Trusted platforms using minimal hardware resources
A technology of software and software components, applied in electrical components, secure communication devices, key distribution, and can solve problems such as IoT device security difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] overview
[0023] Examples described herein provide techniques and architectures for facilitating a framework that provides the core TCB of an electronic device with various hardware security capabilities. The framework functions by controlling the bootstrapping of a device's TCB and providing attestation and sealing capabilities for TCB components, both of which can be built into device hardware while requiring minimal hardware resources. The framework can also mediate the software update process of the device by implementing a protocol for protecting the secrets of the updated software modules. The protocol protects the secret of a software module by securely migrating the secret from a previous version of the software module to a newer version of the software module in a secure manner. In some examples, a software module may include components of a device's TCB as a single executable image or as a set of executable images with the same trust attributes.
[0024] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


