Title of Invention

REMOTE SECURITY ENABLEMENT METHOD

Abstract A system (10) for remote security enablement comprises a trusted platform module (TPM) (18) disposed on a user client (12) and an administration client (14) adapted to access, via a communication network (16), the user client (12) to cause enablement of the TPM (18) on a subsequent boot of the user client (12).
Full Text SYSTEM AND METHOD FOR REMOTE SECURITY ENABLEMENT BACKGROUND
[1] To securely enable a trusted platform module (TPM) on a computer system, standardized specifications of the Trusted Computing Group (TCG) mandate that a physical user presence be established at the computer system to maintain security and user privacy rights of the computer system and ensure that a rogue software entity (i.e., a virus) does not automatically enable the TPM automatically. In a networked computer environment, TPM enablement is generally accomplished by a system administrator via a basic input/output system (BIOS) administrative console on the computer system. Thus, enabling TPMs in a networked computer environment is a time-consuming and extensive process requiring that the system administrator physically visit each user or client computer system.
SUMMARY OF THE INVENTION
(2] In accordance with one embodiment of the present invention, a system for remote security enablement comprises a trusted platform module (TPM) disposed on a user client and an administration client adapted to access, via a communication network, a TPM enablement module disposed on the user client to cause enablement of the TPM on a subsequent boot of the user client.
10003] In accordance with another embodiment of the present invention, a remote security enablement method comprises establishing a communication session between a user client and an administration client via a communication network and enabling the administration client to cause enablement of a trusted platform module (TPM) on the user client on a subsequent boot of the user client.
BRIEF DESCRIPTION OF THE DRAWINGS
[4] For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following descriptions taken in connection with the accompanying drawings in which:
[5] FIGURE 1 is a diagram illustrating an embodiment of a remote security enablement system in accordance with the present invention; and
[6] FIGURE 2 is flow diagram illustrating a method for remote security enablement in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF THE DRAWINGS
[7] The preferred embodiments of the present invention and the advantages thereof are best understood by referring to FIGURES 1 and 2 of the drawings, like numerals being used for like and corresponding parts of the various drawings.
[8] FIGURE 1 is a diagram illustrating an embodiment of a remote security enablement system 10 in accordance with the present invention. In the embodiment illustrated in FIGURE 1, system 10 comprises a user client 12 coupled to an administration client 14 via a communication network 16. Communication network 16 may comprise any type of wired or wireless network now known or later developed. Briefly, system 10 enables remote enablement of a trusted platform module (TPM) 18 disposed on user client 12 by administration client 14. In FIGURE 1, a single user client 12 is illustrated. However, it should be understood that embodiments of the present invention enable remote enablement of a TPM disposed on each of multiple networked user clients.
[9] In the embodiment illustrated in FIGURE 1, client 12 comprises a processor 20, a network interface 22, and an input/output (I/O) controller 24. Network interface 22 enables communications between user client 12 and administration client 14 via communication network 16. I/O controller 24 enables control of. input device(s) 30 and output device(s) 32 for receiving information from a user of client 12 and outputting information to a user of client 12, respectively. Input device(s) 30 may comprise a keyboard, mouse, track pad, modem, microphone, or any other type of device for inputting information to client 12. Output device(s) 32 may comprise a display monitor, speakers), a printer, or any other type of device for outputting iixforaiation from client 12.
[0010] As illustrated in FIGURE 1, system 10 also comprises a basic input/output system (BIOS) 40 for performing booting or starting operations such as system initialization and tests, and peripheral component registration operations. For example, upon booting or starting of client 12, processor 20 passes control to BIOS 40 to identify and ascertain the hardware and software resources connected to, or forming a part of; client 12. BIOS 40 also generally verifies that the connected hardware components are properly working and loads all or a portion of an operating system.
[0011J to the embodiment illustrated in FIGURE 1, BIOS 40 comprises a security module 44 and a remote TPM enablement module 46. Security module 44 and remote TPM enablement module 46 may comprise hardware, software, or a combination of hardware and software. Briefly, security module 44 is used to verify or authenticate the identity of a user of client 12 and/or the identity of administration client 14 accessing or otherwise communicating with client 12. Remote TPM enablement module 46 is used to enable TPM 18 in response to instructions and/or policies received from administration client 14. In FIGURE 1, security module 44 and remote TPM enablement module 46 are illustrated as components of BIOS 40; however, it should be understood that security module 44 and/or remote TPM enablement module 46 may be otherwise stored, located and/or accessible on client 12.
[0012] In the embodiment illustrated in FIGURE 1, administration client 14 comprises a processor 60, a network interface 62, and a memory 64. Network interface 62 enables communications between administration client 14 and user client 12 via communication network 16. As illustrated in FIGURE 1, administration client 14 also comprises a security administration module 70. Security administration module 70 may comprise software, hardware, or a combination of software and hardware. In FIGURE 1, security administration module 70 is illustrated as being stored in memory 64 so as to be accessible and executable by processor 60. However, it should be understood that security administration module 70 may be otherwise stored, even remotely, so as to be accessible and executable by processor 60.
