US 11,836,260 B2
Data security
Gustavo Federico Petri, Cambridge (GB); Guilhem Floréal Bryant, Cambridge (GB); Dominic Phillip Mulligan, Cottenham (GB); and Anthony Charles Joseph Fox, Cambridge (GB)
Assigned to ARM LIMITED, Cambridge (GB)
Filed by Arm Limited, Cambridge (GB)
Filed on Nov. 25, 2020, as Appl. No. 17/104,718.
Prior Publication US 2022/0164458 A1, May 26, 2022
Int. Cl. G06F 21/60 (2013.01); H04L 9/08 (2006.01); G06F 21/64 (2013.01); H04L 9/32 (2006.01)
CPC G06F 21/604 (2013.01) [G06F 21/64 (2013.01); H04L 9/0816 (2013.01); H04L 9/0894 (2013.01); H04L 9/3236 (2013.01); H04L 9/3271 (2013.01); G06F 21/602 (2013.01); G06F 2221/2149 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A data processing system comprising:
receiving circuitry configured to receive, from a requester, a request for the requester to use decrypted data obtained by decrypting encrypted data;
trusted execution circuitry configured to provide a trusted execution environment, wherein the trusted execution circuitry is configured to:
securely store a policy;
acquire a key within the trusted execution environment, wherein the key is associated with the decrypted or encrypted data; and
in response to the request and based on one or more characteristics of the requester and the policy, performing decryption on the encrypted data and transmitting the decrypted data to the requester.