SECURE COMPUTATION ENVIRONMENT
    1.
    发明申请

    公开(公告)号:US20180181760A1

    公开(公告)日:2018-06-28

    申请号:US15739105

    申请日:2016-08-10

    Inventor: Ambuj KUMAR

    Abstract: A container corresponding to executable code may be received. In response to receiving the container, a container manager resident in a memory of a computation environment may be executed to verify the container. The container manager may be verified by a boot loader of the computation environment. Permissions of the container to access the resources of a computation environment may be determined after the verification of the container by the container manager. Access to one or more resources of the computation environment may be provided by transferring control to the one or more resources from the container manager to the container based on the permissions of the container for the resources of the computation environment.

    SECURE COMPUTATION ENVIRONMENT
    6.
    发明申请

    公开(公告)号:US20220382874A1

    公开(公告)日:2022-12-01

    申请号:US17650544

    申请日:2022-02-10

    Inventor: Ambuj KUMAR

    Abstract: A container corresponding to executable code may be received. In response to receiving the container, a container manager resident in a memory of a computation environment may be executed to verify the container. The container manager may be verified by a boot loader of the computation environment. Permissions of the container to access the resources of a computation environment may be determined after the verification of the container by the container manager. Access to one or more resources of the computation environment may be provided by transferring control to the one or more resources from the container manager to the container based on the permissions of the container for the resources of the computation environment.

    CRYPTOGRAPHIC MANAGEMENT OF LIFECYCLE STATES

    公开(公告)号:US20210160063A1

    公开(公告)日:2021-05-27

    申请号:US17119513

    申请日:2020-12-11

    Abstract: A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device.

    DEVICE WITH MULTIPLE ROOTS OF TRUST
    8.
    发明申请

    公开(公告)号:US20180357183A1

    公开(公告)日:2018-12-13

    申请号:US15780005

    申请日:2016-12-01

    Abstract: A container from a first root of trust associated with a first root entity may be received. The container may correspond to a mapping of a resource of an integrated circuit that is associated with the first root entity. The container may be verified based on a key that corresponds to the first root of trust and that is stored in the integrated circuit at manufacturing of the integrated circuit. An identification may be made that an assignment of the resource from the container corresponds to assigning the resource from the first root of trust to a new root of trust. A new key corresponding to the new root of trust may be generated. Information corresponding to the new key may be stored into a memory of the integrated circuit. Furthermore, the new key may be used to delegate the resource to a subsequent container.

    CRYPTOGRAPHIC MANAGEMENT OF LIFECYCLE STATES

    公开(公告)号:US20180248688A1

    公开(公告)日:2018-08-30

    申请号:US15755274

    申请日:2016-12-15

    CPC classification number: H04L9/0861 G09C1/00 H04L9/085 H04L9/0891

    Abstract: A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device.

Patent Agency Ranking