Method and system for detecting a tamper event in a trusted computing environment
    22.
    发明授权
    Method and system for detecting a tamper event in a trusted computing environment 有权
    用于在可信计算环境中检测篡改事件的方法和系统

    公开(公告)号:US07490250B2

    公开(公告)日:2009-02-10

    申请号:US10012170

    申请日:2001-10-26

    CPC classification number: G06F21/554 G06F21/575

    Abstract: A method, system and computer readable medium containing programming instructions for detecting a tamper event in a computer system having an embedded security system (ESS), a trusted operating system, and a plurality of devices is disclosed. The method, system and computer readable medium of the present invention provide for receiving a tamper signal in the ESS, and locking the tamper signal in the ESS. According to the method, system and computer readable medium of the present invention, the trusted operating system is capable of detecting the tamper signal in the ESS.

    Abstract translation: 公开了一种包含用于检测具有嵌入式安全系统(ESS),可信操作系统和多个设备的计算机系统中的篡改事件的编程指令的方法,系统和计算机可读介质。 本发明的方法,系统和计算机可读介质提供在ESS中接收篡改信号,并将篡改信号锁定在ESS中。 根据本发明的方法,系统和计算机可读介质,可信操作系统能够检测ESS中的篡改信号。

    System and method for reducing virus scan time
    23.
    发明授权
    System and method for reducing virus scan time 有权
    减少病毒扫描时间的系统和方法

    公开(公告)号:US07401361B2

    公开(公告)日:2008-07-15

    申请号:US10963888

    申请日:2004-10-13

    CPC classification number: G06F21/562 G06F21/564 Y10S707/99953 Y10S707/99955

    Abstract: A system and method that marks whenever a sector on a hard drive is altered. A protected archive bit is maintained for each sector on the hard drive in a secured fashion. Authenticated requests are able to reset the protected archive bit. When a file is changed, the hard drive marks the sectors of the program that have been altered. When the virus protection application executes, it retrieves the sectors that have been altered, identifies the files that correspond to such sectors, and scans the identified files. If a virus has attacked the computer and attached itself to one of the files, the file is identified and scanned and the virus is discovered with appropriate eradication actions performed. An authentication scheme is assigned to a hard drive with a secret that is shared between the drive and the virus protection program and stored in a secure location.

    Abstract translation: 每当硬盘驱动器上的扇区被更改时都会标记的系统和方法。 以安全的方式为硬盘驱动器上的每个扇区维护受保护的归档位。 经认证的请求能够重置受保护的归档位。 当文件更改时,硬盘驱动器会标记已更改的程序扇区。 当病毒保护应用程序执行时,它检索已更改的扇区,识别与这些扇区相对应的文件,并扫描已识别的文件。 如果病毒攻击了计算机并将其自身附加到其中一个文件中,则会识别并扫描文件,并发现病毒被发现,并执行适当的根除操作。 将认证方案分配给具有在驱动器和病毒保护程序之间共享并存储在安全位置的秘密的硬盘驱动器。

    Recovery of a BIOS image
    24.
    发明授权

    公开(公告)号:US07069431B2

    公开(公告)日:2006-06-27

    申请号:US09919081

    申请日:2001-07-31

    CPC classification number: G06F11/1433

    Abstract: A hard drive having a protected partition is used in the recovery of a BIOS image for a computer system. An EEPROM is used to store a first BIOS image that is used to boot-up the system and recovery code is used to recover a new BIOS image if the first BIOS image has been corrupted. The new BIOS image is stored in the protected partition of the drive. A recover BIOS command is issued whenever the first BIOS image has been corrupted or a remote or local recover BIOS request is received. When the first BIOS is corrupted, the EEPROM is rewritten with the second BIOS image and the system boots with the rewritten first BIOS image. When a recover BIOS request is received in a data packet sent over a communication link, the data packet is authenticated before the first BIOS image is rewritten.

