US 12,169,552 B2
Implementing trusted clients using secure execution environments
Michael Hingston McLaughlin Bursell, Farnborough (GB); Axel Simon, Farnborough (GB); and Benjamin G. Fischer, Westford, MA (US)
Assigned to Red Hat, Inc., Raleigh, NC (US)
Filed by Red Hat, Inc., Raleigh, NC (US)
Filed on Nov. 11, 2020, as Appl. No. 17/095,313.
Prior Publication US 2022/0147616 A1, May 12, 2022
Int. Cl. H04L 29/06 (2006.01); A63F 13/35 (2014.01); A63F 13/71 (2014.01); G06F 21/53 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/53 (2013.01) [A63F 13/35 (2014.09); A63F 13/71 (2014.09); G06F 21/6245 (2013.01)] 6 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by an Internet-of-Things (IoT) server, a pre-execution measurement from an IoT client application running in a secure execution environment implemented by an IoT client computing device, wherein the pre-execution measurement is performed by cryptographically signing an executable image of the IoT client application and a data item utilized by the IoT client application;
responsive to validating the pre-execution measurement, transmitting a first confidential data item to the client application running in the secure execution environment, wherein the first confidential data item comprises control and configuration data associated with the IoT client application, and wherein the first confidential data item comprises executable code for pre-processing sensor data acquired by the IoT client device;
causing the IoT client application running in the secure execution environment to forward the first confidential data item to a peer IoT client computing device; and
receiving, from the IoT client application running in the secure execution environment, a second confidential data item derived by the IoT client application based on the first confidential data item.