FIELD: information technology.
SUBSTANCE: system to emulate a trusted execution environment physically connected includes module, executed with the ability to take command of a trusted execution environment issued lots of actors through a network, where each team is command function in the security context that corresponds to the entity that issued the command; security processor instance configured to perform a variety of cryptographic processes and ensure the security of keys and protected data sets as a reaction to the command of trusted environment execution; the account management module configured to sustain many protected accounts.
EFFECT: preserve the security of the local trusted execution environment.
20 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN | 2016 |
|
RU2673842C1 |
PRESENTING OPERATING SYSTEM CONTEXT IN TRUSTED PLATFORM MODULE | 2015 |
|
RU2702276C2 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION | 2005 |
|
RU2390945C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
ABSTRACT ENCLAVE IDENTIFICATION | 2017 |
|
RU2762141C2 |
Authors
Dates
2018-01-10—Published
2013-06-13—Filed