18064546. ROOTS OF TRUST IN INTELLECTUAL PROPERTY (IP) BLOCKS IN A SYSTEM ON A CHIP (SOC) simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

ROOTS OF TRUST IN INTELLECTUAL PROPERTY (IP) BLOCKS IN A SYSTEM ON A CHIP (SOC)

Organization Name

Intel Corporation

Inventor(s)

Kshitij Doshi of Tempe AZ (US)

Ned M. Smith of Beaverton OR (US)

Rajesh Poornachandran of Portland OR (US)

Sunil K. Cheruvu of Tempe AZ (US)

David W. Palmer of Beaverton OR (US)

ROOTS OF TRUST IN INTELLECTUAL PROPERTY (IP) BLOCKS IN A SYSTEM ON A CHIP (SOC) - A simplified explanation of the abstract

This abstract first appeared for US patent application 18064546 titled 'ROOTS OF TRUST IN INTELLECTUAL PROPERTY (IP) BLOCKS IN A SYSTEM ON A CHIP (SOC)

The technology described in this patent application involves a system with multiple intellectual property (IP) blocks and a host IP block, which includes a primary root of trust (RoT) IP block (PRIB) connected to the IP blocks. The system is designed to receive a request from a computing system to establish a secure communication session with a selected IP block, authenticate and attest the computing system, sign evidence of the PRIB with a PRIB key, send the signed evidence to the computing system, and establish the secure communication session if the PRIB is trusted by the computing system based on the signed evidence.

  • The technology includes a host IP block with a primary root of trust (RoT) IP block (PRIB) for secure communication sessions.
  • The system can authenticate and attest computing systems before establishing secure communication.
  • The PRIB key is used to sign evidence of the PRIB for verification purposes.
  • Secure communication sessions are established based on the trustworthiness of the PRIB.

Potential Applications: This technology can be applied in secure communication systems, IoT devices, cloud computing environments, and other systems requiring secure connections.

Problems Solved: This technology addresses the need for secure communication and authentication in various computing systems.

Benefits: Enhanced security for communication sessions, reliable authentication of computing systems, and protection against unauthorized access.

Commercial Applications: This technology can be utilized in cybersecurity solutions, network infrastructure, data centers, and other industries where secure communication is essential.

Prior Art: Researchers can explore prior art related to secure communication protocols, RoT technologies, and authentication methods in computing systems.

Frequently Updated Research: Stay informed about the latest advancements in secure communication technologies, RoT implementations, and authentication protocols.

Questions about the Technology: 1. How does the PRIB key enhance the security of the communication sessions? 2. What are the potential vulnerabilities that this technology aims to address?


Original Abstract Submitted

The technology described herein includes a plurality of intellectual property (IP) blocks; and a host IP block, the host IP block including a primary root of trust (RoT) IP block (PRIB) coupled to the plurality of IP blocks, to receive a request from a computing system to establish a secure communications session with a selected one of a plurality of intellectual property (IP) blocks, authenticate and attest the computing system, sign evidence of the PRIB with a PRIB key, send the signed evidence of the PRIB to the computing system, and establish the secure communications session between the computing system and the selected IP block if the PRIB is trusted by the computing system based at least in part on the signed evidence of the PRIB.