×

Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms

  • US 9,026,803 B2
  • Filed: 11/30/2009
  • Issued: 05/05/2015
  • Est. Priority Date: 11/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computing platform comprising:

  • a trusted entity including,a non-transitory memory that stores mode of operation information, the mode of operation information comprising;

    a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;

    the cryptographic algorithm, parameters associated with the cryptographic algorithm; and

    a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode; and

    a hardware controller that;

    receives a request including a desired operating mode, a desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm;

    compares the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table;

    determines, in response to the comparison, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and

    responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implements cryptographic operations using the desired cryptographic algorithm.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×