-
公开(公告)号:US20240427896A1
公开(公告)日:2024-12-26
申请号:US18339017
申请日:2023-06-21
Applicant: Cisco Technology, Inc.
Inventor: Chirag K. Shroff , William F. Sulzen , Ofer Licht , Chandan Singh
Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for configuring network groups without software-based processing and management. A method includes: validating veracity of a secure enclave based on a secure identify of the secure enclave using the instructions of a secure enclave predriver stored in a memory integral to a processor; establishing a secure connection with the secure enclave; retrieving at least one authentication key from the secure enclave; retrieving at least a portion of a bootstrapper from a secure storage based on the instructions of the secure enclave predriver; validating a veracity of the bootstrapper based on the at least one authentication key; initializing an external memory using the instructions of the bootstrapper; copying a bootloader from the secure storage into the external memory; validating a veracity of the bootloader based on the at least one authentication key; and executing the bootloader.
-
公开(公告)号:US12250319B2
公开(公告)日:2025-03-11
申请号:US18177278
申请日:2023-03-02
Applicant: Cisco Technology, Inc.
Inventor: Chirag K. Shroff
Abstract: In one embodiment, a method to authenticate a hardware component, by a system, includes performing a verification process to determine whether the hardware component is authorized to run on the system. The hardware component comprises an electronic fuse storing a hash of a data package and a memory storing the data package, wherein the electronic fuse is configured to provide the hash to the memory. The verification process comprises transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response. The verification process further comprises receiving a signed response containing the random value (K) and the data package, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system. The verification process further comprises decrypting the signed response to verify a value of the random value (K).
-
公开(公告)号:US20240297793A1
公开(公告)日:2024-09-05
申请号:US18177278
申请日:2023-03-02
Applicant: Cisco Technology, Inc.
Inventor: Chirag K. Shroff
CPC classification number: H04L9/3236 , H04L9/0869 , H04L9/30
Abstract: In one embodiment, a method to authenticate a hardware component, by a system, includes performing a verification process to determine whether the hardware component is authorized to run on the system. The hardware component comprises an electronic fuse storing a hash of a data package and a memory storing the data package, wherein the electronic fuse is configured to provide the hash to the memory. The verification process comprises transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response. The verification process further comprises receiving a signed response containing the random value (K) and the data package, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system. The verification process further comprises decrypting the signed response to verify a value of the random value (K).
-
公开(公告)号:US20210382967A1
公开(公告)日:2021-12-09
申请号:US16943423
申请日:2020-07-30
Applicant: Cisco Technology, Inc.
Inventor: Joel Goergen , Sam Gupta , Dylan Thomas Walker , Chirag K. Shroff , Christopher Shannon Gourley , Rachel Marie Weeks , Elizabeth Ann Kochuparambil , Ronald Lee Shaffer II
Abstract: An apparatus includes a printed circuit board (PCB) that includes a woven glass laminate layer. The woven glass laminate layer includes a plurality of glass bundles woven together, where a marker structure including at least one marker is defined within the woven glass laminate layer. A security chip is coupled with the PCB and includes memory that stores an authentication identifier of the PCB, where the authentication ID includes a representation of the marker structure.
-
-
-