Hardware secret usage limits
Abstract:
A hardware secret is securely maintained in a computing device. The device operates in accordance with a usage limit corresponding to a limited number of operations using the hardware secret that the device is able to perform. Once the device reaches a usage limit, the device becomes temporarily or permanently unable to perform additional operations using the hardware secret.
Public/Granted literature
Information query
Patent Agency Ranking
0/0