CRYPTOGRAPHIC EVIDENCE OF PERSISTED CAPABILITIES
First Claim
Patent Images
1. A system comprising:
- a processing resource; and
a non-transitory machine readable medium storing instructions that, when executed, cause the processing resource to;
in response to a request to access a persisted capability stored in a globally shared memory, decide whether to trust the persisted capability by verification of cryptographic evidence accompanying the persisted capability, andload the persisted capability upon a decision to trust the persisted capability based on successful verification.
1 Assignment
0 Petitions
Accused Products
Abstract
Example implementations relate to cryptographic evidence of persisted capabilities. In an example implementation, in response to a request to access a persisted capability stored in a globally shared memory, a system may decide whether to trust the persisted capability by verification of cryptographic evidence accompanying the persisted capability. The system may load the persisted capability upon a decision to trust the persisted capability based on successful verification.
-
Citations
20 Claims
-
1. A system comprising:
-
a processing resource; and a non-transitory machine readable medium storing instructions that, when executed, cause the processing resource to; in response to a request to access a persisted capability stored in a globally shared memory, decide whether to trust the persisted capability by verification of cryptographic evidence accompanying the persisted capability, and load the persisted capability upon a decision to trust the persisted capability based on successful verification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for establishing trust in persisted capabilities by a system including physical processing resource implementing machine readable instructions, the method comprising:
-
generating first cryptographic evidence of authenticity and integrity of a first persisted capability; storing the first cryptographic evidence and the first persisted capability into globally shared memory connected to the system via a fabric; when a process executing on the system attempts to access a second persisted capability in the globally shared memory, verifying a second cryptographic evidence accompanying the second persisted capability; and loading the second persisted capability upon successful verification of the second cryptographic evidence. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory machine readable medium storing instructions executable by a processing resource of a system, the non-transitory machine readable medium comprising:
-
instructions to generate first cryptographic evidence of authenticity and integrity of a first persisted capability; instructions to store the first cryptographic evidence and the first persisted capability into globally shared memory connected to the system via a fabric; instructions to send to a key management server a cryptographic key to be used to verify the first cryptographic evidence; instructions to revoke access to the first persisted capability by alteration of the cryptographic key at the key management server; instructions, triggered when a process executing on the system attempts to access a second persisted capability in the globally shared memory, to verify second cryptographic evidence accompanying the second persisted capability; and instructions to load the second persisted capability upon successful verification of the second cryptographic evidence. - View Dependent Claims (19, 20)
-
Specification