CN1303553A - 配置与登记密码设备的电路和方法 - Google Patents

配置与登记密码设备的电路和方法 Download PDF

Info

Publication number
CN1303553A
CN1303553A CN98811411A CN98811411A CN1303553A CN 1303553 A CN1303553 A CN 1303553A CN 98811411 A CN98811411 A CN 98811411A CN 98811411 A CN98811411 A CN 98811411A CN 1303553 A CN1303553 A CN 1303553A
Authority
CN
China
Prior art keywords
encryption device
key
volatile memory
private key
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN98811411A
Other languages
English (en)
Other versions
CN1254040C (zh
Inventor
D·L·达维斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of CN1303553A publication Critical patent/CN1303553A/zh
Application granted granted Critical
Publication of CN1254040C publication Critical patent/CN1254040C/zh
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Abstract

一种用于配置和登记密码设备(150)的系统和方法,配置状态包含将设备编号(DSER)和对称钥匙(SK)加载到密码设备(150)的非挥发性存贮器(215)中。非挥发性存贮器(215)被集成在密码设备(150)的处理逻辑内。DSER由外部源提供而SK在密码设备(150)内生成,登记状态包含提供DSER给数据库(415,420),其中包含与每台所制造的密码设备(150)有关的密码信息。密码信息包括至少一个公共钥匙和一个用SK加密的私人钥匙。DSER用于安置相应的密码信息,以便将密码信息发送到具有密码设备(150)的一个电子系统。

