GB2550698B - Method and Apparatus to provide secure application execution - Google Patents
Method and Apparatus to provide secure application executionInfo
- Publication number
- GB2550698B GB2550698B GB1709341.0A GB201709341A GB2550698B GB 2550698 B GB2550698 B GB 2550698B GB 201709341 A GB201709341 A GB 201709341A GB 2550698 B GB2550698 B GB 2550698B
- Authority
- GB
- United Kingdom
- Prior art keywords
- application execution
- secure application
- provide secure
- execution
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1709341.0A GB2550698B (en) | 2009-12-22 | 2009-12-22 | Method and Apparatus to provide secure application execution |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1709341.0A GB2550698B (en) | 2009-12-22 | 2009-12-22 | Method and Apparatus to provide secure application execution |
GB1118724.2A GB2481563B (en) | 2009-12-22 | 2009-12-22 | Method and apparatus to provide secure application execution |
PCT/US2009/069212 WO2011078855A1 (en) | 2009-12-22 | 2009-12-22 | Method and apparatus to provide secure application execution |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201709341D0 GB201709341D0 (en) | 2017-07-26 |
GB2550698A GB2550698A (en) | 2017-11-29 |
GB2550698B true GB2550698B (en) | 2018-04-11 |
Family
ID=44196072
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1118724.2A Expired - Fee Related GB2481563B (en) | 2009-12-22 | 2009-12-22 | Method and apparatus to provide secure application execution |
GB1709341.0A Expired - Fee Related GB2550698B (en) | 2009-12-22 | 2009-12-22 | Method and Apparatus to provide secure application execution |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1118724.2A Expired - Fee Related GB2481563B (en) | 2009-12-22 | 2009-12-22 | Method and apparatus to provide secure application execution |
Country Status (7)
Country | Link |
---|---|
JP (1) | JP5443599B2 (en) |
KR (1) | KR101457355B1 (en) |
CN (1) | CN102473224B (en) |
BR (1) | BRPI0924512A2 (en) |
DE (1) | DE112009005466T5 (en) |
GB (2) | GB2481563B (en) |
WO (1) | WO2011078855A1 (en) |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9087200B2 (en) | 2009-12-22 | 2015-07-21 | Intel Corporation | Method and apparatus to provide secure application execution |
US8739177B2 (en) | 2010-06-21 | 2014-05-27 | Intel Corporation | Method for network interface sharing among multiple virtual machines |
US9053042B2 (en) | 2012-06-27 | 2015-06-09 | Intel Corporation | Method, system, and device for modifying a secure enclave configuration without changing the enclave measurement |
US9519803B2 (en) * | 2012-11-30 | 2016-12-13 | Intel Corporation | Secure environment for graphics processing units |
SI3486245T1 (en) | 2012-12-07 | 2021-09-30 | Vertex Pharmaceuticals Incorporated | 2-amino-n-(piperidin-1-yl-pyridin-3-yl) pyrazolo(1,5alpha)pyrimidine-3-carboxamid as inhibitor of atr kinase |
US9747102B2 (en) * | 2012-12-28 | 2017-08-29 | Intel Corporation | Memory management in secure enclaves |
US9323686B2 (en) * | 2012-12-28 | 2016-04-26 | Intel Corporation | Paging in secure enclaves |
US20140189246A1 (en) * | 2012-12-31 | 2014-07-03 | Bin Xing | Measuring applications loaded in secure enclaves at runtime |
WO2014137338A1 (en) * | 2013-03-06 | 2014-09-12 | Intel Corporation | Roots-of-trust for measurement of virtual machines |
US9058494B2 (en) | 2013-03-15 | 2015-06-16 | Intel Corporation | Method, apparatus, system, and computer readable medium to provide secure operation |
US9430384B2 (en) * | 2013-03-31 | 2016-08-30 | Intel Corporation | Instructions and logic to provide advanced paging capabilities for secure enclave page caches |
US9087202B2 (en) * | 2013-05-10 | 2015-07-21 | Intel Corporation | Entry/exit architecture for protected device modules |
WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
