METHOD AND APPARATUS FOR PROVIDING INFORMATION AUTHENTICATION FROM EXTERNAL SENSORS TO SECURE ENVIRONMENTS
First Claim
1. A method comprising facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
- a generation of at least one cryptographic key for use by (a) at least one secure environment, (b) one or more sensors that are associated with at least one device and that are external to the at least one secure environment, or (c) a combination thereof; and
an authentication of sensor information transmitted by the one or more sensors to the at least one secure environment based, at least in part, on the cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing information authentication from external sensors to secure environments. An authentication support platform causes, at least in part, a generation of at least one cryptographic key for use by (a) at least one secure environment, (b) one or more sensors that are associated with at least one device and that are external to the at least one secure environment, or (c) a combination thereof. The authentication support platform further causes, at least in part, an authentication of sensor information transmitted by the one or more sensors to the at least one secure environment based, at least in part, on the cryptographic key.
-
Citations
21 Claims
-
1. A method comprising facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
-
a generation of at least one cryptographic key for use by (a) at least one secure environment, (b) one or more sensors that are associated with at least one device and that are external to the at least one secure environment, or (c) a combination thereof; and an authentication of sensor information transmitted by the one or more sensors to the at least one secure environment based, at least in part, on the cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, cause, at least in part, a generation of at least one cryptographic key for use by (a) at least one secure environment, (b) one or more sensors that are associated with at least one device and that are external to the at least one secure environment, or (c) a combination thereof; and cause, at least in part, an authentication of sensor information transmitted by the one or more sensors to the at least one secure environment based, at least in part, on the cryptographic key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21-48. -48. (canceled)
Specification