Chip, private key generation method, and trusted certification method

    公开(公告)号:US11722300B2

    公开(公告)日:2023-08-08

    申请号:US17181841

    申请日:2021-02-22

    Inventor: Heng Cai

    Abstract: A chip includes a security core module. The security core module includes a security core and a memory. The security core module prevents access of an external module that is inside the chip and that is other than the security core module, and the security core module prevents access of an external device outside the chip. The security core is configured to generate a layer 1 public key and a layer 1 private key based on a hash of a first root public key and a UDS of the chip stored in the memory; and the memory is configured to store the layer 1 private key.

    Chip, Private Key Generation Method, and Trusted Certification Method

    公开(公告)号:US20230403151A1

    公开(公告)日:2023-12-14

    申请号:US18337062

    申请日:2023-06-19

    Inventor: Heng Cai

    Abstract: A chip includes a security core module. The security core module includes a security core and a memory. The security core module prevents access of an external module that is inside the chip and that is other than the security core module, and the security core module prevents access of an external device outside the chip. The security core is configured to generate a layer 1 public key and a layer 1 private key based on a hash of a first root public key and a UDS of the chip stored in the memory; and the memory is configured to store the layer 1 private key.

    DATA INTEGRITY PROTECTION METHOD AND APPARATUS

    公开(公告)号:US20230169216A1

    公开(公告)日:2023-06-01

    申请号:US18062961

    申请日:2022-12-07

    Abstract: A data integrity protection method is applied to an electronic device, and the electronic device stores vendor data and first verification information. The first verification information is stored in a first storage area of the electronic device and is used to perform integrity verification on the vendor data. The method includes: First data is obtained. Digital signature is performed on the first data to generate second data and second verification information. The second data and the second verification information are stored, where the second verification information is stored in a second storage area of the electronic device. According to the data integrity protection method provided in this embodiment of this application, firmware or software customized by a third-party integrator is supported in being reloaded to a system for running, thereby simplifying a process and improving integrated development efficiency of an electronic device.

    Chip, Private Key Generation Method, and Trusted Certification Method

    公开(公告)号:US20210176056A1

    公开(公告)日:2021-06-10

    申请号:US17181841

    申请日:2021-02-22

    Inventor: Heng Cai

    Abstract: A chip includes a security core module. The security core module includes a security core and a memory. The security core module prevents access of an external module that is inside the chip and that is other than the security core module, and the security core module prevents access of an external device outside the chip. The security core is configured to generate a layer 1 public key and a layer 1 private key based on a hash of a first root public key and a UDS of the chip stored in the memory; and the memory is configured to store the layer 1 private key.

Patent Agency Ranking