Executing entity-specific cryptographic code in a cryptographic coprocessor

ABSTRACT

Disclosed are various embodiments for executing entity-specific cryptographic code in a cryptographic coprocessor. In one embodiment, an exemplary method comprises receiving encrypted code that includes implementing a cryptographic algorithm from a service via a network, wherein the encrypted code further includes a symmetric encryption key; decrypting, by a cryptographic coprocessor, the encrypted code; executing, by the cryptographic coprocessor, the decrypted code to generate a cryptogram including information encrypted using the cryptographic algorithm and the symmetric encryption key; and sending the cryptogram to the service via the network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of co-pending U.S. utilityapplication entitled, “EXECUTING ENTITY-SPECIFIC CRYPTOGRAPHIC CODE IN ACRYPTOGRAPHIC COPROCESSOR,” having Ser. No. 16/668,973, filed Oct. 30,2019, which claims priority to, and the benefit of, U.S. ProvisionalPatent Application entitled “EXECUTING ENTITY-SPECIFIC CRYPTOGRAPHICCODE IN A CRYPTOGRAPHIC COPROCESSOR,” filed on Oct. 11, 2019, andassigned application No. 62/914,275, which are both incorporated hereinby reference in their entirety.

BACKGROUND

A diverse variety of cryptographic algorithms are available. Somecryptographic algorithms are symmetric, meaning that the same key isused both to encrypt plaintext and to decrypt ciphertext. Othercryptographic algorithms are asymmetric, meaning that different relatedkeys are used to encrypt plaintext (e.g., a public key) and to decryptciphertext (e.g., a private key). As computing power advances, somecryptographic algorithms that were once thought to be secure are nowconsidered insecure. For example, the Data Encryption Standard (DES),with a 56-bit key length, was once thought to be secure. However, it isnow easily broken with brute-force attacks. Further, backdoors and/orother weaknesses may be discovered in cryptographic algorithms thatrender them insecure without fully brute-forcing all key combinations.

Financial institutions, payment issuers, and other organizations thathandle high value data may each arrive at their own decisions as towhich cryptographic algorithm is preferred. Also, their respectivepreferred cryptographic algorithms may change over time in view of newlydisclosed vulnerabilities. Moreover, there may be security value in notdisclosing which cryptographic algorithm is used.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following drawings. The components in the drawings arenot necessarily to scale, with emphasis instead being placed uponclearly illustrating the principles of the disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a drawing of a network environment according to variousembodiments of the present disclosure.

FIG. 2A is a drawing of a client device of the network environment ofFIG. 1 according to various embodiments.

FIG. 2B is a drawing of a client device of the network environment ofFIG. 1 according to various embodiments.

FIG. 3 is a sequence diagram illustrating one example of functionalityimplemented in the network environment of FIG. 1 with the client deviceof FIG. 2A according to various embodiments of the present disclosure.

FIG. 4 is a sequence diagram illustrating one example of functionalityimplemented in the network environment of FIG. 1 with the client deviceof FIG. 2A according to various embodiments of the present disclosure.

FIG. 5 is a sequence diagram illustrating one example of functionalityimplemented in the network environment of FIG. 1 with the client deviceof FIG. 2B according to various embodiments of the present disclosure.

FIG. 6 is a sequence diagram illustrating one example of functionalityimplemented in the network environment of FIG. 1 with the client deviceof FIG. 2B according to various embodiments of the present disclosure.

DETAILED DESCRIPTION

The present disclosure relates to the use of entity-selectedcryptographic algorithms on client devices in communication with aservice associated with the entity. For example, an entity such as afinancial institution, a payment processor, a merchant gateway, apayment issuer, or other entity may desire that specific informationsent to it be encrypted using a particular cryptographic algorithm.Also, the entity may use the particular cryptographic algorithm incommunicating information to client devices. The entity may desire tokeep the identity of the particular cryptographic algorithm secret toimprove security. Further, the entity may decide, in its own discretion,to update or change the particular cryptographic algorithm from time totime.

In a first set of embodiments, a cryptographic coprocessor such as atrusted platform module (TPM) on a client device may be configured tosupport crypto-agility, or the ability to use different cryptographicalgorithms. For example, a cryptographic coprocessor may support apredefined set of cryptographic algorithms, where the algorithms thatare included in the set are selected by a manufacturer of the devicehardware, a standards body, an operating system developer. Thecryptographic algorithms may be permanently included in a hardwarecryptographic coprocessor or capable of being updated in a firmware orsoftware cryptographic coprocessor.

Rather than using cryptographic algorithms in the predefined set, anentity may prefer to use a different cryptographic algorithm. Forexample, the algorithm preferred by the entity may be released after thecryptographic coprocessor was created. Accordingly, the cryptographiccoprocessor would not have embedded support for the algorithm and wouldhave to provision for its use in crypto-agility.

As will be described, in various embodiments, an entity may send codeimplementing a cryptographic algorithm to a client device having acryptographic coprocessor with crypto-agility. The code implementing thecryptographic algorithm may be itself encrypted, thereby shielding theidentity of the algorithm and/or its inner workings. The codeimplementing the cryptographic algorithm may then be decrypted withinthe cryptographic coprocessor using a key associated with the entity.The cryptographic coprocessor can then execute the code within thecryptographic coprocessor to encrypt information to be sent to theentity or to decrypt information sent from the entity. In this way,applications executing on the client device do not have access to thecryptographic algorithm, and the code implementing the cryptographicalgorithm is executed in a secure way.

In a second set of embodiments, a client device has a separate trustedexecution environment in addition to a cryptographic coprocessor. Forexample, ARM-based devices may include security extensions that supportTRUSTZONE functionality, INTEL-based devices may have TRUSTED EXECUTIONTECHNOLOGY and SGX SOFTWARE GUARD EXTENSIONS, and AMD-based devices mayhave a PLATFORM SECURITY PROCESSOR and the AMD SECURE EXECUTIONENVIRONMENT. This provides a separate virtual processor that executes asecure operating system with hardware-based access control. Signedthird-party applications can be executed within the trusted executionenvironment. As will be described, in various embodiments, an entity maycreate a trusted application for execution in the trusted executionenvironment that is configured to receive code implementing acryptographic algorithm, where the code is itself encrypted. Acryptographic coprocessor may be used to verify the authenticity andintegrity of the code, after which the trusted application may thendecrypt the code implementing the cryptographic algorithm and executethe code to encrypt information to be sent to the entity or to decryptinformation sent from the entity.

In the following discussion, a general description of the system and itscomponents is provided, followed by a discussion of the operation of thesame.

With reference to FIG. 1, shown is a network environment 100 accordingto various embodiments. The network environment 100 includes a computingenvironment 103 and a client device 106, which are in data communicationwith each other via a network 109. The network 109 can include wide areanetworks (WANs), local area networks (LANs), personal area networks(PANs), or a combination thereof. These networks can include wired orwireless components or a combination thereof. Wired networks can includeEthernet networks, cable networks, fiber optic networks, and telephonenetworks such as dial-up, digital subscriber line (DSL), and integratedservices digital network (ISDN) networks. Wireless networks can includecellular networks, satellite networks, Institute of Electrical andElectronic Engineers (IEEE) 802.11 wireless networks (i.e., WI-FI®),BLUETOOTH® networks, microwave transmission networks, as well as othernetworks relying on radio broadcasts. The network 109 can also include acombination of two or more networks 109. Examples of networks 109 caninclude the Internet, intranets, extranets, virtual private networks(VPNs), and similar networks.

The computing environment 103 may be operated for or on behalf of anentity such as a financial institution, a payment processor, a paymentgateway, a payment issuer, or another entity. The computing environment103 can include one or more computing devices that include a processor,a memory, and/or a network interface. For example, the computing devicescan be configured to perform computations on behalf of other computingdevices or applications. As another example, such computing devices canhost and/or provide content to other computing devices in response torequests for content.

