Hardware secret usage limits
First Claim
Patent Images
1. A computer-implemented method, comprising:
- storing, in a computing device, a secret that;
has a usage limit that corresponds to a limit on a number or rate of cryptographic operations performable using the secret, the computing device being unable to unilaterally exceed the usage limit; and
is securely stored by the computing device so as to be at least programmatically unexportable from the computing device;
performing one or more cryptographic operations using the secret, where, as a result of the secret being associated with the usage limit, the one or more operations are performed in accordance with the usage limit; and
providing a result of performance of the one or more cryptographic operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A hardware secret is securely maintained in a computing device. The device operates in accordance with a usage limit corresponding to a limited number of operations using the hardware secret that the device is able to perform. Once the device reaches a usage limit, the device becomes temporarily or permanently unable to perform additional operations using the hardware secret.
222 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
storing, in a computing device, a secret that; has a usage limit that corresponds to a limit on a number or rate of cryptographic operations performable using the secret, the computing device being unable to unilaterally exceed the usage limit; and is securely stored by the computing device so as to be at least programmatically unexportable from the computing device; performing one or more cryptographic operations using the secret, where, as a result of the secret being associated with the usage limit, the one or more operations are performed in accordance with the usage limit; and providing a result of performance of the one or more cryptographic operations. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device, comprising:
-
one or more processors; and memory; wherein the memory and one or more processors are collectively configured such that; the device stores secret information so as to be unexportable from the device; the one or more processors perform cryptographic operations using the secret information subject to a usage limit associated with the secret information that serves as a limit on a number of cryptographic operations performable by the one or more processors, the usage limit different from a clock rate limit for the one or more processors and the device being unable to unilaterally reset the usage limit; and the device provides results of performance of the cryptographic operations. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon instructions that, as a result of execution by one or more processors of a device, cause the device to:
-
detect a requirement for performance of one or more cryptographic operations using a secret stored in the device so as to be unexportable from the device; as a result of detecting the requirement, cause a component of the device having access to the secret to perform the one or more cryptographic operations in accordance with a usage limit applied to the secret, the device unable to unilaterally reset the usage limit, the usage limit corresponding to a limit on a number or rate of cryptographic operations performable using the secret; and provide a result of performance of the one or more cryptographic operations. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification