BRPI0924512A2 - secure application execution delivery method and appliance - Google Patents
secure application execution delivery method and applianceInfo
- Publication number
- BRPI0924512A2 BRPI0924512A2 BRPI0924512A BRPI0924512A BRPI0924512A2 BR PI0924512 A2 BRPI0924512 A2 BR PI0924512A2 BR PI0924512 A BRPI0924512 A BR PI0924512A BR PI0924512 A BRPI0924512 A BR PI0924512A BR PI0924512 A2 BRPI0924512 A2 BR PI0924512A2
- Authority
- BR
- Brazil
- Prior art keywords
- appliance
- application execution
- delivery method
- secure application
- execution delivery
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Retry When Errors Occur (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2009/069212 WO2011078855A1 (en) | 2009-12-22 | 2009-12-22 | Method and apparatus to provide secure application execution |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0924512A2 true BRPI0924512A2 (en) | 2016-03-01 |
Family
ID=44196072
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0924512A BRPI0924512A2 (en) | 2009-12-22 | 2009-12-22 | secure application execution delivery method and appliance |
Country Status (7)
| Country | Link |
|---|---|
| JP (1) | JP5443599B2 (en) |
| KR (1) | KR101457355B1 (en) |
| CN (1) | CN102473224B (en) |
| BR (1) | BRPI0924512A2 (en) |
| DE (1) | DE112009005466T5 (en) |
| GB (2) | GB2481563B (en) |
| WO (1) | WO2011078855A1 (en) |
Families Citing this family (71)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9087200B2 (en) | 2009-12-22 | 2015-07-21 | Intel Corporation | Method and apparatus to provide secure application execution |
| US8739177B2 (en) | 2010-06-21 | 2014-05-27 | Intel Corporation | Method for network interface sharing among multiple virtual machines |
| US9053042B2 (en) | 2012-06-27 | 2015-06-09 | Intel Corporation | Method, system, and device for modifying a secure enclave configuration without changing the enclave measurement |
| US9519803B2 (en) * | 2012-11-30 | 2016-12-13 | Intel Corporation | Secure environment for graphics processing units |
| EP3418281B1 (en) | 2012-12-07 | 2020-09-30 | Vertex Pharmaceuticals Inc. | Pyrazolo[1,5-a]pyrimidines useful as inhibitors of atr kinase for the treatment of cancer diseases |
| US9323686B2 (en) * | 2012-12-28 | 2016-04-26 | Intel Corporation | Paging in secure enclaves |
| US9747102B2 (en) | 2012-12-28 | 2017-08-29 | Intel Corporation | Memory management in secure enclaves |
| US20140189246A1 (en) * | 2012-12-31 | 2014-07-03 | Bin Xing | Measuring applications loaded in secure enclaves at runtime |
| WO2014137338A1 (en) * | 2013-03-06 | 2014-09-12 | Intel Corporation | Roots-of-trust for measurement of virtual machines |
| US9058494B2 (en) * | 2013-03-15 | 2015-06-16 | Intel Corporation | Method, apparatus, system, and computer readable medium to provide secure operation |
| US9430384B2 (en) * | 2013-03-31 | 2016-08-30 | Intel Corporation | Instructions and logic to provide advanced paging capabilities for secure enclave page caches |
| US9087202B2 (en) * | 2013-05-10 | 2015-07-21 | Intel Corporation | Entry/exit architecture for protected device modules |
| WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
| US9338918B2 (en) | 2013-07-10 | 2016-05-10 | Samsung Electronics Co., Ltd. | Socket interposer and computer system using the socket interposer |
| US20150033034A1 (en) * | 2013-07-23 | 2015-01-29 | Gideon Gerzon | Measuring a secure enclave |
| US9698989B2 (en) * | 2013-07-23 | 2017-07-04 | Intel Corporation | Feature licensing in a secure processing environment |
| US9767044B2 (en) * | 2013-09-24 | 2017-09-19 | Intel Corporation | Secure memory repartitioning |
| US9501668B2 (en) | 2013-09-25 | 2016-11-22 | Intel Corporation | Secure video ouput path |
| WO2015060858A1 (en) * | 2013-10-24 | 2015-04-30 | Intel Corporation | Methods and apparatus for protecting software from unauthorized copying |
| US10121144B2 (en) | 2013-11-04 | 2018-11-06 | Apple Inc. | Using biometric authentication for NFC-based payments |
