INTEGRATED INFRASTRUCTURE SECURE COMMUNICATION SYSTEM
20220385456 · 2022-12-01
Inventors
- Shivendra Katiyar (Bangalore, IN)
- Naman Goel (Bangalore, IN)
- Ravishankar Kanakapura NANJUNDASWAMY (Bangalore, IN)
Cpc classification
H04L9/083
ELECTRICITY
H04L9/0866
ELECTRICITY
H04L9/0825
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
An integrated infrastructure secure communication system includes at least one chassis, and a plurality of computing devices that are located in the at least one chassis and that are coupled to each other. A first computing device included in the plurality of computing device receives a communication from a first component in the first computing device, retrieves a vendor-based key, and encrypts the communication using the vendor-based key to provide a first-level encrypted communication. The first computing device also generates a first random key, encrypts the first-level encrypted communication with the first random key to provide a second-level encrypted communication, and transmits the second-level encrypted communication to a second computing device that is included in the plurality of computing devices.
Claims
1. An integrated infrastructure secure communication system, comprising: at least one chassis; and a plurality of computing devices that are located in the at least one chassis and that are coupled to each other, wherein a first computing device that is included in the plurality of computing devices is configured to: receive a communication from a first component in the first computing device; retrieve a vendor-based key; encrypt the communication using the vendor-based key to provide a first-level encrypted communication; generate a first random key; encrypt the first-level encrypted communication with the first random key to provide a second-level encrypted communication; and transmit the second-level encrypted communication to a second computing device that is included in the plurality of computing devices.
2. The system of claim 1, wherein the first computing device includes a Physical Unclonable Function (PUF) module that is used to generate the first random key.
3. The system of claim 2, wherein the first computing device includes a smart Network Interface Controller (SmartNIC) that is configured to use the PUF module to generate the first random key.
4. The system of claim 1, wherein the second computing device is configured to: receive the second-level encrypted communication from the first computing device; generate a second random key; encrypt the second-level encrypted communication with the second random key to provide an encrypted second-level encrypted communication; and transmit the encrypted second-level encrypted communication to the first computing device.
5. The system of claim 4, wherein the second computing device is configured to: validate, in response to receiving the second-level encrypted communication from the first computing device, a signature provided with the second-level encrypted communication by the first computing device.
6. The system of claim 4, wherein the first computing device is configured to: receive the encrypted second-level encrypted communication from the second computing device; decrypt the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication; and transmit the encrypted first-level encrypted communication to the second computing device.
7. The system of claim 6, wherein the second computing device is configured to: receive the encrypted first-level encrypted communication from the first computing device; decrypt the encrypted first-level encrypted communication based on the second random key to provide the first-level encrypted communication; retrieve the vendor-based key; and decrypt the first-level encrypted communication using the vendor-based key to provide the communication; and transmit the communication to a second component in the second computing device.
8. The system of claim 1, further comprising: a certificate database storing a vendor-based certificate, where in the vendor-based key is retrieved using the vendor-based certificate.
9. An Information Handling System (IHS), comprising: a processing system; and a memory system that is coupled to the processing system and that includes instructions that, when executed by the processing system, cause the processing system to provide an integrated infrastructure secure communication engine that is configured to: receive a communication from a component that is coupled to the processing system; retrieve a vendor-based key; encrypt the communication using the vendor-based key to provide a first-level encrypted communication; generate a first random key; encrypt the first-level encrypted communication with the first random key to provide a second-level encrypted communication; and transmit the second-level encrypted communication to a computing device.
10. The IHS of claim 8, further comprising: a Physical Unclonable Function (PUF) module that is coupled to the processing system and that is used to generate the first random key.
11. The IHS of claim 8, further comprising: a smart Network Interface Controller (SmartNIC) that is coupled to the processing system and that is configured to use the PUF module to generate the first random key.
12. The IHS of claim 8, wherein integrated infrastructure secure communication engine is configured to: receive, in response to transmitting the second-level encrypted communication to the computing device, an encrypted second-level encrypted communication from the second computing device; decrypt the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication; and transmit the encrypted first-level encrypted communication to the computing device.
13. The IHS of claim 8, further comprising: a certificate database storing a vendor-based certificate, where in the vendor-based key is retrieved using the vendor-based certificate.
