VERIFIABLE REMOTE RESOURCE MANAGEMENT FOR CRYPTOGRAPHIC DEVICES

    公开(公告)号:US20240056295A1

    公开(公告)日:2024-02-15

    申请号:US18229328

    申请日:2023-08-02

    CPC classification number: H04L9/088 G06F8/65

    Abstract: Aspects of the present disclosure involve a method, a system and a computer readable memory to perform a secure update of a target device, including communicating an update instruction to the target device, generating one or more data values using the update instruction, generating a first authentication value using the data value(s), receiving a second authentication value from the target device, wherein the second authentication value is generated by the target device in response to the update instruction, and determining whether the secure update has been successful based on a comparison of the first authentication value and the second authentication value.

    Integrated circuit shield
    4.
    发明授权

    公开(公告)号:US11329010B2

    公开(公告)日:2022-05-10

    申请号:US16838577

    申请日:2020-04-02

    Abstract: An anti-tamper layer is applied to a blank wafer. The layered wafer is then diced into shield dies. A shield die is oxide-to-oxide bonded to the top of an active die such that removing the shield die will damage the active die. The shield die may be sized and positioned such that wirebond pads along one or more edges of the active die remain exposed. The exposed wirebond pads may be used to electrically connect, via wirebonds, the active die to a substrate. A second shield die may be attached to the bottom of the active die to help protect against the use of bottom-to-top delayering.

    LOCATION AWARE CRYPTOGRAPHY
    5.
    发明申请

    公开(公告)号:US20200007328A1

    公开(公告)日:2020-01-02

    申请号:US16445708

    申请日:2019-06-19

    Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.

Patent Agency Ranking