FIELD: computer safety.
SUBSTANCE: claimed invention relates to ensuring safety of computer systems, as well as to counteraction measures to prevent attacks or reduce their effectiveness. The claimed method involves decrypting one or more large binary objects (blobs) in a computing system among many different large binary objects. Each of the blobs in the set of blobs contains a secret. Each of the blobs in the set of blobs is sealed for a different condition from the set of conditions. This condition is a reflection of the state of the system, while the state of the system indicates whether the system can be trusted to obtain a secret. The method further involves evaluating one or more of the conditions to determine whether at least one of the one or more conditions is satisfied. The method additionally includes providing the secret to an external entity, if at least one of one or more conditions is satisfied.
EFFECT: claimed invention provides reduced effectiveness of attacks.
20 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
ABSTRACT ENCLAVE IDENTIFICATION | 2017 |
|
RU2762141C2 |
SEALING DATA WITH SEALING ENCLAVE | 2017 |
|
RU2759329C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
CROSS-PLATFORM ENCLAVE IDENTIFICATION INFORMATION | 2018 |
|
RU2759302C2 |
UNSEALING DATA WITH SEALING ENCLAVE | 2017 |
|
RU2759331C2 |
TRUSTED ENTITY BASED ANTI-CHEATING MECHANISM | 2010 |
|
RU2541879C2 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
PRESENTING OPERATING SYSTEM CONTEXT IN TRUSTED PLATFORM MODULE | 2015 |
|
RU2702276C2 |
DIGITAL RIGHTS CONTROL USING PROCEDURES OF CONFIDENCE PROCESSING | 2007 |
|
RU2419235C2 |
Authors
Dates
2021-05-25—Published
2017-08-25—Filed