SECURE ASSET MANAGEMENT INFRASTRUCTURE FOR ENFORCING ACCESS CONTROL POLICIES

    公开(公告)号:US20250023872A1

    公开(公告)日:2025-01-16

    申请号:US18702638

    申请日:2022-10-18

    Abstract: An application executing at a first platform receives, from a tester device, a first request to generate a secure data asset. Responsive to authenticating the client, the application sends, to a second platform, a second request to determine whether the client has access to the secure data asset. Responsive to receiving an indication, from the second platform, that the client has access to the secure data asset, the application performs one or more operations to generate the secure data asset. The application sends, to the tester device, the generated secure data asset.

    SUPPLY CHAIN SECURITY MANAGER
    2.
    发明申请

    公开(公告)号:US20240427921A1

    公开(公告)日:2024-12-26

    申请号:US18739831

    申请日:2024-06-11

    Abstract: A system receives, from a first provisioning entity, a request for first secure device data related to a semiconductor device. The first secure device data is associated with one or more provisioning operations performed, on the semiconductor device, by a second provisioning entity. Based on determining that the first provisioning entity has permission to access the first secure device data, the first secure device data is provided to the first provisioning entity. Second secure device data associated with one or more provisioning operations performed by the first provisioning entity on the semiconductor device is received from the first provisioning entity.

    FUNCTIONS WITH A PRE-CHARGE OPERATION AND AN EVALUATION OPERATION

    公开(公告)号:US20240396709A1

    公开(公告)日:2024-11-28

    申请号:US18670037

    申请日:2024-05-21

    Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.

Patent Agency Ranking