A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed.

 
Web www.patentalert.com

< Mechanism to avoid expensive double-encryption in mobile networks

> Copy protection method and system for programmable gate array

> Method and system for controlling access to software features in an electronic device

~ 00556