Integrated circuits having accessible and inaccessible physically unclonable functions
    12.
    发明授权
    Integrated circuits having accessible and inaccessible physically unclonable functions 有权
    集成电路具有可访问和无法访问的物理不可克隆功能

    公开(公告)号:US08928347B2

    公开(公告)日:2015-01-06

    申请号:US13631634

    申请日:2012-09-28

    CPC classification number: H03K19/003 G09C1/00 H04L9/0866 H04L2209/12

    Abstract: An integrated circuit substrate of an aspect includes a plurality of exposed electrical contacts. The integrated circuit substrate also includes an inaccessible set of Physically Unclonable Function (PUF) cells to generate an inaccessible set of PUF bits that are not accessible through the exposed electrical contacts. The integrated circuit substrate also includes an accessible set of PUF cells to generate an accessible set of PUF bits that are accessible through the exposed electrical contacts. Other apparatus, methods, and systems are also disclosed.

    Abstract translation: 一方面的集成电路基板包括多个暴露的电触点。 集成电路基板还包括不可接近的物理不可克隆功能(PUF)单元组,以生成不能通过暴露的电触点访问的不可访问的PUF位集合。 集成电路基板还包括可访问的PUF单元组,以产生可通过暴露的电触点访问的可访问的PUF位组。 还公开了其他装置,方法和系统。

    TECHNIQUES FOR SHARED PRIVATE DATA OBJECTS IN A TRUSTED EXECUTION ENVIRONMENT

    公开(公告)号:US20220182365A1

    公开(公告)日:2022-06-09

    申请号:US17677584

    申请日:2022-02-22

    Abstract: Techniques for sharing private data objects in a trusted execution environment using a distributed ledger are described. The techniques described herein may enable sharing of data objects, referred to herein as private data objects (PDOs), between individuals and organizations with access and update policies mediated by execution of code (referred to herein as a “smart contract”) carried with the PDO in a secure enclave. A distributed ledger may serve as a “public commit log” to ensure that there is a single, authoritative instance of the object and provide a means of guaranteeing atomicity of updates across interacting objects.

    Techniques for shared private data objects in a trusted execution environment

    公开(公告)号:US10554634B2

    公开(公告)日:2020-02-04

    申请号:US15721723

    申请日:2017-09-29

    Abstract: Techniques for sharing private data objects in a trusted execution environment using a distributed ledger are described. The techniques described herein may enable sharing of data objects, referred to herein as private data objects (PDOs), between individuals and organizations with access and update policies mediated by execution of code (referred to herein as a “smart contract”) carried with the PDO in a secure enclave. A distributed ledger may serve as a “public commit log” to ensure that there is a single, authoritative instance of the object and provide a means of guaranteeing atomicity of updates across interacting objects.

    SECURED CREDENTIAL AGGREGATOR
    16.
    发明申请
    SECURED CREDENTIAL AGGREGATOR 审中-公开
    安全认证集合器

    公开(公告)号:US20160379207A1

    公开(公告)日:2016-12-29

    申请号:US14750992

    申请日:2015-06-25

    Abstract: An apparatus for aggregating secured credentials is described herein. The apparatus includes a processor and a memory. The memory includes code causing the processor to provision a plurality of secured credentials on the apparatus. The code causes the processor to isolate the secured credentials from each other in the memory. The code also causes the processor to emulate a selected secured credential from the secured credentials for a transaction.

    Abstract translation: 本文描述了用于聚合安全凭证的装置。 该装置包括处理器和存储器。 存储器包括使处理器在设备上提供多个安全凭证的代码。 该代码使处理器将存储器中的安全证书彼此隔离开。 该代码还使得处理器从事务的安全凭证中模拟选定的安全凭证。

    Secure key derivation and cryptography logic for integrated circuits
    17.
    发明授权
    Secure key derivation and cryptography logic for integrated circuits 有权
    集成电路的安全密钥导出和加密逻辑

    公开(公告)号:US09390291B2

    公开(公告)日:2016-07-12

    申请号:US13730829

    申请日:2012-12-29

    Abstract: A processor of an aspect includes root key generation logic to generate a root key. The root key generation logic includes a source of static and entropic bits. The processor also includes key derivation logic coupled with the root key generation logic. The key derivation logic is to derive one or more keys from the root key. The processor also includes cryptographic primitive logic coupled with the root key generation logic. The cryptographic primitive logic is to perform cryptographic operations. The processor also includes a security boundary containing the root key generation logic, the key derivation logic, and the cryptographic primitive logic. Other processors, methods, and systems are also disclosed.

    Abstract translation: 一方面的处理器包括生成根密钥的根密钥生成逻辑。 根密钥生成逻辑包括静态和熵位的源。 处理器还包括与根密钥生成逻辑耦合的密钥导出逻辑。 密钥推导逻辑是从根密钥导出一个或多个密钥。 处理器还包括与根密钥生成逻辑耦合的加密原语逻辑。 加密原语逻辑是执行加密操作。 处理器还包括包含根密钥生成逻辑,密钥导出逻辑和密码原语逻辑的安全边界。 还公开了其他处理器,方法和系统。

Patent Agency Ranking