Description

配置与登记密码设备的电路和方法
发明背景
1.发明领域
本发明涉及密码领域。更具体而言,本发明涉及用于配置与登记密码设备的电路和方法。
2.与本发明有关的现有技术的描述
当前,许多个人正在利用个人计算机用数字格式存贮和发送敏感信息(例如,机密的、专有的,等),例如,信用卡帐户信息有时可在互联网上被传送供购物和/或服务。同样,利用在线银行传送银行帐号和银行帐户馀额。由于这种信息的敏感性质,已经采取措施在计算机的物理边界外部保护该信息的“完整性”;也就是,保证没有授权的情况下不变更信息。然而,这样的措施不能保护计算机内的信息。
正如在转让给Intel公司,本发明的受让人的美国专利NO.5,539,828中所描述的那样,可通过利用保密硬件来保护计算机内的信息。该保密硬件包括一个集成电路(IC)包,含有处理逻辑和专用的,在IC包中的非挥发性(NV)存贮器(称为“设备NV存贮器”)。典型情况下,该密码硬件在制造设备上经受一种穷举的配置阶段,其中设备NV存贮器被配置成包含为密码设备的安全功能必要的唯一的密码信息,例如,公共/私人钥匙对和数字证书。
当密码技术更加先进时,这种类型的结构将会觉得有些不足。一个缺点是需要较大,较贵的包,因为为了存贮较大数量的密码信息需要较大数量的设备NV存贮器。因此,支持位于系统其它地方,在此称为“系统NV存贮器的NV存贮器,大大减少位于密码设备中的NV存贮器数量是有成本效率的。系统NV存贮器的例子包括硬盘,位于母板或子卡上的NV存贮器,等。
当前,不可能使用系统NV存贮器。原因是为保证用对某个密码硬件唯一的密码信息配置与编程的系统NV存贮器将在具有密码硬件的电子系统内实现,一种可靠的,有成本效率的技术还未开发出来。
发明概述
一种用于配置和/或登记密码设备的方法,关于配置设计的一种实施方案,设备编号被装入该密码设备的非挥发性存贮器。该密码设备的内部,生成一种钥匙并被加载到密码设备的非挥发性存贮器中。
附图简述
通过以下的本发明详述将使本发明的特征与优点变得更明显,其中:
图1是用作说明的一个电子系统的方框图,包括作为一个桥路部件应用的多片模块;
图2是最适合作为图1的桥路部件示出的多片模块最佳实施方案的方框图;
图3是用作说明的一个包括密码设备的图1中的处理子系统实施方案;
图4是用作说明的一种图3基板的实施方案;
图5是由图2的密码设备执行的配置方案流程图;
图6是由图2的密码设备执行的登记方案流程图。
最佳实施方案描述
本发明涉及用于利用非常驻,非挥发性(NV)存贮器配置密码设备和从远处登记密码设备的系统与技术,在以下的描述中,某些术语通常被用来描述本发明的某些特性。例如,“电子系统”通常被定义为具有信息处理功能的任何硬件产品,例如,计算机,传真机和打印机。“信息”通常被定义为一位或多位数据,地址,和/或控制信息。
另外,以下的术语被用于识别不同类型的密码信息。“钥匙”是一种由常规的密码功能使用的编码和/或解码参数,例如对称钥匙密码功能(例如,基于数据密码标准“DES”的功能)或公共钥匙密码功能(例如,基于Rivest,Shamir和Adleman(RSA)的功能)。“数字证书”通常被定义为用于用户证明的任何信息(例如,公共钥匙)。用证明授权的私人钥匙(PRKCA)对信息编码,授权者也就是任何个人或者处于信托地位担保或保证数字证明的任何实体,例如银行,政府部门,贸易社团,原始设备制造商,等。
参考图1,示出一个用作说明的应用本发明的电子系统100的实施方案。在此实施方案中,电子系统100包括将许多子系统互连的片组110。这些子系统的例子可以包括,但并不限于,处理子系统120,存贮器子系统130,输入/输出(I/O)子系统140。这些子系统120,130和140合起来控制电子子系统100的功能。
更具体而言,作为一个用作说明的实施方案,处理子系统120包括至少一个中央处理单元(CPU)121。CPU121通过主总线122连到片组110。存贮器子系统130通常包括一个或多个挥发性存贮器组(未示出),例如任何类型的动态随机存取存贮器(DRAM),和/或静态随机存取存贮器(SRAM)。然而,打算,系统NV存贮器可被用于存贮器子系统130替代或补充挥发性存贮器。
而且,I/O子系统140包括“n”个连到I/O总线142的外围设备1411-141n(n是一个正整数),外围设备的例子包括大容量存贮设备1411(例如,硬盘驱动器,数字带驱动器,软盘驱动器,和数字多用途盘“DVD”播放器)。
为了提供保密功能,保密设备150可通过专用总线160连到片组110。当然,作为一种替代的系统实施方案,密码设备150可被放置为与计算机100中任何总线通信,例如主总线121或另一个基于处理器的总线,如后部总线(未示出),或也许是I/O总线142。
参考图2,示出一种用作说明的图1中的密码设备150的实施方案,密码设备150包括一个集成电路(IC)设备200,包含在一个保护IC设备200免受危险和有害污染的封套205内。IC设备200包括与少量设备NV存贮器215集成在一起的处理单元210,作为选项,随机数发生器220可被制作在封套205内作为一个分离设备通过内部总线225(如图所示)连到处理单元210或者集成在处理单元210内。当密码设备150在配置模式中工作时,随机数发生器220被用于产生一个或多个钥匙。
