Patents by Inventor Michael Hingston McLaughlin BURSELL

Michael Hingston McLaughlin BURSELL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230030816
    Abstract: The technology disclosed herein enables consumer devices to verify the integrity of services running in trusted execution environments. An example method may include: acquiring, by a broker device, integrity data of a first trusted execution environment of a first computing device and integrity data of a second trusted execution environment of a second computing device, wherein the first trusted execution environment executes a first service and the second trusted execution environment executes a second service; storing the integrity data of the first trusted execution environment and the integrity data of the second trusted execution environment in a data storage device as stored integrity data; correlating integrity data of the first trusted execution environment with the first service and the integrity data of the second trusted execution environment with the second service; and providing, by the broker device, the stored integrity data to a plurality of consumer devices.
    Type: Application
    Filed: July 30, 2021
    Publication date: February 2, 2023
    Inventors: Michael Hingston McLaughlin Bursell, Lilian Sturmann
  • Patent number: 11520878
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key from an encrypted memory region, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the deriving consumes computing resources for a duration of time; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: December 6, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Patent number: 11449601
    Abstract: The technology disclosed herein enables a first computing process to execute within a trusted execution environment to protect its data from other processes while selectively enabling a second computing process (e.g., a kernel process) to inspect data for compliance. An example method may include: establishing, by a processor, a trusted execution area for the first computing process, wherein the trusted execution area comprises an encrypted storage area; copying data of the first computing process into the trusted execution area, wherein the data comprises executable data or non-executable data; enabling the second computing process to access the copy of the data of the first computing process; and executing, by the processor, the first computing process using the trusted execution area.
    Type: Grant
    Filed: January 8, 2020
    Date of Patent: September 20, 2022
    Assignee: Red Hat, Inc.
    Inventor: Michael Hingston McLaughlin Bursell
  • Publication number: 20220284101
    Abstract: Systems and methods providing a processing device to receive, by a software build process executing in a trusted execution environment (TEE) of a first computer system, software source code from a second computer system. The processing device generates a software package by compiling the software source code. The processing device also generates a first signature of the software package and sends the first signature to the second computer system. Responsive to receiving, from the second computer system, a second signature comprising the first signature signed by the second computer system, the processing device further deploys the software package on the first computer system.
    Type: Application
    Filed: March 5, 2021
    Publication date: September 8, 2022
    Inventors: Axel Simon, Michael Hingston McLaughlin Bursell
  • Publication number: 20220284100
    Abstract: Systems and methods providing a processing device to receive, by a software build process executing in a trusted execution environment (TEE) of a first computer system, software source code from a second computer system. The processing device generates a software package by compiling the software source code. The processing device also receives, from the second computer system, a signing key associated with the second computer system. The processing device further signs the software package using the signing key associated with the second computer system. The processing device then deploys the signed software package on the first computer system.
    Type: Application
    Filed: March 5, 2021
    Publication date: September 8, 2022
    Inventors: Axel Simon, Michael Hingston McLaughlin Bursell
  • Patent number: 11436352
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for restricting data execution based on device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: September 6, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Patent number: 11424920
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that cryptographically controls access to data. An example method may include: selecting a set of cryptographic attributes in view of a characteristic of a computing device; obtaining, by a processing device, a cryptographic key; encrypting, by the processing device, the cryptographic key in view of the set of cryptographic attributes to produce a wrapped key; and providing the wrapped key and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving the cryptographic key from the wrapped key.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: August 23, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Patent number: 11411938
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses integrated key fragments to cryptographically control access to data. An example method may include encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; determining a plurality of key fragments of a second cryptographic key, wherein the second cryptographic key is for decrypting the wrapped key and at least one of the plurality of key fragments is derived using one of the key fragments as input; selecting a set of cryptographic attributes for deriving the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: August 9, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston Mclaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
  • Patent number: 11411728
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key fragments to cryptographically control access to data. An example method may include: encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; splitting a second cryptographic key into a plurality of key fragments, wherein the second cryptographic key is for decrypting the wrapped key; selecting a set of cryptographic attributes for deriving at least one of the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: August 9, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
  • Publication number: 20220188405
    Abstract: The technology disclosed herein provides a cryptographic key wrapping system for verifying device capabilities. An example method may include: accessing, by a processing device, a wrapped key that encodes a cryptographic key; executing, by the processing device in a trusted execution environment, instructions to derive the cryptographic key in view of the wrapped key, wherein the executing to derive the cryptographic key comprises a task that consumes computing resources for a duration of time; using the cryptographic key to access program data; executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time; and transmitting a message comprising an indication of the evaluated condition.
    Type: Application
    Filed: February 28, 2022
    Publication date: June 16, 2022
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20220171847
    Abstract: Systems and methods for detecting and handling attacks on processes executing within a trusted execution environment (TEE) are disclosed. In one implementation, a processing device may detect by a first process an event indicating that a first process executing in a TEE of a host computer system is under attack from a second process executing on the host computer system. the processing device may set a flag within a memory region of the TEE indicating that the first process is under attack. The processing device may further perform, in view of an attack response policy associated with the first process, an action responsive to detecting the event.
