System and method for security key transmission with strong pairing to destination client
First Claim
Patent Images
1. A method for security key transmission, the method comprising:
- generating, by at least one processor in an integrated circuit, a security key sequence comprising a security key, a security command comprising an algorithm associated with the security key, and an address associated with a destination module;
sending, by the processor, the security key sequence to the destination module; and
receiving, by the processor, an error message from the destination module in response to the algorithm being different than an algorithm configuration of the destination module.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for security key transmission with strong pairing to a destination client are disclosed. A security key may be generated by an on-chip key generator, an off-chip device, and/or software. A rule may then be paired with the security key and an address associated with the security key. The rule may define permissible usage by a destination module, which is defined by the associated address. The rule may comprise a command word, which may be implemented using a data structure associated with a permissible algorithm type, a security key size, and/or a security key source.
-
Citations
34 Claims
-
1. A method for security key transmission, the method comprising:
-
generating, by at least one processor in an integrated circuit, a security key sequence comprising a security key, a security command comprising an algorithm associated with the security key, and an address associated with a destination module; sending, by the processor, the security key sequence to the destination module; and receiving, by the processor, an error message from the destination module in response to the algorithm being different than an algorithm configuration of the destination module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory machine-readable storage having stored thereon, a computer program having at least one code section for security key transmission, the at least one code section being executable by a machine for causing the machine to perform steps comprising:
-
generating a security sequence comprising a security key, a security command comprising an algorithm associated with the security key, and an address associated with a destination module; sending the security sequence to the destination module; and receiving an error message from the destination module in response to the algorithm being different than an algorithm configuration of the destination module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for security key transmission, the system comprising:
at least one processor in an integrated circuit that is configured to generate a security key sequence comprising a security key, a security command comprising an algorithm associated with the security key, and an address associated with a destination module, wherein the processor is further configured to; send the security key sequence to the destination module, and receive an error message from the destination module in response to the algorithm being different than an algorithm configuration of the destination module. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
Specification