Secure configuration data storage

    公开(公告)号:US11366904B2

    公开(公告)日:2022-06-21

    申请号:US15748788

    申请日:2016-08-01

    Applicant: ARM IP LIMITED

    Abstract: A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.

    Ephemeral Broadcast Key Agreement

    公开(公告)号:US20210203489A1

    公开(公告)日:2021-07-01

    申请号:US17057373

    申请日:2019-05-01

    Applicant: Arm IP Limited

    Abstract: A method for securely distributing content from a distributor to a plurality of receiving devices, each recipient creating recipient trusted ephemeral public private key pair and making the recipient trusted ephemeral public key available, the method comprising: generating a content encryption key for encrypting content to be distributed and encrypting content using the content encryption key; generating, for each recipient trusted ephemeral public key, a shared secret using the recipient trusted ephemeral public key and the distributor ephemeral private key; generating a plurality of encrypted per-recipient key slots, each encrypted per-recipient key slot generated by encrypting the content encryption key using a different shared secret of the plurality of shared secrets; creating a data structure comprising the distributor ephemeral public key, the encrypted content, and one or more encrypted per-recipient key slots; and transmitting the data structure to deliver the content to recipients associated with the device public keys from which the one or more encrypted per-recipient key slots are derived.

    Device obfuscation in electronic networks

    公开(公告)号:US10924934B2

    公开(公告)日:2021-02-16

    申请号:US16191024

    申请日:2018-11-14

    Applicant: Arm IP Limited

    Abstract: A method, electronic apparatus and computer program for device obfuscation in electronic networks, comprising determining at least one device type of at least one physical device operable to be at least intermittently attached to a wireless network; generating a pattern of wireless network activity associated with the at least one device type; exposing over the wireless network a plurality of non-functional messages conforming to the pattern; and operating a purported sender and receiver of each of the plurality of messages to obscure at least one of an exploitable characteristic and an exploitable state of the at least one device type with respect to the wireless network.

    Secure server and compute nodes
    5.
    发明授权

    公开(公告)号:US10917243B2

    公开(公告)日:2021-02-09

    申请号:US16025142

    申请日:2018-07-02

    Applicant: Arm IP Limited

    Inventor: Milosch Meriac

    Abstract: Apparatus and methods are described to provision a compute node in a plurality of compute nodes to a requestor, comprising receiving an anonymised access token from a provider of the compute nodes, requesting identities of a subset of compute nodes in the plurality of compute nodes, selecting at least one compute node in the subset of compute notes, providing the anonymised access token to a secure enclave of the selected at least one compute node, providing an anonymised identity of the requestor to the secure enclave and validating use of the anonymised identity with the access token.

    Probabilistic processor monitoring

    公开(公告)号:US10810098B2

    公开(公告)日:2020-10-20

    申请号:US15749108

    申请日:2016-07-29

    Applicant: ARM IP Limited

    Abstract: A first processing component samples and lossily accumulates statistical activity data by generating at least one data bucket by segmenting a memory window in a memory and providing a map of the segmented memory window; sampling to detect activity in the data bucket and surjectively populating the map with statistical activity data; and responsive to a trigger, passing at least part of a population of the map to a second processing component. The second processing component receives and stores the at least part of the population of the surjective map, compares it with at least one previously stored map population; and on detecting anomalous patterning, performs an “anomaly detected” action.

    ZERO LATENCY GATEWAY
    8.
    发明申请

    公开(公告)号:US20180324146A1

    公开(公告)日:2018-11-08

    申请号:US15770621

    申请日:2016-11-08

    Applicant: Arm IP Limited

    Inventor: Milosch Meriac

    Abstract: Broadly speaking, embodiments of the present technique provide apparatus, systems and methods to enable secure communication between devices. In particular, the present techniques provide an apparatus configured to monitor for a data packet transmitted between a transmitter and a receiver, determine if the data packet is permitted to be transmitted, and act on at least part of the data packet to prevent the receiver from acting on the data packet if it is not permitted to be transmitted. In other words, the present techniques provide/implement security filters in a communication channel between a transmitter and a receiver to reduce the risk that unauthorised data packets are sent to, and implemented by, the receiver device.

    Data access and ownership management

    公开(公告)号:US10122718B2

    公开(公告)日:2018-11-06

    申请号:US14832428

    申请日:2015-08-21

    Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    MANAGEMENT OF CONTROL PARAMETERS IN ELECTRONIC SYSTEMS

    公开(公告)号:US20180039510A1

    公开(公告)日:2018-02-08

    申请号:US15653095

    申请日:2017-07-18

    Applicant: ARM IP Limited

    CPC classification number: G06F9/4831 G06F9/461 G06F9/5055

    Abstract: The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.

Patent Agency Ranking