TECHNOLOGIES FOR INTEGRITY, ANTI-REPLAY, AND AUTHENTICITY ASSURANCE FOR I/O DATA
    21.
    发明申请
    TECHNOLOGIES FOR INTEGRITY, ANTI-REPLAY, AND AUTHENTICITY ASSURANCE FOR I/O DATA 审中-公开
    技术对于I / O数据的完整性,反复认证和认证保证

    公开(公告)号:WO2017014890A1

    公开(公告)日:2017-01-26

    申请号:PCT/US2016/038397

    申请日:2016-06-20

    Abstract: Technologies for authenticity assurance for I/O data include a computing device with a cryptographic engine and one or more I/O controllers. A metadata producer of the computing device performs an authenticated encryption operation on I/O data to generate encrypted I/O data and an authentication tag. The metadata producer stores the encrypted I/O data in a DMA buffer and the authentication tag in an authentication tag queue. A metadata consumer decrypts the encrypted I/O data from the DMA buffer and determines whether the encrypted I/O data is authentic using the authentication tag from the authentication tag queue. For input, the metadata producer may be embodied as the cryptographic engine and the metadata consumer may be embodied as a trusted software component. For output, the metadata producer may be embodied as the trusted software component and the metadata consumer may be embodied as the cryptographic engine. Other embodiments are described and claimed.

    Abstract translation: 用于I / O数据的真实性保证的技术包括具有加密引擎和一个或多个I / O控制器的计算设备。 计算设备的元数据生成器对I / O数据执行认证加密操作以产生加密的I / O数据和认证标签。 元数据生成器将加密的I / O数据存储在DMA缓冲器中,认证标签存储在认证标签队列中。 元数据消费者从DMA缓冲器解密加密的I / O数据,并使用来自认证标签队列的认证标签来确定加密的I / O数据是否是真实的。 对于输入,元数据生成器可以体现为加密引擎,并且元数据消费者可以被实现为可信软件组件。 对于输出,元数据生成器可以被实现为可信软件组件,并且元数据消费者可以被体现为密码引擎。 描述和要求保护其他实施例。

    TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O
    22.
    发明申请
    TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O 审中-公开
    用于硬件和硬件安全的技术用于受信任的I / O

    公开(公告)号:WO2017014888A1

    公开(公告)日:2017-01-26

    申请号:PCT/US2016/038395

    申请日:2016-06-20

    CPC classification number: G06F21/602 G06F13/28 G06F21/57

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

    Abstract translation: 用于可信I / O认证和验证的技术包括具有加密引擎和一个或多个I / O控制器的计算设备。 计算设备收集与由加密引擎保护的受信任的I / O使用相关联的静态附接的硬件I / O组件相关联的硬件认证信息。 计算设备验证硬件认证信息并且响应于验证安全地枚举一个或多个动态附加的硬件组件。 计算设备收集在安全枚举期间加载的可信软件组件的软件认证信息。 计算设备验证软件认证信息。 计算设备可以收集加载在I / O控制器中的固件的固件证明信息,并验证固件证明信息。 计算设备可以收集使用可信I / O使用的可信应用的应用认证信息,并验证应用认证信息。 描述和要求保护其他实施例。

    TECHNOLOGIES FOR SECURE TRUSTED I/O ACCESS CONTROL
    23.
    发明申请
    TECHNOLOGIES FOR SECURE TRUSTED I/O ACCESS CONTROL 审中-公开
    安全有效的I / O访问控制技术

    公开(公告)号:WO2017014887A1

    公开(公告)日:2017-01-26

    申请号:PCT/US2016/038394

    申请日:2016-06-20

    CPC classification number: G06F21/602 G06F13/28 G06F21/57

    Abstract: Technologies for trusted I/O (TIO) include a computing device with a cryptographic engine and one or more I/O controllers. The computing device executes a TIO core service that has a cryptographic engine programming privileged granted by an operating system. The TIO core service receives a request from an application to protect a DMA channel. The TIO core service requests the operating system to protect the DMA channel, and the operating system verifies the cryptographic engine programming privilege of the TIO core service in response. The operating system programs the cryptographic engine to protect the DMA channel in response to verifying the cryptographic engine programming privilege of the TIO core service. If a privileged delegate determines that a user has confirmed termination of protection of the DMA channel, the TIO core service may unprotect the DMA channel. Other embodiments are described and claimed.

