Encrypted and other keys in public and private battery memories
First Claim
Patent Images
1. A battery module, comprising:
- a public non-volatile memory containing an encrypted identity key to be decrypted by a root key in a host;
a tamper resistant processing environment including private non-volatile memory containing another identity key;
a challenge receiver operable within said battery module and configured to receive a challenge from said host; and
a response generator operable within said battery module and configured to generate a response to the challenge based on the other identity key stored within the tamper resistant processing environment of said battery module.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200.
-
Citations
14 Claims
-
1. A battery module, comprising:
-
a public non-volatile memory containing an encrypted identity key to be decrypted by a root key in a host; a tamper resistant processing environment including private non-volatile memory containing another identity key; a challenge receiver operable within said battery module and configured to receive a challenge from said host; and a response generator operable within said battery module and configured to generate a response to the challenge based on the other identity key stored within the tamper resistant processing environment of said battery module. - View Dependent Claims (2, 3, 4, 5, 11, 12)
-
-
6. A method of operating a battery module, comprising:
-
placing an encrypted identity key in a public non-volatile memory; transmitting the encrypted identity key from the battery module for decrypting the encrypted identity key by a root key contained in a host; placing another identity key in private non-volatile memory in a tamper resistant processing environment; receiving a challenge from said host; and generating a response based on the other identity key stored within the tamper resistant processing environment. - View Dependent Claims (7, 8, 9, 10, 13, 14)
-
Specification