CL2019002027A1 - Direccionamiento de un entorno de ejecución confiable utilizando clave de cifrado. - Google Patents
Direccionamiento de un entorno de ejecución confiable utilizando clave de cifrado.Info
- Publication number
- CL2019002027A1 CL2019002027A1 CL2019002027A CL2019002027A CL2019002027A1 CL 2019002027 A1 CL2019002027 A1 CL 2019002027A1 CL 2019002027 A CL2019002027 A CL 2019002027A CL 2019002027 A CL2019002027 A CL 2019002027A CL 2019002027 A1 CL2019002027 A1 CL 2019002027A1
- Authority
- CL
- Chile
- Prior art keywords
- protected data
- encryption key
- protocol head
- addressing protocol
- applicant
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Computer And Data Communications (AREA)
Abstract
EN ESTE DOCUMENTO SE DESCRIBEN MÉTODOS, SISTEMAS, Y DISPOSITIVOS PARA ENTREGAR DATOS PROTEGIDOS A UN ENTORNO DE EJECUCIÓN CONFIABLE (TREE) ANIDADO, QUE INCLUYE UN TRUSTLET EJECUTÁNDOSE SOBRE KERNEL SEGURO, ASOCIADO CON UN SOLICITANTE POTENCIALMENTE NO CONFIABLE. EN UN ASPECTO, UNA CABEZA DE PROTOCOLO DE DIRECCIONAMIENTO, U OTRO INTERMEDIARIO ENTRE UN SOLICITANTE Y UN SISTEMA DE GESTIÓN DE CLAVES U OTRO ALMACÉN DE DATOS PROTEGIDOS, PUEDE RECIBIR UNA SOLICITUD DE DATOS PROTEGIDOS DE UN SOLICITANTE POTENCIALMENTE NO CONFIABLE, Y UNA DECLARACIÓN DE AFIRMACIÓN DEL KERNEL SEGURO. LA CABEZA DE PROTOCOLO DE DIRECCIONAMIENTO PUEDE CIFRAR UNA CLAVE DE CIFRADO DE TRANSFERENCIA CON UNA SEGUNDA CLAVE DE CIFRADO DERIVADA DE LA DECLARACIÓN DE AFIRMACIÓN. LA CABEZA DE PROTOCOLO DE DIRECCIONAMIENTO PUEDE RECUPERAR LOS DATOS PROTEGIDOS, Y CIFRAR LOS DATOS PROTEGIDOS CON LA CLAVE DE CIFRADO DE TRANSFERENCIA Y UNA ETIQUETA DE AUTENTICACIÓN, QUE UNE EL SOLICITANTE CON EL ID DE TRUSTLET. LA CABEZA DE PROTOCOLO DE DIRECCIONAMIENTO PUEDE PROPORCIONAR LA CLAVE DE CIFRADO DE TRANSFERENCIA CIFRADA, LOS DATOS PROTEGIDOS CIFRADOS, Y LA ETIQUETA DE AUTENTICACIÓN CIFRADA AL SOLICITANTE.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/417,060 US10897459B2 (en) | 2017-01-26 | 2017-01-26 | Addressing a trusted execution environment using encryption key |
Publications (1)
Publication Number | Publication Date |
---|---|
CL2019002027A1 true CL2019002027A1 (es) | 2019-12-13 |
Family
ID=60991590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CL2019002027A CL2019002027A1 (es) | 2017-01-26 | 2019-07-19 | Direccionamiento de un entorno de ejecución confiable utilizando clave de cifrado. |
Country Status (18)
Country | Link |
---|---|
US (1) | US10897459B2 (es) |
EP (1) | EP3574434B1 (es) |
JP (1) | JP2020506612A (es) |
KR (1) | KR102443857B1 (es) |
CN (1) | CN110249332B (es) |
AU (1) | AU2017396530B2 (es) |
BR (1) | BR112019013398A2 (es) |
CA (1) | CA3048894C (es) |
CL (1) | CL2019002027A1 (es) |
CO (1) | CO2019007876A2 (es) |
IL (1) | IL268006B (es) |
MX (1) | MX2019008694A (es) |
NZ (1) | NZ754543A (es) |
PH (1) | PH12019550116A1 (es) |
RU (1) | RU2756048C2 (es) |
SG (1) | SG11201905456UA (es) |
WO (1) | WO2018140169A1 (es) |
ZA (1) | ZA201903701B (es) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10897360B2 (en) | 2017-01-26 | 2021-01-19 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using clean room provisioning |
US10972265B2 (en) | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105308616B (zh) * | 2013-04-18 | 2018-07-17 | 费思康有限公司 | 文件安全方法及其设备 |
US10771439B2 (en) * | 2017-06-28 | 2020-09-08 | Microsoft Technology Licensing, Llc | Shielded networks for virtual machines |
US10521360B1 (en) | 2017-10-18 | 2019-12-31 | Google Llc | Combined integrity protection, encryption and authentication |
US10509914B1 (en) * | 2017-10-27 | 2019-12-17 | Vmware, Inc. | Data policy implementation in a tag-based policy architecture |
