Method and system for protecting master secrets using smart key devices
First Claim
1. A data processing system comprising:
- a removable hardware device including;
means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair;
a first hardware interface for electrically engaging a system unit; and
means for authenticating a hardware security unit;
a system unit including;
a second hardware interface for electrically engaging the removable hardware device;
a hardware security unit including;
means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair;
means for authenticating the removable hardware device; and
means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated;
means for executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair;
means for performing a mutual authentication operation between the software security unit and the hardware security unit;
means for enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and
means for generating a digital certificate for the software security unit by the hardware security unit in response to a request from the software security unit while the removable hardware device remains electrically engaged with the system unit.
3 Assignments
0 Petitions
Accused Products
Abstract
A data processing system accepts a removable hardware device, which becomes electrically engaged with a system unit within the data processing system, after which the removable hardware device and the hardware security unit mutually authenticate themselves. The removable hardware device stores a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair that is associated with the hardware security unit, and the hardware security unit stores a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair that is associated with the removable hardware device. In response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, the system unit is enabled to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit.
76 Citations
41 Claims
-
1. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a hardware security unit including; means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; means for authenticating the removable hardware device; and means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; means for executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; means for performing a mutual authentication operation between the software security unit and the hardware security unit; means for enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and means for generating a digital certificate for the software security unit by the hardware security unit in response to a request from the software security unit while the removable hardware device remains electrically engaged with the system unit. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a hardware security unit including; means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; means for authenticating the removable hardware device; and means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; means for executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; means for performing a mutual authentication operation between the software security unit and the hardware security unit; means for enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and means for digitally signing a data item from the software security unit by the hardware security unit in response to a request from the software security unit while the removable hardware device remains electrically engaged with the system unit.
-
-
9. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a hardware security unit including; means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; means for authenticating the removable hardware device; and means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; means for executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; means for performing a mutual authentication operation between the software security unit and the hardware security unit; means for enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and means for performing a cryptographic function by the hardware security unit for the software security unit in response to a request from the software security unit after successfully performing a mutual authentication operation between the software security unit and the hardware security unit without requiring the removable hardware device to be electrically engaged with the system unit. - View Dependent Claims (10)
-
-
11. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a plurality of hardware security units, with each hardware security unit of the plurality of hardware security units including; (i) means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; (ii) means for authenticating the removable hardware device; and (iii) means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; wherein the data processing system further comprises; means for allowing the removable hardware device to mutually authenticate with each one of the plurality of hardware security units throughout the data processing system.
-
-
12. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a hardware security unit including; (i) means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; (ii) means for authenticating the removable hardware device; (iii) means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; (iv) means for embedding a digital certificate and a corresponding private key in a software module; (v) means for digitally signing the software module by the hardware security unit; and (vi) means for validating the digital signature of the software module using the hardware security unit to prevent copying and usage of the embedded corresponding private key by other software modules.
-
-
13. A data processing system comprising:
-
a removable hardware device including; means for storing a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair; a first hardware interface for electrically engaging a system unit; and means for authenticating a hardware security unit; a system unit including; a second hardware interface for electrically engaging the removable hardware device; a hardware security unit including; (i) means for storing a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; (ii) means for authenticating the removable hardware device; (iii) means for enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit after the removable hardware device and the hardware security unit have been mutually authenticated; (iv) means for embedding a digital certificate and a corresponding private key in a software module; (v) means for encrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key; and (vi) means for decrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key before executing the software module. - View Dependent Claims (14)
-
-
15. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit, enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; and in response to a request from the software security unit, generating a digital certificate for the software security unit by the hardware security unit while the removable hardware device remains electrically engaged with the system unit. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit, enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; and in response to a request from the software security unit, digitally signing a data item from the software security unit by the hardware security unit while the removable hardware device remains electrically engaged with the system unit.
-
-
23. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit, enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit; and performing a cryptographic function by the hardware security unit for the software security unit in response to a request from the software security unit after successfully performing a mutual authentication operation between the software security unit and the hardware security unit without requiring the removable hardware device to be electrically engaged with the system unit. - View Dependent Claims (24)
-
-
25. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit, wherein the enabling is performed by the hardware security unit; and allowing the removable hardware device to mutually authenticate with a plurality of hardware security units throughout the data processing system, wherein each of the hardware security units contains the private key of a first asymmetric cryptographic key pair and the public key of a second asymmetric cryptographic key pair, and wherein each of the hardware security units contains the private key of the second asymmetric cryptographic key pair and the public key of the first asymmetric cryptographic key pair.
-
-
26. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit, wherein the enabling is performed by the hardware security unit; embedding a digital certificate and a corresponding private key in a software module; digitally signing the software module by the hardware security unit; and validating the digital signature of the software module using the hardware security unit to prevent copying and usage of the embedded corresponding private key by other software modules.
-
-
27. A method for performing cryptographic functions, the method comprising:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit, enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit, wherein the enabling is performed by the hardware security unit; embedding a digital certificate and a corresponding private key in a software module; encrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key; and decrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key before executing the software module. - View Dependent Claims (28)
-
-
29. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and generating a digital certificate for the software security unit by the hardware security unit in response to a request from the software security unit while the removable hardware device remains electrically engaged with the system unit. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and digitally signing a data item from the software security unit by the hardware security unit in response to a request from the software security unit while the removable hardware device remains electrically engaged with the system unit.
-
-
36. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; executing a software security unit on the system unit, wherein the software security unit contains a private key of a third asymmetric cryptographic key pair and a public key of a fourth asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the fourth asymmetric cryptographic key pair and a public key of the third asymmetric cryptographic key pair; performing a mutual authentication operation between the software security unit and the hardware security unit; enabling the software security unit to invoke functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the software security unit and the hardware security unit; and performing a cryptographic function by the hardware security unit for the software security unit in response to a request from the software security unit after successfully performing a mutual authentication operation between the software security unit and the hardware security unit without requiring the removable hardware device to be electrically engaged with the system unit. - View Dependent Claims (37)
-
-
38. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling, by the hardware security unit, the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; and allowing the removable hardware device to mutually authenticate with a plurality of hardware security units throughout the data processing system, wherein each of the hardware security units contains the private key of a first asymmetric cryptographic key pair and the public key of a second asymmetric cryptographic key pair, and wherein each of the hardware security units contains the private key of the second asymmetric cryptographic key pair and the public key of the first asymmetric cryptographic key pair.
-
-
39. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling, by the hardware security unit, the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; embedding a digital certificate and a corresponding private key in a software module; digitally signing the software module by the hardware security unit; and validating the digital signature of the software module using the hardware security unit to prevent copying and usage of the embedded corresponding private key by other software modules.
-
-
40. A non-transitory computer-readable medium encoded with a computer program product, wherein the computer program product is operable by a data processing system for performing steps of:
-
electrically engaging a removable hardware device with a system unit, wherein the system unit includes a hardware security unit, wherein the removable hardware device contains a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair, and wherein the hardware security unit contains a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair; performing a mutual authentication operation between the removable hardware device and the hardware security unit; enabling, by the hardware security unit, the system unit to invoke cryptographic functions on the hardware security unit while the removable hardware device remains electrically engaged with the system unit in response to successfully performing the mutual authentication operation between the removable hardware device and the hardware security unit; embedding a digital certificate and a corresponding private key in a software module; encrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key; and decrypting by the hardware security unit the software module with the embedded digital certificate and corresponding private key before executing the software module. - View Dependent Claims (41)
-
Specification