Public cryptographic control unit and system therefor

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S152000, C380S255000, C380S277000

Reexamination Certificate

active

06449720

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to cryptographic systems. In particular, the present invention relates to a key management system and a shared public cryptographic control unit.
BACKGROUND OF THE INVENTION
Many computer applications need to perform one or more secure functions. A secure function of a computer program is a feature or operation of that computer program that is highly resistant to tampering by the user.
For example, a software program may have an expiration date after which the software program becomes inoperable. However, a typical software expiration function is not secure because it is easily defeated by resetting the local computer clock to an earlier time setting, or by modifying the software to jump over the portion of the program that checks the local computer clock.
As another example, a computer program that keeps a record of data accessed from a local encrypted database for the purpose of charging for the metered use of the local encrypted database typically has two critical registers. A first register represents the amount of past data usage, and another register represents the amount of remaining credit. However, if updating the usage and credit registers is not a secure function, the user could reduce the contents of the usage register and/or increase the contents of the credit register to defeat the system. Similarly, rented software that keeps a record of its own usage for rental charge purposes needs a secure function to prevent the user from tampering with the rental accounting registers, and other critical internal registers and functions.
As another example, a remote access database may charge authorized users for access to the database. A secure function is often needed to authenticate the identity of each user before granting access to the database. Yet another secure function is key management, i.e., the distribution of cryptographic keys to authorized users.
One class of secure function solutions is to implement secure functions in software. Implementing a secure function in software has the advantage of economy. Software implementations also have the advantage of being universal. However, implementing a software secure function in software is not as secure as implementing a secure function in hardware. On the other hand, hardware implementation of a secure function is more costly than software, and may require specialized hardware for each application. If each application requires its own specialized hardware, a hardware implementation of a secure function is not universal.
SUMMARY OF THE INVENTION
The present invention is embodied in a method and apparatus for using a cryptographic control unit as a universally available, public cryptographic control unit (crypto unit) in a system shared by multiple independent users.
The crypto unit contains a general-purpose computer processor having special purpose hardware and firmware to permit secure sharing of the crypto unit resources. In particular, the crypto unit includes a microprocessor core with a dedicated kernel of read only memory (ROM) control programming, a general purpose random access memory (RAM), a real time clock and a host input/output interface (i.e., to or from the desktop PC). In addition, the crypto unit includes a DES (Data Encryption Standard) engine, secure non-volatile storage for cryptographic keys, a signature registry RAM memory and special purpose access register.
The crypto unit is installed as a peripheral device into any general-purpose computer, such as a desktop PC. What makes the crypto unit a “public” cryptographic control unit, is that it is available to the main application program running on the PC as a secure computing resource.
In order to use the crypto unit resources, a portion of the main application program corresponding to the secure function is stored on the PC. The secure functions, which are called security applets herein, are loaded and unloaded into the onboard RAM of the crypto unit, where each security applet is run. By analogy to Java applets, which are downloaded and run inside browsers, a security applet is a portable, executable file intended to be loaded into a suitable computing entity and to perform one or more secure functions. In this sense, the crypto unit is like a special purpose coprocessor adapted for running security applications (applets).
The PC causes the security applet to be loaded into the program control memory of the crypto unit, which runs the applet and returns the result of the secure function to the PC. However, unlike a typical coprocessor, access to the crypto unit is not solely under the control of the desktop PC. That is, the desktop PC may not load and run just any security applet. The crypto unit and the system of which it is a part, provides its secure internal environment only some security applets are granted permission to load and run inside the crypto unit.
To secure the computing environment within the crypto unit, a cryptographic operations center (OPC) is provided which OPC communicates with the crypto unit. In particular, the crypto unit communicates with the OPC the first time a new security applet is encountered, and before the new security applet is allowed to run in the public crypto unit. The crypto unit also communicates with the OPC the first time a new crypto unit is installed on the desktop PC. The crypto unit also communicates with the OPC on a regular periodic basis. Furthermore, the software developer also communicates with the OPC, prior to distributing a given security applet for the purpose of obtaining the necessary permission for the given security applet to load and run in the crypto unit. Only if all necessary permissions are obtained from the OPC will a given security applet be allowed to load and run in the crypto unit.
Operating System
The crypto unit operating system (O/S) consists of two parts: a RON loader control program, and a native mode security applet. The RON loader control program is a compact dedicated kernel of control programming which is stored in ROM in the crypto unit. The native mode security applet, which may be distributed by floppy disk, CDROM or telephone modem, is a portable and writable file typically stored in the hard drive of the desktop PC.
Critical security functions are implemented in the ROM loader control program. In particular, the ROM loader control program controls the loading and unloading of security applets to and from the crypto unit and external sources, including the loading and unloading of the native mode security applet.
The native mode security applet has two main functions: to register the crypto unit at the OPC upon first use of the crypto unit, and to grant permission for the first use of each individual application security applet. As a general rule, the native mode security applet is used whenever the crypto unit communicates with the OPC.
System Operation
Application developers desiring to use the public cryptographic control unit in their secure software application must first submit a proposed security applet to the OPC for consideration. The proposed security applet must meet certain standards including security standards. For example, the proposed security applet must be small enough to fit into the onboard RAM on the crypto unit. The OPC further inspects the proposed security applet for compliance with security standards.
After all security compliance tests are completed, the OPC grants or denies permission for the proposed security applet to use the crypto unit. Permission to use a proposed security applet consists of assigning a serial number and a cryptographic code key C to the approved security applet. The serial number and code key C are stored in an applet registry in the OPC. The developer uses the code key C in a process to encrypt the approved security applet, and uses the serial number to identify the encrypted security applet.
Upon start up initialization of the desktop PC, the crypto unit RON loader control program loads the native mode security applet into onboard RAM in the crypto unit. The R

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Public cryptographic control unit and system therefor does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Public cryptographic control unit and system therefor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Public cryptographic control unit and system therefor will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2864590

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.