Method and apparatus for migrating virtual trusted platform modules
    21.
    发明授权
    Method and apparatus for migrating virtual trusted platform modules 有权
    用于迁移虚拟可信平台模块的方法和装置

    公开(公告)号:US08074262B2

    公开(公告)日:2011-12-06

    申请号:US11512989

    申请日:2006-08-29

    摘要: A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual trusted platform module (TPM), based at least in part on an assertion made by a management authority. The first processing system also determines whether the management authority is trusted. The first processing system may transfer state for the virtual TPM to the second processing system only if (a) the management authority is trusted and (b) the assertion made by the management authority indicates that the second processing system provides a trustworthy environment for supporting the virtual TPM. In one embodiment, the first processing system transfers state for the virtual TPM to the second processing system only if a trust level designation for the second processing system is equal or greater than a trust level for the first processing system. Other embodiments are described and claimed.

    摘要翻译: 第一处理系统至少部分地基于由管理机构做出的断言来确定第二处理系统是否提供用于支持虚拟可信平台模块(TPM)的可信状态。 第一处理系统还确定管理机构是否被信任。 第一处理系统可以将虚拟TPM的状态转移到第二处理系统,只有(a)管理机构被信任,并且(b)由管理机构作出的断言指示第二处理系统提供可靠的环境以支持 虚拟TPM。 在一个实施例中,仅当第二处理系统的信任级别指定等于或大于第一处理系统的信任级别时,第一处理系统将虚拟TPM的状态传送到第二处理系统。 描述和要求保护其他实施例。

    METHOD AND APPARATUS FOR BINDING TPM KEYS TO EXECUTION ENTITIES
    22.
    发明申请
    METHOD AND APPARATUS FOR BINDING TPM KEYS TO EXECUTION ENTITIES 有权
    用于绑定TPM KEYS执行实体的方法和装置

    公开(公告)号:US20110191574A1

    公开(公告)日:2011-08-04

    申请号:US13016145

    申请日:2011-01-28

    IPC分类号: G06F15/177 H04L9/32

    摘要: A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by an execution entity for authorization data. According to the authorization request, the execution entity may be measured to generate an entity digest value. Once the entity digest value is generated, a platform reference module may grant the authorization request if the entity digest value verifies that the execution entity is an owner of the key held by the TPM. Accordingly, in one embodiment, a platform reference module, rather than an execution entity, holds the authorization data required by a TPM to use a key owned by the execution entity and held within sealed storage by the TPM. Other embodiments are described and claimed.

    摘要翻译: 描述了将可信平台模块(TPM)密钥绑定到执行实体的方法和装置。 在一个实施例中,该方法包括接收由执行实体发出的授权数据的授权请求。 根据授权请求,可以测量执行实体以生成实体摘要值。 一旦生成实体摘要值,如果实体摘要值验证执行实体是TPM持有的密钥的所有者,则平台引用模块可以授予授权请求。 因此,在一个实施例中,平台参考模块而不是执行实体保存TPM所需的授权数据,以使用由执行实体拥有的密钥并由TPM保存在密封存储器内。 描述和要求保护其他实施例。

    RUN-TIME REMEASUREMENT ON A TRUSTED PLATFORM
    23.
    发明申请
    RUN-TIME REMEASUREMENT ON A TRUSTED PLATFORM 审中-公开
    对一个有争议的平台的运行时间恢复

    公开(公告)号:US20080244746A1

    公开(公告)日:2008-10-02

    申请号:US11692672

    申请日:2007-03-28

    IPC分类号: G06F15/18

    CPC分类号: G06F21/57 G06F2221/2101

    摘要: A method and system are disclosed. In one embodiment, the method includes invoking a run-time measurement agent (RTMA) to run on a trusted platform, the RTMA measuring a core system code block multiple times after a single boot on the trusted platform; and a trusted platform module storing these multiple measurements.

    摘要翻译: 公开了一种方法和系统。 在一个实施例中,该方法包括调用在受信任平台上运行的运行时测量代理(RTMA),RTMA在可信平台上单次引导之后多次测量核心系统代码块; 以及存储这些多个测量的可信平台模块。

    USING AUTHENTICATED MANIFESTS TO ENABLE EXTERNAL CERTIFICATION OF MULTI-PROCESSOR PLATFORMS
    25.
    发明申请
    USING AUTHENTICATED MANIFESTS TO ENABLE EXTERNAL CERTIFICATION OF MULTI-PROCESSOR PLATFORMS 有权
    使用认证机构启用多处理器平台的外部认证

    公开(公告)号:US20150178226A1

    公开(公告)日:2015-06-25

    申请号:US14140254

    申请日:2013-12-24

    IPC分类号: G06F12/14

    摘要: Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a plurality of processing devices communicatively coupled to the architecturally protected memory, each processing device comprising a first processing logic to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory, or preventing an unauthorized access to the architecturally protected memory; wherein each processing device further comprises a second processing logic to establish a secure communication channel with a second processing device of the processing system, employ the secure communication channel to synchronize a platform identity key representing the processing system, and transmit a platform manifest comprising the platform identity key to a certification system.

