Patents by Inventor Steven Bade
Steven Bade has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070260545Abstract: Embodiments of the present invention address deficiencies of the art in respect to trusted platform module (TPM) unification in a trusted computing environment and provide a novel and non-obvious method, system and computer program product for trusted platform module data harmonization. In one embodiment of the invention, a TPM log harmonization method can include designating both a single master TPM for a master node among multiple nodes, and also a multiplicity of subsidiary TPMs for remaining ones of the nodes. The method further can include extending the single master TPM with a measurement representing a rendezvous operation for the nodes.Type: ApplicationFiled: May 2, 2006Publication date: November 8, 2007Applicant: International Business Machines CorporationInventors: Steven Bade, Richard Dayan, James Hanna, Andrew Kegel
-
Publication number: 20070261123Abstract: A computer implemented method, apparatus, and computer usable program code for assuring data integrity is shown. A partition receives a request to execute an executable file from a source external to the partition. A memory region is created within the partition. The partition or service interface makes an authentication determination. The partition executes an executable file in the memory region based on the request, provided there is a positive authentication determination.Type: ApplicationFiled: May 1, 2006Publication date: November 8, 2007Inventors: Steven Bade, Renato Recio, Madeline Vega
-
Publication number: 20070234033Abstract: A computer implemented method, computer program product, and system for synchronization of a set of cryptographic objects across multiple processes. The method includes maintaining a master list of the set of cryptographic objects in the object management process and encrypting a target cryptographic object at the originating process. The originating process interfaces with the object management process whenever the originating process removes, updates, or creates the target cryptographic object. The method includes synchronizing the set of cryptographic objects across the multiple processes and servers by the object management process, wherein each of the multiple processes removes or decrypts the target cryptographic object into a local cache of each of the multiple processes.Type: ApplicationFiled: March 28, 2006Publication date: October 4, 2007Inventor: Steven Bade
-
Publication number: 20070198214Abstract: A solution for evaluating trust in a computer infrastructure is provided. In particular, a plurality of computing devices in the computer infrastructure evaluate one or more other computing devices in the computer infrastructure based on a set of device measurements for the other computing device(s) and a set of reference measurements. To this extent, each of the plurality of computing devices also provides a set of device measurements for processing by the other computing device(s) in the computer infrastructure.Type: ApplicationFiled: February 16, 2006Publication date: August 23, 2007Applicant: International Business Machines CorporationInventors: Steven Bade, Andrew Kegel, Leendert Van Doorn
-
Publication number: 20070192597Abstract: A computer implemented method for recovering a partition context in the event of a system or hardware device failure. Upon receiving a command from a partition to modify context data in a trusted platform module (TPM) hardware device, a trusted platform module input/output host partition (TMPIOP) provides an encrypted copy of the context data and the command to the TPM hardware device, which processes the command and updates the context data. If the TPM hardware device successfully processes the command, the TMPIOP receives the updated context data from the TPM hardware device and stores the updated context data received in encrypted form in a context data cache or a non-volatile storage off-board the TPM hardware device. If the TPM hardware device fails to successfully process the command, the TMPIOP uses a last valid copy of the context data to retry processing of the command on a different TPM hardware device.Type: ApplicationFiled: February 13, 2006Publication date: August 16, 2007Inventors: Steven Bade, Thomas Dewkett, Nia Kelley, Siegfried Sutter, Helmut Weber
-
Publication number: 20070136577Abstract: A method, system and computer program product for implementing general purpose PCRs with extended semantics (referred to herein as “ePCRs”) in a trusted, measured software module. The module is designed to run in one of a hypervisor context, an isolated partition, or under other isolated configurations. Because the software module is provided using trusted (measured) code, the software implementing the PCRs is able to run as a simple software process in the operating system (OS), as long as the software is first measured and logged. The software-implemented ePCRs are generated as needed to record specific measurements of the software and hardware elements on which an application depends, and the ePCRs are able to ignore other non-dependencies.Type: ApplicationFiled: December 13, 2005Publication date: June 14, 2007Inventors: Steven Bade, Andrew Kegel, Leendert Van Doorn
-
