The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 26, 2016

Filed:

Jul. 19, 2012
Applicants:

Kerry Maletsky, Monument, CO (US);

David Durant, Colorado Springs, CO (US);

Balaji Badam, Colorado Springs, CO (US);

Michael Seymour, Colorado Springs, CO (US);

Inventors:

Kerry Maletsky, Monument, CO (US);

David Durant, Colorado Springs, CO (US);

Balaji Badam, Colorado Springs, CO (US);

Michael Seymour, Colorado Springs, CO (US);

Assignee:

Atmel Corporation, San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/64 (2013.01); G06F 21/57 (2013.01); G06F 21/72 (2013.01); H04L 9/32 (2006.01); H04L 29/06 (2006.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 21/64 (2013.01); G06F 21/57 (2013.01); G06F 21/72 (2013.01); H04L 9/3247 (2013.01); H04L 9/3271 (2013.01); H04L 9/0877 (2013.01); H04L 9/3268 (2013.01); H04L 63/0823 (2013.01);
Abstract

An integrated circuit device comprises a processor and a secure protection zone with security properties that can be verified by a remote device communicating with the integrated circuit device. The secure protection zone includes a persistent storage that is configured for storing cryptographic keys and data. The secure protection zone also includes instructions that are configured for causing the processor to perform cryptographic operations using the cryptographic keys. In addition, the secure protection zone includes an ephemeral memory that is configured for storing information associated with the cryptographic operations. The instructions are configured for causing the processor to perform the cryptographic operations on the data stored in the persistent storage and the information in the ephemeral memory as part of a secure communication exchange with the remote device.


Find Patent Forward Citations

Loading…