Updating cryptographic key pair
    3.
    发明授权

    公开(公告)号:US09893885B1

    公开(公告)日:2018-02-13

    申请号:US14658136

    申请日:2015-03-13

    Abstract: A computing device has a processor and a persistent memory, e.g., a fuse-based memory, storing two or more reduced sets of information. The processor is configured to derive a first cryptographic key using a first reduced set of information, e.g., prime numbers, and to use the first cryptographic key for performing cryptographic operations. The processor is also configured to detect a trigger event and, in response to the detected trigger event, derive a second cryptographic key using a second reduced set of information. The processor can then use the second cryptographic key for performing cryptographic operations.

    Updating encrypted cryptographic key

    公开(公告)号:US10154013B1

    公开(公告)日:2018-12-11

    申请号:US15610509

    申请日:2017-05-31

    Abstract: A computing device has a processor and a first memory, e.g., a fuse-based memory, storing a first cryptographic key. The processor is configured to receive information related to a second cryptographic key from a cryptographic key provisioning system. The processor derives the second cryptographic key from the information related to a second cryptographic key. The first cryptographic key has fewer bits than the second cryptographic key. The processor is also configured to encrypt the second cryptographic key using the first cryptographic key, and store the encrypted second cryptographic key in a second memory, e.g., a flash memory.

    Multi-tenant trusted platform modules

    公开(公告)号:US10303879B1

    公开(公告)日:2019-05-28

    申请号:US14535056

    申请日:2014-11-06

    Abstract: A multi-tenant trusted platform module (MTTPM) is attached to a communication bus of a virtualization host. The MTTPM includes a plurality of per-guest-virtual-machine (per-GVM) memory location sets. In response to an indication of a first trusted computing request (TCR) associated with a first GVM of a plurality of GVMs instantiated at the virtualization host, a first memory location of a first per-GVM memory location set is accessed to generate a first response indicative of a configuration of the first GVM. In response to an indication of a second TCR associated with a second GVM, a second memory location of a second-per-GVM memory location set is accessed to generate a second response, wherein the second response is indicative of a different configuration of the second GVM.

    Controlling use of encryption keys
    8.
    发明授权
    Controlling use of encryption keys 有权
    控制加密密钥的使用

    公开(公告)号:US09479340B1

    公开(公告)日:2016-10-25

    申请号:US14673585

    申请日:2015-03-30

    Abstract: A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for authenticating the source of a digital certificate. The computing device also includes a second memory for storing one or more current key version indicators. Each of the current key version indicators is associated with a corresponding secondary public key, and the one or more current key version indicators are used by the processor to determine the trust of the corresponding secondary public key.

    Abstract translation: 计算设备包括处理器和持久存储器,用于存储关于与用于认证数字证书的来源的第一非对称密钥对相关联的第一公共密钥的信息。 计算设备还包括用于存储一个或多个当前密钥版本指示符的第二存储器。 当前密钥版本指示符中的每一个与相应的次级公钥相关联,并且处理器使用一个或多个当前密钥版本指示符来确定对应的次级公钥的信任。

Patent Agency Ranking