14. A method for securing communications in an integrated infrastructure system, comprising: receiving, by a first computing device, a communication from a first component in the first computing device; retrieving, by the first computing device, a vendor-based key; encrypting, by the first computing device, the communication using the vendor-based key to provide a first-level encrypted communication; generating, by the first computing device, a first random key; encrypting, by the first computing device, the first-level encrypted communication with the first random key to provide a second-level encrypted communication; and transmitting, by the first computing device, the second-level encrypted communication to a second computing device.
15. The method of claim 14, wherein the first computing device includes a Physical Unclonable Function (PUF) module that is used to generate the first random key.
16. The method of claim 15, wherein the first computing device includes a smart Network Interface Controller (SmartNIC) that is configured to use the PUF module to generate the first random key.
17. The method of claim 14, further comprising: receiving, by the second computing device, the second-level encrypted communication from the first computing device; generating, by the second computing device, a second random key; encrypting, by the second computing device, the second-level encrypted communication with the second random key to provide an encrypted second-level encrypted communication; and transmitting, by the second computing device, the encrypted second-level encrypted communication to the first computing device.
18. The method of claim 17, further comprising: receiving, by the first computing device, the encrypted second-level encrypted communication from the second computing device; decrypting, by the first computing device, the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication; and transmitting, by the first computing device, the encrypted first-level encrypted communication to the second computing device.
19. The method of claim 18, further comprising: receiving, by the second computing device, the encrypted first-level encrypted communication from the first computing device; decrypting, by the second computing device, decrypt the encrypted first-level encrypted communication based on the second random key to provide the first-level encrypted communication; retrieving, by the second computing device, the vendor-based key; and decrypting, by the second computing device, the first-level encrypted communication using the vendor-based key to provide the communication; and transmitting, by the second computing device, the communication to a second component in the second computing device.
20. The method of claim 14, wherein the vendor-based key is retrieved using a vendor-based certificate that is stored in a certificate database in the first computing device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
DETAILED DESCRIPTION
[0022] For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, calculate, determine, classify, process, transmit, receive, retrieve, originate, switch, store, display, communicate, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer (e.g., desktop or laptop), tablet computer, mobile device (e.g., personal digital assistant (PDA) or smart phone), server (e.g., blade server or rack server), a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, touchscreen and/or a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
[0023] In one embodiment, IHS 100,
[0024] Referring now to
[0025] In the illustrated embodiment, the integrated infrastructure system 200 includes a plurality of computing devices 204a, 204b, and up to 204c. In an embodiment, any or each of the computing devices 204a-204c may be provided by the IHS 100 discussed above with reference to
[0026] Referring now to
[0027] In the specific example illustrated in
[0028] In the specific example illustrated in
[0029] The chassis 302 may also house a storage system (not illustrated, but which may include the storage 108 discussed above with reference to
[0030] The chassis 302 may also house one or more computing components 314 that one of skill in the art in possession of the present disclosure will recognize may be provided by any component (e.g., hardware devices, applications, workloads, other software, etc.) that is configured to generate and/or receive the communications discussed below. However, while a specific computing device 300 has been illustrated and described, one of skill in the art in possession of the present disclosure will recognize that computing devices (or other devices operating according to the teachings of the present disclosure in a manner similar to that described below for the computing device 300) may include a variety of components and/or component configurations for providing conventional computing device functionality, as well as the functionality discussed below, while remaining within the scope of the present disclosure as well.
[0031] Referring now to
[0032] The second computing device may then receive the second-level encrypted communication from the first computing device, generate a second random key, encrypt the second-level encrypted communication with the second random key to provide an encrypted second-level encrypted communication, and transmit the encrypted second-level encrypted communication to the first computing device. The first computing device may then receive the encrypted second-level encrypted communication from the second computing device, decrypt the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication, and transmit the encrypted first-level encrypted communication to the second computing device. The second computing device may then receive the encrypted first-level encrypted communication from the first computing device, decrypt the encrypted first-level encrypted communication based on the second random key to provide the first-level encrypted communication, retrieve the vendor-based key, decrypt the first-level encrypted communication using the vendor-based key to provide the communication, and transmit the communication to a second component in the second computing device. As such, the systems and method of the present disclosure may provide a secure, distributed root-of-trust in composable hardware platforms or similar solution-clustered nodes via a secure distributed security module that integrates vendor-hardware-component-specific key management with platform-vendor-specific-key management.
