[go: up one dir, main page]

GB2481563A - Method and apparatus to provide secure application execution - Google Patents

Method and apparatus to provide secure application execution Download PDF

Info

Publication number
GB2481563A
GB2481563A GB1118724.2A GB201118724A GB2481563A GB 2481563 A GB2481563 A GB 2481563A GB 201118724 A GB201118724 A GB 201118724A GB 2481563 A GB2481563 A GB 2481563A
Authority
GB
United Kingdom
Prior art keywords
application execution
secure application
provide secure
application
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1118724.2A
Other versions
GB2481563B (en
GB201118724D0 (en
Inventor
Francis X Mckeen
Carlos V Rozas
Uday R Savagankar
Simon P Johnson
Vincent R Scarlata
Michael A Goldsmith
Ernie Brickell
Jiang Tao Li
Howard C Herbert
Prashant Dewan
Stephen J Tolopka
Gilbert Neiger
David Durham
Gary Graunke
Bernard J Lint
Don A Van Dyke
Joseph Cihula
Stalinselvaraj Jeyasingh
Stephen R Van Doren
Dion Rodgers
John I Garney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=44196072&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=GB2481563(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Intel Corp filed Critical Intel Corp
Priority to GB1709341.0A priority Critical patent/GB2550698B/en
Publication of GB201118724D0 publication Critical patent/GB201118724D0/en
Publication of GB2481563A publication Critical patent/GB2481563A/en
Application granted granted Critical
Publication of GB2481563B publication Critical patent/GB2481563B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Memory System Of A Hierarchy Structure (AREA)
  • Retry When Errors Occur (AREA)

Abstract

A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
GB1118724.2A 2009-12-22 2009-12-22 Method and apparatus to provide secure application execution Expired - Fee Related GB2481563B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1709341.0A GB2550698B (en) 2009-12-22 2009-12-22 Method and Apparatus to provide secure application execution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2009/069212 WO2011078855A1 (en) 2009-12-22 2009-12-22 Method and apparatus to provide secure application execution

Publications (3)

Publication Number Publication Date
GB201118724D0 GB201118724D0 (en) 2011-12-14
GB2481563A true GB2481563A (en) 2011-12-28
GB2481563B GB2481563B (en) 2017-07-19

Family

ID=44196072

Family Applications (2)

Application Number Title Priority Date Filing Date
GB1118724.2A Expired - Fee Related GB2481563B (en) 2009-12-22 2009-12-22 Method and apparatus to provide secure application execution
GB1709341.0A Expired - Fee Related GB2550698B (en) 2009-12-22 2009-12-22 Method and Apparatus to provide secure application execution

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB1709341.0A Expired - Fee Related GB2550698B (en) 2009-12-22 2009-12-22 Method and Apparatus to provide secure application execution

Country Status (7)

Country Link
JP (1) JP5443599B2 (en)
KR (1) KR101457355B1 (en)
CN (1) CN102473224B (en)
BR (1) BRPI0924512A2 (en)
DE (1) DE112009005466T5 (en)
GB (2) GB2481563B (en)
WO (1) WO2011078855A1 (en)

