US20120137137A1 - Method and apparatus for key provisioning of hardware devices - Google Patents

Method and apparatus for key provisioning of hardware devices Download PDF

Info

Publication number
US20120137137A1
US20120137137A1 US12/956,793 US95679310A US2012137137A1 US 20120137137 A1 US20120137137 A1 US 20120137137A1 US 95679310 A US95679310 A US 95679310A US 2012137137 A1 US2012137137 A1 US 2012137137A1
Authority
US
United States
Prior art keywords
key
provisioning
hardware device
encrypted
derived
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/956,793
Other languages
English (en)
Inventor
Ernest F. Brickell
Shay Gueron
Jiangtao Li
Carlos V. Rozas
Daniel Nemiroff
Vincent R. Scarlata
Uday R. Savagaonkar
Simon P. Johnson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US12/956,793 priority Critical patent/US20120137137A1/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NEMIROFF, DANIEL, BRICKELL, ERNEST F., JOHNSON, SIMON P., SAVAGAONKAR, UDAY R., SCARLATA, VINCENT R., LI, JIANGTAO, ROZAS, CARLOS V., GUERON, SHAY
Priority to EP11844100.5A priority patent/EP2647156A4/en
Priority to CN201180057317.3A priority patent/CN103229451B/zh
Priority to JP2013536941A priority patent/JP5690412B2/ja
Priority to PCT/US2011/060345 priority patent/WO2012074720A1/en
Priority to TW100142701A priority patent/TWI567579B/zh
Publication of US20120137137A1 publication Critical patent/US20120137137A1/en
Priority to US13/987,807 priority patent/US9043604B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Definitions

