Microsoft technology licensing, llc (20240137210). TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS simplified abstract

From WikiPatents
Jump to navigation Jump to search

TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

Organization Name

microsoft technology licensing, llc

Inventor(s)

Kapil Vaswani of Cambridge (GB)

Siddharth Jayashankar of Pittsburgh PA (US)

Antoine Delignat-lavaud of Cambridge (GB)

Cedric Alain Marie Christophe Fournet of Cambridge (GB)

TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137210 titled 'TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

Simplified Explanation

The patent application describes a computer device that generates public-private key pairs in a trusted execution environment (TEE) of the processor, signs attestation data using a TEE private key, and exchanges this data between TLS endpoints.

  • The computer device instantiates a first TLS endpoint with access to a TEE.
  • It generates an endpoint-specific public-private key pair in the TEE.
  • Attestation data is generated to verify the key pair was created in the TEE and is bound to the first TLS endpoint.
  • The attestation data is signed in the TEE using a TEE private key.
  • The device generates a TEE signature using an endpoint-specific private key.
  • The attestation data, endpoint-specific public key, and TEE signature are sent to a second TLS endpoint in a TLS handshake message exchange.

Potential Applications

This technology could be applied in secure communication systems, IoT devices, and cloud computing environments.

Problems Solved

1. Ensures the security and integrity of key generation processes. 2. Provides a secure way to exchange key information between TLS endpoints.

Benefits

1. Enhanced security for communication channels. 2. Protection against unauthorized access to sensitive data. 3. Trustworthy verification of key pair generation.

Potential Commercial Applications

"Secure Key Exchange Technology for TLS Endpoints"

Possible Prior Art

No known prior art at this time.

Unanswered Questions

How does this technology impact the performance of TLS endpoints?

The article does not provide information on the potential impact on performance when implementing this technology. It would be important to understand if there are any performance trade-offs associated with using TEEs for key generation and exchange.

Are there any compatibility issues with existing TLS protocols?

The article does not address whether this technology is compatible with all existing TLS protocols. It would be essential to know if there are any compatibility issues that could arise when implementing this solution in different environments.


Original Abstract Submitted

a computer device instantiates a first transport layer security (tls) endpoint having access to a trusted execution environment (tee) of the processor; generates in the tee in an endpoint-specific public-private key pair bound to the first tls endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the tee and is bound to the first tls endpoint; and signs the attestation data in the tee using a tee private key securely embedded in the processor. the device generates a tee signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the tee signature to a second tls endpoint within a tls handshake message exchange between the first tls endpoint and the second tls endpoint.