| EP3084614B1 (en) * | 2013-12-17 | 2020-03-04 | Intel Corporation | Secure enclaves for use by kernel mode applications |
| WO2015094261A1 (en) * | 2013-12-19 | 2015-06-25 | Intel Corporation | Policy-based trusted inspection of rights managed content |
| US9781113B2 (en) | 2013-12-19 | 2017-10-03 | Intel Corporation | Technologies for supporting multiple digital rights management protocols on a client device |
| US9448950B2 (en) | 2013-12-24 | 2016-09-20 | Intel Corporation | Using authenticated manifests to enable external certification of multi-processor platforms |
| US9413765B2 (en) * | 2014-03-25 | 2016-08-09 | Intel Corporation | Multinode hubs for trusted computing |
| US9864861B2 (en) | 2014-03-27 | 2018-01-09 | Intel Corporation | Object oriented marshaling scheme for calls to a secure region |
| US9705892B2 (en) | 2014-06-27 | 2017-07-11 | Intel Corporation | Trusted time service for offline mode |
| US9703733B2 (en) * | 2014-06-27 | 2017-07-11 | Intel Corporation | Instructions and logic to interrupt and resume paging in a secure enclave page cache |
| CN105573831B (en) * | 2014-10-13 | 2019-11-26 | 龙芯中科技术有限公司 | Data transfering method and device |
| US10181027B2 (en) * | 2014-10-17 | 2019-01-15 | Intel Corporation | Interface between a device and a secure processing environment |
| US9940456B2 (en) | 2014-12-16 | 2018-04-10 | Intel Corporation | Using trusted execution environments for security of code and data |
| US9710622B2 (en) * | 2015-02-23 | 2017-07-18 | Intel Corporation | Instructions and logic to fork processes of secure enclaves and establish child enclaves in a secure enclave page cache |
| US9606940B2 (en) | 2015-03-27 | 2017-03-28 | Intel Corporation | Methods and apparatus to utilize a trusted loader in a trusted computing environment |
| US9875189B2 (en) | 2015-06-12 | 2018-01-23 | Intel Corporation | Supporting secure memory intent |
| US9716710B2 (en) * | 2015-06-26 | 2017-07-25 | Intel Corporation | Technologies for virtualized access to security services provided by a converged manageability and security engine |
| US9996479B2 (en) * | 2015-08-17 | 2018-06-12 | Micron Technology, Inc. | Encryption of executables in computational memory |
| US10061941B2 (en) | 2015-08-19 | 2018-08-28 | Altera Corporation | Systems and methods for multiport to multiport cryptography |
| US10031861B2 (en) | 2015-09-25 | 2018-07-24 | Intel Corporation | Protect non-memory encryption engine (non-mee) metadata in trusted execution environment |
| MX384515B (en) * | 2015-11-19 | 2025-03-14 | Nagravision Sa | METHOD FOR VERIFYING THE INTEGRITY OF EXECUTION OF AN APPLICATION ON A TARGET DEVICE. |
| US9798641B2 (en) * | 2015-12-22 | 2017-10-24 | Intel Corporation | Method to increase cloud availability and silicon isolation using secure enclaves |
| US10503931B2 (en) * | 2016-05-09 | 2019-12-10 | Arris Enterprises Llc | Method and apparatus for dynamic executable verification |
| IE20170239A1 (en) | 2016-11-14 | 2018-05-16 | Google Llc | System of Enclaves |
| US10324857B2 (en) * | 2017-01-26 | 2019-06-18 | Intel Corporation | Linear memory address transformation and management |
| CN108469986B (en) * | 2017-02-23 | 2021-04-09 | 华为技术有限公司 | A data migration method and device |
| US11016910B2 (en) | 2017-06-28 | 2021-05-25 | Arm Limited | Memory region locking using lock/unlock flag state for exclusive rights to control memory access |
| GB2563882B (en) * | 2017-06-28 | 2019-10-23 | Advanced Risc Mach Ltd | Interrupting sequences of command actions performed upon memory regions |
| GB2564097B (en) * | 2017-06-28 | 2019-10-23 | Advanced Risc Mach Ltd | Memory region locking |
| CN107392011B (en) * | 2017-08-22 | 2019-11-22 | 海光信息技术有限公司 | A memory page transfer method |
| US11687654B2 (en) * | 2017-09-15 | 2023-06-27 | Intel Corporation | Providing isolation in virtualized systems using trust domains |
