Search All Applications in Edge Computing
Application US20190311127
Published 2019-10-10
Computing Devices
Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e.g., a cloudlet) may include: a trusted execution environment; a Basic Input/Output System (BIOS) to request a Key Encryption Key (KEK) from the trusted execution environment; and a Self-Encrypting Storage (SES) associated with the KEK; wherein the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is to provide the KEK to the SES to unlock the SES for access by the trusted execution environment.
Much More than Average Length Specification
View the Patent Matrix® Diagram to Explore the Claim Relationships
USPTO Full Text Publication >
- 1. A method for operating a cloudlet, comprising:
booting a cloudlet that is remote from a data center, wherein the cloudlet boot cannot be tampered with by software executed by an operating system of the cloudlet; and receiving data at the cloudlet from a personal mobile computing device.
- 8. A computing device, comprising:
boot logic to boot the computing device, wherein the computing device is remote from a data center, and the boot cannot be tampered with by software executed by an operating system of the computing device; and interface logic to receive data at the computing device from a mobile computing device.
- 18. A computing device, including:
a secure processor; a Basic Input/Output System (BIOS) in communication with the secure processor; a trusted execution environment in communication with the BIOS; and a Self-Encrypting Storage (SES) in communication with the BIOS; wherein the BIOS is to request a Key Encryption Key (KEK) from the trusted execution environment, the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, the BIOS is to provide the KEK to the SES to unlock the SES, and the secure processor is to run virtual processes subsequent to unlocking the SES.