Apple Inc.
Cryptographic entropy tree

Last updated:

Abstract:

A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.

Status:
Grant
Type:

Utility

Filling date:

10 Jun 2019

Issue date:

1 Jun 2021