Securing CPU affinity in multiprocessor architectures
    11.
    发明授权
    Securing CPU affinity in multiprocessor architectures 有权
    在多处理器架构中保护CPU关联

    公开(公告)号:US08136153B2

    公开(公告)日:2012-03-13

    申请号:US11937320

    申请日:2007-11-08

    IPC分类号: G06F13/00

    摘要: In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a multi-processor environment. This may be accomplished by using a reference monitor that controls a process' capability to retrieve and set its or another process' affinity. This aids in the prevention of security breaches.

    摘要翻译: 在本发明的一个实施例中,为了控制多处理器环境的方法,限制了用户或进程设置或修改关联性的能力。 这可以通过使用参考监视器来实现,该监视器控制过程检索和设置其或另一进程的亲和力的能力。 这有助于预防安全漏洞。

    Security-enhanced storage devices using media location factor in encryption of hidden and non-hidden partitions
    12.
    发明授权
    Security-enhanced storage devices using media location factor in encryption of hidden and non-hidden partitions 失效
    使用媒体位置因子加密隐藏和非隐藏分区的安全增强型存储设备

    公开(公告)号:US08112634B2

    公开(公告)日:2012-02-07

    申请号:US12132862

    申请日:2008-06-04

    IPC分类号: G06F11/30 G06F12/14

    CPC分类号: H04L9/0872

    摘要: Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device provides for increased or hardened security of data stored in hidden and non-hidden partitions of a storage medium in the device. An algorithm may be utilized for deriving a key that is used to encrypt or decrypt text before it is read from or written to the hard disk. The algorithm accepts as input a specific media location factor, such as an end address or start address of the block where the text is being read from or written to, and a secret key of the storage component. The output of the algorithm is a final key that may be used in the encryption and decryption process. Thus, in this manner, the final key is dependent on the location of the block where the data is being written or read, thereby making it more difficult to tamper with the data, which may be stored in a hidden or non-hidden partition of a hard disk.

    摘要翻译: 描述用于增加或加强存储在诸如硬盘驱动器的存储设备中的数据的安全性的方法和设备。 存储设备提供存储在设备中的存储介质的隐藏和非隐藏分区中的数据的增加或加强的安全性。 可以使用算法来导出用于在从硬盘读取或写入硬盘之前加密或解密文本的密钥。 该算法接受特定媒体位置因子的输入,诸如文本被读取或写入的块的结束地址或起始地址以及存储组件的秘密密钥。 算法的输出是可以在加密和解密过程中使用的最终密钥。 因此,以这种方式,最终密钥取决于数据被写入或读取的块的位置,从而使得更难以篡改可以存储在隐藏或非隐藏分区中的数据 一个硬盘。

    Method and system for securing instruction caches using substantially random instruction mapping scheme
    13.
    发明授权
    Method and system for securing instruction caches using substantially random instruction mapping scheme 有权
    使用基本上随机的指令映射方案来保护指令高速缓存的方法和系统

    公开(公告)号:US08055848B2

    公开(公告)日:2011-11-08

    申请号:US12183689

    申请日:2008-07-31

    IPC分类号: G06F12/08

    CPC分类号: G06F12/1408 G06F12/0842

    摘要: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves maintaining a different substantially random instruction mapping policy into an I-cache for each of multiple processes, and for each process, performing a substantially random mapping scheme for mapping a process instruction into the I-cache based on the substantially random instruction mapping policy for said process. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.

    摘要翻译: 提供了一种用于保护微架构指令高速缓存(I缓存)的方法和系统。 保护I缓存涉及为多个进程中的每一个维护不同的基本上随机的指令映射策略到I缓存中,并且对于每个进程,执行基本上随机的映射方案,用于将处理指令映射到I缓存中, 用于所述进程的随机指令映射策略。 保护I缓存还可以包括动态地将I缓存分区成多个逻辑分区,并且通过仅由一个逻辑处理器提供对每个I缓存分区的访问的I缓存映射策略共享对I缓存的访问。

    CONSISTENT SECURITY ENFORCEMENT FOR SAFER COMPUTING SYSTEMS
    14.
    发明申请
    CONSISTENT SECURITY ENFORCEMENT FOR SAFER COMPUTING SYSTEMS 审中-公开
    一致的安全执行,为安全的计算机系统

