会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Key cache management through multiple localities
    • 通过多个地方进行密钥缓存管理
    • US07590845B2
    • 2009-09-15
    • US10744441
    • 2003-12-22
    • Charles Douglas BallRyan Charles CathermanJames Patrick HoffJames Peter Ward
    • Charles Douglas BallRyan Charles CathermanJames Patrick HoffJames Peter Ward
    • H04L9/14G06F12/08
    • H04L9/0894
    • A method for a plurality of key cache managers for a plurality of localities to share cryptographic key storage resources of a security chip, includes: loading an application key into the key storage; and saving a restoration data for the application key by a key cache manager, where the restoration data can be used by the key cache manager to re-load the application key into the key storage if the application key is evicted from the key storage by another key cache manager. The method allows each of a plurality of key cache managers to recognize that its key had been removed from the security chip and to restore its key. The method also allows each key cache manager to evict or destroy any key currently loaded on the security chip without affecting the functionality of other localities.
    • 一种用于多个地区的多个密钥高速缓存管理器用于共享安全芯片的加密密钥存储资源的方法,包括:将应用密钥加载到密钥存储器中; 并且由密钥高速缓存管理器保存用于应用密钥的恢复数据,其中如果应用密钥从另一个密钥存储器被逐出,密钥高速缓存管理器可以使用恢复数据将应用密钥重新加载到密钥存储器中 密钥缓存管理器。 该方法允许多个密钥高速缓存管理器中的每一个识别出其密钥已经从安全芯片中移除并恢复其密钥。 该方法还允许每个密钥缓存管理器驱逐或销毁安全芯片上当前加载的任何密钥,而不影响其他地方的功能。
    • 7. 发明授权
    • Securely creating an endorsement certificate in an insecure environment
    • 在不安全的环境中安全地创建背书证书
    • US08495361B2
    • 2013-07-23
    • US11858971
    • 2007-09-21
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • H04L29/06
    • G06F21/57
    • A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    • 一种用于确保制造TPM的签注密钥的安全兼容创建和签名的方法和系统。 为TPM生成认可密钥。 TPM供应商选择一个N字节的秘密,并将N字节的秘密与支持密钥一起存储在TPM中。 无法在TPM之外读取密码。 秘密编号也提供给OEM的凭据服务器。 在认可密钥(EK)凭证处理过程中,TPM产生一个签名密钥,其包括公开密钥和密钥的散列以及公开密钥。 凭证服务器将签名密钥内的散列与接收到的公钥(来自认可密钥)和供应商提供的秘密的第二散列进行匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。
    • 9. 发明授权
    • Method for securely creating an endorsement certificate in an insecure environment
    • 在不安全的环境中安全地创建背书证书的方法
    • US07644278B2
    • 2010-01-05
    • US10750594
    • 2003-12-31
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • H04L9/32
    • G06F21/602G06F21/57G06F2221/2117H04L9/0877H04L9/3236H04L9/3263
    • A Method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured trusted platform modules. The endorsement keys are generated for the trusted platform module (TPM). The TPM vendor selects an N-byte secret and stores the N-type secret in the trusted platform module along with the endorsement keys. The secret number cannot be read outside of the trusted platform module. The secret number is also provided to the credential server of the original equipment manufacturer. During the endorsement key (EK) credential process, the trusted platform module generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key withy a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the trusted platform module only when a match is confirmed.
    • 一种用于确保制造可信平台模块的认可密钥的安全兼容创建和签名的方法和系统。 为可信平台模块(TPM)生成认可密钥。 TPM供应商选择N字节的秘密,并将N型秘密与认可密钥一起存储在可信平台模块中。 秘密号码不能在受信任的平台模块之外读取。 秘密编号也提供给原始设备制造商的凭证服务器。 在认可密钥(EK)凭证过程中,可信平台模块生成包括公开密钥和秘密的哈希和公开密钥的认可密钥。 凭证服务器使用所接收的公钥(来自认可密钥)和供应商提供的秘密的第二散列表来匹配认可密钥内的散列。 仅当匹配确认时,EK证书才会生成并插入可信平台模块。
    • 10. 发明授权
    • Providing a trusted platform module in a hypervisor environment
    • 在管理程序环境中提供可信赖的平台模块
    • US08086852B2
    • 2011-12-27
    • US12207487
    • 2008-09-09
    • Steven A. BadeRyan Charles CathermanJames Patrick HoffNia Letise KelleyEmily Jane Ratliff
    • Steven A. BadeRyan Charles CathermanJames Patrick HoffNia Letise KelleyEmily Jane Ratliff
    • H04L9/00
    • G06F21/53
    • A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.
    • 呈现一种用于在数据处理系统内实现可信计算环境的方法。 在数据处理系统内初始化管理程序,并且管理程序监视数据处理系统内的多个逻辑,可分割的运行时环境。 虚拟机管理程序为基于虚拟机管理程序的可信平台模块(TPM)预留逻辑分区,并通过设备接口将基于虚拟机管理程序的可信平台模块作为虚拟设备呈现给其他逻辑分区。 每当虚拟机管理程序在数据处理系统内创建一个逻辑分区时,管理程序也会在保留的分区内实例化一个逻辑TPM,使得逻辑TPM被锚定到基于管理程序的TPM。 虚拟机管理程序管理保留分区内的多个逻辑TPM,使得每个逻辑TPM与逻辑分区唯一相关联。