Identity and root keys derivation scheme for embedded devices

This document describes systems and techniques for deriving identity and root keys for embedded systems. In aspects, a boot process and key manager of an embedded system may implement a secure or trusted boot process for embedded systems in which code of next-level boot loader or software image is v...

Full description

Saved in:
Bibliographic Details
Main Authors Osorio Lozano, Miguel Angel, Chen, Timothy Jay
Format Patent
LanguageEnglish
Published 13.08.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This document describes systems and techniques for deriving identity and root keys for embedded systems. In aspects, a boot process and key manager of an embedded system may implement a secure or trusted boot process for embedded systems in which code of next-level boot loader or software image is verified using root keys or other protected information before execution of the boot process is passed to the next stage in the boot process. Alternatively or additionally, the key manager may enable sealing and attestation of various levels of root and identity keys to enable respective verification of software or hardware throughout a life cycle of a device to prevent unauthorized access to protected or private code of an embedded system. By so doing, the described aspects may enable an embedded system with a secure boot process and robust identity and root key management system.
Bibliography:Application Number: US202117495719