Protecting access to hardware devices through use of a secure processor
First Claim
1. A computer-implemented method of protecting access to hardware devices through use of a secure processor, the method comprising:
- receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network, wherein access to the hardware device is established by an application;
in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor;
transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer;
receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device;
in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device; and
controlling, by the first secure processor, access to the hardware device by the requesting computer by requiring the requesting computer to provide an encrypted private key needed by the first secure processor to access an operating system that is required to execute the application that accesses the hardware device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method, system, and/or computer program product protects access to hardware devices through use of a secure processor. A security computer receives a request from a requesting computer for access to a hardware device on a network. A secure processor within the security computer encrypts the request to generate an encrypted request, which is generated within a core of the secure processor. The secure processor protects a secure application that is used to process the request from other software on the secure processor. The security computer transmits the encrypted request to the hardware device, and then receives an encrypted acknowledgement of the encrypted request from a processor associated with the hardware device. The security computer then creates a communication session between the requesting computer and the hardware device.
-
Citations
17 Claims
-
1. A computer-implemented method of protecting access to hardware devices through use of a secure processor, the method comprising:
-
receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network, wherein access to the hardware device is established by an application; in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor; transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer; receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device; in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device; and controlling, by the first secure processor, access to the hardware device by the requesting computer by requiring the requesting computer to provide an encrypted private key needed by the first secure processor to access an operating system that is required to execute the application that accesses the hardware device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for protecting access to hardware devices through use of a secure processor, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code readable and executable by one or more processors to perform a method comprising:
-
receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network, wherein access to the hardware device is established by an application; in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor; transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer; receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device; in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device; and controlling, by the first secure processor, access to the hardware device by the requesting computer by requiring the requesting computer to provide an encrypted private key needed by the first secure processor to access an operating system that is required to execute the application that accesses the hardware device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
a processor, a computer readable memory, and a computer readable storage medium; first program instructions to receive, by a security computer, a request from a requesting computer for access to a hardware device on a network, wherein access to the hardware device is established by an application; second program instructions to, in response to receiving the request, encrypt, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor; third program instructions to transmit, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer; fourth program instructions to receive, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device; fifth program instructions to, in response to receiving the encrypted acknowledgement, decrypt the encrypted acknowledgement and to create, by the security computer, a communication session between the requesting computer and the hardware device; and sixth program instructions to control, by the first secure processor, access to the hardware device by the requesting computer by requiring the requesting computer to provide an encrypted private key needed by the first secure processor to access an operating system that is required to execute the application that accesses the hardware device; and
whereinthe first, second, third, fourth, fifth, and sixth program instructions are stored on the non-transitory computer readable storage medium and executed by the processor via the computer readable memory. - View Dependent Claims (14, 15, 16, 17)
-
Specification