SECURE UPDATING OF COMPUTING SYSTEM FIRMWARE
    104.
    发明申请

    公开(公告)号:US20190325139A1

    公开(公告)日:2019-10-24

    申请号:US16457324

    申请日:2019-06-28

    Abstract: A system comprising a controller to operate in an out of band fashion with respect to a central processing unit, the controller comprising a memory, and a processing element to request a firmware module from a computing system over a network, and cause the firmware module to be communicated to a storage controller for installation on a storage device.

    TECHNOLOGIES FOR SECURE Z-ORDER ENFORCEMENT WITH TRUSTED DISPLAY

    公开(公告)号:US20190103074A1

    公开(公告)日:2019-04-04

    申请号:US15720090

    申请日:2017-09-29

    Abstract: Technologies for secure z-order enforcement include a computing device having a processor with secure enclave support. A secure enclave invokes an EBIND instruction with display programming information that includes a z-order enforcement policy indicating whether the secure enclave requests z-order enforcement for an overlay surface associated with the secure enclave. The processor generates wrapped programming information in response to invoking the EBIND instruction. An untrusted supervisor component such as a device driver invokes an UNWRAP instruction with the wrapped programming information. The processor unwraps the wrapped programming information and programs a display controller with the z-enforcement policy. The processor may read a z-order enforcement status register of the display controller to determine if an overlay surface is available. For z-order enforcement, the display controller composes the overlay surface associated with the secure enclave in front of all other overlay surfaces of the display controller. Other embodiments are described and claimed.

    Method and apparatus for secure network enclaves

    公开(公告)号:US10079813B2

    公开(公告)日:2018-09-18

    申请号:US15085114

    申请日:2016-03-30

    CPC classification number: H04L9/083 H04L9/321 H04L9/3247 H04L63/061

    Abstract: Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a central network authority. Packet processing logic receives a key and an identifier from the central network authority. Security protocol logic then establishes a client-server security association through a communication that includes a client identifier and an encrypted portion and/or an authorization signature, wherein a client authorization key allocated by the central network authority can be reproduced by a server, other than said central network authority, from the client identifier and a derivation key provided to the server by the central network authority to decrypt the encrypted portion and/or to validate the communication using the authorization signature. The server may also provide the client with new session keys and/or new client session identifiers using server-generated derivation keys if desired, protecting these with the client authorization key.

Patent Agency Ranking