US11475147B2 (en) | 2018-02-20 | 2022-10-18 | International Business Machines Corporation | Implementing policy-based container-level encryption |
US11095652B2 (en) * | 2018-02-20 | 2021-08-17 | International Business Machines Corporation | Implementing a separation of duties for container security |
US11443072B2 (en) | 2018-06-29 | 2022-09-13 | Microsoft Technology Licensing, Llc | Peripheral device with resource isolation |
US11126757B2 (en) * | 2018-10-19 | 2021-09-21 | Microsoft Technology Licensing, Llc | Peripheral device |
EP3628087B1 (en) | 2019-03-26 | 2021-09-08 | Advanced New Technologies Co., Ltd. | Field-programmable gate array based trusted execution environment for use in a blockchain network |
US11347875B2 (en) * | 2020-01-28 | 2022-05-31 | Intel Corporation | Cryptographic separation of memory on device with use in DMA protection |
US11469890B2 (en) * | 2020-02-06 | 2022-10-11 | Google Llc | Derived keys for connectionless network protocols |
US11888972B2 (en) | 2020-02-26 | 2024-01-30 | Red Hat, Inc. | Split security for trusted execution environments |
US11630683B2 (en) | 2020-02-26 | 2023-04-18 | Red Hat, Inc. | Low latency launch for trusted execution environments |
US11620411B2 (en) | 2020-03-24 | 2023-04-04 | Red Hat, Inc. | Elastic launch for trusted execution environments |
CN112597458B (zh) * | 2020-12-22 | 2023-12-01 | 北京八分量信息科技有限公司 | 基于可信认证进行身份认证的方法、装置及相关产品 |
CN113722726B (zh) * | 2021-02-09 | 2024-04-05 | 京东科技控股股份有限公司 | 基于软硬件协同的加解密方法及系统 |
KR102580570B1 (ko) * | 2021-10-15 | 2023-09-21 | 네이버클라우드 주식회사 | 클라우드 서버 내 가상 서버의 복호화 방법 및 이를 이용하는 클라우드 서버 |
CN114036527B (zh) * | 2021-11-04 | 2023-01-31 | 云海链控股股份有限公司 | 一种代码注入方法、代码运行端、代码注入端及相关设备 |
CN114553590B (zh) * | 2022-03-17 | 2023-08-22 | 抖音视界有限公司 | 数据传输方法及相关设备 |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7437771B2 (en) * | 2004-04-19 | 2008-10-14 | Woodcock Washburn Llp | Rendering protected digital content within a network of computing devices or the like |
US7697691B2 (en) * | 2004-07-14 | 2010-04-13 | Intel Corporation | Method of delivering Direct Proof private keys to devices using an on-line service |
US8538028B2 (en) | 2006-11-20 | 2013-09-17 | Toposis Corporation | System and method for secure electronic communication services |
US8059820B2 (en) * | 2007-10-11 | 2011-11-15 | Microsoft Corporation | Multi-factor content protection |
JP5349580B2 (ja) * | 2008-10-10 | 2013-11-20 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | サービスノード、その制御方法、ユーザノード、及びその制御方法 |
US8321956B2 (en) * | 2009-06-17 | 2012-11-27 | Microsoft Corporation | Remote access control of storage devices |
US20120239936A1 (en) | 2009-12-18 | 2012-09-20 | Nokia Corporation | Credential transfer |
US8478996B2 (en) | 2009-12-21 | 2013-07-02 | International Business Machines Corporation | Secure Kerberized access of encrypted file system |
US9087200B2 (en) * | 2009-12-22 | 2015-07-21 | Intel Corporation | Method and apparatus to provide secure application execution |
WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
US10496824B2 (en) * | 2011-06-24 | 2019-12-03 | Microsoft Licensing Technology, LLC | Trusted language runtime on a mobile platform |
US8862767B2 (en) * | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
US9055443B2 (en) * | 2011-10-27 | 2015-06-09 | T-Mobile Usa, Inc. | Mobile device-type locking |
US9319884B2 (en) * | 2011-10-27 | 2016-04-19 | T-Mobile Usa, Inc. | Remote unlocking of telecommunication device functionality |
US9413538B2 (en) * | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
US9450949B2 (en) | 2012-02-28 | 2016-09-20 | Giesecke & Devrient Gmbh | Method for computer access control by means of mobile end device |
US9591484B2 (en) * | 2012-04-20 | 2017-03-07 | T-Mobile Usa, Inc. | Secure environment for subscriber device |
