Platform and method for securely transmitting an authorization secret.
First Claim
Patent Images
1. A method comprising:
- receiving an ephemeral asymmetric public key and an ephemeral credential;
verifying that the ephemeral asymmetric public key is valid using data recovered from the ephemeral credential;
encrypting authorization secret using the ephemeral asymmetric public key if the ephemeral asymmetric public key is determined to be valid; and
transmitting the encrypted authorization secret over a link.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a platform comprises a processor, an input/output control hub (ICH), and a trusted platform module (TPM). Coupled to the ICH, the TPM comprises an internal memory, and an asymmetric key generation unit. The symmetric key generation unit produces an ephemeral asymmetric key pair including an ephemeral asymmetric public key and an ephemeral asymmetric private key. Both the ephemeral asymmetric public key and the ephemeral asymmetric.
-
Citations
24 Claims
-
1. A method comprising:
-
receiving an ephemeral asymmetric public key and an ephemeral credential;
verifying that the ephemeral asymmetric public key is valid using data recovered from the ephemeral credential;
encrypting authorization secret using the ephemeral asymmetric public key if the ephemeral asymmetric public key is determined to be valid; and
transmitting the encrypted authorization secret over a link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
creating an ephemeral asymmetric public key and a corresponding ephemeral asymmetric private key internally within an integrated circuit device;
certifying the ephemeral asymmetric public key;
transmitting the ephemeral asymmetric public key and an ephemeral credential to an requester in order to determine whether the ephemeral asymmetric public key is valid; and
using the ephemeral asymmetric public key for protecting confidentiality of an authorization secret provided by the requester during a communication session. - View Dependent Claims (11, 12, 13, 15, 16, 17, 19, 20, 21)
-
-
14. An integrated circuit device comprising:
-
an internal memory; and
an asymmetric key generation unit to produce an ephemeral asymmetric key pair including an ephemeral asymmetric public key and an ephemeral asymmetric private key, both the ephemeral asymmetric public key and the ephemeral asymmetric private key are temporarily used for encryption and decryption during a single communication session.
-
-
18. A platform comprising:
-
a processor;
an input/output control hub; and
a trusted platform module (TPM) coupled to the input/output control hub, the TPM including an internal memory, and an asymmetric key generation unit to produce an ephemeral asymmetric key pair including an ephemeral asymmetric public key and an ephemeral asymmetric private key, both the ephemeral asymmetric public key and the ephemeral asymmetric private key are temporarily used for encryption and decryption during a single communication session.
-
-
22. A program loaded into readable memory for execution by a trusted platform module of a platform, the program comprising:
-
code to receive an ephemeral asymmetric public key and an ephemeral credential;
code to verify that the ephemeral asymmetric public key is valid using data recovered from the ephemeral credential;
code to encrypt an authorization secret using the ephemeral asymmetric public key if the ephemeral asymmetric public key is determined to be valid, the authorization secret to control access to an entity loaded on the platform; and
code to transmit the encrypted authorization secret over a link to the platform. - View Dependent Claims (23, 24)
-
Specification