MX2019008694A - Direccionamiento de un entorno de ejecucion confiable utilizando clave de cifrado. - Google Patents
Direccionamiento de un entorno de ejecucion confiable utilizando clave de cifrado.Info
- Publication number
- MX2019008694A MX2019008694A MX2019008694A MX2019008694A MX2019008694A MX 2019008694 A MX2019008694 A MX 2019008694A MX 2019008694 A MX2019008694 A MX 2019008694A MX 2019008694 A MX2019008694 A MX 2019008694A MX 2019008694 A MX2019008694 A MX 2019008694A
- Authority
- MX
- Mexico
- Prior art keywords
- encryption key
- protected data
- requester
- protocol head
- addressing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
En este documento se describen métodos, sistemas, y dispositivos para entregar datos protegidos a un entorno de ejecución confiable (TrEE) anidado, que incluye un trustlet ejecutándose sobre kernel seguro, asociado con un solicitante potencialmente no confiable. En un aspecto, una cabeza de protocolo de direccionamiento, u otro intermediario entre un solicitante y un sistema de gestión de claves u otro almacén de datos protegidos, puede recibir una solicitud de datos protegidos de un solicitante potencialmente no confiable, y una declaración de afirmación del kernel seguro. La cabeza de protocolo de direccionamiento puede cifrar una clave de cifrado de transferencia con una segunda clave de cifrado derivada de la declaración de afirmación. La cabeza de protocolo de direccionamiento puede recuperar los datos protegidos, y cifrar los datos protegidos con la clave de cifrado de transferencia y una etiqueta de autenticación, que une el solicitante con el ID de trustlet. La cabeza de protocolo de direccionamiento puede proporcionar la clave de cifrado de transferencia cifrada, los datos protegidos cifrados, y la etiqueta de autenticación cifrada al solicitante.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/417,060 US10897459B2 (en) | 2017-01-26 | 2017-01-26 | Addressing a trusted execution environment using encryption key |
| PCT/US2017/067460 WO2018140169A1 (en) | 2017-01-26 | 2017-12-20 | Addressing a trusted execution environment using encryption key |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MX2019008694A true MX2019008694A (es) | 2019-09-11 |
Family
ID=60991590
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2019008694A MX2019008694A (es) | 2017-01-26 | 2017-12-20 | Direccionamiento de un entorno de ejecucion confiable utilizando clave de cifrado. |
Country Status (18)
| Country | Link |
|---|---|
| US (1) | US10897459B2 (es) |
| EP (1) | EP3574434B1 (es) |
| JP (1) | JP2020506612A (es) |
| KR (1) | KR102443857B1 (es) |
| CN (1) | CN110249332B (es) |
| AU (1) | AU2017396530B2 (es) |
| CA (1) | CA3048894C (es) |
| CL (1) | CL2019002027A1 (es) |
| CO (1) | CO2019007876A2 (es) |
| IL (1) | IL268006B (es) |
| MX (1) | MX2019008694A (es) |
| MY (1) | MY203672A (es) |
| NZ (1) | NZ754543A (es) |
| PH (1) | PH12019550116A1 (es) |
| RU (1) | RU2756048C2 (es) |
| SG (1) | SG11201905456UA (es) |
| WO (1) | WO2018140169A1 (es) |
| ZA (1) | ZA201903701B (es) |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| BR112015026372B8 (pt) * | 2013-04-18 | 2024-02-15 | Facecon Co Ltd | Dispositivo de comunicação que reforça a segurança para um arquivo armazenado em uma unidade virtual |
| US10897360B2 (en) | 2017-01-26 | 2021-01-19 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using clean room provisioning |
| US10972265B2 (en) * | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
| US10771439B2 (en) * | 2017-06-28 | 2020-09-08 | Microsoft Technology Licensing, Llc | Shielded networks for virtual machines |
| US10521360B1 (en) | 2017-10-18 | 2019-12-31 | Google Llc | Combined integrity protection, encryption and authentication |
| US10509914B1 (en) * | 2017-10-27 | 2019-12-17 | Vmware, Inc. | Data policy implementation in a tag-based policy architecture |
| US11475147B2 (en) | 2018-02-20 | 2022-10-18 | International Business Machines Corporation | Implementing policy-based container-level encryption |
| US11095652B2 (en) * | 2018-02-20 | 2021-08-17 | International Business Machines Corporation | Implementing a separation of duties for container security |
| US11443072B2 (en) | 2018-06-29 | 2022-09-13 | Microsoft Technology Licensing, Llc | Peripheral device with resource isolation |
| US11126757B2 (en) | 2018-10-19 | 2021-09-21 | Microsoft Technology Licensing, Llc | Peripheral device |
| EP3628087B1 (en) * | 2019-03-26 | 2021-09-08 | Advanced New Technologies Co., Ltd. | Field-programmable gate array based trusted execution environment for use in a blockchain network |
| US11347875B2 (en) * | 2020-01-28 | 2022-05-31 | Intel Corporation | Cryptographic separation of memory on device with use in DMA protection |
| US11469890B2 (en) * | 2020-02-06 | 2022-10-11 | Google Llc | Derived keys for connectionless network protocols |
| US11888972B2 (en) | 2020-02-26 | 2024-01-30 | Red Hat, Inc. | Split security for trusted execution environments |
| US11630683B2 (en) | 2020-02-26 | 2023-04-18 | Red Hat, Inc. | Low latency launch for trusted execution environments |
| US11620411B2 (en) | 2020-03-24 | 2023-04-04 | Red Hat, Inc. | Elastic launch for trusted execution environments |
| CN112597458B (zh) * | 2020-12-22 | 2023-12-01 | 北京八分量信息科技有限公司 | 基于可信认证进行身份认证的方法、装置及相关产品 |
| CN113722726B (zh) * | 2021-02-09 | 2024-04-05 | 京东科技控股股份有限公司 | 基于软硬件协同的加解密方法及系统 |
| KR102580570B1 (ko) * | 2021-10-15 | 2023-09-21 | 네이버클라우드 주식회사 | 클라우드 서버 내 가상 서버의 복호화 방법 및 이를 이용하는 클라우드 서버 |
| CN114036527B (zh) * | 2021-11-04 | 2023-01-31 | 云海链控股股份有限公司 | 一种代码注入方法、代码运行端、代码注入端及相关设备 |
| CN114553590B (zh) * | 2022-03-17 | 2023-08-22 | 抖音视界有限公司 | 数据传输方法及相关设备 |
| US20240195635A1 (en) * | 2022-12-12 | 2024-06-13 | Intel Corporation | Roots of trust in intellectual property (ip) blocks in a system on a chip (soc) |
| WO2024229127A2 (en) * | 2023-05-02 | 2024-11-07 | Liveramp, Inc. | Privacy-safe clean room collaboration |
Family Cites Families (67)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7437771B2 (en) * | 2004-04-19 | 2008-10-14 | Woodcock Washburn Llp | Rendering protected digital content within a network of computing devices or the like |
| US7697691B2 (en) * | 2004-07-14 | 2010-04-13 | Intel Corporation | Method of delivering Direct Proof private keys to devices using an on-line service |
| US8538028B2 (en) | 2006-11-20 | 2013-09-17 | Toposis Corporation | System and method for secure electronic communication services |
| US8059820B2 (en) * | 2007-10-11 | 2011-11-15 | Microsoft Corporation | Multi-factor content protection |
| EP2335401A4 (en) * | 2008-10-10 | 2016-12-07 | ERICSSON TELEFON AB L M (publ) | SERVICE NODES, CONTROL PROCEDURES, USER NODES AND CONTROL PROCEDURES THEREFOR |
| US8321956B2 (en) * | 2009-06-17 | 2012-11-27 | Microsoft Corporation | Remote access control of storage devices |
| EP2514134A1 (en) | 2009-12-18 | 2012-10-24 | Nokia Corp. | Credential transfer |
| US8478996B2 (en) | 2009-12-21 | 2013-07-02 | International Business Machines Corporation | Secure Kerberized access of encrypted file system |
| US9087200B2 (en) * | 2009-12-22 | 2015-07-21 | Intel Corporation | Method and apparatus to provide secure application execution |
| WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
| US10496824B2 (en) * | 2011-06-24 | 2019-12-03 | Microsoft Licensing Technology, LLC | Trusted language runtime on a mobile platform |
| US8862767B2 (en) * | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
| US9055443B2 (en) * | 2011-10-27 | 2015-06-09 | T-Mobile Usa, Inc. | Mobile device-type locking |
| US9319884B2 (en) * | 2011-10-27 | 2016-04-19 | T-Mobile Usa, Inc. | Remote unlocking of telecommunication device functionality |
