TRUST SERVICE FOR A CLIENT DEVICE
    3.
    发明公开
    TRUST SERVICE FOR A CLIENT DEVICE 审中-公开
    客户端设备的信任服务

    公开(公告)号:EP3210155A1

    公开(公告)日:2017-08-30

    申请号:EP15788524.5

    申请日:2015-10-18

    IPC分类号: G06F21/62 G06F21/72 H04L29/06

    摘要: Techniques for a trust service for a client device are described. In various implementations, a trust service is implemented remotely from a client device and provides various trust-related functions to the client device. According to various implementations, communication between a client device and a remote trust service is authenticated by a client identifier (ID) that is maintained by both the client device and the remote trust service. In at least some implementations, the client ID is stored on a location of the client device that is protected from access by (e.g., is inaccessible to) device components such as an operating system, applications, and so forth. Thus, the client ID may be utilized to generate signatures to authenticate communications between the client device and the remote trust service.

    摘要翻译: 描述了用于客户端设备的信任服务的技术。 在各种实现中,信任服务从客户端设备远程实现,并向客户端设备提供各种信任相关功能。 根据各种实现,客户端设备和远程信任服务之间的通信由客户端设备和远程信任服务两者维护的客户端标识符(ID)进行认证。 在至少一些实施方式中,客户端ID被存储在客户端设备的位置上,该位置被设备组件(诸如操作系统,应用等)(例如,不可访问)保护以免被访问。 因此,可以利用客户端ID来生成签名以认证客户端设备和远程信任服务之间的通信。

    MIGRATING SECRETS USING HARDWARE ROOTS OF TRUST FOR DEVICES

    公开(公告)号:EP3362939A1

    公开(公告)日:2018-08-22

    申请号:EP16787596.2

    申请日:2016-10-03

    IPC分类号: G06F21/57

    摘要: Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The framework can include a low-resource device and at least one distributed resource. The low-resource device can be configured to generate sealing keys, migration keys, and attestation keys that are based on a device secret associated with the low-resource device and one or more software modules. The low-resource device can further be configured to use the migration keys and the sealing keys to both verify a software update and migrate secrets from a previous version of the software to a newer version of the software. Additionally, the low-resource device can be configured to generate an attestation statement using the attestation keys and perform attestation using the attestation statement and the at least one distributed resource.

    TRUSTED PLATFORMS USING MINIMAL HARDWARE RESOURCES

    公开(公告)号:EP3362936A1

    公开(公告)日:2018-08-22

    申请号:EP16785280.5

    申请日:2016-10-03

    IPC分类号: G06F21/51 H04L9/08

    摘要: Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The framework can include a low-resource device and at least one distributed resource. The low-resource device can be configured to generate sealing keys, migration keys, and attestation keys that are based on a device secret associated with the low-resource device and one or more software modules. The low-resource device can further be configured to use the migration keys and the sealing keys to both verify a software update and migrate secrets from a previous version of the software to a newer version of the software. Additionally, the low-resource device can be configured to generate an attestation statement using the attestation keys and perform attestation using the attestation statement and the at least one distributed resource.

    SECURITY PROCESSING UNIT WITH CONFIGURABLE ACCESS CONTROL
    7.
    发明公开
    SECURITY PROCESSING UNIT WITH CONFIGURABLE ACCESS CONTROL 审中-公开
    具有可配置访问控制安全处理部

    公开(公告)号:EP3044900A1

    公开(公告)日:2016-07-20

    申请号:EP14783691.0

    申请日:2014-09-08

    IPC分类号: H04L9/08

    摘要: A security processing unit is configured to manage cryptographic keys. In some instances, the security processing unit may comprise a co-processing unit that includes memory, one or more processors, and other components to perform operations in a secure environment. A component that is external to the security processing unit may communicate with the security processing unit to generate a cryptographic key, manage access to a cryptographic key, encrypt/decrypt data with a cryptographic key, or otherwise utilize a cryptographic key. The external component may comprise a central processing unit, an application, and/or any other hardware or software component that is located outside the security processing unit.