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9087200B2 (en) 2009-12-22 2015-07-21 Intel Corporation Method and apparatus to provide secure application execution
US8739177B2 (en) 2010-06-21 2014-05-27 Intel Corporation Method for network interface sharing among multiple virtual machines
US9053042B2 (en) 2012-06-27 2015-06-09 Intel Corporation Method, system, and device for modifying a secure enclave configuration without changing the enclave measurement
US9519803B2 (en) * 2012-11-30 2016-12-13 Intel Corporation Secure environment for graphics processing units
HRP20180859T1 (en) 2012-12-07 2018-07-13 Vertex Pharmaceuticals Incorporated 2-Amino-6-fluoro-N- (5-fluoro-4- (4- (4- (3-oxetanyl-yl) piperazine-1-carbonyl) piperidin-1-yl) pyridin-3-yl) pyrazolo [ 1,5ALFA] PIRIMIDINE-3-CARBOXAMIDE AS ATR KINASE INHIBITOR
US9323686B2 (en) * 2012-12-28 2016-04-26 Intel Corporation Paging in secure enclaves
US9747102B2 (en) * 2012-12-28 2017-08-29 Intel Corporation Memory management in secure enclaves
US20140189246A1 (en) * 2012-12-31 2014-07-03 Bin Xing Measuring applications loaded in secure enclaves at runtime
CN104969234B (en) * 2013-03-06 2018-06-12 英特尔公司 Measured root of trust for virtual machines
US9058494B2 (en) 2013-03-15 2015-06-16 Intel Corporation Method, apparatus, system, and computer readable medium to provide secure operation
US9430384B2 (en) * 2013-03-31 2016-08-30 Intel Corporation Instructions and logic to provide advanced paging capabilities for secure enclave page caches
US9087202B2 (en) 2013-05-10 2015-07-21 Intel Corporation Entry/exit architecture for protected device modules
US20160085955A1 (en) * 2013-06-10 2016-03-24 Doosra, Inc. Secure Storing and Offline Transferring of Digitally Transferable Assets
US9338918B2 (en) 2013-07-10 2016-05-10 Samsung Electronics Co., Ltd. Socket interposer and computer system using the socket interposer
US9698989B2 (en) * 2013-07-23 2017-07-04 Intel Corporation Feature licensing in a secure processing environment
US20150033034A1 (en) * 2013-07-23 2015-01-29 Gideon Gerzon Measuring a secure enclave
US9767044B2 (en) 2013-09-24 2017-09-19 Intel Corporation Secure memory repartitioning
US9501668B2 (en) 2013-09-25 2016-11-22 Intel Corporation Secure video ouput path
WO2015060858A1 (en) * 2013-10-24 2015-04-30 Intel Corporation Methods and apparatus for protecting software from unauthorized copying
US10121144B2 (en) 2013-11-04 2018-11-06 Apple Inc. Using biometric authentication for NFC-based payments
KR101802806B1 (en) * 2013-12-17 2017-11-29 인텔 코포레이션 Secure enclaves for use by kernel mode applications
KR101801567B1 (en) * 2013-12-19 2017-11-27 인텔 코포레이션 Policy-based trusted inspection of rights managed content
CN105745660B (en) * 2013-12-19 2018-11-16 英特尔公司 For supporting the technology of multiple digital rights management agreements on a client device
US9448950B2 (en) 2013-12-24 2016-09-20 Intel Corporation Using authenticated manifests to enable external certification of multi-processor platforms
US9413765B2 (en) 2014-03-25 2016-08-09 Intel Corporation Multinode hubs for trusted computing
US9864861B2 (en) * 2014-03-27 2018-01-09 Intel Corporation Object oriented marshaling scheme for calls to a secure region
US9703733B2 (en) 2014-06-27 2017-07-11 Intel Corporation Instructions and logic to interrupt and resume paging in a secure enclave page cache
US9705892B2 (en) 2014-06-27 2017-07-11 Intel Corporation Trusted time service for offline mode
CN105573831B (en) * 2014-10-13 2019-11-26 龙芯中科技术有限公司 Data transfering method and device
US10181027B2 (en) 2014-10-17 2019-01-15 Intel Corporation Interface between a device and a secure processing environment
US9940456B2 (en) 2014-12-16 2018-04-10 Intel Corporation Using trusted execution environments for security of code and data
US9710622B2 (en) * 2015-02-23 2017-07-18 Intel Corporation Instructions and logic to fork processes of secure enclaves and establish child enclaves in a secure enclave page cache
US9606940B2 (en) 2015-03-27 2017-03-28 Intel Corporation Methods and apparatus to utilize a trusted loader in a trusted computing environment
US9875189B2 (en) 2015-06-12 2018-01-23 Intel Corporation Supporting secure memory intent
US9716710B2 (en) * 2015-06-26 2017-07-25 Intel Corporation Technologies for virtualized access to security services provided by a converged manageability and security engine
US9996479B2 (en) * 2015-08-17 2018-06-12 Micron Technology, Inc. Encryption of executables in computational memory
