JP2021190081A - 機密データを保護することが可能な電子機器 - Google Patents
機密データを保護することが可能な電子機器 Download PDFInfo
- Publication number
- JP2021190081A JP2021190081A JP2020213544A JP2020213544A JP2021190081A JP 2021190081 A JP2021190081 A JP 2021190081A JP 2020213544 A JP2020213544 A JP 2020213544A JP 2020213544 A JP2020213544 A JP 2020213544A JP 2021190081 A JP2021190081 A JP 2021190081A
- Authority
- JP
- Japan
- Prior art keywords
- volatile memory
- unit
- data
- encrypted data
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000015654 memory Effects 0.000 claims abstract description 80
- 238000000034 method Methods 0.000 claims description 27
- 230000006870 function Effects 0.000 claims description 8
- 238000012858 packaging process Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims 1
- 238000000926 separation method Methods 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000010076 replication Effects 0.000 description 2
- 101000575029 Bacillus subtilis (strain 168) 50S ribosomal protein L11 Proteins 0.000 description 1
- 102100035793 CD83 antigen Human genes 0.000 description 1
- 101000946856 Homo sapiens CD83 antigen Proteins 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00478—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier wherein contents are decrypted and re-encrypted with a different key when being copied from/to a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/08—Address circuits; Decoders; Word-line control circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/26—Sensing or reading circuits; Data output circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (18)
- グローバル鍵を用いて暗号化された第1暗号化データを格納するように構成されている第1不揮発性メモリーと、
アプリケーション回路とを備え、
前記アプリケーション回路は、
前記グローバル鍵を格納するように構成されている第2不揮発性メモリーと、
前記第1不揮発性メモリー及び前記第2不揮発性メモリーに結合され、前記第2不揮発性メモリーから前記グローバル鍵を検索し、前記グローバル鍵を用いて前記第1暗号化データを復号化してプレーンデータを生成するように構成されている第1復号化ユニットと、
ローカル鍵を生成又は格納するように構成されているローカル鍵ユニットと、
前記ローカル鍵ユニットに結合され、前記ローカル鍵を用いて前記プレーンデータを暗号化して第2暗号化データを生成し、前記第2暗号化データで前記第1不揮発性メモリーの中の前記第1暗号化データを上書きするように構成されている暗号化ユニットとを備えている、電子機器。 - さらに、
前記第1不揮発性メモリーに結合され、前記ローカル鍵を用いて前記第2暗号化データを復号化して前記プレーンデータを生成するように構成されている第2復号化ユニットと、
前記プレーンデータに応じて作用を行うように構成されている機能ユニットとを備えている請求項1記載の電子機器。 - 前記プレーンデータは、前記機能ユニットをセットするためのファームウェアを含む請求項2記載の電子機器。
- 前記暗号化ユニットは、関連データを使用した認証付き暗号(AEAD)アルゴリズムに従って、前記プレーンデータを暗号化し、前記第2暗号化データを生成する請求項1記載の電子機器。
- 前記第1不揮発性メモリーは、フラッシュメモリー及び/又はセキュアデジタルメモリーカード(SDカード)を含む請求項1記載の電子機器。
- 前記第2不揮発性メモリーは、ワンタイム・プログラマブル(OTP)不揮発性メモリーを含む請求項1記載の電子機器。
- 前記アプリケーション回路と前記第1不揮発性メモリーとが、二つの異なるチップに設けられている請求項1記載の電子機器。
- 前記アプリケーション回路のパッケージング過程の前又は間に、前記グローバル鍵が前記第2不揮発性メモリーに格納される請求項1記載の電子機器。
- 前記ローカル鍵ユニットは、物理複製困難関数(PUF)ユニットを含む請求項1記載の電子機器。
- 第1不揮発性メモリーとアプリケーション回路とを備えている電子機器であり、前記アプリケーション回路は、第2不揮発性メモリー、第1復号化ユニット及び暗号化ユニットを含む、電子機器を作動させる方法であって、
前記第1不揮発性メモリーが、グローバル鍵を用いて暗号化された第1暗号化データを格納するステップと、
前記第2不揮発性メモリーが、前記グローバル鍵を格納するステップと、
前記第1復号化ユニットが、前記第2不揮発性メモリーから前記グローバル鍵を検索するステップと、
前記第1復号化ユニットが、前記グローバル鍵を用いて前記第1暗号化データを復号化してプレーンデータを生成するステップと、
前記暗号化ユニットが、ローカル鍵を用いて前記プレーンデータを暗号化して第2暗号化データを生成するステップと、
前記暗号化ユニットが、前記第2暗号化データで前記第1不揮発性メモリーの中の前記第1暗号化データを上書きするステップとを備えている方法。 - 前記アプリケーション回路はさらに第2復号化ユニットと機能ユニットとを含み、方法は、
前記第2復号化ユニットが前記ローカル鍵により前記第2暗号化データを復号化して、前記プレーンデータを生成するステップと、
前記機能ユニットが前記プレーンデータに応じて作用を行うステップとを備えている請求項10記載の方法。 - 前記プレーンデータは、前記機能ユニットをセットするためのファームウェアを含む請求項11記載の方法。
- 前記暗号化ユニットが前記ローカル鍵を用いて前記プレーンデータを暗号化して前記第2暗号化データを生成するステップは、関連データを使用した認証付き暗号(AEAD)アルゴリズムに従って、前記暗号化ユニットが前記プレーンデータを暗号化し、前記第2暗号化データを生成することを含む請求項10記載の方法。
- 前記第1不揮発性メモリーは、フラッシュメモリー及び/又はセキュアデジタルメモリーカード(SDカード)を含む請求項10記載の方法。
- 前記第2不揮発性メモリーは、ワンタイム・プログラマブル(OTP)不揮発性メモリーを含む請求項10記載の方法。
