Generating secure device secret key
First Claim
Patent Images
1. A method in a device for providing secret information, comprising:
- receiving, at the device, a request for secret information from a requesting device;
determining whether the requesting device has previously received the requested secret information;
in response to determining that the requesting device has not previously received the requested secret information;
encrypting, in the device, the secret information, andtransmitting the encrypted secret information to the requesting device; and
in response to determining that the requesting device has previously received the secret information, initiating a reset of the device.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods, devices, systems and computer program products are provided to facilitate cryptographically secure retrieval of secret information that is embedded in a device. The embedded secret information can include a random number that is not custom-designed for any specific requestor of the secret information. Upon receiving a request for the embedded secret information, an encrypted secret is provided to the requestor that enables the recovery of the embedded secret information by only the requestor. Moreover, a need for maintenance of a database of the embedded secret information and the associated requestors is eliminated.
21 Citations
19 Claims
-
1. A method in a device for providing secret information, comprising:
-
receiving, at the device, a request for secret information from a requesting device; determining whether the requesting device has previously received the requested secret information; in response to determining that the requesting device has not previously received the requested secret information; encrypting, in the device, the secret information, and transmitting the encrypted secret information to the requesting device; and in response to determining that the requesting device has previously received the secret information, initiating a reset of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable storage device storing instructions executable by one or more processors which, upon such execution, cause the one or more processors to perform operations comprising:
-
receiving a request for secret information from a first requesting device; determining whether the first requesting device has previously received the requested secret information; in response to determining the requesting device has not previously received the requested secret information; encrypting the secret information, and transmitting the encrypted secret information to the requesting device; and in response to determining that the requesting device has previously received the secret information, initiating a reset of the device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for securely exporting secret information to a requesting device, the device comprising:
-
a memory configured to store the secret information; and a processor coupled to the memory, wherein the processor is configured to; receive a request for the secret information from the requesting device, determine whether the requesting device has previously received the secret information, in response to determining the requesting device has not previously received the secret information; encrypt the secret information, and transmit the encrypted secret information to the requesting device, and in response to determining that the requesting device has previously received the secret information, initiate a reset of the device.
-
Specification