Secure cryptoprocessor for authorizing connected device requests
a cryptoprocessor and connected device technology, applied in the direction of program control, multi-programming arrangements, instruments, etc., can solve the problems of bluetooth devices lacking adequate protection for security credentials, users' bad habit of forgetting their cards in card readers, and the cost of smart cards issued
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
example environments
[0015]FIG. 1 illustrates an environment including requesting and authorizing devices which are local to each other, the authorizing device utilizing its secure cryptoprocessor to compute a response to an authorization request from the requesting device. As illustrated at a location 102, an authorizing device 104 may be in proximity to a requesting device 106 and may communicate with the requesting device 106 over a wireless connection 108. The authorizing device 104 may have a secure cryptoprocessor 110 which the authorizing device 104 may utilize responsive to receiving an authorization request 112 from the requesting device 106. The secure cryptoprocessor 110 may compute an authorization response 114 to the authorization request 112, and the authorizing device 104 may provide the authorization response 114 to the requesting device 106. In some embodiments, the authorizing device 104 may display to a user 116 a user interface 118 with information associated with the authorization r...
example devices
[0037]FIG. 3 illustrates an example computing device 300 that includes a secure cryptoprocessor with protected authorization credentials for authorizing requests for one or more requesting devices. Computing device 300 may be an example of an authorizing device 104 or 204. As illustrated, the computing device 300 includes a memory 302 that stores an operating system 304 having a cryptoprocessor client 306, an authorization module 308, and policy preferences 310. The computing device 400 also includes a secure cryptoprocessor 312 storing protected authorization credentials 314, processor(s) 316, removable storage 318, non-removable storage 310, input device(s) 322, and output device(s) 324 and has communication connection(s) 326 with other computing devices 328.
[0038]In various embodiments, the memory 302 is volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.) or some combination of the two. As mentioned, the system memory 302 may store an operating system 304 havin...
example processes
[0054]FIGS. 5 and 6 illustrate example processes 500 and 600. These processes 500 and 600 are illustrated as logical flow graphs, each operation of which represents a sequence of operations that can be implemented in hardware, software, or a combination thereof. In the context of software, the operations represent computer-executable instructions stored on one or more computer storage media that, when executed by one or more processors, perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures, and the like that perform particular functions or implement particular abstract data types. The order in which the operations are described is not intended to be construed as a limitation, and any number of the described operations can be combined in any order and / or in parallel to implement the processes.
[0055]FIG. 5 illustrates an example process for utilizing a secure cryptoprocessor to compute a response to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


