×

Secure vault service for software components within an execution environment

  • US 9,547,772 B2
  • Filed: 07/03/2014
  • Issued: 01/17/2017
  • Est. Priority Date: 06/30/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computing platform comprising:

  • at least one processor that includes hardware and is capable of executing an operating system;

    the operating system comprising at least one operating system component capable of determining, at least in part, in response at least in part to at least one event associated at least in part with software, whether to provide the software with an execution environment of the operating system, the determining being based at least in part upon user-definable policy and verification of cryptographic signature information, the cryptographic signature information being obtainable, at least in part, by the at least one operating system component, the cryptographic signature information being associated, at least in part, with integrity verification of the software, the integrity verification being based upon a state associated with the software at time of manufacture of the software, the integrity verification being (1) to detect unauthorized modification of the software from the state at the time of the manufacture and (2) to prevent provision of the execution environment to unrecognized software;

    the execution environment, if provided, being associated with at least one access restriction to prevent unauthorized access by at least one unauthorized component, the at least one access restriction being associated at least in part with the software and the cryptographic signature information;

    the execution environment being one of multiple possible execution environments that are capable of being provided for multiple respective components in the platform, at least one of the multiple respective components in at least one other of the multiple possible execution environments to be prevented, at least in part, by the at least one operating system component, from accessing the one of the multiple possible execution environments based at least in part upon the user-definable policy and the cryptographic signature information.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×