Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2018140168) ADDRESSING A TRUSTED EXECUTION ENVIRONMENT
Latest bibliographic data on file with the International Bureau    Submit observation

Pub. No.: WO/2018/140168 International Application No.: PCT/US2017/067459
Publication Date: 02.08.2018 International Filing Date: 20.12.2017
IPC:
H04L 29/06 (2006.01) ,G06F 21/53 (2013.01) ,H04L 9/32 (2006.01) ,G06F 21/57 (2013.01)
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29
Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02
Communication control; Communication processing
06
characterised by a protocol
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52
during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
53
by executing in a restricted environment, e.g. sandbox or secure virtual machine
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
32
including means for verifying the identity or authority of a user of the system
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57
Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Applicants:
MICROSOFT TECHNOLOGY LICENSING, LLC [US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
Inventors:
NOVAK, Mark, F.; US
Agent:
MINHAS, Sandip, S.; US
CHEN, Wei-Chen, Nicholas; US
DRAKOS, Katherine, J.; US
HINOJOSA, Brianna, L.; US
HOLMES, Danielle, J.; US
SWAIN, Cassandra, T.; US
WONG, Thomas, S.; US
CHOI, Daniel; US
HWANG, William, C.; US
WIGHT, Stephen, A.; US
CHATTERJEE, Aaron, C.; US
Priority Data:
15/416,98126.01.2017US
Title (EN) ADDRESSING A TRUSTED EXECUTION ENVIRONMENT
(FR) ADRESSAGE D'UN ENVIRONNEMENT D'EXÉCUTION DE CONFIANCE
Abstract:
(EN) Methods, systems, and devices are described herein for delivering protected data to a trusted execution environment (TrEE) associated with a potentially untrusted requestor. In one aspect, a targeting protocol head may receive a request for protected data from a potentially untrusted requestor associated with a TrEE, and an attestation statement of the TrEE. The targeting protocol head may retrieve the protected data, and obtain a targeting key of the TrEE from, for example, the request in the case of clean room provisioning, or the attestation statement. The targeting protocol head may generate targeted protected data by encrypting the protected data with the targeting key, and provide the targeted protected data to the potentially untrusted requestor, where a private targeting key of the TrEE is required to decrypt the targeted protected data.
(FR) L'invention concerne des procédés, des systèmes et des dispositifs servant à distribuer des données protégées à un environnement d'exécution de confiance (TrEE) associé à un demandeur potentiellement non fiable. Selon un aspect, une tête de protocole de ciblage peut recevoir une requête de données protégées provenant d'un demandeur potentiellement non fiable associé à un TrEE et une déclaration d'attestation du TrEE. La tête de protocole de ciblage peut récupérer les données protégées et obtenir une clé de ciblage du TrEE à partir, par exemple, de la requête dans le cas d'un approvisionnement de salle blanche ou de la déclaration d'attestation. La tête de protocole de ciblage peut générer des données protégées ciblées par chiffrement des données protégées à l'aide de la clé de ciblage et fournir les données protégées ciblées au demandeur potentiellement non fiable, une clé de ciblage privée du TrEE étant requise pour déchiffrer les données protégées ciblées.
front page image
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW
African Regional Intellectual Property Organization (ARIPO) (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Office (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (EPO) (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG)
Publication Language: English (EN)
Filing Language: English (EN)