Secure host communications
First Claim
1. A computer-implemented method to communicate securely between devices, comprising:
- receiving, by a first computing device associated with a first host computing device, a first communication from a first user, the first communication received through a secure interface of the first computing device, wherein the secure interface is isolated from a host interface of the first computing device;
encrypting, by the first computing device and in a first isolated environment of the first computing device, the received first communication, wherein the first isolated environment is not directly accessible to the first host computing device; and
communicating, by the first computing device, the encrypted first communication to a first read file of the host interface of the first computing device, wherein the encrypted first communication is available to the first host computing device in the first read file.
2 Assignments
0 Petitions
Accused Products
Abstract
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A user provides a communication to the trusted device via the secure interface. A processor of the isolated environment encrypts the communication and transmits the encrypted communication to a read file of the host interface. A host device connected to the trusted device via the host interface receives the encrypted communication. The host device transmits the encrypted communication to a second host device that is connected to a second trusted device via a second host interface. The second host device transmits the encrypted communication to a write file of the second host interface. A processor in an isolated environment of the second trusted device decrypts the communication and provides the decrypted communication to a second user via a secure interface of the second trusted device.
55 Citations
20 Claims
-
1. A computer-implemented method to communicate securely between devices, comprising:
-
receiving, by a first computing device associated with a first host computing device, a first communication from a first user, the first communication received through a secure interface of the first computing device, wherein the secure interface is isolated from a host interface of the first computing device; encrypting, by the first computing device and in a first isolated environment of the first computing device, the received first communication, wherein the first isolated environment is not directly accessible to the first host computing device; and communicating, by the first computing device, the encrypted first communication to a first read file of the host interface of the first computing device, wherein the encrypted first communication is available to the first host computing device in the first read file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising:
a non-transitory computer-readable storage device having computer-executable program instructions embodied thereon that when executed by a computer cause the computer to communicate securely between devices, the computer-executable program instructions comprising; computer-executable program instructions to receive, by a first computing device associated with a first host computing device, a first communication from a first user, the first communication received through a secure interface of the first computing device, wherein the secure interface is isolated from a host interface of the first computing device; computer-executable program instructions to encrypt, by the first computing device and in a first isolated environment of the first computing device, the received first communication, wherein the first isolated environment is not directly accessible to the first host computing device; and computer-executable program instructions to communicate, by the first computing device, the encrypted first communication to a first read file of the host interface of the first computing device, wherein the encrypted first communication is available to the first host computing device in the first read file. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A system to communicate securely between devices, comprising:
-
a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive, by a first computing device associated with a first host computing device, a first communication from a first user, the first communication received through a secure interface of the first computing device, wherein the secure interface is isolated from a host interface of the first computing device; encrypt, by the first computing device and in a first isolated environment of the first computing device, the received first communication , wherein the first isolated environment is not directly accessible to the first host computing device; and communicate, by the first computing device, the encrypted first communication to a first read file of the host interface of the first computing device, wherein the encrypted first communication is available to the first host computing device in the first read file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification