System and method for virtual hardware control

    公开(公告)号:US10282210B2

    公开(公告)日:2019-05-07

    申请号:US15180568

    申请日:2016-06-13

    Abstract: A system and method for virtual hardware control includes accessing, by a controller, a first driver message from at least one hardware device driver for at least one hardware resource on a user device, the at least one hardware device driver located in a kernel space on an operating system of the user device, sending, by the controller, the first driver message to a first virtual device driver, the first virtual device driver located in the kernel space, and forwarding, by the first virtual device driver, the first driver message to a first virtual container, the first virtual container being a first user space that is outside the kernel space of the operating system.

    System and Method for Virtual Hardware Control

    公开(公告)号:US20170357516A1

    公开(公告)日:2017-12-14

    申请号:US15180568

    申请日:2016-06-13

    CPC classification number: G06F9/4411 G06F9/455 G06F9/545

    Abstract: A system and method for virtual hardware control includes accessing, by a controller, a first driver message from at least one hardware device driver for at least one hardware resource on a user device, the at least one hardware device driver located in a kernel space on an operating system of the user device, sending, by the controller, the first driver message to a first virtual device driver, the first virtual device driver located in the kernel space, and forwarding, by the first virtual device driver, the first driver message to a first virtual container, the first virtual container being a first user space that is outside the kernel space of the operating system.

    Verifiable encryption based on trusted execution environment

    公开(公告)号:US11223485B2

    公开(公告)日:2022-01-11

    申请号:US16037789

    申请日:2018-07-17

    Inventor: Teng Wu Yin Tan

    Abstract: A method for verifying a property of plaintext using ciphertext is disclosed. In an embodiment, a computing device may receive the ciphertext at a trusted execution environment (TEE) of the computing device. The TEE may decrypt the ciphertext to generate the plaintext using a private encryption key of an encryption key pair. The encryption key pair comprises a public encryption key and the private encryption key. The TEE may generate a digitally signed validation result by encrypting the validation result using a private signing key of a signing key pair. The signing key pair comprises a public signing key and the private signing key. The private key is retrieved from secure memory of the computing device, and the secure memory may only be accessible by the TEE. The computing device may then transmit the digitally signed validation result.

    Securing delegated credentials in third-party networks

    公开(公告)号:US10511575B2

    公开(公告)日:2019-12-17

    申请号:US15707528

    申请日:2017-09-18

    Abstract: Methods and systems for providing an endpoint device with access to a remote resource are disclosed. A first secure tunnel with the endpoint device is established from an intermediate device, the first tunnel terminating within a trusted execution environment (TEE) in the intermediate device. At least one credential is received within the TEE and via the first secure tunnel from the endpoint device. The at least one credential is transmitted from the intermediate device to the remote resource via a second secure tunnel, the second tunnel located between the remote resource and the intermediate device and originating within the TEE. In response to the at least one credential being accepted by the remote resource, communications between the endpoint device and the remote resource via the TEE in the intermediate device through the first and second secure tunnels are enabled.

Patent Agency Ranking