PROTECTING SECRET SOFTWARE AND CONFIDENTIAL DATA IN A SECURE ENCLAVE

A method of receiving and executing a secret software (G) on data in a secure enclave of a first device (DO) includes the following steps implemented in the secure enclave, that is to say a step of generating a public key (B), a step of receiving the encrypted secret software (Gs) coming from a seco...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: NITULESCU, Anca, GENTY, Thibaud, SARTORI, Michele, GRIEDER, Bruno
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A method of receiving and executing a secret software (G) on data in a secure enclave of a first device (DO) includes the following steps implemented in the secure enclave, that is to say a step of generating a public key (B), a step of receiving the encrypted secret software (Gs) coming from a second device (AP), a step of decrypting the encrypted secret software (Gs) from a key (K; P) depending of the public key (B, a step of receiving data; and a step of executing the secret software (G) using the data.