EP2680487B1 (en) | 2012-06-29 | 2019-04-10 | Orange | Secured cloud data storage, distribution and restoration among multiple devices of a user |
US8874916B2 (en) * | 2012-09-28 | 2014-10-28 | Intel Corporation | Introduction of discrete roots of trust |
US8924727B2 (en) | 2012-10-12 | 2014-12-30 | Intel Corporation | Technologies labeling diverse content |
US9578664B1 (en) * | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9141769B1 (en) | 2013-02-08 | 2015-09-22 | Amazon Technologies, Inc. | Secure transfer and use of secret material in a shared environment |
US9118639B2 (en) | 2013-03-14 | 2015-08-25 | Intel Corporation | Trusted data processing in the public cloud |
US10177915B2 (en) * | 2013-03-15 | 2019-01-08 | Ologn Technologies Ag | Systems, methods and apparatuses for device attestation based on speed of computation |
EP3036680B1 (en) | 2013-08-21 | 2018-07-18 | Intel Corporation | Processing data privately in the cloud |
US9405912B2 (en) * | 2013-11-14 | 2016-08-02 | Microsoft Technology Licensing, Llc | Hardware rooted attestation |
US9514317B2 (en) * | 2013-12-19 | 2016-12-06 | Intel Corporation | Policy-based trusted inspection of rights managed content |
WO2015094326A1 (en) | 2013-12-20 | 2015-06-25 | Intel Corporation | Secure import and export of keying material |
EP2887607A1 (en) | 2013-12-23 | 2015-06-24 | Orange | Migration of assets of a trusted execution environment |
KR101891420B1 (ko) * | 2013-12-24 | 2018-08-23 | 인텔 코포레이션 | DaaS를 위한 컨텐츠 보호 |
US9686077B2 (en) * | 2014-03-06 | 2017-06-20 | Microsoft Technology Licensing, Llc | Secure hardware for cross-device trusted applications |
US9474095B2 (en) | 2014-03-26 | 2016-10-18 | Intel IP Corporation | Systems, methods, and devices for distributed setup for a device-to-device session |
US9411975B2 (en) | 2014-03-31 | 2016-08-09 | Intel Corporation | Methods and apparatus to securely share data |
US9652631B2 (en) * | 2014-05-05 | 2017-05-16 | Microsoft Technology Licensing, Llc | Secure transport of encrypted virtual machines with continuous owner access |
GB201408539D0 (en) * | 2014-05-14 | 2014-06-25 | Mastercard International Inc | Improvements in mobile payment systems |
US10601978B2 (en) * | 2014-06-04 | 2020-03-24 | T-Mobile Usa, Inc. | Telecommunication device utilization based on heartbeat communication |
US9525668B2 (en) | 2014-06-27 | 2016-12-20 | Intel Corporation | Face based secure messaging |
US9519787B2 (en) * | 2014-11-14 | 2016-12-13 | Microsoft Technology Licensing, Llc | Secure creation of encrypted virtual machines from encrypted templates |
US9940456B2 (en) * | 2014-12-16 | 2018-04-10 | Intel Corporation | Using trusted execution environments for security of code and data |
US9621547B2 (en) * | 2014-12-22 | 2017-04-11 | Mcafee, Inc. | Trust establishment between a trusted execution environment and peripheral devices |
US9860057B2 (en) | 2014-12-23 | 2018-01-02 | Intel Corporation | Diffie-Hellman key agreement using an M-of-N threshold scheme |
FR3031613B1 (fr) * | 2015-01-09 | 2018-04-06 | Ingenico Group | Procede de traitement d'une transaction a partir d'un terminal de communication. |
US10193700B2 (en) | 2015-02-27 | 2019-01-29 | Samsung Electronics Co., Ltd. | Trust-zone-based end-to-end security |
US9860221B2 (en) | 2015-03-10 | 2018-01-02 | Intel Corporation | Internet of things group formation using a key-based join protocol |
US9578008B2 (en) | 2015-05-11 | 2017-02-21 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
EP3101607A1 (en) * | 2015-06-02 | 2016-12-07 | Orange | NFC-ENABLED DEVICES FOR & xA;PERFORMING SECURE CONTACTLESS TRANSACTIONS AND USING HCE |
US10079677B2 (en) * | 2015-06-05 | 2018-09-18 | Apple Inc. | Secure circuit for encryption key generation |
