Secure storage of private keys
    1.
    发明授权
    Secure storage of private keys 失效
    安全存储私钥

    公开(公告)号:US06950523B1

    公开(公告)日:2005-09-27

    申请号:US09672496

    申请日:2000-09-29

    摘要: To protect a private cryptographic key, two values are derived. The two values together can reconstruct the key. One value is sent to a server and deleted from the local machine. The other value is held by the local machine. To use the key, the user will enter a password, which will be used to authenticate the user to the server, and retrieve the value from the server. The password is also used to unlock the value held by the local machine. The private cryptographic key is thus protected against brute force password attacks without changing the behavior of the user.

    摘要翻译: 为了保护私密密钥,导出了两个值。 这两个值可以重建密钥。 一个值被发送到服务器并从本地机器中删除。 另一个值由本地机器持有。 要使用该密钥,用户将输入一个密码,用于向服务器认证用户,并从服务器检索该值。 该密码也用于解锁本机所持有的值。 因此,私有加密密钥被防止暴力密码攻击,而不改变用户的行为。

    Replacing Blinded Authentication Authority
    2.
    发明申请
    Replacing Blinded Authentication Authority 审中-公开
    更换盲人认证机构

    公开(公告)号:US20110307704A1

    公开(公告)日:2011-12-15

    申请号:US13217151

    申请日:2011-08-24

    IPC分类号: H04L9/32

    摘要: A manufacturing entity provides a blinded signature to a secure device and associates a time with the blinded signature. If a signing key is compromised, the manufacturing entity provides a time of the compromise and the time associated with the blinded signature to the replacement authority.

    摘要翻译: 制造实体向安全设备提供盲目签名,并将时间与盲人签名相关联。 如果一个签名密钥被泄露,制造实体提供了一个妥协的时间和与被替换机构的盲人签名相关联的时间。

    Secure key storage using physically unclonable functions
    6.
    发明授权
    Secure key storage using physically unclonable functions 有权
    使用物理不可克隆功能保护密钥存储

    公开(公告)号:US09544141B2

    公开(公告)日:2017-01-10

    申请号:US13996544

    申请日:2011-12-29

    IPC分类号: H04L29/06 H04L9/08

    摘要: Some implementations disclosed herein provide techniques and arrangements for provisioning keys to integrated circuits/processors. A processor may include physically unclonable functions component, which may generate a unique hardware key based at least on at least one physical characteristic of the processor. The hardware key may be employed in encrypting a key such as a secret key. The encrypted key may be stored in a memory of the processor. The encrypted key may be validated. The integrity of the key may be protected by communicatively isolating at least one component of the processor.

    摘要翻译: 本文公开的一些实施例提供了用于向集成电路/处理器供应密钥的技术和布置。 处理器可以包括物理上不可克隆的功能组件,其可以至少基于处理器的至少一个物理特性来生成唯一的硬件密钥。 硬件密钥可用于加密诸如秘密密钥的密钥。 加密密钥可以存储在处理器的存储器中。 可以验证加密的密钥。 可以通过通信地隔离处理器的至少一个组件来保护密钥的完整性。

    FIRMWARE INTEGRITY VERIFICATION
    9.
    发明申请
    FIRMWARE INTEGRITY VERIFICATION 审中-公开
    固件完整性验证

    公开(公告)号:US20090172639A1

    公开(公告)日:2009-07-02

    申请号:US11965295

    申请日:2007-12-27

    IPC分类号: G06F9/44

    CPC分类号: G06F21/57

    摘要: In some embodiments, the integrity of firmware stored in a non-volatile memory is verified prior to initiation of a firmware reset vector. Other embodiments are described and claimed.

    摘要翻译: 在一些实施例中,在启动固件复位向量之前验证存储在非易失性存储器中的固件的完整性。 描述和要求保护其他实施例。

    RECONFIGURING A SECURE SYSTEM
    10.
    发明申请
    RECONFIGURING A SECURE SYSTEM 有权
    重新建立安全系统

    公开(公告)号:US20080163331A1

    公开(公告)日:2008-07-03

    申请号:US11618649

    申请日:2006-12-29

    IPC分类号: G06F21/00 G06F17/00

    CPC分类号: G06F21/57

    摘要: Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.

    摘要翻译: 公开了用于重新配置安全系统的装置,方法和系统。 在一个实施例中,装置包括配置存储位置,锁定和锁定超驰逻辑。 配置存储位置是存储信息以配置设备。 该锁是为了防止写入配置存储位置。 锁定覆盖逻辑是允许从子操作模式代码执行的指令覆盖锁定。