作者: Jeffrey S. Dwoskin , Ruby B. Lee
关键词: Chain of trust 、 Trusted authority 、 Computer hardware 、 Key (cryptography) 、 Transient (computer programming) 、 Hash function 、 Computer science 、 Computer security 、 Information sensitivity 、 Key management 、 Revocation
摘要: We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used the field but owned by central authority. Our authority-mode architecture has trust rooted two critical secrets: Device Root Key and Storage Hash, initialized device trusted protects software, bound device, can use root secrets other sensitive information for many different usage scenarios. describe detailed scenario crisis response, where first responders given transient access third-party be securely accessed during reliably revoked after is over.We leverage Concealed Execution Mode of our earlier user-mode SP (Secret-Protecting) code its execution [1]. call since it shares same architectural lineage goal roots trust. However, we completely change key management software enable remote mechanisms cannot support. In architecture, built on top shared binds together secrets, policy device. As result, provide significant functionality including with reliable revocation mechanisms, controlled transitive support policy-controlled belonging organizations, attestation secure communications