  • FIG. 3 is a flow graph illustrating a method for initial manufacturing provisioning of the device unique key 110 with shared key protection of a device unique key 110 to the hardware device;
  • FIG. 4 is a flow graph illustrating a method for secure initial manufacturing provisioning of a device unique key 110 to the hardware device
  • FIG. 5 illustrates a system that includes a key generation server, a provisioning server and a platform including the device coupled to a communications network;
  • FIG. 6 illustrates an embodiment of an on-line method for a device to obtain a key from the provisioning server
  • FIG. 8 is a block diagram of an embodiment of a Trusted Computing Base (TCB) of a trusted platform
  • FIG. 9 is a flowgraph illustrating a method to recover from a security vulnerability in the TCB shown in FIG. 8 ;
  • FIG. 14 illustrates an embodiment of a Device Authentication Key (DAK) provisioning protocol between a platform and a provisioning server;
  • DAK Device Authentication Key
  • FIG. 15 illustrates an embodiment of the re-provisioning protocol in FIG. 14 between the platform and the provisioning server that supports privacy;
  • Another method to provision key materials is for the device manufacturer to store a unique asymmetric Device Authentication Key (DAK) in write-once memory during the manufacturing process. Later, a provisioning server can provision keys (transmit keys) remotely to the hardware device installed in a platform using an interactive provisioning protocol. After validating the stored DAK received from the hardware device, the provisioning server sends the key materials to the hardware device.
  • DAK Device Authentication Key
  • the disadvantages of this method include the size of the region of write-once memory used to store a unique DAK in the hardware device, the possibility of security breach via a manufacturing tester machine that stores the keys in write-once memory, no support for off-line provisioning (that is, when no Internet connection is available to the platform in which the hardware device is installed), and the use of asymmetric key operations which requires more memory for a larger Trusted Computing Base (TCB) size in the hardware device.
  • TDB Trusted Computing Base
  • FIG. 1 is a block diagram illustrating a system 100 for performing the initial key provisioning in a manufacturing environment.
  • the system 100 includes a hardware device 102 , a manufacturing tester machine 104 and a key generation server 106 .
  • the manufacturing tester machine 104 and the key generation server 106 communicate via a secure channel 108 .
  • a secure channel is an authenticated and encrypted communication channel between two entities. For example, using Transport Layer Security (TLS), a platform can set up a secure channel with a server to perform online banking.
  • TLS Transport Layer Security
  • a device unique key 110 is assigned to the hardware device 102 by the key generation server 106 and stored in a protected memory 109 in the hardware device 102 .
  • This device unique key 110 is protected by the hardware and is never exposed later to software executing in a platform in which the hardware device 102 is later installed.
  • the platform in which the hardware device 102 is installed may be any computing device, for example, a mobile phone or computer.
  • an integrated circuit in the chipset can link the processor to high speed devices such as memory and graphics controllers and another integrated circuit in the chipset can link the processor to lower-speed peripherals accessed via a Peripheral Controller Interface (PCI), Universal Serial Bus (USB) or communications protocol such as Ethernet.
  • PCI Peripheral Controller Interface
  • USB Universal Serial Bus
  • Ethernet communications protocol
  • FIG. 2 is a flow graph illustrating a method for basic initial manufacturing provisioning of a device unique key to the hardware device.
  • the key generation server 106 chooses a random device unique key for the hardware device 102 that is coupled to the manufacturing tester machine 104 . Processing continues with block 202 .
  • the key generation server 106 sends the device unique key 110 for the hardware device 102 under test to the manufacturing tester machine 104 using a secure channel 108 .
  • the manufacturing tester machine 104 Upon receiving the device unique key 110 , the manufacturing tester machine 104 stores the device unique key 110 in a protected memory 109 which can be a write-once memory or a re-writable memory such as a Flash memory device in the hardware device 102 .
  • the write-once memory comprises a plurality of fuses, and the unique key is stored by blowing fuses to permanently store the device unique key 110 in the device 102 . Processing continues with block 204 .
  • the key generation server 106 stores the provisioning identifier and the provisioning key derived from the device unique key 110 in a provisioning database 112 for use later in on-the-field key provisioning of other security keys to the hardware device 102 . Processing continues with block 208 .
  • the key generation server 106 deletes the copy of the device unique key 110 stored in the key generation server 106 which was used to generate the provisioning key and provisioning identifier (ID) stored in the provisioning database 112 .
  • FIG. 3 is a flow graph illustrating a method for initial manufacturing provisioning of the device unique key with a shared key protection to the hardware device.
  • the key generation server 106 encrypts the device unique key 110 with a shared key that is embedded in each hardware device 102 such that only the hardware device 102 can decrypt the device unique key 110 .
  • the manufacturing tester machine 104 does not store or have access to the shared key. Thus, the manufacturing tester machine 104 cannot decrypt the device unique key 110 generated by the key generation server 106 .
  • the key generation server 106 derives a provisioning identifier and provisioning key from the device unique key as described earlier in conjunction with the embodiment shown in FIG. 2 . Processing continues with block 306 .
  • the key generation server 106 deletes the device unique key 110 that it has generated and stores the provisioning identifier and provisioning key derived from the device unique key 110 in the provisioning database 112
  • FIG. 4 is a flow graph illustrating a method for secure initial manufacturing provisioning of the device key to the hardware device.
  • the method described in conjunction with FIG. 4 is more secure than the methods described in conjunction with FIGS. 2 and 3 because the device unique key is generated in the device and is not transmitted over a communications channel to any other hardware device 102 .
  • the hardware device 102 has a symmetric shared key (GK) embedded in logic.
  • GK is known to the hardware device 102 and the key generation server 106 , but not known to the manufacturing tester machine 104 .
  • GK symmetric shared key
  • Ciphertext C 1 ⁇ C 2.
  • RSA-Enc(K, M) denotes RSA (Rivest, Shamir and Adleman) encryption of message M using an RSA public encryption key K.
  • the Message Authentication Code (MAC) function is HMAC.
  • the MAC function is AES-CMAC. 5.
  • the hardware device 102 outputs the ciphertext (encrypted keys) to the manufacturing tester machine 104 .
  • the key generation server 106 stores the provisioning identifier and provisioning key in a provisioning database 112 .
  • the hardware device 102 may be distributed to Outside Equipment Manufacturers (OEMs) and installed in platforms. Typically, the platforms are distributed to end users. There may be a need for the hardware device manufacturer to send (provision) a key to the end user of the platform that includes the hardware device 102 .
  • the hardware device manufacturer can provision a unique key per hardware device 102 , such as, a symmetric device authentication key, a Trusted Platform Module (TPM) endorsement key, a High-bandwidth Digital Content Protection (HDCP) key, or an Advanced Access Content System (AACS) device key or a common key to the hardware device 102 .
  • a unique key per hardware device 102 such as, a symmetric device authentication key, a Trusted Platform Module (TPM) endorsement key, a High-bandwidth Digital Content Protection (HDCP) key, or an Advanced Access Content System (AACS) device key or a common key to the hardware device 102 .
  • TPM Trusted Platform Module
  • HDCP High-bandwidth Digital Content Protection
  • the provisioning database 112 in the key generation server 106 stores a provisioning identifier and a provisioning key for each hardware device 102 that has been tested by the manufacturing tester machine 104 .
  • the key generation server 106 prepares the key material to be provisioned to the hardware device 102 .
  • the key material also referred to as a “key blob” can be a single key, for example, a TPM key or a plurality of keys, for example, a TPM key and a HDCP key.
  • Each hardware device 102 can be assigned different key material.
  • the key generation server 106 encrypts the key material using the provisioning key.
  • the encryption is performed by a key wrapping (encryption) algorithm that can be any encryption algorithm, such as Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) mode encryption or Advanced Encryption Standard-Cipher Block Chaining (AES-CBC) mode encryption combined with a pseudo random function (PRF).
  • AES-GCM and AES-CBC are defined in NIST standard FIPS-197.
  • the key generation server 106 prepares the provisioning database 112 to store all of the provisioning IDs and corresponding encrypted key(s).
  • FIG. 5 illustrates a system that includes a key generation server 106 , a provisioning server 500 and a platform 502 including the hardware device 102 coupled to a communications network 504 .
  • the system also includes a storage device 506 which may be a disk drive, for example, a Compact Disk (CD) or Digital Video Disk (DVD) with a removable storage medium (CD or DVD).
  • a storage device 506 which may be a disk drive, for example, a Compact Disk (CD) or Digital Video Disk (DVD) with a removable storage medium (CD or DVD).
  • the key generation server 106 sends the contents of the provisioning database 112 to the provisioning server 500 so that the provisioning server 500 can perform on-line provisioning of keys via a communications network 504 to platforms 502 in which the hardware device 102 is installed.
  • the provisioning database 112 can also be stored on a removable storage device, for example, a non-volatile memory device such as a Flash memory or a Compact Disk (CD) or Digital Video Disk (DVD) to perform off-line provisioning of the key to the hardware device 102 .
  • the device When the hardware device 102 is installed in a platform (for example, a host system), and discovers that its keys have been revoked, the device issues a request to contact the provisioning server 500 .
  • the request is sent from the hardware device 102 via a host network stack in the platform 502 over a secure communications channel to the provisioning server 500 .
  • the secure channel is robust against man-in-the-middle attack, even if the host network stack is corrupted, the security of key provisioning is not affected because only firmware can access the provisioning ID and provisioning key.
  • FIG. 6 illustrates an embodiment of an on-line method for a hardware device 102 to obtain a key from the provisioning server.
  • the hardware device 102 in the platform obtains its device unique key stored in protected memory 109 in the hardware device 102 , for example, in fuses or in random gates. If the hardware device unique key 110 is encrypted, the hardware device 102 decrypts it using the shared key (GK). The hardware device 102 derives the Provisioning ID from the device unique key using a pseudo random function as discussed earlier in conjunction with the key generation server 106 . Processing continues with block 602 .
  • the hardware device 102 initiates a key exchange protocol with the provisioning server 500 to set up a secure channel.
  • the key exchange protocol is performed using a Secure Sockets Layer (SSL)/Transport Layer Security (TLS) session to verify that the provisioning server is authorized.
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • the security channel is not necessary and is not used. Processing continues with block 604 .
  • the hardware device 102 sends its Provisioning ID to the provisioning server 500 via the secure channel over the communication network, for example, the Internet. Processing continues with block 606 .
  • the provisioning server 500 receives the Provisioning ID from the provisioning database 112 and obtains the encrypted key associated with the provisioning ID stored in the provisioning data base.
  • the hardware device 102 receives the encrypted key from the provisioning server 500 via the secure channel.
  • the hardware device 102 may not have access to the communications network and requires a key to be provisioned in order to provide security functions in the hardware device 102 .
  • the key can be provisioned to the hardware device 102 off-line by distributing the provisioning database 112 on a removable storage device to the end user of the hardware device 102 .
  • the end user receives the entire provisioning database on the removable storage device but can only use the key(s) in the provisioning database that are encrypted by the hardware device's Provisioning key that is derived from the unique device key.
