SYSTEMS, METHODS AND APPARATUSES FOR SECURE STORAGE OF DATA USING A SECURITY-ENHANCING CHIP
First Claim
1. A computer processor comprising:
- a storage for storing an encryption key;
a central processing unit (CPU), the CPU being configured to run one or more software programs;
a circuit configured to;
calculate a hash function to generate a hash value for data loaded into the computer processor, the data comprising executable code for at least one of the one or more software programs; and
generate an authentication token, using the encryption key stored in the storage, for a request initiated by a software program running on the CPU.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer processor and a security enhancing chip may be provided. In one aspect, the computer processor may comprise a storage for storing an encryption key, a central processing unit (CPU) configured to execute one or more software programs, and a circuit configured to calculate a hash function to generate a hash value for data loaded into the computer processor and generate an authentication token for a request initiated by a software program running on the CPU. In another aspect, the security enhancing chip may comprise a first storage for storing an encryption key, a second storage for storing a certificate, a hash storage and circuit components configured to validate, using the first certificate, command(s) adding the encryption key to the first storage and storing a first hash to the hash storage, and to process a request if a second hash in the request is equal to the first hash.
30 Citations
40 Claims
-
1. A computer processor comprising:
-
a storage for storing an encryption key; a central processing unit (CPU), the CPU being configured to run one or more software programs; a circuit configured to; calculate a hash function to generate a hash value for data loaded into the computer processor, the data comprising executable code for at least one of the one or more software programs; and generate an authentication token, using the encryption key stored in the storage, for a request initiated by a software program running on the CPU. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security enhancing chip, comprising:
-
a first storage for storing an encryption key; a second storage for storing a first certificate; a hash storage; and circuit components configured to; receive a command to store a first hash value in the hash storage; validate the command to store the first hash value using the first certificate; store the first hash value in the hash storage when validation of the command to store the first hash value is successful; receive a command to add the encryption key to the first storage; validate the command to add the encryption key using the first certificate; add the encryption key to the first storage when validation of the command to add the encryption key is successful; receive a request for an operation, the request comprising a second hash value; validate the request using the encryption key; verify that the second hash value is equal to the first hash value stored in the hash storage; and process the request when the request is valid and verification of the second hash value is successful. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for operating a computer processor, comprising:
-
calculating a hash function using a circuit in the computer processor to generate a hash value for data loaded into the computer processor, the data comprising executable code to be executed on a central processing unit (CPU) of the computer processor; initiating a request by a software program executing on the CPU, the request to comprise the hash value; and generating an authentication token for the request using the circuit and an encryption key stored in a storage of the computer processor. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for operating a security enhancing chip, comprising:
-
receiving a command to store a first hash value in a hash storage of the security enhancing chip; validating the command to store the first hash value using a first certificate stored in the security enhancing chip; storing the first hash value in the hash storage when validation of the command to store the first hash value is successful; receiving a command to add an encryption key to a first storage of the security enhancing chip; validating the command to add the encryption key using the first certificate; adding the encryption key to the first storage when validation of the command to add the encryption key is successful; receiving a request for an operation, the request comprising a second hash value; validating the request using the encryption key; verifying that the second hash value is equal to the first hash value stored in the hash storage; and processing the request when the request is valid and verification of the second hash value is successful. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40)
-
Specification