×

Protecting access to hardware devices through use of a secure processor

  • US 9,832,199 B2
  • Filed: 09/25/2015
  • Issued: 11/28/2017
  • Est. Priority Date: 09/25/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of protecting access to hardware devices through use of a secure processor, the method comprising:

  • receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network, wherein access to the hardware device is established by an application;

    in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor;

    transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer;

    receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device;

    in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device; and

    controlling, by the first secure processor, access to the hardware device by the requesting computer by requiring the requesting computer to provide an encrypted private key needed by the first secure processor to access an operating system that is required to execute the application that accesses the hardware device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×