Moreover, the computing environment 103 can employ a plurality ofcomputing devices that can be arranged in one or more server banks orcomputer banks or other arrangements. Such computing devices can belocated in a single installation or can be distributed among manydifferent geographical locations. For example, the computing environment103 can include a plurality of computing devices that together caninclude a hosted computing resource, a grid computing resource or anyother distributed computing arrangement. In some cases, the computingenvironment 103 can correspond to an elastic computing resource wherethe allotted capacity of processing, network, storage, or othercomputing-related resources can vary over time.

Various applications or other functionality can be executed in thecomputing environment 103. The components executed on the computingenvironment 103 include an entity service 113 and other applications,services, processes, systems, engines, or functionality not discussed indetail herein. The entity service 113 may be operated by or on behalf ofthe entity to perform functions such as authentication, paymentauthorization, payment processing, or other functions. Although oneentity service 113 is described for purposes of discussion, it isunderstood that multiple services may be implemented to perform portionsof these functions.

Also, various data is stored in a data store 116 that is accessible tothe computing environment 103. The data store 116 can be representativeof a plurality of data stores 116, which can include relationaldatabases, non-relational databases, object-oriented databases,hierarchical databases, hash tables or similar key-value data stores, aswell as other data storage applications or data structures. The datastored in the data store 116 is associated with the operation of thevarious applications hosted by the computing environment 103.

The client device 106 is representative of one or more client devices106 that can be coupled to the network 109. The client device 106 caninclude a processor-based system such as a computer system. Such acomputer system can be embodied in the form of a personal computer(e.g., a desktop computer, a laptop computer, or similar device), amobile computing device (e.g., personal digital assistants, cellulartelephones, smartphones, web pads, tablet computer systems, musicplayers, portable game consoles, electronic book readers, and similardevices), media playback devices (e.g., media streaming devices, BluRay®players, digital video disc (DVD) players, set-top boxes, and similardevices), a videogame console, or other devices with like capability.The client device 106 can include one or more displays, such as liquidcrystal displays (LCDs), gas plasma-based flat panel displays, organiclight emitting diode (OLED) displays, electrophoretic ink (“E-ink”)displays, projectors, or other types of display devices. In someinstances, the display can be a component of the client device 106 orcan be connected to the client device 106 through a wired or wirelessconnection.

Next, a general description of the operation of the various componentsof the network environment 100 is provided. Although the followingdescription provides one example of the operation of and interactionbetween the various components of the network environment 100, otheroperations or interactions may also occur, as discussed later in theaccompanying description of subsequent figures.

To begin, the entity service 113 sends encrypted code 118 to the clientdevice 106 via the network 109. The encrypted code 118 includes acryptographic algorithm 121 and a signature 124. The cryptographicalgorithm 121 may correspond to a symmetric algorithm, an asymmetricalgorithm, or a hybrid algorithm that is a combination of both.Non-limiting examples of the cryptographic algorithm 121 may include theTriple Data Encryption Algorithm (Triple DES), the Advanced EncryptionStandard (AES), ChaCha, Salsa 20, Twofish, and so on.

In some cases, the cryptographic algorithm 121 may include a key for usewith the cryptographic algorithm 121 in order to decrypt and/or encryptdata with the cryptographic algorithm 121. Alternatively, such key(s)may be otherwise available to the client device 106. The encrypted code118 includes a signature 124 that may be used to verify the authenticityor integrity of the encrypted code 118.

After receiving the encrypted code 118, using one or more keys availableto the client device 106, the client device 106 verifies the signature124 of the encrypted code 118 and then decrypts the encrypted code 118.The client device 106 can then use the cryptographic algorithm 121 alongwith a key to perform a cryptographic operation such as generating acryptogram 127. The cryptogram 127 may correspond to a paymenttransaction and may include data such as a device primary accountnumber, a transaction amount, a limited-use payment credential or alimited-use key, an unpredictable number, a timestamp, a transactioncounter, and/or other information that may be used to authorize apayment transaction. The cryptogram 127 is then sent over the network109 to the entity service 113.

Turning now to FIG. 2A, shown is an example of a client device 106according to various embodiments. The client device 106 can execute aclient application 203 and other applications. The client device 106 mayinclude a cryptographic coprocessor 206, a client data store 209, andother components.

The client application 203 may be associated with the entity and may beused to perform functions with respect to the entity. For example, theclient application 203 may be executed to initiate or manage paymenttransactions through the entity service 113 (FIG. 1) using a paymentinstrument. In this regard, the client application 203 may receive theencrypted code 118 (FIG. 1) from the entity service 113, cause acryptogram 127 (FIG. 1) to be generated via the cryptographiccoprocessor 206, and then send the cryptogram 127 including encryptedinformation to the entity service 113. In addition, the clientapplication 203 may receive encrypted data from the entity service 113,cause the encrypted data to be decrypted using the encrypted code 118via the cryptographic coprocessor 206, and then process the decrypteddata.

The cryptographic coprocessor 206 can represent a physical or emulateddedicated microcontroller that secures hardware using integratedcryptographic keys and provides various cryptographic operations. Thecryptographic coprocessor 206 may implement a version of the TPMstandard from the Trusted Computing Group (TCG). Although thecryptographic coprocessor 206 may be implemented in hardware to preventtampering with or circumvention of the cryptographic coprocessor 206,the functionality of the cryptographic coprocessor 206 can beimplemented in firmware or software on those client devices 106 thatlack a hardware-based cryptographic coprocessor 206.

The cryptographic coprocessor 206 can perform various cryptographicfunctions or operations on behalf of the client device 106 orapplications executed by the client device 106. For example, thecryptographic coprocessor 206 may generate random numbers using apseudorandom number generator (PRNG) or random number generator (RNG)included in the cryptographic coprocessor 206. As another example, thecryptographic coprocessor 206 can securely generate cryptographic keysor key-pairs, including symmetric encryption keys and asymmetricencryption key-pairs. The cryptographic coprocessor 206 can also encryptor decrypt data using a cryptographic key generated by or imported intothe cryptographic coprocessor 206. As another example, the cryptographiccoprocessor 206 can also generate a hash of the current state of thehardware and software configuration of the client device 106, which canallow for remote attestation of the identity of the client device 106 oruser of the client device 106.

To perform these operations, various cryptographic keys can be storedwithin the cryptographic coprocessor 206. These can include anendorsement key-pair 212 and one or more root key-pairs 215, such asstorage root keys. The endorsement key-pair 212 and the root key-pair(s)215 may be stored within the cryptographic coprocessor 206 itself inorder to protect the keys from compromise.

The endorsement key-pair 212 is an asymmetric encryption key-pair thatincludes a public and private encryption key that are unique to thecryptographic coprocessor 206. The endorsement key-pair 212 can be usedby the cryptographic coprocessor 206 to verify or assert its identity,and therefore the identity of the client device 106 or user of theclient device 106, to other parties or devices. Should the endorsementkey-pair 212 be disclosed to a third party, the third party couldpotentially forge the identity of the cryptographic coprocessor 206.Therefore, the endorsement key-pair 212 is generally used to sign otherencryption keys, which may then be used to assert or verify the identityof the cryptographic coprocessor 206. To preserve the integrity of theendorsement key-pair 212 and ensure that the endorsement key-pair 212 isunique with respect to other endorsement key-pairs 212 installed onother cryptographic coprocessors 206, the endorsement key-pair 212 canbe provisioned and stored on the cryptographic coprocessor 206 at thefactory.

The root key-pair(s) 215 can be asymmetric encryption key-pairs that canbe used by the cryptographic coprocessor 206 to encrypt and/or signdata. The root key-pair 215 can be replaced if required, although anydata encrypted with the root key-pair 215 will be unrecoverable if theroot key-pair 215 is replaced with a new root key-pair 215. In someimplementations, the cryptographic coprocessor 206 can support the useof multiple, independent root key-pairs 215. For example, multiple usersof a client device 106 could each have his or her root key-pair 215 thatis accessible only to a respective user. As another example, multipleclient applications executing on the client device 106 could have theirown root key-pairs 215 for encrypting and decryptingapplication-specific data stored on the client device 106. Specifically,the entity associated with the entity service 115 and the clientapplication 203 may have its own root key-pair 215. Further, the entitymay define its own authorization policies for access to this rootkey-pair 215. In this way, the entity can maintain exclusive control tothe key hierarchy of the root key-pair 215.

The cryptographic coprocessor 206 may also include a plurality ofpredefined cryptographic algorithms 218. The predefined cryptographicalgorithms 218 can be executed by the cryptographic coprocessor 206 toencrypt, decrypt, or verify data using particular ones of the rootkey-pairs 215. The set of predefined cryptographic algorithms 218 may bedefined by a standard, by the manufacturer of the cryptographiccoprocessor 206 or client device 106, or by a developer of the clientdevice 106. As such, the set of predefined cryptographic algorithms 218may be hardcoded within the hardware, firmware, or software thatimplements the cryptographic coprocessor 206 and not be configurable bythe client application 203. A flag may be sent to the cryptographiccoprocessor 206 indicating which of the predefined cryptographicalgorithms 218 are to be selected for a cryptographic operation. It isnoted that the predefined cryptographic algorithms 218 may exclude thecryptographic algorithm 121 (FIG. 1) in the encrypted code 118. However,the encrypted code 118 may be encrypted using one of the predefinedcryptographic algorithms 218.

The approved entities 221 may correspond to a list of entities that areapproved for executing code within the cryptographic coprocessor 206,such as the cryptographic algorithm 121. The approved entities 221 maybe permitted to store a root key-pair 215 in the cryptographiccoprocessor 206. In some embodiments, a list of approved entities 221may be absent, but the approved entities 221 will have a correspondingroot key-pair 215 which enables them to have access to execute anarbitrary cryptographic algorithm 121 in the cryptographic coprocessor206.

Also, various data can be stored in a client data store 209 that isaccessible to the client device 106. The client data store 209 can berepresentative of a plurality of client data stores 209, which caninclude relational databases, object-oriented databases, hierarchicaldatabases, hash tables or similar key-value data stores, as well asother data storage applications or data structures. The data stored inthe client data store 209 is associated with the operation of thevarious applications executed by the client device 106. This data caninclude one or more application key-pairs 224, an encryptedauthentication token 163, an identity key-pair 233, and potentiallyother data.

The application key-pairs 224 are asymmetric encryption key-pairs thatcan be generated by or imported into the cryptographic coprocessor 206and used for various data encryption functions. Each applicationkey-pair 224 can be a child, grandchild, or descendant key of arespective root key-pair 215. Moreover, each root key-pair 215 can haveone or more application key-pairs 224 associated with it. For example, auser might create multiple application key-pairs 224 for various uses,and these application key-pairs 224 could be stored as subkeys or childkeys of the root key-pair 215 for the user. Similarly, a clientapplication 203 that has provisioned its own root key-pair 215 could usemultiple application key-pairs 224 for various purposes, and one or moreof these application key-pairs 224 could be stored as subkeys of theroot key-pair 215 provisioned for the client application 203. Eachapplication key-pair 224 can include an application public key 227 andan encrypted private key 230.

The identity key-pair 233 represents a locally stored asymmetricencryption key-pair that can be generated and used by the cryptographiccoprocessor 206 to verify its identity. For example, a message signedwith the private key of the identity key-pair 233 could be verified withthe identity public key as originating from a specific client device 106because of the unique identity of the cryptographic coprocessor 206installed on the client device 106. Accordingly, the identity key-pair233 may be used as an alias for the endorsement key-pair 212. To provethat the identity key-pair 233 is valid, it may be signed by thecryptographic coprocessor 206 using the private key of endorsementkey-pair 212.

The limited-use payment credentials 236 may correspond to limited-usekeys. The limited-use payment credentials 236 are dynamic keys generatedby a server-side master key. A predefined number of one or more of thelimited-use payment credentials 236 may be initially provisioned to theclient device 106. The limited-use payment credentials 236 or a sessionkey derived from a limited-use key may be used to verify that acryptogram 127 was generated by the client device 106. The limited-usepayment credentials 236 may be sent to the client device 106, and eachrespective one of the limited-use payment credentials 236 may be used asingle time or a predefined number of times in order to authorize apayment transaction.

Moving on to FIG. 2B, shown is an example of a client device 106according to various embodiments. The client device 106 can include anuntrusted execution environment 250, a trusted execution environment253, and an interface 254 between the untrusted execution environment250 and the trusted execution environment 253. The client application203 can be executed in the untrusted execution environment 250 alongwith many applications under control of the user. The trusted executionenvironment 253 is a secure environment with its own secure operatingsystem executed on a secure virtual processor or a secure physicalprocessor. The untrusted execution environment 250 may be executed on adifferent virtual or physical processor from the secure virtual orphysical processor of the trusted execution environment 253.

The hardware processor of the client device 106 may execute a hypervisoror include hardware extensions that mediate or restrict access to thetrusted execution environment 253. The interface 254 may be anapplication programming interface (API) supported by the hypervisor orhardware extensions of the processor to allow for transfer of databetween the trusted execution environment 253 and the untrustedexecution environment 250 in a secure way. For example, the interface254 may comprise system calls or messages passed through shared memory.

A trusted application 256 associated with the entity is executed in thetrusted execution environment 253. The trusted application 256 may besigned by the entity and verified by the cryptographic coprocessor 206before being executed in the trusted execution environment 253. Thetrusted application 256 is executed to receive the encrypted code 118(FIG. 1) from the client application 203 via the interface 254, verifythe authenticity and/or integrity of the encrypted code 118 using thesignature 124 (FIG. 1) via the cryptographic coprocessor 206, anddecrypt the encrypted code 118 using the cryptographic coprocessor 206.

After the encrypted code 118 has been verified and decrypted, thetrusted application 256 then is able to use the cryptographic algorithm121 (FIG. 1) to encrypt, decrypt, sign, or perform other cryptographicoperations. In particular, the trusted application 256 may generate acryptogram 127 by executing the cryptographic algorithm 121 to encryptvarious information. For example, the information may relate to apayment transaction and may include a limited-use payment credential 236or a limited-use key.

Although FIG. 2B shows a single client data store 209, it is understoodthat the client data store 209 may be split into multiple data stores,where one or more of the data stores are accessible only through thetrusted execution environment 253.

Referring next to FIG. 3, shown is a sequence diagram that provides anexample of the interactions between various components of the networkenvironment 100 including the client device 106 of FIG. 2A. The sequencediagram of FIG. 3 provides merely an example of the many different typesof functional arrangements that can be employed in the networkenvironment 100. As an alternative, the sequence diagram of FIG. 3 canbe viewed as depicting an example of elements of a method implementedwithin the network environment 100.

Beginning with box 303, the entity service 113 sends the encrypted code118 (FIG. 1) to the client application 203 executed on the client device106 (FIG. 2A). The encrypted code 118 may be sent along with a signature124 (FIG. 1). The header of the signature 124 can be used to identify aparticular root key-pair 215 (FIG. 2A) for decrypting the encrypted code118. Alternatively, the entity service 113 may send a different type ofkey identifier. In one embodiment, the client device 106 may have alookup table or mapping stored locally (e.g., in non-volatilerandom-access memory) that links the entity service 113 to a specificroot key-pair 215 for verifying the signature 124 and decrypting theencrypted code 118.