US10270591B2 (en) | 2015-06-30 | 2019-04-23 | Activevideo Networks, Inc. | Remotely managed trusted execution environment for digital-rights management in a distributed network with thin clients |
US9781016B1 (en) * | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
EP3179690A1 (en) | 2015-12-11 | 2017-06-14 | Gemalto Sa | Mobile device having trusted execution environment |
GB201522244D0 (en) * | 2015-12-16 | 2016-01-27 | Nagravision Sa | Hardware integrity check |
US11017066B2 (en) * | 2015-12-29 | 2021-05-25 | Huawei Technologies Co., Ltd. | Method for associating application program with biometric feature, apparatus, and mobile terminal |
GB2546740A (en) | 2016-01-26 | 2017-08-02 | Worldpay Ltd | Electronic payment system and method |
US10412191B1 (en) * | 2016-03-30 | 2019-09-10 | Amazon Technologies, Inc. | Hardware validation |
US20170289197A1 (en) | 2016-03-31 | 2017-10-05 | Qualcomm Incorporated | Transport layer security token binding and trusted signing |
US10277407B2 (en) * | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
KR102425368B1 (ko) | 2016-05-02 | 2022-07-27 | 삼성전자주식회사 | 가상 sim 운용 방법 및 그 장치 |
US10581815B2 (en) * | 2016-05-02 | 2020-03-03 | Intel Corporation | Technologies for secure mediated reality content publishing |
KR20180135940A (ko) * | 2016-08-09 | 2018-12-21 | 후아웨이 테크놀러지 컴퍼니 리미티드 | 시스템 온 칩 및 처리 장치 |
US10733284B2 (en) | 2016-10-06 | 2020-08-04 | Samsung Electronics Co., Ltd. | Trusted execution environment secure element communication |
US10700865B1 (en) * | 2016-10-21 | 2020-06-30 | Sequitur Labs Inc. | System and method for granting secure access to computing services hidden in trusted computing environments to an unsecure requestor |
KR102604046B1 (ko) | 2016-11-28 | 2023-11-23 | 삼성전자주식회사 | 전자 기기의 프로그램 관리 방법 및 장치 |
US10127409B1 (en) * | 2016-12-16 | 2018-11-13 | Square, Inc. | Tamper detection system |
US10530777B2 (en) | 2017-01-24 | 2020-01-07 | Microsoft Technology Licensing, Llc | Data unsealing with a sealing enclave |
US10419402B2 (en) | 2017-01-26 | 2019-09-17 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using signing key |
US10972265B2 (en) | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
US10897360B2 (en) | 2017-01-26 | 2021-01-19 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using clean room provisioning |
-
2017
- 2017-01-26 US US15/417,060 patent/US10897459B2/en active Active
- 2017-12-20 BR BR112019013398-4A patent/BR112019013398A2/pt unknown
- 2017-12-20 CA CA3048894A patent/CA3048894C/en active Active
- 2017-12-20 RU RU2019126625A patent/RU2756048C2/ru active
- 2017-12-20 WO PCT/US2017/067460 patent/WO2018140169A1/en unknown
- 2017-12-20 JP JP2019540658A patent/JP2020506612A/ja active Pending
- 2017-12-20 MX MX2019008694A patent/MX2019008694A/es unknown
- 2017-12-20 NZ NZ754543A patent/NZ754543A/en unknown
- 2017-12-20 SG SG11201905456UA patent/SG11201905456UA/en unknown
- 2017-12-20 CN CN201780084684.XA patent/CN110249332B/zh active Active
- 2017-12-20 KR KR1020197021865A patent/KR102443857B1/ko active IP Right Grant
- 2017-12-20 AU AU2017396530A patent/AU2017396530B2/en active Active
- 2017-12-20 EP EP17829838.6A patent/EP3574434B1/en active Active
-
2019
- 2019-06-10 ZA ZA2019/03701A patent/ZA201903701B/en unknown
- 2019-06-28 PH PH12019550116A patent/PH12019550116A1/en unknown
- 2019-07-11 IL IL268006A patent/IL268006B/en unknown
- 2019-07-19 CL CL2019002027A patent/CL2019002027A1/es unknown
- 2019-07-22 CO CONC2019/0007876A patent/CO2019007876A2/es unknown
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10897360B2 (en) | 2017-01-26 | 2021-01-19 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using clean room provisioning |