US9338918B2 (en) | 2013-07-10 | 2016-05-10 | Samsung Electronics Co., Ltd. | Socket interposer and computer system using the socket interposer |
US20150033034A1 (en) * | 2013-07-23 | 2015-01-29 | Gideon Gerzon | Measuring a secure enclave |
US9698989B2 (en) | 2013-07-23 | 2017-07-04 | Intel Corporation | Feature licensing in a secure processing environment |
US9767044B2 (en) | 2013-09-24 | 2017-09-19 | Intel Corporation | Secure memory repartitioning |
US9501668B2 (en) | 2013-09-25 | 2016-11-22 | Intel Corporation | Secure video ouput path |
WO2015060858A1 (en) * | 2013-10-24 | 2015-04-30 | Intel Corporation | Methods and apparatus for protecting software from unauthorized copying |
US10121144B2 (en) * | 2013-11-04 | 2018-11-06 | Apple Inc. | Using biometric authentication for NFC-based payments |
EP3084614B1 (en) * | 2013-12-17 | 2020-03-04 | Intel Corporation | Secure enclaves for use by kernel mode applications |
EP3084667A4 (en) * | 2013-12-19 | 2017-07-26 | Intel Corporation | Policy-based trusted inspection of rights managed content |
KR101883816B1 (en) | 2013-12-19 | 2018-07-31 | 인텔 코포레이션 | Technologies for supporting multiple digital rights management protocols on a client device |
US9448950B2 (en) | 2013-12-24 | 2016-09-20 | Intel Corporation | Using authenticated manifests to enable external certification of multi-processor platforms |
US9413765B2 (en) | 2014-03-25 | 2016-08-09 | Intel Corporation | Multinode hubs for trusted computing |
US9864861B2 (en) | 2014-03-27 | 2018-01-09 | Intel Corporation | Object oriented marshaling scheme for calls to a secure region |
US9703733B2 (en) * | 2014-06-27 | 2017-07-11 | Intel Corporation | Instructions and logic to interrupt and resume paging in a secure enclave page cache |
US9705892B2 (en) | 2014-06-27 | 2017-07-11 | Intel Corporation | Trusted time service for offline mode |
CN105573831B (en) * | 2014-10-13 | 2019-11-26 | 龙芯中科技术有限公司 | Data transfering method and device |
US10181027B2 (en) | 2014-10-17 | 2019-01-15 | Intel Corporation | Interface between a device and a secure processing environment |
US9940456B2 (en) | 2014-12-16 | 2018-04-10 | Intel Corporation | Using trusted execution environments for security of code and data |
US9710622B2 (en) * | 2015-02-23 | 2017-07-18 | Intel Corporation | Instructions and logic to fork processes of secure enclaves and establish child enclaves in a secure enclave page cache |
US9606940B2 (en) | 2015-03-27 | 2017-03-28 | Intel Corporation | Methods and apparatus to utilize a trusted loader in a trusted computing environment |
US9875189B2 (en) | 2015-06-12 | 2018-01-23 | Intel Corporation | Supporting secure memory intent |
US9716710B2 (en) * | 2015-06-26 | 2017-07-25 | Intel Corporation | Technologies for virtualized access to security services provided by a converged manageability and security engine |
US9996479B2 (en) * | 2015-08-17 | 2018-06-12 | Micron Technology, Inc. | Encryption of executables in computational memory |
US10061941B2 (en) | 2015-08-19 | 2018-08-28 | Altera Corporation | Systems and methods for multiport to multiport cryptography |
US10031861B2 (en) | 2015-09-25 | 2018-07-24 | Intel Corporation | Protect non-memory encryption engine (non-mee) metadata in trusted execution environment |
WO2017085159A1 (en) * | 2015-11-19 | 2017-05-26 | Nagravision S.A. | Method to verify the execution integrity of an application in a target device |
US9798641B2 (en) * | 2015-12-22 | 2017-10-24 | Intel Corporation | Method to increase cloud availability and silicon isolation using secure enclaves |
US10503931B2 (en) * | 2016-05-09 | 2019-12-10 | Arris Enterprises Llc | Method and apparatus for dynamic executable verification |
GB2555961B (en) | 2016-11-14 | 2019-08-28 | Google Llc | System of enclaves |
US10324857B2 (en) * | 2017-01-26 | 2019-06-18 | Intel Corporation | Linear memory address transformation and management |
