Authenticating a secondary device based on encrypted tables

    公开(公告)号:US10897363B2

    公开(公告)日:2021-01-19

    申请号:US15771076

    申请日:2016-11-16

    Abstract: A table key capable of decrypting a first table from a plurality of encrypted tables may be received. Each of the encrypted tables may include at least one pair of values corresponding to a challenge value and a response value. A request to authenticate a secondary device may be received and in response to the request to authenticate the secondary device, a challenge value obtained by using the table key to decrypt an entry in the first table may be transmitted to the secondary device. A second challenge value may be transmitted to the secondary device and a cryptographic proof may be received from the secondary device. The validity of the cryptographic proof received from the secondary device may be authenticated based on the second challenge value and the response value obtained by using the table key to decrypt the entry in the first table.

    SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS
    14.
    发明申请
    SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS 审中-公开
    集成电路中的安全特性和关键管理

    公开(公告)号:US20140044265A1

    公开(公告)日:2014-02-13

    申请号:US13831545

    申请日:2013-03-14

    Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.

    Abstract translation: 描述了在集成电路中提供安全特征和密钥管理的机制。 示例性集成电路包括用于存储秘密密钥的安全存储器和耦合到安全存储器的安全管理器核,以接收数字签名的命令,使用秘密密钥验证与该命令相关联的签名,以及配置 集成电路使用该命令。

Patent Agency Ranking