- 前記アプリケーション回路と前記第1不揮発性メモリーとが、二つの異なるチップに設けられている請求項10記載の方法。
- 前記第2不揮発性メモリーが前記グローバル鍵を格納するステップは、前記アプリケーション回路のパッケージング過程の前又は間に行われる請求項10記載の方法。
- 前記アプリケーション回路はさらにローカル鍵ユニットを含み、前記ローカル鍵ユニットは、物理複製困難関数(PUF)ユニットを含み、方法は、前記ローカル鍵ユニットが前記ローカル鍵を生成するステップを備えている請求項10記載の方法。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063034410P | 2020-06-04 | 2020-06-04 | |
US63/034,410 | 2020-06-04 | ||
US17/105,476 US11502832B2 (en) | 2020-06-04 | 2020-11-25 | Electronic device capable of protecting confidential data |
US17/105,476 | 2020-11-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2021190081A true JP2021190081A (ja) | 2021-12-13 |
JP7170999B2 JP7170999B2 (ja) | 2022-11-15 |
Family
ID=73694779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020213544A Active JP7170999B2 (ja) | 2020-06-04 | 2020-12-23 | 機密データを保護することが可能な電子機器 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11502832B2 (ja) |
EP (1) | EP3920066B1 (ja) |
JP (1) | JP7170999B2 (ja) |
CN (1) | CN113761598B (ja) |
TW (1) | TWI827912B (ja) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220393859A1 (en) * | 2021-06-07 | 2022-12-08 | Micron Technology, Inc. | Secure Data Storage with a Dynamically Generated Key |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001517582A (ja) * | 1997-09-22 | 2001-10-09 | ジェラルド・ジェイ・ブロック | 航空機又は他の輸送手段のためのディスプレイシステム |
JP2006295916A (ja) * | 2005-03-24 | 2006-10-26 | Sony United Kingdom Ltd | プログラマブルロジックデバイス |
JP2008102618A (ja) * | 2006-10-17 | 2008-05-01 | Toshiba Corp | 電子機器およびファームウェア保護方法 |
JP2015531924A (ja) * | 2012-08-10 | 2015-11-05 | クリプトグラフィ リサーチ, インコーポレイテッド | 集積回路のセキュア機能及び鍵管理 |
EP3460705A1 (en) * | 2017-09-25 | 2019-03-27 | Siemens Aktiengesellschaft | Distributed deployment of unique firmware |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4847902A (en) | 1984-02-10 | 1989-07-11 | Prime Computer, Inc. | Digital computer system for executing encrypted programs |
US7127610B1 (en) * | 1999-06-02 | 2006-10-24 | Nortel Networks Limited | Apparatus and method of implementing multicast security between multicast domains |
US6983374B2 (en) | 2000-02-14 | 2006-01-03 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor |
US20120079270A1 (en) * | 2010-09-29 | 2012-03-29 | Navin Patel | Hardware-Assisted Content Protection for Graphics Processor |
US10803970B2 (en) | 2011-11-14 | 2020-10-13 | Seagate Technology Llc | Solid-state disk manufacturing self test |
US9792439B2 (en) | 2012-09-19 | 2017-10-17 | Nxp B.V. | Method and system for securely updating firmware in a computing device |
TW201702868A (zh) | 2015-07-09 | 2017-01-16 | 捷鼎國際股份有限公司 | 儲存裝置之韌體更新架構及方法 |
US10181054B1 (en) * | 2017-01-13 | 2019-01-15 | Parallels International Gmbh | System and method for secure file management by a local client device |
TWI736000B (zh) | 2017-03-07 | 2021-08-11 | 慧榮科技股份有限公司 | 資料儲存裝置以及其操作方法 |
DE102018120328A1 (de) * | 2017-08-24 | 2019-02-28 | Infineon Technologies Ag | Sicherheitseinrichtung mit erweiterter Zuverlässigkeit |
CN111201553B (zh) * | 2017-10-16 | 2022-04-22 | 华为技术有限公司 | 一种安全元件及相关设备 |
US10657261B2 (en) * | 2017-11-30 | 2020-05-19 | Mocana Corporation | System and method for recording device lifecycle transactions as versioned blocks in a blockchain network using a transaction connector and broker service |
EP3624392B1 (en) * | 2018-09-17 | 2023-05-10 | Secure-IC SAS | Methods and devices for secure secret key generation |
CN110932853B (zh) * | 2019-12-06 | 2022-12-06 | 深圳市纽创信安科技开发有限公司 | 一种基于可信模块的密钥管理装置和密钥管理方法 |