  • the hardware device 102 obtains its provisioning ID using the method discussed for on-line provisioning. However, instead of sending its provisioning ID via the communications network, the hardware device 102 searches the local provisioning database for the encrypted key(s) associated with its provisioning ID.
  • FIG. 7 illustrates a method implemented in the hardware device 102 for decrypting the encrypted key(s). The method shown in FIG. 7 applies to an encrypted key provisioned using either on-line or off-line provisioning.
  • the hardware device 102 obtains it device unique key 110 stored in the hardware device 102 . Processing continues with block 702 .
  • the hardware device 102 derives the Provisioning Key and a Storage Key from the device unique key 110 using one-way pseudo random functions (PRF).
  • the derived Storage key can be used to seal arbitrary secrets of the platform.
  • the derived Provisioning key is used for provisioning. Processing continues with block 704 .
  • the hardware device 102 uses the derived provisioning key to decrypt the encrypted key(s) obtained using the online or offline key provisioning method discussed in conjunction with FIG. 6 . Processing continues with block 706 .
  • the hardware device 102 stores the encrypted key(s) locally in its secure storage.
  • the encrypted key(s) can be encrypted again using the storage key and a pseudo-random function, the result of this additional encryption can be stored locally in secure storage instead of the received encrypted key(s).
  • a hardware device 102 can successfully remotely obtain key materials (encrypted keys) from the manufacturer of the hardware device 102 because it can derive the provisioning key used to encrypt the key materials.
  • An attacker for example, malware
  • An attacker cannot get the key materials from the hardware device manufacturer without the device unique key 110 from which the provisioning key is derived using a pseudo random function.
  • the attacker may have access to the provisioning database via the removable storage device, but the attacker cannot decrypt the encrypted keys without a valid Provisioning Key.
  • the shared key discussed in conjunction with FIG. 3 if the manufacturing tester machine 104 is corrupted, the attacker cannot get the encrypted key(s) from the manufacture because all the device unique keys are encrypted by the shared key which is unknown to the manufacturing tester machine 104 .
  • the manufacturing tester machine 104 has knowledge of the shared key, it is unable to learn the device unique key or Provisioning Key.
  • a small write-once memory is used to store a device unique key as a root of trust for the hardware device 102 which is used to derive other keys used to protect the hardware device 102 against malicious attackers.
  • the write-once memory is 128-bits.
  • the write-once memory is 256-bits.
  • the write-once memory is 128-bits or 192-bits or another size that is dependent on the length of the key used by symmetric encryption.
  • each integrated circuit in the chipset and processor can include a security engine with a device unique key.
  • the provisioning of keys is simple and scalable and because of the use of symmetric key operations, the size of the Trusted Computing Base (TCB) is reduced.
  • DAA Direct Anonymous Attestation
  • TPM Trusted Platform Module
  • TLB Trusted Computing Base
  • the vulnerability may be patched by installing another version of firmware in the platform.
  • the platform cannot cryptographically prove that the vulnerability in the firmware has been corrected to others, for example, external entities.
  • a device unique key 110 embedded in a hardware device 102 in a platform 502 .
  • the device unique key 110 is permanently stored in a protected storage 109 in the hardware device 102 .
  • This device unique key 110 is the “root key” for other keys in the platform, that is, several other keys in the Trusted Computing Base 800 are derived from this device unique key 110 , such as, a provisioning ID 802 , a provisioning base key 822 , a provisioning key 804 and a storage key 806 .
  • the provisioning ID 802 and provisioning key 804 are used to download a unique DAK key from a key provisioning server 500 .
  • the storage key 806 is used for encrypting keys and secrets of the platform 502 including the DAK key.
  • the upgraded firmware in the TCB 802 needs to access these derived keys, for example, provisioning ID 802 , provisioning key 804 , and storage key 806 to be functional.
  • a unique identifier is assigned to identify different versions of the firmware.
  • the unique identifier is a Security Version Number (SVN) 808 that can be stored in non-reportable firmware code 818 in non-volatile memory and read by the unrecoverable TCB 810 .
  • the unique identifier for each firmware version can be derived by performing a cryptographic function on each version of the firmware image.
  • the keys that are derived from the device unique key 110 that is, the provisioning ID 802 , provisioning key 804 , and storage key 806 are computed inside a signature verification portion of the TCB 810 , which is designated to be non-recoverable and can also be referred to as the “unrecoverable TCB”.
  • the provisioning key 804 and storage key 806 are derived based on the Security Version Number 808 , then output from the signature verification portion of the TCB 810 to a recoverable portion of the TCB 800 .
  • the signature verification portion of the TCB 810 “locks” access to the device unique key 110 , preventing recoverable portions of the TCB 800 from accessing the device unique key 110 , that is, the raw “root key”.
  • the Provisioning key 804 and Storage key 806 are stored in the recoverable portions of the TCB, the Provisioning key 804 and Storage key 806 are updated when there is an update to the SVN 808 of the TCB 800 .
  • the key derivations are performed inside the recoverable TCB 810 during device boot. Each time new firmware is installed in the platform, a device re-boot is performed which results in a new provisioning key and storage key that are computed during the device re-boot.
  • FIG. 9 is a flowgraph illustrating a method to recover from a security vulnerability in a TCB 800 . If security vulnerability has been discovered in the recoverable TCB, a TCB recovery event is triggered.
  • the platform/hardware manufacturer when a security vulnerability is found in the TCB 800 , the platform/hardware manufacturer generates a new version of the firmware that includes a software modification to fix the vulnerability.
  • the new version of the firmware is assigned a security version number 808 .
  • the new version of the firmware is digitally signed (encrypted) by the hardware manufacturer.
  • the unrecoverable TCB 810 can verify the signature using the manufacturer's public key, that is, the firmware verification key embedded in the hardware device 102 and make sure that the new firmware image was received from the hardware manufacturer and is not malware.
  • the manufacturer distributes the new firmware to each platform using known methods, for example, via a firmware update from an Original Equipment Manufacturer (OEM), or a software update from a software manufacturer. Processing continues with block 902 .
  • OEM Original Equipment Manufacturer
  • the signature verification portion of the TCB 800 verifies the signature of the new firmware for the recoverable TCB using the firmware verification key 820 embedded in the hardware device 102 in the platform.
  • the signature verification portion of the TCB 810 retrieves the Security Version Number (SVN) 808 of the new firmware embedded in the firmware and retrieves the device unique key 110 stored in the hardware device 102 .
  • the provisioning ID 802 and Provisioning Base Key 822 are derived from the device unique key 110 .
  • the Provisioning key 804 is derived from the Provisioning Base Key 822 and the SVN 808 .
  • the Storage Key 806 is derived from the device unique key 110 and the SVN 808 . Methods for deriving these keys will be described later.
  • the derived provisioning ID 802 , provisioning key 804 , and storage key 806 are sent to the recoverable TCB. Processing continues with block 804 .
  • a new DAK is generated for the new version of firmware.
  • the hardware manufacturer re-provisions a Device Authentication Key (DAK) to each platform 502 that received the new version of the firmware to fix the security vulnerability.
  • DAK Device Authentication Key
  • the key generation server 106 generates the DAKs and sends to the respective platforms 502 via the communications network 504 .
  • the provisioning database 112 in the key generation server 106 stores a provisioning ID 802 and a Provisioning Base Key 822 for each hardware device 102 that was tested by the manufacturing tester device.
  • a provisioning key 804 is derived from the stored provisioning base key 822 based on the latest Security Version Number 808 .
  • the key derivation method selected is the same as used in block 904 .
  • the new unique DAK is generated for the hardware device 102 and encrypted using the provisioning key 804 .
  • Any symmetric encryption algorithm can be used, for example, AES-GCM.
  • the key generation server 106 prepares a DAK provisioning database in which each database entry has a provisioning key 804 and the corresponding encrypted DAK.
  • the key generation server 106 sends the DAK provisioning database to the key provisioning server 500 .
  • Each platform downloads a new DAK from the key provisioning server 500 .
  • the recoverable TCB has the provisioning ID 802 and provisioning key 804 and communicates with the provisioning server 500 using a provisioning protocol to obtain the new DAK key for the platform 502 .
  • the platform 502 encrypts its provisioning ID 802 using the provisioning server 500 's public key and sends the encrypted provisioning ID to the provisioning server 500 .
  • the provisioning server 500 decrypts the received encrypted provisioning ID using its private key to obtain the unencrypted provisioning ID 802 of the requesting platform 502 .
  • the provisioning server 500 searches the DAK provisioning database for an entry corresponding to the provisioning ID 802 that stores the encrypted new DAK key which is encrypted by the new provisioning key for the hardware device 102 in the platform 502 .
  • the provisioning server 500 sends the encrypted new DAK to the platform 502 .
  • the platform 502 decrypts the new DAK using the new provisioning key.
  • the platform 502 re-encrypts the new DAK using its new storage key 806 and stores the encrypted new DAK securely.
  • the encrypted new DAK is stored in non-volatile memory in the platform 502 .
  • the non-volatile memory can be BIOS flash memory, chipset flash memory, a solid state drive or hard disk drive. As the DAK is encrypted by the storage key, even if the non-volatile memory is accessed by an attacker, the attacker is unable to decrypt the DAK.
  • the platform 502 If the platform 502 has not installed the new firmware to fix the security vulnerability, it cannot derive the new provisioning key 804 corresponding to the latest SVN. Thus, the platform 502 cannot decrypt the new DAK; even it receives the encrypted new DAK from the provisioning server 500 . Processing continues with block 908 .
  • a new storage key is derived because if an attacker has corrupted the old version of the TCB firmware and extracted the storage key 806 associated with the old version, the attacker can still decrypt the platform secrets (including the new DAK) even after the firmware update.
  • the recoverable TCB cannot obtain a provisioning key 804 for the latest SVN, thus it cannot get the current version of the DAK key. Also, if the recoverable TCB gets access to previous storage Keys 824 for the key migration purpose and the recoverable TCB has been upgraded to a new SVN, the new recoverable TCB can decrypt the keys and data from the previous version and encrypt them using the new storage key.
  • the initial value assigned to the SVN is 1 and for each new firmware update the SVN increments by one.
  • SK[i] denotes the Storage Key corresponding to SVN i.
  • the Provisioning ID and provisioning key 804 are computed as shown below:
  • Provisioning ID PRF(device unique key,“Provisioning ID”)
  • Provisioning Base Key PRF(device unique key,“Provisioning Base Key”)
  • Provisioning Key PRF(Provisioning Base Key,“Provisioning Key” ⁇ SVN).
  • the unrecoverable TCB derives all of the previous Storage Keys 824 as follows:
  • the unrecoverable TCB then sends all the Storage Keys to the recoverable TCB.
  • only one prior storage key is computed.
  • a platform 502 that controls storage of data protected by a storage key 806 may only require access to the current Storage Key and its prior Storage Key.
  • the prior storage key is the storage key that was used by the platform 502 prior to the last firmware update.
  • the unrecoverable TCB 810 outputs two Storage Keys, a first storage key 806 for the current SVN and a second storage key 824 for the prior SVN. As the user of the platform may skip some firmware upgrades, the prior SVN (pSVN) may not be SVN ⁇ 1.
  • the unrecoverable TCB 802 computes the following:
  • SK[SVN] PRF(device unique key,“Storage Key” ⁇ SVN).
