Isolation of Trusted Input/Output Devices

Techniques are provided to ensure isolation of trusted input/output devices using a Secure Crypto-Processor. Secure IO lines may be used to drive devices that have a higher integrity requirement and to do attestation of sensor readings. Enhanced authorization policies may be used to enforce policies...

Full description

Saved in:
Bibliographic Details
Main Authors Thom Stefan, Spiger Robert K, Wooten David R, Kapadia Merzin
Format Patent
LanguageEnglish
Published 20.10.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques are provided to ensure isolation of trusted input/output devices using a Secure Crypto-Processor. Secure IO lines may be used to drive devices that have a higher integrity requirement and to do attestation of sensor readings. Enhanced authorization policies may be used to enforce policies on interaction with IO devices. A bus master controller may also be provided in a Secure Crypto-Processor. Individual devices on an isolated Secure Crypto-Processor bus may be mapped to Indices so that read and write operations can be associated with Secure-Crypto-Processor-enforced authorization policies. The Secure Crypto-Processor may further provide means of attestation for complex data read from an input/output device that may be signed with the device identity to show strong origination proof of that data.
Bibliography:Application Number: US201514816301