发明名称 Discovery of secure network enclaves
摘要 A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
申请公布号 US9628276(B2) 申请公布日期 2017.04.18
申请号 US201213708932 申请日期 2012.12.08
申请人 Microsoft Technology Licensing, LLC 发明人 Simon Daniel R.;Swander Brian D.;Menezes Pascal;Montenegro Gabriel E.
分类号 H04L9/32;H04L9/08;H04L29/06 主分类号 H04L9/32
代理机构 Chin IP, PLLC 代理人 Chin Davin;Chin IP, PLLC
主权项 1. A device for providing secure communications, comprising: a memory and a processor that are respectively configured to store and execute instructions, including instructions that enable the device to: receive a control packet during an exchange, between the device and a second device, to establish a security association with the second device; identify a chain of two or more markers in the control packet, each marker of the chain of two or more markers indicating an enclave, and at least one marker of the chain of two or more markers including a value associated with an intermediary device that processed the control packet; determine an identity of an enclave in which the second device is located based at least on the chain of two or more markers; determine an identity of another enclave; and employ the determined identity of the enclave to establish the security association with the second device, including: selecting a key based at least on the determined identity of the enclave and the determined identity of the other enclave.
地址 Redmond WA US