Identifying Security Boundaries on Computing Devices

During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in ano...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: NOVAK MARK FISHEL, KINSHUMANN KINSHUMAN, SAMSONOV YEVGENIY A, FERGUSON NIELS T
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator NOVAK MARK FISHEL
KINSHUMANN KINSHUMAN
SAMSONOV YEVGENIY A
FERGUSON NIELS T
description During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, a public/private key pair of one of the security boundaries is generated or otherwise obtained. The private key of the public/private key pair is provided to the one security boundary, and the public key of the public/private key pair is provided to the boot measurement system.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2016105280A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2016105280A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2016105280A13</originalsourceid><addsrcrecordid>eNrjZDDxTEnNK8lMq8zMS1cITk0uLcosqVRwyi_NS0ksykwtVsjPU3DOzy0oLQEpcEkty0xOLeZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGhmaGBqZGFgaOhsbEqQIA-hYt1Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Identifying Security Boundaries on Computing Devices</title><source>esp@cenet</source><creator>NOVAK MARK FISHEL ; KINSHUMANN KINSHUMAN ; SAMSONOV YEVGENIY A ; FERGUSON NIELS T</creator><creatorcontrib>NOVAK MARK FISHEL ; KINSHUMANN KINSHUMAN ; SAMSONOV YEVGENIY A ; FERGUSON NIELS T</creatorcontrib><description>During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, a public/private key pair of one of the security boundaries is generated or otherwise obtained. The private key of the public/private key pair is provided to the one security boundary, and the public key of the public/private key pair is provided to the boot measurement system.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160414&amp;DB=EPODOC&amp;CC=US&amp;NR=2016105280A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25568,76551</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160414&amp;DB=EPODOC&amp;CC=US&amp;NR=2016105280A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>NOVAK MARK FISHEL</creatorcontrib><creatorcontrib>KINSHUMANN KINSHUMAN</creatorcontrib><creatorcontrib>SAMSONOV YEVGENIY A</creatorcontrib><creatorcontrib>FERGUSON NIELS T</creatorcontrib><title>Identifying Security Boundaries on Computing Devices</title><description>During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, a public/private key pair of one of the security boundaries is generated or otherwise obtained. The private key of the public/private key pair is provided to the one security boundary, and the public key of the public/private key pair is provided to the boot measurement system.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDDxTEnNK8lMq8zMS1cITk0uLcosqVRwyi_NS0ksykwtVsjPU3DOzy0oLQEpcEkty0xOLeZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGhmaGBqZGFgaOhsbEqQIA-hYt1Q</recordid><startdate>20160414</startdate><enddate>20160414</enddate><creator>NOVAK MARK FISHEL</creator><creator>KINSHUMANN KINSHUMAN</creator><creator>SAMSONOV YEVGENIY A</creator><creator>FERGUSON NIELS T</creator><scope>EVB</scope></search><sort><creationdate>20160414</creationdate><title>Identifying Security Boundaries on Computing Devices</title><author>NOVAK MARK FISHEL ; KINSHUMANN KINSHUMAN ; SAMSONOV YEVGENIY A ; FERGUSON NIELS T</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2016105280A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>NOVAK MARK FISHEL</creatorcontrib><creatorcontrib>KINSHUMANN KINSHUMAN</creatorcontrib><creatorcontrib>SAMSONOV YEVGENIY A</creatorcontrib><creatorcontrib>FERGUSON NIELS T</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>NOVAK MARK FISHEL</au><au>KINSHUMANN KINSHUMAN</au><au>SAMSONOV YEVGENIY A</au><au>FERGUSON NIELS T</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Identifying Security Boundaries on Computing Devices</title><date>2016-04-14</date><risdate>2016</risdate><abstract>During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, a public/private key pair of one of the security boundaries is generated or otherwise obtained. The private key of the public/private key pair is provided to the one security boundary, and the public key of the public/private key pair is provided to the boot measurement system.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2016105280A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Identifying Security Boundaries on Computing Devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T18%3A40%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=NOVAK%20MARK%20FISHEL&rft.date=2016-04-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2016105280A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true