Apparatus and method for creating a trusted environment
First Claim
Patent Images
1. A computer apparatus for creating a trusted environment comprising:
- a trusted device arranged to acquire a first integrity metric to allow determination as to whether the computer apparatus is operating in a trusted manner, said trusted device being a physical device which binds an identity of the computer apparatus to first reliably measured data by means of said first integrity metric, wherein the trusted device is a tamper resistant device;
a software trust routine which binds an identity of at least an operating system environment to second reliably measured data by means of at least a second integrity metric;
a processor arranged to allow execution of the trust routine and associated operating environment, and means for restricting access of the operating system environment to resources available to the trust routine, wherein the trust routine is arranged to acquire (i) the first integrity metric of said trusted device as an indicator of whether a user of said computer apparatus should trust that said computer apparatus and (ii) a second integrity metric to allow determination as to whether the operating system environment is operating in a trusted manner consistently with said second reliably measured data;
wherein the means for restricting access of the operating environment comprises a control layer of software and an operating system of the operating system environment adapted such that any instructions in the operating system of the operating system environment with potential to affect any environment outside the operating system environment cause a transition to a control layer.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer apparatus for creating a trusted environment comprising a trusted device arranged to acquire a first integrity metric to allow determination as to whether the computer apparatus is operating in a trusted manner; a processor arranged to allow execution of a first trust routine and associated first operating environment, and means for restricting the first operating environment access to resources available to the trust routine, wherein the trust routine being arranged to acquire the first integrity metric and a second integrity metric to allow determination as to whether the first operating environment is operating in a trusted manner.
154 Citations
11 Claims
-
1. A computer apparatus for creating a trusted environment comprising:
-
a trusted device arranged to acquire a first integrity metric to allow determination as to whether the computer apparatus is operating in a trusted manner, said trusted device being a physical device which binds an identity of the computer apparatus to first reliably measured data by means of said first integrity metric, wherein the trusted device is a tamper resistant device; a software trust routine which binds an identity of at least an operating system environment to second reliably measured data by means of at least a second integrity metric; a processor arranged to allow execution of the trust routine and associated operating environment, and means for restricting access of the operating system environment to resources available to the trust routine, wherein the trust routine is arranged to acquire (i) the first integrity metric of said trusted device as an indicator of whether a user of said computer apparatus should trust that said computer apparatus and (ii) a second integrity metric to allow determination as to whether the operating system environment is operating in a trusted manner consistently with said second reliably measured data;
wherein the means for restricting access of the operating environment comprises a control layer of software and an operating system of the operating system environment adapted such that any instructions in the operating system of the operating system environment with potential to affect any environment outside the operating system environment cause a transition to a control layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for creating a trusted environment in a computer apparatus, the method comprising:
-
acquiring a first integrity metric to allow determination as to whether a computer apparatus has a trusted device wherein the trusted device is a tamper resistant device; binding an identity of the computer apparatus to first reliably measured data by means of said first integrity metric acquired by a trusted device in the computing apparatus, the trusted device having an attestation identity attested by a third party; executing a trust routine and an associated operating system environment; acquiring (i) the first integrity metric of said trusted device as an indicator of whether a user of said computer apparatus should trust that said computer apparatus and (ii) a second integrity metric to allow determination as to whether the operating system environment is operating in a trusted manner consistently with said second reliably measured data; determining as to whether the operating system environment is operating in a trusted manner consistently with said second reliably measured data; and restricting the operating system environment'"'"'s access to resources available to the trust routine by means of a control layer of software and an operating system of the operating system environment adapted such that any instruction in the operating system of the operating system environment with potential to affect any environment outside the operating system environment cause a transition to a control layer. - View Dependent Claims (10, 11)
-
Specification