×

Keying infrastructure

  • US 9,633,210 B2
  • Filed: 03/31/2014
  • Issued: 04/25/2017
  • Est. Priority Date: 09/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • setting, by a computing device, an initial application key in a sequence of application keys;

    deriving a first application key for the sequence of application keys with a first key derivation function, the first application key being derived based at least in part on the initial application key and based at least in part on a first hash of a first component;

    determining that a second component is loaded or executed;

    based at least on the second component being loaded or executed;

    deriving a second application key for the sequence of application keys with a second key derivation function, the second application key being derived based at least in part on the first application key that directly precedes the second application key in the sequence of application keys and based at least in part on a second hash of the second component; and

    deleting the first application key based at least on deriving the second application key;

    utilizing, by the computing device, the second application key that remains in the sequence of application keys, after deleting the first application key, to derive an image operation key; and

    utilizing the image operation key to at least one of verify an application state of the computing device or encrypt data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×