CRYPTOGRAPHIC KEY SECURITY
Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the B...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English |
Published |
02.07.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value. |
---|---|
Bibliography: | Application Number: US201716479495 |