Apple Inc.
Cryptographic entropy tree
Last updated:
Abstract:
A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.
Status:
Grant
Type:
Utility
Filling date:
10 Jun 2019
Issue date:
1 Jun 2021