-
1.
公开(公告)号:US11991276B2
公开(公告)日:2024-05-21
申请号:US17939385
申请日:2022-09-07
Applicant: STMicroelectronics, Inc.
Inventor: Giuseppe Pilozzi
CPC classification number: H04L9/0866 , G06F8/61 , G06F11/1451 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3226 , G06F2201/84
Abstract: A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.
-
2.
公开(公告)号:US20230006823A1
公开(公告)日:2023-01-05
申请号:US17939385
申请日:2022-09-07
Applicant: STMicroelectronics, Inc.
Inventor: Giuseppe Pilozzi
Abstract: A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.
-
3.
公开(公告)号:US11444759B2
公开(公告)日:2022-09-13
申请号:US16425118
申请日:2019-05-29
Applicant: STMicroelectronics, Inc.
Inventor: Giuseppe Pilozzi
Abstract: A method of cryptographically binding a secure element to a host device includes storing host key information in a host key information slot of the secure element and storing binding information in secure memory of the secure element. The binding information is correlated with the host key information. The method includes storing a second secret key within system operational code of the host device. The second secret key is cryptographically correlated with the host key information. The method includes, after storing the binding information and after storing the second secret key, operationally coupling the secure element to the host device, reading, by the host device, the binding information from the secure element, generating, by the host device, the host key information using the binding information and the second secret key, and storing, by the host device, the host key information in a host key information slot of the host device.
-
4.
公开(公告)号:US20200382294A1
公开(公告)日:2020-12-03
申请号:US16425118
申请日:2019-05-29
Applicant: STMicroelectronics, Inc.
Inventor: Giuseppe Pilozzi
Abstract: A method of cryptographically binding a secure element to a host device includes storing host key information in a host key information slot of the secure element and storing binding information in secure memory of the secure element. The binding information is correlated with the host key information. The method includes storing a second secret key within system operational code of the host device. The second secret key is cryptographically correlated with the host key information. The method includes, after storing the binding information and after storing the second secret key, operationally coupling the secure element to the host device, reading, by the host device, the binding information from the secure element, generating, by the host device, the host key information using the binding information and the second secret key, and storing, by the host device, the host key information in a host key information slot of the host device.
-
-
-