US 12,229,272 B2
Secure computation environment
Ambuj Kumar, Sunnyvale, CA (US)
Assigned to Cryptography Research, Inc., San Jose, CA (US)
Filed by Cryptography Research, Inc., San Jose, CA (US)
Filed on Feb. 10, 2022, as Appl. No. 17/650,544.
Application 17/650,544 is a continuation of application No. 15/739,105, granted, now 11,250,134, previously published as PCT/US2016/046428, filed on Aug. 10, 2016.
Claims priority of provisional application 62/208,490, filed on Aug. 21, 2015.
Prior Publication US 2022/0382874 A1, Dec. 1, 2022
Int. Cl. G06F 21/57 (2013.01); G06F 9/4401 (2018.01); G06F 21/44 (2013.01); G06F 21/51 (2013.01); H04L 9/32 (2006.01)
CPC G06F 21/575 (2013.01) [G06F 9/4401 (2013.01); G06F 21/44 (2013.01); G06F 21/51 (2013.01); H04L 9/3247 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, at a first time, a first container corresponding to executable code;
in response to the receiving of the first container, executing a container manager by a processing device of a secure computation environment, the container manager being resident in a memory of the secure computation environment to verify the first container;
providing, by the processing device, access to one or more resources of the secure computation environment by transferring control of the processing device from the container manager to the first container based on permissions of the first container for the resources of the secure computation environment;
receiving data from the first container, wherein the data is for a second container;
storing the data and an identification of the second container in another memory of the secure computation environment;
receiving, at a second time subsequent to the first time, the second container corresponding to additional executable code;
providing, by the processing device, access to the one or more resources by transferring control of the processing device from the container manager to the second container based on permissions of the second container for the resources of the secure computation environment; and
providing the data from the other memory of the secure computation environment to the second container in response to an identification of the second container matching the identification of the second container in the other memory of the secure computation environment.