US10972265B2 (en) | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
Also Published As
Publication number | Publication date |
---|---|
BR112019013398A2 (pt) | 2020-03-03 |
ZA201903701B (en) | 2020-10-28 |
SG11201905456UA (en) | 2019-08-27 |
KR102443857B1 (ko) | 2022-09-15 |
CO2019007876A2 (es) | 2019-07-31 |
JP2020506612A (ja) | 2020-02-27 |
KR20190109419A (ko) | 2019-09-25 |
RU2019126625A3 (es) | 2021-04-08 |
US10897459B2 (en) | 2021-01-19 |
IL268006B (en) | 2022-01-01 |
IL268006A (en) | 2019-09-26 |
AU2017396530A1 (en) | 2019-07-04 |
NZ754543A (en) | 2023-03-31 |
WO2018140169A1 (en) | 2018-08-02 |
MX2019008694A (es) | 2019-09-11 |
US20180212940A1 (en) | 2018-07-26 |
AU2017396530B2 (en) | 2021-10-21 |
RU2756048C2 (ru) | 2021-09-24 |
CA3048894C (en) | 2024-06-04 |
CN110249332B (zh) | 2023-05-23 |
RU2019126625A (ru) | 2021-02-26 |
EP3574434B1 (en) | 2021-01-20 |
EP3574434A1 (en) | 2019-12-04 |
CA3048894A1 (en) | 2018-08-02 |
CN110249332A (zh) | 2019-09-17 |
PH12019550116A1 (en) | 2019-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CL2019002027A1 (es) | Direccionamiento de un entorno de ejecución confiable utilizando clave de cifrado. | |
CL2019002026A1 (es) | Direccionamiento de un entorno de ejecución confiable utilizando clave de firma. | |
CL2018002362A1 (es) | Almacenamiento y transferencia seguros resistentes a pérdida de múltiples partes de claves criptográficas para sistemas a base de cadena de bloques en conjunto con un sistema de administración de billetera. | |
CO2019013817A2 (es) | Sistema y método para la identificación biométrica | |
BR112016024453A8 (pt) | método implementado por computador para gerenciar conjunto de dados, sistema de computação e meio de armazenamento legível por computador físico | |
BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
PH12018502160A1 (en) | Systems and methods for secure storage of user information in a user profile | |
WO2017058408A3 (en) | Protect non-memory encryption engine (non-mee) metadata in trusted execution environment | |
BR112017007994A2 (pt) | armazenamento para dados criptografados com segurança reforçada | |
BR112018016810A2 (pt) | método e sistema implementado por computador para criptografia de dados em um dispositivo eletrônico, dispositivo eletrônico e programa de computador | |
WO2015134760A3 (en) | Secure hardware for cross-device trusted applications | |
BR112018012417A2 (pt) | dispositivo de registrando, método de registrando, método de configurador, dispositivo de configurador, e produto de programa de computador | |
WO2017062128A3 (en) | Technologies for end-to-end biometric-based authentication and platform locality assertion | |
WO2016130406A3 (en) | Protecting sensitive data security | |
BR112016006445A2 (pt) | método para proteger mensagens de transação transitando entre um aplicativo móvel em um dispositivo móvel e um gateway (ponte de ligação), e sistema processador de transações | |
RU2018125244A (ru) | Устройство с безопасным хранением и извлечением данных | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
UY37898A (es) | Custodia de clave enmascarada conjunta | |
BR112018071634A2 (pt) | utilização de região isolada de segurança baseada em hardware para impedir pirataria e fraude em dispositivos eletrônicos | |
BR112019007567A2 (pt) | instrução de mensagem de cifra com autenticação | |
ATE427536T1 (de) | Verfahren und vorrichtung fur erhíhte rfid- ubertragungssicherheit | |
ATE541265T1 (de) | Randomisierung | |
WO2015188202A3 (en) | Point-to-point secure data store and communication system and method | |
WO2016053407A3 (en) | Speculative cryptographic processing for out of order data | |
MX2020002294A (es) | Sistema y metodo para proteger contenido. |