Systems and methods for processing and verifying data using signatures
First Claim
Patent Images
1. A device for processing message data comprising:
- a network interface configured to;
receive, from another device, the message data, a first signature corresponding to the message data, and a third signature corresponding to the message data and the first signature, wherein the third signature is a signature generated by another network interface of the other device based on the message data and the first signature;
verify an integrity of the message data and the first signature based on the third signature;
a first component configured to receive the message data and the first signature from the other device via the network interface; and
a security processor configured to;
receive the message data and the first signature from the network interface via the first component;
determine, based on the first signature, whether the message data is valid;
determine a second signature corresponding to the message data; and
convey the second signature to the first component.
3 Assignments
0 Petitions
Accused Products
Abstract
According to an example, a device for processing data is suggested, said device comprising a first component, wherein the first software component is arranged for receiving the data; a security processor for receiving said data and a first signature, wherein the security processor is arranged for determining based on the first signature whether the data are valid; for determining a second signature for the data; and for conveying the second signature to the first component.
-
Citations
35 Claims
-
1. A device for processing message data comprising:
-
a network interface configured to; receive, from another device, the message data, a first signature corresponding to the message data, and a third signature corresponding to the message data and the first signature, wherein the third signature is a signature generated by another network interface of the other device based on the message data and the first signature; verify an integrity of the message data and the first signature based on the third signature; a first component configured to receive the message data and the first signature from the other device via the network interface; and a security processor configured to; receive the message data and the first signature from the network interface via the first component; determine, based on the first signature, whether the message data is valid; determine a second signature corresponding to the message data; and convey the second signature to the first component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for processing message data comprising:
-
a network interface configured to; receive, from another device, the message data, a first signature corresponding to the message data, and a third signature corresponding to the message data and the first signature, wherein the third signature is a signature generated by another network interface of the other device based on the message data and the first signature; verify an integrity of the message data and the first signature based on the third signature; a first component configured to receive the message data and the first signature from the other device via the network interface; a second component; and a security processor configured to; receive the message data and the first signature from the network interface via the first component; determine, based on the first signature, whether the message data is valid; and inform the first component whether the message data is valid; wherein the first component is further configured to determine a second signature for the message data and convey the second signature and the message data to the second component. - View Dependent Claims (20, 21, 22)
-
-
23. A device for processing message data comprising:
-
a network interface configured to generate a third signature based on the message data received from another device and a first signature corresponding to the message data, wherein the message data and the first signature are verifiable using the third signature; a security processor, and a first component configured to convey the message data and a second signature generated based on the message data to the security processor, wherein the security processor is configured to; determine, based on the second signature, whether the message data received from the first component is valid; generate the first signature for the message data in response to the message data being determined valid using the second signature; provide the message data, the third signature, and the first signature to the other device via the network interface. - View Dependent Claims (24, 25, 26)
-
-
27. A method for processing message data at a device including a security processor, a network interface, and a first component, said method comprising:
-
receiving, by the network interface, the message data, a first signature corresponding to the message data, and a third signature corresponding to the message data and the first signature, wherein the third signature is a signature generated by another network interface of another device based on the message data and the first signature; verifying, by the network interface of the device, an integrity of the message data and the first signature based on the third signature; receiving, via the network interface of the device, the message data and the first signature at the first component of the device from the other device; receiving, via the first component, the message data and the first signature at the security processor from the network interface; determining, by the security processor based on the first signature, whether the message data is valid; determining a second signature for the message data; and conveying the second signature to the first component. - View Dependent Claims (28, 29, 30, 31, 34)
-
-
32. A method for processing message data at a device including a security processor, a network interface, and a first component, said method comprising:
-
receiving, by the network interface, the message data, a first signature corresponding to the message data, and a third signature corresponding to the message data and the first signature, wherein the third signature is a signature generated by a network interface of another device based on the message data and the first signature; verifying, by the network interface of the device, an integrity of the message data and the first signature based on the third signature; receiving, via the network interface of the device, the message data and the first signature at the first component of the device from the other device; receiving, via the first component, the message data and the first signature at the security processor from the network interface; determining, by the security processor based on the first signature, whether the message data is valid; determining, by the first component, whether the message data is valid based on information provided by the security processor; determining a second signature for the message data by the first component; and conveying the second signature and the message data to the second component. - View Dependent Claims (35)
-
-
33. A device comprising:
-
means for receiving, at a network interface, message date, a first signature corresponding to the message data, and a third signature, from another device, wherein the third signature corresponds to the message data and the first signature, and is a signature generated by a network interface of the other device based on the message data and the first signature; means for verifying an integrity of the message data and the first signature based on the third signature; means for receiving, via the network interface, the message data and the first signature from the other device at the first component; means for receiving message data and the first signature from the network interface at a security processor of the device via the first component; means for determining, by the security processor based on the first signature, whether the message data is valid; means for determining a second signature for the message data; and means for conveying the second signature to the first component.
-
Specification