DYNAMIC CONTROL OF TRACE PERMISSIONS IN OPERATING SYSTEMS VIA TRUSTED EXECUTION ENVIRONMENTS

    公开(公告)号:US20250131135A1

    公开(公告)日:2025-04-24

    申请号:US18788751

    申请日:2024-07-30

    Inventor: Zhan Liu

    Abstract: In some implementations, the techniques described herein relate to a system including: an operating system; and a trusted execution environment including a controller and a write-protected storage area, wherein the controller is configured to: receive a command to modify access to trace functionality provided by the operating system, validate the command using a public key stored in the write-protected storage area, and update a register accessible by the operating system based on the command in response to validating the command, wherein the operating system is configured to allow or disallow access to trace functionality based on contents of the register.

    SECURELY MODIFYING ACCESS TO A DEBUG PORT

    公开(公告)号:US20250053498A1

    公开(公告)日:2025-02-13

    申请号:US18927669

    申请日:2024-10-25

    Inventor: Zhan Liu

    Abstract: In some aspects, the techniques described herein relate to a device including: a debug port; a trusted execution environment (TEE), the TEE storing a public key; and a controller, the controller configured to: receive a command to access the debug port, the command including a signature generated using a private key corresponding to the public key; provide the command to the TEE, wherein the TEE validates the command by validating the signature using the public key to obtain a validation result; and modify access to the debug port based on the validation result.

    Embedded TLS protocol for lightweight devices

    公开(公告)号:US12225130B2

    公开(公告)日:2025-02-11

    申请号:US17576889

    申请日:2022-01-14

    Inventor: Zhan Liu

    Abstract: The disclosure relates to improvements in secure channel establishment. In some aspects, the techniques described herein relate to a method including: issuing, by a client device to a server, a request to establish a secure connection; receiving, by the client device, a response to the request to establish a secure connection from the server, the response including a digital certificate associated with a public key stored by the server, the public key used to establish a symmetric key; validating, by the client device, the digital certificate; and computing, by the client device, a shared secret using the public key stored by the server and a private key generated by the client device.

    Embedded hardware security module (HSM)

    公开(公告)号:US12166876B2

    公开(公告)日:2024-12-10

    申请号:US17390049

    申请日:2021-07-30

    Inventor: Zhan Liu

    Abstract: The disclosed embodiments relate to hardware security modules. In one embodiment, a method is disclosed comprising reading a random value from a physically unclonable function (PUF); generating a seed value from the random value; generating a cryptographic key using the seed value; and processing a cryptographic operation using the cryptographic key.

    MEMORY DEVICE WITH SECURE BOOT UPDATES AND SELF RECOVERY

    公开(公告)号:US20240406008A1

    公开(公告)日:2024-12-05

    申请号:US18807757

    申请日:2024-08-16

    Inventor: Zhan Liu

    Abstract: The example embodiments relate to improvements in managing boot code images. In an embodiment, a device is disclosed comprising a memory device, the memory device including a storage array, the storage array comprising a first partition and a second partition, wherein the first partition comprises a writeable partition and the second partition comprises a write-protected partition; and a processor configured to: load a golden boot image from the second partition, display a boot prompt after loading the golden boot image, receive an update boot image, the update boot image including a signature, read a public key from the second partition, validate the signature using the public key, and replace a current boot image stored in the first partition with the update boot image.

    TRUSTED COMPUTE ENVIRONMENT USING A SECURE ELEMENT AND DEVICE IDENTITY COMPOSITION ENGINE (DICE)

    公开(公告)号:US20240267219A1

    公开(公告)日:2024-08-08

    申请号:US18431653

    申请日:2024-02-02

    Inventor: Zhan Liu

    CPC classification number: H04L9/30 H04L9/088 H04L9/3247

    Abstract: In some aspects, the techniques described herein relate to a system including: a Device Identity Composition Engine (DICE) configured to generate asymmetric key pairs for software layers of a computing system; and a secure element (SE), the secure element configured to receive requests for accessing the software layers and validating a request for a given software layer by: generating a nonce, providing the nonce and an identifier of the given software layer to the DICE, receiving a response from the DICE, and validating the response using a public key corresponding to the given software layer to allow access to the given software layer.

    Payload validation for a memory system

    公开(公告)号:US11997212B2

    公开(公告)日:2024-05-28

    申请号:US16453909

    申请日:2019-06-26

    Inventor: Zhan Liu

    Abstract: Methods, systems, and devices for payload validation for a memory system are described. A payload receiver may be a device that includes an array of memory cells configured to store data, and a payload transmitter may be a host of a payload receiver (e.g., a host device) or another device that is in communication with the payload receiver. A payload receiver may be configured to receive an information payload and a signature associated with the information payload. The received signature may be based on the information payload and an identifier of the payload receiver previously provided to the payload transmitter. The payload receiver may generate a signature based on the information payload and the identifier of the payload receiver (e.g., as stored or cached at the payload receiver), and authenticate the information payload based on the received signature and the generated signature.

    VERIFIED KEY REPLACEMENT IN SECURE MEMORY DEVICES

    公开(公告)号:US20230393762A1

    公开(公告)日:2023-12-07

    申请号:US17831370

    申请日:2022-06-02

    Inventor: Zhan Liu

    Abstract: The disclosure relates to improvements in the delivery of cryptographic data to secure memory devices. In some aspects, the techniques described herein relate to a method including: receiving, by a memory device, a command, the command including a public key and a hash of a unique device secret (UDS); generating, by the memory device, a local UDS using the public key and a locally stored private key; generating, by the memory device, a local UDS hash by inputting the local UDS into a hashing algorithm; determining, by the memory device, whether the local UDS hash matches the hash included in the command; writing, by the memory device, the public key to a key storage area if the local UDS hash matches the hash included in the command; and returning, by the memory device, a failure response if the local UDS hash does not match the hash included in the command.

    Secure Firmware Update through a Predefined Server

    公开(公告)号:US20230046674A1

    公开(公告)日:2023-02-16

    申请号:US17399919

    申请日:2021-08-11

    Inventor: Zhan Liu

    Abstract: The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.

    Secure Identity Chaining between Components of Trusted Computing Base

    公开(公告)号:US20220405391A1

    公开(公告)日:2022-12-22

    申请号:US17353497

    申请日:2021-06-21

    Inventor: Zhan Liu

    Abstract: Systems, apparatuses, and methods to secure identity chaining between software/firmware components of trusted computing base. A memory device includes a secure memory region having access control based on cryptography. The secure memory region stores component information about a second component configured to be executed after a first component during booting. Prior to using a component identity of the second component to generate a compound identifier of the first component, health of the second component to be executed is verified based on the component information stored in the secure memory region.

Patent Agency Ranking