17810952. DEVICE IDENTIFIER COMPOSITION ENGINE 3-LAYER ARCHITECTURE simplified abstract (Micron Technology, Inc.)
Contents
DEVICE IDENTIFIER COMPOSITION ENGINE 3-LAYER ARCHITECTURE
Organization Name
Inventor(s)
Alessandro Orlando of Milan (IT)
DEVICE IDENTIFIER COMPOSITION ENGINE 3-LAYER ARCHITECTURE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17810952 titled 'DEVICE IDENTIFIER COMPOSITION ENGINE 3-LAYER ARCHITECTURE
Simplified Explanation
The abstract describes a device identifier composition engine (DICE) architecture for secure computing environments. The architecture includes three layers: DICE layer 0, DICE layer 1, and a controller.
- The DICE layer 0 component derives a DICE identity key.
- The DICE layer 1 component derives a DICE alias key based on the DICE identity key.
- The controller receives firmware updates for components and updates the firmware accordingly.
- The controller can also update the keys of the component or other components in the layer stack.
Potential applications of this technology:
- Secure computing environments in devices such as smartphones, tablets, or IoT devices.
- Authentication and identification systems for secure access control.
- Protection against unauthorized access and tampering of firmware and keys.
Problems solved by this technology:
- Ensures the security and integrity of firmware and keys in a device.
- Provides a secure computing environment with a hardware root of trust.
- Enables secure communication and authentication between devices.
Benefits of this technology:
- Enhanced security and protection against unauthorized access and tampering.
- Simplified and efficient management of firmware updates and key updates.
- Enables secure and reliable identification and authentication of devices.
Original Abstract Submitted
Implementations described herein relate to a device identifier composition engine (DICE) 3-layer architecture. In some implementations, a device may include a secure computing environment including a hardware root of trust (HRoT) DICE component. The secure computing environment may include a DICE layer 0 component configured to derive a DICE identity key. The secure computing environment may include a DICE layer 1 component configured to derive a DICE alias key based on the DICE identity key. The secure computing environment may include a controller configured to receive an update to firmware of a component. The controller may be configured to update the firmware of the component based on receiving the update. The controller may be configured to update one or more keys of the component or one or more keys of one or more components above the component in a layer stack.