The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 12, 2023

Filed:

Feb. 11, 2021
Applicant:

Meta Platforms Technologies, Llc, Menlo Park, CA (US);

Inventors:

Sudhir Satpathy, Redmond, WA (US);

Wojciech Stefan Powiertowski, Kirkland, WA (US);

Nagendra Gupta Modadugu, San Francisco, CA (US);

Neeraj Upasani, Sammamish, WA (US);

Assignee:

Meta Platforms Technologies, LLC, Menlo Park, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/60 (2013.01); G06F 21/64 (2013.01); G06F 21/79 (2013.01); G06F 13/28 (2006.01); G06F 3/01 (2006.01); G06F 15/78 (2006.01);
U.S. Cl.
CPC ...
G06F 21/602 (2013.01); G06F 3/012 (2013.01); G06F 13/28 (2013.01); G06F 15/7807 (2013.01); G06F 21/64 (2013.01); G06F 21/79 (2013.01); G06F 2221/0751 (2013.01);
Abstract

An example system on a chip (SoC) includes a security processor configured to store a plurality of key-pairs associated with subsystems of the SoC to a key vault; and an encryption engine configured to: determine a first tweak value based on a first sector address of a storage device; encrypt the first tweak value according to the second key of the key-pair associated with a subsystem; encrypt a first portion of the source data according to a first key of the key-pair and the encrypted first tweak value; determine a second tweak value based on a second sector address of the storage device and encrypt the second tweak value according to the second key prior to completing the encryption of the first portion of the source data; and encrypt a second portion of the source data according to the first key and the encrypted second tweak value.


Find Patent Forward Citations

Loading…