CN108469986B (en) * | 2017-02-23 | 2021-04-09 | 华为技术有限公司 | Data migration method and device |
GB2563882B (en) * | 2017-06-28 | 2019-10-23 | Advanced Risc Mach Ltd | Interrupting sequences of command actions performed upon memory regions |
WO2019002816A1 (en) | 2017-06-28 | 2019-01-03 | Arm Limited | Memory region locking |
GB2564097B (en) * | 2017-06-28 | 2019-10-23 | Advanced Risc Mach Ltd | Memory region locking |
CN107392011B (en) * | 2017-08-22 | 2019-11-22 | 海光信息技术有限公司 | A kind of page transfer method |
KR102080497B1 (en) * | 2017-10-31 | 2020-02-24 | 삼성에스디에스 주식회사 | Method for Exchanging Data between Channels of System based on Multi-Channel Blockchain and System thereof |
US20190140846A1 (en) * | 2017-11-03 | 2019-05-09 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment(s) based on chain of trust including platform |
US11943368B2 (en) | 2017-11-03 | 2024-03-26 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment based on chain of trust including platform |
US10867092B2 (en) | 2017-12-16 | 2020-12-15 | Intel Corporation | Avoiding asynchronous enclave exits based on requests to invalidate translation lookaside buffer entries |
US10552344B2 (en) | 2017-12-26 | 2020-02-04 | Intel Corporation | Unblock instruction to reverse page block during paging |
US10970390B2 (en) * | 2018-02-15 | 2021-04-06 | Intel Corporation | Mechanism to prevent software side channels |
US10838773B2 (en) * | 2018-03-30 | 2020-11-17 | Intel Corporation | Techniques for dynamic resource allocation among cryptographic domains |
US11556436B2 (en) | 2018-08-22 | 2023-01-17 | Intel Corporation | Memory enclaves using process address space identifiers in a scalable input/output (I/O) virtualization (S-IOV) architecture |
CN110032883B (en) * | 2019-01-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method, system and node for realizing privacy protection in block chain |
CN110008736A (en) * | 2019-01-31 | 2019-07-12 | 阿里巴巴集团控股有限公司 | The method and node, storage medium of secret protection are realized in block chain |
CN111614464B (en) * | 2019-01-31 | 2023-09-29 | 创新先进技术有限公司 | Method for safely updating secret key in blockchain, node and storage medium |
CN110032885B (en) * | 2019-02-19 | 2020-03-06 | 阿里巴巴集团控股有限公司 | Method, node and storage medium for implementing privacy protection in block chain |
CN109901880B (en) * | 2019-02-28 | 2020-11-20 | 瑞芯微电子股份有限公司 | Spinlock hardware circuit and electronic equipment |
CN110069920A (en) * | 2019-03-06 | 2019-07-30 | 上海交通大学 | Guarantee the method and system of SGX safety based on virtualization |
CN110096887B (en) | 2019-03-22 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Trusted computing method and server |
EP3646216B1 (en) | 2019-04-19 | 2021-04-14 | Advanced New Technologies Co., Ltd. | Methods and devices for executing trusted applications on processor with support for protected execution environments |
JP6885640B1 (en) * | 2020-10-01 | 2021-06-16 | 株式会社ラムダシステムズ | Image processing device |
US11792644B2 (en) * | 2021-06-21 | 2023-10-17 | Motional Ad Llc | Session key generation for autonomous vehicle operation |
CN113821835B (en) * | 2021-11-24 | 2022-02-08 | 飞腾信息技术有限公司 | Key management method, key management device and computing equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020184046A1 (en) * | 2001-05-30 | 2002-12-05 | Fujitsu Limited | Code execution apparatus and code distributing method |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4098478B2 (en) * | 2001-01-31 | 2008-06-11 | 株式会社東芝 | Microprocessor |
JP4263976B2 (en) * | 2003-09-24 | 2009-05-13 | 株式会社東芝 | On-chip multi-core tamper resistant processor |
US7934076B2 (en) * | 2004-09-30 | 2011-04-26 | Intel Corporation | System and method for limiting exposure of hardware failure information for a secured execution environment |