    公开(公告)号:US20100162240A1

    公开(公告)日:2010-06-24

    申请号:US12343154

    申请日:2008-12-23

    IPC分类号: G06F9/455

    CPC分类号: G06F21/577

    摘要: Security can be enforced in a consistent manner with respect to various computing environments that may be operable in a computing system. Consistent security criteria can be generated, based on input security criterion, in a computer readable and storable form and stored in a computer readable storage medium, thereby allowing the consistent security criterion to be effectively provided to a computing system for enforcement of the input security criterion in a consistent manner with respect to, for example, (a) a first executable computer code effectively supported by an Operating System (OS), and (b) a second computer code effectively supported by the Virtual Computing Environment (VCE). A Trusted Component (TC) can effectively provide a consistent security criterion as a part and/or form that is suitable for a particular computing environment. The TC can, for example, be an automated tool that performs various functions including: verifying the consistency of security criteria, generation and deployment of consistent security criteria, and transformation of security criteria to parts and/or forms suitable for various computing environments. In addition, a Virtual Computing Environment (VCE) can obtain from the Operating System (OS) one or more security criteria. The Virtual Computing Environment (VCE) can be operable in a Trusted Computing Environment (TCE) and interface with a Trusted Operating System (TOS) that effectively enforces Mandatory Access Control (MAC), thereby allowing the Virtual Computing Environment (VCE) to leverage the security provided by the OS. The OS can, for example, be a Security-Enhanced Linux (SELinux) Operating System operating as a Trusted Component in a Trusted Environment that includes a Trusted Security Agent (TSA) operable to deploy consistent security criteria.

    摘要翻译: 相对于可在计算系统中可操作的各种计算环境,可以以一致的方式实施安全性。 可以基于输入安全标准以计算机可读和可存储的形式生成一致的安全标准,并存储在计算机可读存储介质中,从而允许将一致的安全标准有效地提供给计算系统,以便执行输入的安全标准 以相对于例如(a)由操作系统(OS)有效支持的第一可执行计算机代码和(b)由虚拟计算环境(VCE)有效支持的第二计算机代码以一致的方式。 可信组件(TC)可以有效地提供一致的安全标准作为适合特定计算环境的部分和/或形式。 例如,TC可以是执行各种功能的自动化工具,包括:验证安全标准的一致性,生成和部署一致的安全标准,以及将安全标准转换为适用于各种计算环境的部件和/或形式。 此外,虚拟计算环境(VCE)可以从操作系统(OS)获得一个或多个安全标准。 虚拟计算环境(VCE)可以在可信计算环境(TCE)中进行操作,并与可靠的操作系统(TOS)进行接口,可靠的操作系统(TOS)有效地强制执行强制访问控制(MAC),从而允许虚拟计算环境(VCE)利用 OS提供的安全性。 例如,操作系统可以是在可信环境中作为受信任组件运行的安全增强型Linux(SELinux)操作系统,其中包含可操作以部署一致的安全性标准的可信安全代理(TSA)。

    SECURING STORED CONTENT FOR TRUSTED HOSTS AND SAFE COMPUTING ENVIRONMENTS
    15.
    发明申请
    SECURING STORED CONTENT FOR TRUSTED HOSTS AND SAFE COMPUTING ENVIRONMENTS 失效
    保护有关主机和安全计算环境的存储内容

    公开(公告)号:US20090049510A1

    公开(公告)日:2009-02-19

    申请号:US11839439

    申请日:2007-08-15

    CPC分类号: G06F21/53 G06F21/57 G06F21/79

    摘要: Techniques for protecting content to ensure its use in a trusted environment are disclosed. The stored content is protected against harmful and/or defective host (or hosted) environments. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device. A trusted host can effectively provide a safe virtual environment that allows a content representing a copy (or image) of an original computing environment to operate on the host computing system to give a similar appearance as the original computing environment.