KR20210097537A (ko) * | 2020-01-30 | 2021-08-09 | 삼성전자주식회사 | 물리적 복제 방지 기능에 기초하여 마스킹 데이터를 생성하는 보안 장치 및 이의 동작 방법 |
-
2020
- 2020-11-25 US US17/105,476 patent/US11502832B2/en active Active
- 2020-12-02 EP EP20211134.0A patent/EP3920066B1/en active Active
- 2020-12-23 JP JP2020213544A patent/JP7170999B2/ja active Active
-
2021
- 2021-03-02 TW TW110107213A patent/TWI827912B/zh active
- 2021-03-05 CN CN202110245503.5A patent/CN113761598B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001517582A (ja) * | 1997-09-22 | 2001-10-09 | ジェラルド・ジェイ・ブロック | 航空機又は他の輸送手段のためのディスプレイシステム |
JP2006295916A (ja) * | 2005-03-24 | 2006-10-26 | Sony United Kingdom Ltd | プログラマブルロジックデバイス |
JP2008102618A (ja) * | 2006-10-17 | 2008-05-01 | Toshiba Corp | 電子機器およびファームウェア保護方法 |
JP2015531924A (ja) * | 2012-08-10 | 2015-11-05 | クリプトグラフィ リサーチ, インコーポレイテッド | 集積回路のセキュア機能及び鍵管理 |
EP3460705A1 (en) * | 2017-09-25 | 2019-03-27 | Siemens Aktiengesellschaft | Distributed deployment of unique firmware |
Also Published As
Publication number | Publication date |
---|---|
TWI827912B (zh) | 2024-01-01 |
TW202147124A (zh) | 2021-12-16 |
JP7170999B2 (ja) | 2022-11-15 |
EP3920066A1 (en) | 2021-12-08 |
US11502832B2 (en) | 2022-11-15 |
US20210385072A1 (en) | 2021-12-09 |
EP3920066B1 (en) | 2024-03-06 |
CN113761598A (zh) | 2021-12-07 |
CN113761598B (zh) | 2024-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3644181B1 (en) | Embedded program secure boot method, apparatus and device, and storage medium | |
US11003781B2 (en) | Root key processing method and associated device | |
CN104252881B (zh) | 半导体集成电路及系统 | |
KR101393307B1 (ko) | 보안 부팅 방법 및 그 방법을 사용하는 반도체 메모리시스템 | |
US20170046281A1 (en) | Address dependent data encryption | |
EP2506488B1 (en) | Secure dynamic on-chip key programming | |
KR100792287B1 (ko) | 자체 생성한 암호화키를 이용한 보안방법 및 이를 적용한보안장치 | |
US7975151B2 (en) | Decryption key table access control on ASIC or ASSP | |
US20080107275A1 (en) | Method and system for encryption of information stored in an external nonvolatile memory | |
US20080148001A1 (en) | Virtual Secure On-Chip One Time Programming | |
WO1999038078A1 (en) | Storage device, encrypting/decrypting device, and method for accessing nonvolatile memory | |
JP2005227995A (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
JP2009533741A (ja) | 半導体デバイス識別子の生成方法および半導体デバイス | |
US11533172B2 (en) | Apparatus and method for securely managing keys | |
US11582033B2 (en) | Cryptographic management of lifecycle states | |
JP2016146618A (ja) | 情報処理装置 | |
US10880082B2 (en) | Rekeying keys for encrypted data in nonvolatile memories | |
US11372558B2 (en) | Method for accessing one-time-programmable memory and associated circuitry | |
JP7170999B2 (ja) | 機密データを保護することが可能な電子機器 | |
TW201901442A (zh) | 電子系統及其操作方法 | |
CN109286488B (zh) | Hdcp关键密钥保护方法 | |
CN111357003A (zh) | 预操作系统环境中的数据保护 | |
US20230214331A1 (en) | Micro-controller chip and access method thereof | |
CN115237343A (zh) | 一种芯片、计算设备及数据存储方法 | |
JP2009044630A (ja) | 暗号処理装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20201223 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20220111 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20220404 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20220712 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20220915 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20221004 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20221025 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7170999 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |