System and method for distributed security
First Claim
1. A client device configured to create a hierarchy of key servers, the client device comprising:
- a local host configured to transfer a first public key associated with a first key server, wherein the first public key is configured to expire after a predetermined period of time; and
a security module configured to;
determine that the first key server is authorized by comparing information stored in the security module with a hash value of the first public key,determine whether the first key server is permitted to authorize additional key servers, andsign a second public key of a second key server with the first public key to authorize the second key server in response to determining that the first key server is permitted to authorize additional key servers.
6 Assignments
0 Petitions
Accused Products
Abstract
A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption and decryption algorithms, authentication, and public key processing. The security module also includes separate key caches for key encryption keys and application keys. A security module can also interface a cryptographic accelerator through an application key cache. The security module can authorize a public key and an associated key server. That public key can subsequently be used to authorize additional key servers. Any of the authorized key servers can use their public keys to authorize the public keys of additional key servers. Secure authenticated communications can then transpire between the client and any of these key servers. Such a connection is created by a secure handshake process that takes place between the client and the key server. A time value can be sent from the key server to the client, allowing for secure revocation of keys. In addition, secure configuration messages can be sent to the security module.
-
Citations
20 Claims
-
1. A client device configured to create a hierarchy of key servers, the client device comprising:
-
a local host configured to transfer a first public key associated with a first key server, wherein the first public key is configured to expire after a predetermined period of time; and a security module configured to; determine that the first key server is authorized by comparing information stored in the security module with a hash value of the first public key, determine whether the first key server is permitted to authorize additional key servers, and sign a second public key of a second key server with the first public key to authorize the second key server in response to determining that the first key server is permitted to authorize additional key servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client device configured to establish an authenticated connection with a key server, the client device comprising:
-
a local host configured to transfer a first public key associated with the key server, wherein the first public key is configured to expire after a predetermined period of time; and a security module configured to; send a client random number to the key server, receive a server random number, a signed session key, and a certificate from the key server, determine whether the signed session key has been signed with a verified public key, and compare a hash of the first public key with information stored in the security module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A security module configured to create a hierarchy of key servers, the security module comprising:
-
a memory; and a controller configured to; determine that the first key server is authorized by comparing information stored in the memory with a hash value of a first public key associated with a first key server, wherein the first public key is configured to expire after a predetermined period of time, determine whether the first key server is permitted to authorize additional key servers, and sign a second public key of a second key server with the first public key to authorize the second key server in response to determining that the first key server is permitted to authorize additional key servers. - View Dependent Claims (18, 19, 20)
-
Specification