18575055. ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIOD simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Revision as of 02:58, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIOD

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Maxwell Christopher Renke of Sammamish WA (US)

Andrea Allievi of Seattle WA (US)

Giridhar Viswanathan of Redmond WA (US)

Benjamin M. Schultz of Bellevue WA (US)

Hari R. Pulapaka of Redmond WA (US)

David Guy Weston of Seattle WA (US)

ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18575055 titled 'ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIOD

The abstract of this patent application describes a method for enforcing attestation of read-only protected memory during the validity period of an attestation report.

  • The client computer system detects a change in the read-only protected memory protection status of a software component.
  • It checks that the attestation report's validity time period has not expired.
  • The attestation report includes attested properties, such as read-only memory protection properties for the software component.
  • If a read-only memory protection property is no longer valid due to the change in memory protection status, the client computer system takes remedial action to prevent the software component from interacting with a relying party computer system.

Potential Applications: - Secure software execution in trusted environments - Preventing unauthorized access to sensitive data - Ensuring the integrity of software components in critical systems

Problems Solved: - Unauthorized changes to read-only protected memory - Ensuring the validity of attested properties during the attestation period

Benefits: - Enhanced security for software components - Protection against unauthorized modifications - Increased trust in the integrity of systems

Commercial Applications: Title: Secure Memory Protection Technology for Critical Systems This technology can be applied in industries such as finance, healthcare, and defense where data security and system integrity are paramount. It can be used in secure servers, IoT devices, and other critical systems to prevent unauthorized access and ensure the trustworthiness of software components.

Questions about Secure Memory Protection Technology: 1. How does this technology improve the security of software components in critical systems? This technology enhances security by enforcing attestation of read-only protected memory, preventing unauthorized access and ensuring the integrity of software components.

2. What are the potential implications of using this technology in industries like finance and healthcare? Implementing this technology in finance and healthcare sectors can enhance data security, protect sensitive information, and ensure compliance with regulatory requirements.


Original Abstract Submitted

Enforcing attestation of read-only protected memory during attestation validity period. A client computer system identifies a change in a read-only protected memory protection status for a software component loaded at the client computer system. The client computer system then determines that a validity time period of an attestation report is unexpired. The attestation report comprises one or more attested properties, including one or more read-only memory protection (ROMP) attested properties for the software component. The client computer system also determines that at least one ROMP attested property for the software component is no longer valid due to the change in the read-only protected memory protection status for a software component. Based on the at least one ROMP attested property for the software component being no longer valid, the client computer system initiates a remedial action to prevent interaction of the software component with a relying party computer system.