-
-
公开(公告)号:EP3207703A1
公开(公告)日:2017-08-23
申请号:EP15851216.0
申请日:2015-09-30
申请人: Intel Corporation
发明人: DIEFENBAUGH, Paul S. , LIAO, Yiting , MCGOWAN, Steven B. , SOMAYAZULU, Vallabhajosyula S. , JEGANATHAN, Nithyananda S. , O'MAHONY, Barry A. , FLEMING, Kristoffer D.
CPC分类号: H04N19/136 , G09G5/003 , G09G2340/02 , H04N19/107 , H04N19/115 , H04N19/124 , H04N19/137 , H04N19/154 , H04N19/156 , H04N19/164 , H04N19/17 , H04N19/172 , H04N19/176 , H04N19/27 , H04N19/34 , H04N19/36 , H04N19/50
摘要: Techniques for image rendering are described herein. The techniques may include providing image data to an encoder for transmission to a display. An indication of whether at least a portion of the image data is video data or non-video data is provided. A first policy may be implemented for image data that is video data. The first policy prioritizes transmission of the image data over encoding image quality. A second policy may be implemented for image data that is non-video data. The second policy prioritizes encoded image quality over transmission of the encoded images.
摘要翻译: 这里描述了用于图像渲染的技术。 这些技术可以包括将图像数据提供给编码器以传输至显示器。 提供了至少一部分图像数据是视频数据还是非视频数据的指示。 对于作为视频数据的图像数据可以实施第一策略。 第一策略将图像数据的传输优先于编码图像质量。 对于非视频数据的图像数据可以实施第二策略。 第二个策略优先于编码图像的传输编码图像质量。
-
-
公开(公告)号:EP3326105B1
公开(公告)日:2019-08-14
申请号:EP16828191.3
申请日:2016-06-20
申请人: Intel Corporation
-
公开(公告)号:EP3326105A1
公开(公告)日:2018-05-30
申请号:EP16828191.3
申请日:2016-06-20
申请人: Intel Corporation
发明人: CHHABRA, Siddhartha , GERZON, Gideon , LAL, Reshma , XING, Bin , PAPPACHAN, Pradeep M. , MCGOWAN, Steven B.
IPC分类号: G06F21/60
CPC分类号: G06F21/72 , G06F21/57 , H04L9/0822 , H04L9/0861 , H04L9/3242
摘要: Technologies for secure programming of a cryptographic engine include a computing device with a cryptographic engine and one or more I/O controllers. The computing device establishes, an invoking secure enclave using secure enclave support of a processor. The invoking enclave configures channel programming information, including a channel key, and invokes a processor instruction with the channel programming information as a parameter. The processor generates wrapped programming information including an encrypted channel key and a message authentication code. The encrypted channel key is protected with a key known only to the processor. The invoking enclave provides the wrapped programming information to untrusted software, which invokes a processor instruction with the wrapped programming information as a parameter. The processor unwraps and verifies the wrapped programming information and then programs the cryptographic engine. The processor generates an authenticated response that may be verified by the invoking enclave. Other embodiments are described and claimed.
-
公开(公告)号:EP3805968A1
公开(公告)日:2021-04-14
申请号:EP20211698.4
申请日:2016-06-20
申请人: INTEL Corporation
发明人: PAPPACHAN, Pradeep M. , LAL, Reshma , XING, Bin , CHHABRA, Siddhartha , SCARLATA, Vincent R. , MCGOWAN, Steven B.
摘要: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.
-
公开(公告)号:EP3326102A1
公开(公告)日:2018-05-30
申请号:EP16828187.1
申请日:2016-06-20
申请人: Intel Corporation
发明人: LAL, Reshma , MCGOWAN, Steven B. , CHHABRA, Siddhartha , GERZON, Gideon , XING, Bin , PAPPACHAN, Pradeep M. , ELBAZ, Reouven
CPC分类号: H04L9/0631 , G06F13/28 , H04L9/0618 , H04L9/0822 , H04L9/3242
摘要: Technologies for cryptographic protection of I/O data include a computing device with one or more I/O controllers. Each I/O controller may generate a direct memory access (DMA) transaction that includes a channel identifier that is indicative of the I/O controller and that is indicative of an I/O device coupled to the I/O controller. The computing device intercepts the DMA transaction and determines whether to protect the DMA transaction as a function of the channel identifier. If so, the computing device performs a cryptographic operation using an encryption key associated with the channel identifier. The computing device may include a cryptographic engine that intercepts the DMA transaction and determines whether to protect the DMA transaction by determining whether the channel identifier matches an entry in a channel identifier table of the cryptographic engine. Other embodiments are described and claimed.
-
公开(公告)号:EP3326099A1
公开(公告)日:2018-05-30
申请号:EP16828190.5
申请日:2016-06-20
申请人: Intel Corporation
发明人: PAPPACHAN, Pradeep M. , LAL, Reshma , XING, Bin , CHHABRA, Siddhartha , SCARLATA, Vincent R. , MCGOWAN, Steven B.
摘要: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.
-
公开(公告)号:EP3283997A1
公开(公告)日:2018-02-21
申请号:EP16780420.2
申请日:2016-03-03
申请人: Intel Corporation
发明人: MARTIN, Jason , GHOSH, Rahuldeva , CORNELIUS, Cory , OLIVER, Ian R. , NAGISETTY, Ramune , MCGOWAN, Steven B.
摘要: In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first and second tokens to the second device to cause the second device to authenticate the user based at least in part on the first and second tokens. Other embodiments are described and claimed.
-
公开(公告)号:EP3582129A1
公开(公告)日:2019-12-18
申请号:EP19189777.6
申请日:2016-06-20
申请人: INTEL Corporation
发明人: PAPPACHAN, Pradeep M. , LAL, Reshma , XING, Bin , CHHABRA, Siddhartha , SCARLATA, Vincent R. , MCGOWAN, Steven B.
摘要: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-