Techniques for shared private data objects in a trusted execution environment

    公开(公告)号:US11271910B2

    公开(公告)日:2022-03-08

    申请号:US16723564

    申请日:2019-12-20

    Abstract: Techniques for sharing private data objects in a trusted execution environment using a distributed ledger are described. The techniques described herein may enable sharing of data objects, referred to herein as private data objects (PDOs), between individuals and organizations with access and update policies mediated by execution of code (referred to herein as a “smart contract”) carried with the PDO in a secure enclave. A distributed ledger may serve as a “public commit log” to ensure that there is a single, authoritative instance of the object and provide a means of guaranteeing atomicity of updates across interacting objects.

    TECHNIQUES FOR SHARED PRIVATE DATA OBJECTS IN A TRUSTED EXECUTION ENVIRONMENT

    公开(公告)号:US20200244628A1

    公开(公告)日:2020-07-30

    申请号:US16723564

    申请日:2019-12-20

    Abstract: Techniques for sharing private data objects in a trusted execution environment using a distributed ledger are described. The techniques described herein may enable sharing of data objects, referred to herein as private data objects (PDOs), between individuals and organizations with access and update policies mediated by execution of code (referred to herein as a “smart contract”) carried with the PDO in a secure enclave. A distributed ledger may serve as a “public commit log” to ensure that there is a single, authoritative instance of the object and provide a means of guaranteeing atomicity of updates across interacting objects.

    Mutually assured data sharing between distrusting parties in a network environment
    5.
    发明授权
    Mutually assured data sharing between distrusting parties in a network environment 有权
    在网络环境中不信任方之间的互相保证的数据共享

    公开(公告)号:US09171163B2

    公开(公告)日:2015-10-27

    申请号:US13844101

    申请日:2013-03-15

    Abstract: An apparatus for sharing information between entities includes a processor and a trusted execution module executing on the processor. The trusted execution module is configured to receive first confidential information from a first client device associated with a first entity, seal the first confidential information within a trusted execution environment, receive second confidential information from a second client device associated with a second entity, seal the second confidential information within the trusted execution environment, and execute code within the trusted execution environment. The code is configured to compute a confidential result based upon the first confidential information and the second confidential information.

    Abstract translation: 用于在实体之间共享信息的装置包括处理器和在处理器上执行的可信执行模块。 可信执行模块被配置为从与第一实体相关联的第一客户端设备接收第一机密信息,将可信执行环境中的第一机密信息密封,从与第二实体相关联的第二客户端设备接收第二机密信息, 可信执行环境中的第二机密信息,并在可信执行环境内执行代码。 代码被配置为基于第一机密信息和第二机密信息来计算机密结果。

    SECURE KEY STORAGE USING PHYSICALLY UNCLONABLE FUNCTIONS

    公开(公告)号:US20170288869A1

    公开(公告)日:2017-10-05

    申请号:US15628386

    申请日:2017-06-20

    Abstract: Some implementations disclosed herein provide techniques and arrangements for provisioning keys to integrated circuits/processor/apparatus. In one embodiment, the apparatus includes a physically unclonable functions (PUF) circuit to generate a hardware key based on at least one manufacturing variation of the apparatus and a nonvolatile memory coupled to the PUF circuit, the nonvolatile memory to store an encrypted key, the encrypted key comprising a first key encrypted using the hardware key. The apparatus further includes a hardware cipher component coupled to the nonvolatile memory and the PUF circuit, the hardware cipher component to decrypt the encrypted key stored in the nonvolatile memory with at least the hardware key to generate a decrypted copy of the first key and fixed logic circuitry coupled to the PUF circuit and the hardware cipher component, the fixed logic circuitry to verify that the decrypted copy of the first key is valid.

    Secure key storage
    9.
    发明授权

    公开(公告)号:US10284368B2

    公开(公告)日:2019-05-07

    申请号:US15399568

    申请日:2017-01-05

    Abstract: Some implementations disclosed herein provide techniques and arrangements for provisioning keys to integrated circuits/processor. In one embodiments, a key provisioner/tester apparatus may include a memory device to receive a unique hardware key generated by a first logic of a processor. The key provisioner/tester apparatus may further include a cipher device to permanently store an encrypted first key in nonvolatile memory of the processor, detect whether the stored encrypted first key is valid, and to isolate at least one of the first logic and the nonvolatile memory of the processor from all sources that are exterior to the processor in response to detecting that the stored encrypted first key is valid.

Patent Agency Ranking