Next, in box 306, the client application 203 provides the encrypted code118 to the cryptographic coprocessor 206 of the client device 106. Forexample, the client application 203 may store the encrypted code 118 inthe client data store 209 or in other memory, and send a command to thecryptographic coprocessor 206 to load the encrypted code 118 and verifyand decrypt it. Where the cryptographic coprocessor 206 is implementedin firmware, data (e.g., root keys) stored in a secure element (e.g.,secure data storage) may be transferred from the secure element to thefirmware cryptographic coprocessor 206 via an interface that mediatesaccess to the secure element. The data (e.g., root keys) can enable thefirmware cryptographic coprocessor 206 to perform functions such asverification and decryption.

In box 309, the cryptographic coprocessor 206 verifies the encryptedcode 118 using the signature 124 sent with the encrypted code 118. Tothis end, the cryptographic coprocessor 206 may obtain a root key-pair215 associated with the entity in order to perform the verificationusing the signature 124. The verification procedure thus verifies theauthenticity and integrity of the encrypted code 118. In some cases, thecryptographic coprocessor 206 may verify a state of the client device106 and allow or disallow decryption of the encrypted code 118 based onthe state of the client device 106. For example, the cryptographiccoprocessor 206 may disallow decryption of the encrypted code 118 if theclient device 106 is rooted. If the verification is not successful,decryption and execution of the cryptographic algorithm 121 will notproceed.

In box 312, the cryptographic coprocessor 206 decrypts the encryptedcode 118. For example, the cryptographic coprocessor 206 may utilize aparticular one of the predefined cryptographic algorithms 218 (FIG. 2A)along with the root key-pair 215 associated with the entity in order toperform the decryption. In decrypting the encrypted code 118, thecryptographic coprocessor 206 obtains the cryptographic algorithm 121(FIG. 1) in an unencrypted form. In some examples, the cryptographicalgorithm 121 may be different from the predefined cryptographicalgorithms 218. In other examples, the cryptographic algorithm 121 maybe one of the predefined cryptographic algorithms 218, although theidentity of the cryptographic algorithm 121 may not be apparent from theencrypted code 118 itself. In one example, the cryptographic coprocessor206 acts as a root of trust to validate a certain proprietarycryptographic algorithm 121 before handing it to a secure element.

In box 315, the client application 203 provides information to thecryptographic coprocessor 206 for subsequent encryption by thecryptographic coprocessor 206. For example, the information may relateto a particular payment transaction and may include data such as alimited-use payment credential 236 (FIG. 2A) or a limited-use key, anunpredictable number, a sequence number, a monotonic counter value, atimestamp, a transaction amount, and/or other information. In otherexamples, the client application 203 may provide the information to thecryptographic coprocessor 206 along with the encrypted code 118 orbefore the encrypted code 118 is provided to the cryptographiccoprocessor 206. One or more items of this information (e.g., theunpredictable number) may be generated by the cryptographic coprocessor206 itself in some examples.

In box 318, the cryptographic coprocessor 206 encrypts the informationusing the cryptographic algorithm 121 decrypted at box 312 from theencrypted code 118. To this end, the cryptographic coprocessor 206executes the code that implements the cryptographic algorithm 121supplied by the entity service 113 and may use a key from the rootkey-pair 215 associated with the entity or a symmetric key. In this way,the cryptographic coprocessor 206 generates a cryptogram 127 (FIG. 1).In box 321, the cryptographic coprocessor 206 returns the cryptogram 127to the client application 203.

In box 324, the client application 203 sends the cryptogram 127 to theentity service 113 via the network 109. In box 327, the entity service113 processes the cryptogram 127. For example, the entity service 113may validate a signature of the cryptogram 127. The entity service 113then decrypts the cryptogram 127 using a symmetric key used to encryptthe cryptogram 127, or a private key of the key-pair used to encrypt thecryptogram 127. The entity service 113 may then verify the contents ofthe cryptogram 127. For example, the entity service 113 may verify thata limited-use payment credential 236 or a limited-use key is valid. Uponverification of the contents, the entity service 113 may then authorizeand/or process a corresponding payment transaction.

Moving on to FIG. 4, shown is a sequence diagram that provides anotherexample of the interactions between various components of the networkenvironment 100 including the client device 106 of FIG. 2A. The sequencediagram of FIG. 4 provides merely an example of the many different typesof functional arrangements that can be employed in the networkenvironment 100. As an alternative, the sequence diagram of FIG. 4 canbe viewed as depicting an example of elements of a method implementedwithin the network environment 100.

Beginning with box 403, the entity service 113 sends the encrypted code118 (FIG. 1) to the client application 203 executed on the client device106 (FIG. 2A). The entity service 113 may also send encrypted data alongwith, before, or after the encrypted code 118, where the encrypted datais encrypted using a cryptographic algorithm 121 (FIG. 1) encryptedwithin the encrypted code 118. The encrypted code 118 and encrypted datamay be sent along with a signature 124 (FIG. 1). The header of thesignature 124 can be used to identify a particular root key-pair 215(FIG. 2A) for decrypting the encrypted code 118 and the encrypted data.Alternatively, the entity service 113 may send a different type of keyidentifier. In one embodiment, the client device 106 may have a lookuptable or mapping stored locally (e.g., in non-volatile random-accessmemory) that links the entity service 113 to a specific root key-pair215 for verifying the signature 124 and decrypting the encrypted code118 and encrypted data.

Next, in box 406, the client application 203 provides the encrypted code118 to the cryptographic coprocessor 206 of the client device 106. Forexample, the client application 203 may store the encrypted code 118 inthe client data store 209 or in other memory, and send a command to thecryptographic coprocessor 206 to load the encrypted code 118 and verifyand decrypt it. Where the cryptographic coprocessor 206 is implementedin firmware, data (e.g., root keys) stored in a secure element (e.g.,secure data storage) may be transferred from the secure element to thefirmware cryptographic coprocessor 206 via an interface that mediatesaccess to the secure element. The data (e.g., root keys) can enable thefirmware cryptographic coprocessor 206 to perform functions such asverification and decryption.

In box 409, the cryptographic coprocessor 206 verifies the encryptedcode 118 using the signature 124 sent with the encrypted code 118. Tothis end, the cryptographic coprocessor 206 may obtain a root key-pair215 (FIG. 2A) associated with the entity in order to perform theverification using the signature 124. The verification procedure thusverifies the authenticity and integrity of the encrypted code 118. Insome cases, the cryptographic coprocessor 206 may verify a state of theclient device 106 and allow or disallow decryption of the encrypted code118 based on the state of the client device 106. For example, thecryptographic coprocessor 206 may disallow decryption of the encryptedcode 118 if the client device 106 is rooted. If the verification is notsuccessful, decryption and execution of the cryptographic algorithm 121will not proceed.

In box 412, the cryptographic coprocessor 206 decrypts the encryptedcode 118. For example, the cryptographic coprocessor 206 may utilize aparticular one of the predefined cryptographic algorithms 218 (FIG. 2A)along with the root key-pair 215 associated with the entity in order toperform the decryption. In decrypting the encrypted code 118, thecryptographic coprocessor 206 obtains the cryptographic algorithm 121 inan unencrypted form. In some examples, the cryptographic algorithm 121may be different from the predefined cryptographic algorithms 218. Inother examples, the cryptographic algorithm 121 may be one of thepredefined cryptographic algorithms 218, although the identity of thecryptographic algorithm 121 may not be apparent from the encrypted code118 itself. In one example, the cryptographic coprocessor 206 acts as aroot of trust to validate a certain proprietary cryptographic algorithm121 before handing it to a secure element.

