Method of storing unique constant values
First Claim
1. A method of securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device comprising:
- obtaining the unique value associated with the device;
generating an encryption key based at least in part on a secret value securely stored in the device;
generating an initialization vector having a plurality of pseudo-randomly or randomly generated bits;
encrypting the unique value associated with the device using the encryption key and the initialization vector to form a first encrypted data structure; and
storing the first encrypted data structure in a memory of the processing system.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure storage and retrieval of a unique value associated with a device to/from a memory of a processing system. In at least one embodiment, the device needs to be able to access the unique value across processing system resets, and the device does not have sufficient non-volatile storage to store the unique value itself. Instead, the unique value is stored in the processing system memory in such a way that the stored unique value does not create a unique identifier for the processing system or the device. A pseudo-randomly or randomly generated initialization vector may be used to vary an encrypted data structure used to store the unique value in the memory.
-
Citations
33 Claims
-
1. A method of securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device comprising:
-
obtaining the unique value associated with the device;
generating an encryption key based at least in part on a secret value securely stored in the device;
generating an initialization vector having a plurality of pseudo-randomly or randomly generated bits;
encrypting the unique value associated with the device using the encryption key and the initialization vector to form a first encrypted data structure; and
storing the first encrypted data structure in a memory of the processing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device by
obtaining the unique value associated with the device;
generating an encryption key based at least in part on a secret value securely stored in the device;
generating an initialization vector having a plurality of pseudo-randomly or randomly generated bits;
encrypting the unique value associated with the device using the encryption key and the initialization vector to form a first encrypted data structure; and
storing the first encrypted data structure in a memory of the processing system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device by
-
17. A method of securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device comprising:
-
obtaining the unique value associated with the device;
initializing a monotonic counter stored in the device;
generating a encryption key based at least in part on a secret value securely stored in the device;
generating an initialization vector having a plurality of pseudo-randomly or randomly generated bits;
updating the monotonic counter;
encrypting the unique value associated with the device and the monotonic counter using the encryption key and the initialization vector to form a first encrypted data structure; and
storing the first encrypted data structure in a memory of the processing system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device by
obtaining the unique value associated with the device;
initializing a monotonic counter stored in the device;
generating a encryption key based at least in part on a secret value securely stored in the device;
generating an initialization vector having a plurality of pseudo-randomly or randomly generated bits;
updating the monotonic counter;
encrypting the unique value associated with the device and the monotonic counter using the encryption key and the initialization vector to form a first encrypted data structure; and
storing the first encrypted data structure in a memory of the processing 7 system. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for securely storing a unique value associated with a device in a processing system without exposing a unique identifier for the device by
Specification