×

Keying infrastructure

  • US 10,419,216 B2
  • Filed: 03/14/2017
  • Issued: 09/17/2019
  • Est. Priority Date: 09/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. One or more non-transitory computer-readable media storing computer-executable instructions, the computer-executable instructions upon execution, to instruct one or more processors to perform operations comprising:

  • generating an encryption key hierarchy with a key derivation function, the encryption key hierarchy including (i) a Trusted Execution Environment (TrEE) loader encryption key that is associated with a current security configuration of a TrEE loader and (ii) a TrEE encryption key that is associated with a current security configuration of a TrEE core, the TrEE encryption key being generated based at least in part on the TrEE loader encryption key;

    utilizing the TrEE encryption key to encrypt data;

    derive an application key for a sequence of application keys with the key derivation function, the application key being based on at least one of a preceding application key that directly precedes the application key in the sequence of application keys and a hash of an application that is loaded or executed during a current stage of a boot process; and

    determine whether to load a next stage of the boot process based on whether additional applications are to be loaded and executed during the boot process, wherein the key derivation function is based at least in part on a debug status that indicates a number of times that debugging has been enabled or disabled.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×