×

Techniques for implementing a secure mailbox in resource-constrained embedded systems

  • US 9,674,141 B2
  • Filed: 12/27/2013
  • Issued: 06/06/2017
  • Est. Priority Date: 12/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus comprising:

  • a hardware processor component comprising a portion of a chipset, the hardware processor component to execute a host operating system component comprising one or more application components;

    a hardware co-processor component comprising a portion of the chipset separate from the hardware processor component to execute a trusted execution environment, the trusted execution environment to perform secure operations for at least one of the one or more application components of the host operating system component, the trusted execution environment to include;

    a mailbox array component to store one or more mailbox components, each mailbox component being associated with a mailbox identification number, the mailbox identification number to include a mailbox index number comprising a number of bits m, the number of bits m based on a total number of mailbox components n within the mailbox array component, m and n comprising positive integers;

    a mailbox firewall initialization component to allocate firewall record slots for each of the one or more mailbox components, each firewall record slot including a mailbox identification number and an application component address; and

    a mailbox firewall component to facilitate communication between the at least one of the one or more application components of the host operating system component and at least one of the one or more mailbox components of the trusted execution environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×