Publication number: 20070079120Abstract: A trusted platform module is presented that is capable of creating, dynamically, multiple virtual trusted platform modules in a hierarchical organization. A trusted platform module domain is created. The trusted platform module creates virtual trusted platform modules, as needed, in the trusted platform module domain. The virtual trusted platform modules can inherit the permissions of a parent trusted platform module to have the ability to create virtual trusted platform modules themselves. Each virtual trusted platform module is associated with a specific partition. Each partition is associated with an individual operating system. The hierarchy of created operating systems and their privilege of spawning new operating systems is reflected in the hierarchy of trusted platform modules and the privileges each of the trusted platform modules has.Type: ApplicationFiled: October 3, 2005Publication date: April 5, 2007Inventors: Steven Bade, Stefan Berger, Kenneth Goldman, Ronald Perez, Reiner Sailer, Leendert Van Doorn
-
Publication number: 20070016801Abstract: A method, apparatus, and computer program product are disclosed in a data processing system for establishing virtual endorsement credentials. The data processing system includes a hardware trusted platform module (TPM). Logical partitions are generated in the system. A different virtual TPM is generated for each one of the logical partitions. For each one of the logical partitions, the virtual TPM that was generated for the logical partition then dynamically generates a virtual endorsement credential for use by the logical partition that includes the virtual TPM. The virtual endorsement credential is generated within the data processing system without the data processing system or its devices accessing a trusted third party that is external to the data processing system.Type: ApplicationFiled: July 12, 2005Publication date: January 18, 2007Inventors: Steven Bade, James Hoff, Siegfried Sutter, James Ward, Helmut Weber
-
Publication number: 20060136748Abstract: A data processing system accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which the removable storage media and the hardware security unit mutually authenticate themselves. The removable storage media stores a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair that is associated with the hardware security unit, and the hardware security unit stores a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair that is associated with the removable storage media. In response to successfully performing the mutual authentication operation between the removable storage media and the hardware security unit, the system unit is enabled to invoke cryptographic functions on the hardware security unit while the removable storage media remains engaged with the system unit.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Steven Bade, Ching-Yun Chao
-
Publication number: 20060133615Abstract: A first data processing system, which includes a first cryptographic device, is communicatively coupled with a second data processing system, which includes a second cryptographic device. The cryptographic devices then mutually authenticate themselves. The first cryptographic device stores a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair that is associated with the second data processing system. The second cryptographic device stores a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair that is associated with the first data processing system.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven Bade, Ching-Yun Chao
-
Publication number: 20060088167Abstract: A method and system for backup and restore of a context encryption key (CEK) for a trusted device within a secured processing system maintains security of virtualized trusted device contexts, providing for replacement of a trusted device in the field. The CEK is encrypted along with a system identifier by a random number to yield a first result. The first result is again encrypted with a manufacturer public key. The resulting blob is stored along with the random number. To restore, the system sends the blob and the device ID to a server. The server obtains the first result by decrypting with the manufacturer private key, re-encrypts with the device public key and sends the new result back. The system sends the new result to the device along with the associated random number. The device decrypts the new result using its private key and decrypts the CEK using the random number.Type: ApplicationFiled: October 21, 2004Publication date: April 27, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, David Challener
-
Publication number: 20060090070Abstract: A method and system for verifying binding of an initial trusted device to a secured processing system binds an initial device or replacement when no binding information is available from another device in the system. A platform credential is issued only when a valid binding is verified, by sending a proof of binding to a credential provider, such as the manufacturer. The method secures against security breaches that can occur when a device is removed from the system during the binding process. The binding information is generated in the device upon installation and includes system identification information so that at each initialization, upon return of binding information from the system to the device, the device can ensure that it is installed in the proper system and abort operation if the system does not match.Type: ApplicationFiled: October 21, 2004Publication date: April 27, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, David Challener
-
Publication number: 20060075223Abstract: A method, computer program, and system for paging platform configuration registers in and out of a trusted platform module. In a trusted computing platform, an unlimited number of platform configuration registers can be obtained through paging. The trust platform module encrypts and decrypts platform configuration registers for storage outside the trusted platform module.Type: ApplicationFiled: October 1, 2004Publication date: April 6, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, Charles Ball, Ryan Catherman, James Hoff, James Ward
-
