Updating encrypted cryptographic key pair
First Claim
Patent Images
1. A computing device, comprising:
- a processor;
a persistent memory storing a first cryptographic key; and
an electrically erasable programmable non-volatile memory;
wherein the processor is configured to;
receive information for a second cryptographic key from a cryptographic key provisioning system;
derive the second cryptographic key from the information for the second cryptographic key;
retrieve the first cryptographic key from the persistent memory, the first cryptographic key comprising fewer bits than the second cryptographic key;
encrypt the second cryptographic key using the first cryptographic key; and
store the encrypted second cryptographic key in the electrically erasable programmable non-volatile memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device has a processor and a first memory, e.g., a fuse-based memory, storing a first cryptographic key. The processor is configured to receive information related to a second cryptographic key from a cryptographic key provisioning system. The processor derives the second cryptographic key from the information related to a second cryptographic key. The first cryptographic key has fewer bits than the second cryptographic key. The processor is also configured to encrypt the second cryptographic key using the first cryptographic key, and store the encrypted second cryptographic key in a second memory, e.g., a flash memory.
69 Citations
10 Claims
-
1. A computing device, comprising:
-
a processor; a persistent memory storing a first cryptographic key; and an electrically erasable programmable non-volatile memory; wherein the processor is configured to; receive information for a second cryptographic key from a cryptographic key provisioning system; derive the second cryptographic key from the information for the second cryptographic key; retrieve the first cryptographic key from the persistent memory, the first cryptographic key comprising fewer bits than the second cryptographic key; encrypt the second cryptographic key using the first cryptographic key; and store the encrypted second cryptographic key in the electrically erasable programmable non-volatile memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification