Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Smart Cities: Edge Computing

Search All Applications in Smart Cities: Edge Computing


Application US20190311127


Published 2019-10-10

Computing Devices

Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e.g., a cloudlet) may include: a trusted execution environment; a Basic Input/Output System (BIOS) to request a Key Encryption Key (KEK) from the trusted execution environment; and a Self-Encrypting Storage (SES) associated with the KEK; wherein the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is to provide the KEK to the SES to unlock the SES for access by the trusted execution environment.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A method for operating a cloudlet, comprising: booting a cloudlet that is remote from a data center, wherein the cloudlet boot cannot be tampered with by software executed by an operating system of the cloudlet; and receiving data at the cloudlet from a personal mobile computing device.

  • 8. A computing device, comprising: boot logic to boot the computing device, wherein the computing device is remote from a data center, and the boot cannot be tampered with by software executed by an operating system of the computing device; and interface logic to receive data at the computing device from a mobile computing device.

  • 18. A computing device, including: a secure processor; a Basic Input/Output System (BIOS) in communication with the secure processor; a trusted execution environment in communication with the BIOS; and a Self-Encrypting Storage (SES) in communication with the BIOS; wherein the BIOS is to request a Key Encryption Key (KEK) from the trusted execution environment, the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, the BIOS is to provide the KEK to the SES to unlock the SES, and the secure processor is to run virtual processes subsequent to unlocking the SES.