发明名称 Key management using trusted platform modules
摘要 Described herein are techniques for distributed key management (DKM) in cooperation with Trusted Platform Modules (TPMs). The use of TPMs strengthens the storage and processing security surrounding management of distributed keys. DKM-managed secret keys are not persistently stored in clear form. In effect, the TPMs of participating DKM nodes provide security for DKM keys, and a DKM key, once decrypted with a TPM, is available to be used from memory for ordinary cryptographic operations to encrypt and decrypt user data. TPM public keys can be used to determine the set of trusted nodes to which TPM-encrypted secret keys can be distributed.
申请公布号 US9026805(B2) 申请公布日期 2015.05.05
申请号 US201012982235 申请日期 2010.12.30
申请人 Microsoft Technology Licensing, LLC 发明人 Acar Tolga;LaMacchia Brian;Morales Henry Jerez;Nguyen Lan Duy;Robinson David;Tariq Talha Bin
分类号 H04L9/08;G06F21/60 主分类号 H04L9/08
代理机构 代理人 Akhter Julie Kane;Holmes Danielle Johnston;Minhas Micky
主权项 1. A method of providing distributed key management (DKM) in a DKM system comprised of DKM client computers and a DKM server, each DKM client computer comprising a trusted platform module (TPM), the method comprising: sharing DKM keys among DKM clients, wherein TPMs of the DKM clients are used to decrypt the DKM keys with TPM private keys, and wherein software cryptography components are used to encrypt the DKM keys with TPM public keys, and wherein the DKM keys when not in use are stored as encrypted by the TPM public keys, and wherein the DKM keys, when decrypted, are used by the cryptography software components of the DKM clients to encrypt and decrypt data, and wherein the decrypted DKM keys are accessible in clear form in memory of the DKM clients during encryption or decryption operations that use the decrypted DKM keys; creating a default DKM policy that applies to a plurality of DKM groups of the DKM system, wherein the default DKM policy specifies a set of cryptographic algorithms to protect data, a current DKM key to use in protect operations, and a lifetime of the current DKM key; and overriding the default DKM policy of the plurality of DKM groups by a different DKM policy for a particular DKM group of the plurality of DKM groups.
地址 Redmond WA US