Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms
First Claim
Patent Images
1. A computing system comprising:
- a trusted entity including a non-volatile memory including instructions which, when executable by a hardware processor, cause the computing system to;
manage a set of modes of operation of the trusted entity;
associate, for each mode of operation, a set of cryptographic protocols from a plurality of cryptographic protocols available to the trusted entity;
associate, for each cryptographic protocol, a set of associated parameters from a plurality of associated parameters;
receive a request from an application to enact an operation, the request including a desired mode, a first cryptographic protocol from the set of cryptographic protocols and a first set of associated parameters from the plurality of associated parameters;
determine whether the first cryptographic protocol and the first set of associated parameters match the desired mode based on a mode list table stored in a non-transitory storage of the trusted entity; and
responsive to determining that the first cryptographic protocol and the first set of associated parameters match the desired mode, perform the requested operation.
3 Assignments
0 Petitions
Accused Products
Abstract
Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms and associated parameters, the entity being programmed to record mode of operation information, which is characterized by the algorithms and associated parameters that are selected to perform an operation.
25 Citations
20 Claims
-
1. A computing system comprising:
-
a trusted entity including a non-volatile memory including instructions which, when executable by a hardware processor, cause the computing system to; manage a set of modes of operation of the trusted entity; associate, for each mode of operation, a set of cryptographic protocols from a plurality of cryptographic protocols available to the trusted entity; associate, for each cryptographic protocol, a set of associated parameters from a plurality of associated parameters; receive a request from an application to enact an operation, the request including a desired mode, a first cryptographic protocol from the set of cryptographic protocols and a first set of associated parameters from the plurality of associated parameters; determine whether the first cryptographic protocol and the first set of associated parameters match the desired mode based on a mode list table stored in a non-transitory storage of the trusted entity; and responsive to determining that the first cryptographic protocol and the first set of associated parameters match the desired mode, perform the requested operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A hardware trusted component including non-volatile memory executable by a hardware processor to:
-
manage a set of modes of operation of the trusted entity; associate, for each mode of operation, a set of cryptographic protocols from a plurality of cryptographic protocols available to the trusted entity; associate, for each cryptographic protocol, a set of associated parameters from a plurality of associated parameters; receive a request from an application to enact an operation, the request including a desired mode, a first cryptographic protocol from the set of cryptographic protocols and a first set of associated parameters from the plurality of associated parameters; determine whether the first cryptographic protocol and the first set of associated parameters match the desired mode based on a mode list table stored in a non-transitory storage of the trusted entity; and responsive to determining that the first cryptographic protocol and the first set of associated parameters match the desired mode, perform the requested operation. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer readable medium including machine readable instructions that when executed by a physical processor cause the processor to:
-
manage a set of modes of operation of the trusted entity; associate, for each mode of operation, a set of cryptographic protocols from a plurality of cryptographic protocols available to the trusted entity; associate, for each cryptographic protocol, a set of associated parameters from a plurality of associated parameters; receive a request from an application to enact an operation, the request including a desired mode, a first cryptographic protocol from the set of cryptographic protocols and a first set of associated parameters from the plurality of associated parameters; determine whether the first cryptographic protocol and the first set of associated parameters match the desired mode based on a mode list table stored in a non-transitory storage of the trusted entity; and responsive to determining that the first cryptographic protocol and the first set of associated parameters match the desired mode, perform the requested operation. - View Dependent Claims (15, 16, 17)
-
-
18. A method of operating a computing system comprising:
-
managing, using a trusted entity executable by a hardware processor, a set of modes of operation of the trusted entity; associating, using the trusted entity, for each mode of operation, a set of cryptographic protocols from a plurality of cryptographic protocols available to the trusted entity; associating, using the trusted entity, for each cryptographic protocol, a set of associated parameters from a plurality of associated parameters; receiving, using the trusted entity, a request from an application to enact an operation, the request including a desired mode, a first cryptographic protocol from the set of cryptographic protocols and a first set of associated parameters from the plurality of associated parameters; determining, using the trusted entity, whether the first cryptographic protocol and the first set of associated parameters match the desired mode based on a mode list table stored in a non-transitory storage of the trusted entity; and responsive to determining that the first cryptographic protocol and the first set of associated parameters match the desired mode, performing, using the trusted entity, the requested operation. - View Dependent Claims (19, 20)
-
Specification