US 12,254,123 B2
Using a trust anchor to verify an identity of an ASIC
Chirag Shroff, Cary, NC (US); and David McGrew, Poolesville, MD (US)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jun. 1, 2021, as Appl. No. 17/335,245.
Prior Publication US 2022/0382912 A1, Dec. 1, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/73 (2013.01); G06F 7/58 (2006.01); G06F 21/72 (2013.01)
CPC G06F 21/73 (2013.01) [G06F 7/588 (2013.01); G06F 21/72 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, the system comprising:
one or more processors; and
one or more computer-readable non-transitory storage media, the one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the system to perform operations comprising:
receiving, by a trust anchor, a long-term key originating within a hardware component, wherein the long-term key has been encrypted using a public key of the trust anchor;
performing a posture assessment at the trust anchor in order to determine whether the hardware component is authorized to run on a product, wherein performing the posture assessment comprises:
determining a random value (K);
encrypting the random value (K) using the long-term key associated with the hardware component in order to yield an encrypted value;
communicating the encrypted value to the hardware component;
receiving, from the hardware component, a message encrypted using the random value (K), wherein the message comprises an identifier associated with the hardware component; and
determining whether the hardware component is authorized to run on the product based at least in part on the identifier associated with the hardware component; and
performing an action that depends on whether the hardware component is authorized to run on the product.