Secure execution box
First Claim
1. A system, comprising:
- a processor configured to operate in an operating mode, wherein the operating mode is one of a plurality of operating modes including a secure operating mode;
one or more secured assets coupled to the processor;
security hardware configured to control access to the secured assets dependant upon the operating mode of the processor, wherein the security hardware is configured to allow access to the secure assets in the secure operating mode, and wherein the security hardware comprises a mailbox RAM configured to store input and output data, wherein the mailbox RAM includes an inbox for storing input data for the one or more secured assets and an outbox for storing output data from the one or more secured assets,wherein the security hardware comprises;
a duration timer configured to operate while the processor is operating in the securemode, wherein the duration timer is configured to provide an indication of howlong the processor is in the secure mode,a kick-out timer configured to provide an indication to the processor of when theprocessor is to exit the secure mode,a re-initiation timer configured to provide an indication to the processor to re-enter the secure mode.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for secure computing. The system includes a processor, one or more secured assets coupled to the processor, and security hardware. The processor is configured to operate in various operating modes, including a secure operating mode. The security hardware is configured to control access to the secured assets dependant upon the operating mode of the processor. The security hardware is configured to allow access to the secure assets in the secure operating mode, preferably only in the secure operating mode. The method includes switching the computer system between operating modes, while allowing or restricting access to the secured assets based on the operating modes. The second operating mode comprises a secure operating mode. The method restricts access to the secured assets in the first operating mode and permits access to the secured assets in the secure operating mode.
-
Citations
44 Claims
-
1. A system, comprising:
-
a processor configured to operate in an operating mode, wherein the operating mode is one of a plurality of operating modes including a secure operating mode; one or more secured assets coupled to the processor; security hardware configured to control access to the secured assets dependant upon the operating mode of the processor, wherein the security hardware is configured to allow access to the secure assets in the secure operating mode, and wherein the security hardware comprises a mailbox RAM configured to store input and output data, wherein the mailbox RAM includes an inbox for storing input data for the one or more secured assets and an outbox for storing output data from the one or more secured assets, wherein the security hardware comprises; a duration timer configured to operate while the processor is operating in the secure mode, wherein the duration timer is configured to provide an indication of how long the processor is in the secure mode, a kick-out timer configured to provide an indication to the processor of when the processor is to exit the secure mode, a re-initiation timer configured to provide an indication to the processor to re-enter the secure mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing access to secured assets in a computer system, the method comprising:
-
switching the computer system between a first operating mode and a second operating mode, where second operating mode comprises a secure operating mode; restricting access to the secured assets in response to the computer system being in the first operating mode; and permitting access to the secured assets in response to the computer system being in the secure operating mode, wherein permitting access to the secured assets comprises reading output data from or writing input data to a mailbox RAM from which the secure assets write the output data and read the input data; measuring a time period in which the computer system is out of the secure operating mode in response to providing the control signal to the computer system to exit the secure operating mode; and providing a control signal to the computer system to re-enter the secure operating mode in response to the time period in which the computer system is out of the secure operating mode exceeding a predetermined length of time. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer system comprising:
-
means for switching the computer system between a first operating mode and a second operating mode, where second operating mode comprises a secure operating mode; means for restricting access to the secured assets in response to the computer system being in the first operating mode; and means for permitting access to the secured assets in response to the computer system being in the secure operating mode, wherein permitting access to the secured assets comprises reading output data from or writing input data to a mailbox RAM from which the secure assets write the output data and read the input data; the computer readable program storage device encoded with instructions that measure a time period in which the computer system is out of the secure operating mode in response to providing a control signal to the computer system to exit the secure operating mode; and provide a control signal to the computer system to re-enter the secure operating mode in response to the time period in which the computer system is out of the secure operating mode exceeding a predetermined length of time. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A system comprising:
-
means for processing in an operating mode, wherein the operating mode is one of a plurality of operating modes including a secure operating mode; one or more secured means coupled to the means for processing, wherein the one or more secured means comprise one or more of the group consisting of; means for generating a random number or nonce; means for storing secure management data; means for generating a monotonic value; and
means for storing secure data; andmeans for controlling access to the one or more secured means dependant upon the operating mode of the processor, wherein the one or more secured means comprise means for allowing access to the secure assets in the secure operating mode, and wherein the means for allowing access comprises a mailbox RAM configured to store input and output data, wherein the mailbox RAM includes an inbox for storing input data for the one or more secured assets and an outbox for storing output data from the one or more secured assets; a computer readable program storage device encoded with instructions that measure a time period in which the system is out of the secure operating mode in response to providing a control signal to the computer system to exit the secure operating mode; and provide a control signal to the computer system to re-enter the secure operating mode in response to the time period in which the computer system is out of the secure operating mode exceeding a predetermined length of time.
-
-
34. A computer readable program storage device encoded with instructions that when executed by a computer system, performs a method of providing access to secured assets in the computer system, the method comprising;
-
switching the computer system between a first operating mode and a second operating mode, where second operating mode comprises a secure operating mode; restricting access to the secured assets in response to the computer system being in the first operating mode; and permitting access to the secured assets in response to the computer system being in the secure operating mode, wherein permitting access to the secured assets comprises reading output data from or writing input data to a mailbox RAM from which the secure assets write the output data and read the input data; measuring a time period in which the computer system is out of the secure operating mode in response to providing the control signal to the computer system to exit the secure operating mode; and providing a control signal to the computer system to re-enter the secure operating mode in response to the time period in which the computer system is out of the secure operating mode exceeding a predetermined length of time. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification