Abstract:
A system-on-a-chip (112) apparatus comprising a system-on-a-chip (112) comprising a security engine (110) that is separate from a processor core (118) of the system-on-a-chip (112) and has a secure memory (114) accessible only by the security engine, wherein the secure memory (114) includes a security key (150) that was encoded in the secure memory (114) during a manufacturing process of the system-on-a-chip (112), the security engine to generate a random nonce for initiating a request for a secure communication session with a remote server (104) over a network (106) using the nonce; perform a cryptographic key exchange with the remote server; generate a symmetric session key, based on the cryptographic key exchange, to encrypt messages sent to the remote server and decrypt messages received from the remote server during the secure communication session; encrypt the symmetric session key (150) based on the security key; and store the encrypted session key in the secure memory, the system-on-a-chip to establish the secure communication session with the remote server over the network using the session key.
Abstract:
The techniques described herein include configuration of channels between devices and service providers at a connectable system platform. For example, a system platform may include a receiver to receive data from a communicatively coupled device. The system platform may include a controller having logic, at least partially comprising hardware logic, to configure communications channels. The communication channels include a communication channel for transmission between the system platform and a service provider to receive the data, and a communication channel for transmission between the system platform and the coupled device. The communication channels are configured based on a context. The context comprises characteristics of the coupled device, content of the data, and security requirements associated with the service provider.
Abstract:
In an embodiment, an apparatus comprises a secure storage to store an entry having an identifier of a device to be paired with the apparatus and a master key shared between the apparatus and the device, and a connection logic to enable the apparatus to be securely connected to the device according to a connection protocol in which the device is authenticated based on the identifier received from the device and the master key. Other embodiments are described and claimed.
Abstract:
A computing device is described. The computing device includes input/output (I/O) circuitry to receive sensory data and a trusted execution environment to monitor the I/O circuitry to detect one or more context characteristics of the computing device and to authenticate user identity based on context characteristics.
Abstract:
Embodiments for implementing platform-enforced user accountability are generally described herein. A policy is accessed at a computing platform, the policy to define an expected behavior of a user of the system. Based on the policy, a sensor to use to enforce the policy is determined. Data is obtained from the sensor, with the data indicative of an activity performed by the user, and using the data, a determination is made whether the user is in compliance with the expected behavior defined in the policy.
Abstract:
In accordance with some embodiments, software may be downloaded to an end point, even when that said end point is not fully functional. An indication that software is available for distribution may be stored in a dedicated location within a non-volatile memory. That location may be checked for software to download, for example, on each boot up. The software may then be downloaded and verified. Thereafter, the location is marked to indicate that the software has already been downloaded.
Abstract:
In accordance with some embodiments, software may be downloaded to an end point, even when that said end point is not fully functional. An indication that software is available for distribution may be stored in a dedicated location within a non-volatile memory. That location may be checked for software to download, for example, on each boot up. The software may then be downloaded and verified. Thereafter, the location is marked to indicate that the software has already been downloaded.