  • SK[ p SVN] PRF(device unique key,“Storage Key” ⁇ p SVN).
  • SVN is the current SVN
  • pSVN is the prior SVN
  • PRF is a pseudo random function
  • the SVN 808 is available from the firmware of the TCB 800 .
  • the pSVN can be provided to the unrecoverable TCB 810 from the non-volatile memory in which it is stored.
  • the platform stores pSVN in the Flash Partition Table FPT partition of the Built In Operating System (BIOS).
  • BIOS Built In Operating System
  • a previous storage key can be derived without using a pSVN.
  • FIG. 10 is a flowgraph of an embodiment of a hash chain method to perform key derivation to compute prior storage keys.
  • a platform 502 that does not have control over where protected data is stored, multiple prior storage keys 824 are needed to ensure proper access to previously protected data.
  • the current SVN 808 is read from the recoverable TCB firmware. Processing continues with block 1002 .
  • n there are a maximum number of recoverable prior SVNs (‘n’).
  • the maximum number of recoverable prior SVNs can be 32. If the current SVN is less than the maximum number of recoverable prior SVNs, processing continues with block 1004 . If not, that is SVN is greater than n, the provisioning key and storage key cannot be derived and the TCB is no longer recoverable.
  • the value of the storage key corresponding to the maximum number of recoverable storage keys is computed as follows:
  • SK[ n ] PRF(device unique key,“Storage Key” ⁇ n).
  • SK[SVN] is output.
  • the unrecoverable TCB 810 only needs to output a single storage key 806 .
  • the amount of computation to derive the storage key increases as maximum number of prior storage keys increases but if the maximum number of prior storage keys is small, the number of prior storage keys that can be recovered is reduced.
  • some storage keys are directly derived from the device unique key 110 , and other storage keys are computed from the hash of the next version.
  • the value of the storage keys are defined as follows:
  • SK[ i ] PRF(device unique key,“Storage Key” ⁇ i )if i is a multiplier of n,
  • FIG. 11 is a flowgraph illustrating an embodiment of a method performed by the unrecoverable TCB to derive the storage keys.
  • the SVN 808 is read from the unrecoverable TCB firmware. Processing continues with block 1102 .
  • the current storage key is derived using the device unique key 110 as follows:
  • the prior storage keys are computed using the current storage key as follows:
  • the compute storage keys, SK[SVN], SK[n], SK[2n], . . . , SK[(m ⁇ 1) ⁇ n] are output to the recoverable TCB.
  • Embodiments of methods to compute previous storage keys 824 for a single recoverable TCB have been described.
  • a platform can have multiple layers of recoverable TCBs.
  • each layer of TCB has its own SVN 808 .
  • Each layer has a derived key computed by the previous layer. If the security version number is an integer, each layer of TCB may need to verify the signature of the next layer TCB firmware.
  • the unrecoverable TCB can be a firmware patch loader
  • the layer 1 TCB is firmware layer 1
  • layer 2 TCB is the firmware implementation of a higher level technology.
  • FIG. 12 is a block diagram illustrating the unrecoverable TCB 810 and layer 1 TCB 1202 .
  • the unrecoverable TCB 810 receives the device unique key 110 .
  • the unrecoverable TCB 810 verifies the signature of unrecoverable TCB firmware and forwards unrecoverable TCB's SVN to block 1206 .
  • the unrecoverable TCB derives a key for Layer 1 TCB 1202 based on performing a pseudo random function on the received device unique key 110 and unrecoverable TCB's SVN.
  • each level of a multi-layer TCB can produce two keys based on the SVN and pSVN of that layer. These two keys are derived from the SVN and pSVN keys of the previous layer.
  • the hash chain method discussed in conjunction with FIG. 10 provides single layer TCB recovery, however this does not scale to multiple layers.
  • a hybrid approach uses the hash chain to protect a recoverable layer.
  • the recoverable layer stores the remaining layer SVNs and can derive storage keys for any arbitrary combination of pSVN of different layers on demand.
  • FIG. 13 is a block diagram illustrating a hybrid approach using a hash chain to protect a recoverable layer.
  • Four layers are shown: an unrecoverable TCB layer 810 , layer 1 TCB 1300 , layer 2 TCB 1302 and layer 3 1304 . All four layers shown can be implemented in an embodiment for a processor unit. Only two of the layers: an unrecoverable TCB layer 810 and layer 1 TCB 1300 are typically used in an embodiment for a chipset.
  • the key register 1314 can be a special register in the processor unit or chipset that is used by the unrecoverable TCB layer 810 and by layer 3 1304 in an embodiment for a processor unit.
  • the TCB for each layer (i) is computed as follows:
  • TCB[ i ] SVN of TCB layer i.
  • the unrecoverable TCB layer 810 receives the stored device unique key 110 , verifies the integrity and source of Layer 1 recoverable TCB firmware and calculates SK[TCB[1]] using hash chaining in the PRF loop 1312 .
  • the PRF loop 1312 derives a provisioning key for a particular layer for a particular revision of the key and stores the provisioning key for layer 1 CB 1300 in the key register.
  • the PRF loop also generates the Layer 1 SVN 1305 , Layer 2 SVN 1306 and Layer 3 SVN 1308 .
  • the PRF function performed in the PRF loop 1312 can be a hash function that is performed on the root key and the current TCB version (or a previous TCB version number).
  • Layer 1 TCB 1302 verifies the integrity and source of Layer 2 and stores Layer 2 's Security Version Number (SVN) 1306 generated by PRF loop 1312 in a protected register, for example, in a TCBSVN Register 1310 .
  • the TCBSVN Register 1310 can be protected from being overwritten by the other layers.
  • Layer 2 through the last layer perform the same operations as discussed in conjunction with layer 1 1300 .
  • Instructions implemented in the last layer can call a layer 1 function getKey (TCB_request[ ]) which performs the following operations.
  • TCB_request[i] > TCB[i]
  • tmp SK[TCB_request[i]] using chaining Return PRF(tmp, “Storage Key” ⁇ j ⁇ k); where j and k are SVNs for layer 1 TCB 1300 and layer 2 TCB 1302.
  • the storage key 806 for any previous permutation of TCB layers can be derived, if layer 1 remains active.
  • Layer 3 1304 also uses the provisioning key stored in the key register 1314 and performs an optional PRF function in PRF loop 1318 if required to generate a previous version of the provisioning key.
  • a PRF function is performed at 1320 on either the stored provisioning key stored in the key register 1314 or derived in PRF loop 1318 with the stored layer 2 SVN 1306 and stored layer 3 SVN 1308 .
  • the storage keys are computed based on the result of this PRF function 1326 .
  • FIG. 14 illustrates an embodiment of a DAK provisioning protocol between a platform 502 and a provisioning server 500 .
  • the platform 502 and the provisioning server 500 set up a secure communication channel using a standard protocol, such as TLS/SSL.
  • the platform 502 encrypts a message using its previous DAK and sends the encrypted message to the provisioning server 500 .
  • the provisioning server 500 checks the previous DAK and performs a revocation check on the previous DAK to determine if it has been revoked. If the platform 502 has been revoked, the provisioning server 500 terminates the protocol.
  • the Platform sends the Provisioning ID 802 over the secure channel to the provisioning server 500 .
  • the provisioning server 500 searches the DAK provisioning database using the received provisioning ID (one per hardware device 102 ) and retrieves the encrypted new DAK for the platform 502 .
  • the provisioning server 500 sends the new encrypted DAK to the platform 502 .
  • the DAK re-provisioning is modified to store the DAK in the provisioning server 500 .
  • FIG. 15 illustrates an embodiment of the re-provisioning protocol in FIG. 14 between the platform 502 and the provisioning server 500 that supports privacy.
  • the platform 502 sets up a secure channel with the provisioning server 500 .
  • the platform 502 proves that it has not been revoked by sending its previous DAK to the provisioning server 500 .
  • the platform 502 sends the Provisioning ID over the secure channel to the provisioning server 500 .
  • the provisioning server 500 searches the DAK provisioning database for a match for the previous DAK and retrieves the new DAK for the platform 502 .
  • the provisioning server 500 sends the new DAK encrypted using the provisioning key 804 back to platform 502 .
  • the platform 502 decrypts the encrypted DAK using its provisioning key 804 .
  • the platform 502 re-encrypts the received new DAK using its storage key 806 , which is unknown to the provisioning server 500 and key generation server 106 .
  • the platform 502 sends the new DAK encrypted by its storage key 806 to the provisioning server 500 .
  • the provisioning server 500 deletes the platform's DAK from its database and stores the new DAK encrypted by its storage key in the database.
  • FIG. 16 illustrates an embodiment of a DAK backup retrieval protocol between the platform and the provisioning server 500 that stores the platform's DAK encrypted by its storage key.
  • the platform If the platform loses its DAK, it can download the DAK stored in the database in the provisioning server 500 .
  • the platform 502 encrypts its provisioning ID 804 using the provisioning server's public key and sends the encrypted provisioning ID to the provisioning server 500 .
  • the provisioning server 500 decrypts the provisioning ID and searches for an entry corresponding to the provisioning ID in the provisioning server's database.
  • the provisioning server 500 sends the DAK encrypted in by the platform's storage key 806 that is stored in the provisioning server 500 's database to the platform.
  • the platform 502 uses its storage key to decrypt the received encrypted DAK (the backup copy of the DAK).
  • the Previous Security Version Number (PSVN) is stored in a non-volatile re-writable memory such as a Flash memory in the platform 502 .
  • a simple wear-out protection algorithm is used to store the PSVN persistently in the non-volatile re-writable memory with minimal flash file system support to avoid erase cycles in the non-volatile re-writable memory.
  • a 64-byte block (partition) in the non-volatile re-writable memory is used to store the Previous Security Version (PSVN).
  • Each byte represents a potential PSVN, with only a single byte of the 64-byte block being valid at any time.
  • the default value for a byte in the 64-byte block is 255 (0xFF in hexadecimal representation). If the value of the byte is 0 (0x00 in hexadecimal representation), the PSVN entry has already been used and is now invalid. Any other value (1 through 254 (0x01-0xFE in hexadecimal representation)) indicates that the PSVN entry is valid.
  • FIG. 17 is flowgraph of an embodiment of a method for storing a PSVN in the non-volatile re-writable memory.
  • processing continues with block 1705 . If not, processing continues with block 1706 .
  • the previous root key is derived.
  • the number of PSVN entries exceeds 64 (the number of locations available in the 64-byte block reserved for storing PSVN entries), no provisioning keys can be derived and the DAK keys cannot be re-keyed.
  • a method and apparatus has been described for a platform to prove the TCB has been patched by facilitating provisioning of a new DAK.
  • This method and apparatus can be used by security applications such as, Manageability Engine (ME), and TPM.
  • ME Manageability Engine
  • a computer usable medium may consist of a read only memory device, such as a Compact Disk Read Only Memory (CD ROM) disk or conventional ROM devices, or a computer diskette, having a computer readable program code stored thereon.
  • a computer usable medium may consist of a read only memory device, such as a Compact Disk Read Only Memory (CD ROM) disk or conventional ROM devices, or a computer diskette, having a computer readable program code stored thereon.
  • CD ROM Compact Disk Read Only Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
US12/956,793 2010-11-30 2010-11-30 Method and apparatus for key provisioning of hardware devices Abandoned US20120137137A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US12/956,793 US20120137137A1 (en) 2010-11-30 2010-11-30 Method and apparatus for key provisioning of hardware devices
EP11844100.5A EP2647156A4 (en) 2010-11-30 2011-11-11 Method and apparatus for key provisioning of hardware devices
CN201180057317.3A CN103229451B (zh) 2010-11-30 2011-11-11 用于硬件设备的密钥供应的方法和装置
JP2013536941A JP5690412B2 (ja) 2010-11-30 2011-11-11 ハードウェアデバイスの鍵プロビジョン方法および装置
PCT/US2011/060345 WO2012074720A1 (en) 2010-11-30 2011-11-11 Method and apparatus for key provisioning of hardware devices
TW100142701A TWI567579B (zh) 2010-11-30 2011-11-22 用於對硬體裝置提供金鑰的方法和設備
US13/987,807 US9043604B2 (en) 2010-11-30 2013-09-05 Method and apparatus for key provisioning of hardware devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/956,793 US20120137137A1 (en) 2010-11-30 2010-11-30 Method and apparatus for key provisioning of hardware devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/987,807 Continuation US9043604B2 (en) 2010-11-30 2013-09-05 Method and apparatus for key provisioning of hardware devices