    Type: Application
    Filed: November 30, 2020
    Publication date: June 2, 2022
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel P. McCallum
  • Publication number: 20220171883
    Abstract: The technology disclosed herein enables efficient launching of trusted execution environments. An example method can include: receiving, by a first computing device, a request from a second computing device to establish a set of trusted execution environments (TEEs) in the first computing device; establishing a first TEE of the set of TEEs in the first computing device, wherein the trusted execution environment comprises an encrypted memory area and executable code; receiving, by the first TEE, cryptographic key data from the first computing device; establishing, by the first TEE, a second TEE of the set of TEEs in the first computing device, wherein the second TEE comprises a copy of the executable code; providing, by the first TEE, the cryptographic key data to the second TEE; and causing the executable code of the second TEE to communicate with the first computing device using the cryptographic key data.
    Type: Application
    Filed: November 30, 2020
    Publication date: June 2, 2022
    Inventors: Michael Hingston McLaughlin Bursell, Michael Tsirkin, Nathaniel McCallum
  • Patent number: 11343082
    Abstract: The technology disclosed herein enables resource sharing for trusted execution environments.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: May 24, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Tsirkin, Michael Hingston McLaughlin Bursell
  • Publication number: 20220147616
    Abstract: Systems and methods for implementing trusted clients using secure execution environments. An example method comprises: receiving, by a server, a measurement from a client application running in a secure execution environment implemented by a client computing device; responsive to validating the measurement, transmitting a first confidential data item to the client application running in the secure execution environment; receiving, from the client application running in the secure execution environment, a second confidential data item derived from a local state of the client application modified by the first confidential data item; and updating, in view of the second confidential data item, a local state of a server application.
    Type: Application
    Filed: November 11, 2020
    Publication date: May 12, 2022
    Inventors: Michael Hingston McLaughlin Bursell, Axel Simon, Benjamin G. Fischer
  • Patent number: 11316839
    Abstract: The technology disclosed herein provides an enhanced access control mechanism that uses a proof-of-work key wrapping system to temporally restrict access to data. An example method may include: determining, by a processing device, characteristics of a computing device; accessing a cryptographic key for accessing content; selecting a set of cryptographic attributes for wrapping the cryptographic key, wherein the set of cryptographic attributes are selected to enable the computing device to derive the cryptographic key from a wrapped key in a predetermined duration of time; and providing the wrapped key and an indication of at least one of the cryptographic attributes to the computing device.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: April 26, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20220123952
    Abstract: Methods and systems for detecting and responding to fabricated or unauthorized events received by serverless computing environments are provided. In one embodiment the method is provided that includes receiving an event from an event source external to the serverless computing environment for execution by function. The method may then include creating a message that includes the events and signing the message with an identifier of the event source. The message may then be received at the function and the identifier of the event source may be validated. The event may then be executed with the function of the serverless computing environment if the identifier of the event sources successfully validated. However, if the identifier of the event source is not successfully validated, execution of the event with the function may be prevented.
    Type: Application
    Filed: December 28, 2021
    Publication date: April 21, 2022
    Inventors: Huamin Chen, Michael Hingston McLaughlin Bursell
  • Publication number: 20220116375
    Abstract: Systems and methods for implementing multi-factor system-to-system authentication using secure execution environments. An example method comprises: determining, by a first computing system, using a secure execution environment, a measure of one or more computing processes running on the first computing system; presenting, to a second computing system, a first authentication factor derived from the measure computing, using the secure execution environment, a second authentication factor derived from at least one of: one or more first data items received from the second computing system, one or more confidential second data items received from one or more third computing systems, or one or more public data items received from one or more fourth computing systems; and presenting the second authentication factor to the second computing system.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventor: Michael Hingston McLaughlin Bursell
  • Patent number: 11303437
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key thresholding to cryptographically control data access. An example method may include: accessing a plurality of cryptographic key shares, wherein two or more of the plurality of cryptographic key shares enable access to content; selecting, by a processing device, a set of cryptographic attributes in view of a characteristic of a computing device; encrypting the plurality of cryptographic key shares to produce a plurality of wrapped key shares, wherein at least one of the plurality of cryptographic key shares is encrypted in view of the set of cryptographic attributes; and providing a wrapped key share of the plurality of wrapped key shares and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving an access key from the plurality of wrapped key shares.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: April 12, 2022
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20220103349
    Abstract: The technology disclosed herein enables resource sharing for trusted execution environments.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Michael Tsirkin, Michael Hingston McLaughlin Bursell
  • Publication number: 20220103379
    Abstract: Systems and methods for providing secured provisioning of workloads to a trusted execution environment (TEE) using a trusted client agent (TCA) are disclosed. In one implementation, a processing device may receive, at a software TCA residing in a a host computer system of a computing environment, a software provisioning command from an orchestration system of the computing environment, wherein the software provisioning command identifies a workload to be provisioned to a TEE. The processing device may determine a validation measure associated with the workload. Responsive to determining that the validation measure satisfies a predetermined condition, the processing device may perform the software provisioning operation to deploy the workload at the TEE.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventor: Michael Hingston McLaughlin Bursell