Speculative Activation for Secure Element Usage

    公开(公告)号:US20230023587A1

    公开(公告)日:2023-01-26

    申请号:US17758277

    申请日:2020-03-12

    Applicant: Google LLC

    Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

    Securing External Data Storage for a Secure Element Integrated on a System-on-Chip

    公开(公告)号:US20220156411A1

    公开(公告)日:2022-05-19

    申请号:US17439368

    申请日:2019-08-29

    Applicant: Google LLC

    Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.

    Undefined Lifecycle State Identifier for Managing Security of an Integrated Circuit Device

    公开(公告)号:US20240427944A1

    公开(公告)日:2024-12-26

    申请号:US18825815

    申请日:2024-09-05

    Applicant: Google LLC

    Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.

    Undefined lifecycle state identifier for managing security of an integrated circuit device

    公开(公告)号:US12141331B2

    公开(公告)日:2024-11-12

    申请号:US17636892

    申请日:2020-08-24

    Applicant: Google LLC

    Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.

    Secure Element that Leverages External Resources

    公开(公告)号:US20230020841A1

    公开(公告)日:2023-01-19

    申请号:US17757957

    申请日:2020-02-27

    Applicant: Google LLC

    Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.

    Speculative activation for secure element usage

    公开(公告)号:US12232041B2

    公开(公告)日:2025-02-18

    申请号:US17758277

    申请日:2020-03-12

    Applicant: Google LLC

    Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

    Secure element that leverages external resources

    公开(公告)号:US12229309B2

    公开(公告)日:2025-02-18

    申请号:US17757957

    申请日:2020-02-27

    Applicant: Google LLC

    Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.

    Securing external data storage for a secure element integrated on a system-on-chip

    公开(公告)号:US12169588B2

    公开(公告)日:2024-12-17

    申请号:US17439368

    申请日:2019-08-29

    Applicant: Google LLC

    Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.

    Undefined Lifecycle State Identifier for Managing Security of an Integrated Circuit Device

    公开(公告)号:US20220269825A1

    公开(公告)日:2022-08-25

    申请号:US17636892

    申请日:2020-08-24

    Applicant: Google LLC

    Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.

Patent Agency Ranking