| US9413538B2 (en) * | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
| EP2820587B1 (de) | 2012-02-28 | 2020-04-08 | Giesecke+Devrient Mobile Security GmbH | Verfahren zur computer-zugangskontrolle mittels mobilem endgerät |
| US9172538B2 (en) * | 2012-04-20 | 2015-10-27 | T-Mobile Usa, Inc. | Secure lock for mobile device |
| EP2680487B1 (en) | 2012-06-29 | 2019-04-10 | Orange | Secured cloud data storage, distribution and restoration among multiple devices of a user |
| US8874916B2 (en) * | 2012-09-28 | 2014-10-28 | Intel Corporation | Introduction of discrete roots of trust |
| US8924727B2 (en) | 2012-10-12 | 2014-12-30 | Intel Corporation | Technologies labeling diverse content |
| US9578664B1 (en) * | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US9141769B1 (en) | 2013-02-08 | 2015-09-22 | Amazon Technologies, Inc. | Secure transfer and use of secret material in a shared environment |
| WO2014142858A1 (en) | 2013-03-14 | 2014-09-18 | Intel Corporation | Trusted data processing in the public cloud |
| US10177915B2 (en) * | 2013-03-15 | 2019-01-08 | Ologn Technologies Ag | Systems, methods and apparatuses for device attestation based on speed of computation |
| EP3036680B1 (en) | 2013-08-21 | 2018-07-18 | Intel Corporation | Processing data privately in the cloud |
| US9405912B2 (en) * | 2013-11-14 | 2016-08-02 | Microsoft Technology Licensing, Llc | Hardware rooted attestation |
| US9514317B2 (en) * | 2013-12-19 | 2016-12-06 | Intel Corporation | Policy-based trusted inspection of rights managed content |
| WO2015094326A1 (en) | 2013-12-20 | 2015-06-25 | Intel Corporation | Secure import and export of keying material |
| EP2887607A1 (en) | 2013-12-23 | 2015-06-24 | Orange | Migration of assets of a trusted execution environment |
| CN106104542B (zh) | 2013-12-24 | 2020-01-07 | 英特尔公司 | 对于数据即服务(DaaS)的内容保护 |
| US9686077B2 (en) * | 2014-03-06 | 2017-06-20 | Microsoft Technology Licensing, Llc | Secure hardware for cross-device trusted applications |
| US9474095B2 (en) | 2014-03-26 | 2016-10-18 | Intel IP Corporation | Systems, methods, and devices for distributed setup for a device-to-device session |
| US9411975B2 (en) | 2014-03-31 | 2016-08-09 | Intel Corporation | Methods and apparatus to securely share data |
| US9652631B2 (en) * | 2014-05-05 | 2017-05-16 | Microsoft Technology Licensing, Llc | Secure transport of encrypted virtual machines with continuous owner access |
| GB201408539D0 (en) * | 2014-05-14 | 2014-06-25 | Mastercard International Inc | Improvements in mobile payment systems |
| US10601978B2 (en) * | 2014-06-04 | 2020-03-24 | T-Mobile Usa, Inc. | Telecommunication device utilization based on heartbeat communication |
| US9525668B2 (en) | 2014-06-27 | 2016-12-20 | Intel Corporation | Face based secure messaging |
| US9519787B2 (en) * | 2014-11-14 | 2016-12-13 | Microsoft Technology Licensing, Llc | Secure creation of encrypted virtual machines from encrypted templates |
| US9940456B2 (en) * | 2014-12-16 | 2018-04-10 | Intel Corporation | Using trusted execution environments for security of code and data |
| US9621547B2 (en) * | 2014-12-22 | 2017-04-11 | Mcafee, Inc. | Trust establishment between a trusted execution environment and peripheral devices |
| US9860057B2 (en) | 2014-12-23 | 2018-01-02 | Intel Corporation | Diffie-Hellman key agreement using an M-of-N threshold scheme |
| FR3031612B1 (fr) * | 2015-01-09 | 2018-04-06 | Ingenico Group | Methode de traitement d'une autorisation de mise en œuvre d'un service, dispositifs et programme d'ordinateur correspondant. |
| US10193700B2 (en) | 2015-02-27 | 2019-01-29 | Samsung Electronics Co., Ltd. | Trust-zone-based end-to-end security |
| US9860221B2 (en) | 2015-03-10 | 2018-01-02 | Intel Corporation | Internet of things group formation using a key-based join protocol |
| US9578008B2 (en) | 2015-05-11 | 2017-02-21 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
