×

Secure computer architectures, systems, and applications

  • US 9,614,839 B2
  • Filed: 06/18/2015
  • Issued: 04/04/2017
  • Est. Priority Date: 10/02/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computing device, comprising:

  • a trusted environment comprising;

    a trusted hardware processor; and

    a trusted memory for storing executable instructions, the trusted hardware processor executing the executable instructions to provide a trusted computing environment;

    a legacy environment comprising;

    a legacy hardware processor that is physically separated from the trusted hardware processor; and

    a legacy memory for storing executable instructions, the legacy hardware processor executing the executable instructions to provide a legacy computing environment;

    a network hardware interface that is dedicated for the trusted environment, the network hardware interface being inaccessible to the legacy environment; and

    input/output (I/O) devices, wherein each of the I/O devices comprises dedicated connections for the trusted environment, each of the I/O devices being inaccessible to the legacy environment;

    wherein the trusted environment receives input from the I/O devices and the network hardware interface and monitors, compares, evaluates, blocks, processes or modifies the received input for transmitting to the legacy environment;

    wherein the trusted environment monitors, compares, evaluates, blocks, processes or modifies input received from the legacy environment for transmitting to the I/O devices and the network hardware interface;

    wherein the trusted hardware processor utilizes a hardware gated channel to control computing functions of the legacy environment; and

    wherein the legacy environment executes safe applications to generate output in a structured form.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×