-
公开(公告)号:US20230023587A1
公开(公告)日:2023-01-26
申请号:US17758277
申请日:2020-03-12
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani , Benjamin K. Dodge
Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.
-
公开(公告)号:US20220156411A1
公开(公告)日:2022-05-19
申请号:US17439368
申请日:2019-08-29
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Osman Koyuncu
Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.
-
3.
公开(公告)号:US20240427944A1
公开(公告)日:2024-12-26
申请号:US18825815
申请日:2024-09-05
Applicant: Google LLC
Inventor: Andrei Tudor Stratan , Olivier Jean Benoit
Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.
-
4.
公开(公告)号:US12141331B2
公开(公告)日:2024-11-12
申请号:US17636892
申请日:2020-08-24
Applicant: Google LLC
Inventor: Andrei Tudor Stratan , Olivier Jean Benoit
Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.
-
公开(公告)号:US20230020841A1
公开(公告)日:2023-01-19
申请号:US17757957
申请日:2020-02-27
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani
Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.
-
公开(公告)号:US12232041B2
公开(公告)日:2025-02-18
申请号:US17758277
申请日:2020-03-12
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani , Benjamin K. Dodge
IPC: H04W52/02 , G01S5/02 , G06F1/3287 , G06F21/35 , G06F21/77 , G06K7/10 , H04B5/72 , H04L9/40 , H04W4/80 , H04W12/06 , H04W12/08 , H04W12/63 , H04W12/65
Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.
-
公开(公告)号:US12229309B2
公开(公告)日:2025-02-18
申请号:US17757957
申请日:2020-02-27
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani
Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.
-
公开(公告)号:US12169588B2
公开(公告)日:2024-12-17
申请号:US17439368
申请日:2019-08-29
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Osman Koyuncu
Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.
-
9.
公开(公告)号:US20220269825A1
公开(公告)日:2022-08-25
申请号:US17636892
申请日:2020-08-24
Applicant: Google LLC
Inventor: Andrei Tudor Stratan , Olivier Jean Benoit
Abstract: This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state.
-
-
-
-
-
-
-
-