In box 415, the client application 203 provides the encrypted data tothe cryptographic coprocessor 206. The encrypted data may be anyarbitrary data. The encrypted data may include one or more limited-usepayment credentials 236 (FIG. 2A) or a limited-use key, or otherinformation related to payment transactions. For example, the clientapplication 203 may store the encrypted data in the client data store209 or in other memory, and send a command to the cryptographiccoprocessor 206 to load the encrypted data and verify and decrypt it.

In box 418, the cryptographic coprocessor 206 decrypts the informationin the encrypted data using the cryptographic algorithm 121. To thisend, the cryptographic coprocessor 206 executes the entity-supplied codethat implements the cryptographic algorithm 121 and may use a key fromthe root key-pair 215 associated with the entity. In box 421, thecryptographic coprocessor 206 returns the decrypted information to theclient application 203. In box 424, the client application 203 mayprocess the decrypted data, which may include re-encrypting the data,storing the data in the client data store 209, and/or performing otheractions.

Continuing to FIG. 5, shown is a sequence diagram that provides anexample of the interactions between various components of the networkenvironment 100 including the client device 106 of FIG. 2B. The sequencediagram of FIG. 5 provides merely an example of the many different typesof functional arrangements that can be employed in the networkenvironment 100. As an alternative, the sequence diagram of FIG. 5 canbe viewed as depicting an example of elements of a method implementedwithin the network environment 100.

Beginning with box 503, the entity service 113 sends the encrypted code118 (FIG. 1) to the client application 203 executed on the client device106 (FIG. 2B) in the untrusted execution environment 250 (FIG. 2B). Theencrypted code 118 may be sent along with a signature 124 (FIG. 1). Theheader of the signature 124 can be used to identify a particular rootkey-pair 215 (FIG. 2B) for decrypting the encrypted code 118.Alternatively, the entity service 113 may send a different type of keyidentifier. In one embodiment, the client device 106 may have a lookuptable or mapping stored locally (e.g., in non-volatile random-accessmemory) that links the entity service 113 to a specific root key-pair215 for verifying the signature 124 and decrypting the encrypted code118.

Next, in box 506, the client application 203 provides the encrypted code118 to the trusted application 256 executed in the trusted executionenvironment 253 via the interface 254 (FIG. 2B). For example, the clientapplication 203 may store the encrypted code 118 in the client datastore 209 or in other memory, and send a command to the cryptographiccoprocessor 206 to load the encrypted code 118 and verify and decryptit.

In box 509, the trusted application 256 provides the encrypted code 118to the cryptographic coprocessor 206 of the client device 106. Forexample, the trusted application 256 may store the encrypted code 118 ina secure portion of the client data store 209 or in other secure memory,and send a command to the cryptographic coprocessor 206 to load theencrypted code 118 and verify and decrypt it. The encrypted code 256 maybe provided to the cryptographic coprocessor 206 via an interfacebetween the trusted execution environment 253 and the cryptographiccoprocessor 206.

In box 512, the cryptographic coprocessor 206 verifies the encryptedcode 118 using the signature 124 (FIG. 1) sent with the encrypted code118. To this end, the cryptographic coprocessor 206 may obtain a rootkey-pair 215 (FIG. 2B) associated with the entity in order to performthe verification using the signature 124. The verification procedurethus verifies the authenticity and integrity of the encrypted code 118.In some cases, the cryptographic coprocessor 206 may verify a state ofthe client device 106 and allow or disallow decryption of the encryptedcode 118 based on the state of the client device 106. For example, thecryptographic coprocessor 206 may disallow decryption of the encryptedcode 118 if the client device 106 is rooted. If the verification is notsuccessful, decryption and execution of the cryptographic algorithm 121will not proceed.

In box 515, the cryptographic coprocessor 206 decrypts the encryptedcode 118. For example, the cryptographic coprocessor 206 may utilize aparticular one of the predefined cryptographic algorithms 218 (FIG. 2B)along with the root key-pair 215 associated with the entity in order toperform the decryption. In decrypting the encrypted code 118, thecryptographic coprocessor 206 produces the cryptographic algorithm 121(FIG. 1) in an unencrypted form. In some examples, the cryptographicalgorithm 121 may be different from the predefined cryptographicalgorithms 218. In other examples, the cryptographic algorithm 121 maybe one of the predefined cryptographic algorithms 218, although theidentity of the cryptographic algorithm 121 may not be apparent from theencrypted code 118 itself. In box 518, the cryptographic coprocessor 206returns the decrypted code for the cryptographic algorithm 121 to thetrusted application 256 via the interface between the cryptographiccoprocessor 206 and the trusted execution environment 253. In oneexample, the cryptographic coprocessor 206 acts as a root of trust tovalidate a certain proprietary cryptographic algorithm 121 beforehanding it to the trusted execution environment 253.

In box 521, the client application 203 provides information to thetrusted application 256 for subsequent encryption by the trustedapplication 256. For example, the information may relate to a particularpayment transaction and may include data such as a limited-use paymentcredential 236 (FIG. 2A) or a limited-use key, an unpredictable number,a sequence number, a monotonic counter value, a timestamp, a transactionamount, and/or other information. In other examples, the clientapplication 203 may provide the information to the trusted application256 along with the encrypted code 118 or before the encrypted code 118is provided to the trusted application 256. One or more items of thisinformation (e.g., the unpredictable number) may be generated by thecryptographic coprocessor 206 or the trusted application 256 in someexamples.

In box 524, the trusted application 256 encrypts the information usingthe cryptographic algorithm 121. To this end, the trusted application256 executes the entity-supplied code that implements the cryptographicalgorithm 121 and may use a key from the application key pair 224associated with the entity or a symmetric key. In this way, the trustedapplication 256 generates a cryptogram 127 (FIG. 1). In box 527, thetrusted application 256 returns the cryptogram 127 to the clientapplication 203 via the interface 254.

In box 530, the client application 203 sends the cryptogram 127 to theentity service 113 via the network 109. In box 533, the entity service113 processes the cryptogram 127. For example, the entity service 113may validate a signature of the cryptogram 127. The entity service 113then decrypts the cryptogram 127 using a symmetric key used to encryptthe cryptogram 127, or a private key of the key-pair used to encrypt thecryptogram 127. The entity service 113 may then verify the contents ofthe cryptogram 127. For example, the entity service 113 may verify thata limited-use payment credential 236 or a limited-use key is valid. Uponverification of the contents, the entity service 113 may then authorizeand/or process a corresponding payment transaction.

Turning now to FIG. 6, shown is a sequence diagram that provides anotherexample of the interactions between various components of the networkenvironment 100 including the client device 106 of FIG. 2B. The sequencediagram of FIG. 6 provides merely an example of the many different typesof functional arrangements that can be employed in the networkenvironment 100. As an alternative, the sequence diagram of FIG. 6 canbe viewed as depicting an example of elements of a method implementedwithin the network environment 100.

Beginning with box 603, the entity service 113 sends the encrypted code118 (FIG. 1) to the client application 203 executed on the client device106 (FIG. 2B) in the untrusted execution environment 250 (FIG. 2B). Theentity service 113 may also send encrypted data along with, before, orafter the encrypted code 118, where the encrypted data is encryptedusing a cryptographic algorithm 121 (FIG. 1) encrypted within theencrypted code 118. The encrypted code 118 and encrypted data may besent along with a signature 124 (FIG. 1). The header of the signature124 can be used to identify a particular root key-pair 215 (FIG. 2B) fordecrypting the encrypted code 118. Alternatively, the entity service 113may send a different type of key identifier. In one embodiment, theclient device 106 may have a lookup table or mapping stored locally(e.g., in non-volatile random-access memory) that links the entityservice 113 to a specific root key-pair 215 for verifying the signature124 and decrypting the encrypted code 118 and the encrypted data.

