BR112022024916A2 - Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados - Google Patents
Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiadosInfo
- Publication number
- BR112022024916A2 BR112022024916A2 BR112022024916A BR112022024916A BR112022024916A2 BR 112022024916 A2 BR112022024916 A2 BR 112022024916A2 BR 112022024916 A BR112022024916 A BR 112022024916A BR 112022024916 A BR112022024916 A BR 112022024916A BR 112022024916 A2 BR112022024916 A2 BR 112022024916A2
- Authority
- BR
- Brazil
- Prior art keywords
- access
- access domain
- access control
- control system
- security domains
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
- G06F9/5016—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
SISTEMA E MÉTODO DE CONTROLE DE ACESSO PARA ISOLAR DOMÍNIOS DE SEGURANÇA MUTUAMENTE DESCONFIADOS. O controle de acesso a recursos em um sistema em um chip (SoC) pode empregar um agente que é executado em um processador do SoC e um mecanismo de gerenciamento de confiança do SoC. O agente, tal como, por exemplo, um sistema operacional de alto nível ou um hipervisor, pode ser configurado para alocar um recurso, compreendendo uma região de memória, a um domínio de acesso e carregar uma imagem de software associada ao domínio de acesso na região de memória. O mecanismo de gerenciamento de confiança pode ser configurado para travar o recurso contra acesso por qualquer entidade além do domínio de acesso, para autenticar a imagem de software associada ao domínio de acesso e para inicializar o domínio de acesso em resposta a uma autenticação bemsucedida da imagem de software associada ao domínio de acesso.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/903,982 | 2020-06-17 | ||
| US16/903,982 US11783042B2 (en) | 2020-06-17 | 2020-06-17 | Access control system and method for isolating mutually distrusting security domains |
| PCT/US2021/033930 WO2021257251A1 (en) | 2020-06-17 | 2021-05-24 | Access control system and method for isolating mutually distrusting security domains |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| BR112022024916A2 true BR112022024916A2 (pt) | 2022-12-27 |
| BR112022024916B1 BR112022024916B1 (pt) | 2025-03-18 |
Family
ID=
Also Published As
| Publication number | Publication date |
|---|---|
| US20210397714A1 (en) | 2021-12-23 |
| KR20230024899A (ko) | 2023-02-21 |
| CN115698994A (zh) | 2023-02-03 |
| TW202203058A (zh) | 2022-01-16 |
| EP4168912A1 (en) | 2023-04-26 |
| KR102832150B1 (ko) | 2025-07-08 |
| WO2021257251A1 (en) | 2021-12-23 |
| US11783042B2 (en) | 2023-10-10 |
| TWI877371B (zh) | 2025-03-21 |
| EP4168912C0 (en) | 2024-09-25 |
| EP4168912B1 (en) | 2024-09-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jang et al. | Heterogeneous isolated execution for commodity gpus | |
| US9519596B2 (en) | Resource access control in a system-on-chip | |
| JP6083097B2 (ja) | ハードウェア保護アプリケーションのシステム・サービス要求相互作用を容易化する方法 | |
| US10459850B2 (en) | System and method for virtualized process isolation including preventing a kernel from accessing user address space | |
| Gregor et al. | Trust management as a service: Enabling trusted execution in the face of byzantine stakeholders | |
| BR112021021511A2 (pt) | Mitigação de ransomware em aplicativos isolados e integrados | |
| US10192067B2 (en) | Self-described security model for resource access | |
| CN103907101A (zh) | 用于管理器环境中的内核rootkit防护的系统和方法 | |
| CN107077428A (zh) | 保护应用秘密免受操作系统攻击 | |
| CN103858129A (zh) | 用于在系统管理程序环境中进行内核rootkit保护的系统和方法 | |
| EP4020156B1 (en) | Reducing latency of hardware trusted execution environments | |
| Zobaed et al. | Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study | |
| Lebedev et al. | Sanctorum: A lightweight security monitor for secure enclaves | |
| Tan et al. | Pipellm: Fast and confidential large language model services with speculative pipelined encryption | |
| Hada et al. | Security agents: A mobile agent based trust model for cloud computing | |
| US20120110348A1 (en) | Secure Page Tables in Multiprocessor Environments | |
| US20170255780A1 (en) | Methods and systems for securely executing untrusted software | |
| CN107135223A (zh) | 海量数据管理系统的数据持久化方法 | |
| Zegzhda et al. | Use of Intel SGX to ensure the confidentiality of data of cloud users | |
| US20200167085A1 (en) | Operating a secure storage device | |
| BR112022024916A2 (pt) | Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados | |
| Park et al. | A tiny hypervisor-based trusted geolocation framework with minimized TPM operations | |
| Gjerdrum et al. | Performance principles for trusted computing with intel SGX | |
| Brookes et al. | Rethinking operating system design: Asymmetric multiprocessing for security and performance | |
| Potteiger et al. | Data space randomization for securing cyber-physical systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
| B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 24/05/2021, OBSERVADAS AS CONDICOES LEGAIS |