Establishing entropy on a system
First Claim
Patent Images
1. A computer-implemented method, comprising:
- provisioning a virtual computing system;
generating, using a pseudorandom number generator of the virtual computing system, a first value;
establishing a first cryptographic protocol connection using the first value;
receiving, over the first cryptographic protocol connection, a second value generated using a random number generator; and
using the second value to establish a second cryptographic protocol connection.
1 Assignment
0 Petitions
Accused Products
Abstract
Servers in datacenters, mobile devices and virtualized servers without human interaction may experience difficulties in establishing entropy in a virtualized computing environment. Entropy is an important foundation for cryptography and a lack of entropy has led to weaknesses that can be used to break cryptographic systems in the past.
5 Citations
19 Claims
-
1. A computer-implemented method, comprising:
-
provisioning a virtual computing system; generating, using a pseudorandom number generator of the virtual computing system, a first value; establishing a first cryptographic protocol connection using the first value; receiving, over the first cryptographic protocol connection, a second value generated using a random number generator; and using the second value to establish a second cryptographic protocol connection. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
one or more processors; and memory to store instructions that, if executed by the one or more processors, cause the system to; generate, using a pseudorandom number generator, a first value; establish a first encrypted connection using the first value; receive, over the first encrypted connection, a second value generated using a random number generator; and use the second value to establish a second encrypted connection. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A non-transitory computer-readable storage medium storing executable instructions that, if executed by one or more processors of a computer system, cause the computer system to at least:
-
generate, using a pseudorandom number, a first value; and establish a first secure connection using the first value; receive, over the first secure connection, a second value with a higher entropy than the first value; and use the second value to establish a second secure connection. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification