-
公开(公告)号:US11200300B2
公开(公告)日:2021-12-14
申请号:US16013816
申请日:2018-06-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Giridhar Viswanathan , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M Schultz , Balaji Balasubramanyan , Hari R Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Ahmed Saruhan Karademir
Abstract: Techniques for secure sharing of data in computing systems are disclosed herein. In one embodiment, a method includes when exchanging data between the host operating system and the guest operating system, encrypting, at a trusted platform module (TPM) of the host, data to be exchanged with a first key to generate encrypted data. The method also includes transmitting the encrypted data from the host operating system to the guest operating system and decrypting, at the guest operating system, the transmitted encrypted data using a second key previously exchanged between the TPM of the host and a virtual TPM of the guest operating system.
-
公开(公告)号:US10855725B2
公开(公告)日:2020-12-01
申请号:US15171917
申请日:2016-06-02
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navin Narayan Pai , Charles G. Jeffries , Giridhar Viswanathan , Benjamin M. Schultz , Frederick J. Smith , Lars Reuther , Michael B. Ebersol , Gerardo Diaz Cuellar , Ivan Dimitrov Pashov , Poornananda R. Gaddehosur , Hari R. Pulapaka , Vikram Mangalore Rao
Abstract: A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.
-
公开(公告)号:US20190370436A1
公开(公告)日:2019-12-05
申请号:US15994928
申请日:2018-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ahmed Saruhan Karademir , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M. Schultz , Balaji Balasubramanyan , Hari R. Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Giridhar Viswanathan
Abstract: Techniques for memory assignment for guest operating systems are disclosed herein. In one embodiment, a method includes generating a license blob containing data representing a product key copied from a record of license information in the host storage upon receiving a user request to launch an application in the guest operating system. The method also includes storing the generated license blob in a random memory location accessible by the guest operating system. The guest operating system can then query the license blob for permission to launch the application and launching the application in the guest operating system without having a separate product key for the guest operating system.
-
公开(公告)号:US11762964B2
公开(公告)日:2023-09-19
申请号:US17580335
申请日:2022-01-20
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Maxwell Christopher Renke , Taylor James Stark , Benjamin M. Schultz , Giridhar Viswanathan , Frederick Justus Smith , Deepu Chandy Thomas , Hari R. Pulapaka , Amber Tianqi Guo
CPC classification number: G06F21/121 , G06F3/067 , G06F3/0622 , G06F3/0631 , G06F3/0659 , G06F12/1433 , G06F12/1458 , G06F21/552 , G06F21/79
Abstract: Memory is partitioned and isolated in container-based memory enclaves. The container-based memory enclaves have attestable security guarantees. During provisioning of the container-based memory enclaves from a container image, a purported link in the container to a memory address of the enclave is modified to verifiably link to an actual memory address of the host, such as partitioned memory enclave. In some instances, enclave attestation reports can be validated without transmitting corresponding attestation requests to remote attestation services, based on previous attestation of one or more previous container attestation reports from a similar container and without requiring end-to-end attestation between the container and remote attestation service for each new attestation request.
-
公开(公告)号:US20220147465A1
公开(公告)日:2022-05-12
申请号:US17580335
申请日:2022-01-20
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Maxwell Christopher Renke , Taylor James Stark , Benjamin M. Schultz , Giridhar Viswanathan , Frederick Justus Smith , Deepu Chandy Thomas , Hari R. Pulapaka , Amber Tianqi Guo
Abstract: Memory is partitioned and isolated in container-based memory enclaves. The container-based memory enclaves have attestable security guarantees. During provisioning of the container-based memory enclaves from a container image, a purported link in the container to a memory address of the enclave is modified to verifiably link to an actual memory address of the host, such as partitioned memory enclave. In some instances, enclave attestation reports can be validated without transmitting corresponding attestation requests to remote attestation services, based on previous attestation of one or more previous container attestation reports from a similar container and without requiring end-to-end attestation between the container and remote attestation service for each new attestation request.