[0013J Security administration module 70 is used to control and/or authorize access to security Amotions and policies associated with user client 12. For example, in the embodiment illustrated in FIGURE 1, security administration module 70 comprises a client TPM enable module 74 for interfacing with user client 12 to remotely enable TPM 18 of user client 12. In the embodiment illustrated in FIGURE 1, administration client 14 also comprises client data 80 stored in memory 64 having information associated with client 12 such as, but not limited to, user information of user client 12 and/or security information for accessing user client 12. Security administration module 70 accesses and/or otherwise uses client data 80 to identify and/or otherwise access a particular user client 12.
(0014} Thus, in operation, a user of administration client 14 accesses or otherwise uses client TPM enable module 74 to communicate with a particular user client 12 via communication network 16 to request enablement of TPM 18 of a particular user client 12. For example, in operation, security administration module 70 interfaces with security module 44 such that access credentials of administration client 14 may be verified and/or otherwise authenticated by security module 44 using administration access data 90 stored in a memory 92 of user client 12. In the embodiment illustrated in FIGURE 1, administration access data 90 and memory 92 are illustrated as being a component of BIOS 40. However, it should be understood that administration access data 90 may be otherwise stored on user client 12.
[15] In response to security credential authentication, client TPM enable module 74 interfaces with BIOS 40 to instruct and/or otherwise cause BIOS 40 to enable TPM 18 on a subsequent boot of user client 12 via instructions and/or policies set forth or otherwise identified by remote TPM enablement module 46 and/or client TPM enable module 74. In some embodiments of the present invention, BIOS 40 and/or remote TPM enablement module 46 are configured to immediately initiate a re-boot of user client 12 in response to a TPM enablement request by administration client 14. However, it should be understood that in other embodiments of the present invention, a re-boot of user client 12 may be delayed and/or user-directed or controlled. Thus, on a subsequent boot of user client 12, remote TPM enablement module 46 is accessed or otherwise used by BIOS 40 to enable TPM 18 and provide a user of user client 12 with various options for acceptance, rejection, or notice of TPM 18 enablement as desired by the user of administration client 14.
In operation, based on a desired policy or setting requested by administration client 14 via client TPM enable module 74, administration client 14 provides one or more desired option or control settings for enabling TPM 18 on the subsequent boot of user client 12. In some embodiments of the present invention, remote TPM enablement module 46 is configured to cooperate with output device(s) 32 to display or otherwise indicate to a user of client 12 notification that TPM 18 is being enabled but not requiring an input response or any other action by the user. For example, remote TPM enablement module 46 may be configured to cooperate with output device(s) 32 to display a notification of TPM 18 enablement via output device(s) 32, such as a display monitor, and then continue with TPM 18 enablement. In other embodiments of the present invention, remote TPM enablement module 46 is configured to cooperate with output devices) 32 to display a prompt to a user of client 12 notifying the user of client 12 of TPM 18 enablement and requiring an input response from the user of client 12 to continue with the enablement and/or boot process. For example, remote TPM enablement module 46 may cooperate with output device(s) 32 to display a prompt on output device(s) 32 notifying the user of client 12 of TPM 18 enablement and request that the user acknowledge TPM 18 enablement by providing an input response, such as via input device 30, to continue processing or operations on user client 12 (e.g., if acknowledgement is not received, the user is unable to boot or otherwise utilize or continue operations on user client 12).
[0017J In other embodiments of the present invention, remote TPM enablement module 46 is configured to cooperate with output device(s) 32 to display a prompt to a user of client 12 notifying the user of client 12 of TPM 18 enablement and providing the user with the option of either accepting or rejecting TPM 18 enablement. For example, remote TPM enablement module 46 may cooperate with output device(s) 32 to display a prompt to a user of client 12 requesting that the user of client 12 either accept or reject TPM 18 enablement by providing an input response, such as via input device 30. Based on the input response received from the user, remote TPM enablement module 46 either continues with TPM 18 enablement or aborts TPM 18 enablement. In the examples described above, display prompts indicating TPM 18 enablement are provided before TPM 18 enablement. However, it should also be understood that display prompts indicating or otherwise notifying the user of TPM 18 emblement may also be provided after TPM 18 enablement as an alternative or in combination with the pre-enablement notices.
[0018] FIGURE 2 is a flow diagram illustrating a method for remote TPM enablement in accordance with an embodiment of the present invention. The method begins at block 100, where a communications session is established between user client 12 and administration client 14. As described above, security administration module 70 interfaces with security module 44 of BIOS 40 to authenticate or otherwise authorize access to user client 12 by administration client 14 (e.g., access to BIOS 40 and/or TPM 18). At decisional block 102, client TPM enable module 74 interfaces with BIOS 40 and/or TPM 18 to determine whether TPM 18 is enabled. If TPM 18 is enabled, the method proceeds to decisional block 104, where client TPM enable module 74 interfaces with TPM 18 to determine an ownership state of TPM 18 as to whether ownership of TPM 18 has been previously established (i.e., from a user of user client 12 or another). If ownership of TPM 18 has been previously established, the method ends. If ownership of TPM 18 has not been previously established, the method proceeds to block 106, where administration client 14 establishes ownership of TPM 18.
