Trusted enclave for a computer system
First Claim
Patent Images
1. A computer node, comprising:
- a network interface;
a processor communicatively coupled with the network interface and having an operating system executing thereon; and
a protective hardware element communicatively coupled with the processor, wherein the protective hardware element is not managed by the operating system, and wherein the computer node receives one or more protective software elements via the network interface and installs the protective software elements on the computer node under management of the operating system, and wherein the computer node executes the protective software elements under management of the operating system whereby access of processes to one or more protected resources on the computer node is regulated, suspicious events occurring on the computer node are logged in a log file maintained on the computer node and integrity of the protective software elements and the log file are verified at least in part by validating one or more hash values of the protective software elements cryptographically signed by the protective hardware element and validating a hash value of the log file cryptographically signed by the protective hardware element.
2 Assignments
0 Petitions
Accused Products
Abstract
A trusted enclave for a software system of a computer node provides relatively high assurance protection of a section of the software system. The trusted enclave attempts to stop malware from compromising parts of the software system within the trusted enclave. If a software system process outside the trusted enclave becomes compromised, the compromised process may be prevented from compromising software system resources within the trusted enclave. Compromise of a process or resource of the software system refers to, for example, malware access, alteration or control of the process or resource.
59 Citations
20 Claims
-
1. A computer node, comprising:
-
a network interface; a processor communicatively coupled with the network interface and having an operating system executing thereon; and a protective hardware element communicatively coupled with the processor, wherein the protective hardware element is not managed by the operating system, and wherein the computer node receives one or more protective software elements via the network interface and installs the protective software elements on the computer node under management of the operating system, and wherein the computer node executes the protective software elements under management of the operating system whereby access of processes to one or more protected resources on the computer node is regulated, suspicious events occurring on the computer node are logged in a log file maintained on the computer node and integrity of the protective software elements and the log file are verified at least in part by validating one or more hash values of the protective software elements cryptographically signed by the protective hardware element and validating a hash value of the log file cryptographically signed by the protective hardware element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for maintaining a trusted enclave on a computer node, comprising the steps of:
-
receiving one or more protective software elements on the computer node; installing the protective software elements on the computer node under management of an operating system executing on the computer node; regulating by the computer node access of processes to one or more protected resources on the computer node using the protective software elements under management of the operating system; logging by the computer node suspicious events occurring on the computer node in a log file maintained on the computer node using the protective software elements under management of the operating system; and verifying integrity of the protective software elements and the log file by the computer node using the protective software elements under management of the operating system at least in part by validating one or more hash values of the protective software elements cryptographically signed by a protective hardware element on the computer node and validating a hash value of the log file cryptographically signed by the protective hardware element, wherein the protective hardware element is not managed by the operating system.
-
Specification