| KR102080497B1 (en) * | 2017-10-31 | 2020-02-24 | 삼성에스디에스 주식회사 | Method for Exchanging Data between Channels of System based on Multi-Channel Blockchain and System thereof |
| US12126736B2 (en) * | 2017-11-03 | 2024-10-22 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment(s) based on chain of trust including platform |
| US11943368B2 (en) | 2017-11-03 | 2024-03-26 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment based on chain of trust including platform |
| US10867092B2 (en) | 2017-12-16 | 2020-12-15 | Intel Corporation | Avoiding asynchronous enclave exits based on requests to invalidate translation lookaside buffer entries |
| US10552344B2 (en) | 2017-12-26 | 2020-02-04 | Intel Corporation | Unblock instruction to reverse page block during paging |
| US10970390B2 (en) | 2018-02-15 | 2021-04-06 | Intel Corporation | Mechanism to prevent software side channels |
| US10838773B2 (en) * | 2018-03-30 | 2020-11-17 | Intel Corporation | Techniques for dynamic resource allocation among cryptographic domains |
| US11513924B2 (en) | 2018-08-22 | 2022-11-29 | Intel Corporation | Flexible memory mapped input/output (I/O) space definition for a virtual device in a scalable I/O virtualization (S-IOV) architecture |
| CN110008736A (en) * | 2019-01-31 | 2019-07-12 | 阿里巴巴集团控股有限公司 | The method and node, storage medium of secret protection are realized in block chain |
| CN111614464B (en) * | 2019-01-31 | 2023-09-29 | 创新先进技术有限公司 | Methods, nodes, and storage media for securely updating keys in the blockchain |
| CN110032883B (en) * | 2019-01-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method, system and node for realizing privacy protection in block chain |
| CN110032885B (en) * | 2019-02-19 | 2020-03-06 | 阿里巴巴集团控股有限公司 | Method, node and storage medium for implementing privacy protection in block chain |
| CN109901880B (en) * | 2019-02-28 | 2020-11-20 | 瑞芯微电子股份有限公司 | Spinlock hardware circuit and electronic equipment |
| CN110069920A (en) * | 2019-03-06 | 2019-07-30 | 上海交通大学 | Guarantee the method and system of SGX safety based on virtualization |
| CN110096887B (en) | 2019-03-22 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Trusted computing method and server |
| SG11202000825YA (en) * | 2019-04-19 | 2020-02-27 | Alibaba Group Holding Ltd | Methods and devices for executing trusted applications on processor with support for protected execution environments |
| US11044080B2 (en) * | 2019-06-24 | 2021-06-22 | International Business Machines Corporation | Cryptographic key orchestration between trusted containers in a multi-node cluster |
| JP6885640B1 (en) * | 2020-10-01 | 2021-06-16 | 株式会社ラムダシステムズ | Image processing device |
| US11792644B2 (en) * | 2021-06-21 | 2023-10-17 | Motional Ad Llc | Session key generation for autonomous vehicle operation |
| CN113821835B (en) * | 2021-11-24 | 2022-02-08 | 飞腾信息技术有限公司 | Key management method, key management device and computing equipment |
| US20230409699A1 (en) * | 2022-06-17 | 2023-12-21 | Intel Corporation | Method for adding security features to sgx via patch on platforms that support patch rollback |
| WO2025056986A1 (en) | 2023-09-12 | 2025-03-20 | Wgc (Uk) Limited | Method and system to digitize the value of a commodity |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4098478B2 (en) * | 2001-01-31 | 2008-06-11 | 株式会社東芝 | Microprocessor |
| JP2002353960A (en) * | 2001-05-30 | 2002-12-06 | Fujitsu Ltd | Code execution device and code distribution method |
| JP4263976B2 (en) * | 2003-09-24 | 2009-05-13 | 株式会社東芝 | On-chip multi-core tamper resistant processor |
| US7934076B2 (en) * | 2004-09-30 | 2011-04-26 | Intel Corporation | System and method for limiting exposure of hardware failure information for a secured execution environment |
| KR20070118589A (en) * | 2005-02-11 | 2007-12-17 | 유니버셜 데이터 프로텍션 코퍼레이션 | Method and system for microprocessor data security |
| CN101116081A (en) * | 2005-02-11 | 2008-01-30 | 通用数据保护公司 | Method and system for microprocessor data security |