{0019 J At decisional block 102, if TPM 18 is not enabled, the method proceeds to block 108, where client TPM enable module 74 interfaces with BIOS 40 to determine whether remote TPM 18 enabling and/or taking ownership by administration client 14 is enabled or otherwise authorized. If ownership of TPM 18 by administration client 14 is not authorized, the method ends. If remote TPM 18 enabling and/or taking ownership by administration client 14 is enabled or otherwise authorized, the method proceeds to block 110.
[0020] At block 110, client TPM enable module 74 requests enablement of TPM 18 by instructing or otherwise causing BIOS 40 to enable TPM 18 on a subsequent boot of client 12 using instructions and/or policies set forth by TPM enablement module 46 as selected or otherwise identified by client TPM enable module 74. At block 111, a re-boot or subsequent boot of user client 12 is initiated. At decisional block 112, during the subsequent boot of client 12, BIOS 40 determines whether a user bypass of TPM 18 enablement has been enabled according to remote TPM enablement module 46 such that TPM 18 is enabled without requiring any action on the part of a user of client 12 or providing the user with the option of accepting/rejecting TPM 18 enablement. For example, as described above, client TPM enable module 74 may be configured to set forth or otherwise control various administration policies for TPM 18 enablement on user client 12. If a user bypass policy is enabled at decisional block 112 (i.e., the user is not given the option of accepting/rejecting TPM 18 enablement), the method proceeds to block 114, where remote TPM enablement module 46 notifies a user of user client 12 TPM 18 enablement The method then proceeds to block 126, where BIOS 40 enables TPM 18. If a user bypass is not enabled at decisional olock 112, the method proceeds to decisional block 116, where a determination is made whether a user rejection policy is enabled. For example, as described above, remote TPM enablement module 46 may be configured to provide the user of client 12 the option of rejecting enablement of TPM 18. If a user rejection policy is not enabled at decisional block 116, the method proceeds to block 118, where remote TPM enablement module 46 displays a notification prompt to the user of client 12 of a TPM 13 enablement For example, as described above, remote TPM enablement module 46 may be configured to display a prompt via output device 32 notifying the user of client 12 of TPM 18 enablement and instructing the user of client 12 to provide an input response to the notification prompt to continue processing on client 12, thereby indicating acceptance of TPM 18 enablement and enabling the user to continue to use or boot user client 12, Thus, at block 120, remote TPM enablement module 46 receives an acceptance input from the user of client 12, such as via input device 30, indicating acceptance of TPM 18 enablement and for continued processing on client 12. The method proceeds to block 126, where TPM 18 is enabled. The method proceeds to decisional block 104.
{00211 If a user rejection policy is enabled at decisional block 116, the method proceeds to block 122, where remote TPM enablement module 46 displays a prompt, such as via output device 32, requesting either acceptance or rejection of TPM 18 enablement. At decisional block 124, a determination is made whether the user of client 12 accepted or rejected TPM 18 enablement. If the user response indicated a rejection of TPM 18 enablement, the method ends. If the user response indicated an acceptance of TPM 18 enablement, the method proceeds to block 126, where BIOS 40 enables TPM 18.
[0022] Thus, embodiments of the present invention enable remote enablement of user client TPMs by an administration client and remote deployment of enablement and/or privacy policies controlling or otherwise associated with TPM enablement on the user client 12. It should be understood that in other embodiments of the method described in FIGURE 2, certain functions may be omitted, combined, or accomplished in a sequence different than depicted in FIGURE 2. Also, it should be understood that the method depicted in FIGURE 2 may be altered to encompass any of the other features or aspects described elsewhere in the specification.
WHAT IS CLAIMED IS:
1. A system (10) for remote security enablement, comprising:
a trusted platform module (TPM) (18) disposed on a user client (12); and
an administration client (14) adapted to access, via a communication network (16), the user client (12) to cause enablement of the TPM (18) on a subsequent boot of the user client (12).
2. The system (10) of Claim 1, wherein the administration client (14) is adapted to cause the user client (12) to notify a user of the user client (12) that the TPM (18) is being enabled.
3. The system (10) of Claim 1, wherein the administration client (14) is adapted to cause the user client (12) to display a prompt to a user of the user client (12) requesting acceptance of the TPM (18) enablement.
4. The system (10) of Claim 1, wherein the user client (12) is adapted to receive an acceptance input from a user of the user client (12) indicating acceptance of the TPM (18) enablement.
5. The system (10) of Claim 1, wherein the user client (12) is adapted to receive a rejection input from a user of the user client (12) indicating rejection of the TPM (18) enablement.
6. The system (10) of Claim 1, wherein the administration client (14) is adapted to cause the user client (12) to display a prompt to a user of the user client (12) enabling the user to reject the TPM (18) enablement.
7. The system (10) of Claim 1, wherein the administration client (14) is adapted to instruct a basic input/output system (BIOS) (40) of the user client (12) to enable the TPM (18) on the subsequent boot of the user client (12).
8. The system (10) of Claim 1, wherein the administration client (14) is adapted to cause the user client (12) to display a prompt to a user of the user client (12) during the subsequent boot notifying the user of the TPM (18) enablement.
9. The system (10) of Claim 1, wherein the user client (12) is adapted to indicate to the administration client (14) an ownership state of the TPM (18).
10. The system (10) of Claim 1, wherein the user client (12) is adapted to enable ownership of the TPM (18) by the administration client (14).

