Distributed trusted virtualization platform
First Claim
Patent Images
1. A trusted virtualization system comprising a trustworthy mobile endpoint device, the mobile endpoint device comprising:
- a communications module that provides a communications link between the mobile endpoint device and a networked infrastructure;
a host processor and memory;
a hardware based tamper-resistant module (hereafter, the hardware root of trust or HROT), the HROT comprising;
secure non-volatile memory for storing integrity measurement data and data related to keys,a computational module;
a key pair generation module, anda random number generator;
a trusted boot process executed by the host processor to boot the mobile endpoint device into a known state, the trusted boot process utilizing the HROT to provide cryptographic resources and secure non-volatile memory to verify the integrity of the mobile endpoint device;
an attestation process executed by the host processor to attest to the integrity of the mobile endpoint device in response to an attestation challenge, the attestation process utilizing the HROT to provide integrity measurements of the mobile endpoint device, said integrity measurements verifying an integrity of a state of the mobile endpoint device;
a Type-1 trusted virtual machine monitor (hereafter, the Type-1 TMM) that executes on the host processor, the trusted boot process including booting of the Type-1 TVMM and utilizing the HROT to verify the integrity of the Type-1 TVMM, the Type-1 TVMM capable of hosting a plurality of virtual machines and virtualizing the HROT independently for each such hosted virtual machine.
2 Assignments
0 Petitions
Accused Products
Abstract
A platform architecture shifts the networked computing paradigm from PC+Network to a system using trusted mobile internet end-point (MIEP) devices and cooperative agents hosted on a trusted server. The MIEP device can participate in data flows, arbitrate authentication, and/or participate in implementing security mechanisms, all within the context of assured end-to-end security. The MIEP architecture improves platform-level capabilities by suitably (and even dynamically) partitioning what is done at the MIEP nodes, the network, and the server based infrastructure for delivering services.
593 Citations
60 Claims
-
1. A trusted virtualization system comprising a trustworthy mobile endpoint device, the mobile endpoint device comprising:
-
a communications module that provides a communications link between the mobile endpoint device and a networked infrastructure; a host processor and memory; a hardware based tamper-resistant module (hereafter, the hardware root of trust or HROT), the HROT comprising; secure non-volatile memory for storing integrity measurement data and data related to keys, a computational module; a key pair generation module, and a random number generator; a trusted boot process executed by the host processor to boot the mobile endpoint device into a known state, the trusted boot process utilizing the HROT to provide cryptographic resources and secure non-volatile memory to verify the integrity of the mobile endpoint device; an attestation process executed by the host processor to attest to the integrity of the mobile endpoint device in response to an attestation challenge, the attestation process utilizing the HROT to provide integrity measurements of the mobile endpoint device, said integrity measurements verifying an integrity of a state of the mobile endpoint device; a Type-1 trusted virtual machine monitor (hereafter, the Type-1 TMM) that executes on the host processor, the trusted boot process including booting of the Type-1 TVMM and utilizing the HROT to verify the integrity of the Type-1 TVMM, the Type-1 TVMM capable of hosting a plurality of virtual machines and virtualizing the HROT independently for each such hosted virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A mobile trust module comprising:
-
a first standard connector for connecting the mobile trust module to a mobile endpoint device; a hardware based tamper-resistant module (hereafter, the hardware root of trust or HROT), the HROT comprising; secure non-volatile memory for storing integrity measurement data and data related to keys, a computational module, a key pair generation module, a random number generator; a trusted boot process that boots the mobile endpoint device into a known state, the trusted boot process utilizing the HROT to provide cryptographic resources and secure non-volatile memory to verify the integrity of the mobile endpoint device; an attestation process to attest to an integrity of the mobile endpoint device in response to an attestation challenge received by the mobile endpoint device, the attestation process utilizing the HROT to provide integrity measurements of the mobile endpoint device, said integrity measurements verifying an integrity of a state of the mobile endpoint device; a Type-1 trusted virtual machine monitor (hereafter, the Type-1 TVMM), the trusted boot process including booting of the Type-1 TVMM onto the mobile endpoint device and utilizing the HROT to verify an integrity of the Type-1 TVMM, the Type-1 TVMM capable of hosting a plurality of virtual machines and virtualizing the HROT independently for each such hosted virtual machine. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification