Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
First Claim
1. A method of providing data security comprising the steps of:
- storing data in a first memory of a first processor having hardware-based security;
operating a second processor to authenticate the data in the first processor; and
operating the first processor to send the data from the memory of the first processor to a second memory external to the first processor.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually utilizes the data. By a data transfer request-response arrangement (2010, 2050, 2070, 2090) between the more-secure processor (600) and the less-secure processor (200), the more-secure processor (600) confers greater security of the data on the less-secure processor (200). A manufacturing process makes a handheld device (110) having a storage space (222), a less-secure processor (200) for executing modem software and a more-secure processor (600) having a protected application (2090) and a secure storage (2210). A manufacturing process involves generating a per-device private key and public key pair, storing the private key in a secure storage (2210) where it can be accessed by the protected application (2090), combining the public key with the modem software to produce a combined software, signing the combined software; and storing the signed combined software into the storage space (222). Other processes of manufacture, processes of operation, circuits, devices, wireless and wireline communications products, wireless handsets and systems are disclosed and claimed.
-
Citations
108 Claims
-
1. A method of providing data security comprising the steps of:
-
storing data in a first memory of a first processor having hardware-based security;
operating a second processor to authenticate the data in the first processor; and
operating the first processor to send the data from the memory of the first processor to a second memory external to the first processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Apparatus for data security comprising:
-
a first processor having hardware-based security;
a first memory coupled to said first processor and having data stored in said memory;
a second processor having a second memory and operable to authenticate data from said first processor; and
a second memory external to said first processor, said first processor operable to send the data from said first memory to said second memory external to said first processor. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A handheld device comprising
a more-secure processor having hardware based security for storing data; -
a less-secure processor that eventually utilizes the data; and
a data transfer request-response coupling between said more-secure processor and said less-secure processor for said more-secure processor to confer greater security of the data on said less-secure processor. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A process of manufacturing a handheld device having a storage space, a less-secure processor for executing modem software and a more-secure processor having a protected application and a secure storage, the manufacturing process comprising
generating a per-device private key and public key pair; -
storing the private key in a secure storage where it can be accessed by the protected application;
combining the public key with the modem software to produce a combined software;
signing the combined software; and
storing the signed combined software into the storage space. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. A security process for protecting personalization data in a handheld device having a less-secure processor and a more-secure processor with an interrupt-based communication path and a service application and a secure environment device driver and a protected application and a secure storage for personalization data, the security process comprising
the less-secure processor requesting the personalization data from the more-secure processor via a request through the interrupt-based communication path; -
the less-secure processor sending a random challenge with the request through said interrupt-based communication path to the service application of the more-secure processor;
the service application passing the request to the secure environment device driver through an API call;
the driver loading the protected application;
the more-secure processor executing the protected application in a hardware protected execution environment, and passing the request to the protected application;
the protected application decrypting the personalization information from the secure storage, signing the personalization information concatenated with the random challenge, and sending the signed result to the driver;
the driver passing the signed result to the service application;
the service application passing the signed result to the less-secure processor; and
the less-secure processor verifying the signing and the random challenge before using the personalization information. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A process of manufacturing a target communication device having a memory, the manufacturing process using a host machine and comprising:
-
the target having a device unique key and sending out a device identification (Public ID) to the host machine;
the host machine using the Public ID to access a manufacturer public key and personalization certificate including personalization information and at least some target software signed with a signature;
the host machine sending a memory loader to the target and the manufacturer public key and personalization certificate to the target;
the target deriving a derived key from the device unique key; and
the target with the memory loader having a hardware-protected process to verify the personalization certificate, recover the personalization information, encrypt the recovered personalization information with the derived key, provide a signature by hash of information including the encrypted personalization information, and load the encrypted personalization information and signature in the memory of the target. - View Dependent Claims (73, 74, 75, 76, 77, 78, 79, 80, 81, 82)
-
-
83. A system comprising in a common enclosure
at least two more-secure processors having more-secure processing partitioned among said more-secure processors; - and at least one less-secure processor coupled to at least one of the more-secure processors.
- View Dependent Claims (84, 85, 86, 87)
-
88. A system comprising in a common enclosure
at least one more-secure processor; - and
at least two less-secure processors coupled to the at least one more-secure processor. - View Dependent Claims (89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101)
- and
-
102. A system comprising
a first processor capable of secure boot by authentication and initialization of software for the first processor, said first processor operable to generate a random seed at boot time and a new random number at run-time for the authentication and to generate a challenge based on a random number; - and
a second processor having a secure storage for personalization data and operable to supply said second processor with the personalization data in signed form in response to the challenge from said first processor, whereby the first processor relies on the second processor. - View Dependent Claims (103, 104, 105, 106, 107, 108)
- and
Specification