Next, in box 606, the client application 203 provides the encrypted code118 to the trusted application 256 executed in the trusted executionenvironment 253 (FIG. 2B) via the interface 254 (FIG. 2B).

In box 609, the trusted application 256 provides the encrypted code 118to the cryptographic coprocessor 206 of the client device 106. Forexample, the trusted application 256 may store the encrypted code 118 ina secure portion of the client data store 209 or in other secure memory,and send a command to the cryptographic coprocessor 206 to load theencrypted code 118 and verify and decrypt it. The encrypted code 256 maybe provided to the cryptographic coprocessor 206 via an interfacebetween the trusted execution environment 253 and the cryptographiccoprocessor 206. In box 612, the cryptographic coprocessor 206 verifiesthe encrypted code 118 using the signature 124 sent with the encryptedcode 118. To this end, the cryptographic coprocessor 206 may obtain aroot key-pair 215 associated with the entity in order to perform theverification using the signature 124. The verification procedure thusverifies the authenticity and integrity of the encrypted code 118. Insome cases, the cryptographic coprocessor 206 may verify a state of theclient device 106 and allow or disallow decryption of the encrypted code118 based on the state of the client device 106. For example, thecryptographic coprocessor 206 may disallow decryption of the encryptedcode 118 if the client device 106 is rooted. If the verification is notsuccessful, decryption and execution of the cryptographic algorithm 121will not proceed.

In box 615, the cryptographic coprocessor 206 decrypts the encryptedcode 118. For example, the cryptographic coprocessor 206 may utilize aparticular one of the predefined cryptographic algorithms 218 (FIG. 2B)along with the root key-pair 215 associated with the entity in order toperform the decryption. In decrypting the encrypted code 118, thecryptographic coprocessor 206 produces the cryptographic algorithm 121in an unencrypted form. In some examples, the cryptographic algorithm121 may be different from the predefined cryptographic algorithms 218.In other examples, the cryptographic algorithm 121 may be one of thepredefined cryptographic algorithms 218, although the identity of thecryptographic algorithm 121 may not be apparent from the encrypted code118 itself. In one example, the cryptographic coprocessor 206 acts as aroot of trust to validate a certain proprietary cryptographic algorithm121 before handing it to the trusted execution environment 253.

In box 618, the cryptographic coprocessor 206 returns the decrypted codefor the cryptographic algorithm 121 to the trusted application 256 viathe interface between the trusted execution environment 253 and thecryptographic coprocessor 206. In other examples, upon verification ofthe encrypted code 118 by the cryptographic coprocessor 206, the trustedapplication 256 may then decrypt the encrypted code 118.

In box 621, the client application 203 provides the encrypted data tothe trusted application 256 via the interface 254. The encrypted datamay be any arbitrary data. The encrypted data may include one or morelimited-use payment credentials 236 (FIG. 2A) or a limited-use key, orother information related to payment transactions.

In box 624, the trusted application 256 decrypts the information in theencrypted data using the cryptographic algorithm 121. To this end, thetrusted application 256 executes the entity-supplied code thatimplements the cryptographic algorithm 121 and may use a key from theapplication key pair 224 (FIG. 2B) associated with the entity. In box627, the trusted application 256 returns the decrypted information tothe client application 203 via the interface 254. In box 630, the clientapplication 203 may process the decrypted data, which may includere-encrypting the data, storing the data in the client data store 209,and/or performing other actions.

A number of software components previously discussed are stored in thememory of the respective computing devices and are executable by theprocessor of the respective computing devices. In this respect, the term“executable” means a program file that is in a form that can ultimatelybe run by the processor. Examples of executable programs can be acompiled program that can be translated into machine code in a formatthat can be loaded into a random access portion of the memory and run bythe processor, source code that can be expressed in proper format suchas object code that is capable of being loaded into a random accessportion of the memory and executed by the processor, or source code thatcan be interpreted by another executable program to generateinstructions in a random access portion of the memory to be executed bythe processor. An executable program can be stored in any portion orcomponent of the memory, including random access memory (RAM), read-onlymemory (ROM), hard drive, solid-state drive, Universal Serial Bus (USB)flash drive, memory card, optical disc such as compact disc (CD) ordigital versatile disc (DVD), floppy disk, magnetic tape, or othermemory components.

The memory includes both volatile and nonvolatile memory and datastorage components. Volatile components are those that do not retaindata values upon loss of power. Nonvolatile components are those thatretain data upon a loss of power. Thus, the memory can include randomaccess memory (RAM), read-only memory (ROM), hard disk drives,solid-state drives, USB flash drives, memory cards accessed via a memorycard reader, floppy disks accessed via an associated floppy disk drive,optical discs accessed via an optical disc drive, magnetic tapesaccessed via an appropriate tape drive, non-volatile random accessmemory (NVRAM), or other memory components, or a combination of any twoor more of these memory components. In addition, the RAM can includestatic random access memory (SRAM), dynamic random access memory (DRAM),or magnetic random access memory (MRAM) and other such devices. The ROMcan include a programmable read-only memory (PROM), an erasableprogrammable read-only memory (EPROM), an electrically erasableprogrammable read-only memory (EEPROM), or other like memory device.

Although the applications and systems described herein can be embodiedin software or code executed by general purpose hardware as discussedabove, as an alternative the same can also be embodied in dedicatedhardware or a combination of software/general purpose hardware anddedicated hardware. If embodied in dedicated hardware, each can beimplemented as a circuit or state machine that employs any one of or acombination of a number of technologies. These technologies can include,but are not limited to, discrete logic circuits having logic gates forimplementing various logic functions upon an application of one or moredata signals, application specific integrated circuits (ASICs) havingappropriate logic gates, field-programmable gate arrays (FPGAs), orother components, etc. Such technologies are generally well known bythose skilled in the art and, consequently, are not described in detailherein.

The sequence diagrams show the functionality and operation of animplementation of portions of the various embodiments of the presentdisclosure. If embodied in software, each block can represent a module,segment, or portion of code that includes program instructions toimplement the specified logical function(s). The program instructionscan be embodied in the form of source code that includes human-readablestatements written in a programming language or machine code thatincludes numerical instructions recognizable by a suitable executionsystem such as a processor in a computer system. The machine code can beconverted from the source code through various processes. For example,the machine code can be generated from the source code with a compilerprior to execution of the corresponding application. As another example,the machine code can be generated from the source code concurrently withexecution with an interpreter. Other approaches can also be used. Ifembodied in hardware, each block can represent a circuit or a number ofinterconnected circuits to implement the specified logical function orfunctions.

Although the sequence diagrams show a specific order of execution, it isunderstood that the order of execution can differ from that which isdepicted. For example, the order of execution of two or more blocks canbe scrambled relative to the order shown. Also, two or more blocks shownin succession can be executed concurrently or with partial concurrence.Further, in some embodiments, one or more of the blocks shown in thesequence diagrams can be skipped or omitted. In addition, any number ofcounters, state variables, warning semaphores, or messages might beadded to the logical flow described herein, for purposes of enhancedutility, accounting, performance measurement, or providingtroubleshooting aids, etc. It is understood that all such variations arewithin the scope of the present disclosure.

Also, any logic or application described herein that includes softwareor code can be embodied in any non-transitory computer-readable mediumfor use by or in connection with an instruction execution system such asa processor in a computer system or other system. In this sense, thelogic can include statements including instructions and declarationsthat can be fetched from the computer-readable medium and executed bythe instruction execution system. In the context of the presentdisclosure, a “computer-readable medium” can be any medium that cancontain, store, or maintain the logic or application described hereinfor use by or in connection with the instruction execution system.Moreover, a collection of distributed computer-readable media locatedacross a plurality of computing devices (e.g., storage area networks ordistributed or clustered filesystems or databases) may also becollectively considered as a single non-transitory computer-readablemedium.