Publications (1)

Publication Number Publication Date
US20120137137A1 true US20120137137A1 (en) 2012-05-31

Family

ID=46127438

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/956,793 Abandoned US20120137137A1 (en) 2010-11-30 2010-11-30 Method and apparatus for key provisioning of hardware devices
US13/987,807 Active US9043604B2 (en) 2010-11-30 2013-09-05 Method and apparatus for key provisioning of hardware devices

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/987,807 Active US9043604B2 (en) 2010-11-30 2013-09-05 Method and apparatus for key provisioning of hardware devices

Country Status (6)

Country Link
US (2) US20120137137A1 (ja)
EP (1) EP2647156A4 (ja)
JP (1) JP5690412B2 (ja)
CN (1) CN103229451B (ja)
TW (1) TWI567579B (ja)
WO (1) WO2012074720A1 (ja)

Cited By (102)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110276809A1 (en) * 2008-10-23 2011-11-10 Herve Sibert Method of Storing Data in a Memory Device and a Processing Device for Processing Such Data
US20130007739A1 (en) * 2011-06-30 2013-01-03 Indrajit Poddar Virtual machine disk image installation
US20130046981A1 (en) * 2011-08-17 2013-02-21 Vixs Systems, Inc. Secure provisioning of integrated circuits at various states of deployment, methods thereof
US20130145164A1 (en) * 2011-12-02 2013-06-06 Yuji Nagai Semiconductor memory device
US20130339732A1 (en) * 2012-06-15 2013-12-19 Kabushiki Kaisha Toshiba Device
US8634557B2 (en) 2011-12-02 2014-01-21 Kabushiki Kaisha Toshiba Semiconductor storage device
US8645677B2 (en) * 2011-09-28 2014-02-04 Intel Corporation Secure remote credential provisioning
US8650393B2 (en) 2011-11-11 2014-02-11 Kabushiki Kaisha Toshiba Authenticator
US8661527B2 (en) 2011-08-31 2014-02-25 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US8667286B2 (en) 2012-01-16 2014-03-04 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US20140093074A1 (en) * 2012-09-28 2014-04-03 Kevin C. Gotze Secure provisioning of secret keys during integrated circuit manufacturing
WO2014051741A2 (en) * 2012-09-28 2014-04-03 Intel Corporation Integrated circuits having accessible and inaccessible physically unclonable functions
US20140122885A1 (en) * 2012-11-01 2014-05-01 Miiicasa Taiwan Inc. Method and system for managing device identification
US20140133652A1 (en) * 2012-11-12 2014-05-15 Renesas Electronics Corporation Semiconductor device and information processing system for encrypted communication
US20140143552A1 (en) * 2012-11-18 2014-05-22 Cisco Technology Inc. Glitch Resistant Device
US8761389B2 (en) 2011-12-02 2014-06-24 Kabushiki Kaisha Toshiba Memory
WO2014105146A1 (en) * 2012-12-29 2014-07-03 Intel Corporation Secure key derivation and cryptography logic for integrated circuits
US20140189374A1 (en) * 2011-08-23 2014-07-03 Bernd Meyer System and method for the secure transmission of data
US8812843B2 (en) 2011-12-02 2014-08-19 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8856515B2 (en) 2012-11-08 2014-10-07 Intel Corporation Implementation of robust and secure content protection in a system-on-a-chip apparatus
US8885819B2 (en) * 2012-12-27 2014-11-11 Intel Corporation Fuse attestation to secure the provisioning of secret keys during integrated circuit manufacturing
US20140351584A1 (en) * 2011-08-12 2014-11-27 Power-One Italy S.P.A. Method and system for protected transmission of files
US20140365763A1 (en) * 2013-06-07 2014-12-11 Qualcomm Incorporated Apparatus and method for provisioning an endorsement key certificate for a firmware trusted platform module
US20140380057A1 (en) * 2013-06-05 2014-12-25 Huawei Technologies Co., Ltd. Method, Server, Host, and System for Protecting Data Security
US8938792B2 (en) * 2012-12-28 2015-01-20 Intel Corporation Device authentication using a physically unclonable functions based key generation system
US8984294B2 (en) 2013-02-15 2015-03-17 Kabushiki Kaisha Toshiba System of authenticating an individual memory device via reading data including prohibited data and readable data
US9043604B2 (en) 2010-11-30 2015-05-26 Intel Corporation Method and apparatus for key provisioning of hardware devices
CN104734854A (zh) * 2013-12-23 2015-06-24 西门子公司 密钥的安全提供
WO2015116288A3 (en) * 2013-11-10 2015-10-08 Sypris Electronics, Llc Authenticatable device
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US9201811B2 (en) 2013-02-14 2015-12-01 Kabushiki Kaisha Toshiba Device and authentication method therefor
US9258315B2 (en) * 2014-01-13 2016-02-09 Cisco Technology, Inc. Dynamic filtering for SDN API calls across a security boundary
WO2016025940A1 (en) * 2014-08-15 2016-02-18 Sypris Electronics, Llc Resilient device authentication system with metadata binding
US20160078251A1 (en) * 2014-09-16 2016-03-17 Freescale Semiconductor, Inc. Key storage and revocation in a secure memory system
US9479328B1 (en) * 2013-06-11 2016-10-25 Amazon Technologies, Inc. Secure key provisioning
US9497171B2 (en) 2011-12-15 2016-11-15 Intel Corporation Method, device, and system for securely sharing media content from a source device
US9519757B2 (en) * 2014-02-26 2016-12-13 Unisys Corporation AES-GCM based enhanced security setup for media encryption
US9544141B2 (en) 2011-12-29 2017-01-10 Intel Corporation Secure key storage using physically unclonable functions
US20170039368A1 (en) * 2013-09-27 2017-02-09 Mcafee, Inc. Trusted execution of an executable object on a local device
US20170091463A1 (en) * 2015-09-25 2017-03-30 Ty Lindteigen Secure Audit Logging
WO2017065900A1 (en) * 2015-10-13 2017-04-20 Sony Interactive Entertainment America Llc Secure key store derivation and management from a single secure root key
US9646154B2 (en) 2014-12-12 2017-05-09 Microsoft Technology Licensing, Llc Return oriented programming (ROP) attack protection
US9672342B2 (en) 2014-05-05 2017-06-06 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
EP3075096A4 (en) * 2014-03-11 2017-06-07 Tencent Technology (Shenzhen) Company Limited Method and system for encrypted communications
US9714004B2 (en) 2015-02-02 2017-07-25 Kabushiki Kaisha Tokai Rika Denki Seisakusho Electronic key registration system
EP3214797A1 (en) * 2016-03-01 2017-09-06 Siemens Aktiengesellschaft Deriving a device unique encryption key of a system on chip using a physical unclonable function
US9819493B2 (en) * 2014-02-26 2017-11-14 Unisys Corporation Enhanced security for media encryption
US9825764B2 (en) * 2014-02-26 2017-11-21 Unisys Corporation Enhanced security for media decryption
US9887838B2 (en) 2011-12-15 2018-02-06 Intel Corporation Method and device for secure communications over a network using a hardware security engine
US9913135B2 (en) 2014-05-13 2018-03-06 Element, Inc. System and method for electronic key provisioning and access management in connection with mobile devices
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9965728B2 (en) 2014-06-03 2018-05-08 Element, Inc. Attendance authentication and management in connection with mobile devices
WO2018089006A1 (en) * 2016-11-10 2018-05-17 Ernest Brickell Balancing public and personal security needs
US9996480B2 (en) 2012-07-18 2018-06-12 Analog Devices, Inc. Resilient device authentication system with metadata binding
US20180234410A1 (en) * 2013-10-29 2018-08-16 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US10135815B2 (en) 2012-09-05 2018-11-20 Element, Inc. System and method for biometric authentication in connection with camera equipped devices
CN109074466A (zh) * 2016-06-18 2018-12-21 英特尔公司 用于服务器的平台证明和注册
US20190087577A1 (en) * 2017-09-18 2019-03-21 Nxp B.V. Method for protecting the confidentiality and integrity of firmware for an internet of things device
US20190097795A1 (en) * 2017-09-26 2019-03-28 Samsung Sds Co., Ltd. Method of provisioning key information and apparatus using the method
US20190103961A1 (en) * 2017-09-29 2019-04-04 Intel Corporation System and techniques for encrypting chip-to-chip communication links
US10282533B2 (en) 2013-03-22 2019-05-07 Nok Nok Labs, Inc. System and method for eye tracking during authentication
CN109787756A (zh) * 2018-12-24 2019-05-21 吉林微思智能科技有限公司 一种基于白盒加密技术的车载终端密钥分发管理方法
US10348706B2 (en) 2017-05-04 2019-07-09 Ernest Brickell Assuring external accessibility for devices on a network
US10382962B2 (en) 2014-05-22 2019-08-13 Analog Devices, Inc. Network authentication system with dynamic key generation
US10425235B2 (en) 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10440006B2 (en) 2017-06-21 2019-10-08 Microsoft Technology Licensing, Llc Device with embedded certificate authority
US10498712B2 (en) 2016-11-10 2019-12-03 Ernest Brickell Balancing public and personal security needs
US20190372780A1 (en) * 2018-05-31 2019-12-05 Motorola Solutions, Inc. Method for provisioning device certificates for electronic processors in untrusted environments
US10558812B2 (en) 2017-06-21 2020-02-11 Microsoft Technology Licensing, Llc Mutual authentication with integrity attestation
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10652245B2 (en) 2017-05-04 2020-05-12 Ernest Brickell External accessibility for network devices
US10735959B2 (en) 2017-09-18 2020-08-04 Element Inc. Methods, systems, and media for detecting spoofing in mobile authentication
US10735205B1 (en) * 2019-03-08 2020-08-04 Ares Technologies, Inc. Methods and systems for implementing an anonymized attestation chain
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10855465B2 (en) 2016-11-10 2020-12-01 Ernest Brickell Audited use of a cryptographic key
US20200387611A1 (en) * 2017-12-22 2020-12-10 Vincent J. Zimmer Manageability engine and automatic firmware validation
US10878106B2 (en) * 2018-08-01 2020-12-29 Vdoo Connected Trust Ltd. Firmware verification
US10938560B2 (en) 2017-06-21 2021-03-02 Microsoft Technology Licensing, Llc Authorization key escrow
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
NL1044044A (en) 2020-05-28 2021-12-01 Sandgrain B V Centralized handling of ic identification codes
NL2025695B1 (en) * 2020-05-28 2022-01-13 Sandgrain B V Centralized handling of ic identification codes
US20220050605A1 (en) * 2018-12-03 2022-02-17 Nagravision Sa Remote enforcement of device memory
US11308241B2 (en) * 2018-05-14 2022-04-19 Innogrit Technologies Co., Ltd. Security data generation based upon software unreadable registers
US20220129565A1 (en) * 2019-07-09 2022-04-28 Huawei Technologies Co., Ltd. Operation method, operation apparatus, and device
US11343277B2 (en) 2019-03-12 2022-05-24 Element Inc. Methods and systems for detecting spoofing of facial recognition in connection with mobile devices
US11374760B2 (en) 2017-09-13 2022-06-28 Microsoft Technology Licensing, Llc Cyber physical key
US11398906B2 (en) 2016-11-10 2022-07-26 Brickell Cryptology Llc Confirming receipt of audit records for audited use of a cryptographic key
CN114830110A (zh) * 2019-11-07 2022-07-29 美光科技公司 单次使用密码产生
US11405201B2 (en) 2016-11-10 2022-08-02 Brickell Cryptology Llc Secure transfer of protected application storage keys with change of trusted computing base
US20220245252A1 (en) * 2022-02-22 2022-08-04 Intel Corporation Seamless firmware update mechanism
US11409877B2 (en) * 2020-03-27 2022-08-09 Intel Corporation Firmware verification mechanism
US11463267B2 (en) 2016-09-08 2022-10-04 Nec Corporation Network function virtualization system and verifying method
US11507248B2 (en) 2019-12-16 2022-11-22 Element Inc. Methods, systems, and media for anti-spoofing using eye-tracking
US20220417042A1 (en) * 2021-06-25 2022-12-29 Intel Corporation Platform sealing secrets using physically unclonable function (puf) with trusted computing base (tcb) recoverability
WO2023011850A1 (en) * 2021-08-04 2023-02-09 International Business Machines Corporation Deploying a system-specific secret in a highly resilient computer system
US20230205895A1 (en) * 2021-12-29 2023-06-29 Arm Limited Methods and apparatus for provisioning a device
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9171133B2 (en) * 2013-10-11 2015-10-27 Landis+Gyr Innovations, Inc. Securing a device and data within the device
EP2911086A1 (en) * 2014-02-19 2015-08-26 Renesas Electronics Europe GmbH Integrated circuit with parts activated based on intrinsic features
CN104868998B (zh) * 2014-02-23 2017-08-01 阿姆科技以色列有限公司 一种向电子设备供应加密数据的系统、设备和方法
US10621330B2 (en) * 2014-03-28 2020-04-14 Hewlett-Packard Development Company, L.P. Allowing use of a test key for a BIOS installation
US9594910B2 (en) 2014-03-28 2017-03-14 Intel Corporation In-system provisioning of firmware for a hardware platform
GB2531248B (en) 2014-10-08 2017-02-22 Ibm Controlled use of a hardware security module
EP3007094B1 (en) * 2014-10-08 2021-05-05 Nintendo Co., Ltd. Boot program, information processing apparatus, information processing system, information processing method, semiconductor apparatus, and program
US9584317B2 (en) * 2014-10-13 2017-02-28 Microsoft Technology Licensing, Llc Identifying security boundaries on computing devices
US9667606B2 (en) * 2015-07-01 2017-05-30 Cyphermatrix, Inc. Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments
CN105184121A (zh) * 2015-09-02 2015-12-23 上海繁易电子科技有限公司 一种通过远程服务器的硬件授权系统和方法
US9917687B2 (en) 2015-10-12 2018-03-13 Microsoft Technology Licensing, Llc Migrating secrets using hardware roots of trust for devices
US9953167B2 (en) 2015-10-12 2018-04-24 Microsoft Technology Licensing, Llc Trusted platforms using minimal hardware resources
CN105701407B (zh) * 2016-01-08 2018-04-10 腾讯科技(深圳)有限公司 安全级别确定方法及装置
WO2017135942A1 (en) * 2016-02-03 2017-08-10 Hewlett-Packard Development Company, L.P. Heartbeat signal verification
CN106022166B (zh) * 2016-06-02 2018-10-23 东北大学 一种代码复用攻击防御系统及方法
US10785022B2 (en) * 2016-09-13 2020-09-22 Hiroshi Watanabe Network without abuse of a private key
US10482036B2 (en) * 2016-09-18 2019-11-19 Winbond Electronics Corporation Securely binding between memory chip and host
GB2556638B (en) * 2016-12-02 2018-12-12 Gurulogic Microsystems Oy Protecting usage of key store content
CN109120573B (zh) * 2017-06-22 2021-06-04 武汉大学 传输密钥生成方法、终端及服务器
US10505732B2 (en) 2017-08-14 2019-12-10 Nxp B.V. Method for generating a public/private key pair and public key certificate for an internet of things device
EP3483772A1 (en) * 2017-11-14 2019-05-15 Nagravision S.A. Integrated circuit personalisation with data encrypted with the output of a physically unclonable function
CN108155986A (zh) 2017-12-14 2018-06-12 晶晨半导体(上海)股份有限公司 一种基于可信执行环境的密钥烧录系统及方法
WO2019125238A1 (en) * 2017-12-19 2019-06-27 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for handling lldp messages in a communication network
CN110489351B (zh) 2018-05-14 2021-03-09 英韧科技(上海)有限公司 芯片指纹管理装置及安全芯片
CN109639409B (zh) * 2018-09-20 2021-05-04 创新先进技术有限公司 密钥初始化方法、装置、电子设备及计算机可读存储介质
US11100228B2 (en) * 2018-10-25 2021-08-24 Dell Products, L.P. System and method to recover FPGA firmware over a sideband interface
US10742421B1 (en) * 2019-03-08 2020-08-11 Ares Technologies, Inc. Methods and systems for anonymous hardware attestation
TWI758697B (zh) * 2019-03-22 2022-03-21 旺宏電子股份有限公司 積體電路、記憶體電路以及用於操作積體電路的方法
WO2020238878A1 (zh) * 2019-05-31 2020-12-03 创新先进技术有限公司 动态加密方法及装置
EP4318285A3 (en) * 2019-06-10 2024-03-13 Google LLC Secure verification of firmware
TWI774986B (zh) * 2019-09-09 2022-08-21 新唐科技股份有限公司 金鑰儲存系統及金鑰儲存方法
CN111082925B (zh) * 2019-10-23 2021-07-30 中山大学 基于aes算法和puf技术的嵌入式系统加密保护装置和方法
CN112398657B (zh) * 2020-11-05 2021-10-29 北京邮电大学 一种基于无线多径衰落信道的puf认证方法及装置
US11736285B2 (en) * 2020-12-11 2023-08-22 PUFsecurity Corporation Method for controlling device activation and associated electronic device
US11783057B2 (en) 2021-08-24 2023-10-10 Nxp B.V. Method for securely provisioning a device incorporating an integrated circuit without using a secure environment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6829596B1 (en) * 2000-05-23 2004-12-07 Steve Frazee Account/asset activation device and method
US20050022025A1 (en) * 2003-06-30 2005-01-27 Hug Joshua D. Rights enforcement and usage reporting on a client device
US7353388B1 (en) * 2004-02-09 2008-04-01 Avaya Technology Corp. Key server for securing IP telephony registration, control, and maintenance
US20080244698A1 (en) * 2004-10-13 2008-10-02 Matsushita Electric Industrial Co., Ltd. Authorized Content Verification Method, Content Transmission/Reception System, Transmitter, and Receiver
CN101699891A (zh) * 2009-10-21 2010-04-28 西安西电捷通无线网络通信有限公司 一种传感器网络密钥管理和节点鉴别方法
WO2010116618A1 (ja) * 2009-04-06 2010-10-14 パナソニック株式会社 鍵実装システム
US20110091037A1 (en) * 2009-10-16 2011-04-21 Cisco Technology, Inc. Content protection key encryptor for security providers
US8205080B2 (en) * 2007-05-11 2012-06-19 Microsoft Corporation Over the air communication authentication using a device token

