×

Cryptography chip with identity verification

  • US 11,023,620 B2
  • Filed: 09/30/2019
  • Issued: 06/01/2021
  • Est. Priority Date: 03/29/2019
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for performing cryptographic operations subject to identity verification, the method comprising:

  • receiving, by a cryptography chip, a request to perform a requested cryptographic operation from a client, wherein the request includes client identity information associated with the client, and wherein the cryptography chip is a hardware component including a processing resource that performs cryptographic operations and a storage resource that stores key information used in the cryptographic operations and encrypted identity information associated with clients that are permitted to request cryptographic operations;

    decrypting, by the cryptography chip, the encrypted identity information using a key included in software instructions stored in a firmware of the cryptography chip;

    determining, by the cryptography chip, that the client identity information is associated with one of the clients that are permitted to request cryptographic operations based on comparing the client identity information to the decrypted identity information; and

    in response to determining that the client identity information is associated with one of the clients that are permitted to request cryptographic operations, performing, by the cryptography chip, the requested cryptographic operation based on the key information stored in the storage resource.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×