发明名称 |
Controlled use of a hardware security module |
摘要 |
Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server within a common network. The method includes: providing a network address of the server in persistent memory of the hardware security module; providing an encrypted secret entity in the persistent memory of the hardware security module; providing a private key in the persistent memory of the hardware security module; and based on the hardware security module being connectable to one of the computer systems, the method includes: establishing a secure connection between the hardware security module and the server; retrieving, via the secure connection, a wrapping key from the server and storing it in volatile memory of the hardware security module; and decrypting the encrypted secret entity with the wrapping key and storing the decrypted secret entity in the volatile memory of the hardware security module. |
申请公布号 |
GB2531248(B) |
申请公布日期 |
2017.02.22 |
申请号 |
GB20140017784 |
申请日期 |
2014.10.08 |
申请人 |
International Business Machines Corporation |
发明人 |
Angel Nunez Mencias;Jakob Lang;Franziska Geisert;Mareike Lattermann;Reinhard Buendgen;Volker Boenisch |
分类号 |
G06F21/34;G06F21/62;G06F21/78 |
主分类号 |
G06F21/34 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|