摘要:
A system and method are described for performing security operations for a cluster of servers. In one embodiment, a global secret is generated which is used to perform security operations for the cluster of servers. A plurality, n, shadows are generated based on the global secret. A subset of the plurality of shadows, m, may be used to recreate the global secret. The plurality of shadows are then distributed and stored across the plurality of servers.
摘要:
In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage, encrypting, based least in part upon one or more keys, the input data to generate output data to store in the storage. The one or more keys may be authorized by a remote authority. Alternatively or additionally, another of these operations may include, in response, at least in part, to a request to retrieve the input data from the storage, decrypting, based at least in part upon the at least one key, the output data. Many modifications, variations, and alternatives are possible without departing from this embodiment.
摘要:
A method for managing a run-time recovery includes loading a recovery kernel into a processor cache. The recovery kernel is executed in the processor cache. Other embodiments are described and claimed.
摘要:
Memory support of heterogeneous virtual machine operating system guests. A virtual machine monitor (VMM) is launched on a computer system. A first virtual machine (VM) supported by the VMM is launched, the first VM to support a first guest operating system (OS). A second VM supported by the VMM is launched, the second VM to support a second guest OS, wherein a number of memory addressing bits of the first guest OS is smaller than a number of memory addressing bits of the second guest OS. Pages for the first guest OS are maintained at a lower level in a guest OS page table hierarchy than pages for the second guest OS in the guest OS page table hierarchy.
摘要:
Common operations that are to be performed by various environment-specific entities are identified. The environments may include pre-boot environment and run-time environment. A common entity is established to include the common operations. The common entity may be stored in memory associated with system management mode (SMM). A system management interrupt (SMI) may be used by the various environment-specific entities to invoke the common entity.
摘要:
A method, system and article of manufacture to improve the boot speed of a platform. One or more non-blocking platform initializations are performed during a pre-boot phase of a computer system. One or more platform initializations are performed during the pre-boot phase, wherein the one or more platform initializations are performed concurrently in part with the one or more non-blocking platform initializations.
摘要:
An attestation identity key (AIK) is created and stored in a client computer's firmware. When the client computer is connected to a network for the first time, the AIK allows a provisioning server to determine if the client computer has been tampered with. This attestation can take place even in the absence of an operating system on the client computer.
摘要:
A method and computing system working on and/or viewing materials on a computing system in a private manner in a public environment, such as an internet café, a school, common carrier, etc. The computing system is capable of operating in a privacy mode by utilizing a human display interface which allows the user to view displayed material from a computing device while substantially excluding other people from being able to view the material.
摘要:
A region on a memory device may be provided, where the region is protected from direct access by the operating system without the use of a hardware controller. Access may be provided through firmware with the use of a virtual machine manager. The system may be used to provide a software RAID.
摘要:
A method and system to provide system software to self-migrate from a faulty memory location to a safe memory location. A faulty portion of memory in a system software memory region of a computer system is detected, the faulty portion having stored a system software component. The system software component is relocated from the faulty portion of memory to a safe portion of memory.