Extended trusted computing base
First Claim
Patent Images
1. A method, comprising:
- generating a first level trusted computing base (TCB) having a plurality of hardware components including a trusted platform module (TPM);
forming an extended TCB by adding a second level TCB to the first level TCB, wherein the second level TCB is software-based; and
transferring properties associated with the first level TCB to the second level TCB.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus, and system are provided for extending a trusted computing base (TCB). According to one embodiment, a first level trusted computing base (TCB) is generated having hardware components including a trusted platform module (TPM), and an extended TCB is formed by adding a second level software-based TCB to the first level TCB, and properties associated with the first level TCB are transferred to the second level TCB.
78 Citations
30 Claims
-
1. A method, comprising:
-
generating a first level trusted computing base (TCB) having a plurality of hardware components including a trusted platform module (TPM);
forming an extended TCB by adding a second level TCB to the first level TCB, wherein the second level TCB is software-based; and
transferring properties associated with the first level TCB to the second level TCB. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
generating a first level trusted computing base (TCB) having a plurality of hardware components including a trusted platform module (TPM);
forming an extended TCB by adding a second level TCB to the first level TCB, wherein the second level TCB is software-based;
adding a first virtual software TPM to the second level TCB; and
transferring properties associated with a hardware TPM of the first level TCB to the first virtual software TPM. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An extended trusted computing base, comprising:
-
a first level trusted computing base (TCB) having a plurality of hardware components including a processor and a trusted platform module (TPM); and
one or more levels of TCB coupled with the first level TCB, wherein the one or more levels of TCB comprise one or more levels of software-based TCB having properties similar to trust and security properties associated with the first level TCB. - View Dependent Claims (18, 19, 20)
-
-
21. A system, comprising:
-
a storage medium;
an extended trusted computing base (TCB) coupled with the storage medium, the extended TCB having a first level TCB having a plurality of hardware components including a processor and a trusted platform module (TPM), and one or more levels of TCB coupled with the first level TCB, wherein the one or more levels of TCB comprise one or more levels of software-based TCB having properties similar to trust and security properties associated with the first level TCB; and
a hardware secure storage facility coupled with the first level TCB and one or more virtual secure storage facilities coupled with each of the one or more levels of TCB. - View Dependent Claims (22, 23)
-
-
24. A machine-readable medium having stored thereon data representing sets of instructions, the sets of instructions which, when executed by a machine, cause the machine to:
-
generate a first level trusted computing base (TCB) having a plurality of hardware components including a trusted platform module (TPM);
form an extended TCB by adding a second level TCB to the first level TCB, wherein the second level TCB is software-based; and
transfer properties associated with the first level TCB to the second level TCB. - View Dependent Claims (25, 26, 27, 30)
-
-
28. A machine-readable medium having stored thereon data representing sequences of instructions, the sequencing of instructions which, when executed by a machine, cause the machine to:
-
generate a first level trusted computing base (TCB) having a plurality of hardware components including a trusted platform module (TPM);
form an extended TCB by adding a second level TCB to the first level TCB, wherein the second level TCB is software-based;
add a first virtual software TPM to the second level TCB; and
transfer properties associated with a hardware TPM of the first level TCB to the first virtual software TPM. - View Dependent Claims (29)
-
Specification