Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020159497 - SECURE CODE IMAGE DISTRIBUTION

Publication Number WO/2020/159497
Publication Date 06.08.2020
International Application No. PCT/US2019/015878
International Filing Date 30.01.2019
IPC
G06F 21/70 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
H04L 9/08 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
08Key distribution
CPC
G06F 21/57
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 21/6227
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
6227where protection concerns the structure of data, e.g. records, types, queries
G06F 8/63
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
8Arrangements for software engineering
60Software deployment
61Installation
63Image based installation; Cloning; Build to order
G06F 8/65
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
8Arrangements for software engineering
60Software deployment
65Updates
H04L 9/0822
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
0822using key encryption key
Applicants
  • HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. [US]/[US]
Inventors
  • GUNNING, Chris R
  • SCHIFFMAN, Joshua
  • ALBRIGHT, Shivaun
Agents
  • KOKOSKA, Christopher E.
  • FOR ADDITIONAL NAMES, See Attached Copy of GPoA
Priority Data
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) SECURE CODE IMAGE DISTRIBUTION
(FR) DISTRIBUTION SÉCURISÉE D'IMAGE DE CODE
Abstract
(EN) Secure code image delivery may include encrypting, using an invariant content encryption key, an invariant portion of a code image for a set of electronic devices to generate an encrypted invariant potion of the code image. A first variant of a variant portion of the code image may be encrypted using a first variant content encryption key to generate a first encrypted variant portion. A second variant of a variant portion of the code image may be encrypted using a second variant content encryption key to generate a second encrypted variant portion. A code image bundle may be generated including the encrypted invariant portion, the first encrypted variant portion, and the second encrypted variant portion.
(FR) L’invention concerne une distribution sécurisée d'image de code qui peut comprendre le cryptage, à l'aide d'une clé de cryptage de contenu invariant, d'une partie invariante d'une image de code pour un ensemble de dispositifs électroniques de façon à générer une partie invariante cryptée de l'image de code. Une première variante d'une partie variante de l'image de code peut être cryptée à l'aide d'une première clé de cryptage de contenu variant pour générer une première partie variante cryptée. Une seconde variante d'une partie variante de l'image de code peut être cryptée à l'aide d'une seconde clé de cryptage de contenu variant pour générer une seconde partie variante cryptée. Un faisceau d'images de code peut être généré, celui-ci comprenant la partie invariante cryptée, la première partie de variante cryptée et la seconde partie de variante cryptée.
Related patent documents
Latest bibliographic data on file with the International Bureau