Secured daisy chain communication
First Claim
1. An intermediate servant device connected in a daisy chain configuration with a set of servant devices, wherein the intermediate servant device comprises hardware configured to:
- receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data;
verify the authentication information for the first response;
generate a second response to the request for data;
determine authentication information for the second response based on the authentication information for the first response, the second response, and a key assigned to the intermediate servant device, wherein the authentication information for the first response includes a signature for the first response and wherein the authentication information for the second response includes a signature for the second response;
encrypt the second response using the first response and the key assigned to the intermediate servant device; and
output, to a next servant device arranged in the daisy chain configuration, at least the authentication information for the second response, the first response, and the encrypted second response.
1 Assignment
0 Petitions
Accused Products
Abstract
An intermediate servant device connected in a daisy chain configuration with a set of devices is described. The intermediate servant device may be configured to receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data. The intermediate servant device may be further configured to generate a second response to the request for data and determine authentication information for the second response based on the authentication information for the first response, the second response, and a key assigned to the intermediate servant device. The intermediate servant device may be further configured to output at least the authentication information for the second response, the first response, and the second response.
10 Citations
22 Claims
-
1. An intermediate servant device connected in a daisy chain configuration with a set of servant devices, wherein the intermediate servant device comprises hardware configured to:
-
receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data; verify the authentication information for the first response; generate a second response to the request for data; determine authentication information for the second response based on the authentication information for the first response, the second response, and a key assigned to the intermediate servant device, wherein the authentication information for the first response includes a signature for the first response and wherein the authentication information for the second response includes a signature for the second response; encrypt the second response using the first response and the key assigned to the intermediate servant device; and output, to a next servant device arranged in the daisy chain configuration, at least the authentication information for the second response, the first response, and the encrypted second response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving, by an intermediate servant device connected in a daisy chain configuration with a set of servant devices, from a previous device of the set of devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data; verifying, by the intermediate servant device, the authentication information for the first response; generating, by the intermediate servant device, a second response to the request for data; determining, by the intermediate servant device, authentication information for the second response based on the authentication information for the first response and a key assigned to the intermediate servant device, wherein the authentication information for the first response includes a signature for the first response and wherein the authentication information for the second response includes a signature for the second response; encrypting, by the intermediate servant device, the second response using the first response and the key assigned to the intermediate servant device; and outputting, by the intermediate servant device, to a next servant device arranged in the daisy chain configuration, at least the authentication information for the second response, the first response, and the encrypted second response. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a master device configured to output a request for data; and a set of servant devices arranged in a daisy chain configuration such that an initial servant device of the set of servant devices receives the request for data from the master device and a last servant device of the set of servant devices outputs one or more responses to the request for data to the master device, wherein an intermediate servant device of the set of servant devices that is arranged in the daisy chain configuration between the initial servant device and the last servant device is configured to; receive, from a previous servant device of the set of servant devices, the request for data, a first response to the request for data, and authentication information for the first response; verify the authentication information for the first response; generate a second response to the request for data; determine authentication information for the second response based on the authentication information for the first response and a key assigned to the intermediate servant device, wherein the authentication information for the first response includes a signature for the first response and wherein the authentication information for the second response includes a signature for the second response; encrypt the second response using the first response and the key assigned to the intermediate servant device; and output, to a next servant device of the set of servant devices, at least the authentication information for the second response, the first response, and the encrypted second response. - View Dependent Claims (20, 21, 22)
-
Specification