Cryptographic hardware watchdog
    4.
    发明授权

    公开(公告)号:US11316694B2

    公开(公告)日:2022-04-26

    申请号:US16366461

    申请日:2019-03-27

    Abstract: A computing device's trusted platform module (TPM) is configured with a cryptographic watchdog timer which forces a device reset if the TPM fails to solve a cryptographic challenge before the expiration of the timer. The computing device's TPM is configured to generate the cryptographic challenge, to which the computing device does not possess the cryptographic token for resolution. While the watchdog timer counts down, the computing device requests a cryptographic token from a remote service to solve the challenge. The remote service transmits the cryptographic token to the computing device so long as the remote service identifies no reason to withhold the token, such as the computing device being infected with malware. The interoperability of the computing device and remote service enables the remote service to exercise control and reset capabilities over the computing device.

    Attestation protocol for securely booting a guest operating system
    6.
    发明授权
    Attestation protocol for securely booting a guest operating system 有权
    用于安全引导客户机操作系统的认证协议

    公开(公告)号:US09477486B2

    公开(公告)日:2016-10-25

    申请号:US14462113

    申请日:2014-08-18

    Abstract: In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode.

    Abstract translation: 在云计算环境中,最小化生产服务器虚拟化堆栈,以减少在虚拟机中运行的恶意软件的安全漏洞。 最小的虚拟化堆栈包括对客户操作系统的操作所需的那些虚拟设备的支持,这些虚拟设备的代码基础进一步减少。 此外,专用的隔离引导服务器提供安全引导客户机操作系统的功能。 引导服务器通过使用认证协议进行隔离,引导服务器向网络交换机提供秘密,以证明引导服务器以干净的模式运行。 认证协议可以进一步采用安全协处理器来密封秘密,使得仅当引导服务器以干净模式操作时才可访问。

    Device with embedded certificate authority

    公开(公告)号:US10440006B2

    公开(公告)日:2019-10-08

    申请号:US15629139

    申请日:2017-06-21

    Abstract: A smart device, connected device, Internet of Things (IoT) device, etc. is configured with an embedded certificate authority. The embedded certificate authority generates a compound certificate that is signed at least by a manufacturer certificate securely stored on the device. The compound certificate includes a representation of a state of the device, which is based on one or more measurements of code executable on the device. The compound certificate may be used by an external device communicating with the smart device to determine whether the device is in a trusted state. Because the compound certificate is chained to a manufacturer certificate, the external device can communicate with the manufacturer (or an employed party) to determine whether the state of the device should be trusted.

Patent Agency Ranking