虽然示于图2中的密码设备150的实施方案可作为一个协处理器来实现,然而可以选择各种各样的不同实施方案。例如,密码设备150可被实现在一个盘控制器内,在一个“智能”卡上(部分像信用卡形状但具有微控制器的形式),或者在包括CPU121的盒式处理器封套内,如以下图3-4中所示。其它的替代实施方案可以包括将密码设备的功能并入片组或CPU121内。
参考图3,示出将密码设备150实现在处理子系统120内的一种替代的系统实施方案的透视图。IC部件(包括密码设备150)被安放在由任何类型的材料组成的处理器基板300上,IC部件(未示出)可通过熟知的技术(例如焊接,等)贴附在上面。处理器基板300大部分由一个矩形封套310盖住,以便保护IC部件免受危险或有害污染,处理器基板300包括连接器320,最好适合于例如,建立与母板的机械和电气连接。正如所示,连接器320可以包括一个标准的公的边缘连接器(如图所示)或也许是一个母的边缘连接器。
如图4中所示,处理器基板300中的IC部件包括,但并不限于,CPU121,存贮器330和密码器150。为了与CPU121通信,密码设备150可以放在(ⅰ)后部总线上,通常与存贮器330相连,(ⅱ)前部总线上,通常与外部连接器320相连,或者(ⅲ)专用内部总线上。当然,只要执行时间和其它必不可少的条件被保持,这种密码设备150的安放是随意的。虽然未示出,分立元件(例如,电容,振荡器,电阻,电感,等)以一种有选择的方式贴附在处理器基板300上,特别是要最大限度地提高路由能力并减少这些IC部件之间的通信线路的长度。
现在参考图5,示出一种由密码设备使用的配置方案的最佳实施方案。在制造时,密码设备经受一种配置状态,以便仅将有限数量的密码信息加载到它的集成化的设备NV存贮器中,对于这种配置状态的一种实施方案包括使用一种证明系统,包括(ⅰ)具有一种尺寸容纳下密码设备的设备载体的编程机构,和(ⅱ)从编程机构接收密码信息的数据库(例如,服务器,个人计算机,主帧,等)。为了避免使本发明含糊不清,将只描述编程机构的功能操作。
当接通时,编程机构开始供电并通过设备载体将预定的控制信息提供给密码设备的相应引线。这种控制信息将密码设备放入配置模式(步骤400)。在放入配置模式以后,密码设备开始从编程机构接收唯一的设备串号(DSER)(步骤405)。通常利用足够数量的位以避免重复(例如,32或64位),DSER被存贮在密码设备的集成化设备NV存贮器中并提供给数据库(步骤410)。DSER被数据库用作指针表的索引。每个指针负责对存贮器中一个或多个位置寻址,包含与由它的DSER识别的密码设备唯一有关的密码信息。
此外,通过对密码设备供电,随机数发生器被供电,产生随机数用于生成唯一的对称钥匙(SK)和公共/私人钥匙对(步骤415)。公共钥匙(PUK)被输出到数据库未经受任何修改(步骤420)。然而,私人钥匙(PRK)被利用密码算法加密(例如,预加载在密码设备的存贮器中的DES),然后,输出到数据库(步骤425)。更具体而言,PRK在输出到数据库以前用SK加密(产生ESK(PRK))。结果,密码设备包含最少数量的密码信息,也就是SK和DSER,而数据库中被检索的位置包括大多数的密码信息。
有时,如虚线所示,可以设想,与PUK和DSER有关的数字证书可在稍后的时间里装入数据库,甚至在密码设备已被送到原始设备制造商(OEM)以供放入电子系统(步骤430)以后。数字证书包括至少用在本实施方案中的制造商的私人钥匙加密的PUK,可用作密码设备的后续授权。然而,可以设想,DSER可被包括在数字证书中。
在密码设备已经装入具有足够系统NV存贮器的电子系统以后,可为登记的目的建立到制造商数据库的通信。这种登记方案不需要安全的通信信道,因为PRK已被加密。可由任何下游用户执行登记,包括装运电子系统到最终用户以前的OEM,或者最终用户,对于后一种情况,电子系统可用具有登记子程序的系统软件来加载。在由系统软件对电子系统初始化期间,登记子程序可帮助建立与数据库的通信,以便恢复和下载对电子系统唯一的密码信息。这种登记方案对于最终用户可以是透明的或者在与某些项目和条件的符合方面要求最终用户有效参与(例如,解除制造商的责任,等)。
现在参考图6,示出一种在制造商的数据库与下游用户(OEM,最终用户,等)之间登记方案的实施方案。首先,在数据库与用密码设备实现的电子系统之间必须建立通信信道(步骤600)。这可以通过专用电话线路在互联网或者在任何其它的通信链路上实现。接着,电子系统将包括从它的密码设备得到的DSER的消息在通信信道上发送到数据库(步骤605)。数据库接收此消息并利用DSER作为索引,搜索与由DSER识别的密码设备有关的密码信息(步骤610)。这种密码信息(PUK,ESX(PRK),和数字证书)被在通信信道上发送到电子系统并加载到电子系统的系统NV存贮器中(步骤615-620)。因此,现在密码设备完全有功能去支持公共钥匙加密,因为它具有对它的PUK和PRK的入口,ESK(PRK)可利用已经在它的设备NV存贮器中集成的SK来解密。
虽然已描述了某些示范性实施方案并示于附图中,但应该理解,这样的一些实施方案仅仅是用作说明而并不是对本发明的限制,本发明并不限于所示的和所描述的具体结构和安排,因为对于本领域的技术人员来说,可能有各种各样的其它的修改方案。