The computer-readable medium can include any one of many physical mediasuch as magnetic, optical, or semiconductor media. More specificexamples of a suitable computer-readable medium would include, but arenot limited to, magnetic tapes, magnetic floppy diskettes, magnetic harddrives, memory cards, solid-state drives, USB flash drives, or opticaldiscs. Also, the computer-readable medium can be a random access memory(RAM) including static random access memory (SRAM) and dynamic randomaccess memory (DRAM), or magnetic random access memory (MRAM). Inaddition, the computer-readable medium can be a read-only memory (ROM),a programmable read-only memory (PROM), an erasable programmableread-only memory (EPROM), an electrically erasable programmableread-only memory (EEPROM), or other type of memory device.

Further, any logic or application described herein can be implementedand structured in a variety of ways. For example, one or moreapplications described can be implemented as modules or components of asingle application. Further, one or more applications described hereincan be executed in shared or separate computing devices or a combinationthereof. For example, a plurality of the applications described hereincan execute in the same computing device, or in multiple computingdevices in the same computing environment 103.

Disjunctive language such as the phrase “at least one of X, Y, or Z,”unless specifically stated otherwise, is otherwise understood with thecontext as used in general to present that an item, term, etc., can beeither X, Y, or Z, or any combination thereof (e.g., X, Y, or Z). Thus,such disjunctive language is not generally intended to, and should not,imply that certain embodiments require at least one of X, at least oneof Y, or at least one of Z to each be present.

Examples of embodiments of the present disclosure may be described asfollows:

Embodiment 1. A system, comprising: a computing device comprising aprocessor, a memory, and a cryptographic coprocessor; andmachine-readable instructions stored in the memory that, when executedby the processor, cause the computing device to at least: receiveencrypted code implementing a cryptographic algorithm from a service viaa network; decrypt, by the cryptographic coprocessor, the encryptedcode; execute, by the cryptographic coprocessor, the decrypted code togenerate a cryptogram including information encrypted using thecryptographic algorithm; and send the cryptogram to the service via thenetwork.

Embodiment 2. The system of embodiment 1, wherein the cryptographiccoprocessor complies with a version of a Trusted Platform Module (TPM)standard.

Embodiment 3. The system of embodiment 1, wherein the cryptographiccoprocessor is configured to verify a state of the computing devicebefore decrypting the encrypted code.

Embodiment 4. The system of embodiment 1, wherein the service isoperated by an entity, and the cryptographic algorithm is a preferredcryptographic algorithm of the entity.

Embodiment 5. The system of embodiment 1, wherein the cryptographiccoprocessor is configured to verify that the encrypted code is signed byan entity from a predefined plurality of trusted entities beforeexecuting the decrypted code.

Embodiment 6. The system of embodiment 1, wherein the encrypted code isdecrypted using a root key of the cryptographic coprocessor that isassociated with an entity that generated the encrypted code.

Embodiment 7. The system of embodiment 1, wherein the service comprisesa first service and a second service which are associated with anentity, the encrypted code is received from the first service, and thecryptogram is sent to the second service.

Embodiment 8. The system of embodiment 1, wherein the cryptographiccoprocessor is implemented in firmware in the computing device, and datais transferred from a secure element of the computing device to thecryptographic coprocessor via an interface to enable decryption of theencrypted code by the cryptographic coprocessor.

Embodiment 9. The system of embodiment 1, wherein the cryptographiccoprocessor is configured to support a selection from a predefinedplurality of cryptographic algorithms to perform a cryptographicoperation, and the cryptographic algorithm is excluded from thepredefined plurality of cryptographic algorithms.

Embodiment 10. The system of embodiment 1, wherein the cryptographiccoprocessor is configured to act as a root of trust to verify thecryptographic algorithm before transferring the cryptographic algorithmto a secure element of the computing device.

Embodiment 11. A method, comprising: receiving, by a cryptographiccoprocessor, encrypted code implementing a cryptographic algorithm froma client application; decrypting, by the cryptographic coprocessor, theencrypted code; and executing, by the cryptographic coprocessor, thedecrypted code to decrypt encrypted data using the cryptographicalgorithm; or executing, by the cryptographic coprocessor, the decryptedcode to generate a cryptogram using the cryptographic algorithm.

Embodiment 12. The method of embodiment 11, further comprisingverifying, by the cryptographic coprocessor, that the encrypted code issigned by an entity from a predefined plurality of trusted entitiesbefore executing the decrypted code.

Embodiment 13. The method of embodiment 11, wherein the encrypted codeis received by the client application from a service operated by anentity, and the client application is associated with the entity.

Embodiment 14. The method of embodiment 13, wherein decrypting theencrypted code further comprises decrypting the encrypted code using aroot key of the cryptographic coprocessor that is associated with theentity.

Embodiment 15. The method of embodiment 13, wherein the encrypted dataand the encrypted code exclude an identifier of the cryptographicalgorithm.

Embodiment 16. The method of embodiment 13, wherein the cryptographiccoprocessor is configured to support a selection from a predefinedplurality of cryptographic algorithms to perform a cryptographicoperation, and the cryptographic algorithm is excluded from thepredefined plurality of cryptographic algorithms.

Embodiment 17. A non-transitory, computer-readable medium comprisingmachine readable instructions that, when executed by a processor of afirst computing device, cause the first computing device to at least:encrypt a cryptographic algorithm to create encrypted code; send theencrypted code to a second computing device; receive a cryptogramgenerated with the cryptographic algorithm from the encrypted code fromthe second computing device; and decrypt the cryptogram with thecryptographic algorithm.

Embodiment 18. The non-transitory computer-readable medium of embodiment17, wherein the encrypted code is sent to the second computing devicealong with an identifier for a cryptographic key to decrypt theencrypted code.

Embodiment 19. The non-transitory computer-readable medium of embodiment17, wherein the encrypted code excludes an identifier of thecryptographic algorithm.

Embodiment 20. The non-transitory computer-readable medium of embodiment17, wherein encrypted code is encrypted using one of a predefinedplurality of cryptographic algorithms supported by a standard for acryptographic coprocessor.

Embodiment 21. A system, comprising: a computing device comprising aprocessor and a memory; and machine-readable instructions stored in thememory that, when executed by the processor, cause the computing deviceto at least: receive encrypted code implementing a cryptographicalgorithm from a service via a network; provide the encrypted code to anapplication executed in a trusted execution environment of the computingdevice; obtain a cryptogram including information encrypted using thecryptographic algorithm from the application.

Embodiment 22. The system of embodiment 21, wherein the cryptogram isobtained by another application executed in an untrusted executionenvironment of the computing device.

Embodiment 23. The system of embodiment 22, wherein the machine-readableinstructions further cause the computing device to at least send thecryptogram by the other application to the service via the network.

Embodiment 24. The system of embodiment 21, wherein the encrypted codeis provided to the application via an interface between the trustedexecution environment of the computing device and an untrusted executionenvironment of the computing device.

Embodiment 25. The system of embodiment 21, wherein the trustedexecution environment includes a cryptographic coprocessor, and themachine-readable instructions further cause the computing device to atleast verify, by the cryptographic coprocessor, a signature of theencrypted code and a state of the computing device before decrypting theencrypted code.

Embodiment 26. The system of embodiment 21, wherein the trustedexecution environment includes a cryptographic coprocessor, and themachine-readable instructions further cause the computing device to atleast verify, by the cryptographic coprocessor, a signature of theapplication.

Embodiment 27. The system of embodiment 21, wherein the trustedexecution environment includes a cryptographic coprocessor, and thecryptographic algorithm is not included in a predefined plurality ofcryptographic algorithms supported by the cryptographic coprocessor.