| EP3101607A1 (en) * | 2015-06-02 | 2016-12-07 | Orange | NFC-ENABLED DEVICES FOR & xA;PERFORMING SECURE CONTACTLESS TRANSACTIONS AND USING HCE |
| US10484172B2 (en) * | 2015-06-05 | 2019-11-19 | Apple Inc. | Secure circuit for encryption key generation |
| WO2017004447A1 (en) * | 2015-06-30 | 2017-01-05 | Activevideo Networks, Inc. | Remotely managed trusted execution environment for digital-rights management in a distributed network with thin clients |
| US9781016B1 (en) * | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
| EP3179690A1 (en) | 2015-12-11 | 2017-06-14 | Gemalto Sa | Mobile device having trusted execution environment |
| GB201522244D0 (en) * | 2015-12-16 | 2016-01-27 | Nagravision Sa | Hardware integrity check |
| WO2017113119A1 (zh) * | 2015-12-29 | 2017-07-06 | 华为技术有限公司 | 一种关联应用程序和生物特征的方法、装置以及移动终端 |
| GB2546740A (en) | 2016-01-26 | 2017-08-02 | Worldpay Ltd | Electronic payment system and method |
| US10412191B1 (en) * | 2016-03-30 | 2019-09-10 | Amazon Technologies, Inc. | Hardware validation |
| US20170289197A1 (en) | 2016-03-31 | 2017-10-05 | Qualcomm Incorporated | Transport layer security token binding and trusted signing |
| US10277407B2 (en) * | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
| US10581815B2 (en) * | 2016-05-02 | 2020-03-03 | Intel Corporation | Technologies for secure mediated reality content publishing |
| KR102425368B1 (ko) | 2016-05-02 | 2022-07-27 | 삼성전자주식회사 | 가상 sim 운용 방법 및 그 장치 |
| BR112018073991A2 (pt) * | 2016-08-09 | 2019-02-26 | Huawei Technologies Co., Ltd. | sistema em chip e dispositivo de processamento |
| US10733284B2 (en) | 2016-10-06 | 2020-08-04 | Samsung Electronics Co., Ltd. | Trusted execution environment secure element communication |
| US10700865B1 (en) * | 2016-10-21 | 2020-06-30 | Sequitur Labs Inc. | System and method for granting secure access to computing services hidden in trusted computing environments to an unsecure requestor |
| KR102604046B1 (ko) | 2016-11-28 | 2023-11-23 | 삼성전자주식회사 | 전자 기기의 프로그램 관리 방법 및 장치 |
| US10127409B1 (en) * | 2016-12-16 | 2018-11-13 | Square, Inc. | Tamper detection system |
| US10530777B2 (en) | 2017-01-24 | 2020-01-07 | Microsoft Technology Licensing, Llc | Data unsealing with a sealing enclave |
| US10897360B2 (en) | 2017-01-26 | 2021-01-19 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using clean room provisioning |
| US10972265B2 (en) | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
| US10419402B2 (en) | 2017-01-26 | 2019-09-17 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using signing key |
-
2017
- 2017-01-26 US US15/417,060 patent/US10897459B2/en active Active
- 2017-12-20 JP JP2019540658A patent/JP2020506612A/ja active Pending
- 2017-12-20 EP EP17829838.6A patent/EP3574434B1/en active Active
- 2017-12-20 CN CN201780084684.XA patent/CN110249332B/zh active Active
- 2017-12-20 KR KR1020197021865A patent/KR102443857B1/ko active Active
- 2017-12-20 CA CA3048894A patent/CA3048894C/en active Active
- 2017-12-20 AU AU2017396530A patent/AU2017396530B2/en active Active
- 2017-12-20 WO PCT/US2017/067460 patent/WO2018140169A1/en not_active Ceased
- 2017-12-20 MY MYPI2019003997A patent/MY203672A/en unknown
- 2017-12-20 RU RU2019126625A patent/RU2756048C2/ru active
- 2017-12-20 NZ NZ754543A patent/NZ754543A/en not_active IP Right Cessation
- 2017-12-20 SG SG11201905456UA patent/SG11201905456UA/en unknown
- 2017-12-20 MX MX2019008694A patent/MX2019008694A/es unknown
-
2019
- 2019-06-10 ZA ZA2019/03701A patent/ZA201903701B/en unknown
- 2019-06-28 PH PH12019550116A patent/PH12019550116A1/en unknown
- 2019-07-11 IL IL268006A patent/IL268006B/en unknown
- 2019-07-19 CL CL2019002027A patent/CL2019002027A1/es unknown
- 2019-07-22 CO CONC2019/0007876A patent/CO2019007876A2/es unknown
Also Published As
| Publication number | Publication date |
