Hardware virtualized TPM into virtual machines

    公开(公告)号:US12101410B2

    公开(公告)日:2024-09-24

    申请号:US17401181

    申请日:2021-08-12

    CPC classification number: H04L9/3234 G06F9/45558 H04L9/083 G06F2009/45587

    Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein enable executable code of a hardware security platform (HSP) circuit to communicate with a hypervisor in a separate processor. The hypervisor generates and manages virtual machines. The HSP code comprises trusted platform module (TPM) logic, that processes TPM commands received via the hypervisor, and in response to the processing, communicates security information (e.g., measurements, keys, authorization data) with the virtual machines via the hypervisor. The TPM logic receives security information related to a virtual machine from the hypervisor and stores the security information in non-volatile memory of the HSP circuit, where security information from a particular VM is distinguishable from security information from another VM in the HSP memory. The hypervisor (and VMs) communicate via a network fabric with the HSP circuit within an SOC, or the HSP may reside on a discrete chip and communicate via a secure encrypted channel.

    Firmware policy enforcement via a security processor

    公开(公告)号:US11853428B2

    公开(公告)日:2023-12-26

    申请号:US17337251

    申请日:2021-06-02

    CPC classification number: G06F21/572 G06F9/541 G06F21/554 G06F2221/033

    Abstract: Embodiments described herein are directed to firmware policy enforcement of a computing device. For example, a security processor of the computing device is utilized to boot the computing device. During a boot session, the security processor loads and executes specialized firmware. The specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. Based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. Based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.

    Transfer of ownership of a computing device via a security processor

    公开(公告)号:US12204648B2

    公开(公告)日:2025-01-21

    申请号:US18393843

    申请日:2023-12-22

    Abstract: Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.

    Device Attestation Through Security Hardened Management Agent
    10.
    发明申请
    Device Attestation Through Security Hardened Management Agent 审中-公开
    通过安全硬件管理代理进行设备认证

    公开(公告)号:US20160259941A1

    公开(公告)日:2016-09-08

    申请号:US14641184

    申请日:2015-03-06

    Abstract: A device boots in a secure manner that allows measurements reflecting which components are loaded during booting to be generated. Measurements of such components, as well as of a device management agent and the security state of the device, are also obtained. The device management agent accesses an attestation service for an enterprise, which is a collection of resources managed by a management service. The device management agent provides the obtained measurements to the attestation service, which evaluates the measurements and based on the evaluation determines whether the device is verified for use in the enterprise. The management service uses this verification to ensure that the device management agent is running in a secure manner, is accurately providing indications of the state of the device to the management service, and is implementing policy received from the management service.

    Abstract translation: 设备以安全的方式引导,允许测量反映在引导期间加载哪些组件以生成。 还获得了这些组件以及设备管理代理的测量以及设备的安全状态。 设备管理代理访问企业的认证服务,企业是管理服务管理的资源集合。 设备管理代理将获得的测量结果提供给认证服务,其对评估进行评估,并且基于评估来确定设备是否被验证用于企业中。 管理服务使用该验证来确保设备管理代理以安全的方式运行,准确地向管理服务提供设备状态的指示,并且正在执行从管理服务接收到的策略。

Patent Agency Ranking