-
公开(公告)号:US10885193B2
公开(公告)日:2021-01-05
申请号:US15894745
申请日:2018-02-12
Applicant: Microsoft Technology Licensing, LLC
Inventor: Bryan R. Born , Giridhar Viswanathan , Peteris Ledins , Balaji Balasubramanyan , Margarit Simeonov Chenchev , Benjamin M. Schultz , Hari R. Pulapaka , Frederick Justus Smith , Narasimhan Ramasubramanian , Raphael Gianotti Serrano Dos Santo , Nived Kalappuraikal Sivadas , Ravinder Thind , Matthew David Kurjanowicz
Abstract: Securely performing file operations. A method includes determining a trust characteristic assigned to a file. When the trust characteristic assigned to the file meets or exceeds a predetermined trust condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the container operating system. When the trust characteristic assigned to the file does not meet or exceed the predetermined trust condition, then the method includes performing the file operation on the file in the container operating system while preventing the file operation from being performed directly in the host operating system.
-
公开(公告)号:US10666655B2
公开(公告)日:2020-05-26
申请号:US15818481
申请日:2017-11-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Gerardo Diaz Cuellar , Navin Narayan Pai , Ivan Dimitrov Pashov , Giridhar Viswanathan , Benjamin M. Schultz , Hari R. Pulapaka
Abstract: Providing access control by a first operating system. A method includes receiving at the first operating system, from the second operating system, a request for a bounding reference to a set having at least one resource. A bounding reference for the set is obtained. The bounding reference comprises a reference created from a first operating system resolvable reference to the set. The method further includes providing the obtained bounding reference for the obtained provided bounding reference to the second operating system. A request, including the obtained bounding reference and an identifier identifying the second operating system for the set, is received from the second operating system. The obtained bounding reference and the identifier identifying the second operating system are evaluated. As a result of evaluating the obtained bounding reference and the identifier identifying the second operating system, a resource control action is performed.
-
公开(公告)号:US10277407B2
公开(公告)日:2019-04-30
申请号:US15248463
申请日:2016-08-26
Applicant: Microsoft Technology Licensing, LLC
Inventor: Christopher Edward Fenner , Peter David Waxman , Gabriel Fortunato Stocco , Kam Kouladjie , Cristian Stefan Salvan , Prabu Raju , Himanshu Soni , Giridhar Viswanathan
Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
-
公开(公告)号:US20170302459A1
公开(公告)日:2017-10-19
申请号:US15248463
申请日:2016-08-26
Applicant: Microsoft Technology Licensing, LLC
Inventor: Christopher Edward Fenner , Peter David Waxman , Gabriel Fortunato Stocco , Kam Kouladjie , Cristian Stefan Salvan , Prabu Raju , Himanshu Soni , Giridhar Viswanathan
CPC classification number: H04L9/3268 , G06F19/00 , G06F21/57 , H04L9/0819 , H04L9/0825 , H04L9/321 , H04L9/3213 , H04L9/3234 , H04L9/3247 , H04L9/3271 , H04L63/0823
Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
-
公开(公告)号:US10885189B2
公开(公告)日:2021-01-05
申请号:US15601759
申请日:2017-05-22
Applicant: Microsoft Technology Licensing, LLC
Inventor: Charles G. Jeffries , Benjamin M. Schultz , Giridhar Viswanathan , Frederick Justus Smith , David Guy Weston , Ankit Srivastava , Ling Tony Chen , Hari R. Pulapaka
Abstract: A host operating system running on a computing device monitors resource access by an application running in a container that is isolated from the host operating system. In response to detecting resource access by the application, a security event is generated describing malicious activity that occurs from the accessing the resource. This security event is analyzed to determine a threat level of the malicious activity. If the threat level does not satisfy a threat level threshold, the host operating system allows the application to continue accessing resources and continues to monitor resource access. When the threat level satisfies the threat level threshold, the operating system takes corrective action to prevent the malicious activity from spreading beyond the isolated container. Through the use of security events, the host operating system is protected from even kernel-level attacks without using resources required to run anti-virus software in the isolated container.
-
-
-
-
-
-
-
-
-