Abstract:
An integrated circuit substrate of an aspect includes a plurality of exposed electrical contacts. The integrated circuit substrate also includes an inaccessible set of Physically Unclonable Function (PUF) cells to generate an inaccessible set of PUF bits that are not accessible through the exposed electrical contacts. The integrated circuit substrate also includes an accessible set of PUF cells to generate an accessible set of PUF bits that are accessible through the exposed electrical contacts. Other apparatus, methods, and systems are also disclosed.
Abstract:
Briefly, in accordance with one embodiment of the invention, a method of using a digital signature includes: electronically referencing at least one plurality of electronic signals with a digital signature remotely stored from the plurality.
Abstract:
Ein Prozessor eines Aspekts enthält Stammschlüssel-Generierungslogik, um einen Stammschlüssel zu generieren. Die Stammschlüssel-Generierungslogik enthält eine Quelle für statische und entropische Bits. Der Prozessor enthält auch Schlüsselableitungslogik, die mit der Stammschlüssel-Generierungslogik verkoppelt ist. Die Schlüsselableitungslogik dient zum Ableiten eines oder mehrerer Schlüssel aus dem Stammschlüssel. Der Prozessor enthält auch kryptografische primitive Logik, die mit der Stammschlüssel-Generierungslogik verkoppelt ist. Die kryptografische primitive Logik dient zum Durchführen kryptografischer Operationen. Der Prozessor enthält auch eine Sicherheitsgrenze, die die Stammschlüssel-Generierungslogik, die Schlüsselableitungslogik und die kryptografische primitive Logik umfasst. Andere Prozessoren, Verfahren und Systeme werden ebenfalls offenbart.
Abstract:
An integrated circuit substrate of an aspect includes a plurality of exposed electrical contacts. The integrated circuit substrate also includes an inaccessible set of Physically Unclonable Function (PUF) cells to generate an inaccessible set of PUF bits that are not accessible through the exposed electrical contacts. The integrated circuit substrate also includes an accessible set of PUF cells to generate an accessible set of PUF bits that are accessible through the exposed electrical contacts. Other apparatus, methods, and systems are also disclosed.
Abstract:
Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.
Abstract:
Briefly, in accordance with one embodiment of the invention, a method of using a digital signature (110) comprises a step of: electronically referencing at least one plurality of electronic signals (125) with a digital signature remotely stored from the plurality.
Abstract:
A data processor architecture wherein the processors recognize two basic types of objects, an object being a representation of related information maintained in a contiguously addressed set of memory locations. The first type of object contains ordinary data, such as characters, integers, reals, etc. The second type of object contains a list of access descriptors. Each access descriptor provides information for locating and defining the extent of access to an object associated with that access descriptor. The processors recognize complex objects that are combinations of objects of the basic types. One such complex object (94) defines an environment (18 or 20) for execution of objects (92, 93, 98, 106, 122) accessible to a given instance of a procedural operation. The dispatching of tasks to the processor is accomplished by hardware-controlled queuing mechanisms (36), dispatching-port objects (146) which allow multiple sets of processors (38) and (40) to serve multiple, but independent sets of tasks (14, 16). Communication between asychronous tasks or processes is accomplished by related hardware controlled queuing mechanisms (34) (buffered-port objects) (144) which allow messages to move between internal processes or input/output processes without the need for interrupts. A mechanism (42) is provided which allows the processors to communicate with each other. This mechanism is used to reawaken an idle processor to alert the processor to the fact that a ready-to-run process at a dispatching port needs execution.