×

Hardware secret usage limits

  • US 9,985,975 B2
  • Filed: 03/11/2016
  • Issued: 05/29/2018
  • Est. Priority Date: 01/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • storing, in a computing device, a secret that;

    has a usage limit that corresponds to a limit on a number or rate of cryptographic operations performable using the secret, the computing device being unable to unilaterally exceed the usage limit; and

    is securely stored by the computing device so as to be at least programmatically unexportable from the computing device;

    performing one or more cryptographic operations using the secret, where, as a result of the secret being associated with the usage limit, the one or more operations are performed in accordance with the usage limit; and

    providing a result of performance of the one or more cryptographic operations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×