    摘要翻译: 用于将输出表面位图安全传递到显示引擎的系统和方法。 一个示例处理系统包括:架构受保护的存储器; 以及多个处理设备,通信地耦合到架构保护的存储器,每个处理设备包括第一处理逻辑,以通过执行以下至少一个来实现架构保护的执行环境:执行驻留在架构保护的存储器中的指令,或者防止未授权的 访问架构受保护的内存; 其中每个处理设备还包括第二处理逻辑,用于与所述处理系统的第二处理设备建立安全通信信道,采用所述安全通信信道来同步代表所述处理系统的平台标识密钥,并发送包括所述平台的平台清单 认证系统的身份密钥。

    TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O
    29.
    发明申请
    TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O 审中-公开
    用于硬件和硬件安全的技术用于受信任的I / O

    公开(公告)号:US20170024570A1

    公开(公告)日:2017-01-26

    申请号:US14974960

    申请日:2015-12-18

    IPC分类号: G06F21/60 G06F13/28

    摘要: Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing device collects hardware attestation information associated with statically attached hardware I/O components that are associated with a trusted I/O usage protected by the cryptographic engine. The computing device verifies the hardware attestation information and securely enumerates one or more dynamically attached hardware components in response to verification. The computing device collects software attestation information for trusted software components loaded during secure enumeration. The computing device verifies the software attestation information. The computing device may collect firmware attestation information for firmware loaded in the I/O controllers and verify the firmware attestation information. The computing device may collect application attestation information for a trusted application that uses the trusted I/O usage and verify the application attestation information. Other embodiments are described and claimed.

    摘要翻译: 用于可信I / O认证和验证的技术包括具有加密引擎和一个或多个I / O控制器的计算设备。 计算设备收集与由加密引擎保护的受信任的I / O使用相关联的静态附接的硬件I / O组件相关联的硬件认证信息。 计算设备验证硬件认证信息并且响应于验证安全地枚举一个或多个动态附加的硬件组件。 计算设备收集在安全枚举期间加载的可信软件组件的软件认证信息。 计算设备验证软件认证信息。 计算设备可以收集加载在I / O控制器中的固件的固件证明信息,并验证固件证明信息。 计算设备可以收集使用可信I / O使用的可信应用的应用认证信息,并验证应用认证信息。 描述和要求保护其他实施例。

    Methods and apparatus for remeasuring a virtual machine monitor
    30.
    发明授权
    Methods and apparatus for remeasuring a virtual machine monitor 有权
    用于重新测试虚拟机监视器的方法和装置

    公开(公告)号:US09280659B2

    公开(公告)日:2016-03-08

    申请号:US11648103

    申请日:2006-12-29

    摘要: A data processing system supports remeasurement of a virtual machine monitor (VMM). In one example process, the VMM may obtain a secret value from a trusted platform module (TPM) of the processing system. The VMM may provide the secret value from the VMM to a measurement agent executing in system management mode (SMM) of the processing system. The measurement agent may be a system management interrupt (SMI) transfer monitor (STM) that can create virtual machines to execute in SMM, for example. However, the VMM may verify the measurement agent before providing the secret value to the measurement agent. The measurement agent may generate a remeasurement value for the VMM, use the secret value that was obtained from the TPM to certify the remeasurement value, and communicate the remeasurement value to a requesting program, via the VMM. Other embodiments are described and claimed.

    摘要翻译: 数据处理系统支持重新测量虚拟机监视器(VMM)。 在一个示例性过程中,VMM可以从处理系统的可信平台模块(TPM)获得秘密值。 VMM可以将来自VMM的秘密值提供给在处理系统的系统管理模式(SMM)中执行的测量代理。 测量代理可以是例如可以创建在SMM中执行的虚拟机的系统管理中断(SMI)传送监视器(STM)。 然而,VMM可以在向测量代理提供秘密值之前验证测量代理。 测量代理可以生成VMM的重新测量值,使用从TPM获得的秘密值来验证重新测量值,并通过VMM将重新测量值传达给请求程序。 描述和要求保护其他实施例。