US 12,475,217 B2
System and method for cryptographic security through process diversity
Bradley K. Goodman, Nashua, NH (US); and Joseph Caisse, Burlington, MA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jul. 14, 2022, as Appl. No. 17/864,490.
Prior Publication US 2024/0020382 A1, Jan. 18, 2024
Int. Cl. G06F 21/55 (2013.01); H04L 9/14 (2006.01)
CPC G06F 21/554 (2013.01) [H04L 9/14 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for securing a data processing system, the method comprising and by the data processing system:
identifying an occurrence of a security event for an operation of the data processing system;
based on the occurrence:
identifying a security requirement for the security event;
performing at least two diverse cryptographic operations on data associated with the operation of the data processing system based on the security requirement and a cryptographic data package to obtain at least two cryptographic results for the data, the at least two cryptographic results being provided by respective diverse cryptographic operations of the two diverse cryptographic operations, wherein the security requirement specifies to the data processing system a cryptographical operation type of each of the at least two diverse cryptographic operations and whether the at least two diverse cryptographic operations are to be performed on the data in a serial or parallel manner; and
performing an action set based on the at least two cryptographic results to complete a servicing of the operation of the data processing system.