    Reducing the boot time of a TCPA based computing system when the Core Root of Trust Measurement is embedded in the boot block code
    26.
    发明申请
    Reducing the boot time of a TCPA based computing system when the Core Root of Trust Measurement is embedded in the boot block code 失效
    当信任测度核心嵌入在引导块代码中时,减少基于TCPA的计算系统的启动时间

    公开(公告)号:US20050108564A1

    公开(公告)日:2005-05-19

    申请号:US10712237

    申请日:2003-11-13

    CPC classification number: G06F21/572 G06F21/575

    Abstract: A method, computer program product and system for reducing the boot time of a TCPA based computing system. A flash memory in the TCPA based computing system may include a register comprising bits configured to indicate whether the segments of the flash memory have been updated. The flash memory may further include a table configured to store measurements of the segments of the flash memory. The flash memory may further include a boot block code that includes a Core Root of Trust for Measurement (CRTM). The CRTM may read the bits in the register to determine if any of the segments of the flash memory have been updated. The CRTM may further obtain the measurement values in the table for those segments that store the POST BIOS code that have not been updated thereby saving time from measuring the POST BIOS code and consequently reducing the boot time.

    Abstract translation: 一种用于减少基于TCPA的计算系统的启动时间的方法,计算机程序产品和系统。 基于TCPA的计算系统中的闪速存储器可以包括寄存器,其包括被配置为指示闪速存储器的段是否已被更新的位。 闪存可以进一步包括被配置为存储闪存的片段的测量的表。 闪速存储器还可以包括引导块代码,其包括用于测量的信任核心根(CRTM)。 CRTM可以读取寄存器中的位,以确定闪存中的任何段是否已更新。 CRTM可以进一步获得存储POST BIOS代码的那些片段的表中的测量值,从而节省了测量POST BIOS代码的时间,从而减少了引导时间。

    Personal computer ROM scan startup protection
    28.
    发明授权
    Personal computer ROM scan startup protection 失效
    个人电脑ROM扫描启动保护

    公开(公告)号:US6098171A

    公开(公告)日:2000-08-01

    申请号:US52733

    申请日:1998-03-31

    CPC classification number: G06F21/575 G06F21/83 G06F2211/1097

    Abstract: Provides management tools for a System Owner to assure that a personal computer system is secured against access by an unauthorized user by foreclosing the possibility of circumventing a system's security protection during an adapter ROM scan. If security function, such as that for C2 functionality, is enabled, prior to the adapter ROM Scan for the system, the POST code detects whether or not disabling of the keyboard during adapter ROM Scan is enabled. If enabled, the keyboard is disabled or locked prior to adapter ROM Scan. On some systems, the security function may not be used and, the system does not consider password protection for the adapter utilities. If however, the security functionality of the system is enabled, the POST code will continue to enable the password protection for the adapter ROM Scan. Once the input device, e.g., keyboard, is disabled the adapter ROM scan will begin. Upon completion of the adapter ROM scan, the input device will be enabled and progress will continue through POST.

    Abstract translation: 为系统所有者提供管理工具,以确保个人计算机系统受到未经授权的用户的访问,以防止在适配器ROM扫描过程中避免系统的安全保护。 如果启用安全功能(例如C2功能),则在系统的适配器ROM扫描之前,POST代码将检测是否启用了适配器ROM扫描期间禁用键盘。 如果启用,键盘在适配器ROM扫描之前被禁用或锁定。 在某些系统上,可能不使用安全功能,并且系统不会考虑为适配器实用程序提供密码保护。 然而,如果启用了系统的安全功能,POST代码将继续为适配器ROM扫描启用密码保护。 一旦输入设备(例如键盘)被禁用,则适配器ROM扫描将开始。 完成适配器ROM扫描后,将启用输入设备,并通过POST继续进行。

    Remote management of boot application
    29.
    发明授权
    Remote management of boot application 有权
    远程管理引导应用程序

    公开(公告)号:US08862709B2

    公开(公告)日:2014-10-14

    申请号:US11955886

    申请日:2007-12-13

    Abstract: Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.

    Abstract translation: 可以考虑通过用于具有LAN唤醒(WOL)功能的计算机的WOL分组来远程选择可启动图像的系统和布置。 服务器端实施例包括用于确定要管理的客户机的硬件和/或软件,确定客户端是否在网络上是活动的,以及发送具有向量的WOL分组或操作系统分区标识(OSPID)来描述可引导的 WOL功能的计算机可访问的图像。 一些实施例可以包括指向安全可启动图像的OSPID,例如硬盘驱动器上的可引导映像,连接到计算机的光盘(CD)或其他本地资源。 客户端实施例可以在例如网络接口卡(NIC)处接收WOL分组,识别WOL分组包括描述可启动图像引导的OSPID,并且实现替代的引导顺序以从该可启动图像引导 。

Patent Agency Ranking