×

Controlling use of encryption keys

  • US 10,116,645 B1
  • Filed: 10/20/2016
  • Issued: 10/30/2018
  • Est. Priority Date: 03/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system-on-chip, comprising:

  • a processor;

    a fuse-based memory storing;

    information for deriving a first public key for a first asymmetric key pair; and

    one or more current key version numbers, each associated with a corresponding secondary public key;

    wherein, in a secure boot process, the processor is configured to;

    load a digital certificate that includes a secondary public key for a second asymmetric key pair and a key version number associated with the secondary public key;

    authenticate the digital certificate using the first public key;

    compare a key version number for the secondary public key provided by the digital certificate with a corresponding current key version number in the fuse-based memory;

    if the key version number for the secondary public key is lower than the current key version number, determine that the secondary public key is not a trusted public key; and

    if the key version number for the secondary public key is equal to or higher than the current key version number, determine that the secondary public key is a trusted public key;

    wherein the processor is configured to replace an old secondary public key with a new trusted secondary public key if the key version number for the new secondary public key is equal to or higher than the current key version number.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×