Claims
- 1. A method for establishing private keys in a cryptographic system comprising the steps of:
- (a) providing an integrated circuit ("IC") chip having a public key encryption engine and a non-volatile memory, said public key encryption engine being coupled to said non-volatile memory; and
- (b) encoding a private key into said non-volatile memory of said IC chip.
- 2. The method of claim 1, wherein said non-volatile memory comprises a fuse array and wherein said encoding step (b) comprises encoding said private key into said fuse array.
- 3. The method of claim 2, wherein said encoding step (b) is performed by laser ablation.
- 4. The method of claim 1, wherein said encoding step (b) further includes encoding a value representative of a public key into said non-volatile memory.
- 5. The method of claim 4, wherein said value representative of said public key comprises a public key hash value such that said encoding step (b) includes encoding said public key hash value into said non-volatile memory.
- 6. The method of claim 5, including using said public key hash value is used to verify said public key.
- 7. The method of claim 1, wherein said encoding step (b) further includes encoding a serial number into said non-volatile memory.
- 8. The method of claim 1, wherein said providing step (a) comprises providing said IC chip as unencapsulated, and wherein said method further includes encapsulating said IC chip after said encoding step (b).
- 9. A method for facilitating loading of a proposed public key into an integrated circuit ("IC") chip having a public key encryption engine, said method comprising the steps of:
- (a) providing an IC chip having said public key encryption engine and a non-volatile memory, said public key encryption engine being coupled to said non-volatile memory, said non-volatile memory having a value representative of a predetermined public key contained therein; and
- (b) verifying said proposed public key against said value representative of said predetermined public key such that said loading of said proposed public key is facilitated.
- 10. The method of claim 9, wherein said value representative of said predetermined public key comprises a public key hash value such that said providing step (a) includes providing said IC chip having said public key hash value contained therein and said verifying step (b) comprises verifying said proposed public key against said public key hash value.
- 11. The method of claim 1, wherein the cryptographic system is adapted to perform RSA-type operations in association with said private key.
- 12. The method of claim 5, wherein said encoding step (b) further includes encoding a serial number into said non-volatile memory, the serial number corresponding to the public and private keys, and wherein the cryptographic system is adapted to perform RSA-type operations in association with said private key.
Parent Case Info
This application is a division of Ser. No. 08/414,852 filed Mar. 31, 1995 now pending.
US Referenced Citations (8)
Divisions (1)
|
Number |
Date |
Country |
Parent |
414852 |
Mar 1995 |
|