SHARED MEMORY IN A SECURE PROCESSING ENVIRONMENT
    4.
    发明申请
    SHARED MEMORY IN A SECURE PROCESSING ENVIRONMENT 有权
    安全处理环境中的共享内存

    公开(公告)号:US20150186272A1

    公开(公告)日:2015-07-02

    申请号:US14142838

    申请日:2013-12-28

    IPC分类号: G06F12/08

    摘要: Embodiments of an invention for sharing memory in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to match an offer to make a page in an enclave page cache shareable to a bid to make the page shareable. The execution unit is to execute the instruction. Execution of the instruction includes making the page shareable.

    摘要翻译: 公开了一种用于在安全处理环境中共享存储器的发明的实施例。 在一个实施例中,处理器包括指令单元和执行单元。 该指令单元将接收一个指令以匹配报价,使得在飞地页面缓存中的页面可共享到出价以使页面可共享。 执行单元执行指令。 执行该指令包括使页面可共享。

    MUTUALLY ASSURED DATA SHARING BETWEEN DISTRUSTING PARTIES IN A NETWORK ENVIRONMENT
    5.
    发明申请
    MUTUALLY ASSURED DATA SHARING BETWEEN DISTRUSTING PARTIES IN A NETWORK ENVIRONMENT 有权
    在网络环境中分派对之间的数据共享

    公开(公告)号:US20140283098A1

    公开(公告)日:2014-09-18

    申请号:US13844101

    申请日:2013-03-15

    IPC分类号: G06F21/60

    摘要: An apparatus for sharing information between entities includes a processor and a trusted execution module executing on the processor. The trusted execution module is configured to receive first confidential information from a first client device associated with a first entity, seal the first confidential information within a trusted execution environment, receive second confidential information from a second client device associated with a second entity, seal the second confidential information within the trusted execution environment, and execute code within the trusted execution environment. The code is configured to compute a confidential result based upon the first confidential information and the second confidential information.

    摘要翻译: 用于在实体之间共享信息的装置包括处理器和在处理器上执行的可信执行模块。 可信执行模块被配置为从与第一实体相关联的第一客户端设备接收第一机密信息,将可信执行环境中的第一机密信息密封,从与第二实体相关联的第二客户端设备接收第二机密信息, 可信执行环境中的第二机密信息,并在可信执行环境内执行代码。 代码被配置为基于第一机密信息和第二机密信息来计算机密结果。

    Method and apparatus for binding TPM keys to execution entities
    7.
    发明申请
    Method and apparatus for binding TPM keys to execution entities 有权
    将TPM密钥绑定到执行实体的方法和装置

    公开(公告)号:US20070006169A1

    公开(公告)日:2007-01-04

    申请号:US11170853

    申请日:2005-06-30

    IPC分类号: G06F9/44

    摘要: A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by an execution entity for authorization data. According to the authorization request, the execution entity may be measured to generate an entity digest value. Once the entity digest value is generated, a platform reference module may grant the authorization request if the entity digest value verifies that the execution entity is an owner of the key held by the TPM. Accordingly, in one embodiment, a platform reference module, rather than an execution entity, holds the authorization data required by a TPM to use a key owned by the execution entity and held within sealed storage by the TPM. Other embodiments are described and claimed.

    摘要翻译: 描述了将可信平台模块(TPM)密钥绑定到执行实体的方法和装置。 在一个实施例中,该方法包括接收由执行实体发出的授权数据的授权请求。 根据授权请求,可以测量执行实体以生成实体摘要值。 一旦生成实体摘要值,如果实体摘要值验证执行实体是TPM持有的密钥的所有者,则平台引用模块可以授予授权请求。 因此,在一个实施例中,平台参考模块而不是执行实体保存TPM所需的授权数据,以使用由执行实体拥有的密钥并由TPM保存在密封存储器内。 描述和要求保护其他实施例。

    Method and apparatus for migrating software-based security coprocessors

    公开(公告)号:US20060256106A1

    公开(公告)日:2006-11-16

    申请号:US11171134

    申请日:2005-06-29

    IPC分类号: G06T1/00

    摘要: A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual security coprocessor. In response to determining that the second processing system provides a trustworthy state for supporting the virtual security coprocessor, the first processing system transfers the virtual security coprocessor to the second processing system. In one embodiment, the first processing system receives a key and proof of bindings of the key from the second processing system. The first processing system may determine whether the second processing system provides a trustworthy state for migration of the virtual security coprocessor, based at least in part on the proof of bindings received from the second processing system. After the second processing system receives the virtual security coprocessor, the virtual security coprocessor may be removed from the first processing system. Other embodiments are described and claimed.