17934642. Secure Communication in a Computing System simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

Secure Communication in a Computing System

Organization Name

Apple Inc.

Inventor(s)

Birju N. Shah of Redwood City CA (US)

James E. Zmuda of Redwood City CA (US)

Jangwon Lee of San Jose CA (US)

Secure Communication in a Computing System - A simplified explanation of the abstract

This abstract first appeared for US patent application 17934642 titled 'Secure Communication in a Computing System

Simplified Explanation

Abstract

The patent application describes a method for securely communicating traffic between control units connected through a network. It involves the use of electronic control units (ECUs) that receive a signed manifest containing public keys for a specific group of authorized ECUs. The ECUs then engage in an authentication exchange using the public keys to establish trust. Based on this exchange, the ECUs that are successfully authenticated receive a group key, which is used to authenticate messages sent between them.

Innovation

  • The patent application introduces a method for securely communicating traffic between control units interconnected by a network.
  • It utilizes electronic control units (ECUs) and a signed manifest to establish trust and authenticate communication.
  • The authentication exchange between ECUs is based on public keys identified in the manifest.
  • Authenticated ECUs receive a group key, which is used to authenticate messages exchanged between them.

Potential Applications

This technology has potential applications in various industries and systems, including:

  • Automotive industry: Secure communication between different control units in a vehicle, such as engine control units, braking systems, and infotainment systems.
  • Industrial automation: Secure communication between control units in manufacturing plants or industrial processes.
  • Internet of Things (IoT): Secure communication between IoT devices and control units in smart homes, cities, or industrial IoT applications.
  • Telecommunications: Secure communication between network elements and control units in telecommunication networks.

Problems Solved

This technology addresses several problems related to secure communication between control units:

  • Unauthorized access: By using signed manifests and authentication exchanges, only authorized control units can communicate with each other, preventing unauthorized access.
  • Message integrity: The use of group keys ensures that messages exchanged between authenticated control units are not tampered with during transmission.
  • Trust establishment: The authentication exchange based on public keys allows control units to establish trust with each other, ensuring that communication is secure and reliable.

Benefits

The use of this technology offers several benefits:

  • Enhanced security: By securely authenticating control units and messages, the technology prevents unauthorized access and tampering of communication.
  • Efficient communication: The distribution of group keys to authenticated control units enables efficient and secure communication within the authorized group.
  • Scalability: The method can be applied to various control units and networks, allowing for scalability in different systems and industries.
  • Flexibility: The technology can be adapted to different communication protocols and environments, making it versatile and adaptable to various applications.


Original Abstract Submitted

Securely communicating traffic between control units interconnected by a network. An electronic control unit (ECU) receives a signed manifest identifying public keys for a group of ECUs authorized to communicate over the network. The ECU performs an authentication exchange with the ECUs in the group. The authentication exchange uses public keys identified in the manifest. Based on the authentication exchange, the ECU distributes a group key to authenticated ones of the ECUs that communicate messages authenticated using the group key.