Protection against key tampering
    2.
    发明授权

    公开(公告)号:US09607178B2

    公开(公告)日:2017-03-28

    申请号:US14220937

    申请日:2014-03-20

    Inventor: Ron Keidar

    CPC classification number: G06F21/79 H04L9/004

    Abstract: Disclosed is an apparatus and method to protect against key tampering. A computing device may include a cryptoprocessor that is configured to: write a first word including a first portion of a key; and write a plurality of subsequent words each including a portion of the key. If a same word is written more than once, the key is reset and not validated.

    Adaptive access control for hardware blocks

    公开(公告)号:US10176139B2

    公开(公告)日:2019-01-08

    申请号:US15595579

    申请日:2017-05-15

    Abstract: System and method for providing adaptive access to a hardware block on a computer system. In one embodiment, a method includes receiving a first access request and a second access request with an access controller, wherein the second access request is received sequentially after the first access request, and the first access request includes a first master identification and the second access request includes a second master identification, determining if the second master identification is equal to the first master identification, providing access to the second access request if the second master identification is equal to the first master identification, wherein the first master identification is associated with one or more hardware block interface values, invalidating the one or more hardware block interface values associated with the first master identification if the second master identification is not equal to the first master identification, and associating the one or more hardware block interface values with the second master identification and a corresponding privilege.

    Secure data re-encryption
    4.
    发明授权

    公开(公告)号:US10027640B2

    公开(公告)日:2018-07-17

    申请号:US14862059

    申请日:2015-09-22

    Abstract: A method includes: decrypting, in a device, a first subset of encrypted data using a cryptographic device key associated with the device to produce first plain text, where a set of encrypted data comprises the first subset of encrypted data and a second subset of encrypted data, and where the first subset of encrypted data and the second subset of encrypted data each contain less encrypted data than the set of encrypted data and are different from each other; decrypting, in the device, the second subset of encrypted data using the cryptographic device key to produce second plain text; encrypting, in the device, the first plain text using a first ephemeral key to produce first re-encrypted data; and encrypting, in the device, the second plain text using a second ephemeral key to produce second re-encrypted data, the second ephemeral key being different from the first ephemeral key.

    Secure execution environment communication
    5.
    发明授权
    Secure execution environment communication 有权
    安全执行环境通信

    公开(公告)号:US09553721B2

    公开(公告)日:2017-01-24

    申请号:US14610832

    申请日:2015-01-30

    Inventor: Ron Keidar

    Abstract: A of a method of securely transferring information between execution environments includes: receiving, at a crypto engine, original plaintext from a first execution environment; obtaining a first cryptographic key by the crypto engine, the first cryptographic key being retained in memory such that the first cryptographic key is associated with the first execution environment and a second execution environment that is not the first execution environment; encrypting the original plaintext by the crypto engine using the first cryptographic key to produce encrypted information, and storing the encrypted information in an intermediate storage location; obtaining, at the crypto engine, the encrypted information from the intermediate storage location; decrypting the encrypted information by the crypto engine using the first cryptographic key to produce reconstituted plaintext; and making the reconstituted plaintext available to the second execution environment by the crypto engine.

    Abstract translation: 在执行环境之间安全地传送信息的方法A包括:在密码引擎处从第一执行环境接收原始明文; 由所述密码引擎获取第一加密密钥,所述第一加密密钥保留在所述存储器中,使得所述第一加密密钥与所述第一执行环境相关联,所述第二执行环境不是所述第一执行环境; 通过加密引擎使用第一加密密钥加密原始明文以产生加密信息,并将加密信息存储在中间存储位置; 在所述密码引擎处获取来自所述中间存储位置的加密信息; 使用所述第一加密密钥对所述加密引擎解密所述加密信息,以产生重构的明文; 并且通过密码引擎使重构的明文可用于第二执行环境。

    Apparatus and method to set the speed of a clock
    6.
    发明授权
    Apparatus and method to set the speed of a clock 有权
    设置时钟速度的装置和方法

    公开(公告)号:US09547331B2

    公开(公告)日:2017-01-17

    申请号:US14244626

    申请日:2014-04-03

    CPC classification number: G06F1/08 G06F1/324 Y02D10/126

    Abstract: Disclosed is an apparatus and method to set the speed of a clock. A computing device may include a processor and a scheduler of the processor, the scheduler may be configured to: receive a plurality of votes for requested bandwidths from a plurality of different execution environments; sum the requested bandwidths; and set the clock speed based upon the sum of the requested bandwidths.

    Abstract translation: 公开了一种设置时钟速度的装置和方法。 计算设备可以包括处理器和处理器的调度器,调度器可以被配置为:从多个不同的执行环境接收所请求的带宽的多个投票; 对请求的带宽求和; 并且基于所请求的带宽的和来设置时钟速度。

    Video content tracking
    7.
    发明授权
    Video content tracking 有权
    视频内容跟踪

    公开(公告)号:US09369754B2

    公开(公告)日:2016-06-14

    申请号:US14304721

    申请日:2014-06-13

    Abstract: Disclosed is an apparatus and method to determine usage rules for video content by buffer tracking. A computing device may include a secure processor configured to: store digital rights management (DRM) rules associated with a DRM key and usage rules for a session; command a cryptoprocessor to decrypt video content with the DRM key and to log an output buffer designation of the command to decrypt the video content. The secure processor may command a buffer tracking table to store the output buffer designation of the cryptoprocessor of the command to decrypt and the associated usage rules and a plurality of input and output buffer designations from a plurality of video content drivers, such that, based upon a buffer designation from an output driver to display video content received by the secure processor, the secure processor may determine usage rules to be applied to the decrypted video content for display.

    Abstract translation: 公开了一种通过缓冲器跟踪来确定视频内容的使用规则的装置和方法。 计算设备可以包括安全处理器,其被配置为:存储与DRM密钥相关联的数字版权管理(DRM)规则和会话的使用规则; 命令密码处理器用DRM密钥解密视频内容,并记录命令的输出缓冲区指定以解密视频内容。 安全处理器可以命令缓冲器跟踪表来存储命令的密码处理器的输出缓冲器指定以解密和相关联的使用规则以及来自多个视频内容驱动器的多个输入和输出缓冲器指定,使得基于 来自输出驱动器的缓冲器指定以显示由安全处理器接收的视频内容,安全处理器可以确定要应用于解密的视频内容以供显示的使用规则。

Patent Agency Ranking