Claims (23)

1.一种用于配置密码设备的方法包括以下步骤:
将设备串号加载到密码设备的非挥发性存贮器中;
在密码设备内生成对称钥匙;和
将对称钥匙加载到密码设备的非挥发性存贮器中。
2.如权利要求1的方法还包括以下步骤:
在设备串号和对称钥匙已被加载以后,在密码设备的非挥发性存贮器内停止任何进一步的信息加载。
3.如权利要求1的方法还包括以下步骤:
将设备串号从密码设备加载到位于远处的数据库中。
4.如权利要求3的方法还包括以下步骤:
在密码设备内生成至少一个公共钥匙和一个私人钥匙;
发送公共钥匙到数据库;
用此钥匙将私人钥匙加密,产生加密的私人钥匙;和
发送加密的私人钥匙到数据库。
5.如权利要求4的方法还包括以下步骤:
提供公共钥匙给证明授权者;和
用证明授权者的私人钥匙将公共钥匙加密产生数字证书;和
将数字证书发送到数据库伴随公共钥匙和加密的私人钥匙。
6.如权利要求1的方法,其中设备编号是唯一的并与其它密码设备的设备串号不同。
7.如权利要求1的方法,其中钥匙是对称钥匙。
8.如权利要求7的方法,其中对称钥匙是唯一的并与其它密码设备有关的其它对称钥匙不同。
9.如权利要求1的方法,其中非挥发性存贮器被集成在密码设备的处理逻辑内。
10.一种用于登记密码设备的方法包括以下步骤:
在数据库和用密码设备实现的电子系统之间建立通信信道,密码设备包括存贮钥匙和设备串号的非挥发存贮器;
将消息发送到数据库,消息包括包含在密码设备中的设备串号;和
接收公共钥匙和用与密码设备有关的钥匙加密的私人钥匙。
11.如权利要求10的方法还包括以下步骤:
将公共钥匙和用此钥匙加密的私人钥匙加载到电子系统的非挥发性存贮器部件中。
12.如权利要求10的方法,其中通信信道不是安全的。
13.如权利要求10的方法,其中钥匙是对称钥匙。
14.如权利要求10的方法,其中在接收步骤以前,本方法还包括以下步骤。
数据库接收包括设备串号的消息;
利用设备串号作为查看索引;和
发送公共钥匙和用此钥匙加密的私人钥匙到电子系统。
15.如权利要求10的方法还包括以下步骤:
接收成为用证明授权者的私人钥匙加密的公共钥匙的数字证书。
16.一种系统包括:
一个片组;
一个连到片组的非挥发性存贮器;和
一个连到片组的密码设备,密码设备包括具有少量设备非挥发性存贮器的处理逻辑,非挥发性存贮器包含设备串号和对称钥匙。
17.如权利要求16的系统,其中非挥发性存贮器包括至少一个与密码设备有关的公共钥匙和用对称钥匙加密的私人钥匙。
18.如权利要求16的系统,其中本系统能建立与数据库的通信,以便将公共钥匙和加密的私人钥匙加载到非挥发性存贮器中。
19.一种处理子系统包括:
一个基板;
一个连到基板的处理器;
一个连到基板的密码设备;和
一个将处理器和密码设备互连的总线。
20.如权利要求19的处理子系统,其中密码设备包括:
一个处理单元;
一个集成在处理单元中的非挥发性存贮器,非挥发性存贮器包括一个钥匙和设备串号;和
一个随机数发生器。
21.如权利要求19的处理子系统,其中密码设备的随机数发生器被集成在处理单元内。
22.如权利要求19的处理子系统,其中总线是后部总线。
23.如权利要求19的处理子系统还包括一个塑料盒,通常装入基板而连接器位于基板的边缘。
CNB988114119A 1997-09-30 1998-06-24 配置与登记密码设备的电路和方法 Expired - Fee Related CN1254040C (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/938,491 US5970147A (en) 1997-09-30 1997-09-30 System and method for configuring and registering a cryptographic device
US08/938491 1997-09-30
US08/938,491 1997-09-30

Publications (2)

Publication Number Publication Date
CN1303553A true CN1303553A (zh) 2001-07-11
CN1254040C CN1254040C (zh) 2006-04-26

Family

ID=25471518

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB988114119A Expired - Fee Related CN1254040C (zh) 1997-09-30 1998-06-24 配置与登记密码设备的电路和方法

Country Status (11)

Country Link
US (1) US5970147A (zh)
EP (1) EP1021886B1 (zh)
KR (1) KR100358596B1 (zh)
CN (1) CN1254040C (zh)
AU (1) AU8567598A (zh)
BR (1) BR9814793A (zh)
DE (1) DE69831586T2 (zh)
HK (1) HK1028505A1 (zh)
MY (1) MY133547A (zh)
TW (1) TW436747B (zh)
WO (1) WO1999017495A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496337B (zh) * 2005-04-13 2013-03-13 微软公司 硬盘驱动器认证

