Transferring application secrets in a trusted operating system environment
First Claim
1. A method comprising:
- receiving a request to transfer application data from a source computing device to a destination computing device;
checking whether the application data can be transferred to the destination computing device, and if so, then checking whether the application data can be transferred under control of the user or a third party; and
receiving input from the appropriate one of the user or third party to control transferring of the application data to the destination computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
-
Citations
51 Claims
-
1. A method comprising:
-
receiving a request to transfer application data from a source computing device to a destination computing device;
checking whether the application data can be transferred to the destination computing device, and if so, then checking whether the application data can be transferred under control of the user or a third party; and
receiving input from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, implemented on a computing device, the method comprising:
-
generating a gatekeeper storage key;
sealing the gatekeeper storage key to a trusted core executing on the computing device;
receiving a request to store an application secret;
receiving a type of the application secret;
selecting an appropriate hive key based at least in part on the type of the application secret;
encrypting the application secret using the hive key; and
encrypting the hive key using the gatekeeper storage key. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a source computing device, causes the one or more processors to:
-
receive a request to transfer an application secret from the source computing device to a destination computing device;
identify a type of the application secret;
if the type is non-migrateable, then not allow the application secret to be transferred;
the type is user-migrateable, then allow the application secret to be transferred under control of a user; and
if the type is third party-migrateable, then allow the application secret to be transferred under control of a third party. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a computing device, causes the one or more processors to:
-
receive application data to be encrypted and stored;
identify how the application data is to be allowed to be transferred to another computing device if a request to transfer the application data is received; and
select a particular one of a plurality of encryption keys to encrypt the application data, wherein the selecting is based at least in part on how the application data is to be allowed to be transferred to another computing device. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A system comprising:
-
a processor; and
a memory, coupled to the processor, to store a plurality of instructions that, when executed by the processor, causes the processor to, receive an application secret to be securely stored, identify a secret type that indicates how the application secret is to be allowed to be transferred to another system if a request to transfer the application secret is received, and select a particular one of a plurality of encryption keys to encrypt the application secret, wherein the selecting is based at least in part on the secret type. - View Dependent Claims (37, 38, 39, 40)
-
-
41. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a computing device, causes the one or more processors to:
-
receive a plurality of encrypted application secrets from another computing device;
identify a first group of the plurality of encrypted application secrets that are to be decrypted under user control;
obtain, from a user, a passphrase;
use the passphrase to decrypt each encrypted application secret of the first group of encrypted application secrets;
identify a second group of the plurality of encrypted application secrets that are to be decrypted under third party control; and
communicate with a third party to have each encrypted application secret of the second group of encrypted application secrets decrypted. - View Dependent Claims (42)
-
-
43. One or more computer readable media having stored thereon a plurality of instructions for backing up data on a computing device, wherein the plurality of instructions, when executed by one or more processors of the computing device, causes the one or more processors to:
-
check, for an application secret to be backed up, a type of the application secret;
if the application secret type is non-migrateable, then not allow the application secret to be transferred to a backup medium;
if the application secret type is user-migrateable, then encrypt the application secret based at least in part on a passphrase and allow the encrypted application secret to be transferred to the backup medium; and
if the application secret type is third party-migrateable, then encrypt the application secret based at least in part on a third party key and allow the encrypted application secret to be transferred to the backup medium. - View Dependent Claims (44, 45, 46, 47, 48)
-
-
49. A method comprising:
-
receiving a request to transfer a plurality of application secrets from a source computing device to a destination computing device;
identifying which one of a plurality of types of application secrets the plurality of application secrets correspond to;
identifying a key associated with the one type;
allowing the plurality of application secrets to be accessible to the destination computing device by communicating the key to the destination computing device. - View Dependent Claims (50, 51)
-
Specification