US10061941B2 (en) 2015-08-19 2018-08-28 Altera Corporation Systems and methods for multiport to multiport cryptography
US10031861B2 (en) 2015-09-25 2018-07-24 Intel Corporation Protect non-memory encryption engine (non-mee) metadata in trusted execution environment
EP3378005B1 (en) * 2015-11-19 2020-01-08 Nagravision S.A. Method to verify the execution integrity of an application in a target device
US9798641B2 (en) * 2015-12-22 2017-10-24 Intel Corporation Method to increase cloud availability and silicon isolation using secure enclaves
US10503931B2 (en) * 2016-05-09 2019-12-10 Arris Enterprises Llc Method and apparatus for dynamic executable verification
GB2555961B (en) 2016-11-14 2019-08-28 Google Llc System of enclaves
US10324857B2 (en) * 2017-01-26 2019-06-18 Intel Corporation Linear memory address transformation and management
CN108469986B (en) * 2017-02-23 2021-04-09 华为技术有限公司 A data migration method and device
GB2563882B (en) * 2017-06-28 2019-10-23 Advanced Risc Mach Ltd Interrupting sequences of command actions performed upon memory regions
KR102683951B1 (en) 2017-06-28 2024-07-11 에이알엠 리미티드 Memory area locking
GB2564097B (en) * 2017-06-28 2019-10-23 Advanced Risc Mach Ltd Memory region locking
CN107392011B (en) * 2017-08-22 2019-11-22 海光信息技术有限公司 A memory page transfer method
US11687654B2 (en) * 2017-09-15 2023-06-27 Intel Corporation Providing isolation in virtualized systems using trust domains
KR102080497B1 (en) * 2017-10-31 2020-02-24 삼성에스디에스 주식회사 Method for Exchanging Data between Channels of System based on Multi-Channel Blockchain and System thereof
US12126736B2 (en) * 2017-11-03 2024-10-22 Microsoft Technology Licensing, Llc Provisioning trusted execution environment(s) based on chain of trust including platform
US11943368B2 (en) 2017-11-03 2024-03-26 Microsoft Technology Licensing, Llc Provisioning trusted execution environment based on chain of trust including platform
US10867092B2 (en) 2017-12-16 2020-12-15 Intel Corporation Avoiding asynchronous enclave exits based on requests to invalidate translation lookaside buffer entries
US10552344B2 (en) 2017-12-26 2020-02-04 Intel Corporation Unblock instruction to reverse page block during paging
US10970390B2 (en) 2018-02-15 2021-04-06 Intel Corporation Mechanism to prevent software side channels
US10838773B2 (en) * 2018-03-30 2020-11-17 Intel Corporation Techniques for dynamic resource allocation among cryptographic domains
US11513924B2 (en) 2018-08-22 2022-11-29 Intel Corporation Flexible memory mapped input/output (I/O) space definition for a virtual device in a scalable I/O virtualization (S-IOV) architecture
CN110008736A (en) * 2019-01-31 2019-07-12 阿里巴巴集团控股有限公司 The method and node, storage medium of secret protection are realized in block chain
CN110032883B (en) * 2019-01-31 2020-05-29 阿里巴巴集团控股有限公司 Method, system and node for realizing privacy protection in block chain
CN109831298B (en) * 2019-01-31 2020-05-15 阿里巴巴集团控股有限公司 Method, node and storage medium for securely updating keys in blockchain
CN110032885B (en) * 2019-02-19 2020-03-06 阿里巴巴集团控股有限公司 Method, node and storage medium for implementing privacy protection in block chain
CN109901880B (en) * 2019-02-28 2020-11-20 瑞芯微电子股份有限公司 Spinlock hardware circuit and electronic equipment
CN110069920A (en) * 2019-03-06 2019-07-30 上海交通大学 Guarantee the method and system of SGX safety based on virtualization
CN110096887B (en) 2019-03-22 2020-06-30 阿里巴巴集团控股有限公司 Trusted computing method and server
CN110998575B (en) 2019-04-19 2024-04-16 创新先进技术有限公司 Method and apparatus for executing trusted applications on a processor supporting a protected execution environment
US11044080B2 (en) * 2019-06-24 2021-06-22 International Business Machines Corporation Cryptographic key orchestration between trusted containers in a multi-node cluster
JP6885640B1 (en) * 2020-10-01 2021-06-16 株式会社ラムダシステムズ Image processing device
US11792644B2 (en) * 2021-06-21 2023-10-17 Motional Ad Llc Session key generation for autonomous vehicle operation
CN113821835B (en) * 2021-11-24 2022-02-08 飞腾信息技术有限公司 Key management method, key management device and computing equipment
US20230409699A1 (en) * 2022-06-17 2023-12-21 Intel Corporation Method for adding security features to sgx via patch on platforms that support patch rollback
WO2025056986A1 (en) 2023-09-12 2025-03-20 Wgc (Uk) Limited Method and system to digitize the value of a commodity