    摘要翻译: 公开了用于保护内容以确保其在可信环境中使用的技术。 存储的内容受到保护,防止有害和/或缺陷的主机(或托管)环境。 为设备提供的受信任的安全组件可以在允许内容与主机联系之前验证存储的内容和主机的内部完整性。 作为计数器部件,为主机提供的可信安全组件可以验证和证实可以为存储在设备中的内容提供的主机和/或特定主机计算环境的完整性。 为设备提供的受信任的安全性组件基于为主机提供的可信安全组件所证明的信息有效地验证主机完整性。 如果信任的安全组件信任主机,则允许可信主机提供受信任的主机计算环境,以便对存储在设备中的内容安全。 可信主机可以有效地提供安全的虚拟环境,其允许表示原始计算环境的副本(或图像)的内容在主机计算系统上操作以给出与原始计算环境相似的外观。

    Method and system for securing instruction caches using cache line locking
    16.
    发明授权
    Method and system for securing instruction caches using cache line locking 失效
    使用高速缓存行锁定来保护指令高速缓存的方法和系统

    公开(公告)号:US08019946B2

    公开(公告)日:2011-09-13

    申请号:US12183908

    申请日:2008-07-31

    IPC分类号: G06F12/08

    摘要: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves providing security critical instructions to indicate a security critical code section; and implementing an I-cache locking policy to prevent unauthorized eviction and replacement of security critical instructions in the I-cache. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.

    摘要翻译: 提供了一种用于保护微架构指令高速缓存(I缓存)的方法和系统。 保护I缓存涉及提供安全关键指令来指示安全关键代码段; 并实施I缓存锁定策略,以防止未经授权的驱逐和替换I缓存中的安全关键指令。 保护I缓存还可以包括动态地将I缓存分区成多个逻辑分区,并且通过仅由一个逻辑处理器提供对每个I缓存分区的访问的I缓存映射策略共享对I缓存的访问。

    SECURE INTER-PROCESS COMMUNICATION FOR SAFER COMPUTING ENVIRONMENTS AND SYSTEMS
    18.
    发明申请
    SECURE INTER-PROCESS COMMUNICATION FOR SAFER COMPUTING ENVIRONMENTS AND SYSTEMS 失效
    安全的进程间通信,用于更安全的计算环境和系统

    公开(公告)号:US20100121927A1

    公开(公告)日:2010-05-13

    申请号:US12364303

    申请日:2009-02-02

    IPC分类号: G06F15/82 H04L29/06

    CPC分类号: G06F9/54 G06F9/468

    摘要: Techniques for Inter-Process Communication (IPC) in a more secure manner are disclosed. A communication component operating outside of an operating system can obtain operating-system data pertaining to processes that also operate outside of the operating system. The operating-system data can be more reliable than information that may have been provided by the processes, thereby allowing more secure IPC and consequently a more secure computing environment and/or system. A communication component can also be operable to make control decisions regarding the IPC data (e.g., IPC messages) based on the information provided and/or originated by the operating system (or operating-system data) and/or effectively provide the operating-system data pertaining to a sender process to its intended recipient process. A recipient process can also be operable to obtain the operating-system data pertaining to a sender process. Moreover, a recipient process can make control decisions regarding the IPC data originated by the sender process based on the operating-system data effectively provided and/or originated by the operating system rather than the sender process, thereby allowing the recipient process to make control decisions based on information provided by a more reliable (e.g., Trusted) source.

    摘要翻译: 公开了以更安全的方式进行进程间通信(IPC)的技术。 在操作系统外部操作的通信组件可以获得与在操作系统外部操作的处理有关的操作系统数据。 操作系统数据可能比由过程可能​​提供的信息更可靠,从而允许更安全的IPC,从而允许更安全的计算环境和/或系统。 通信组件还可以用于基于由操作系统(或操作系统数据)提供和/或发起的信息和/或有效地提供操作系统来进行关于IPC数据(例如,IPC消息)的控制决定 与发送者进程有关的数据到其预期收件人进程。 接收者进程也可以用于获得与发送者进程有关的操作系统数据。 此外,接收者进程可以基于由操作系统而不是发送者进程有效提供和/或发起的操作系统数据来发起关于由发送者进程发起的IPC数据的控制决定,从而允许接收者进程作出控制决定 基于由更可靠的(例如,可信赖的)源提供的信息。

