Method and apparatus for using a secret in a distributed computing system
DCFirst Claim
1. Computing system comprising:
- a token reader;
a trusted device which is physically and logically protected from unauthorized modification, the trusted device having therein a device memory, and a device interface adapted for communication with the token reader; and
a security token having therein a token processor and a token memory;
wherein validation information is stored in the device memory and a secret is stored in the token memory, and whereby on provision of validation information from the device memory to the token memory, and satisfactory completion of a validation process by the token processor, the security token is adapted to provide the secret to the device memory.
4 Assignments
Litigations
0 Petitions
Accused Products
Abstract
There are many times when a secret needs to be used in a distributed computing system—these are often held in security tokens, such as smart cards. It may be desirable for another device, such as a computer platform, to act in place of the security token as the repository of a secret, particularly for operations within a distributed computing system. Within the distributed computing system there is located a trusted entity, physically and logically resistant to unauthorized modification—this may be a trusted device located within a specific computing platform. This contains validation information which can be communicated to the security token. The security token then carries out a validation process on this validation information—if successful, the security token then provides a secret to the trusted device for use within the distributed computing system. The trusted device may be required to use this secret only for a specified period of time, or for a specific purpose or task.
92 Citations
48 Claims
-
1. Computing system comprising:
-
a token reader; a trusted device which is physically and logically protected from unauthorized modification, the trusted device having therein a device memory, and a device interface adapted for communication with the token reader; and a security token having therein a token processor and a token memory; wherein validation information is stored in the device memory and a secret is stored in the token memory, and whereby on provision of validation information from the device memory to the token memory, and satisfactory completion of a validation process by the token processor, the security token is adapted to provide the secret to the device memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of using in a distributed computing system a secret stored on a security token, the method comprising:
-
the security token obtaining validation information from a trusted entity within the distributed computing system, the trusted entity being logically and physically protected from unauthorized modification; the security token executing a validation process on the validation information, wherein if said validation process is successful; the security token provides the secret to the trusted entity for use within the distributed computing system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computing apparatus adapted for temporary use of a received secret, comprising:
-
a computing environment comprising a main processor and a main memory; a trusted entity physically and logically protected from unauthorized modification, the trusted device being adapted to determine an integrity metric of the computing environment; and a token reader in communication with the trusted entity; wherein the trusted entity is adapted to communicate with a security token through the token reader, to provide the integrity metric to the security token, to receive, upon satisfactory completion of a validation process by the security token, a secret from the security token, and to use the secret as prescribed by the security token. - View Dependent Claims (37, 38, 39)
-
-
40. Computing system comprising:
-
a first trusted entity which is physically and logically protected from unauthorized modification; a second trusted entity which is physically and logically protected from unauthorized modification; a communications channel between the first trusted entity and the second trusted entity; wherein validation information is held by the first trusted entity and a secret is held by the second trusted entity, and whereby on provision of validation information from the first trusted entity to the second trusted entity, and satisfactory completion of a validation process by the second trusted entity, the second trusted entity is adapted to provide the secret to the first trusted entity. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47)
-
-
48. A method of using a secret in a distributed computer system, the method comprising:
-
a first trusted entity within the distributed computing system providing validation information to a second trusted entity within the distributed computing system, each said trusted entity being logically and physically protected from unauthorized modification; the second trusted entity executing a validation process on the validation information, wherein if said validation process is successful; the second trusted entity provides the secret to the first trusted entity for use within the distributed computing system.
-
Specification