Families Citing this family (153)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542610B2 (en) 1997-01-30 2003-04-01 Intel Corporation Content protection for digital transmission systems
US6314521B1 (en) 1997-11-26 2001-11-06 International Business Machines Corporation Secure configuration of a digital certificate for a printer or other network device
US6148279A (en) * 1997-12-04 2000-11-14 Cypress Semiconductor Corporation Apparatus for recording and/or reading program history
US6513117B2 (en) * 1998-03-04 2003-01-28 Gemstar Development Corporation Certificate handling for digital rights management system
US6639577B2 (en) 1998-03-04 2003-10-28 Gemstar-Tv Guide International, Inc. Portable information display device with ergonomic bezel
US7055034B1 (en) * 1998-09-25 2006-05-30 Digimarc Corporation Method and apparatus for robust embedded data
EP1121779A4 (en) * 1998-10-07 2004-09-15 Nuvomedia Inc MANIPULATION OF CERTIFICATES FOR A DIGITAL RIGHTS MANAGEMENT SYSTEM
WO2000025466A1 (en) * 1998-10-23 2000-05-04 L-3 Communications Corporation Apparatus and methods for managing key material in heterogeneous cryptographic assets
US6820202B1 (en) 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US7047416B2 (en) * 1998-11-09 2006-05-16 First Data Corporation Account-based digital signature (ABDS) system
US6389537B1 (en) 1999-04-23 2002-05-14 Intel Corporation Platform and method for assuring integrity of trusted agent communications
US6549935B1 (en) * 1999-05-25 2003-04-15 Silverbrook Research Pty Ltd Method of distributing documents having common components to a plurality of destinations
WO2001031841A1 (en) 1999-10-27 2001-05-03 Visa International Service Association Method and apparatus for leveraging an existing cryptographic infrastructure
DE10008974B4 (de) * 2000-02-25 2005-12-29 Bayerische Motoren Werke Ag Signaturverfahren
US7073071B1 (en) 2000-03-31 2006-07-04 Intel Corporation Platform and method for generating and utilizing a protected audit log
US6760441B1 (en) 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US7356817B1 (en) 2000-03-31 2008-04-08 Intel Corporation Real-time scheduling of virtual machines
US6957332B1 (en) 2000-03-31 2005-10-18 Intel Corporation Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US7194634B2 (en) * 2000-03-31 2007-03-20 Intel Corporation Attestation key memory device and bus
US6990579B1 (en) 2000-03-31 2006-01-24 Intel Corporation Platform and method for remote attestation of a platform
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US6754815B1 (en) 2000-03-31 2004-06-22 Intel Corporation Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
US6769058B1 (en) 2000-03-31 2004-07-27 Intel Corporation Resetting a processor in an isolated execution environment
US7013481B1 (en) * 2000-03-31 2006-03-14 Intel Corporation Attestation key memory device and bus
US6996710B1 (en) 2000-03-31 2006-02-07 Intel Corporation Platform and method for issuing and certifying a hardware-protected attestation key
US7082615B1 (en) 2000-03-31 2006-07-25 Intel Corporation Protecting software environment in isolated execution
US6473706B1 (en) 2000-07-06 2002-10-29 International Business Machines Corporation Self-configuring and self-calibrating automated system
US7082533B2 (en) * 2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system
US6978369B2 (en) * 2000-08-04 2005-12-20 First Data Corporation Person-centric account-based digital signature system
EP1316171A4 (en) * 2000-08-04 2006-05-03 First Data Corp PERSONNEL AND CONTOUR DIGITAL SIGNATURE SYSTEM
US6789189B2 (en) * 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
US7096354B2 (en) * 2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system
US7010691B2 (en) * 2000-08-04 2006-03-07 First Data Corporation ABDS system utilizing security information in authenticating entity access
US6983368B2 (en) * 2000-08-04 2006-01-03 First Data Corporation Linking public key of device to information during manufacture
US7558965B2 (en) 2000-08-04 2009-07-07 First Data Corporation Entity authentication in electronic communications by providing verification status of device
US6434682B1 (en) 2000-09-28 2002-08-13 International Business Machines Corporation Data management system with shortcut migration via efficient automatic reconnection to previously migrated copy
US6604160B1 (en) 2000-09-28 2003-08-05 International Business Machines Corporation Computing system arbitrating and selectively providing resource-seeking tasks with takeaway of non-shareable resources
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7389427B1 (en) 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US6446160B1 (en) 2000-09-28 2002-09-03 International Business Machines Corporation Multi-drive data storage system with analysis and selected demounting of idle data storage media
US6907600B2 (en) 2000-12-27 2005-06-14 Intel Corporation Virtual translation lookaside buffer
US6948065B2 (en) 2000-12-27 2005-09-20 Intel Corporation Platform and method for securely transmitting an authorization secret
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US7225441B2 (en) 2000-12-27 2007-05-29 Intel Corporation Mechanism for providing power management through virtualization
US7272831B2 (en) 2001-03-30 2007-09-18 Intel Corporation Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US7096497B2 (en) 2001-03-30 2006-08-22 Intel Corporation File checking using remote signing authority via a network
US7603703B2 (en) * 2001-04-12 2009-10-13 International Business Machines Corporation Method and system for controlled distribution of application code and content data within a computer network