CA2593441A1 (en) * | 2005-02-11 | 2006-08-17 | Universal Data Protection Corporation | Method and system for microprocessor data security |
CN101116081A (en) * | 2005-02-11 | 2008-01-30 | 通用数据保护公司 | Method and system for microprocessor data security |
US7657754B2 (en) * | 2005-12-08 | 2010-02-02 | Agere Systems Inc | Methods and apparatus for the secure handling of data in a microcontroller |
JP4795812B2 (en) * | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | Secure processor |
US8973094B2 (en) * | 2006-05-26 | 2015-03-03 | Intel Corporation | Execution of a secured environment initialization instruction on a point-to-point interconnect system |
JP2008033457A (en) * | 2006-07-26 | 2008-02-14 | Internatl Business Mach Corp <Ibm> | Method and central processing unit for processing encrypted software |
JP4912921B2 (en) * | 2007-02-27 | 2012-04-11 | 富士通セミコンダクター株式会社 | Secure processor system, secure processor, and secure processor system control method |
-
2009
- 2009-12-22 BR BRPI0924512A patent/BRPI0924512A2/en not_active Application Discontinuation
- 2009-12-22 GB GB1118724.2A patent/GB2481563B/en not_active Expired - Fee Related
- 2009-12-22 CN CN200980160114.XA patent/CN102473224B/en not_active Expired - Fee Related
- 2009-12-22 DE DE112009005466T patent/DE112009005466T5/en not_active Withdrawn
- 2009-12-22 JP JP2012516046A patent/JP5443599B2/en not_active Expired - Fee Related
- 2009-12-22 WO PCT/US2009/069212 patent/WO2011078855A1/en active Application Filing
- 2009-12-22 KR KR1020127016450A patent/KR101457355B1/en active IP Right Grant
- 2009-12-22 GB GB1709341.0A patent/GB2550698B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020184046A1 (en) * | 2001-05-30 | 2002-12-05 | Fujitsu Limited | Code execution apparatus and code distributing method |
Also Published As
Publication number | Publication date |
---|---|
JP2012530961A (en) | 2012-12-06 |
GB2481563B (en) | 2017-07-19 |
BRPI0924512A2 (en) | 2016-03-01 |
KR101457355B1 (en) | 2014-11-04 |
GB2481563A (en) | 2011-12-28 |
GB201118724D0 (en) | 2011-12-14 |
GB2550698A (en) | 2017-11-29 |
WO2011078855A9 (en) | 2011-09-09 |
GB201709341D0 (en) | 2017-07-26 |
CN102473224A (en) | 2012-05-23 |
CN102473224B (en) | 2016-10-12 |
JP5443599B2 (en) | 2014-03-19 |
KR20120099472A (en) | 2012-09-10 |
WO2011078855A1 (en) | 2011-06-30 |
DE112009005466T5 (en) | 2012-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2550698B (en) | Method and Apparatus to provide secure application execution | |
GB201102311D0 (en) | Methods and apparatus related to management of experiments | |
GB0914650D0 (en) | Apparatus and method | |
GB0921440D0 (en) | Apparatus and method | |
PT2229800E (en) | Method and apparatus to release resources | |
GB0902880D0 (en) | Apparatus and method | |
GB0901034D0 (en) | Apparatus and method | |
GB201003190D0 (en) | Apparatus and method | |
GB0901257D0 (en) | Apparatus and method | |
GB0911730D0 (en) | Method and apparatus | |
ZA201106893B (en) | Application apparatus and method | |
EP2468065A4 (en) | Method and apparatus for connecting to external device | |
HK1136659A1 (en) | Compiler and implementation method thereof | |
GB0921706D0 (en) | Method and apparatus | |
GB0911293D0 (en) | Method and apparatus | |
GB0908736D0 (en) | Method and apparatus | |
GB0905198D0 (en) | Apparatus and method | |
GB201206624D0 (en) | Prrolysis apparatus and methods using same | |
PL2609509T3 (en) | Software instrumentation apparatus and method | |
GB0920543D0 (en) | Apparatus and method | |
GB201005885D0 (en) | Apparatus and method | |
GB201003255D0 (en) | Apparatus and method | |
GB0911236D0 (en) | Computing device and method | |
GB0904389D0 (en) | Apparatus and method | |
GB201005757D0 (en) | Apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20191222 |