Method and apparatus for migrating software-based security coprocessors

A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual security coprocessor. In response to determining that the second processing system provides a trustworthy state for supporting the virtual security coprocessor, the first pro...

Full description

Saved in:
Bibliographic Details
Main Authors ROZAS CARLOS V, SCARLATA VINCENT R
Format Patent
LanguageEnglish
Published 22.12.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual security coprocessor. In response to determining that the second processing system provides a trustworthy state for supporting the virtual security coprocessor, the first processing system transfers the virtual security coprocessor to the second processing system. In one embodiment, the first processing system receives a key and proof of bindings of the key from the second processing system. The first processing system may determine whether the second processing system provides a trustworthy state for migration of the virtual security coprocessor, based at least in part on the proof of bindings received from the second processing system. After the second processing system receives the virtual security coprocessor, the virtual security coprocessor may be removed from the first processing system. Other embodiments are described and claimed.
Bibliography:Application Number: US20050171134