    AUTHENTICATION, IDENTITY, AND SERVICE MANAGEMENT FOR COMPUTING AND COMMUNICATION SYSTEMS
    19.
    发明申请
    AUTHENTICATION, IDENTITY, AND SERVICE MANAGEMENT FOR COMPUTING AND COMMUNICATION SYSTEMS 有权
    计算机和通信系统的认证,身份和服务管理

    公开(公告)号:US20090328141A1

    公开(公告)日:2009-12-31

    申请号:US12147246

    申请日:2008-06-26

    IPC分类号: G06F21/00

    摘要: Improved techniques for obtaining authentication identifiers, authentication, and receiving services are disclosed. Multiple devices can be used for receiving service from a servicing entity (e.g., Service Providers). More particularly, a first device can be used to authenticate a first entity (e.g., one or more persons) for receiving services from the servicing entity, but the services can be received by a second device. Generally, the first device can be a device better suited, more preferred and/or more secure for authentication related activates including “Identity Management.” The second device can be generally more preferred for receiving and/or using the services. In addition, a device can be designated for authentication of an entity. The device releases an authentication identifier only if the entity has effectively authorized its release, thereby allowing “User Centric” approaches to “Identity Management.” A device can be designated for obtaining authentication identifiers from an identity assigning entity (e.g., an Identity Provider). The authentication identifiers can be used to authenticate an entity for receiving services from a servicing entity (e.g., a Service Provider) that provides the services to a second device. The same device can also be designated for authentication of the entity. The device can, for example, be a mobile phone allowing a mobile solution and providing a generally more secure computing environment than the device (e.g., a Personal Computer) used to receive and use the services.

    摘要翻译: 公开了用于获得认证标识符,认证和接收服务的改进的技术。 多个设备可用于从服务实体(例如,服务提供商)接收服务。 更具体地,可以使用第一设备来认证用于从服务实体接收服务的第一实体(例如,一个或多个人),但是可以由第二设备接收服务。 通常,第一设备可以是对于包括“身份管理”的认证相关活动更适合,更优选和/或更安全的设备。 通常,第二装置优选用于接收和/或使用服务。 另外,可以指定一个设备来认证一个实体。 只有当实体有效地授权其发布时,才能释放认证标识符,从而允许“以用户为中心”的方式进行“身份管理”。 可以指定用于从身份分配实体(例如,身份提供商)获得认证标识符的设备。 认证标识符可用于认证用于从向第二设备提供服务的服务实体(例如,服务提供商)接收服务的实体。 同样的设备也可以被指定为实体的认证。 例如,设备可以是允许移动解决方案并且提供比用于接收和使用服务的设备(例如,个人计算机)通常更安全的计算环境的移动电话。

    Trusted multi-stakeholder environment
    20.
    发明授权
    Trusted multi-stakeholder environment 失效
    可信赖的利益相关者环境

    公开(公告)号:US08752130B2

    公开(公告)日:2014-06-10

    申请号:US11963363

    申请日:2007-12-21

    IPC分类号: G06F7/04

    CPC分类号: G06F21/6218 G06F2221/2141

    摘要: In one embodiment, a multi-stakeholder environment is controlled by first assigning a first domain to a first stakeholder and a second domain to a second stakeholder. Then a first access policy is defined for the first domain and access is restricted to the first domain for the second stakeholder according to the first access policy. In another embodiment, an access request is handled in a multi-stakeholder environment by first receiving parameters forwarded by hooks in system call functions in a kernel of the multi-stakeholder environment, wherein the parameters contain information about a first stakeholder requesting access to a domain corresponding to a second stakeholder. Then it is determined whether to allow the first stakeholder to access the domain based at least partially upon security settings corresponding to the domain.

    摘要翻译: 在一个实施例中,通过首先将第一域分配给第一利益相关者,将第二域分配给第二利益相关者来控制多利害关系者环境。 然后为第一个域定义第一个访问策略,根据第一个访问策略,访问被限制到第二个利益相关者的第一个域。 在另一个实施例中,通过首先在多方利益相关者环境的内核中接收由钩子在系统调用函数中转发的参数来处理访问请求,其中参数包含关于请求访问域的第一个利益相关者的信息 对应于第二个利益相关者。 然后确定是否允许第一利益相关者至少部分地基于对应于域的安全设置来访问域。