[0033] With reference to
[0034] With reference to
[0035] The method 400 then proceeds to block 404 where the first computing device retrieves a vendor-based key. With reference to
[0036] The method 400 then proceeds to block 406 where the first computing device encrypts the communication using the vendor-based key to provide a first-level encrypted communication. In an embodiment, at block 406, the integrated infrastructure secure communication engine 304 in the computing device 204a/300 may then perform vendor-based key communication encryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204a/300 using the vendor-based key retrieved at block 404 to encrypt the communication C.sub.204a received from the computing component 312 in the computing device 204a/300 to provide a first-level encrypted communication F.sub.VENDOR-KEY (C.sub.204a)
[0037] The method 400 then proceeds to block 408 where the first computing device generates a first random key. With reference to
[0038] The method 400 then proceeds to block 410 where the first computing device encrypts the first-level encrypted communication using the first random key to provide a second-level encrypted communication. In an embodiment, at block 410, the integrated infrastructure secure communication engine 304 in the computing device 204a/300 may then perform random key communication encryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204a/300 using the random key generated at block 408 to encrypt the first-level encrypted communication F.sub.VENDOR-KEY (C.sub.204a) to provide a second-level encrypted communication F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a)). As discussed below, in some embodiment, the management subsystem 306 in the computing device 204a/300 may sign the second-level encrypted communication F.sub.RANDOM-KEY-204a(F.sub.VENDOR-KEY (C.sub.204a)) using, for example, a private key that is controlled by the management subsystem in the computing device 204a/300 and that is part of a public/private key pair with a public key that may have been provided to any computing device(s) in the integrated infrastructure system 200 with which the computing device 204a/300 will communicate. In some embodiments, the management subsystem 306 in the computing device 204a/300 may then temporarily store the first random key (e.g., in the certificate database 310 or a similar secure database) for use in the decryption operations discussed below.
[0039] The method 400 then proceeds to block 412 where the first computing device transmits the second-level encrypted communication to a second computing device. With reference to
[0040] With reference now to
[0041] The method 400 then proceeds to block 416 where the second computing device generates a second random key. With reference to
[0042] The method 400 then proceeds to block 418 where the second computing device encrypts the second-level encrypted communication using the second random key to provide an encrypted second-level encrypted communication. In an embodiment, at block 418, the integrated infrastructure secure communication engine 304 in the computing device 204b/300 may then perform random key communication encryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204b/300 using the random key generated at block 416 to encrypt the second-level encrypted communication F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a)) to provide an encrypted second-level encrypted communication F.sub.RANDOM-KEY-204b (F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a))). In some embodiments, the management subsystem 306 in the computing device 204b/300 may then temporarily store the second random key (e.g., in the certificate database 310 or a similar secure database) for use in the decryption operations discussed below.
[0043] The method 400 then proceeds to block 420 where the second computing device transmits the encrypted second-level encrypted communication to the first computing device. With reference to
[0044] The method 400 then proceeds to block 422 where the first computing device decrypts the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication. In an embodiment, at block 422, the integrated infrastructure secure communication engine 304 in the computing device 204a/300 may then perform random-key-based encrypted second-level encrypted communication decryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204a/300 decrypting the encrypted second-level encrypted communication F.sub.RANDOM-KEY-204b (F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a))) to provide an encrypted first-level encrypted communication (F.sub.RANDOM-KEY-204b (F.sub.VENDOR-KEY (C.sub.204a))). In a specific example, the random-key-based encrypted second-level encrypted communication decryption operations may include a processor in the SmartNIC device that provides a portion of the random key generation subsystem 308 using a PUF inverse mode of the PUF module that provides a portion of the random key generation subsystem 308 to generate an inverse function that is based on the first random key (e.g., F.sub.RANDOM-KEY-204a.sup.−1) and that may be utilized to decrypt the encrypted second-level encrypted communication F.sub.RANDOM-KEY-204b (F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a))) to provide the encrypted first-level encrypted communication F.sub.RANDOM-KEY-204a.sup.−1 (F.sub.RANDOM-KEY-204b (F.sub.RANDOM-KEY-204a (F.sub.VENDOR-KEY (C.sub.204a))))=(F.sub.RANDOM-KEY-204b (F.sub.VENDOR-KEY (C.sub.204a))). However, while a specific decryption technique has been described, one of skill in the art in possession of the present disclosure will appreciate that other decryption techniques will fall within the scope of the present disclosure as well.
