Security chip and application processor
First Claim
1. An operating method of a security chip, the operating method comprising:
- performing, at the security chip,transmitting, to an application processor (AP), a device public key of a device key pair, the device key pair associated with public key infrastructure communications;
receiving a request, from the AP, to generate a digital signature on a certificate form, the certificate form including the device public key;
generating the digital signature, based on the received request to generate the digital signature, the digital signature generated based on an encryption operation using a certificate authority (CA) private key;
transmitting the digital signature to the AP;
receiving a certificate from the AP, the certificate including the digital signature; and
storing the certificate at the security chip.
1 Assignment
0 Petitions
Accused Products
Abstract
A security chip and an application processor may be included in a device configured to engage in encrypted communications with an external client, including public key infrastructure communications, in an environment where a certificate authority is absent. The security chip may provide the application processor with a device public key from among a pair of device keys related to public key infrastructure communications, receive a request from the application processor to generate a digital signature on a certificate form including the device public key, provide the application processor with a digital signature generated based on an encryption operation using a certificate authority private key, and receive and store a certificate including the digital signature from the application processor.
-
Citations
15 Claims
-
1. An operating method of a security chip, the operating method comprising:
-
performing, at the security chip, transmitting, to an application processor (AP), a device public key of a device key pair, the device key pair associated with public key infrastructure communications; receiving a request, from the AP, to generate a digital signature on a certificate form, the certificate form including the device public key; generating the digital signature, based on the received request to generate the digital signature, the digital signature generated based on an encryption operation using a certificate authority (CA) private key; transmitting the digital signature to the AP; receiving a certificate from the AP, the certificate including the digital signature; and storing the certificate at the security chip. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
generating, at an application processor (AP), a certificate form based on a device public key received from a semiconductor chip; transmitting a request, from the AP to the semiconductor chip, to generate a digital signature associated with the certificate form, such that the semiconductor chip generates the digital signature; receiving the requested digital signature from the semiconductor chip; generating, at the AP, a certificate that includes the requested digital signature, based on receiving the requested digital signature from the semiconductor chip, the digital signature being generated at the semiconductor chip according to a certificate authority (CA) private key; and transmitting the generated certificate to the semiconductor chip. - View Dependent Claims (12, 13, 14, 15)
-
Specification