Facilitating scanning of protected resources

    公开(公告)号:US10389747B2

    公开(公告)日:2019-08-20

    申请号:US15535826

    申请日:2015-02-27

    Abstract: Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan indicator that indicates an external agent is prepared to scan a protected resource of the computing device; identifies a protected action that may be performed by the data processor, the protected action facilitating scanning the protected resource of the computing device by the external agent, the protected action comprising a change in a state of the protected resource; performs the protected action; and provides the external agent with data indicating a current state of the protected resource.

    DATA MANAGEMENT
    13.
    发明申请

    公开(公告)号:US20220398321A1

    公开(公告)日:2022-12-15

    申请号:US17755012

    申请日:2019-11-22

    Abstract: In some examples, a method for data management, the method comprises booting a trusted diskless operating system image via a device firmware component, accessing a non-volatile storage of the device using the trusted diskless operating system image; and retrieving user data from the non-volatile storage of the device, and/or writing user data received from a remote location to the non-volatile storage of the device.

    RECOVERY KEYS
    14.
    发明申请

    公开(公告)号:US20220393869A1

    公开(公告)日:2022-12-08

    申请号:US17755011

    申请日:2019-11-22

    Abstract: In some example, a method for accessing a cryptographic recovery key of an encryption system of a device comprises mapping a device identity received at a key management system to a recovery key stored in the key management system, specifying at least one device-related operation to which the recovery key is linked, generating an encrypted message for the device, the encrypted message comprising the recovery key, and transmitting the encrypted message and a signed message to the device.

    SECURITY INSPECTIONS
    15.
    发明申请

    公开(公告)号:US20220382636A1

    公开(公告)日:2022-12-01

    申请号:US17755013

    申请日:2019-11-22

    Abstract: In some examples, a method for performing an out-of-band security inspection of a device comprises generating a snapshot of the state of the device, storing data representing the snapshot to a non-volatile storage of the device, and storing a hash of the snapshot in a device BIOS, transitioning the power state of the device, triggering boot of a trusted diskless operating system image, providing the data representing the snapshot and the hash of the snapshot to the trusted diskless operating system image, and executing a script selected on the basis of a trigger event and the hash of the snapshot to analyse at least a portion of the non-volatile storage of the device.

    Digital composition hashing
    16.
    发明授权

    公开(公告)号:US11356268B2

    公开(公告)日:2022-06-07

    申请号:US16613821

    申请日:2017-06-02

    Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.

    STORING NUMERICAL IDENTIFIERS IN DATA STRUCTURES

    公开(公告)号:US20210165894A1

    公开(公告)日:2021-06-03

    申请号:US17047326

    申请日:2018-06-15

    Abstract: An apparatus is disclosed. The apparatus may comprise a storage medium to store: a first data structure to receive a first plurality of numerical identifiers, each numerical identifier of the first plurality of numerical identifiers corresponding to a respective signal received during a first defined time interval; and a second data structure to receive a second plurality of numerical identifiers, each numerical identifier of the second plurality of numerical identifiers corresponding to a respective signal received during a second defined time interval, wherein the first defined time interval is earlier in time than the second defined time interval. The apparatus may comprise a processor. Upon expiry of a defined time period, the processor is to: delete the first data structure; and provide a third data structure to receive a third plurality of numerical identifiers, each numerical identifier of the third plurality of numerical identifiers corresponding to a respective signal received during a third defined time interval occurring after the second defined time interval. A method and a machine-readable medium are also disclosed.

    APPLICATION APPROVAL
    18.
    发明申请

    公开(公告)号:US20190034659A1

    公开(公告)日:2019-01-31

    申请号:US16072149

    申请日:2016-04-10

    Abstract: Examples associated with application approval are described. One example includes receiving an application package. The application package contains an application from a service provider and a privacy description for the application from a review provider. The application operates on private data controlled by a user. The application package is validated to ensure components of the application package is properly credentialed. An application summary for the user is generated from the privacy description. The application summary describes what portions of private data will be accessed by the application and how portions of the private data will be transmitted. An authorization is received from the user, and execution of the application is controlled based on the authorization of the user.

    Checking a security value calculated for a part of a program code

    公开(公告)号:US20180276374A1

    公开(公告)日:2018-09-27

    申请号:US15764170

    申请日:2015-10-29

    Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.

Patent Agency Ranking