发明名称 Secure event log management
摘要 A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A write file of the host interface receives an entry from an untrusted host device connected to the trusted device. A processor of the isolated environment retrieves the entry and determines log data associated with the entry, such as the date and time of the entry. Using the log data, the processor records an event log entry in a secure storage of the isolated environment. Once recorded, the entry cannot be deleted or altered. An authorized user, however, can then access the event log entry from the secure storage, such as by providing a request for the event log entry via the secure interface of the trusted device and/or the host interface of the trusted device.
申请公布号 US9547773(B2) 申请公布日期 2017.01.17
申请号 US201414587905 申请日期 2014.12.31
申请人 GOOGLE INC. 发明人 Zatko Peiter Charles;Rizzo Dominic
分类号 G06F21/78;G06F21/62;G06F21/35;G06F21/74;G06F21/79 主分类号 G06F21/78
代理机构 Johnson, Marcou & Isaacs, LLC 代理人 Johnson, Marcou & Isaacs, LLC
主权项 1. A computer-implemented method to manage event logs, comprising: receiving, by a trusted computing device associated with a host computing device, a write-file entry into a write file of a host interface of the trusted computing device; in response to receiving the write-file entry, determining, by the trusted computing device, log data associated with the write-file entry; establishing, by the trusted computing device and in an isolated environment of the trusted computing device that is not directly accessible to the host computing device, an event log entry based on the determined log data; and recording, by the trusted computing device, the event log entry in an append-only event log in a secure storage of the isolated environment, wherein the entries in an append-only event log cannot be changed or altered once into the log.
地址 Mountain View CA US
您可能感兴趣的专利