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4457474B2 (ja) * 2000-04-04 2010-04-28 ソニー株式会社 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体
TW583568B (en) * 2001-08-27 2004-04-11 Dataplay Inc A secure access method and system
AU2003303882A1 (en) * 2003-02-03 2004-08-30 Nokia Corporation Architecture for encrypted application installation
US7778422B2 (en) * 2004-02-27 2010-08-17 Microsoft Corporation Security associations for devices
US7697691B2 (en) * 2004-07-14 2010-04-13 Intel Corporation Method of delivering Direct Proof private keys to devices using an on-line service
WO2008015603A1 (en) 2006-07-31 2008-02-07 Koninklijke Philips Electronics N.V. Device and method for generating a random bit string
DE102006046017B4 (de) * 2006-09-28 2010-01-14 Siemens Ag Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls
US8031009B2 (en) 2008-12-02 2011-10-04 Electronics And Telecommunications Research Institute Frequency calibration loop circuit
JP5183517B2 (ja) * 2009-02-05 2013-04-17 三菱電機株式会社 情報処理装置及びプログラム
WO2010134192A1 (ja) * 2009-05-22 2010-11-25 三菱電機株式会社 電子機器及び鍵生成プログラム及び記録媒体及び鍵生成方法
US8677459B2 (en) * 2009-08-11 2014-03-18 Broadcom Corporation Secure zero-touch provisioning of remote management controller
US20120137137A1 (en) 2010-11-30 2012-05-31 Brickell Ernest F Method and apparatus for key provisioning of hardware devices

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6829596B1 (en) * 2000-05-23 2004-12-07 Steve Frazee Account/asset activation device and method
US20050022025A1 (en) * 2003-06-30 2005-01-27 Hug Joshua D. Rights enforcement and usage reporting on a client device
US7353388B1 (en) * 2004-02-09 2008-04-01 Avaya Technology Corp. Key server for securing IP telephony registration, control, and maintenance
US20080244698A1 (en) * 2004-10-13 2008-10-02 Matsushita Electric Industrial Co., Ltd. Authorized Content Verification Method, Content Transmission/Reception System, Transmitter, and Receiver
US8205080B2 (en) * 2007-05-11 2012-06-19 Microsoft Corporation Over the air communication authentication using a device token
WO2010116618A1 (ja) * 2009-04-06 2010-10-14 パナソニック株式会社 鍵実装システム
US20110091037A1 (en) * 2009-10-16 2011-04-21 Cisco Technology, Inc. Content protection key encryptor for security providers
CN101699891A (zh) * 2009-10-21 2010-04-28 西安西电捷通无线网络通信有限公司 一种传感器网络密钥管理和节点鉴别方法
US20120300939A1 (en) * 2009-10-21 2012-11-29 China Iwncomm Co., Ltd. Key management and node authentication method for sensor network