Publication number: 20060026693Abstract: A method, apparatus, and computer program product are described for asserting physical presence in a trusted computing environment included within a data processing system. The trusted computing environment includes a trusted platform module (TPM). The data processing system is coupled to a hardware management console. The trusted platform module determines whether the hardware management console is a trusted entity. The trusted platform module also determines whether the hardware management console has knowledge of a secret key that is possessed by the TPM. If the TPM determines that the hardware management console is a trusted entity and has knowledge of the secret key, the TPM determines that physical presence has been asserted.Type: ApplicationFiled: July 29, 2004Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, Ryan Catherman, James Hoff, Nia Kelley, Emily Ratliff
-
Publication number: 20060026418Abstract: A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system. The data processing system includes multiple different service processor-based hardware platforms. Multiple different trusted platform modules (TPMs) are provided in the data processing system. Each TPM provides trust services to only one of the service processor-based hardware platforms. Each TPM provides its trust services to only a portion of the entire data processing system.Type: ApplicationFiled: July 29, 2004Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, Ryan Catherman, James Hoff, Nia Kelley, Emily Ratliff
-
Publication number: 20060026422Abstract: A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system. The data processing system includes a primary hardware trusted platform module (TPM) and a secondary hardware backup TPM. The data processing system also includes multiple logical partitions. The primary hardware TPM is used to provide trusted computing services to the logical partitions. A determination is made as to whether the primary hardware TPM is malfunctioning. If a determination is made that the primary hardware TPM is malfunctioning, the secondary hardware TPM is designated as a new primary hardware TPM and is utilized instead of the primary TPM to provide trusted computing services to the logical partitions.Type: ApplicationFiled: July 29, 2004Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, Thomas Dewkett, Nia Kelley, Siegfried Sutter, Helmut Weber
-
Publication number: 20060026419Abstract: A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system where the data processing system includes a single hardware trusted platform module (TPM). Multiple logical partitions are provided in the data processing system. A unique context is generated for each one of the logical partitions. When one of the logical partitions requires access to the hardware TPM, that partition's context is required to be stored in the hardware TPM. The hardware TPM includes a finite number of storage locations, called context slots, for storing contexts. Each context slot can store one partition's context. Each one of the partitions is associated with one of the limited number of context storage slots in the hardware TPM. At least one of the context slots is simultaneously associated with more than one of the logical partitions.Type: ApplicationFiled: July 29, 2004Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Richard Arndt, Steven Bade, Thomas Dewkett, Charles Gainey, Nia Kelley, Siegfried Sutter, Helmut Weber
-
Publication number: 20060010326Abstract: A method, system and computer program product for enhancing the functionality of the existing core root of trust measurement (CRTM). The CRTM is extended to allow platform manufacturer controlled and certified code to be incorporated into the function of the CRTM, wherein the manufacturer may define the policy for accepting a new function into the CRTM. When a firmware or software module image is compiled, the build process generates a hash value of the compiled firmware or software image, wherein the hash value reflects a fingerprint (or short hand) representation of the compiled image. A determination is made as to whether the hash value of the firmware or software image is to be a CRTM extension. If so, a digital signature of the module is created using the CRTM extension private key. This signature value is added to the firmware or software module.Type: ApplicationFiled: July 8, 2004Publication date: January 12, 2006Applicant: International Business Machines CorporationInventors: Steven Bade, Ronald Perez, Leendert Van Doorn, Helmut Weber
-
Publication number: 20050257073Abstract: Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret data at rest that is used to bootstrap a system trusted platform module. A hypervisor requests each trusted platform module to encrypt a copy of the secret data, thereby generating multiple versions of encrypted secret data values, which are then stored within a non-volatile memory within the trusted platform. At some later point in time, the encrypted secret data values are retrieved, decrypted by the trusted platform module that performed the previous encryption, and then compared to each other. If any of the decrypted values do not match a quorum of values from the comparison operation, then a corresponding trusted platform module for a non-matching decrypted value is designated as defective because it has not been able to correctly decrypt a value that it previously encrypted.Type: ApplicationFiled: April 29, 2004Publication date: November 17, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven Bade, Linda Betz, Andrew Kegel, David Safford, Leendert Doorn
-
Publication number: 20050246521Abstract: A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.Type: ApplicationFiled: April 29, 2004Publication date: November 3, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven Bade, Ryan Catherman, James Hoff, Nia Kelley, Emily Ratliff