System and method of securing data on a wireless device
    1.
    发明申请
    System and method of securing data on a wireless device 审中-公开
    在无线设备上保护数据的系统和方法

    公开(公告)号:US20060135121A1

    公开(公告)日:2006-06-22

    申请号:US11018274

    申请日:2004-12-21

    IPC分类号: H04M1/66

    摘要: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. The data processing system includes a boundary controller for determining whether the wireless device has entered the secured zone. If the wireless device has entered the secured zone, a security controller queries the wireless device to determine whether the software stored on the wireless device has been subjected to unauthorized alteration. If the software has not been subjected to unauthorized alteration, the security controller enables the wireless device for operation within the secured zone.

    摘要翻译: 一种用于在无线设备上保护数据的系统和方法。 安全区域由边界传感器定义。 数据处理系统耦合到边界传感器和无线设备。 数据处理系统包括用于确定无线设备是否已进入安全区域的边界控制器。 如果无线设备已经进入安全区域,则安全控制器查询无线设备以确定存储在无线设备上的软件是否已经遭受未经授权的更改。 如果软件未经过未经授权的更改,则安全控制器可使无线设备在安全区域内进行操作。

    System and method of preventing alteration of data on a wireless device
    2.
    发明申请
    System and method of preventing alteration of data on a wireless device 有权
    防止无线设备上的数据变更的系统和方法

    公开(公告)号:US20060133612A1

    公开(公告)日:2006-06-22

    申请号:US11019040

    申请日:2004-12-21

    IPC分类号: H04K1/00

    CPC分类号: H04K1/00

    摘要: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.

    摘要翻译: 一种用于在无线设备上保护数据的系统和方法。 安全区域由边界传感器定义。 数据处理系统耦合到边界传感器和无线设备。 如果数据处理系统检测到无线设备的信号强度已经低于第一预定值长于第二预定值,则数据处理系统从存储器中删除对应于无线设备的数字证书。 因此,当无线设备被重新引入安全区域时,响应于确定与无线设备相对应的数字证书没有被存储在存储器中,禁用模块禁止无线设备在安全区域内的操作。

    Scalable paging of platform configuration registers
    4.
    发明申请
    Scalable paging of platform configuration registers 有权
    平台配置寄存器的可扩展分页

    公开(公告)号:US20060075223A1

    公开(公告)日:2006-04-06

    申请号:US10957545

    申请日:2004-10-01

    CPC分类号: G06F21/57

    摘要: A method, computer program, and system for paging platform configuration registers in and out of a trusted platform module. In a trusted computing platform, an unlimited number of platform configuration registers can be obtained through paging. The trust platform module encrypts and decrypts platform configuration registers for storage outside the trusted platform module.

    摘要翻译: 用于寻呼平台配置的方法,计算机程序和系统在可信平台模块内进出。 在可信赖的计算平台中,可以通过寻呼获得无限数量的平台配置寄存器。 信任平台模块对平台配置寄存器进行加密和解密,以便在可信平台模块之外进行存储。

    Key cache management through multiple localities
    5.
    发明申请
    Key cache management through multiple localities 有权
    通过多个地方进行密钥缓存管理

    公开(公告)号:US20050135626A1

    公开(公告)日:2005-06-23

    申请号:US10744441

    申请日:2003-12-22

    CPC分类号: H04L9/0894

    摘要: A method for a plurality of key cache managers for a plurality of localities to share cryptographic key storage resources of a security chip, includes: loading an application key into the key storage; and saving a restoration data for the application key by a key cache manager, where the restoration data can be used by the key cache manager to reload the application key into the key storage if the application key is evicted from the key storage by another key cache manager. The method allows each of a plurality of key cache managers to recognize that is key had been removed from the security chip and to restore its key. The method also allows each key cache manager to evict or destroy any key currently loaded on the security chip without affecting the functionality of other localities.

    摘要翻译: 一种用于多个地区的多个密钥高速缓存管理器用于共享安全芯片的加密密钥存储资源的方法,包括:将应用密钥加载到密钥存储器中; 并且由密钥高速缓存管理器保存应用密钥的恢复数据,其中如果应用密钥被另一个密钥高速缓存从密钥存储器中逐出,密钥高速缓存管理器可以使用恢复数据来将应用密钥重新加载到密钥存储器中 经理。 该方法允许多个密钥高速缓存管理器中的每一个识别已经从安全芯片中移除的密钥并恢复其密钥。 该方法还允许每个密钥缓存管理器驱逐或销毁安全芯片上当前加载的任何密钥,而不影响其他地方的功能。

    Backup restore in a corporate infrastructure
    6.
    发明申请
    Backup restore in a corporate infrastructure 有权
    企业基础架构中的备份还原

    公开(公告)号:US20060230264A1

    公开(公告)日:2006-10-12

    申请号:US11101290

    申请日:2005-04-07

    IPC分类号: H04L9/00

    摘要: A method and system for remotely storing a user's admin key to gain access to an intranet is presented. The user's admin key and intranet user identification (ID) are encrypted using an enterprise's public key, and together they are concatenated into a single backup admin file, which is stored in the user's client computer. If the user needs his admin file and is unable to access it in a backup client computer, he sends the encrypted backup admin file to a backup server and his unencrypted intranet user ID to an intranet authentication server. The backup server decrypts the user's single backup admin file to obtain the user's admin key and intranet user ID. If the unencrypted intranet user ID in the authentication server matches the decrypted intranet user ID in the backup server, then the backup server sends the backup client computer the decrypted admin key.

