BRPI0924512A2 - method and apparatus providing secure application execution - Google Patents

method and apparatus providing secure application execution

Info

Publication number
BRPI0924512A2
BRPI0924512A2 BRPI0924512A BRPI0924512A BRPI0924512A2 BR PI0924512 A2 BRPI0924512 A2 BR PI0924512A2 BR PI0924512 A BRPI0924512 A BR PI0924512A BR PI0924512 A BRPI0924512 A BR PI0924512A BR PI0924512 A2 BRPI0924512 A2 BR PI0924512A2
Authority
BR
Brazil
Prior art keywords
method
application execution
secure application
apparatus providing
providing secure
Prior art date
Application number
BRPI0924512A
Other languages
Portuguese (pt)
Inventor
Bernard Lint
Carlos V Rozas
David Durham
Dion Rodgers
Don A Van Dyke
Ernie Brickel
Francis X Mckeen
Gary Graunke
Gilbert Neiger
Howard C Herbert
Jiang Tao Li
John Garney
Joseph Cihula
Michael A Goldsmith
Prashant Dewan
Simon P Johnson
Stalinselvaraj Jeyasingh
Stephen J Tolopka
Stephen R Van Doren
Uday R Savagankar
Vincent R Scarlata
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to PCT/US2009/069212 priority Critical patent/WO2011078855A1/en
Publication of BRPI0924512A2 publication Critical patent/BRPI0924512A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Abstract

abstract not avaible abstract not avaible
BRPI0924512A 2009-12-22 2009-12-22 method and apparatus providing secure application execution BRPI0924512A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2009/069212 WO2011078855A1 (en) 2009-12-22 2009-12-22 Method and apparatus to provide secure application execution

Publications (1)

Publication Number Publication Date
BRPI0924512A2 true BRPI0924512A2 (en) 2016-03-01

Family

ID=44196072

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0924512A BRPI0924512A2 (en) 2009-12-22 2009-12-22 method and apparatus providing secure application execution

Country Status (7)

Country Link
JP (1) JP5443599B2 (en)
KR (1) KR101457355B1 (en)
CN (1) CN102473224B (en)
BR (1) BRPI0924512A2 (en)
DE (1) DE112009005466T5 (en)
GB (2) GB2550698B (en)
WO (1) WO2011078855A1 (en)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9087200B2 (en) 2009-12-22 2015-07-21 Intel Corporation Method and apparatus to provide secure application execution
US8739177B2 (en) 2010-06-21 2014-05-27 Intel Corporation Method for network interface sharing among multiple virtual machines
US9053042B2 (en) 2012-06-27 2015-06-09 Intel Corporation Method, system, and device for modifying a secure enclave configuration without changing the enclave measurement
US9519803B2 (en) * 2012-11-30 2016-12-13 Intel Corporation Secure environment for graphics processing units
US9323686B2 (en) * 2012-12-28 2016-04-26 Intel Corporation Paging in secure enclaves
US9747102B2 (en) 2012-12-28 2017-08-29 Intel Corporation Memory management in secure enclaves
US20140189246A1 (en) * 2012-12-31 2014-07-03 Bin Xing Measuring applications loaded in secure enclaves at runtime
CN104969234B (en) * 2013-03-06 2018-06-12 英特尔公司 Root of trust for measurement of virtual machines
US9058494B2 (en) * 2013-03-15 2015-06-16 Intel Corporation Method, apparatus, system, and computer readable medium to provide secure operation
US9430384B2 (en) * 2013-03-31 2016-08-30 Intel Corporation Instructions and logic to provide advanced paging capabilities for secure enclave page caches
US9087202B2 (en) * 2013-05-10 2015-07-21 Intel Corporation Entry/exit architecture for protected device modules
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
US9338918B2 (en) 2013-07-10 2016-05-10 Samsung Electronics Co., Ltd. Socket interposer and computer system using the socket interposer
US9698989B2 (en) * 2013-07-23 2017-07-04 Intel Corporation Feature licensing in a secure processing environment
US20150033034A1 (en) * 2013-07-23 2015-01-29 Gideon Gerzon Measuring a secure enclave
US9767044B2 (en) 2013-09-24 2017-09-19 Intel Corporation Secure memory repartitioning
US9501668B2 (en) 2013-09-25 2016-11-22 Intel Corporation Secure video ouput path
US9536063B2 (en) 2013-10-24 2017-01-03 Intel Corporation Methods and apparatus for protecting software from unauthorized copying
US10121144B2 (en) * 2013-11-04 2018-11-06 Apple Inc. Using biometric authentication for NFC-based payments
WO2015094176A1 (en) * 2013-12-17 2015-06-25 Intel Corporation Secure enclaves for use by kernel mode applications
CN105745661A (en) * 2013-12-19 2016-07-06 英特尔公司 Policy-based trusted inspection of rights managed content
CN105745660B (en) * 2013-12-19 2018-11-16 英特尔公司 Techniques for the client device supports a plurality of digital rights management protocols
US9448950B2 (en) 2013-12-24 2016-09-20 Intel Corporation Using authenticated manifests to enable external certification of multi-processor platforms
US9413765B2 (en) 2014-03-25 2016-08-09 Intel Corporation Multinode hubs for trusted computing
US9864861B2 (en) * 2014-03-27 2018-01-09 Intel Corporation Object oriented marshaling scheme for calls to a secure region
US9703733B2 (en) * 2014-06-27 2017-07-11 Intel Corporation Instructions and logic to interrupt and resume paging in a secure enclave page cache
US9705892B2 (en) 2014-06-27 2017-07-11 Intel Corporation Trusted time service for offline mode
CN105573831A (en) * 2014-10-13 2016-05-11 龙芯中科技术有限公司 Data transfer method and device
US10181027B2 (en) 2014-10-17 2019-01-15 Intel Corporation Interface between a device and a secure processing environment
US9940456B2 (en) 2014-12-16 2018-04-10 Intel Corporation Using trusted execution environments for security of code and data
US9606940B2 (en) 2015-03-27 2017-03-28 Intel Corporation Methods and apparatus to utilize a trusted loader in a trusted computing environment
US9875189B2 (en) 2015-06-12 2018-01-23 Intel Corporation Supporting secure memory intent
US10061941B2 (en) * 2015-08-19 2018-08-28 Altera Corporation Systems and methods for multiport to multiport cryptography
US10031861B2 (en) 2015-09-25 2018-07-24 Intel Corporation Protect non-memory encryption engine (non-mee) metadata in trusted execution environment
US9798641B2 (en) * 2015-12-22 2017-10-24 Intel Corporation Method to increase cloud availability and silicon isolation using secure enclaves
GB2563882A (en) * 2017-06-28 2019-01-02 Advanced Risc Mach Ltd Interrupting sequences of command actions performed upon memory regions
GB2564097A (en) * 2017-06-28 2019-01-09 Advanced Risc Mach Ltd Memory region locking
US20190140846A1 (en) * 2017-11-03 2019-05-09 Microsoft Technology Licensing, Llc Provisioning trusted execution environment(s) based on chain of trust including platform