Embodiment 28. The system of embodiment 21, wherein the trustedexecution environment comprises a secure operating system executed on asecure virtual processor of the processor.

Embodiment 29. The system of embodiment 21, wherein the cryptogramcorresponds to a payment transaction, and the cryptogram includes alimited use payment credential.

Embodiment 30. The system of embodiment 21, wherein the trustedexecution environment stores a key used to decrypt the encrypted code,the key being associated with an entity that operates the service.

Embodiment 31. A method, comprising: receiving, by a first applicationexecuted in an untrusted execution environment, encrypted data andencrypted code implementing a cryptographic algorithm via a network;transferring, by the first application, the encrypted data and theencrypted code to a second application executed in a trusted executionenvironment; decrypting, by the second application, the encrypted code;executing, by the second application, the decrypted code to decrypt theencrypted data using the cryptographic algorithm; and receiving, by thefirst application, information decrypted from the encrypted data fromthe second application.

Embodiment 32. The method of embodiment 31, further comprising:transferring the encrypted code from the second application to acryptographic coprocessor using an interface; and verifying a signatureof the encrypted code using the cryptographic coprocessor.

Embodiment 33. The method of embodiment 32, wherein executing thedecrypted code is not performed by the cryptographic coprocessor.

Embodiment 34. The method of embodiment 32, wherein decrypting theencrypted code is performed by the cryptographic coprocessor.

Embodiment 35. The method of embodiment 32, wherein the cryptographiccoprocessor includes code that implements a predefined plurality ofcryptographic algorithms, and the cryptographic algorithm is executedfrom the predefined plurality of cryptographic algorithms.

Embodiment 36. The method of embodiment 31, wherein the encrypted codeis received from a service operated by an entity, and the firstapplication and the second application are associated with the entity.

Embodiment 37. A non-transitory, computer-readable medium comprisingmachine readable instructions that, when executed in a trusted executionenvironment of a processor of a computing device, cause the computingdevice to at least: receive encrypted code implementing a cryptographicalgorithm via an interface to an untrusted execution environment of theprocessor; decrypt the encrypted code; execute the decrypted code togenerate a cryptogram including information encrypted using thecryptographic algorithm; and return the cryptogram via the interface.

Embodiment 38. The non-transitory computer-readable medium of embodiment37, wherein the computing device further comprises a cryptographiccoprocessor, and the machine-readable instructions further cause thecomputing device to at least: verify a signature of the encrypted codeusing the cryptographic coprocessor; or verify the cryptographicalgorithm as a root of trust before transferring the cryptographicalgorithm to the trusted execution environment.

Embodiment 39. The non-transitory computer-readable medium of embodiment37, wherein the trusted execution environment comprises a secureoperating system executed on a secure virtual processor of theprocessor.

Embodiment 40. The non-transitory computer-readable medium of embodiment37, wherein the cryptogram corresponds to a payment transaction, and thecryptogram includes a limited use payment credential.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations setforth for a clear understanding of the principles of the disclosure.Many variations and modifications can be made to the above-describedembodiments without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

Therefore, the following is claimed:
 1. A system, comprising: acomputing device comprising a processor, a memory, and a cryptographiccoprocessor; and machine-readable instructions stored in the memorythat, when executed by the processor, cause the computing device to atleast: receive encrypted code that includes implementing a cryptographicalgorithm from a service via a network, wherein the encrypted codefurther includes a symmetric encryption key; decrypt, by thecryptographic coprocessor, the encrypted code; execute, by thecryptographic coprocessor, the decrypted code to generate a cryptogramincluding information encrypted using the cryptographic algorithm andthe symmetric encryption key; and send the cryptogram to the service viathe network.
 2. The system of claim 1, wherein the cryptographiccoprocessor complies with a version of a Trusted Platform Module (TPM)standard.
 3. The system of claim 1, wherein the cryptographiccoprocessor is configured to verify a state of the computing devicebefore decrypting the encrypted code.
 4. The system of claim 1, whereinthe service is operated by an entity, and the cryptographic algorithm isa preferred cryptographic algorithm of the entity.
 5. The system ofclaim 1, wherein the cryptographic coprocessor is configured to verifythat the encrypted code is signed by an entity from a predefinedplurality of trusted entities before executing the decrypted code. 6.The system of claim 1, wherein the encrypted code is decrypted using aroot key of the cryptographic coprocessor that is associated with anentity that generated the encrypted code.
 7. The system of claim 1,wherein the service comprises a first service and a second service whichare associated with an entity, the encrypted code is received from thefirst service, and the cryptogram is sent to the second service.
 8. Thesystem of claim 1, wherein the cryptographic coprocessor is implementedin firmware in the computing device, and data is transferred from asecure element of the computing device to the cryptographic coprocessorvia an interface to enable decryption of the encrypted code by thecryptographic coprocessor.
 9. The system of claim 1, wherein thecryptographic coprocessor is configured to support a selection from apredefined plurality of cryptographic algorithms to perform acryptographic operation, and the cryptographic algorithm is excludedfrom the predefined plurality of cryptographic algorithms.
 10. Thesystem of claim 1, wherein the cryptographic coprocessor is configuredto act as a root of trust to verify the cryptographic algorithm beforetransferring the cryptographic algorithm to a secure element of thecomputing device.
 11. A method, comprising: receiving, by acryptographic coprocessor, encrypted code that includes implementing acryptographic algorithm from a service via a network, wherein theencrypted code further includes a symmetric encryption key; decrypting,by the cryptographic coprocessor, the encrypted code; executing, by thecryptographic coprocessor, the decrypted code to generate a cryptogramincluding information encrypted using the cryptographic algorithm andthe symmetric encryption key; and sending, by the cryptographiccoprocessor, the cryptogram to the service via the network.
 12. Themethod of claim 11, further comprising verifying, by the cryptographiccoprocessor, that the encrypted code is signed by an entity from apredefined plurality of trusted entities before executing the decryptedcode.
 13. The method of claim 11, further comprising verifying, by thecryptographic coprocessor, that the encrypted code is signed by anentity from a predefined plurality of trusted entities before executingthe decrypted code.
 14. The method of claim 11, wherein the encryptedcode is decrypted using a root key of the cryptographic coprocessor thatis associated with an entity that generated the encrypted code.
 15. Themethod of claim 11, wherein the service comprises a first service and asecond service which are associated with an entity, the encrypted codeis received from the first service, and the cryptogram is sent to thesecond service.
 16. The method of claim 11, wherein the cryptographiccoprocessor is implemented in firmware in a computing device, and datais transferred from a secure element of the computing device to thecryptographic coprocessor via an interface to enable decryption of theencrypted code by the cryptographic coprocessor.
 17. The method of claim11, wherein the service is operated by an entity, and wherein decryptingthe encrypted code further comprises decrypting the encrypted code usinga root key of the cryptographic coprocessor that is associated with theentity.
 18. A non-transitory, computer-readable medium comprisingmachine-readable instructions that, when executed by a processor of afirst computing device, cause the first computing device to at least:receive encrypted code that includes implementing a cryptographicalgorithm from a service via a network, wherein the encrypted codefurther includes a symmetric encryption key; decrypt the encrypted code;execute the decrypted code to generate a cryptogram includinginformation encrypted using the cryptographic algorithm and thesymmetric encryption key; and send the cryptogram to the service via thenetwork.
 19. The non-transitory computer-readable medium of claim 18,wherein encrypted code is encrypted using one of a predefined pluralityof cryptographic algorithms supported by a standard for a cryptographiccoprocessor.
 20. The non-transitory computer-readable medium of claim19, wherein the encrypted code is decrypted using a root key of thecryptographic coprocessor that is associated with an entity thatgenerated the encrypted code.