Creation and distribution of a secret value between two devices
First Claim
Patent Images
1. A method comprising:
- transmitting a first command from a second device being an input/output control hub (ICH) to a first device being a trusted platform module (TPM);
generating a long term value within the first device, the long term value generated upon detecting an initial power-up sequence and receipt of information from the second device;
permanently storing the long term value within a protected area of an internal memory of the first device;
providing the long term value to the second device communicatively coupled to the first device;
generating a short term value within the first device, the short term value is modified after each power cycle;
providing the short term value to the second device;
generating a secret value within the first device after each power cycle, the secret value being a combination of both the long term value and the short term value;
generating the secret value within the second device based on the long term value and the short term value; and
using the secret value to encrypt and decrypt data transmitted between the first device and the second device.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, one embodiment of the invention features a method comprising operations performed internally within a device. A first operation involves generating data for permanent storage in a protected area of internal memory of the device. This prevents subsequent modification of the data. A second operation involves producing a secret value being a combination of both the data and a short term value generated in response to a periodic event such as a power-up sequence of a platform employing the device.
204 Citations
4 Claims
-
1. A method comprising:
-
transmitting a first command from a second device being an input/output control hub (ICH) to a first device being a trusted platform module (TPM); generating a long term value within the first device, the long term value generated upon detecting an initial power-up sequence and receipt of information from the second device; permanently storing the long term value within a protected area of an internal memory of the first device; providing the long term value to the second device communicatively coupled to the first device; generating a short term value within the first device, the short term value is modified after each power cycle; providing the short term value to the second device; generating a secret value within the first device after each power cycle, the secret value being a combination of both the long term value and the short term value; generating the secret value within the second device based on the long term value and the short term value; and using the secret value to encrypt and decrypt data transmitted between the first device and the second device. - View Dependent Claims (2, 3, 4)
-
Specification