TRUSTED MOBILE PLATFORM ARCHITECTURE
First Claim
Patent Images
1. An apparatus comprising:
- one or more cryptographic units; and
a memory to store one or more data encryption keys and an associated header for the one or more data encryption keys, wherein the associated header defines which of the one or more cryptographic units are to use the data encryption key.
0 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, an apparatus includes one or more cryptographic units. The apparatus also includes a memory to store one or more data encryption keys and an associated header for the one or more data encryption keys. The associated header defines which of the one or more cryptographic units are to use the data encryption key.
27 Citations
26 Claims
-
1. An apparatus comprising:
-
one or more cryptographic units; and a memory to store one or more data encryption keys and an associated header for the one or more data encryption keys, wherein the associated header defines which of the one or more cryptographic units are to use the data encryption key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
a cryptographic processor within a wireless device, the cryptographic processor comprising; a first cryptographic unit to generate an intermediate result from execution of a first operation; and a second cryptographic unit to generate a final result from execution of a second operation based on the intermediate result, wherein the intermediate result is not accessible external to the cryptographic processor. - View Dependent Claims (7, 8)
-
9. A system comprising
a dipole antenna to receive a communication; -
an application processor to generate a primitive instruction for a cryptographic operation that is to use a cryptographic key based on the communication; and a cryptographic processor that comprises; a memory to store the cryptographic key; a number of cryptographic units, wherein one of the number of cryptographic units is to generate a challenge to the use of the cryptographic key, wherein the application processor is to generate a response to the challenge; and a controller to load the cryptographic key into one of the number of cryptographic units for execution of the cryptographic operation if the response is correct. - View Dependent Claims (10, 11, 12)
-
-
13. A system comprising:
-
an application processor, within a wireless device, to generate a primitive instruction related to a cryptographic operation; and a cryptographic processor, within the wireless device, the cryptographic processor comprising; a controller to receive the primitive instruction, wherein the controller is to retrieve a number of microcode instructions from a nonvolatile memory within the cryptographic processor; a first functional unit to generate an intermediate result from execution of a first operation based on a first of the number of microcode instructions; and a second functional unit to generate a final result for the cryptographic operation based on the intermediate result, from execution of a second operation based on a second of the number of microcode instructions, wherein the intermediate result is not accessible external to the cryptographic processor. - View Dependent Claims (14, 15)
-
-
16. A method comprising:
-
receiving a primitive instruction into a cryptographic processor, for execution of a cryptographic operation that uses a data encryption key that is protected within the cryptographic processor; retrieving the data encryption key and an associated header for the data encryption key, wherein the associated header defines which of one or more cryptographic units are to use the data encryption key; and performing an operation within one of the one or more cryptographic units using the data encryption key, if the associated header defines the one of the one or more cryptographic units. - View Dependent Claims (17, 18)
-
-
19. A method comprising:
-
receiving a primitive instruction into a cryptographic processor from an application executing on an application processor, for execution of a cryptographic operation that uses a cryptographic key that is protected within the cryptographic processor; generating a challenge for use of the cryptographic key back to the application; receiving a response to the challenge into the cryptographic processor from the application; performing the following operations, if the response is correct; loading the cryptographic key into a functional unit of the cryptographic processor; and executing an operation within the functional unit using the cryptographic key. - View Dependent Claims (20, 21, 22)
-
-
23. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
receiving a primitive instruction into a cryptographic processor, for execution of a cryptographic operation that uses a data encryption key that is protected within the cryptographic processor; retrieving the data encryption key and an associated header for the data encryption key, wherein the associated header defines which of one or more cryptographic units are to use the data encryption key; and performing an operation within one of the one or more cryptographic units using the data encryption key, if the associated header defines the one of the one or more cryptographic units. - View Dependent Claims (24, 25)
-
-
26. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
receiving a primitive instruction into a cryptographic processor from an application executing on an application processor, for execution of a cryptographic operation that uses a cryptographic key that is protected within the cryptographic processor; generating a challenge for use of the cryptographic key back to the application; receiving a response to the challenge into the cryptographic processor from the application; performing the following operations, if the response is correct; loading the cryptographic key into a functional unit of the cryptographic processor; and executing an operation within the functional unit using the cryptographic key.
-
Specification