-
公开(公告)号:US20210344657A1
公开(公告)日:2021-11-04
申请号:US17306526
申请日:2021-05-03
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Ambuj Kumar , William Craig Rawlings
Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
-
2.
公开(公告)号:US20170250967A1
公开(公告)日:2017-08-31
申请号:US15507638
申请日:2015-08-24
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Ambuj Kumar , William Craig Rawlings
CPC classification number: H04L63/061 , H04L9/0866 , H04L9/0869 , H04L9/3271 , H04L63/0853 , H04L2209/80 , H04L2463/061 , H04W12/003 , H04W12/04 , H04W12/06
Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
-
公开(公告)号:US11521203B2
公开(公告)日:2022-12-06
申请号:US15203722
申请日:2016-07-06
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Philippe Martineau , William Craig Rawlings , Helena Handschuh
Abstract: A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key.
-
公开(公告)号:US10417453B2
公开(公告)日:2019-09-17
申请号:US15372307
申请日:2016-12-07
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
IPC: G06F9/4401 , G06F21/62 , G06F21/45 , G06F21/60 , G06F21/52
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US11882102B2
公开(公告)日:2024-01-23
申请号:US17306526
申请日:2021-05-03
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Ambuj Kumar , William Craig Rawlings
CPC classification number: H04L63/061 , H04L9/0866 , H04L9/0869 , H04L9/3271 , H04L63/0853 , H04W12/04 , H04W12/06 , H04W12/50 , H04L2209/80 , H04L2463/061
Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
-
公开(公告)号:US11789625B2
公开(公告)日:2023-10-17
申请号:US17876960
申请日:2022-07-29
Applicant: Cryptography Research, Inc.
Inventor: Benjamin Che-Ming Jun , William Craig Rawlings , Ambuj Kumar , Mark Evan Marson
CPC classification number: G06F3/0637 , G06F3/0622 , G06F3/0688 , G06F21/71 , G06F21/76 , G11C17/16 , G11C17/18
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
公开(公告)号:US10999264B2
公开(公告)日:2021-05-04
申请号:US15507638
申请日:2015-08-24
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Ambuj Kumar , William Craig Rawlings
Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
-
公开(公告)号:US11216389B2
公开(公告)日:2022-01-04
申请号:US15780005
申请日:2016-12-01
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Ambuj Kumar , William Craig Rawlings
Abstract: A container from a first root of trust associated with a first root entity may be received. The container may correspond to a mapping of a resource of an integrated circuit that is associated with the first root entity. The container may be verified based on a key that corresponds to the first root of trust and that is stored in the integrated circuit at manufacturing of the integrated circuit. An identification may be made that an assignment of the resource from the container corresponds to assigning the resource from the first root of trust to a new root of trust. A new key corresponding to the new root of trust may be generated. Information corresponding to the new key may be stored into a memory of the integrated circuit. Furthermore, the new key may be used to delegate the resource to a subsequent container.
-
公开(公告)号:US11010494B2
公开(公告)日:2021-05-18
申请号:US16566391
申请日:2019-09-10
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , William Craig Rawlings , Ronald Perez , Denis Alexandrovich Pochuev , Michael Alexander Hamburg , Paul Kocher
Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.
-
公开(公告)号:US10860229B2
公开(公告)日:2020-12-08
申请号:US15512041
申请日:2015-08-31
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Benjamin Che-Ming Jun , William Craig Rawlings , Ambuj Kumar , Mark Evan Marson
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
-
-
-
-
-
-
-
-