×

PROTECTING ACCESS TO HARDWARE DEVICES THROUGH USE OF A SECURE PROCESSOR

  • US 20170093853A1
  • Filed: 09/25/2015
  • Published: 03/30/2017
  • Est. Priority Date: 09/25/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of protecting access to hardware devices through use of a secure processor, the method comprising:

  • receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network;

    in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor;

    transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer;

    receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device; and

    in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×