18419359. PERIPHERAL DEVICE simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Revision as of 02:42, 30 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

PERIPHERAL DEVICE

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Stavros Volos of Cambridge (GB)

David Thomas Chisnall of Cambridge (GB)

Saurabh Mohan Kulkarni of Redmond WA (US)

Kapil Vaswani of Bangalore (IN)

Manuel Costa of Cambridge (GB)

Samuel Alexander Webster of Cambridge (GB)

Cédric Alain Marie Fournet of Cambridge (GB)

Richard Osborne of Bristol (GB)

Daniel John Pelham Wilkinson of Bristol (GB)

Graham Bernard Cunningham of Chippenham (GB)

PERIPHERAL DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18419359 titled 'PERIPHERAL DEVICE

Simplified Explanation

The abstract describes a peripheral device that includes compute elements, a security module, and encryption units to process sensitive data in a trusted execution environment.

  • The peripheral device has one or more compute elements for processing data.
  • A security module creates a trusted execution environment for processing sensitive data using sensitive code.
  • The encryption unit encrypts and decrypts data transferred between the trusted execution environment and a trusted computing entity.
  • The security module sends an attestation to the trusted computing entity to confirm that the sensitive code is in the trusted execution environment.

Potential Applications

This technology could be applied in secure communication devices, data processing systems, and IoT devices where sensitive data needs to be protected.

Problems Solved

This technology addresses the issue of securing sensitive data and code during processing, preventing unauthorized access and tampering.

Benefits

The benefits of this technology include enhanced security for sensitive data, protection against cyber threats, and assurance of code integrity within the trusted execution environment.

Potential Commercial Applications

A potential commercial application of this technology could be in the financial industry for secure transactions and data processing.

Possible Prior Art

One possible prior art could be secure enclaves in computing systems that provide a trusted execution environment for sensitive data processing.

Unanswered Questions

How does the security module ensure the integrity of the sensitive code within the trusted execution environment?

The security module uses cryptographic techniques to verify the authenticity and integrity of the sensitive code before executing it in the trusted environment.

What measures are in place to prevent unauthorized access to the sensitive data during processing?

The encryption units ensure that data transferred between the trusted execution environment and the trusted computing entity is encrypted, preventing unauthorized access.


Original Abstract Submitted

A peripheral device, for use with a host, comprises one or more compute elements a security module and at least one encryption unit. The security module is configured to form a trusted execution environment on the peripheral device for processing sensitive data using sensitive code. The sensitive data and sensitive code are provided by a trusted computing entity which is in communication with the host computing device. The at least one encryption unit is configured to encrypt and decrypt data transferred between the trusted execution environment and the trusted computing entity via the host computing device. The security module is configured to compute and send an attestation to the trusted computing entity to attest that the sensitive code is in the trusted execution environment.