会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 19. 发明授权
    • Mechanisms to control access to cryptographic keys and to attest to the approved configurations of computer platforms
    • 控制加密密钥访问的机制,并证明已批准的计算机平台配置
    • US07711960B2
    • 2010-05-04
    • US11511773
    • 2006-08-29
    • Vincent Scarlata
    • Vincent Scarlata
    • G06F21/00
    • H04L9/0897
    • Methods and arrangements to control access to cryptographic keys and to attest to the approved configurations of computer platforms able to access these keys, which include trusted platform modules (TPMs) are contemplated. Embodiments include transformations, code, state machines or other logic to control access to a cryptographic key by creating an authorization blob locking authorization data to access the cryptographic key to platform configuration register (PCR) values of a TPM, the PCR values representing a configuration of a computing platform. Embodiments may also involve generating a first TPM cryptographic key bound to PCR values, receiving a second TPM cryptographic key owned by software, and receiving evidence of the identity of an upgrade service controlling the upgrading of the software. Embodiment may also include certifying the first TPM cryptographic key; certifying the second TPM cryptographic key; concatenating the first certification, the second certification, and the evidence of the identity of the upgrade service; and signing the concatenation.
    • 控制对加密密钥的访问并证实能够访问这些密钥(包括可信平台模块(TPM))的计算机平台的已批准配置的方法和布置。 实施例包括转换,代码,状态机或其他逻辑,以通过创建授权区块锁定授权数据来访问加密密钥到TPM的平台配置寄存器(PCR)值来控制对加密密钥的访问,所述PCR值表示 一个计算平台。 实施例还可以包括生成绑定到PCR值的第一TPM加密密钥,接收由软件拥有的第二TPM加密密钥,以及接收控制软件升级的升级服务的身份的证据。 实施例还可以包括证明第一TPM密码密钥; 验证第二个TPM加密密钥; 连接第一认证,第二认证和升级服务身份证明; 并签署连接。