Technologies for secure hardware and software attestation for trusted I/O

    公开(公告)号:US10943012B2

    公开(公告)日:2021-03-09

    申请号:US16260850

    申请日:2019-01-29

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

    Application integrity protection via secure interaction and processing
    46.
    发明授权
    Application integrity protection via secure interaction and processing 有权
    应用程序完整性保护通过安全的交互和处理

    公开(公告)号:US09571280B2

    公开(公告)日:2017-02-14

    申请号:US14126859

    申请日:2013-06-04

    CPC classification number: H04L9/14 H04L2209/60

    Abstract: The present disclosure is directed to application integrity protection via secure interaction and processing. For example, interaction with a user interface in a device may result in input information being generated. Following encryption, the input information may be conveyed to an application executing in a secure processing environment. The encrypted input information may be received, decrypted and processed by the application. An example application may include a secure controller component, a secure model component and a secure view component. The secure controller component may, for example, provide change instructions to the secure model component based on the decrypted input information. The secure model component may then, if necessary, provide a change notification to the secure view component based on the change instructions. The secure view component may then generate output information, which may be encrypted prior to being provided to the user interface for decryption, processing and presentation.

    Abstract translation: 本公开涉及通过安全交互和处理的应用完整性保护。 例如,与设备中的用户界面的交互可能导致生成输入信息。 在加密之后,可以将输入信息传送到在安全处理环境中执行的应用。 加密的输入信息可以被应用程序接收,解密和处理。 示例应用可以包括安全控制器组件,安全模型组件和安全视图组件。 例如,安全控制器组件可以基于解密的输入信息向安全模型组件提供改变指令。 然后,如果需要,安全模型组件可以基于改变指令向安全视图组件提供改变通知。 然后,安全视图组件可以生成输出信息,其可以在被提供给用户接口以进行解密,处理和呈现之前被加密。

    End-to-end secure communication system
    47.
    发明授权
    End-to-end secure communication system 有权
    端到端安全通信系统

    公开(公告)号:US09369441B2

    公开(公告)日:2016-06-14

    申请号:US14127533

    申请日:2013-06-04

    Abstract: The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, communication-related operations occurring within each client may also be secured. Each client may comprise a secure processing environment to process encrypted communication information received from other clients and locally-captured media information for transmission to other clients. The secure processing environment may include resources to decrypt received encrypted communication information and to process the communication information into media information for presentation by the client. The secure processing environment may also operate in reverse to provide locally recorded audio, image, video, etc. to other clients. Encryption protocols may be employed at various stages of information processing in the client to help ensure that information being transferred between the processing resources cannot be read, copied, altered, etc. In one example implementation, a server may manage interaction between clients, provision encryption keys, etc.

    Abstract translation: 本公开涉及一种端到端安全通信系统,其中除了加密客户端之间的传输之外,还可以确保在每个客户端内发生的与通信相关的操作。 每个客户端可以包括用于处理从其他客户端接收的加密通信信息和本地捕获的媒体信息以便传输到其他客户端的安全处理环境。 安全处理环境可以包括用于解密所接收的加密通信信息并将通信信息处理成媒体信息以供客户呈现的资源。 安全处理环境也可以相反地操作,以向其他客户端提供本地记录的音频,图像,视频等。 可以在客户端的信息处理的各个阶段采用加密协议,以帮助确保在处理资源之间传递的信息不能被读取,复制,改变等。在一个示例实现中,服务器可以管理客户端之间的交互,提供加密 钥匙等

    Trusted local memory management in a virtualized GPU

    公开(公告)号:US12050702B2

    公开(公告)日:2024-07-30

    申请号:US18358210

    申请日:2023-07-25

    Abstract: Embodiments are directed to trusted local memory management in a virtualized GPU. An embodiment of an apparatus includes one or more processors including a trusted execution environment (TEE); a GPU including a trusted agent; and a memory, the memory including GPU local memory, the trusted agent to ensure proper allocation/deallocation of the local memory and verify translations between graphics physical addresses (PAs) and PAs for the apparatus, wherein the local memory is partitioned into protection regions including a protected region and an unprotected region, and wherein the protected region to store a memory permission table maintained by the trusted agent, the memory permission table to include any virtual function assigned to a trusted domain, a per process graphics translation table to translate between graphics virtual address (VA) to graphics guest PA (GPA), and a local memory translation table to translate between graphics GPAs and PAs for the local memory.

Patent Agency Ranking