Policy-based trusted inspection of rights managed content
    2.
    发明授权
    Policy-based trusted inspection of rights managed content 有权
    权限管理内容的基于策略的信任检查

    公开(公告)号:US09514317B2

    公开(公告)日:2016-12-06

    申请号:US14367405

    申请日:2013-12-19

    Abstract: An embodiment includes a method executed by at least one processor comprising: initializing first and second secure enclaves each comprising a trusted software execution environment that prevents software executing outside the first and second secure enclaves from having access to software and data inside the first and second secure enclaves; the first secure enclave (a)(i) inspecting a policy, (a)(ii) authenticating the second secure enclave in response to inspecting the policy; and (a)(iii) communicating encrypted content to the second secure enclave in response to authenticating the second secure enclave; and the second secure enclave (b)(i) decrypting the encrypted content to produce decrypted content, and (b)(ii) inspecting the decrypted content. Other embodiments are described herein.

    Abstract translation: 一个实施例包括由至少一个处理器执行的方法,包括:初始化第一和第二安全空间,每个包括可信软件执行环境,其防止在第一和第二安全区域之外执行的软件在第一和第二安全区域内访问软件和数据 飞地 第一个安全飞地(a)(i)检查政策,(a)(ii)对检查该政策的第二个安全飞地进行认证; 和(a)(iii)响应于认证所述第二安全飞地而将加密的内容传送到所述第二安全飞地; 和第二安全飞地(b)(i)解密加密的内容以产生解密的内容,以及(b)(ii)检查解密的内容。 本文描述了其它实施例。

    Policy-Based Trusted Inspection of Rights Managed Content
    5.
    发明申请
    Policy-Based Trusted Inspection of Rights Managed Content 有权
    基于策略的可信赖的权限管理内容检测

    公开(公告)号:US20150347768A1

    公开(公告)日:2015-12-03

    申请号:US14367405

    申请日:2013-12-19

    Abstract: An embodiment includes a method executed by at least one processor comprising: initializing first and second secure enclaves each comprising a trusted software execution environment that prevents software executing outside the first and second secure enclaves from having access to software and data inside the first and second secure enclaves; the first secure enclave (a)(i) inspecting a policy, (a)(ii) authenticating the second secure enclave in response to inspecting the policy; and (a)(iii) communicating encrypted content to the second secure enclave in response to authenticating the second secure enclave; and the second secure enclave (b)(i) decrypting the encrypted content to produce decrypted content, and (b)(ii) inspecting the decrypted content. Other embodiments are described herein.

    Abstract translation: 一个实施例包括由至少一个处理器执行的方法,包括:初始化第一和第二安全空间,每个包括可信软件执行环境,其防止在第一和第二安全区域之外执行的软件在第一和第二安全区域内访问软件和数据 飞地 第一个安全飞地(a)(i)检查政策,(a)(ii)对检查该政策的第二个安全飞地进行认证; 和(a)(iii)响应于认证所述第二安全飞地而将加密的内容传送到所述第二安全飞地; 和第二安全飞地(b)(i)解密加密的内容以产生解密的内容,以及(b)(ii)检查解密的内容。 本文描述了其它实施例。

Patent Agency Ranking