TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

    公开(公告)号:US20240137210A1

    公开(公告)日:2024-04-25

    申请号:US18066383

    申请日:2022-12-15

    CPC classification number: H04L9/0825 H04L9/0861 H04L9/3247

    Abstract: A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.

    TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

    公开(公告)号:US20240235819A9

    公开(公告)日:2024-07-11

    申请号:US18066383

    申请日:2022-12-15

    CPC classification number: H04L9/0825 H04L9/0861 H04L9/3247

    Abstract: A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.

    SAFE MANUAL MEMORY MANAGEMENT
    8.
    发明申请

    公开(公告)号:US20180253311A1

    公开(公告)日:2018-09-06

    申请号:US15615757

    申请日:2017-06-06

    CPC classification number: G06F9/30123 G06F9/30116

    Abstract: A method of manual memory management is described which comprises enabling one or more threads to access an object created in a manual heap by storing a reference to the object in thread-local state and subsequently deleting the stored reference after accessing the object. In response to abandonment of the object, an identifier for the object and a current value of either a local counter of a thread or a global counter are stored in a delete queue and all threads are prevented from storing any further references to the object in thread-local state. Deallocation of the object only occurs when all references to the object stored in thread-local state for any threads have been deleted and a current value of the local counter for the thread or the global counter has incremented to a value that is at least a pre-defined amount more than the stored value, wherein the global counter is updated using one or more local counters.

    DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING

    公开(公告)号:US20210382876A1

    公开(公告)日:2021-12-09

    申请号:US17412165

    申请日:2021-08-25

    Abstract: In various examples, there is provided a computer-implemented method for writing transaction log entries to a transaction log for a database system. At least part of the database system is configured to be executed within a trusted execution environment. The transaction log is stored outside of the trusted execution environment. The method maintains a first secure count representing a number of transaction log entries which have been written to the transaction log for transactions which have been committed to the database and writes a transaction log entry to the transaction log. In other examples, there is also provided is a computer-implemented method for restoring a database system using transaction log entries received from the transaction log and a current value of the first secure count.

Patent Agency Ranking