Secure computer architectures, systems, and applications
First Claim
Patent Images
1. A computing device, comprising:
- a trusted environment comprising;
a trusted hardware processor; and
a trusted memory for storing executable instructions, the trusted hardware processor executing the executable instructions to provide a trusted computing environment;
a legacy environment comprising;
a legacy hardware processor that is physically separated from the trusted hardware processor; and
a legacy memory for storing executable instructions, the legacy hardware processor executing the executable instructions to provide a legacy computing environment;
a network hardware interface that is dedicated for the trusted environment, the network hardware interface being inaccessible to the legacy environment; and
input/output (I/O) devices, wherein each of the I/O devices comprises dedicated connections for the trusted environment, each of the I/O devices being inaccessible to the legacy environment;
wherein the trusted environment receives input from the I/O devices and the network hardware interface and monitors, compares, evaluates, blocks, processes or modifies the received input for transmitting to the legacy environment;
wherein the trusted environment monitors, compares, evaluates, blocks, processes or modifies input received from the legacy environment for transmitting to the I/O devices and the network hardware interface;
wherein the trusted hardware processor utilizes a hardware gated channel to control computing functions of the legacy environment; and
wherein the legacy environment executes safe applications to generate output in a structured form.
0 Assignments
0 Petitions
Accused Products
Abstract
Secure computer architectures, systems, and applications are provided herein. An exemplary computing system may include a trusted environment having a trusted processor and memory that provides a trusted computing environment that performs computing functions that could expose the computing device to a security risk, and a legacy environment having a secondary processor and memory for providing a legacy computing environment that manages computing functions exposed to unsecure environments.
50 Citations
18 Claims
-
1. A computing device, comprising:
-
a trusted environment comprising; a trusted hardware processor; and a trusted memory for storing executable instructions, the trusted hardware processor executing the executable instructions to provide a trusted computing environment; a legacy environment comprising; a legacy hardware processor that is physically separated from the trusted hardware processor; and a legacy memory for storing executable instructions, the legacy hardware processor executing the executable instructions to provide a legacy computing environment; a network hardware interface that is dedicated for the trusted environment, the network hardware interface being inaccessible to the legacy environment; and input/output (I/O) devices, wherein each of the I/O devices comprises dedicated connections for the trusted environment, each of the I/O devices being inaccessible to the legacy environment; wherein the trusted environment receives input from the I/O devices and the network hardware interface and monitors, compares, evaluates, blocks, processes or modifies the received input for transmitting to the legacy environment;
wherein the trusted environment monitors, compares, evaluates, blocks, processes or modifies input received from the legacy environment for transmitting to the I/O devices and the network hardware interface;
wherein the trusted hardware processor utilizes a hardware gated channel to control computing functions of the legacy environment; and
wherein the legacy environment executes safe applications to generate output in a structured form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for providing secure computing operations on a computing device, the method comprising:
-
executing a legacy computing environment by a legacy processor executing instructions stored in a legacy memory, the legacy computing environment being utilized to facilitate computing resource intensive functions of the computing device or computing operations that expose the computing device to security risks that are external to the computing device; and executing a trusted computing environment by a trusted processor executing instructions stored in a trusted memory, the trusted computing environment being utilized to process input and output operations of the computing device and monitor the legacy computing environment; executing a first portion of an application in the trusted computing environment and executing a second portion of the application in the legacy computing environment; combining an output of the first portion of the application executed in the trusted computing environment with an output of the second portion of the application executed in the legacy computing environment; executing a third portion of the application in another legacy computing environment; and executing a trusted browser application within the trusted computing environment. - View Dependent Claims (16, 17)
-
-
18. A computing device, comprising:
-
a trusted environment comprising; a trusted processor; and a trusted memory for storing executable instructions, the trusted memory storing passwords for a user; a legacy environment comprising; a secondary processor that is physically separated from the trusted processor; and a secondary memory for storing executable instructions, the secondary processor executing the instructions to provide a legacy computing environment that utilizes applications or network resources that require one or more of the passwords for authenticating the user; and wherein the trusted environment provides one or more passwords in response to a request, in such a way that the one or more passwords provided by the trusted environment are not exposed to the legacy environment; a network interface that is dedicated for the trusted environment, the network interface being inaccessible to the legacy environment; and input/output (I/O) devices, wherein each of the I/O devices comprises dedicated connections for the trusted environment, wherein at least a portion of the I/O devices which do not pose a security risk to a computing system device are coupled with the legacy environment; wherein the legacy environment executes safe applications to generate output in a structured form;
wherein the trusted environment comprises a content insertion module that is executed by the trusted processor to insert trusted data into the structured form; andwherein content downloaded from a network is stored and executed only in the legacy environment, the downloaded content being inaccessible by the trusted environment.
-
Specification