US 12,438,709 B2
Key management and protection in secure execution environments
Nicolas Thaddee Courtois, Mougins (FR); and Frederic Amiel, Nice (FR)
Assigned to QUALCOMM Incorporated, San Diego, CA (US)
Filed by QUALCOMM Incorporated, San Diego, CA (US)
Filed on Jan. 12, 2023, as Appl. No. 18/153,999.
Prior Publication US 2024/0243908 A1, Jul. 18, 2024
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0861 (2013.01) [H04L 2209/04 (2013.01); H04L 2209/08 (2013.01)] 30 Claims
OG exemplary drawing
 
1. A method for information protection, the method comprising:
obtaining a security information asset at a randomizing engine;
performing a first randomization of the security information asset to obtain a randomized security information asset;
providing the randomized security information asset to a secure storage device;
obtaining the randomized security information asset from the secure storage device;
performing a second randomization of the security information asset to obtain an updated randomized security information asset, wherein the second randomization of the security information asset randomizes the randomized security information asset obtained from the secure storage device;
providing the updated randomized security information asset to a security component, wherein the updated randomized security information asset is used to perform a security operation; and
enforcing, at the secure storage device, a re-masking procedure for the randomized security information asset, wherein the re-masking procedure is initiated based on a determination that one or more bytes of the security information asset have a usage quantity that exceeds a usage discrepancy threshold relative to one or more other bytes of the security information asset.