    摘要翻译: 介绍一种用于远程存储用户管理密钥以访问内联网的方法和系统。 用户的管理密钥和内部网用户标识(ID)使用企业的公钥进行加密,并将它们并入一个备份管理文件,该文件存储在用户的客户端计算机中。 如果用户需要他的管理员文件,并且无法在备份客户端计算机中访问它,则他将加密的备份管理文件发送到备份服务器,并将其未加密的内部网用户ID发送到内部网认证服务器。 备份服务器解密用户的单备份管理文件,获取用户的管理密钥和内部网用户ID。 如果身份验证服务器中未加密的Intranet用户ID与备份服务器中的解密内网用户ID匹配,则备份服务器将备份客户端计算机发送解密的管理密钥。

    Method, apparatus, and product for providing a multi-tiered trust architecture
    7.
    发明申请
    Method, apparatus, and product for providing a multi-tiered trust architecture 审中-公开
    用于提供多层次信任架构的方法,设备和产品

    公开(公告)号:US20060026418A1

    公开(公告)日:2006-02-02

    申请号:US10902669

    申请日:2004-07-29

    IPC分类号: H04L9/00

    摘要: A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system. The data processing system includes multiple different service processor-based hardware platforms. Multiple different trusted platform modules (TPMs) are provided in the data processing system. Each TPM provides trust services to only one of the service processor-based hardware platforms. Each TPM provides its trust services to only a portion of the entire data processing system.

    摘要翻译: 描述了用于在数据处理系统内实现可信计算环境的方法,装置和计算机程序产品。 数据处理系统包括多个不同的基于服务处理器的硬件平台。 在数据处理系统中提供了多个不同的可信平台模块(TPM)。 每个TPM仅向基于服务处理器的硬件平台之一提供信任服务。 每个TPM仅向整个数据处理系统的一部分提供信任服务。

    Method and system for hierarchical platform boot measurements in a trusted computing environment
    8.
    发明申请
    Method and system for hierarchical platform boot measurements in a trusted computing environment 失效
    在可信计算环境中分层平台引导测量的方法和系统

    公开(公告)号:US20050246525A1

    公开(公告)日:2005-11-03

    申请号:US10835503

    申请日:2004-04-29

    IPC分类号: G06F21/00 H04L9/32

    CPC分类号: G06F21/57

    摘要: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.

    摘要翻译: 用于分布式数据处理系统的架构包括系统级服务处理器以及一个或多个节点级服务处理器; 每个都与节点唯一相关联,并且每个都被扩展以包括根据可信计算组的安全模型将节点操作为可信平台(例如TPM和CRTM)所需的任何组件。 然后,这些节点级服务处理器与系统级服务处理器互操作,系统级服务处理器还包含将系统作为整体操作为可信平台所必需的任何组件。 系统级服务处理器内的TPM聚合由节点级服务处理器收集的完整性度量,此后根据请求报告完整性度量,例如向管理程序报告,从而允许将大型分布式数据处理系统验证为可信任的 同时允许其高度并行化的初始化过程进行。

    Method and system for providing a trusted platform module in a hypervisor environment
    9.
    发明申请
    Method and system for providing a trusted platform module in a hypervisor environment 失效
    在管理程序环境中提供可信平台模块的方法和系统

    公开(公告)号:US20050246521A1

    公开(公告)日:2005-11-03

    申请号:US10835350

    申请日:2004-04-29

    CPC分类号: G06F21/53

    摘要: A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.

    摘要翻译: 呈现一种用于在数据处理系统内实现可信计算环境的方法。 在数据处理系统内初始化管理程序,并且管理程序监视数据处理系统内的多个逻辑,可分割的运行时环境。 虚拟机管理程序为基于虚拟机管理程序的可信平台模块(TPM)预留逻辑分区,并通过设备接口将基于虚拟机管理程序的可信平台模块作为虚拟设备呈现给其他逻辑分区。 每当虚拟机管理程序在数据处理系统内创建一个逻辑分区时,管理程序也会在保留的分区内实例化一个逻辑TPM,使得逻辑TPM被锚定到基于管理程序的TPM。 虚拟机管理程序管理保留分区内的多个逻辑TPM,使得每个逻辑TPM与逻辑分区唯一相关联。

    Method for securely creating an endorsement certificate in an insecure environment
    10.
    发明申请
    Method for securely creating an endorsement certificate in an insecure environment 失效
    在不安全的环境中安全地创建背书证书的方法

    公开(公告)号:US20050144440A1

    公开(公告)日:2005-06-30

    申请号:US10750594

    申请日:2003-12-31

    IPC分类号: G06F21/00 H04L9/00

    摘要: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.

    摘要翻译: 一种用于确保制造TPM的签注密钥的安全兼容创建和签名的方法和系统。 为TPM生成认可密钥。 TPM供应商选择一个N字节的秘密,并将N字节的秘密与支持密钥一起存储在TPM中。 无法在TPM之外读取密码。 秘密编号也提供给OEM的凭据服务器。 在认可密钥(EK)凭证处理过程中,TPM产生一个签名密钥,其包括公开密钥和密钥的散列以及公开密钥。 凭证服务器将签名密钥内的散列与接收到的公钥(来自认可密钥)和供应商提供的秘密的第二散列进行匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。