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060075312A1 (en) * 2004-09-30 2006-04-06 Fischer Stephen A System and method for limiting exposure of hardware failure information for a secured execution environment
US20070277223A1 (en) * 2006-05-26 2007-11-29 Datta Shamanna M Execution of a secured environment initialization instruction on a point-to-point interconnect system
KR20070118589A (en) * 2005-02-11 2007-12-17 유니버셜 데이터 프로텍션 코퍼레이션 Method and system for microprocessor data security
KR20080074848A (en) * 2005-12-08 2008-08-13 에이저 시스템즈 인크 Method and apparatus for data security processing in microcontroller

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4098478B2 (en) * 2001-01-31 2008-06-11 株式会社東芝 Microprocessor
JP2002353960A (en) * 2001-05-30 2002-12-06 Fujitsu Ltd Code execution device and code distribution method
JP4263976B2 (en) * 2003-09-24 2009-05-13 株式会社東芝 On-chip multi-core tamper resistant processor
CN101116081A (en) * 2005-02-11 2008-01-30 通用数据保护公司 Method and system for microprocessor data security
JP4795812B2 (en) * 2006-02-22 2011-10-19 富士通セミコンダクター株式会社 Secure processor
JP2008033457A (en) * 2006-07-26 2008-02-14 Internatl Business Mach Corp <Ibm> Method and central processing unit for processing encrypted software
JP4912921B2 (en) * 2007-02-27 2012-04-11 富士通セミコンダクター株式会社 Secure processor system, secure processor, and secure processor system control method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060075312A1 (en) * 2004-09-30 2006-04-06 Fischer Stephen A System and method for limiting exposure of hardware failure information for a secured execution environment
KR20070118589A (en) * 2005-02-11 2007-12-17 유니버셜 데이터 프로텍션 코퍼레이션 Method and system for microprocessor data security
KR20080074848A (en) * 2005-12-08 2008-08-13 에이저 시스템즈 인크 Method and apparatus for data security processing in microcontroller
US20070277223A1 (en) * 2006-05-26 2007-11-29 Datta Shamanna M Execution of a secured environment initialization instruction on a point-to-point interconnect system

Also Published As

Publication number Publication date
CN102473224A (en) 2012-05-23
GB201709341D0 (en) 2017-07-26
DE112009005466T5 (en) 2012-10-31
KR101457355B1 (en) 2014-11-04
BRPI0924512A2 (en) 2016-03-01
GB2550698A (en) 2017-11-29
GB2550698B (en) 2018-04-11
CN102473224B (en) 2016-10-12
WO2011078855A9 (en) 2011-09-09
JP2012530961A (en) 2012-12-06
GB2481563B (en) 2017-07-19
JP5443599B2 (en) 2014-03-19
WO2011078855A1 (en) 2011-06-30
KR20120099472A (en) 2012-09-10
GB201118724D0 (en) 2011-12-14

Similar Documents

Publication Publication Date Title
GB2481563A (en) Method and apparatus to provide secure application execution
WO2012082410A3 (en) Technique for supporting multiple secure enclaves
WO2010057065A3 (en) Method and apparatus to provide secure application execution
EP2487639A4 (en) Information management device, data processing method thereof, and computer program
EP2366229A4 (en) An appliance, system, method and corresponding software components for encrypting and processing data
TWI369613B (en) Control device, data processing device and method thereof
GB2484644B (en) System, method and computer program for multi-dimensional temporal data mining
EP2495698A4 (en) Biometric information processing device, biometric information processing method, and computer program for biometric information processing
WO2011017658A3 (en) Document layout system
EP2266039A4 (en) Data updating method, memory system and memory device
EP2336889A4 (en) Detection rule generation device, detection rule generation method, and computer program
GB2504226A (en) System, apparatus, and method for aligning registers
EP2352103A4 (en) Information processing apparatus, document retrieval system, document retrieval method, and program
EP2309398A4 (en) Method and system for performing unstructured data
GB0909110D0 (en) Biometric method, system and computer program
EP2494916A4 (en) Information processing device, method, system, and program
EP2570936A4 (en) Information retrieval device, information retrieval method, computer program, and data structure
TWI366778B (en) Hotkey processing method and computer system
EP2711841A4 (en) Data processing method, device and system based on block storage
EP2523178A4 (en) Encryption processing system, key generation device, key devolvement device, encryption device, decoding device, encryption processing method, and encryption processing program
IL213142A (en) Method, system and simulation or analysis model for data processing
EP2863558A4 (en) Audio data transmission method, system, transmission device, and electronic signature tool
GB2513035B (en) Messaging system, information processing device, and messaging method and program
PL2288172T3 (en) Information processing device, information processing method, reproduction device, reproduction method, and program
GB0801480D0 (en) Data processing method and system

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20191222