首页>
外国专利>
TECHNOLOGIES FOR SECURE Z-ORDER ENFORCEMENT WITH TRUSTED DISPLAY
TECHNOLOGIES FOR SECURE Z-ORDER ENFORCEMENT WITH TRUSTED DISPLAY
展开▼
机译:具有可信赖显示的安全Z订单执行技术
展开▼
页面导航
摘要
著录项
相似文献
摘要
Technologies for secure z-order enforcement include a computing device having a processor with secure enclave support. A secure enclave invokes an EBIND instruction with display programming information that includes a z-order enforcement policy indicating whether the secure enclave requests z-order enforcement for an overlay surface associated with the secure enclave. The processor generates wrapped programming information in response to invoking the EBIND instruction. An untrusted supervisor component such as a device driver invokes an UNWRAP instruction with the wrapped programming information. The processor unwraps the wrapped programming information and programs a display controller with the z-enforcement policy. The processor may read a z-order enforcement status register of the display controller to determine if an overlay surface is available. For z-order enforcement, the display controller composes the overlay surface associated with the secure enclave in front of all other overlay surfaces of the display controller. Other embodiments are described and claimed.
展开▼