Cited By (175)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8607068B2 (en) * 2008-10-23 2013-12-10 St-Ericsson Sa Method of storing data in a memory device and a processing device for processing such data
US20110276809A1 (en) * 2008-10-23 2011-11-10 Herve Sibert Method of Storing Data in a Memory Device and a Processing Device for Processing Such Data
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US9043604B2 (en) 2010-11-30 2015-05-26 Intel Corporation Method and apparatus for key provisioning of hardware devices
US20130007739A1 (en) * 2011-06-30 2013-01-03 Indrajit Poddar Virtual machine disk image installation
US9875133B2 (en) 2011-06-30 2018-01-23 International Business Machines Corporation Virtual machine disk image installation
US9280336B2 (en) * 2011-06-30 2016-03-08 International Business Machines Corporation Virtual machine disk image installation
US20140351584A1 (en) * 2011-08-12 2014-11-27 Power-One Italy S.P.A. Method and system for protected transmission of files
US9225692B2 (en) * 2011-08-12 2015-12-29 Abb Technology Ag Method and system for protected transmission of files
US20130046981A1 (en) * 2011-08-17 2013-02-21 Vixs Systems, Inc. Secure provisioning of integrated circuits at various states of deployment, methods thereof
US9203617B2 (en) * 2011-08-17 2015-12-01 Vixs Systems, Inc. Secure provisioning of integrated circuits at various states of deployment, methods thereof
US9680643B2 (en) * 2011-08-23 2017-06-13 Siemens Aktiengesellschaft System and method for the secure transmission of data
US20140189374A1 (en) * 2011-08-23 2014-07-03 Bernd Meyer System and method for the secure transmission of data
US10361850B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US9225513B2 (en) 2011-08-31 2015-12-29 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US8661527B2 (en) 2011-08-31 2014-02-25 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US9887841B2 (en) 2011-08-31 2018-02-06 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US10361851B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US8645677B2 (en) * 2011-09-28 2014-02-04 Intel Corporation Secure remote credential provisioning
US9100187B2 (en) 2011-11-11 2015-08-04 Kabushiki Kaisha Toshiba Authenticator
US8650393B2 (en) 2011-11-11 2014-02-11 Kabushiki Kaisha Toshiba Authenticator
US8761389B2 (en) 2011-12-02 2014-06-24 Kabushiki Kaisha Toshiba Memory
US8732466B2 (en) * 2011-12-02 2014-05-20 Kabushiki Kaisha Toshiba Semiconductor memory device
US8812843B2 (en) 2011-12-02 2014-08-19 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8634557B2 (en) 2011-12-02 2014-01-21 Kabushiki Kaisha Toshiba Semiconductor storage device
US8855297B2 (en) 2011-12-02 2014-10-07 Kabushiki Kaisha Toshiba Device and authentication method therefor
US20130145164A1 (en) * 2011-12-02 2013-06-06 Yuji Nagai Semiconductor memory device
US9887838B2 (en) 2011-12-15 2018-02-06 Intel Corporation Method and device for secure communications over a network using a hardware security engine
US9497171B2 (en) 2011-12-15 2016-11-15 Intel Corporation Method, device, and system for securely sharing media content from a source device
US9544141B2 (en) 2011-12-29 2017-01-10 Intel Corporation Secure key storage using physically unclonable functions
US10284368B2 (en) 2011-12-29 2019-05-07 Intel Corporation Secure key storage
US8990571B2 (en) 2012-01-16 2015-03-24 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US9160531B2 (en) 2012-01-16 2015-10-13 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US8667286B2 (en) 2012-01-16 2014-03-04 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US20140223188A1 (en) * 2012-06-15 2014-08-07 Kabushiki Kaisha Toshiba Device
US8762717B2 (en) * 2012-06-15 2014-06-24 Kabushiki Kaisha Toshiba Authentication device
US20130339732A1 (en) * 2012-06-15 2013-12-19 Kabushiki Kaisha Toshiba Device
US9996480B2 (en) 2012-07-18 2018-06-12 Analog Devices, Inc. Resilient device authentication system with metadata binding
US10728242B2 (en) 2012-09-05 2020-07-28 Element Inc. System and method for biometric authentication in connection with camera-equipped devices
US10135815B2 (en) 2012-09-05 2018-11-20 Element, Inc. System and method for biometric authentication in connection with camera equipped devices
WO2014051741A3 (en) * 2012-09-28 2014-09-12 Intel Corporation Integrated circuits having accessible and inaccessible physically unclonable functions
US8928347B2 (en) 2012-09-28 2015-01-06 Intel Corporation Integrated circuits having accessible and inaccessible physically unclonable functions
GB2520196A (en) * 2012-09-28 2015-05-13 Intel Corp Integrated circuits having accessible and inaccessible physically unclonable functions
CN104584435A (zh) * 2012-09-28 2015-04-29 英特尔公司 有可访问和不可访问的物理不可克隆功能的集成电路
US9742563B2 (en) * 2012-09-28 2017-08-22 Intel Corporation Secure provisioning of secret keys during integrated circuit manufacturing
US20140093074A1 (en) * 2012-09-28 2014-04-03 Kevin C. Gotze Secure provisioning of secret keys during integrated circuit manufacturing
WO2014051741A2 (en) * 2012-09-28 2014-04-03 Intel Corporation Integrated circuits having accessible and inaccessible physically unclonable functions
US20140122885A1 (en) * 2012-11-01 2014-05-01 Miiicasa Taiwan Inc. Method and system for managing device identification
US9143383B2 (en) * 2012-11-01 2015-09-22 Miiicasa Taiwan Inc. Method and system for managing device identification
US8856515B2 (en) 2012-11-08 2014-10-07 Intel Corporation Implementation of robust and secure content protection in a system-on-a-chip apparatus
US9960914B2 (en) * 2012-11-12 2018-05-01 Renesas Electronics Corporation Semiconductor device and information processing system for encrypted communication
US10944554B2 (en) * 2012-11-12 2021-03-09 Renesas Electronics Corporation Semiconductor device and information processing system for encrypted communication
US20140133652A1 (en) * 2012-11-12 2014-05-15 Renesas Electronics Corporation Semiconductor device and information processing system for encrypted communication
US20180241559A1 (en) * 2012-11-12 2018-08-23 Renesas Electronics Corporation Semiconductor device and information processing system for encrypted communication
US20140143552A1 (en) * 2012-11-18 2014-05-22 Cisco Technology Inc. Glitch Resistant Device
US9158901B2 (en) * 2012-11-18 2015-10-13 Cisco Technology Inc. Glitch resistant device
US8885819B2 (en) * 2012-12-27 2014-11-11 Intel Corporation Fuse attestation to secure the provisioning of secret keys during integrated circuit manufacturing
US8938792B2 (en) * 2012-12-28 2015-01-20 Intel Corporation Device authentication using a physically unclonable functions based key generation system
KR20150079880A (ko) * 2012-12-29 2015-07-08 인텔 코포레이션 집적 회로를 위한 보안 키 도출 및 암호화 로직
US9390291B2 (en) 2012-12-29 2016-07-12 Intel Corporation Secure key derivation and cryptography logic for integrated circuits
WO2014105146A1 (en) * 2012-12-29 2014-07-03 Intel Corporation Secure key derivation and cryptography logic for integrated circuits
KR101726108B1 (ko) * 2012-12-29 2017-04-11 인텔 코포레이션 집적 회로를 위한 보안 키 도출 및 암호화 로직
US9201811B2 (en) 2013-02-14 2015-12-01 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8984294B2 (en) 2013-02-15 2015-03-17 Kabushiki Kaisha Toshiba System of authenticating an individual memory device via reading data including prohibited data and readable data
US10706132B2 (en) 2013-03-22 2020-07-07 Nok Nok Labs, Inc. System and method for adaptive user authentication
US10366218B2 (en) 2013-03-22 2019-07-30 Nok Nok Labs, Inc. System and method for collecting and utilizing client data for risk assessment during authentication
US10776464B2 (en) 2013-03-22 2020-09-15 Nok Nok Labs, Inc. System and method for adaptive application of authentication policies
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US10282533B2 (en) 2013-03-22 2019-05-07 Nok Nok Labs, Inc. System and method for eye tracking during authentication
US10762181B2 (en) 2013-03-22 2020-09-01 Nok Nok Labs, Inc. System and method for user confirmation of online transactions
US20140380057A1 (en) * 2013-06-05 2014-12-25 Huawei Technologies Co., Ltd. Method, Server, Host, and System for Protecting Data Security
EP2947811A4 (en) * 2013-06-05 2016-04-06 Huawei Tech Co Ltd METHOD, SERVER, HOST, AND SYSTEM FOR PROTECTING DATA SECURITY
CN105339948A (zh) * 2013-06-07 2016-02-17 高通股份有限公司 用于供应用于固件受信任平台模块的认可密钥证书的装置和方法
US20140365763A1 (en) * 2013-06-07 2014-12-11 Qualcomm Incorporated Apparatus and method for provisioning an endorsement key certificate for a firmware trusted platform module
JP2016521937A (ja) * 2013-06-07 2016-07-25 クアルコム,インコーポレイテッド ファームウェアトラステッドプラットフォームモジュールのためのエンドースメント鍵証明書をプロビジョニングするための装置および方法
US9100192B2 (en) * 2013-06-07 2015-08-04 Qualcomm Incorporated Apparatus and method for provisioning an endorsement key certificate for a firmware trusted platform module
US9479328B1 (en) * 2013-06-11 2016-10-25 Amazon Technologies, Inc. Secure key provisioning
US11907362B2 (en) 2013-09-27 2024-02-20 MAfee, LLC Trusted execution of an executable object on a local device
US10678908B2 (en) * 2013-09-27 2020-06-09 Mcafee, Llc Trusted execution of an executable object on a local device
US20170039368A1 (en) * 2013-09-27 2017-02-09 Mcafee, Inc. Trusted execution of an executable object on a local device
US10798087B2 (en) * 2013-10-29 2020-10-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US20180234410A1 (en) * 2013-10-29 2018-08-16 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US9998445B2 (en) 2013-11-10 2018-06-12 Analog Devices, Inc. Authentication system
WO2015116288A3 (en) * 2013-11-10 2015-10-08 Sypris Electronics, Llc Authenticatable device
US9806883B2 (en) 2013-12-23 2017-10-31 Siemens Aktiengesellschaft Secure provision of a key
CN104734854A (zh) * 2013-12-23 2015-06-24 西门子公司 密钥的安全提供
EP2899714A1 (de) * 2013-12-23 2015-07-29 Siemens Aktiengesellschaft Gesichertes Bereitstellen eines Schlüssels
US9258315B2 (en) * 2014-01-13 2016-02-09 Cisco Technology, Inc. Dynamic filtering for SDN API calls across a security boundary
US9825764B2 (en) * 2014-02-26 2017-11-21 Unisys Corporation Enhanced security for media decryption
US9819493B2 (en) * 2014-02-26 2017-11-14 Unisys Corporation Enhanced security for media encryption
US9519757B2 (en) * 2014-02-26 2016-12-13 Unisys Corporation AES-GCM based enhanced security setup for media encryption
EP3075096A4 (en) * 2014-03-11 2017-06-07 Tencent Technology (Shenzhen) Company Limited Method and system for encrypted communications
US10771267B2 (en) 2014-05-05 2020-09-08 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9672342B2 (en) 2014-05-05 2017-06-06 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
US10013543B2 (en) 2014-05-05 2018-07-03 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
US10931467B2 (en) 2014-05-05 2021-02-23 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9913135B2 (en) 2014-05-13 2018-03-06 Element, Inc. System and method for electronic key provisioning and access management in connection with mobile devices
US10382962B2 (en) 2014-05-22 2019-08-13 Analog Devices, Inc. Network authentication system with dynamic key generation
US9965728B2 (en) 2014-06-03 2018-05-08 Element, Inc. Attendance authentication and management in connection with mobile devices
WO2016025940A1 (en) * 2014-08-15 2016-02-18 Sypris Electronics, Llc Resilient device authentication system with metadata binding
US9830479B2 (en) * 2014-09-16 2017-11-28 Nxp Usa, Inc. Key storage and revocation in a secure memory system
US20160078251A1 (en) * 2014-09-16 2016-03-17 Freescale Semiconductor, Inc. Key storage and revocation in a secure memory system
US9646154B2 (en) 2014-12-12 2017-05-09 Microsoft Technology Licensing, Llc Return oriented programming (ROP) attack protection
US9714004B2 (en) 2015-02-02 2017-07-25 Kabushiki Kaisha Tokai Rika Denki Seisakusho Electronic key registration system
US20170091463A1 (en) * 2015-09-25 2017-03-30 Ty Lindteigen Secure Audit Logging
US9852300B2 (en) * 2015-09-25 2017-12-26 Saife, Inc. Secure audit logging
US9838201B2 (en) 2015-10-13 2017-12-05 Sony Interactive Entertainment America Llc Secure key store derivation and management from a single secure root key
WO2017065900A1 (en) * 2015-10-13 2017-04-20 Sony Interactive Entertainment America Llc Secure key store derivation and management from a single secure root key
EP3214797A1 (en) * 2016-03-01 2017-09-06 Siemens Aktiengesellschaft Deriving a device unique encryption key of a system on chip using a physical unclonable function
CN109074466A (zh) * 2016-06-18 2018-12-21 英特尔公司 用于服务器的平台证明和注册
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US11463267B2 (en) 2016-09-08 2022-10-04 Nec Corporation Network function virtualization system and verifying method
US10498712B2 (en) 2016-11-10 2019-12-03 Ernest Brickell Balancing public and personal security needs
WO2018089006A1 (en) * 2016-11-10 2018-05-17 Ernest Brickell Balancing public and personal security needs
US11115208B2 (en) * 2016-11-10 2021-09-07 Ernest Brickell Protecting sensitive information from an authorized device unlock
US10855465B2 (en) 2016-11-10 2020-12-01 Ernest Brickell Audited use of a cryptographic key
US11398906B2 (en) 2016-11-10 2022-07-26 Brickell Cryptology Llc Confirming receipt of audit records for audited use of a cryptographic key
US11405201B2 (en) 2016-11-10 2022-08-02 Brickell Cryptology Llc Secure transfer of protected application storage keys with change of trusted computing base
US10652245B2 (en) 2017-05-04 2020-05-12 Ernest Brickell External accessibility for network devices
US10771467B1 (en) 2017-05-04 2020-09-08 Ernest Brickell External accessibility for computing devices
US10348706B2 (en) 2017-05-04 2019-07-09 Ernest Brickell Assuring external accessibility for devices on a network
US10904256B2 (en) 2017-05-04 2021-01-26 Ernest Brickell External accessibility for computing devices
US10425235B2 (en) 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
US10938560B2 (en) 2017-06-21 2021-03-02 Microsoft Technology Licensing, Llc Authorization key escrow
US10558812B2 (en) 2017-06-21 2020-02-11 Microsoft Technology Licensing, Llc Mutual authentication with integrity attestation
US10440006B2 (en) 2017-06-21 2019-10-08 Microsoft Technology Licensing, Llc Device with embedded certificate authority
US11374760B2 (en) 2017-09-13 2022-06-28 Microsoft Technology Licensing, Llc Cyber physical key
US10482252B2 (en) * 2017-09-18 2019-11-19 Nxp B.V. Method for protecting the confidentiality and integrity of firmware for an Internet of Things device
US20190087577A1 (en) * 2017-09-18 2019-03-21 Nxp B.V. Method for protecting the confidentiality and integrity of firmware for an internet of things device
US10735959B2 (en) 2017-09-18 2020-08-04 Element Inc. Methods, systems, and media for detecting spoofing in mobile authentication
US11425562B2 (en) 2017-09-18 2022-08-23 Element Inc. Methods, systems, and media for detecting spoofing in mobile authentication
US11101994B2 (en) 2017-09-26 2021-08-24 Samsung Sds Co., Ltd. Method of provisioning key information and apparatus using the method
US20190097795A1 (en) * 2017-09-26 2019-03-28 Samsung Sds Co., Ltd. Method of provisioning key information and apparatus using the method
CN109560925A (zh) * 2017-09-26 2019-04-02 三星Sds株式会社 密钥信息供应方法及利用密钥信息供应方法的装置
KR20190035356A (ko) * 2017-09-26 2019-04-03 삼성에스디에스 주식회사 키 정보 프로비저닝 방법 및 이를 이용한 장치
WO2019066319A1 (en) * 2017-09-26 2019-04-04 Samsung Sds Co., Ltd. METHOD FOR PROVIDING KEY INFORMATION AND APPARATUS USING THE METHOD
KR102305858B1 (ko) * 2017-09-26 2021-09-27 삼성에스디에스 주식회사 키 정보 프로비저닝 방법 및 이를 이용한 장치
US20190103961A1 (en) * 2017-09-29 2019-04-04 Intel Corporation System and techniques for encrypting chip-to-chip communication links
US10666430B2 (en) * 2017-09-29 2020-05-26 Intel Corporation System and techniques for encrypting chip-to-chip communication links
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US20200387611A1 (en) * 2017-12-22 2020-12-10 Vincent J. Zimmer Manageability engine and automatic firmware validation
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11308241B2 (en) * 2018-05-14 2022-04-19 Innogrit Technologies Co., Ltd. Security data generation based upon software unreadable registers
US20190372780A1 (en) * 2018-05-31 2019-12-05 Motorola Solutions, Inc. Method for provisioning device certificates for electronic processors in untrusted environments
GB2587957B (en) * 2018-05-31 2022-11-09 Motorola Solutions Inc Method for provisioning device certificates for electronic processors in untrusted environments
GB2587957A (en) * 2018-05-31 2021-04-14 Motorola Solutions Inc Method for provisioning device certificates for electronic processors in untrusted environments
WO2019231683A1 (en) * 2018-05-31 2019-12-05 Motorola Solutions, Inc. Method for provisioning device certificates for electronic processors in untrusted environments
US10979232B2 (en) * 2018-05-31 2021-04-13 Motorola Solutions, Inc. Method for provisioning device certificates for electronic processors in untrusted environments
US10878106B2 (en) * 2018-08-01 2020-12-29 Vdoo Connected Trust Ltd. Firmware verification
US20220050605A1 (en) * 2018-12-03 2022-02-17 Nagravision Sa Remote enforcement of device memory
CN109787756A (zh) * 2018-12-24 2019-05-21 吉林微思智能科技有限公司 一种基于白盒加密技术的车载终端密钥分发管理方法
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator
WO2020185582A1 (en) * 2019-03-08 2020-09-17 Ares Technologies, Inc. Methods and systems for implementing an anonymized attestation chain
US10735205B1 (en) * 2019-03-08 2020-08-04 Ares Technologies, Inc. Methods and systems for implementing an anonymized attestation chain
US11343277B2 (en) 2019-03-12 2022-05-24 Element Inc. Methods and systems for detecting spoofing of facial recognition in connection with mobile devices
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US20220129565A1 (en) * 2019-07-09 2022-04-28 Huawei Technologies Co., Ltd. Operation method, operation apparatus, and device
US11868485B2 (en) * 2019-07-09 2024-01-09 Huawei Technologies Co., Ltd. Operation method, operation apparatus, and device
US11728982B2 (en) 2019-11-07 2023-08-15 Micron Technology, Inc. Single-use password generation
CN114830110A (zh) * 2019-11-07 2022-07-29 美光科技公司 单次使用密码产生
US11507248B2 (en) 2019-12-16 2022-11-22 Element Inc. Methods, systems, and media for anti-spoofing using eye-tracking
US11409877B2 (en) * 2020-03-27 2022-08-09 Intel Corporation Firmware verification mechanism
US11928215B2 (en) 2020-03-27 2024-03-12 Intel Corporation Firmware verification mechanism
NL2025695B1 (en) * 2020-05-28 2022-01-13 Sandgrain B V Centralized handling of ic identification codes
WO2021240445A1 (en) 2020-05-28 2021-12-02 Sandgrain B.V. Centralized handling of ic identification codes
NL1044044A (en) 2020-05-28 2021-12-01 Sandgrain B V Centralized handling of ic identification codes
US20220417042A1 (en) * 2021-06-25 2022-12-29 Intel Corporation Platform sealing secrets using physically unclonable function (puf) with trusted computing base (tcb) recoverability
US20230040468A1 (en) * 2021-08-04 2023-02-09 International Business Machines Corporation Deploying a system-specific secret in a highly resilient computer system
WO2023011850A1 (en) * 2021-08-04 2023-02-09 International Business Machines Corporation Deploying a system-specific secret in a highly resilient computer system
US20230205895A1 (en) * 2021-12-29 2023-06-29 Arm Limited Methods and apparatus for provisioning a device
US20220245252A1 (en) * 2022-02-22 2022-08-04 Intel Corporation Seamless firmware update mechanism

