-
公开(公告)号:US20250005172A1
公开(公告)日:2025-01-02
申请号:US18353727
申请日:2023-07-17
Applicant: NVIDIA Corporation
Inventor: Taek RYOO , Stephen WOLFE , Akshay SHARAN , Mihir JOSHI , Mustafa BILGEN , Mahesh LAGADAPATI , Tao YE , Santosh KATVATE , Arun GONA
Abstract: Embodiments of the present disclosure relate to a method of encrypting a secret storage structure. The method may include storing a secret in a secret storage structure. The secret storage structure may be encrypted by encrypting the secret using a wrap key that is generated based at least on a hardware-based root key and a first context. The secret storage structure may additionally be encrypted by encrypting the secret storage structure using an authentication key that is generated based at least on the hardware-based root key and a second context.
-
2.
公开(公告)号:US20250119288A1
公开(公告)日:2025-04-10
申请号:US18424555
申请日:2024-01-26
Applicant: NVIDIA CORPORATION
Inventor: Stephen Aaron WOLFE , Mihir JOSHI , Tao YE , Mustafa Yigit BILGEN , Hyung Taek RYOO , Arun GONA , Santosh KATVATE
Abstract: In various examples, a technique for verifying data integrity is disclosed that includes receiving a request to access a data block of a plurality of data blocks stored in a non-secure memory. The technique further includes identifying, in a secure memory, an authentication token associated with the data block. The technique also includes generating an updated authentication token based on the data block. The technique further includes determining whether the updated authentication token corresponds to the identified authentication token stored in the secure memory. The technique still further includes in response to determining that the updated authentication token corresponds to the identified authentication token stored in the secure memory, performing one or more operations using the data block.
-
公开(公告)号:US20250112920A1
公开(公告)日:2025-04-03
申请号:US18486988
申请日:2023-10-13
Applicant: NVIDIA CORPORATION
Inventor: William Joseph ARMSTRONG , Chao-Lin CHIU , Mihir JOSHI , Nikesh OSWAL , Mark Alan OVERBY , Hyung Taek RYOO
Abstract: In various examples, a technique for securely transmitting CAN (Controller Area Network) messages is disclosed that includes receiving, using a cryptographic engine, a message from an application to be transmitted over a CAN (Controller Area Network) bus, wherein the cryptographic engine executes a secure firmware and is implemented on an on-die discrete processor. The technique further includes accessing, using the secure firmware, a key from a plurality of keys associated with an authentication process from a secure memory associated with the cryptographic engine. Additionally, the technique includes computing an authentication tag using the key and the message and transmitting the message with the authentication tag over the CAN bus to a destination address.
-
-