TECHNOLOGIES FOR SECURE TRUSTED I/O ACCESS CONTROL
    21.
    发明申请
    TECHNOLOGIES FOR SECURE TRUSTED I/O ACCESS CONTROL 审中-公开
    安全有效的I / O访问控制技术

    公开(公告)号:US20170024569A1

    公开(公告)日:2017-01-26

    申请号:US14974944

    申请日:2015-12-18

    Abstract: Technologies for trusted I/O (TIO) include a computing device with a cryptographic engine and one or more I/O controllers. The computing device executes a TIO core service that has a cryptographic engine programming privileged granted by an operating system. The TIO core service receives a request from an application to protect a DMA channel. The TIO core service requests the operating system to protect the DMA channel, and the operating system verifies the cryptographic engine programming privilege of the TIO core service in response. The operating system programs the cryptographic engine to protect the DMA channel in response to verifying the cryptographic engine programming privilege of the TIO core service. If a privileged delegate determines that a user has confirmed termination of protection of the DMA channel, the TIO core service may unprotect the DMA channel. Other embodiments are described and claimed.

    Abstract translation: 可信任I / O(TIO)技术包括具有加密引擎和一个或多个I / O控制器的计算设备。 计算设备执行具有由操作系统许可的加密引擎编程的TIO核心服务。 TIO核心服务接收来自应用程序的请求以保护DMA通道。 TIO核心服务请求操作系统保护DMA通道,操作系统会对TIO核心服务的加密引擎编程权限进行验证。 响应于验证TIO核心服务的加密引擎编程权限,操作系统对加密引擎进行编程以保护DMA通道。 如果特权代表确定用户已经确认终止对DMA通道的保护,TIO核心服务可能会取消保护DMA通道。 描述和要求保护其他实施例。

    Methods and Apparatus to Utilize A Trusted Loader In A Trusted Computing Environment
    22.
    发明申请
    Methods and Apparatus to Utilize A Trusted Loader In A Trusted Computing Environment 有权
    在可信计算环境中利用可信加载器的方法和装置

    公开(公告)号:US20160283411A1

    公开(公告)日:2016-09-29

    申请号:US14671222

    申请日:2015-03-27

    Abstract: An embodiment includes at least one machine readable medium on which is stored code that, when executed enables a system to initialize a trusted loader enclave (TL) and a measurement and storage manager enclave (MSM) within a memory of the system, to receive by the MSM a TL measurement of the TL from a trusted processor of the system, to determine whether to establish a secure channel between the MSM and the TL based at least in part on the TL measurement, and responsive to a determination to establish the secure channel, to establish the secure channel and store particular code in the TL. Additional embodiments are described and claimed.

    Abstract translation: 一个实施例包括至少一个机器可读介质,其上存储有代码,当被执行时,系统能够使系统初始化系统的存储器内的受信任加载器飞地(TL)和测量和存储管理器飞地(MSM),以便通过 MSM是来自系统的可信处理器的TL的TL测量,以至少部分地基于TL测量来确定是否在MSM和TL之间建立安全信道,并且响应于建立安全信道的确定 ,以建立安全通道并将特定代码存储在TL中。 描述和要求保护附加的实施例。

    EFFICIENT EXCEPTION HANDLING IN TRUSTED EXECUTION ENVIRONMENTS

    公开(公告)号:US20230205869A1

    公开(公告)日:2023-06-29

    申请号:US17561412

    申请日:2021-12-23

    CPC classification number: G06F21/53 G06F9/30145 G06F9/30105

    Abstract: Systems, methods, and apparatuses relating efficient exception handling in trusted execution environments are described. In an embodiment, a hardware processor includes a register, a decoder, and execution circuitry. The register has a field to be set to enable an architecturally protected execution environment at one of a plurality of contexts for code in an architecturally protected enclave in memory. The decoder is to decode an instruction having a format including a field for an opcode, the opcode to indicate that the execution circuitry is to perform a context change. The execution circuitry is to perform one or more operations corresponding to the instruction, the one or more operations including changing, within the architecturally protected enclave, from a first context to a second context.

    TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O

    公开(公告)号:US20190278911A1

    公开(公告)日:2019-09-12

    申请号:US16280351

    申请日:2019-02-20

    Abstract: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

Patent Agency Ranking