PROTECTING CRYPTOGRAPHIC KEYS STORED IN NON-VOLATILE MEMORY

    公开(公告)号:US20220405404A1

    公开(公告)日:2022-12-22

    申请号:US17854295

    申请日:2022-06-30

    Abstract: Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory.

    RANDOM ACCESSING
    3.
    发明申请

    公开(公告)号:US20220293152A1

    公开(公告)日:2022-09-15

    申请号:US17636982

    申请日:2020-08-14

    Abstract: A random number generator selects addresses while a ‘scoreboard’ bank of registers (or bits) tracks which addresses have already been output (e.g., for storing or retrieval of a portion of the data.) When the scoreboard detects an address has already been output, a second address which has not been used yet is output rather than the randomly selected one. The second address may be selected from nearby addresses that have not already been output.

    AUTHENTICATION USING AN EPHEMERAL ASYMMETRIC KEYPAIR

    公开(公告)号:US20230155845A1

    公开(公告)日:2023-05-18

    申请号:US17915367

    申请日:2021-03-26

    CPC classification number: H04L9/3271 H04L9/0825 H04L9/3073 H04L9/3218

    Abstract: A prover chip uses a key multiplier value generated by a proof-of-work function from a challenge value, a random number, and elliptic curve cryptography (ECC) techniques to generate a one-time (or ephemeral) use private key. Similarly, a verifier chip uses the key multiplier value generated by an equivalent proof-of-work function, a public key received from the prover, and ECC techniques to derive a one-time use public key that corresponds to the ephemeral private key generated by the prover chip. The prover chip uses the ephemeral private key to sign the second challenge value and send this signed second challenge value to the verifier chip. The verifier verifies the value it receives using the one-time use public key and if the signature on the second challenge value is valid, authenticates the prover chip to a system.

    PROTECTING CRYPTOGRAPHIC KEYS STORED IN NON-VOLATILE MEMORY

    公开(公告)号:US20210081547A1

    公开(公告)日:2021-03-18

    申请号:US16963724

    申请日:2019-01-30

    Abstract: Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory.

    INTEGRATED CIRCUIT SHIELD
    7.
    发明申请

    公开(公告)号:US20200328163A1

    公开(公告)日:2020-10-15

    申请号:US16838577

    申请日:2020-04-02

    Abstract: An anti-tamper layer is applied to a blank wafer. The layered wafer is then diced into shield dies. A shield die is oxide-to-oxide bonded to the top of an active die such that removing the shield die will damage the active die. The shield die may be sized and positioned such that wirebond pads along one or more edges of the active die remain exposed. The exposed wirebond pads may be used to electrically connect, via wirebonds, the active die to a substrate. A second shield die may be attached to the bottom of the active die to help protect against the use of bottom-to-top delayering.

Patent Agency Ranking