×

Hardware secret usage limits

  • US 9,292,711 B1
  • Filed: 01/07/2014
  • Issued: 03/22/2016
  • Est. Priority Date: 01/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of a computing device,storing, in the computing device, one or more hardware secrets, wherein each hardware secret of the one or more hardware secrets;

    has a corresponding usage limit that corresponds to a quota on a predetermined number or rate of cryptographic operations performable using the hardware secret, such that as a result of usage of the hardware secret exceeding the quota, the computing device is unable to unilaterally restore an ability to use the hardware secret; and

    is securely stored by the computing device so as to be physically inaccessible and programmatically unexportable from the computing device;

    receiving a request whose fulfillment involves performance of one or more cryptographic operations;

    fulfilling the request by at least;

    performing the one or more cryptographic operations using a first hardware secret of the one or more hardware secrets, where, as a result of the first hardware secret being associated with a first usage limit, the one or more operations are performed in accordance with the first usage limit for the first hardware secret; and

    providing a result of performance of the one or more cryptographic operations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×