The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 08, 2017

Filed:

Dec. 15, 2014
Applicants:

Joseph C. Circello, Phoenix, AZ (US);

David J. Schimke, Phoenix, AZ (US);

Mohit Arora, Austin, TX (US);

Lawrence L. Case, Austin, TX (US);

Rodney D. Ziolkowski, Del Mar, CA (US);

Inventors:

Joseph C. Circello, Phoenix, AZ (US);

David J. Schimke, Phoenix, AZ (US);

Mohit Arora, Austin, TX (US);

Lawrence L. Case, Austin, TX (US);

Rodney D. Ziolkowski, Del Mar, CA (US);

Assignee:

NXP USA, Inc., Austin, TX (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 9/06 (2006.01); G06F 21/72 (2013.01);
U.S. Cl.
CPC ...
H04L 9/0894 (2013.01); H04L 9/0822 (2013.01); H04L 2209/12 (2013.01);
Abstract

Methods and systems are disclosed for key management for on-the-fly hardware decryption within an integrated circuit. Encrypted information is received from an external memory and stored in an input buffer within the integrated circuit. The encrypted information includes one or more encrypted key blobs. The encrypted key blobs include one or more secret keys for encrypted code associated with one or more encrypted software images stored within the external memory. A key-encryption key (KEK) code for the encrypted key blobs is received from an internal data storage medium within the integrated circuit, and the KEK code is used to generate one or more key-encryption keys (KEKs). A decryption system then decrypts the encrypted key blobs using the KEKs to obtain the secret keys, and the decryption system decrypts the encrypted code using the secret keys. The resulting decrypted software code is then available for further processing.


Find Patent Forward Citations

Loading…