TRUST ARCHITECTURE AND RELATED METHODS
First Claim
Patent Images
1. In a computer system, a method for establishing trust in hardware components comprising the steps of:
- executing by a processor one or more instructions, producing untrusted trace information;
sending by the processor the entrusted trace information to a hardware element;
receiving by the hardware element the untrusted trace information;
examining by the hardware element at least the aspects of the untrusted trace information intended to generate computer system output to a device;
producing by the hardware element computer system output to a device only when the aspects examined are correct.
2 Assignments
0 Petitions
Accused Products
Abstract
A pluggable trust architecture addresses the problem of establishing trust in hardware. The architecture has low impact on system performance and comprises a simple, user-supplied, and pluggable hardware element. The hardware element physically separates the untrusted components of a system from peripheral components that communicate with the external world. The invention only allows results of correct execution of software to be communicated externally.
8 Citations
22 Claims
-
1. In a computer system, a method for establishing trust in hardware components comprising the steps of:
-
executing by a processor one or more instructions, producing untrusted trace information; sending by the processor the entrusted trace information to a hardware element; receiving by the hardware element the untrusted trace information; examining by the hardware element at least the aspects of the untrusted trace information intended to generate computer system output to a device; producing by the hardware element computer system output to a device only when the aspects examined are correct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A pluggable trust architecture comprising:
-
a processor, a hardware element for receiving execution information from the processor to detect at least one form of incorrect execution by the processor without relying on any execution information to be correct; and a barrier circuit for preventing any computer system output to a device resulting from incorrect execution. - View Dependent Claims (19, 20, 21, 22)
-
Specification