| US7657754B2 (en) * | 2005-12-08 | 2010-02-02 | Agere Systems Inc | Methods and apparatus for the secure handling of data in a microcontroller |
| JP4795812B2 (en) * | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | Secure processor |
| US8973094B2 (en) * | 2006-05-26 | 2015-03-03 | Intel Corporation | Execution of a secured environment initialization instruction on a point-to-point interconnect system |
| JP2008033457A (en) * | 2006-07-26 | 2008-02-14 | Internatl Business Mach Corp <Ibm> | Method and central processing unit for processing encrypted software |
| JP4912921B2 (en) * | 2007-02-27 | 2012-04-11 | 富士通セミコンダクター株式会社 | Secure processor system, secure processor, and secure processor system control method |
-
2009
- 2009-12-22 GB GB1118724.2A patent/GB2481563B/en not_active Expired - Fee Related
- 2009-12-22 JP JP2012516046A patent/JP5443599B2/en not_active Expired - Fee Related
- 2009-12-22 KR KR1020127016450A patent/KR101457355B1/en not_active Expired - Fee Related
- 2009-12-22 WO PCT/US2009/069212 patent/WO2011078855A1/en not_active Ceased
- 2009-12-22 GB GB1709341.0A patent/GB2550698B/en not_active Expired - Fee Related
- 2009-12-22 DE DE112009005466T patent/DE112009005466T5/en not_active Withdrawn
- 2009-12-22 CN CN200980160114.XA patent/CN102473224B/en not_active Expired - Fee Related
- 2009-12-22 BR BRPI0924512A patent/BRPI0924512A2/en not_active Application Discontinuation
Also Published As
| Publication number | Publication date |
|---|---|
| GB2481563A (en) | 2011-12-28 |
| WO2011078855A9 (en) | 2011-09-09 |
| GB2481563B (en) | 2017-07-19 |
| JP5443599B2 (en) | 2014-03-19 |
| GB201118724D0 (en) | 2011-12-14 |
| GB2550698A (en) | 2017-11-29 |
| KR101457355B1 (en) | 2014-11-04 |
| CN102473224B (en) | 2016-10-12 |
| JP2012530961A (en) | 2012-12-06 |
| KR20120099472A (en) | 2012-09-10 |
| CN102473224A (en) | 2012-05-23 |
| DE112009005466T5 (en) | 2012-10-31 |
| GB201709341D0 (en) | 2017-07-26 |
| GB2550698B (en) | 2018-04-11 |
| WO2011078855A1 (en) | 2011-06-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0924512A2 (en) | secure application execution delivery method and appliance | |
| BRPI1005390A2 (en) | appliance and cooking method | |
| BRPI0907231A2 (en) | pyrrolpyrimidines and pyrrolpyridines | |
| BR112012011910A2 (en) | device and method | |
| BR112013009489A2 (en) | device and connection method | |
| EP2391714A4 (en) | LIGATURE METHODS AND USES THEREOF | |
| BR112013008905A2 (en) | Dosing mechanism and dosing method | |
| BRPI1008030A2 (en) | tear implants and related methods | |
| BRPI0915487A2 (en) | nfluenza hemagglutin and neuraminidase variants | |
| BRPI1006537A2 (en) | method and article | |
| BR112013013584A2 (en) | endoscope and method | |
| BR112012027159A2 (en) | structure and method | |
| BRPI0911802A2 (en) | appliance | |
| EP2476717A4 (en) | POLYAMIDE AND POLYAMIDE COMPOSITION | |
| DK2330887T3 (en) | TREATMENT DEVICES | |
| BRPI1008270A2 (en) | appliance and system | |
| BR112013012563A2 (en) | recombinant bacteria and glycerol elaboration process | |
| BR112013002544A2 (en) | closet and closet section | |
| BR112013009233A2 (en) | elastic polyuterane yarn and method | |
| BRPI0821351A2 (en) | appliances and methods | |
| BRPI1007909A2 (en) | medical method and device | |
| BRPI1011397A2 (en) | attenuator | |
| FI20090357L (en) | Method and arrangement | |
| FI20090142A0 (en) | New methods and products | |
| IT1395580B1 (en) | PELER AND PEELER MACHINE |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B15K | Others concerning applications: alteration of classification |
Ipc: G06F 12/14 (2006.01), G06F 21/72 (2013.01), G06F 2 |
|
| B06T | Formal requirements before examination [chapter 6.20 patent gazette] | ||
| B11E | Dismissal acc. art. 34 of ipl - requirements for examination incomplete | ||
| B11T | Dismissal: dismissal of application maintained | ||
| B350 | Update of information on the portal [chapter 15.35 patent gazette] |