheme for validating peering setups for critical infrastructure protocols |
US11580227B2 (en) * | 2019-04-09 | 2023-02-14 | Cisco Technology, Inc. | Split chain of trust for secure device boot |
US20210365563A1 (en) * | 2019-04-09 | 2021-11-25 | Cisco Technology, Inc. | Split chain of trust for secure device boot |
US11113403B2 (en) * | 2019-04-09 | 2021-09-07 | Cisco Technology, Inc. | Split chain of trust for secure device boot |
WO2020263381A1 (en) * | 2019-06-28 | 2020-12-30 | Zebra Technologies Corporation | Methods and apparatus to renew digital certificates |
GB2598846A (en) * | 2019-06-28 | 2022-03-16 | Zebra Tech Corp | Methods and apparatus to renew digital certificates |
GB2598846B (en) * | 2019-06-28 | 2024-02-14 | Zebra Tech Corp | Methods and apparatus to renew digital certificates |
US20220140732A1 (en) * | 2019-07-23 | 2022-05-05 | Hewlett-Packard Development Company, L.P. | Controlling buck-boost converters based on power supply identification signals |
US11824447B2 (en) * | 2019-07-23 | 2023-11-21 | Hewlett-Packard Development Company, L.P. | Controlling buck-boost converters based on power supply identification signals |
US20230026710A1 (en) * | 2019-09-09 | 2023-01-26 | Huawei Technologies Co., Ltd. | Base Station Switching Method and Apparatus |
US11429457B2 (en) | 2019-09-26 | 2022-08-30 | Dell Products L.P. | System and method to securely exchange system diagnostics information between firmware, operating system and payload |
US11599522B2 (en) * | 2019-10-29 | 2023-03-07 | EMC IP Holding Company LLC | Hardware trust boundaries and graphs in a data confidence fabric |
US20230014494A1 (en) * | 2020-03-27 | 2023-01-19 | Huawei Technologies Co., Ltd. | Communication method, apparatus, and system |
US11516256B2 (en) * | 2020-05-20 | 2022-11-29 | Dell Products L.P. | Certificate authorization policy for security protocol and data model capable devices |
US12074913B2 (en) * | 2020-05-20 | 2024-08-27 | Dell Products L.P. | Certificate authorization policy for security protocol and data model capable devices |
US12074980B2 (en) * | 2021-06-18 | 2024-08-27 | Dell Products L.P. | System and method of authenticating updated firmware of an information handling system |
US20220407714A1 (en) * | 2021-06-18 | 2022-12-22 | Dell Products L.P. | System and method of authenticating updated firmware of an information handling system |
US20230030816A1 (en) * | 2021-07-30 | 2023-02-02 | Red Hat, Inc. | Security broker for consumers of tee-protected services |
US20230048368A1 (en) * | 2021-08-16 | 2023-02-16 | Toyota Motor North America, Inc. | Transport onboard security check |
US11765604B2 (en) | 2021-12-16 | 2023-09-19 | T-Mobile Usa, Inc. | Providing configuration updates to wireless telecommunication networks |
US12127016B2 (en) | 2023-05-31 | 2024-10-22 | T-Mobile Usa, Inc. | Providing configuration updates to wireless telecommunication networks |
Also Published As
Publication number | Publication date |
---|---|
JP6231054B2 (ja) | 2017-11-15 |
TW201129129A (en) | 2011-08-16 |
US20150237502A1 (en) | 2015-08-20 |
AU2010221174A1 (en) | 2011-09-29 |
KR20150122267A (ko) | 2015-10-30 |
JP2016012926A (ja) | 2016-01-21 |
JP2014075841A (ja) | 2014-04-24 |
KR101681136B1 (ko) | 2016-12-01 |
JP2012520027A (ja) | 2012-08-30 |
EP2725836A1 (en) | 2014-04-30 |
CN102342142A (zh) | 2012-02-01 |
US9924366B2 (en) | 2018-03-20 |
JP2017188965A (ja) | 2017-10-12 |
JP5795622B2 (ja) | 2015-10-14 |
CN103716797A (zh) | 2014-04-09 |
KR20160138587A (ko) | 2016-12-05 |
AR076088A1 (es) | 2011-05-18 |
WO2010102259A3 (en) | 2010-10-28 |
TW201605257A (zh) | 2016-02-01 |
EP2404459A2 (en) | 2012-01-11 |
WO2010102259A2 (en) | 2010-09-10 |
KR20110126162A (ko) | 2011-11-22 |
TW201728195A (zh) | 2017-08-01 |
KR101386097B1 (ko) | 2014-04-29 |
KR20120034755A (ko) | 2012-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9924366B2 (en) | Platform validation and management of wireless devices | |
US20180242129A1 (en) | Method and Apparatus for Enabling Machine To Machine Communication | |
JP5390619B2 (ja) | Homenode−b装置およびセキュリティプロトコル | |
EP2630816B1 (en) | Authentication of access terminal identities in roaming networks | |
KR101523420B1 (ko) | 부팅 처리에서의 단계화 제어 해제 | |
CN103595530A (zh) | 软件密钥更新方法和装置 | |
Strandberg | Avoiding Vulnerabilities in Connected Cars a methodology for finding vulnerabilities | |
CN117749476A (zh) | 基于加密算法的可信安全连接方法及装置、电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERDIGITAL PATENT HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHMIDT, ANDREAS U.;LEICHER, ANDREAS;CHA, INHYOK;AND OTHERS;SIGNING DATES FROM 20100615 TO 20100721;REEL/FRAME:024744/0926 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |