会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS IN SIGNED GROUPS TO DEVICES USING A DISTRIBUTION CD
    • 使用分发CD将设备中的直接证明私人密钥交付给设备的方法
    • WO2006019614A3
    • 2006-12-07
    • PCT/US2005024253
    • 2005-07-08
    • INTEL CORPSUTTON JAMES IIHALL CLIFFORDBRICKELL ERNIEGRAWROCK DAVID
    • SUTTON JAMES IIHALL CLIFFORDBRICKELL ERNIEGRAWROCK DAVID
    • H04L9/08H04L9/32
    • H04L63/083G06F9/4843G06F12/1036G06F21/57G06F21/73H04L9/0897H04L9/3218H04L9/3236H04L63/04
    • Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated signed group record of encrypted data structures from the removable storage medium, and verifies the signed group record. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key, when the group record is valid. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.
    • 在安装在客户端计算机系统中的设备中的签名密钥组中提供直接证明私钥可以以安全的方式实现,而不需要在设备中的显着的非易失性存储。 在制造时生成并存储与设备中的组号一起存储唯一的伪随机值。 伪随机值用于生成用于加密持有Direct Proof私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构被存储在可移动存储介质(例如CD或DVD)上的签名组密钥(例如,签名组记录)中,并且分发给客户端计算机系统的所有者。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果没有,系统从可移动存储介质中获得加密数据结构的关联签名组记录,并验证签名组记录。 该设备使用从其存储的伪随机值重新生成的对称密钥来解密加密的数据结构,以便当组记录有效时获得Direct Proof私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。
    • 5. 发明申请
    • METHOD FOR PROVIDING TRUSTED TIME IN A COMPUTING PLATFORM
    • 在计算平台中提供信用时间的方法
    • WO2007038031A3
    • 2007-06-07
    • PCT/US2006036151
    • 2006-09-14
    • INTEL CORPBRICKELL ERNIEHALL CLIFFORD
    • BRICKELL ERNIEHALL CLIFFORD
    • G06F21/02
    • G06F21/725
    • Providing trusted time in a computing platform, while still supporting privacy, may be accomplished by having a trusted time device provide the trusted time to an application executing on the computing platform. The trusted time device may be reset by determining if a value in a trusted time random number register has been set, and if not, waiting a period of time, generating a new random number, and storing the new random number in the trusted time random number register. The trusted time random number register is set to zero whenever electrical power is first applied to the trusted time device upon power up of the computing platform, and whenever a battery powering the trusted time device is removed and reconnected. By keeping the size of the trusted time random number register relatively small, and waiting the specified period of time, attacks on the computing platform to determine the trusted time may be minimized, while deterring the computing platform from being uniquely identified.
    • 在支持隐私的同时,在计算平台中提供可信时间可以通过使可信时间设备向在计算平台上执行的应用程序提供可信时间来实现。 信任时间设备可以通过确定可信时间随机数寄存器中的值是否已经被设置而被重置,如果不是,则等待一段时间,生成新的随机数,并将新的随机数存储在可信时间随机 数字寄存器。 无论何时在计算平台上电时首次对可信时间设备施加电力,并且每当为可信时间设备供电的电池被去除并重新连接时,信任时间随机数寄存器将被设置为零。 通过保持可信时间随机数寄存器的大小相对较小,并且等待指定的时间段,可以最小化计算平台上的攻击以确定可信时间,同时阻止计算平台被唯一标识。
    • 6. 发明申请
    • TRUSTED PLATFORM MODULE CERTIFICATION AND ATTESTATION UTILIZING AN ANONYMOUS KEY SYSTEM
    • 值得信赖的平台模块认证和利用匿名密钥系统进行验证
    • WO2016077017A3
    • 2017-05-11
    • PCT/US2015055508
    • 2015-10-14
    • INTEL CORP
    • SARANGDHAR NITIN VNEMIROFF DANIELSMITH NED MBRICKELL ERNIELI JIANGTAO
    • H04L9/32H04L9/08
    • H04L9/3234H04L9/0861H04L9/0866H04L9/14H04L9/3263H04L2209/127
    • This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates.
    • 该应用针对可信平台模块认证和利用匿名密钥系统进行认证。 一般而言,TPM认证和TPM认证可以通过使用匿名密钥系统(AKS)认证在利用集成TPM的设备中得到支持。 示例设备可以包括至少组合的AKS和TPM资源,其将AKS和TPM固件(FW)加载到运行时间环境中,该运行时间环境还可以至少包括操作系统(OS)加密模块,AKS服务模块和TPM认证和证明 (CA)模块。 对于TPM认证,CA模块可以与运行时环境中的其他模块交互以生成TPM证书,该证书由AKS证书签名,可以传输到认证平台进行验证。 对于TPM证明,CA模块可能会导致TPM证书与TPM和/或AKS证书一起提供给证明平台进行验证。