Also Published As

Publication number Publication date
JP2013545388A (ja) 2013-12-19
EP2647156A1 (en) 2013-10-09
TW201227390A (en) 2012-07-01
CN103229451A (zh) 2013-07-31
US9043604B2 (en) 2015-05-26
EP2647156A4 (en) 2017-07-05
JP5690412B2 (ja) 2015-03-25
US20140089659A1 (en) 2014-03-27
WO2012074720A1 (en) 2012-06-07
CN103229451B (zh) 2015-11-25
TWI567579B (zh) 2017-01-21

Similar Documents

Publication Publication Date Title
US9043604B2 (en) Method and apparatus for key provisioning of hardware devices
US9602282B2 (en) Secure software and hardware association technique
US11604901B2 (en) Systems and methods for using extended hardware security modules
US8677144B2 (en) Secure software and hardware association technique
CN109714168B (zh) 可信远程证明方法、装置和系统
US7502946B2 (en) Using hardware to secure areas of long term storage in CE devices
CN109937419B (zh) 安全功能强化的设备的初始化方法及设备的固件更新方法
US8462955B2 (en) Key protectors based on online keys
CN110249336B (zh) 使用签名密钥对可信执行环境的寻址
US20100332820A1 (en) Information security device and information security system
CN113785548B (zh) 用于实施数据中心中的有效载荷安全性策略的证明服务
US20100268936A1 (en) Information security device and information security system
US9893882B1 (en) Apparatus, system, and method for detecting device tampering
US10229272B2 (en) Identifying security boundaries on computing devices
US20180260568A1 (en) Modifying service operating system of baseboard management controller
US10841287B2 (en) System and method for generating and managing a key package
US20120213370A1 (en) Secure management and personalization of unique code signing keys
US10938563B2 (en) Technologies for provisioning cryptographic keys
US11997192B2 (en) Technologies for establishing device locality
EP3525391A1 (en) Device and method for key provisioning
KR20220081068A (ko) 암복호화 키를 이용한 어플리케이션 보안 장치 및 방법

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRICKELL, ERNEST F.;GUERON, SHAY;LI, JIANGTAO;AND OTHERS;SIGNING DATES FROM 20101228 TO 20110209;REEL/FRAME:025793/0783

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION