EXECUTING PROCESSES IN SEQUENCE
    3.
    发明申请

    公开(公告)号:US20200034540A1

    公开(公告)日:2020-01-30

    申请号:US16470283

    申请日:2017-04-18

    Abstract: In an example, a machine-readable medium includes instructions that, when executed by a processor, cause the processor to order, as part of an execution of a trusted process, a plurality of processes into a sequence comprising a first process, at least one intermediate process, and a last process. The machine-readable medium may further comprise instruction to cause the processor to generate, as part of an execution of the first process, a value based on a code portion of the process following the first process in the sequence, and to generate, as part of an execution of each intermediate process, a respective value based on the value generated by the process preceding the intermediate process in the sequence and based on a code portion associated with the process following the intermediate process in the sequence.

    Process verification
    5.
    发明授权

    公开(公告)号:US11328055B2

    公开(公告)日:2022-05-10

    申请号:US16606740

    申请日:2018-01-31

    Abstract: Examples associated with process verification are described. One example includes a process operating in a general operating environment of the system. From an isolated environment, a protection module modifies the behavior of the process by modifying data associated with the process while the process is in operation. The protection module verifies whether the behavior of the process has changed in accordance with the modification. The protection module takes a remedial action upon determining the process has been compromised.

    Mitigating actions
    6.
    发明授权

    公开(公告)号:US10896085B2

    公开(公告)日:2021-01-19

    申请号:US15974625

    申请日:2018-05-08

    Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.

    DIGITAL COMPOSITION HASHING
    7.
    发明申请

    公开(公告)号:US20200186354A1

    公开(公告)日:2020-06-11

    申请号:US16613821

    申请日:2017-06-02

    Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.

    Checking a security value calculated for a part of a program code

    公开(公告)号:US10664593B2

    公开(公告)日:2020-05-26

    申请号:US15764170

    申请日:2015-10-29

    Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.

    Hardware security
    9.
    发明授权

    公开(公告)号:US11475107B2

    公开(公告)日:2022-10-18

    申请号:US16763496

    申请日:2018-03-12

    Abstract: A device platform, in some examples, comprises a security processor that may create a private/public cryptographic key pair, and data representing evidence of creation of the key pair, provide access to the key pair and data from an operating system component of the device platform, where the public key part of the key pair may be used to verify management commands. The device platform may validate the key pair and data in a trusted execution state.

    Controller for a fulfilment service operation

    公开(公告)号:US11347454B2

    公开(公告)日:2022-05-31

    申请号:US16076987

    申请日:2017-04-27

    Abstract: A controller for a fulfilment service operation is described in which the controller, before initiating fulfilment of the job, operates to determine if an authorised user is present at a fulfilment service device and to determine if the user intends to remain attendant at the fulfilment service device for the duration of fulfilment of the job. If the user moves away from the fulfilment service device, the controller operates to pause the job. If the user remains away from the fulfilment service device for a period of time, the controller operates to cancel the job.

Patent Agency Ranking