BR112022024916A2 - Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados - Google Patents

Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados

Info

Publication number
BR112022024916A2
BR112022024916A2 BR112022024916A BR112022024916A BR112022024916A2 BR 112022024916 A2 BR112022024916 A2 BR 112022024916A2 BR 112022024916 A BR112022024916 A BR 112022024916A BR 112022024916 A BR112022024916 A BR 112022024916A BR 112022024916 A2 BR112022024916 A2 BR 112022024916A2
Authority
BR
Brazil
Prior art keywords
access
access domain
access control
control system
security domains
Prior art date
Application number
BR112022024916A
Other languages
English (en)
Other versions
BR112022024916B1 (pt
Inventor
Halter Steven
Asbe Samar
Ballesteros Miguel
Bhat Girish
Nemani Mahadevamurty
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of BR112022024916A2 publication Critical patent/BR112022024916A2/pt
Publication of BR112022024916B1 publication Critical patent/BR112022024916B1/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

SISTEMA E MÉTODO DE CONTROLE DE ACESSO PARA ISOLAR DOMÍNIOS DE SEGURANÇA MUTUAMENTE DESCONFIADOS. O controle de acesso a recursos em um sistema em um chip (SoC) pode empregar um agente que é executado em um processador do SoC e um mecanismo de gerenciamento de confiança do SoC. O agente, tal como, por exemplo, um sistema operacional de alto nível ou um hipervisor, pode ser configurado para alocar um recurso, compreendendo uma região de memória, a um domínio de acesso e carregar uma imagem de software associada ao domínio de acesso na região de memória. O mecanismo de gerenciamento de confiança pode ser configurado para travar o recurso contra acesso por qualquer entidade além do domínio de acesso, para autenticar a imagem de software associada ao domínio de acesso e para inicializar o domínio de acesso em resposta a uma autenticação bemsucedida da imagem de software associada ao domínio de acesso.
BR112022024916-0A 2020-06-17 2021-05-24 Método e sistema para o controle de acesso a recursos em um sistema em chip (soc), e memória legível por computador BR112022024916B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/903,982 2020-06-17
US16/903,982 US11783042B2 (en) 2020-06-17 2020-06-17 Access control system and method for isolating mutually distrusting security domains
PCT/US2021/033930 WO2021257251A1 (en) 2020-06-17 2021-05-24 Access control system and method for isolating mutually distrusting security domains

Publications (2)

Publication Number Publication Date
BR112022024916A2 true BR112022024916A2 (pt) 2022-12-27
BR112022024916B1 BR112022024916B1 (pt) 2025-03-18

Family

ID=

Also Published As

Publication number Publication date
US20210397714A1 (en) 2021-12-23
KR20230024899A (ko) 2023-02-21
CN115698994A (zh) 2023-02-03
TW202203058A (zh) 2022-01-16
EP4168912A1 (en) 2023-04-26
KR102832150B1 (ko) 2025-07-08
WO2021257251A1 (en) 2021-12-23
US11783042B2 (en) 2023-10-10
TWI877371B (zh) 2025-03-21
EP4168912C0 (en) 2024-09-25
EP4168912B1 (en) 2024-09-25

Similar Documents

Publication Publication Date Title
Jang et al. Heterogeneous isolated execution for commodity gpus
US9519596B2 (en) Resource access control in a system-on-chip
JP6083097B2 (ja) ハードウェア保護アプリケーションのシステム・サービス要求相互作用を容易化する方法
US10459850B2 (en) System and method for virtualized process isolation including preventing a kernel from accessing user address space
Gregor et al. Trust management as a service: Enabling trusted execution in the face of byzantine stakeholders
BR112021021511A2 (pt) Mitigação de ransomware em aplicativos isolados e integrados
US10192067B2 (en) Self-described security model for resource access
CN103907101A (zh) 用于管理器环境中的内核rootkit防护的系统和方法
CN107077428A (zh) 保护应用秘密免受操作系统攻击
CN103858129A (zh) 用于在系统管理程序环境中进行内核rootkit保护的系统和方法
EP4020156B1 (en) Reducing latency of hardware trusted execution environments
Zobaed et al. Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study
Lebedev et al. Sanctorum: A lightweight security monitor for secure enclaves
Tan et al. Pipellm: Fast and confidential large language model services with speculative pipelined encryption
Hada et al. Security agents: A mobile agent based trust model for cloud computing
US20120110348A1 (en) Secure Page Tables in Multiprocessor Environments
US20170255780A1 (en) Methods and systems for securely executing untrusted software
CN107135223A (zh) 海量数据管理系统的数据持久化方法
Zegzhda et al. Use of Intel SGX to ensure the confidentiality of data of cloud users
US20200167085A1 (en) Operating a secure storage device
BR112022024916A2 (pt) Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados
Park et al. A tiny hypervisor-based trusted geolocation framework with minimized TPM operations
Gjerdrum et al. Performance principles for trusted computing with intel SGX
Brookes et al. Rethinking operating system design: Asymmetric multiprocessing for security and performance
Potteiger et al. Data space randomization for securing cyber-physical systems

Legal Events

Date Code Title Description
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 24/05/2021, OBSERVADAS AS CONDICOES LEGAIS