×

Secure authentication token management

  • US 8,312,272 B1
  • Filed: 06/26/2009
  • Issued: 11/13/2012
  • Est. Priority Date: 06/26/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for securely managing an authentication token, the method comprising the steps of:

  • using hardware based security extensions, by a computer, to dynamically instantiate a first dynamic secure virtual machine and a second dynamic secure virtual machine in system memory of the computer;

    generating a public key and a corresponding private key, by the computer;

    using hardware-based security extensions, by the first dynamic secure virtual machine in the system memory of the computer, to seal the private key to the second dynamic secure virtual machine at a hardware level, wherein a security coprocessor only allows access to an address associated with a sealing process by the second dynamic secure virtual machine by setting at least one platform configuration register to a hash value of the second dynamic secure virtual machine;

    creating a request for an authentication token, by the computer, the created request comprising at least the public key;

    using hardware based security extensions to sign the created request, by the first dynamic secure virtual machine in the system memory of the computer;

    transmitting, by the computer, the signed request for an authentication token to a remote computer;

    responsive to transmitting the signed request for an authentication token to the remote computer, receiving, by the computer, an authentication token encrypted with the public key, from the remote computer;

    using hardware based security extensions to unseal the private key, by the second dynamic secure virtual machine in the system memory of the computer;

    using the unsealed private key to decrypt the received encrypted authentication token, by the second dynamic secure virtual machine in the system memory of the computer; and

    using hardware based security extensions to seal the authentication token to at least one additional dynamic secure virtual machine, by the second dynamic secure virtual machine in the system memory of the computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×