发明名称 PROTECTING ACCESS TO HARDWARE DEVICES THROUGH USE OF A SECURE PROCESSOR
摘要 A computer-implemented method, system, and/or computer program product protects access to hardware devices through use of a secure processor. A security computer receives a request from a requesting computer for access to a hardware device on a network. A secure processor within the security computer encrypts the request to generate an encrypted request, which is generated within a core of the secure processor. The secure processor protects a secure application that is used to process the request from other software on the secure processor. The security computer transmits the encrypted request to the hardware device, and then receives an encrypted acknowledgement of the encrypted request from a processor associated with the hardware device. The security computer then creates a communication session between the requesting computer and the hardware device.
申请公布号 US2017093853(A1) 申请公布日期 2017.03.30
申请号 US201514865504 申请日期 2015.09.25
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION 发明人 BOIVIE RICHARD H.;FRIEDLANDER ROBERT R.;KRAEMER JAMES R.;LINTON JEB R.
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A computer-implemented method of protecting access to hardware devices through use of a secure processor, the method comprising: receiving, by a security computer, a request from a requesting computer for access to a hardware device on a network; in response to receiving the request, encrypting, by a first secure processor within the security computer, the request to generate an encrypted request, wherein the encrypted request is generated within a core of the first secure processor, and wherein the first secure processor protects a secure application that is used to process the request from other software on the first secure processor; transmitting, from the security computer to the hardware device, the encrypted request, wherein the encrypted request comprises an address and identification of the requesting computer; receiving, by the security computer, an encrypted acknowledgement of the encrypted request, wherein the encrypted acknowledgement was generated by a processor associated with the hardware device; and in response to receiving the encrypted acknowledgement, decrypting the encrypted acknowledgement and creating, by the security computer, a communication session between the requesting computer and the hardware device.
地址 ARMONK NY US
您可能感兴趣的专利