Protecting media items using a media security controller

    公开(公告)号:US10120985B2

    公开(公告)日:2018-11-06

    申请号:US14415568

    申请日:2013-07-17

    Abstract: A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device.

    Modular exponentiation optimization for cryptographic systems
    25.
    发明授权
    Modular exponentiation optimization for cryptographic systems 有权
    加密系统的模块化求幂优化

    公开(公告)号:US09444623B2

    公开(公告)日:2016-09-13

    申请号:US14567954

    申请日:2014-12-11

    CPC classification number: H04L9/302 H04L2209/12

    Abstract: A processing device, such as logic on an integrated circuit may identify a cryptographic message stored in a first register. The processing device may determine a plurality of components for a second power of the cryptographic message using a plurality of components of the cryptographic message. The processing device may determine the plurality of components for the second power of the cryptographic message without storing the entire second power of the cryptographic message. Further, the processing device may determine a third power of the cryptographic message using modular arithmetic. The processing device may determine the third power by transforming the plurality of components for the second power of the cryptographic message and the plurality of components of the cryptographic message.

    Abstract translation: 诸如集成电路上的逻辑的处理设备可以标识存储在第一寄存器中的密码消息。 处理设备可以使用密码消息的多个组件来确定密码消息的第二功率的多个组件。 处理设备可以确定用于加密消息的第二功率的多个组件,而不存储密码消息的整个第二功率。 此外,处理装置可以使用模数运算来确定密码消息的第三功率。 处理设备可以通过对密码消息的第二功率的多个组件和密码消息的多个组件进行变换来确定第三功率。

    MODULAR EXPONENTIATION OPTIMIZATION FOR CRYPTOGRAPHIC SYSTEMS
    27.
    发明申请
    MODULAR EXPONENTIATION OPTIMIZATION FOR CRYPTOGRAPHIC SYSTEMS 有权
    组合系统的模块化优化优化

    公开(公告)号:US20150180652A1

    公开(公告)日:2015-06-25

    申请号:US14567954

    申请日:2014-12-11

    CPC classification number: H04L9/302 H04L2209/12

    Abstract: A processing device, such as logic on an integrated circuit may identify a cryptographic message stored in a first register. The processing device may determine a plurality of components for a second power of the cryptographic message using a plurality of components of the cryptographic message. The processing device may determine the plurality of components for the second power of the cryptographic message without storing the entire second power of the cryptographic message. Further, the processing device may determine a third power of the cryptographic message using modular arithmetic. The processing device may determine the third power by transforming the plurality of components for the second power of the cryptographic message and the plurality of components of the cryptographic message.

    Abstract translation: 诸如集成电路上的逻辑的处理设备可以标识存储在第一寄存器中的密码消息。 处理设备可以使用密码消息的多个组件来确定密码消息的第二功率的多个组件。 处理设备可以确定用于加密消息的第二功率的多个组件,而不存储密码消息的整个第二功率。 此外,处理装置可以使用模数运算来确定密码消息的第三功率。 处理设备可以通过对密码消息的第二功率的多个组件和密码消息的多个组件进行变换来确定第三功率。

    SECURITY CHIP WITH RESISTANCE TO EXTERNAL MONITORING ATTACKS

    公开(公告)号:US20220083665A1

    公开(公告)日:2022-03-17

    申请号:US17382333

    申请日:2021-07-21

    Abstract: A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.

Patent Agency Ranking