-
公开(公告)号:US10897352B2
公开(公告)日:2021-01-19
申请号:US15755274
申请日:2016-12-15
Applicant: Cryptography Research, Inc
Inventor: Ambuj Kumar , Ronald Perez
Abstract: A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device.
-
公开(公告)号:US11582033B2
公开(公告)日:2023-02-14
申请号:US17119513
申请日:2020-12-11
Applicant: Cryptography Research, Inc
Inventor: Ambuj Kumar , Ronald Perez
Abstract: A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device.
-
公开(公告)号:US11010494B2
公开(公告)日:2021-05-18
申请号:US16566391
申请日:2019-09-10
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US10417453B2
公开(公告)日:2019-09-17
申请号:US15372307
申请日:2016-12-07
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
IPC: G06F9/4401 , G06F21/62 , G06F21/45 , G06F21/60 , G06F21/52
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US12050719B2
公开(公告)日:2024-07-30
申请号:US17321089
申请日:2021-05-14
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
CPC classification number: G06F21/6281 , G06F9/4418 , G06F21/44 , G06F21/45 , G06F21/52 , G06F21/57 , G06F21/602
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US20210357532A1
公开(公告)日:2021-11-18
申请号:US17321089
申请日:2021-05-14
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US20170169254A1
公开(公告)日:2017-06-15
申请号:US15372307
申请日:2016-12-07
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael A. Hamburg , Paul Carl Kocher
CPC classification number: G06F21/6281 , G06F9/4418 , G06F21/45 , G06F21/52 , G06F21/602
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
-
-
-
-
-