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4098478B2 (en) * 2001-01-31 2008-06-11 株式会社東芝 Microprocessor
JP2002353960A (en) * 2001-05-30 2002-12-06 Fujitsu Ltd Code performing device and code distributing method
JP4263976B2 (en) * 2003-09-24 2009-05-13 株式会社東芝 On-chip multi-core type tamper resistant processor
US7934076B2 (en) * 2004-09-30 2011-04-26 Intel Corporation System and method for limiting exposure of hardware failure information for a secured execution environment
CA2593441A1 (en) * 2005-02-11 2006-08-17 Universal Data Protection Corporation Method and system for microprocessor data security
CN101116081A (en) * 2005-02-11 2008-01-30 通用数据保护公司 Method and system for microprocessor data security
US7657754B2 (en) * 2005-12-08 2010-02-02 Agere Systems Inc Methods and apparatus for the secure handling of data in a microcontroller
JP4795812B2 (en) * 2006-02-22 2011-10-19 富士通セミコンダクター株式会社 Secure processor
US8973094B2 (en) * 2006-05-26 2015-03-03 Intel Corporation Execution of a secured environment initialization instruction on a point-to-point interconnect system
JP2008033457A (en) * 2006-07-26 2008-02-14 Internatl Business Mach Corp <Ibm> Method and central processing unit for processing encrypted software
JP4912921B2 (en) * 2007-02-27 2012-04-11 富士通セミコンダクター株式会社 Secure processor system, the control method of the secure processor and secure processor system

Also Published As

Publication number Publication date
KR101457355B1 (en) 2014-11-04
GB2550698A (en) 2017-11-29
CN102473224B (en) 2016-10-12
GB2550698B (en) 2018-04-11
DE112009005466T5 (en) 2012-10-31
JP5443599B2 (en) 2014-03-19
WO2011078855A1 (en) 2011-06-30
CN102473224A (en) 2012-05-23
KR20120099472A (en) 2012-09-10
GB2481563B (en) 2017-07-19
GB2481563A (en) 2011-12-28
JP2012530961A (en) 2012-12-06
GB201709341D0 (en) 2017-07-26
GB201118724D0 (en) 2011-12-14
WO2011078855A9 (en) 2011-09-09

Similar Documents

Publication Publication Date Title
BRPI0913211A2 (en) navigation device and method
BRPI0918170A2 (en) method and curable composition
BRPI0919672A2 (en) tensioning devices cable and related methods.
BRPI0914623A2 (en) consultation and association ID
BR112012025683A2 (en) method and system for name pronunciation guide services
BRPI0919074A2 (en) inertia stimulus for multi-touch object
BR112014017238A2 (en) and accelerated connection method setting unit
BRPI1007450A2 (en) display device
BR112012000808A2 (en) Tower set telescopic and method
BRPI0914267A2 (en) display device and device and electric
BRPI1007445A2 (en) fiber means and method and apparatus for forming the same.
BR112013010224A2 (en) &#34;Composite structure and process&#34;
BRPI0912918A2 (en) Respiratory drug application apparatus
BRPI1009599A2 (en)
BRPI1009499A2 (en) device and information processing method, and program
BR112013022525A2 (en) devices and methods for skin tightening
BRPI1007206A2 (en) eletroa-active and associated electronic glasses
BRPI0916296B1 (en) Access method and apparatus
BRPI1013655A2 (en) device and surgical method
BRPI1014966A2 (en) apparatus and menu display method, and program.
BRPI1008295A2 (en) apparatus and bone junction method
BRPI1008424A2 (en) cooling and electric machine cooling electric machine construction method
BRPI0916253A2 (en) including medical device and associated method wrinkled braiding
BRPI0923150A2 (en) system and method of providing computer resources
BRPI0921726A2 (en) Method and device for activating stem cells

Legal Events

Date Code Title Description
B15K Others concerning applications: alteration of classification

Ipc: G06F 12/14 (2006.01), G06F 21/72 (2013.01), G06F 2