HIGH ASSURANCE CONFIGURATION SECURITY PROCESSOR (HACSP) FOR COMPUTING DEVICES
First Claim
1. A computer-implemented method for providing a High Assurance Configuration Security Processor (HACSP) for a computing device, comprising:
- ensuring, by the HACSP, security of a user application bitstream load and update during computing device configuration; and
implementing security mechanisms, by the HACSP, for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about trustworthiness of the computing device during user bitstream execution without stopping operation and between load and updates
1 Assignment
0 Petitions
Accused Products
Abstract
A High Assurance Configuration Security Processor (HACSP) for a computing device may perform real-time integrity measurements of an actual bitstream run-time performance against what is expected. The HACSP may be self-contained and have a relatively small footprint. The HACSP may be vendor-agnostic, and may be a trusted system application for the computing device. The HACSP may ensure the security of user application bitstream load and update during device configuration, and may implement security mechanisms for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about the “trustworthiness” of the system during user bitstream execution.
38 Citations
47 Claims
-
1. A computer-implemented method for providing a High Assurance Configuration Security Processor (HACSP) for a computing device, comprising:
-
ensuring, by the HACSP, security of a user application bitstream load and update during computing device configuration; and implementing security mechanisms, by the HACSP, for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about trustworthiness of the computing device during user bitstream execution without stopping operation and between load and updates - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A High Assurance Configuration Security Processor (HACSP) computer program embodied on a non-transitory computer-readable medium, the program configured to cause at least one processing core of a computing device to:
implement security mechanisms for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about trustworthiness of the computing device during user bitstream execution without stopping operation. - View Dependent Claims (37, 38, 39, 40, 41)
-
42. A computing device, comprising:
a High Assurance Configuration Security Processor (HACSP) residing as a software application in a first processing core associated with a Trusted Execution Environment (TEE), the HACSP configured to; monitor user applications in software that runs on a second processing core, and implement security mechanisms for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about trustworthiness of the FPGA during user bitstream execution without stopping operation. - View Dependent Claims (43, 44, 45, 46, 47)
Specification