Controlling use of encryption keys
First Claim
Patent Images
1. A system-on-chip, comprising:
- a processor;
a fuse-based memory storing;
information for deriving a first public key for a first asymmetric key pair; and
one or more current key version numbers, each associated with a corresponding secondary public key;
wherein, in a secure boot process, the processor is configured to;
load a digital certificate that includes a secondary public key for a second asymmetric key pair and a key version number associated with the secondary public key;
authenticate the digital certificate using the first public key;
compare a key version number for the secondary public key provided by the digital certificate with a corresponding current key version number in the fuse-based memory;
if the key version number for the secondary public key is lower than the current key version number, determine that the secondary public key is not a trusted public key; and
if the key version number for the secondary public key is equal to or higher than the current key version number, determine that the secondary public key is a trusted public key;
wherein the processor is configured to replace an old secondary public key with a new trusted secondary public key if the key version number for the new secondary public key is equal to or higher than the current key version number.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for authenticating the source of a digital certificate. The computing device also includes a second memory for storing one or more current key version indicators. Each of the current key version indicators is associated with a corresponding secondary public key, and the one or more current key version indicators are used by the processor to determine the trust of the corresponding secondary public key.
-
Citations
19 Claims
-
1. A system-on-chip, comprising:
-
a processor; a fuse-based memory storing; information for deriving a first public key for a first asymmetric key pair; and one or more current key version numbers, each associated with a corresponding secondary public key; wherein, in a secure boot process, the processor is configured to; load a digital certificate that includes a secondary public key for a second asymmetric key pair and a key version number associated with the secondary public key; authenticate the digital certificate using the first public key; compare a key version number for the secondary public key provided by the digital certificate with a corresponding current key version number in the fuse-based memory; if the key version number for the secondary public key is lower than the current key version number, determine that the secondary public key is not a trusted public key; and if the key version number for the secondary public key is equal to or higher than the current key version number, determine that the secondary public key is a trusted public key; wherein the processor is configured to replace an old secondary public key with a new trusted secondary public key if the key version number for the new secondary public key is equal to or higher than the current key version number. - View Dependent Claims (2, 3, 4)
-
-
5. A computing device, comprising:
-
a processor; a persistent memory storing information about a first public key associated with a first asymmetric key pair for authenticating a digital certificate; and a second memory storing one or more current key version indicators, each associated with a corresponding secondary public key, wherein the processor is configured to use the one or more current key version indicators to determine whether to trust the corresponding secondary public key; wherein the processor is configured to replace an old secondary public key with a new trusted secondary public key if the key version number for the new secondary public key is equal to or higher than the current key version number. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for a provisioning server to deliver a cryptographic key to a computing device, the computing device having a first public key associated with a first asymmetric key pair for authenticating a digital certificate, the method comprising:
-
generating a second public key associated with a second asymmetric key pair and a corresponding key version number; generating a digital certificate including the first public key, the generated digital certificate further including the second public key and the corresponding key version number associated with the second public key; signing the generated digital certificate; and sending the generated digital certificate to the computing device, wherein the computing device is configured to; authenticate the generated digital certificate using the first public key; and extract the second public key and the key version number from the generated digital certificate; use the key version number to determine that the secondary public key is a trusted secondary public key; and replace an old secondary public key with the new trusted secondary public key. - View Dependent Claims (17, 18, 19)
-
Specification