Invention Grant
US09363087B2 End-to-end security for hardware running verified software 有权
硬件运行验证软件的端到端安全性

End-to-end security for hardware running verified software
Abstract:
A verified software system may be executable on secure hardware. Prior to being executed, the software system may be verified as conforming to a software specification. First credentials attesting to an identity of the software system may be sent to an external application. Second credentials signed by a provider of the secure hardware may be sent to the external application. The second credentials may attest to an identity of the secure hardware. The external application may securely exchange one or more messages with a software application of the software system. For example, the one or more messages may be decryptable only by the external application and the software application to provide confidentiality for each message. As another example, an attestation may vouch for an identity of a sender of each of the one or more messages to attest to an integrity of each message.
Public/Granted literature
Information query
Patent Agency Ranking
0/0