IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0206579
(2005-08-18)
|
등록번호 |
US-7257707
(2007-08-14)
|
발명자
/ 주소 |
- England,Paul
- Peinado,Marcus
- Simon,Daniel R.
- Benaloh,Josh D.
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
17 인용 특허 :
112 |
초록
▼
Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binar
Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
대표청구항
▼
The invention claimed is: 1. One or more computer storage media having stored thereon a plurality of instructions to implement a trusted core of a computing device that, when executed by one or more processors of the computing device, causes the one or more processors to: receive, from a trusted ap
The invention claimed is: 1. One or more computer storage media having stored thereon a plurality of instructions to implement a trusted core of a computing device that, when executed by one or more processors of the computing device, causes the one or more processors to: receive, from a trusted application executing on the computing device, a request to retrieve a secret securely stored by a previous trusted application executing on the computing device; obtain a first manifest identifier from a first manifest corresponding to the trusted application; obtain a second manifest identifier identifying a second manifest corresponding to the previous trusted application, wherein the second manifest identifier is stored with the secret; compare the first manifest identifier of the trusted application to the second manifest identifier corresponding to the previous trusted application; and reveal the secret to the trusted application if the first manifest identifier and the second manifest identifier are the same, if the first manifest identifier and the second manifest identifier are not the same then reveal the secret to the trusted application if an export certificate corresponding to the previous trusted application identifies the first manifest having the first manifest identifier as being authorized to retrieve the secret, and otherwise not reveal the secret to the trusted application; wherein the export certificate includes: an identification of the first manifest; an identification of the second manifest, wherein the second manifest was digitally signed using a first private key of a first public-private key pair of a party that generated the second manifest; and a digital signature over the identification of the first manifest and the identification of the second manifest, wherein the digital signature is generated using the first private key. 2. One or more computer storage media as recited in claim 1, wherein the trusted application is an upgraded version of the previous trusted application. 3. One or more computer storage media as recited in claim 1, wherein: the second manifest includes a first public key of the first public-private key pair, an identifier of the party that generated the second manifest, and a version indicator of the second manifest; and the first manifest includes a second public key of a second public-private key pair of a party that generated the first manifest, an identifier of the party that generated the first manifest, and a version indicator of the first manifest. 4. One or more computer storage media as recited in claim 3, wherein the instructions that cause the one or more processors to determine whether to reveal the secret to the trusted application cause the one or more processors to: check whether the first public key is the same as the second public key and whether the identity of the party that generated the first manifest is the same as the identity of the party that generated the second manifest; check whether the version indicator of the first manifest is the same as one or more version indicators supplied by the previous trusted application when securely storing the secret; and refuse to reveal the secret to the trusted application if the checking indicates any one or more of the following: the first public key is not the same as the second public key, the identity of the party that generated the first manifest is not the same as the identity of the party that generated the second manifest, the version indicator of the first manifest is not the same as one or more version indicators supplied by the previous trusted application when securely storing the secret. 5. A method implemented by a trusted core of a computing device, the method comprising: receiving, from a trusted application executing on the computing device, a request to retrieve a secret securely stored by a previous trusted application executing on the computing device; obtaining a first manifest identifier from a first manifest corresponding to the trusted application; obtaining a second manifest identifier identifying a second manifest corresponding to the previous trusted application, wherein the second manifest identifier is stored with the secret; comparing the first manifest identifier of the trusted application to the second manifest identifier corresponding to the previous trusted application; and revealing the secret to the trusted application if the first manifest identifier and the second manifest identifier are the same, if the first manifest identifier and the second manifest identifier are not the same then revealing the secret to the trusted application if an export certificate corresponding to the previous trusted application identifies the first manifest having the first manifest identifier as being authorized to retrieve the secret, and otherwise not revealing the secret to the trusted application; wherein the export certificate includes: an identification of the first manifest; an identification of the second manifest, wherein the second manifest was digitally signed using a first private key of a first public-private key pair of a party that generated the second manifest; and a digital signature over the identification of the first manifest and the identification of the second manifest, wherein the digital signature is generated using the first private key. 6. A method as recited in claim 5, wherein the trusted application is an upgraded version of the previous trusted application. 7. A method as recited in claim 5, wherein: the second manifest includes a first public key of the first public-private key pair, an identifier of the party that generated the second manifest, and a version indicator of the second manifest; and the first manifest includes a second public key of a second public-private key pair of a party that generated the first manifest, an identifier of the party that generated the first manifest, and a version indicator of the first manifest. 8. A method as recited in claim 7, wherein the determining whether to reveal the secret to the trusted application further comprises: checking whether the first public key is the same as the second public key and whether the identity of the party that generated the first manifest is the same as the identity of the party that generated the second manifest; checking whether the version indicator of the first manifest is the same as one or more version indicators supplied by the previous trusted application when securely storing the secret; and refusing to reveal the secret to the trusted application if the checking indicates any one or more of the following: the first public key is not the same as the second public key, the identity of the party that generated the first manifest is not the same as the identity of the party that generated the second manifest, the version indicator of the first manifest is not the same as one or more version indicators supplied by the previous trusted application when securely storing the secret. 9. A computing device comprising: a processor; and one or more computer storage media having stored thereon instructions to implement a trusted core that, when executed by the processor, causes the processor to: receive, from a trusted application executing on the computing device, a request to retrieve a secret securely stored by a previous trusted application executing on the computing device; obtain a first manifest identifier from a first manifest corresponding to the trusted application; obtain a second manifest identifier identifying a second manifest corresponding to the previous trusted application, wherein the second manifest identifier is stored with the secret; compare the first manifest identifier of the trusted application to the second manifest identifier corresponding to the previous trusted application; and reveal the secret to the trusted application if the first manifest identifier and the second manifest identifier are the same, if the first manifest identifier and the second manifest identifier are not the same then reveal the secret to the trusted application if an export certificate corresponding to the previous trusted application identifies the first manifest having the first manifest identifier as being authorized to retrieve the secret, and otherwise not reveal the secret to the trusted application; wherein the export certificate includes: an identification of the first manifest; an identification of the second manifest, wherein the second manifest was digitally signed using a first private key of a first public-private key pair of a party that generated the second manifest; and a digital signature over the identification of the first manifest and the identification of the second manifest, wherein the digital signature is generated using the first private key. 10. A computing device as recited in claim 9, wherein the trusted application is an upgraded version of the previous trusted application. 11. A computing device as recited in claim 9, wherein: the second manifest includes a first public key of the first public-private key pair, an identifier of the party that generated the second manifest, and a version indicator of the second manifest; and the first manifest includes a second public key of a second public-private key pair of a party that generated the first manifest, an identifier of the party that generated the first manifest, and a version indicator of the first manifest. 12. A computing device as recited in claim 11, wherein the instructions that cause the processor to determine whether to reveal the secret to the trusted application cause the processor to: check whether the first public key is the same as the second public key and whether the identity of the party that generated the first manifest is the same as the identity of the party that generated the second manifest; check whether the version indicator of the first manifest is the same as one or more version indicators supplied by the previous trusted application when securely storing the secret; and refuse to reveal the secret to the trusted application if the checking indicates any one or more of the following: the first public key is not the same as the second public key, the identity of the party that generated the first manifest is not the same as the identity of the party that generated the second manifest, the version indicator of the first manifest is not the same as one or more version indicators supplied by the previous trusted application when securely storing the secret.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.