US 12,244,732 B2
System and methods for confidential computing
Sergiu Ghetie, Hillsboro, OR (US)
Assigned to SDG Logic Inc., Hillsboro, OR (US)
Filed by SDG Logic Inc., Hillsboro, OR (US)
Filed on Jul. 2, 2021, as Appl. No. 17/367,020.
Claims priority of provisional application 63/047,674, filed on Jul. 2, 2020.
Prior Publication US 2022/0006653 A1, Jan. 6, 2022
Int. Cl. G06F 21/57 (2013.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3263 (2013.01) [G06F 21/575 (2013.01); H04L 9/0643 (2013.01); H04L 9/0825 (2013.01); H04L 9/0894 (2013.01); H04L 9/3247 (2013.01); H04L 9/3278 (2013.01); H04L 63/0428 (2013.01); H04L 63/0876 (2013.01)] 32 Claims
OG exemplary drawing
 
1. A method for secure computing, the method comprising:
decrypting, by a processing device and using a private key of a first public/private key pair, an encrypted block of data received from a first computing device, the encrypted block of data comprising an identifier of the processing device and a hash of a session public key of a session key pair;
verifying the identifier of the processing device matches a value encoded based on a secure physical object of the processing device;
matching a software verification value from a portion of a secure program to the hash of the session public key; and
executing, by the processing device and based on verifying the identifier of the processing device, the matching of the software verification value to the hash of the session public key, and performing a digital signature verification of secure program using a public key of a second public/private key pair, the secure program to secure boot the processing device, the second public/private key pair being different from the first public/private key pair.