Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms
First Claim
Patent Images
1. A computing platform comprising:
- a trusted entity including,a non-transitory memory that stores mode of operation information, the mode of operation information comprising;
a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;
the cryptographic algorithm, parameters associated with the cryptographic algorithm; and
a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode; and
a hardware controller that;
receives a request including a desired operating mode, a desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm;
compares the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table;
determines, in response to the comparison, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and
responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implements cryptographic operations using the desired cryptographic algorithm.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms and associated parameters, the entity being programmed to record mode of operation information, which is characterized by the algorithms and associated parameters that are selected to perform an operation.
22 Citations
16 Claims
-
1. A computing platform comprising:
a trusted entity including, a non-transitory memory that stores mode of operation information, the mode of operation information comprising; a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;
the cryptographic algorithm, parameters associated with the cryptographic algorithm; and
a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode; anda hardware controller that; receives a request including a desired operating mode, a desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm; compares the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table; determines, in response to the comparison, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implements cryptographic operations using the desired cryptographic algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A hardware trusted component comprising:
-
a non-transitory memory that stores mode of operation information, comprising; a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;
the cryptographic algorithm, parameters associated with the cryptographic algorithm; and
a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode; anda hardware controller that; receives a request including a desired operating mode, the desired operating mode including a desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm; compares the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table; determines, in response to the comparison, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implements cryptographic operations using the desired cryptographic algorithm. - View Dependent Claims (10)
-
-
11. A non-transitory computer readable storage medium comprising instructions recorded thereon that, when executed by a processor, perform cryptographic operations and cause the processor to:
-
store in a memory, mode of operation information comprising; a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;
the cryptographic algorithm, parameters associated with the cryptographic algorithm; and
a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode;receive a request for a desired operating mode, the desired operating mode including a mode name, a cryptographic algorithm, and parameters associated with the desired cryptographic algorithm; compare the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table; determine, responsive to the comparison, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implements cryptographic operations using the desired cryptographic algorithm. - View Dependent Claims (12, 13)
-
-
14. A method of operating a computing platform incorporating a trusted entity, the method comprising:
-
storing in a memory, mode of operation information comprising; a mode list table that identifies a set of operating modes, a first operating mode of the set of operating modes comprising a mode name and characteristics of cryptographic algorithms, wherein the characteristics of each of the cryptographic algorithms comprise;
the cryptographic algorithm, parameters associated with the cryptographic algorithm; and
a name of the cryptographic algorithm, the name of the cryptographic algorithm including a statistically unique identifier based on the parameters associated with the cryptographic algorithm, wherein the mode name includes a second statistically unique identifier cryptographically derived from characteristics of the first operating mode;receiving, by a hardware controller, a request including a desired operating mode, a desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm; comparing the desired operating mode, the desired cryptographic algorithm, and the desired parameters associated with the desired cryptographic algorithm, with the algorithms and parameters associated with the names of the cryptographic algorithms in the mode list table; determining, responsive to the comparing, whether the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table; and responsive to a determination that the desired operating mode, desired cryptographic algorithm, and desired parameters associated with the desired cryptographic algorithm, are listed in the mode list table, implementing cryptographic operations using the desired cryptographic algorithm. - View Dependent Claims (15, 16)
-
Specification