×

Information processing apparatus with security module

  • US 7,802,112 B2
  • Filed: 12/28/2004
  • Issued: 09/21/2010
  • Est. Priority Date: 09/07/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. An information processing apparatus being adapted to communicate with a tamper-proof device, and comprising:

  • a TPM to store a first trusted platform module (TPM) key, the first TPM key having a first public key and a first private key associated with the first public key;

    a key management moduleto receive a parameter having the first public key from the TPM,to provide the received parameter to the tamper-proof device,to receive from the tamper-proof device a second TPM key, the second TPM key having a second private key which has been encrypted using the first public key included in the provided parameter, and having a second public key associated with the second private key, the second TPM key containing password check information generated by the tamper-proof device, andto provide the TPM with the second TPM key; and

    a file processing module receiving a file encryption key from the key management module, encrypting a file with the file encryption key, and decrypting the encrypted file with the file encryption key,the TPMto receive the second public key from the key management module,to generate a third TPM key, the third TPM key having a third private key which has been encrypted using the second public key, and a third public key associated with the third private key, andto encrypt the file encryption key with the third public key;

    whereinwhen the tamper-proof device is coupled to the information processing apparatus, the key management module receives the second TPM key from the tamper-proof device, stores the received second TPM key in a memory associated with the key management module, and provides the stored second TPM key to the TPM,when the TPM uses the second TPM key received from the key management module, the TPM requests the tamper-proof device to provide a password associated with the password check information contained in the second TPM key which is used by the TPM, receives the password from the tamper proof device, and verifies the received password using the password check information contained in the second TPM key which is used by the TPM;

    when it is verified that the password is correct, the TPM decrypts the second TPM key using the first private key, decrypts the third TPM key using the decrypted second private key, and decrypts, using the decrypted third private key, the encrypted file encryption key for decrypting the file; and

    the file processing module decrypts the file using the decrypted file encryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×