×

Secure computer architectures, systems, and applications

  • US 9,092,628 B2
  • Filed: 09/27/2013
  • Issued: 07/28/2015
  • Est. Priority Date: 10/02/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computing device, comprising:

  • a trusted environment comprising;

    a trusted processor; and

    a trusted memory for storing executable instructions, the trusted processor executing the instructions to provide a trusted computing environment that performs computing functions that could expose the computing device to a security risk; and

    a legacy environment comprising;

    a secondary processor that is physically separated from the trusted processor; and

    a secondary memory for storing executable instructions, the secondary processor executing the instructions to provide a legacy computing environment that manages computing functions exposed to unsecure environments;

    further comprising a network interface that is dedicated for the trusted environment, the network interface being inaccessible to the legacy environment; and

    comprising I/O devices, wherein each of the I/O devices comprises dedicated connections for the trusted environment, wherein at least a portion of the I/O devices which do not pose a security risk to a computing system are coupled with the legacy environment;

    wherein the legacy environment executes safe applications to generate output in a structured form, further wherein the trusted environment comprises a content insertion module that is executed by the trusted processor to insert trusted data into the structured form;

    wherein content downloaded from a network is stored and executed only in the legacy environment, the downloaded content being inaccessible by the trusted environment; and

    wherein authentication data for the computing device is stored in the trusted environment and cannot be accessed by the legacy environment.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×