×

Manifest-based trusted agent management in a trusted operating system environment

  • US 7,257,707 B2
  • Filed: 08/18/2005
  • Issued: 08/14/2007
  • Est. Priority Date: 11/16/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. One or more computer storage media having stored thereon a plurality of instructions to implement a trusted core of a computing device that, when executed by one or more processors of the computing device, causes the one or more processors to:

  • receive, from a trusted application executing on the computing device, a request to retrieve a secret securely stored by a previous trusted application executing on the computing device;

    obtain a first manifest identifier from a first manifest corresponding to the trusted application;

    obtain a second manifest identifier identifying a second manifest corresponding to the previous trusted application, wherein the second manifest identifier is stored with the secret;

    compare the first manifest identifier of the trusted application to the second manifest identifier corresponding to the previous trusted application; and

    reveal the secret to the trusted application if the first manifest identifier and the second manifest identifier are the same, if the first manifest identifier and the second manifest identifier are not the same then reveal the secret to the trusted application if an export certificate corresponding to the previous trusted application identifies the first manifest having the first manifest identifier as being authorized to retrieve the secret, and otherwise not reveal the secret to the trusted application;

    wherein the export certificate includes;

    an identification of the first manifest;

    an identification of the second manifest, wherein the second manifest was digitally signed using a first private key of a first public-private key pair of a party that generated the second manifest; and

    a digital signature over the identification of the first manifest and the identification of the second manifest, wherein the digital signature is generated using the first private key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×