    Abstract translation: 可信任I / O(TIO)技术包括具有加密引擎和一个或多个I / O控制器的计算设备。 计算设备执行具有由操作系统许可的密码引擎编程的TIO核心服务。 TIO核心服务接收来自应用程序的请求以保护DMA通道。 TIO核心服务请求操作系统保护DMA通道,操作系统会对TIO核心服务的加密引擎编程权限进行验证。 响应于验证TIO核心服务的加密引擎编程权限,操作系统对加密引擎进行编程以保护DMA通道。 如果特权委托确定用户已经确认终止对DMA通道的保护,TIO核心服务可能会取消保护DMA通道。 描述和要求保护其他实施例。

    BINDING A TRUSTED INPUT SESSION TO A TRUSTED OUTPUT SESSION
    24.
    发明申请
    BINDING A TRUSTED INPUT SESSION TO A TRUSTED OUTPUT SESSION 审中-公开
    将有争议的输入会议绑定到受信任的输出会议

    公开(公告)号:WO2016209548A1

    公开(公告)日:2016-12-29

    申请号:PCT/US2016/034699

    申请日:2016-05-27

    Abstract: According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a processor to execute an enclave application in an architecturally protected memory. The system includes at least one logic unit forming a trusted entity to, responsive to a request to set up a trusted I/O session, generate a unique session identifier logically associated with the trusted I/O session and set a trusted I/O session indicator to a first state. The system includes at least one logic unit forming a cryptographic module to, responsive to the request to set up the trusted I/O session, receive an encrypted encryption key and the unique session identifier from the enclave application; verify the unique session identifier; and responsive a successful verification, decrypt and save the decrypted encryption key in an encryption key register.

    Abstract translation: 根据本文提供的实施例,提供了将可信输出会话绑定到可信输入会话的系统。 该系统包括处理器,用于在架构受保护的存储器中执行飞地应用。 系统包括形成可信实体的至少一个逻辑单元,以响应于建立可信I / O会话的请求,生成与可信I / O会话逻辑关联的唯一会话标识符,并设置可信任I / O会话 指标到第一个状态。 该系统包括形成加密模块的至少一个逻辑单元,以响应于建立可信I / O会话的请求,从飞地应用接收加密的加密密钥和唯一的会话标识符; 验证唯一会话标识符; 并响应成功的验证,解密并将解密的加密密钥保存在加密密钥寄存器中。

    TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES
    25.
    发明申请
    TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES 审中-公开
    用于加密数据加密的技术,具有安全的包装

    公开(公告)号:WO2016153706A1

    公开(公告)日:2016-09-29

    申请号:PCT/US2016/019475

    申请日:2016-02-25

    CPC classification number: G06F21/71 G06F21/602 G06F21/74

    Abstract: Technologies for hardening encryption operations are disclosed. In some embodiments, the technologies harden encryption operations typically performed by kernel mode programs with a secure enclave that may run in user mode and/or in a pre-boot context. In some embodiments, the technologies leverage a shared buffer and a proxy to enable the use of a secure enclave hosted in user mode to perform encryption operations. In additional embodiments, the technologies utilize one or more pre-boot applications to enable the use of a secure enclave in a pre-boot phase, e.g., so as to enable the use of a secure enclave to decrypt data that may be needed to boot a computing device.

    Abstract translation: 公开了用于加密加密操作的技术。 在一些实施例中,这些技术硬化通常由具有可以在用户模式和/或预引导上下文中运行的安全空间的内核模式程序执行的加密操作。 在一些实施例中,技术利用共享缓冲器和代理来实现以用户模式托管的安全飞地的使用来执行加密操作。 在另外的实施例中,这些技术利用一个或多个预引导应用程序来使得能够在预引导阶段使用安全飞行器,例如,以便能够使用安全飞地来解密可能需要引导的数据 计算设备。

    TRANSPARENT EXECUTION OF SECRET CONTENT
    26.
    发明申请
    TRANSPARENT EXECUTION OF SECRET CONTENT 审中-公开
    秘密内容的透明执行

    公开(公告)号:WO2016081149A1

    公开(公告)日:2016-05-26

    申请号:PCT/US2015/056951

    申请日:2015-10-22

    CPC classification number: G06F21/84 G06F21/123 G06F2221/2125

    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.

    Abstract translation: 本申请旨在透明地执行秘密内容。 设备可能能够下载可以包括至少一个秘密部分的内容,其中内容的任何秘密部分可以被引导到设备操作系统组件,应用,用户等不可访问的设备中的安全工作场所。该设备 然后可以以允许内容的秘密部分执行而不需要直接访问的方式呈现内容。 例如,设备可以下载内容,并且设备中的引导器模块可以将下载的内容的任何秘密部分引导到安全的工作空间。 在执行内容期间,可以将秘密部分所需的任何输入提供给安全工作空间,然后可以在内容呈现期间使用来自秘密部分的所有结果输出。

Patent Agency Ranking