×

Secure host interactions

  • US 9,760,727 B2
  • Filed: 12/31/2014
  • Issued: 09/12/2017
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method to generate a secure output based on restricted information, comprising:

  • receiving, by a trusted computing device associated with a separate host computing device, restricted information, wherein the trusted computing device is preconfigured to include an isolated environment and a host computing device interface comprising a write file and a read file, the isolated environment being not directly accessible to the host computing device other than via the write file and the read file, and the restricted information being stored in a secure storage of the isolated environment;

    receiving, by the write file of the trusted computing device and from the host computing device, a write-file entry, wherein the write-file entry comprises an indication of the restricted information that is responsive to the write-file entry; and

    processing, by the trusted computing device and in the isolated environment of the trusted computing device, the write-file entry, wherein processing the write-file entry comprises;

    identifying, based on the indication of the restricted information that is responsive to the write-file entry, at least a portion of the restricted information that is responsive to the write-file entry; and

    generating a secure output to the read file of the trusted computing device based on the identified restricted information, wherein the secure output is available to the host computing device in the read file of the trusted computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×