Abstract:
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.
Abstract:
A wrist-worn device clasp that secures a strap of the wrist-worn device. A first mechanical part of the wrist worn device interlocks with a second mechanical part by motion in a first plane in order to resist motion perpendicular to said first plane. The first mechanical part also inhibits a first securing part and a second securing part being separated by tension along the strap substantially perpendicular to the first plane when the first mechanical part and second mechanical part are engaged with each other. The first securing part and the second securing part inhibit separation of the first mechanical part and the second mechanical part by motion parallel to the first plane when they are engaged with each other by motion perpendicular to the first plane.
Abstract:
A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. These function calls are to perform a secure function requiring the rights of access which are only available in the first privilege mode. Scheduling code which executes in the second privilege mode controls scheduling of both the application code and the hypervisor code. Memory protection circuitry operating with physical addresses serves to control access permissions required to access different regions within the memory address space using configuration data which is written by the hypervisor code. The hypervisor code temporarily grants access to different regions within the physical memory address space to the system in the second privilege mode as needed to support the execution of code scheduled by the scheduling code.
Abstract:
An apparatus, system and method for establishing a transaction between first and second parties including a first signing step in which a transaction message including a request and a transaction identifier is cryptographically signed by the first party to form a first cryptographically signed message. The first signed message is transmitted from the first party to the second party. The second party then cryptographically signs the first message to form a second cryptographically signed message. The second message is also transmitted from one or more of a plurality of parties having the second message to a trusted third party. The trusted third party is able to verify that the second message was cryptographically signed by the second party and can also verify that the first message in the second message was cryptographically signed by the first party.
Abstract:
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.
Abstract:
A data processing device 2 has a processor 4 which executes software directly from non-volatile memory 6, 8. The processor 4 has a runtime component 20 which dynamically maps software element identifiers specified by the software to corresponding software elements in memory 6, 8. Mapping information 22 is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.
Abstract:
A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. These function calk are to perform a secure function requiring the rights of access which are only available in the first privilege mode. Scheduling code which executes in the second privilege mode controls scheduling of both the application code and the hypervisor code. Memory protection circuitry operating with physical addresses serves to control access permissions required to access different regions within the memory address space using configuration data which is written by the hypervisor code. The hypervisor code temporarily grants access to different regions within the physical memory address space to the system in the second privilege mode as needed to support the execution of code scheduled by the scheduling code.
Abstract:
Proximity of a wearable processing device to a data processing apparatus is detected based on wireless signals received by the data processing apparatus from the wearable processing device. A user input operation is detected which comprises a physical interaction with the data processing apparatus. In response to detecting the user input operation, at least one detection parameter is calibrated for the proximity detection. This provides a convenient technique for calibrating the proximity detection which does not require complicated operations from the user.
Abstract:
A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method comprising: obtaining, at the permissions management resource, input data; generating, at the permissions management resource, at least one permission relating to accessing the subject device in response to the input data; transmitting, from the permissions management resource to the subject device and/or the at least one processing device, a communication comprising the at least one permission.