US 11,991,297 B2
Secure cryptoprocessor
Dimitrios Schoinianakis, Munich (DE); and Ian Justin Oliver, Soderkulla (FI)
Assigned to Nokia Solutions and Networks Oy, Espoo (FI)
Appl. No. 17/284,576
Filed by Nokia Solutions and Networks Oy, Espoo (FI)
PCT Filed Jan. 31, 2019, PCT No. PCT/EP2019/052365
§ 371(c)(1), (2) Date Apr. 12, 2021,
PCT Pub. No. WO2020/078591, PCT Pub. Date Apr. 23, 2020.
Claims priority of application No. 20180100472 (GR), filed on Oct. 17, 2018.
Prior Publication US 2021/0258174 A1, Aug. 19, 2021
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01)
CPC H04L 9/3278 (2013.01) [H04L 9/0822 (2013.01); H04L 9/085 (2013.01); H04L 9/321 (2013.01); H04L 9/3242 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A cryptoprocessor comprising:
physical unclonable function circuitry comprising at least one physical unclonable function, and
at least one processing core configured to:
issue a request for a challenge to a server;
receive the challenge from the server;
provide the challenge as input to the physical unclonable function circuitry to derive a response to the challenge;
use the response as a first encryption key to encrypt a second encryption key;
cause the encrypted second encryption key to be provided to a the server;
use the second encryption key to establish a secure end-to-end connection with a correspondent party distinct from the server, and
wherein the cryptoprocessor is configured to decrypt an encryption key of the correspondent party with a second response as a key to obtain the encryption key of the correspondent party, the second response obtained from the physical unclonable function circuitry using a second challenge as input.