Establishing entropy on a system
First Claim
Patent Images
1. A computer-implemented method for providing a secure random number code, comprising:
- receiving, at a computer system with a hardware random number generator, a request over a secure communications connection, the secure communications connection being established based at least in part on a first random code generated by a client transmitting the request, and the request being for a second random code; and
as a result of receiving the request;
generating the second random code using the hardware random number generator, the second random code being cryptographically-stronger than the first random code; and
providing, to the client, the generated second random code.
1 Assignment
0 Petitions
Accused Products
Abstract
Servers in datacenters, mobile devices and virtualized servers without human interaction may experience difficulties in establishing entropy in a virtualized computing environment. Entropy is an important foundation for cryptography and a lack of entropy has led to weaknesses that can be used to break cryptographic systems in the past.
8 Citations
19 Claims
-
1. A computer-implemented method for providing a secure random number code, comprising:
-
receiving, at a computer system with a hardware random number generator, a request over a secure communications connection, the secure communications connection being established based at least in part on a first random code generated by a client transmitting the request, and the request being for a second random code; and as a result of receiving the request; generating the second random code using the hardware random number generator, the second random code being cryptographically-stronger than the first random code; and providing, to the client, the generated second random code. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
at least one computing device configured to implement one or more services, wherein the one or more services; receive a request over a secure network connection, the secure network connection being established based at least in part on an initial code generated by a requestor, the request being for a first code; utilize a random number generator to generate the first code; and provide the generated first code via the secure network connection in response to the request. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to at least:
-
generate, at the computer system, a first random number code; provide the generated first random number code to a first random number generator at the computer system; initiate a cryptographic protocol for a first secure communications connection with another computer system using an output from the first random number generator; and utilize the secure communications connection to obtain a second random number code from a second random number generator, wherein the second random number generator has higher entropy than the first random number generator. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification