Controlling use of encryption keys
    14.
    发明授权

    公开(公告)号:US10116645B1

    公开(公告)日:2018-10-30

    申请号:US15299183

    申请日:2016-10-20

    Abstract: A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for authenticating the source of a digital certificate. The computing device also includes a second memory for storing one or more current key version indicators. Each of the current key version indicators is associated with a corresponding secondary public key, and the one or more current key version indicators are used by the processor to determine the trust of the corresponding secondary public key.

    Cryptographically verified repeatable virtualized computing

    公开(公告)号:US10038558B2

    公开(公告)日:2018-07-31

    申请号:US15046349

    申请日:2016-02-17

    Abstract: A virtualized system that is capable of executing a computation that has been identified as a repeatable computation and recording various representations of the state of the computing environment throughout the execution of the repeatable computation, where the state of the computing environment can be cryptographically signed and/or verified using a trusted platform module (TPM), or other cryptographic module. For example, a TPM embedded in the host computing device may generate a hash measurement that captures the state of the repeatable computation at the time of the computation. This measurement can be digitally signed using one or more cryptographic keys of the TPM and recorded for future use. The recorded state can subsequently be used to repeat the computation and/or determine whether the computation was repeated successfully according to certain defined criteria.

    Implementing network security policies using TPM-based credentials

    公开(公告)号:US09935937B1

    公开(公告)日:2018-04-03

    申请号:US14533395

    申请日:2014-11-05

    CPC classification number: H04L63/0823 H04L63/0853 H04L63/20

    Abstract: A method for implementing network security policies in a multi-tenant network environment may include receiving a request for implementation of at least one network security policy on one or more computing devices of a service provider cloud environment. The network security policy identified by the request may be retrieved. The network security policy may be encrypted using encrypting credentials of the one or more computing devices. Decrypting credentials corresponding to the encrypting credentials are stored in a Trusted Platform Module (TPM) within the one or more computing devices. The encrypted network security policy may be pushed to the one or more computing devices, for decryption and implementation at the one or more computing devices.

    REMOTE ATTESTATION OF HOST DEVICES
    20.
    发明申请

    公开(公告)号:US20170255472A1

    公开(公告)日:2017-09-07

    申请号:US15483227

    申请日:2017-04-10

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

Patent Agency Ranking