[0045] The method 400 then proceeds to block 424 where the first computing device transmits the encrypted first-level encrypted communication to the second computing device. With reference to
[0046] The method 400 then proceeds to block 426 where the second computing device decrypts the encrypted first-level encrypted communication based on the second random key to provide the first-level encrypted communication. In an embodiment, at block 426, the integrated infrastructure secure communication engine 304 in the computing device 204b/300 may then perform random-key-based encrypted first-level encrypted communication decryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204b/300 decrypting the encrypted first-level encrypted communication F.sub.RANDOM-KEY-204b (F.sub.VENDOR-KEY (C.sub.204a)) to provide the first-level encrypted communication (F.sub.VENDOR-KEY (C.sub.204a) In a specific example, the random-key-based encrypted first-level encrypted communication decryption operations may include a processor in the SmartNIC device that provides a portion of the random key generation subsystem 308 using a PUF inverse mode of the PUF module that provides a portion of the random key generation subsystem 308 to generate an inverse function that is based on the second random key (e.g., F.sub.RANDOM-KEY-204b.sup.−1) and that may be utilized to decrypt the encrypted first-level encrypted communication (F.sub.RANDOM-KEY-204b (F.sub.VENDOR-KEY (C.sub.204a))) to provide the first-level encrypted communication F.sub.RANDOM-KEY-204b.sup.−1 (F.sub.RANDOM-KEY-204b (F.sub.VENDOR-KEY (C.sub.204a)))=F.sub.VENDOR-KEY (C.sub.204a). However, while a specific decryption technique has been described, one of skill in the art in possession of the present disclosure will appreciate that other decryption techniques will fall within the scope of the present disclosure as well
[0047] The method 400 then proceeds to block 428 where the second computing device retrieves the vendor-based key. With reference to
[0048] The method 400 the proceeds to block 430 where the second computing device decrypts the first-level encrypted communication using the vendor-based key to provide the communication. In an embodiment, at block 430, the integrated infrastructure secure communication engine 304 in the computing device 204b/300 may then perform vendor-based key communication decryption operations that may include the encryption/decryption subsystem 306a in the management subsystem 306 in the computing device 204b/300 using the vendor-based key retrieved at block 428 to decrypt the first-level encrypted communication F.sub.VENDOR-KEY (C.sub.204a) to provide the communication C.sub.204a. The method 400 may then proceed to block 432 where the second computing device transmits the communication to a second component. In an embodiment, at block 432, integrated infrastructure secure communication engine 304 in the computing device 204b/300 may then perform communication transmission operations that may include the management subsystem 306 transmitting the communication C.sub.204a to a computing component 314 in the computing device 204b/300. As such, the portion of the method 400 illustrated in
[0049] Thus, systems and methods have been described that provide a vendor-based device-level trust boundary that may be established for networked communications between server devices in a composable system, and that utilizes a common vendor-based certificate/key and hardware-based random key generation to secure data packets and/or other communications transmitted between the server devices in the composable system. For example, a composable system may include at least one rack, and a plurality of server devices that are located in the at least one rack and that are coupled to each other. A first server device in the composable system receives a communication from a first component in the first server device, retrieves a vendor-based key, and encrypts the communication using the vendor-based key to provide a first-level encrypted communication. The first server device also generates a first random key, encrypts the first-level encrypted communication with the first random key to provide a second-level encrypted communication, and transmits the second-level encrypted communication to a second server device in the composable system.
[0050] The second server device may then receive the second-level encrypted communication from the first server device, generate a second random key, encrypt the second-level encrypted communication with the second random key to provide an encrypted second-level encrypted communication, and transmit the encrypted second-level encrypted communication to the first server device. The first server device may then receive the encrypted second-level encrypted communication from the second server device, decrypt the encrypted second-level encrypted communication based on the first random key to provide an encrypted first-level encrypted communication, and transmit the encrypted first-level encrypted communication to the second server device. The second server device may then receive the encrypted first-level encrypted communication from the first server device, decrypt the encrypted first-level encrypted communication based on the second random key to provide the first-level encrypted communication, retrieve the vendor-based key, decrypt the first-level encrypted communication using the vendor-based key to provide the communication, and transmit the communication to a second component in the second server device. As such, the systems and method of the present disclosure may provide a secure, distributed root-of-trust in composable hardware platforms or similar solution-clustered nodes via a secure distributed security module that integrates vendor-hardware-component-specific key management with platform-vendor-specific-key management.
[0051] Although illustrative embodiments have been shown and described, a wide range of modification, change and substitution is contemplated in the foregoing disclosure and in some instances, some features of the embodiments may be employed without a corresponding use of other features. Accordingly, it is appropriate that the appended claims be construed broadly and in a manner consistent with the scope of the embodiments disclosed herein.