SYSTEM AND METHOD FOR IMPLEMENTING A TRUSTED DYNAMIC LAUNCH AND TRUSTED PLATFORM MODULE (TPM) USING SECURE ENCLAVES
    72.
    发明申请
    SYSTEM AND METHOD FOR IMPLEMENTING A TRUSTED DYNAMIC LAUNCH AND TRUSTED PLATFORM MODULE (TPM) USING SECURE ENCLAVES 审中-公开
    使用安全包装来实施受阻动态发射和信号平台模块(TPM)的系统和方法

    公开(公告)号:US20150186680A1

    公开(公告)日:2015-07-02

    申请号:US14633701

    申请日:2015-02-27

    Abstract: An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.

    Abstract translation: 描述了使用安全飞地实现可信的动态发射和可信平台模块(TPM)的装置和方法。 例如,根据本发明的一个实施例的计算机实现的方法包括:响应于第一命令初始化安全飞地,所述安全飞地包括可信软件执行环境,其防止在飞地之外执行的软件访问软件,以及 飞地内的数据; 以及从所述安全飞地内执行可信平台模块(TPM),所述可信平台模块将处理器或芯片组组件中的一组平台控制寄存器(PCR)中的数据安全地读取到分配给所述安全飞地的存储器区域中。

    Technologies for secure hardware and software attestation for trusted I/O

    公开(公告)号:US11741230B2

    公开(公告)日:2023-08-29

    申请号:US17451922

    申请日:2021-10-22

    CPC classification number: G06F21/57 G06F21/602

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

    Technologies for secure hardware and software attestation for trusted I/O

    公开(公告)号:US11157623B2

    公开(公告)日:2021-10-26

    申请号:US16280351

    申请日:2019-02-20

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

    Processors, methods and systems to allow secure communications between protected container memory and input/output devices

    公开(公告)号:US10664179B2

    公开(公告)日:2020-05-26

    申请号:US14866478

    申请日:2015-09-25

    Abstract: An integrated circuit includes protected container access control logic to perform a set of access control checks and to determine whether to allow a device protected container module (DPCM) and an input and/or output (I/O) device to communicate securely through one of direct memory access (DMA) and memory-mapped input/output (MMIO). The DPCM and the I/O device are allowed to communicate securely if it is determined that at least the DPCM and the I/O device are mapped to one another, an access address associated with the communication resolves into a protected container memory, and a page of the protected container memory into which the access address resolves allows for the aforementioned one of DMA and MMIO. In some cases, a Security Attributes of Initiator (SAI) or security identifier may be used to obtain a DPCM identifier or attest that access is from a DPCM mapped to the I/O device. In some cases, a determination may be made that a type of access is compatible with one or more allowed access types for the page as represented in a protected container page metadata structure.

    Technologies for secure hardware and software attestation for trusted I/O

    公开(公告)号:US10248791B2

    公开(公告)日:2019-04-02

    申请号:US14974960

    申请日:2015-12-18

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

Patent Agency Ranking