US20030005317A1 (en) * 2001-06-28 2003-01-02 Audebert Yves Louis Gabriel Method and system for generating and verifying a key protection certificate
US20040128508A1 (en) * 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
JP4969745B2 (ja) * 2001-09-17 2012-07-04 株式会社東芝 公開鍵基盤システム
US7024555B2 (en) 2001-11-01 2006-04-04 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
KR100445406B1 (ko) * 2001-11-30 2004-08-25 주식회사 하이닉스반도체 데이터 암호화 장치 및 그 방법
US7305556B2 (en) * 2001-12-05 2007-12-04 Canon Kabushiki Kaisha Secure printing with authenticated printer key
US20030115467A1 (en) * 2001-12-19 2003-06-19 Aull Kenneth W. Public key infrastructure token issuance and binding
US7475250B2 (en) * 2001-12-19 2009-01-06 Northrop Grumman Corporation Assignment of user certificates/private keys in token enabled public key infrastructure system
US20030126454A1 (en) * 2001-12-28 2003-07-03 Glew Andrew F. Authenticated code method and apparatus
US7308576B2 (en) 2001-12-31 2007-12-11 Intel Corporation Authenticated code module
US7124273B2 (en) * 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US7631196B2 (en) 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US20030191943A1 (en) * 2002-04-05 2003-10-09 Poisner David I. Methods and arrangements to register code
US7076669B2 (en) * 2002-04-15 2006-07-11 Intel Corporation Method and apparatus for communicating securely with a token
US7058807B2 (en) * 2002-04-15 2006-06-06 Intel Corporation Validation of inclusion of a platform within a data center
US7139890B2 (en) 2002-04-30 2006-11-21 Intel Corporation Methods and arrangements to interface memory
US6820177B2 (en) 2002-06-12 2004-11-16 Intel Corporation Protected configuration space in a protected environment
US7392415B2 (en) * 2002-06-26 2008-06-24 Intel Corporation Sleep protection
DE60204776T2 (de) * 2002-08-30 2006-05-24 Siemens Ag Verfahren und Vorrichtung für sicheren Zugriff auf Daten oder Funktionalität eines Gerätes
US20040101141A1 (en) 2002-11-27 2004-05-27 Jukka Alve System and method for securely installing a cryptographic system on a secure device
US7318235B2 (en) 2002-12-16 2008-01-08 Intel Corporation Attestation using both fixed token and portable token
US7900017B2 (en) 2002-12-27 2011-03-01 Intel Corporation Mechanism for remapping post virtual machine memory pages
US20040128465A1 (en) * 2002-12-30 2004-07-01 Lee Micheil J. Configurable memory bus width
US7076802B2 (en) * 2002-12-31 2006-07-11 Intel Corporation Trusted system clock
US7415708B2 (en) 2003-06-26 2008-08-19 Intel Corporation Virtual machine management using processor state information
US7287197B2 (en) * 2003-09-15 2007-10-23 Intel Corporation Vectoring an interrupt or exception upon resuming operation of a virtual machine
US7739521B2 (en) 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US7519274B2 (en) 2003-12-08 2009-04-14 Divx, Inc. File format for multiple track digital data
US8472792B2 (en) 2003-12-08 2013-06-25 Divx, Llc Multimedia distribution system
US9331990B2 (en) * 2003-12-22 2016-05-03 Assa Abloy Ab Trusted and unsupervised digital certificate generation using a security token
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
EP1564908A1 (en) * 2003-12-23 2005-08-17 Telefonaktiebolaget LM Ericsson (publ) Advanced multi-sensor processing
US20050166051A1 (en) * 2004-01-26 2005-07-28 Mark Buer System and method for certification of a secure platform
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US7620949B2 (en) 2004-03-31 2009-11-17 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
JP4434886B2 (ja) * 2004-08-31 2010-03-17 キヤノン株式会社 印刷処理を管理するサーバ及びその制御方法並びにコンピュータプログラム
US7818574B2 (en) * 2004-09-10 2010-10-19 International Business Machines Corporation System and method for providing dynamically authorized access to functionality present on an integrated circuit chip
US7840962B2 (en) 2004-09-30 2010-11-23 Intel Corporation System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en) 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US8924728B2 (en) 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US20060156013A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature software using ephemeral private key and system
US7593527B2 (en) * 2005-01-07 2009-09-22 First Data Corporation Providing digital signature and public key based on shared knowledge
US7490239B2 (en) * 2005-01-07 2009-02-10 First Data Corporation Facilitating digital signature based on ephemeral private key
US7693277B2 (en) * 2005-01-07 2010-04-06 First Data Corporation Generating digital signatures using ephemeral cryptographic key
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060153367A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature system based on shared knowledge
US20060153370A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating public-private key pair based on user input data
US7869593B2 (en) * 2005-01-07 2011-01-11 First Data Corporation Software for providing based on shared knowledge public keys having same private key
US7936869B2 (en) * 2005-01-07 2011-05-03 First Data Corporation Verifying digital signature based on shared knowledge
US20060153364A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge
US7395405B2 (en) 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
US8316416B2 (en) 2005-04-04 2012-11-20 Research In Motion Limited Securely using a display to exchange information
DE102005018676B4 (de) * 2005-04-21 2008-09-25 Wincor Nixdorf International Gmbh Verfahren zur Schlüsselverwaltung für Kryptographiemodule
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
