发明名称 Secure crypto-processor certification
摘要 The subject disclosure is directed towards certifying cryptographic data for a crypto-processor outside of a controlled environment. The crypto-processor and a certifying entity maintain shared secret data for the purpose of verifying security of cryptographic key generation by the crypto-processor's firmware. In order to certify new cryptographic keys, the crypto-processor uses the shared secret data to verify the crypto-processor's firmware/hardware to the certifying entity. By protecting the shared secret data from exposure to compromised firmware, the shared secret data may be used to compute another secret conveying to the certifying entity whether the firmware can be trusted or not.
申请公布号 US9225530(B2) 申请公布日期 2015.12.29
申请号 US201414158210 申请日期 2014.01.17
申请人 Microsoft Technology Licensing, LLC 发明人 Wooten David Rudolph;Mattoon Dennis James;England Paul
分类号 H04L29/06;H04L9/32 主分类号 H04L29/06
代理机构 代理人 Corie Alin;Drakos Kate;Minhas Micky
主权项 1. A method for managing cryptographic data certification of a crypto-processor, the method comprising: computing shared secret data from data corresponding to hardware within the crypto-graphic processor;generating trusted application secret data based upon a certification seed, firmware data, and from the shared secret data between the crypto-processor and a certifying entity, the trusted application secret data identifying a combination of hardware corresponding to the crypto-processor and firmware running with the crypto-processor;upon generating the trusted application secret data, deleting or disabling access to the shared secret data within the crypto-processor;sending the trusted application secret data to the certifying entity to verify cryptographic key generation by the crypto-processor; andif the cryptographic key is verified, receiving, from the certifying entity, an indication that the trusted application secret data matches second trusted application secret data generated by the certifying entity from second shared secret data that corresponds to the shared secret data; andif the cryptographic key is not verified, receiving, from the certifying entity, an indication that the trusted application secret data does not match the second trusted application secret data generated by the certifying entity from the second shared secret data that corresponds to the shared secret data.
地址 Redmond WA US