Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted platforms using minimal hardware resources

A technology of software and software components, applied in electrical components, secure communication devices, key distribution, and can solve problems such as IoT device security difficulties

Active Publication Date: 2018-06-08
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Implementing strong security on IoT devices can be difficult due to the limited resources that many IoT devices include

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted platforms using minimal hardware resources
  • Trusted platforms using minimal hardware resources
  • Trusted platforms using minimal hardware resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] overview

[0023] Examples described herein provide techniques and architectures for facilitating a framework that provides the core TCB of an electronic device with various hardware security capabilities. The framework functions by controlling the bootstrapping of a device's TCB and providing attestation and sealing capabilities for TCB components, both of which can be built into device hardware while requiring minimal hardware resources. The framework can also mediate the software update process of the device by implementing a protocol for protecting the secrets of the updated software modules. The protocol protects the secret of a software module by securely migrating the secret from a previous version of the software module to a newer version of the software module in a secure manner. In some examples, a software module may include components of a device's TCB as a single executable image or as a set of executable images with the same trust attributes.

[0024] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The framework can include a low-resource device and at least one distributed resource. The low-resource device can be configured to generate sealing keys, migration keys, and attestation keys that are based on a device secret associated with thelow-resource device and one or more software modules. The low-resource device can further be configured to use the migration keys and the sealing keys to both verify a software update and migrate secrets from a previous version of the software to a newer version of the software. Additionally, the low-resource device can be configured to generate an attestation statement using the attestation keysand perform attestation using the attestation statement and the at least one distributed resource.

Description

Background technique [0001] The Internet of Things (IoT) is a network of low-resource electronic devices embedded with software and connections that enable IoT devices to communicate with other electronic devices (eg, other IoT devices and more traditional computing devices) via one or more networks. These IoT devices are vulnerable to malware due to the use of networks to communicate with other electronic devices, which can disrupt computing operations and collect sensitive information from IoT devices. Therefore, to protect IoT devices from attacks, stronger security features are required. Implementing strong security on IoT devices can be difficult due to the limited resources that many IoT devices include. Contents of the invention [0002] The techniques and constructs discussed herein facilitate a framework for providing a core Trusted Computing Base (TCB) using a minimal set of hardware resources. The invention is particularly suitable for low-resource electronic de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51H04L9/08
CPCG06F21/51H04L9/0866H04L9/0891H04L9/3263G06F11/1417G06F9/4406G06F21/575H04L9/0861
Inventor D·R·伍滕A·马罗克D·马顿P·恩格兰
Owner MICROSOFT TECH LICENSING LLC