Patent classifications
G06F21/72
ACCELERATED CRYPTOGRAPHIC-RELATED PROCESSING
Cryptographic-related processing is facilitated by obtaining multiple input operands, and packing the multiple input operands together to form a packed integer. The packed integer is an n-bit integer including multiple slots, where input operands of the multiple input operands are packed into every other slot of the multiple slots, and each slot of the multiple slots has a bitwidth k. Further, the process includes providing the packed integer as input to an n-bit accelerator to facilitate performing one or more predefined operations using the packed integer, to transform the packed integer into result data which facilitates cryptographic-related processing.
ACCELERATED CRYPTOGRAPHIC-RELATED PROCESSING
Cryptographic-related processing is facilitated by obtaining multiple input operands, and packing the multiple input operands together to form a packed integer. The packed integer is an n-bit integer including multiple slots, where input operands of the multiple input operands are packed into every other slot of the multiple slots, and each slot of the multiple slots has a bitwidth k. Further, the process includes providing the packed integer as input to an n-bit accelerator to facilitate performing one or more predefined operations using the packed integer, to transform the packed integer into result data which facilitates cryptographic-related processing.
MULTIPLE REDUNDANT DISCIPLINED OSCILLATOR SYSTEMS IN A SPOOFING RESISTANT REFERENCE TIME SOURCE SYSTEM AND METHODS THEREOF
A system wherein when a normal state is entered: discipline only one of at least three oscillators to an external reference; output frequency and time based on the other oscillators not being disciplined to the external reference; and monitor the output frequency difference of the one of the oscillators being disciplined and a composite value of the output frequency difference among the other oscillators. A spoofing state is identified when the monitored difference is more than a difference threshold. When the spoofing state is identified: reset the frequency and time of the oscillator in the spoofing state to match the composite value of the other oscillators; resume disciplining the oscillator in the spoofing state from the external reference after expiration of a time period; and clear the spoofing state and return to the normal state when the oscillators have the output frequency differences among the oscillators below the difference threshold.
METHOD TO SECURELY TRANSFER ROOT OF TRUST RESPONSIBILITIES ON A COMMON SHARED MOTHERBOARD
In general, embodiments of the invention relate to implementing a secure boot process in information handling systems that supports both an external root of trust (eRoT) and an internal root of trust (RoT). Further, embodiments of the invention relate to binding a management controller to a specific chassis and, in the case where the eRoT is used, to an eRoT. When the management controller and the chassis are provisioned according to one or more embodiments of the invention, security checks may be performed by management controller executing an initial program loader (IPL) using the aforementioned bindings. If the bindings are not present or do not match, then the boot process halts and the user is unable to use the information handling system.
METHOD TO SECURELY TRANSFER ROOT OF TRUST RESPONSIBILITIES ON A COMMON SHARED MOTHERBOARD
In general, embodiments of the invention relate to implementing a secure boot process in information handling systems that supports both an external root of trust (eRoT) and an internal root of trust (RoT). Further, embodiments of the invention relate to binding a management controller to a specific chassis and, in the case where the eRoT is used, to an eRoT. When the management controller and the chassis are provisioned according to one or more embodiments of the invention, security checks may be performed by management controller executing an initial program loader (IPL) using the aforementioned bindings. If the bindings are not present or do not match, then the boot process halts and the user is unable to use the information handling system.
System and method for licensing and for measuring use of an IP block
An integrated circuit includes: one or more protected circuits; a license control circuit configured to request, from a license issuer, a license for activating the one or more protected circuits, the license request having a seed value; and a cryptographic circuit configured to verify the authenticity of a license received from the license issuer based on the seed value, wherein the license control circuit is configured to impose a validity limit on the received license, and to request a new license from the license issuer before the validity limit of the received license.
System and method for licensing and for measuring use of an IP block
An integrated circuit includes: one or more protected circuits; a license control circuit configured to request, from a license issuer, a license for activating the one or more protected circuits, the license request having a seed value; and a cryptographic circuit configured to verify the authenticity of a license received from the license issuer based on the seed value, wherein the license control circuit is configured to impose a validity limit on the received license, and to request a new license from the license issuer before the validity limit of the received license.
ENCRYPTION PROCESSING SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ENCRYPTION PROCESSING PROGRAM, AND ENCRYPTION PROCESSING METHOD
An encryption processing system in which an application accesses a security module, via software, from a device driver that communicates with the software, in which the software issues an identifier for managing a session for each access request from the application, to identify accesses from plural applications, and notifies the device driver of identifiers together with commands.
ENCRYPTION PROCESSING SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ENCRYPTION PROCESSING PROGRAM, AND ENCRYPTION PROCESSING METHOD
An encryption processing system in which an application accesses a security module, via software, from a device driver that communicates with the software, in which the software issues an identifier for managing a session for each access request from the application, to identify accesses from plural applications, and notifies the device driver of identifiers together with commands.
Electronic system
In accordance with an embodiment, an electronic device includes a secure element configured to implement a plurality of operating systems; and a near field communication module coupled to the secure element by a volatile memory.