Documents:

1119-CHE-2005 AMENDED CLAIMS 31-12-2013.pdf

1119-CHE-2005 AMENDED PAGES OF SPECIFICATION 31-12-2013.pdf

1119-CHE-2005 CORRESPONDENCE OTHERS 08-01-2014.pdf

1119-CHE-2005 EXAMINATION REPORT REPLY RECEIVED 31-12-2013.pdf

1119-CHE-2005 FORM-1 31-12-2013.pdf

1119-CHE-2005 FORM-13 31-12-2013.pdf

1119-CHE-2005 FORM-13-1 31-12-2013.pdf

1119-CHE-2005 FORM-3 31-12-2013.pdf

1119-CHE-2005 FORM-5 31-12-2013.pdf

1119-CHE-2005 OTHER PATENT DOCUMENT 31-12-2013.pdf

1119-CHE-2005 OTHER PATENT DOCUMENT 1 31-12-2013.pdf

1119-CHE-2005 OTHERS 31-12-2013.pdf

1119-CHE-2005 POWER OF ATTORNEY 08-01-2014.pdf

1119-CHE-2005 POWER OF ATTORNEY 31-12-2013.pdf

1119-CHE-2005 ASSIGNMENT.pdf

1119-CHE-2005 CORRESPONDENCE OTHERS.pdf

1119-CHE-2005 DESCRIPTION (COMPLETE).pdf

1119-CHE-2005 DRAWINGS.pdf

1119-CHE-2005 FORM 1.pdf

1119-CHE-2005 FORM 18.pdf

1119-CHE-2005 FORM 3.pdf

1119-CHE-2005 FORM 5.pdf


Patent Number 258568
Indian Patent Application Number 1119/CHE/2005
PG Journal Number 04/2014
Publication Date 24-Jan-2014
Grant Date 21-Jan-2014
Date of Filing 11-Aug-2005
Name of Patentee HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Applicant Address 11445 COMPAQ CENTER DRIVE WEST, HOUSTON, TX 77070
Inventors:
# Inventor's Name Inventor's Address
1 RIOS, JENNIFER 3422 LA MER LANE SPRING, TEXAS 77388
2 WANG, LAN 15032 MUSTANG VALLEY CIRCLE, CYPRESS, TEXAS 77429
3 ALI, VALIUDDIN 6830 CHAMPOINS PLAZA DRIVE, 1004, HOUSTON, TEXAS 77069
PCT International Classification Number H0401/00
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10/936,918 2004-08-08 U.S.A.