SECURE COMPUTER ARCHITECTURES, SYSTEMS, AND APPLICATIONS
First Claim
Patent Images
1. A computing device, comprising:
- a trusted environment comprising;
a trusted processor; and
a trusted memory for storing executable instructions, the trusted processor executing the instructions to provide a trusted computing environment that performs computing functions that could expose the computing device to a security risk; and
a legacy environment comprising;
a secondary processor that is physically separated from the trusted processor; and
a secondary memory for storing executable instructions, the secondary processor executing the instructions to provide a legacy computing environment that manages computing functions exposed to unsecure environments.
0 Assignments
0 Petitions
Accused Products
Abstract
Secure computer architectures, systems, and applications are provided herein. An exemplary computing system may include a trusted environment having a trusted processor and memory that provides a trusted computing environment that performs computing functions that could expose the computing device to a security risk, and a legacy environment having a secondary processor and memory for providing a legacy computing environment that manages computing functions exposed to unsecure environments.
39 Citations
34 Claims
-
1. A computing device, comprising:
-
a trusted environment comprising; a trusted processor; and a trusted memory for storing executable instructions, the trusted processor executing the instructions to provide a trusted computing environment that performs computing functions that could expose the computing device to a security risk; and a legacy environment comprising; a secondary processor that is physically separated from the trusted processor; and a secondary memory for storing executable instructions, the secondary processor executing the instructions to provide a legacy computing environment that manages computing functions exposed to unsecure environments. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computing device, comprising:
-
a plurality of input and output devices; a memory for storing executable instructions, the memory comprising a trusted portion and a legacy portion; a first processor, the first processor executing instructions in the trusted portion of the memory to provide a first computing environment that manages operations of the plurality of input and output devices to protect sensitive information of the computing device; a network interface for communicating with devices external to the computing device; and a second processor, the second processor executing the instructions in the legacy portion of the memory to provide a second computing environment that communicates with the devices external to the computing device using the network interface, wherein operations of second computing environment are controlled and managed by the first computing environment. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for providing secure computing operations on a computing device, the method comprising:
-
executing a legacy computing environment by a legacy processor executing instructed stored in a legacy memory, the legacy computing environment being utilized to facilitate complex computing functions of the computing system or computing operations that expose the computing system to security risks that are external to the computing device; and executing a trusted computing environment by a trusted processor executing instructed stored in a trusted memory, the trusted computing environment being utilized to process input and output operations of the computing device and monitor the legacy computing environment. - View Dependent Claims (28, 29, 30, 31, 32, 33)
-
-
34. A computing device, comprising:
-
a trusted environment comprising; a trusted processor; and a trusted memory for storing executable instructions, the trusted processor storing passwords for a user; a legacy environment comprising; a secondary processor that is physically separated from the trusted processor; and a secondary memory for storing executable instructions, the secondary processor executing the instructions to provide a legacy computing environment that utilizes applications or network resources that require one or more of the passwords for authenticating the user; and wherein the trusted environment provides one or more passwords in response to a request, in such a way that the one or more passwords provided by the trusted environment are not exposed to the legacy environment.
-
Specification