US7450946B2 (en) 2005-10-03 2008-11-11 Kabushiki Kaisha Toshiba System and method for automatic wireless detection and identification of document processing service location
GB2431252B (en) 2005-10-11 2010-06-09 Hewlett Packard Development Co Data transfer device
GB2431254A (en) 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer system
GB2431249A (en) 2005-10-11 2007-04-18 Hewlett Packard Development Co Removable data storage item and key distribution
GB2431251A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer device
GB2431250A (en) 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer system
US7606769B2 (en) 2005-10-12 2009-10-20 Kabushiki Kaisha Toshiba System and method for embedding user authentication information in encrypted data
US8701091B1 (en) 2005-12-15 2014-04-15 Nvidia Corporation Method and system for providing a generic console interface for a graphics application
GB2435333B (en) 2006-02-01 2010-07-14 Hewlett Packard Development Co Data transfer device
DE102006006489A1 (de) * 2006-02-10 2007-08-16 Bundesdruckerei Gmbh Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte
US8452981B1 (en) * 2006-03-01 2013-05-28 Nvidia Corporation Method for author verification and software authorization
JP5200204B2 (ja) 2006-03-14 2013-06-05 ディブエックス リミテッド ライアビリティー カンパニー 高信頼性システムを含む連合型デジタル権限管理機構
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US8615663B2 (en) 2006-04-17 2013-12-24 Broadcom Corporation System and method for secure remote biometric authentication
US8670566B2 (en) * 2006-05-12 2014-03-11 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral output device
US10073743B2 (en) 2006-07-26 2018-09-11 Hewlett Packard Enterprise Development Lp Data storage arrangement and key distribution
US8607151B2 (en) * 2006-08-01 2013-12-10 Nvidia Corporation Method and system for debugging a graphics pipeline subunit
US8963932B1 (en) 2006-08-01 2015-02-24 Nvidia Corporation Method and apparatus for visualizing component workloads in a unified shader GPU architecture
US8436870B1 (en) 2006-08-01 2013-05-07 Nvidia Corporation User interface and method for graphical processing analysis
US8436864B2 (en) * 2006-08-01 2013-05-07 Nvidia Corporation Method and user interface for enhanced graphical operation organization
GB0625052D0 (en) * 2006-12-15 2007-01-24 Hewlett Packard Development Co Evidence of manufacturing processes
US8625793B2 (en) 2007-06-11 2014-01-07 Qualcomm Incorporated Resynchronization for push message security using secret keys
WO2009065137A1 (en) 2007-11-16 2009-05-22 Divx, Inc. Hierarchical and reduced index structures for multimedia files
US8448002B2 (en) * 2008-04-10 2013-05-21 Nvidia Corporation Clock-gated series-coupled data processing modules
US20090307140A1 (en) * 2008-06-06 2009-12-10 Upendra Mardikar Mobile device over-the-air (ota) registration and point-of-sale (pos) payment
US8447977B2 (en) * 2008-12-09 2013-05-21 Canon Kabushiki Kaisha Authenticating a device with a server over a network
WO2010080911A1 (en) 2009-01-07 2010-07-15 Divx, Inc. Singular, collective and automated creation of a media guide for online content
JP5723888B2 (ja) 2009-12-04 2015-05-27 ソニック アイピー, インコーポレイテッド 基本ビットストリーム暗号材料伝送システムおよび方法
US9247312B2 (en) 2011-01-05 2016-01-26 Sonic Ip, Inc. Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol
JP5839659B2 (ja) * 2011-06-20 2016-01-06 ルネサスエレクトロニクス株式会社 半導体装置
US9467708B2 (en) 2011-08-30 2016-10-11 Sonic Ip, Inc. Selection of resolutions for seamless resolution switching of multimedia content
US8799647B2 (en) 2011-08-31 2014-08-05 Sonic Ip, Inc. Systems and methods for application identification
US8964977B2 (en) 2011-09-01 2015-02-24 Sonic Ip, Inc. Systems and methods for saving encoded media streamed using adaptive bitrate streaming
US8909922B2 (en) 2011-09-01 2014-12-09 Sonic Ip, Inc. Systems and methods for playing back alternative streams of protected content protected using common cryptographic information
US8868913B1 (en) 2011-09-29 2014-10-21 Juniper Networks, Inc. Automatically authenticating a host key via a dynamically generated certificate using an embedded cryptographic processor
US9323315B2 (en) 2012-08-15 2016-04-26 Nvidia Corporation Method and system for automatic clock-gating of a clock grid at a clock source
US8850371B2 (en) 2012-09-14 2014-09-30 Nvidia Corporation Enhanced clock gating in retimed modules
US9313510B2 (en) 2012-12-31 2016-04-12 Sonic Ip, Inc. Use of objective quality measures of streamed content to reduce streaming bandwidth
US9191457B2 (en) 2012-12-31 2015-11-17 Sonic Ip, Inc. Systems, methods, and media for controlling delivery of content
US9906785B2 (en) 2013-03-15 2018-02-27 Sonic Ip, Inc. Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata
US9471456B2 (en) 2013-05-15 2016-10-18 Nvidia Corporation Interleaved instruction debugger
US10181124B2 (en) * 2013-05-30 2019-01-15 Dell Products, L.P. Verifying OEM components within an information handling system using original equipment manufacturer (OEM) identifier
US9094737B2 (en) 2013-05-30 2015-07-28 Sonic Ip, Inc. Network video streaming with trick play based on separate trick play files
US9866878B2 (en) 2014-04-05 2018-01-09 Sonic Ip, Inc. Systems and methods for encoding and playing back video at different frame rates using enhancement layers
US9489508B2 (en) 2014-11-13 2016-11-08 Seagate Technology Llc Device functionality access control using unique device credentials
KR102328450B1 (ko) 2015-09-30 2021-11-19 삼성디스플레이 주식회사 표시 장치
DE102019007447A1 (de) * 2019-10-25 2021-04-29 Diehl Metering Systems Gmbh Verfahren und System zur Lizenzierung und Schlüsselübergabe für Sensoren und Empfänger

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ329891A (en) * 1994-01-13 2000-01-28 Certco Llc Method of upgrading firmware of trusted device using embedded key
US5805706A (en) * 1996-04-17 1998-09-08 Intel Corporation Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
IL113375A (en) * 1995-04-13 1997-09-30 Fortress U & T Ltd Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
US5852665A (en) * 1995-04-13 1998-12-22 Fortress U & T Ltd. Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
US5633932A (en) * 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496337B (zh) * 2005-04-13 2013-03-13 微软公司 硬盘驱动器认证

Also Published As

Publication number Publication date
EP1021886A1 (en) 2000-07-26
KR100358596B1 (ko) 2002-10-25
CN1254040C (zh) 2006-04-26
DE69831586T2 (de) 2006-06-22
AU8567598A (en) 1999-04-23
WO1999017495A1 (en) 1999-04-08
DE69831586D1 (de) 2005-10-20
BR9814793A (pt) 2000-10-10
KR20010030781A (ko) 2001-04-16
TW436747B (en) 2001-05-28
EP1021886A4 (en) 2002-03-20
US5970147A (en) 1999-10-19
EP1021886B1 (en) 2005-09-14
MY133547A (en) 2007-11-30
HK1028505A1 (en) 2001-02-16

Similar Documents

Publication Publication Date Title
CN1254040C (zh) 配置与登记密码设备的电路和方法
US5828753A (en) Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package
US6357004B1 (en) System and method for ensuring integrity throughout post-processing
US5796840A (en) Apparatus and method for providing secured communications
US6292892B1 (en) Apparatus and method for providing secured communications
CA2374968C (en) Technique for split knowledge backup and recovery of a cryptographic key
EP0725512B1 (en) Data communication system using public keys
EP1198922B1 (en) Secure distribution and protection of encryption key information
US6266416B1 (en) Protection of software against use without permit
USRE40694E1 (en) Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format
US5651068A (en) International cryptography framework
US6748084B1 (en) Data access control system and method thereof
EP0723251A2 (en) Method and apparatus for user and security device authentication
EP0706275A2 (en) System and method for secure storage and distribution of data using digital signatures
US7571329B2 (en) Method of storing unique constant values
CN1495666A (zh) 存储卡
CN1496073B (zh) 消息检查设备
US20100063932A1 (en) Forming Credentials
CN1294457A (zh) 用不可访问的唯一密钥对储存的数据进行加密/解密
Vaughan-Nichols How trustworthy is trusted computing?
KR20010024912A (ko) 컴퓨터용 타원 곡선 암호화 방법 및 장치
CN109583237A (zh) 用户数据保护方法、服务器及存储介质
KR100239865B1 (ko) 통신보안 제공방법 및 장치(apparatus and method for providing secured communications)
JP2009525556A (ja) 外部のコード・イメージをチップ上のプライベート・キーに一致させるための方法および装置
EP0784256A1 (en) Method and apparatus for public-key cryptography using a secure semiconductor device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060426

Termination date: 20100624