The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 13, 2015

Filed:

Feb. 11, 2008
Applicants:

Michael Brian Cox, Menlo Park, CA (US);

Phillip Norman Smith, Sunnyvale, CA (US);

Stephen Donald Lew, Sunnyvale, CA (US);

Inventors:

Michael Brian Cox, Menlo Park, CA (US);

Phillip Norman Smith, Sunnyvale, CA (US);

Stephen Donald Lew, Sunnyvale, CA (US);

Assignee:

NVIDIA CORPORATION, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2006.01); G06F 21/10 (2013.01); G06F 21/57 (2013.01); G06F 21/72 (2013.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 21/10 (2013.01); G06F 21/575 (2013.01); G06F 21/72 (2013.01); H04L 9/0822 (2013.01); H04L 9/0866 (2013.01); G06F 2221/0755 (2013.01); H04L 2209/20 (2013.01); H04L 2209/603 (2013.01);
Abstract

A method, system on a chip, and computer system for generating more robust keys which utilize data occupying relatively small die areas is disclosed. Embodiments provide a convenient and effective mechanism for generating a key for use in securing data on a portable electronic device, where the key is generated from repurposed data and a relatively small amount. A multi-stage encryption algorithm may be performed to generate the key, where the first stage may include encrypting the secure data, and the second stage may include encrypting the result of a logical operation on the encrypted secure data with a unique identifier of the portable electronic device. A secret key may be used as the encryption key for each stage. The result of the second encryption stage may include the generated key which may be used to perform subsequent operations on the portable electronic device.


Find Patent Forward Citations

Loading…