|---|---|
| KR102443857B1 (ko) | 2022-09-15 |
| RU2756048C2 (ru) | 2021-09-24 |
| BR112019013398A2 (pt) | 2020-03-03 |
| CA3048894C (en) | 2024-06-04 |
| CN110249332A (zh) | 2019-09-17 |
| IL268006B (en) | 2022-01-01 |
| CA3048894A1 (en) | 2018-08-02 |
| EP3574434B1 (en) | 2021-01-20 |
| AU2017396530A1 (en) | 2019-07-04 |
| WO2018140169A1 (en) | 2018-08-02 |
| NZ754543A (en) | 2023-03-31 |
| PH12019550116A1 (en) | 2019-12-02 |
| JP2020506612A (ja) | 2020-02-27 |
| CO2019007876A2 (es) | 2019-07-31 |
| SG11201905456UA (en) | 2019-08-27 |
| CL2019002027A1 (es) | 2019-12-13 |
| CN110249332B (zh) | 2023-05-23 |
| ZA201903701B (en) | 2020-10-28 |
| US10897459B2 (en) | 2021-01-19 |
| RU2019126625A (ru) | 2021-02-26 |
| IL268006A (en) | 2019-09-26 |
| US20180212940A1 (en) | 2018-07-26 |
| KR20190109419A (ko) | 2019-09-25 |
| AU2017396530B2 (en) | 2021-10-21 |
| RU2019126625A3 (es) | 2021-04-08 |
| EP3574434A1 (en) | 2019-12-04 |
| MY203672A (en) | 2024-07-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX2019008694A (es) | Direccionamiento de un entorno de ejecucion confiable utilizando clave de cifrado. | |
| CL2019002026A1 (es) | Direccionamiento de un entorno de ejecución confiable utilizando clave de firma. | |
| BR102018015221B8 (pt) | Método para compartilhamento seguro de informações e sistema relacionado | |
| WO2015134760A3 (en) | Secure hardware for cross-device trusted applications | |
| BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
| RU2018141237A (ru) | Использование аппаратно-обеспечиваемой защищенной изолированной области для предотвращения пиратства и мошенничества в электронных устройствах | |
| BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
| BR112016006445A2 (pt) | método para proteger mensagens de transação transitando entre um aplicativo móvel em um dispositivo móvel e um gateway (ponte de ligação), e sistema processador de transações | |
| CL2018002362A1 (es) | Almacenamiento y transferencia seguros resistentes a pérdida de múltiples partes de claves criptográficas para sistemas a base de cadena de bloques en conjunto con un sistema de administración de billetera. | |
| AR050021A1 (es) | Un metodo para proveer acceso a contenido encriptado a uno de una pluralidad de sistemas de consumidor, un dispositivo para proveer acceso al contenido encriptado y un metodo para generar un paquete de contenido seguro | |
| BR112018008988A2 (pt) | método e sistema para uso de um protocolo de confiança em uma rede de processamento de transações | |
| BR112016024453A2 (pt) | transporte seguro de máquinas virtuais criptografadas com acesso contínuo do proprietário | |
| BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
| BR112018012417A2 (pt) | dispositivo de registrando, método de registrando, método de configurador, dispositivo de configurador, e produto de programa de computador | |
| BR112016021120A2 (pt) | Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura | |
| HK1212524A1 (en) | Data security management system | |
| WO2017058408A3 (en) | Protect non-memory encryption engine (non-mee) metadata in trusted execution environment | |
| MX2016009066A (es) | Sistemas y metodos con seguridad de programa de criptografia y resistencia a uso indebido. | |
| CN104573549A (zh) | 一种可信的数据库机密性保护方法及系统 | |
| MX2021010585A (es) | Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. | |
| BR112022017833A2 (pt) | Estrutura de dados de blockchain de entrada de dados criptográficos | |
| US9003184B2 (en) | Computing device and method for protecting software of the computing device | |
| BR112018074082A2 (pt) | portas seguras para máquinas dispensadoras conectadas | |
| BR112021025414A2 (pt) | Método para autenticação a um dispositivo, dispositivo de autenticação, chip para autenticação em um dispositivo, e sistema de autenticação | |
| ATE541265T1 (de) | Randomisierung |