Method and apparatus for providing public key security control for a cryptographic processor
First Claim
1. In a cryptographic system having one of a plurality of security-relevant states, an interactive method of controlling the transition of said system from an existing state to a future state under control of one or more authorities, said method being performed by said cryptographic system and comprising the steps of:
- storing control information specifying permissible future states based on a current state and a requesting authority;
receiving a query from an authority as to the current state of the cryptographic system;
providing a reply to said authority in response to said query, said reply containing nonsecret state information regarding the current state of said cryptographic system and reply authentication information for enabling said authority to determine whether said reply originated from said cryptographic system;
receiving a request from an authority to change the current state of the cryptographic system, said request containing state change information indicating a proposed future state of said cryptographic system and request authentication information for enabling and cryptographic system to determine whether said request originated from said authority;
determining using said request authentication information whether said request originated from said authority; and
performing said request only if the request is determined to have originated from said authority and the proposed future state is a permissible future state as specified by said control information.
0 Assignments
0 Petitions
Accused Products
Abstract
Public key security control (PKSC) is provided for a cryptographic module by means of digitally signed communications between the module and one or more authorities with whom it interacts. Authorities interact with the crypto module by means of unsigned queries seeking nonsecret information or signed commands for performing specified operations. Each command signed by an authority also contains a transaction sequence number (TSN), which must match a corresponding number stored by the crypto module for the authority. The TSN for each authority is initially generated randomly and is incremented for each command accepted from that authority. A signature requirement array (SRA) controls the number of signatures required to validate each command type. Upon receiving a signed command from one or more authorities, the SRA is examined to determine whether a required number of authorities permitted to sign the command have signed the command for each signature requirement specification defined for that command type. A command requiring multiple signatures is held in a pending command register (PCR) while awaiting the required cosignatures. The crypto module also stores a single crypto module signature sequence number (CMSSN) which it increments for each reply to any authority to enable one authority to determine whether any other authority has communicated with the module.
15 Citations
19 Claims
-
1. In a cryptographic system having one of a plurality of security-relevant states, an interactive method of controlling the transition of said system from an existing state to a future state under control of one or more authorities, said method being performed by said cryptographic system and comprising the steps of:
-
storing control information specifying permissible future states based on a current state and a requesting authority;
receiving a query from an authority as to the current state of the cryptographic system;
providing a reply to said authority in response to said query, said reply containing nonsecret state information regarding the current state of said cryptographic system and reply authentication information for enabling said authority to determine whether said reply originated from said cryptographic system;
receiving a request from an authority to change the current state of the cryptographic system, said request containing state change information indicating a proposed future state of said cryptographic system and request authentication information for enabling and cryptographic system to determine whether said request originated from said authority;
determining using said request authentication information whether said request originated from said authority; and
performing said request only if the request is determined to have originated from said authority and the proposed future state is a permissible future state as specified by said control information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. In a cryptographic system having one of a plurality of security-relevant states, apparatus for interactively controlling the transition of said system from an existing state to a future state under control of one or more authorities, said apparatus being associated with said cryptographic system and comprising:
-
means for storing control information specifying permissible future states based on a current state and a requesting authority;
means for receiving a query from an authority as to the current state of the cryptographic system;
means for providing a reply to said authority in response to said query, said reply containing state information regarding the current state of said cryptographic system and reply authentication information for enabling said authority to determine whether said reply originated from said cryptographic system;
means for receiving a request from an authority to change the current state of the cryptographic system, said request containing state change information indicating a proposed future state of said cryptographic system and request authentication information for enabling said cryptographic system to determine whether said request originated from said authority;
means for determining using said request authentication information whether said request originated from said authority; and
means for performing said request only if the request is determined to have originated from said authority and the proposed future state is a permissible future state as specified by said control information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification