System and Method to Use Chipset Resources to Clear Sensitive Data from Computer System Memory
    32.
    发明申请
    System and Method to Use Chipset Resources to Clear Sensitive Data from Computer System Memory 审中-公开
    使用芯片组资源清除计算机系统内存中的敏感数据的系统和方法

    公开(公告)号:US20090222635A1

    公开(公告)日:2009-09-03

    申请号:US12040981

    申请日:2008-03-03

    IPC分类号: G06F15/177 G06F12/00

    摘要: A system, method, and program product is provided that initializes a computer system using an initialization process that identifies secrets that were stored in memory and not scrubbed during a prior use of the computer system. During the initialization process, one or more secret indicators are retrieved that identify whether one or more secrets were scrubbed from the computer system's memory during a previous use of the computer system. If the secret indicators show that one or more secrets were not scrubbed from the memory during the prior use of the computer system, then the initialization process scrubs the memory. On the other hand, if the secret indicators show that each of the secrets was scrubbed from the memory during the prior use of the computer system, then the memory is not scrubbed during the initialization process.

    摘要翻译: 提供了一种系统,方法和程序产品,其使用识别存储在存储器中并且在先前使用计算机系统期间不被擦除的秘密的初始化过程来初始化计算机系统。 在初始化过程中,检索一个或多个秘密指示符,其识别在先前使用计算机系统期间是否从计算机系统的存储器擦除了一个或多个秘密。 如果秘密指示器显示在计算机系统的先前使用期间没有从存储器擦除一个或多个秘密,则初始化过程擦除存储器。 另一方面,如果秘密指示器显示在计算机系统的先前使用期间从存储器擦除了每个秘密,则在初始化过程期间不擦除存储器。

    APPARATUS, SYSTEM, AND METHOD FOR AUTHENTICATION OF A CORE ROOT OF TRUST MEASUREMENT CHAIN
    34.
    发明申请
    APPARATUS, SYSTEM, AND METHOD FOR AUTHENTICATION OF A CORE ROOT OF TRUST MEASUREMENT CHAIN 有权
    用于认证信任测量链的核心的装置,系统和方法

    公开(公告)号:US20080148064A1

    公开(公告)日:2008-06-19

    申请号:US11612367

    申请日:2006-12-18

    IPC分类号: G06F12/14

    CPC分类号: G06F21/57 G06F2221/2153

    摘要: An apparatus, system, and method are disclosed for authentication of a core root of trust measurement chain. The apparatus for authentication of a CRTM chain is provided with a plurality of modules configured to carry out the steps of retrieving a decryption key from a predetermined location on the device selected for authentication, decrypting an authentication signal using the decryption key, and communicating the decrypted authentication signal to a user. In the described embodiments, these modules include a retrieval module, a decryption module, and a communication module. Beneficially, such an apparatus, system, and method would reliably verify that a link in the CRTM chain has not been corrupted, modified, or infected with a computer virus. Specifically, such an apparatus, system, and method would enable verification that the hypervisor has not been corrupted, modified, or infected with a computer virus.

    摘要翻译: 公开了用于认证信任度量链核心根的装置,系统和方法。 用于认证CRTM链的装置设置有多个模块,其被配置为执行从所选择的用于认证的设备上的预定位置检索解密密钥的步骤,使用解密密钥解密认证信号,以及传送解密密钥 认证信号给用户。 在所描述的实施例中,这些模块包括检索模块,解密模块和通信模块。 有利的是,这样的装置,系统和方法可以可靠地验证CRTM链中的链路没有被破坏,修改或感染计算机病毒。 具体来说,这样的装置,系统和方法将能够验证管理程序没有被计算机病毒破坏,修改或感染。

    Blocking computer system ports on per user basis
    36.
    发明授权
    Blocking computer system ports on per user basis 有权
    按用户身份阻止计算机系统端口

    公开(公告)号:US08499345B2

    公开(公告)日:2013-07-30

    申请号:US12243762

    申请日:2008-10-01

    IPC分类号: G06F21/00

    CPC分类号: G06F21/6218

    摘要: An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.

    摘要翻译: 提供一种从信息处理系统的用户接收用户标识符的方法。 用户标识符可以包括用户名以及诸如密码的用户认证码。 从非易失性存储器检索对应于用户标识符的硬件设置。 使用检索的硬件设置来配置诸如端口(例如,USB控制器),网络接口,存储设备和引导顺序的硬件设备。 在将硬件设备配置为对应于所识别的用户之后,引导操作系统。

    Method, apparatus, and system for quiescing a boot environment
    37.
    发明授权
    Method, apparatus, and system for quiescing a boot environment 有权
    引导环境静音的方法,设备和系统

    公开(公告)号:US08151101B2

    公开(公告)日:2012-04-03

    申请号:US12265909

    申请日:2008-11-06

    IPC分类号: G06F9/00 G06F9/24 G06F9/44

    CPC分类号: G06F8/66

    摘要: An apparatus, system, and method are disclosed for quiescing a boot environment. A reservation module reserves a portion of a first storage device. A store module stores an update boot image to the reserved portion. A detection module detects the update boot image stored on the first storage device when the computer boots and executes the update boot image in place of a standard boot image in response to detecting the update boot image. The update boot image places a computer in a known quiescent state.

    摘要翻译: 公开了用于停止引导环境的装置,系统和方法。 预留模块保留第一存储设备的一部分。 存储模块将更新引导映像存储到保留部分。 当计算机启动时,检测模块检测存储在第一存储设备上的更新引导映像,并且响应于检测到更新引导映像而执行替换引导映像代替标准引导映像。 更新引导映像将计算机置于已知的静态状态。

    Blocking Computer System Ports on Per User Basis
    39.
    发明申请
    Blocking Computer System Ports on Per User Basis 有权
    阻止每个用户基础的计算机系统端口

    公开(公告)号:US20100083366A1

    公开(公告)日:2010-04-01

    申请号:US12243762

    申请日:2008-10-01

    IPC分类号: G06F9/00 G06F21/00

    CPC分类号: G06F21/6218

    摘要: An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.

    摘要翻译: 提供一种从信息处理系统的用户接收用户标识符的方法。 用户标识符可以包括用户名以及诸如密码的用户认证码。 从非易失性存储器检索对应于用户标识符的硬件设置。 使用检索的硬件设置来配置诸如端口(例如,USB控制器),网络接口,存储设备和引导顺序的硬件设备。 在将硬件设备配置为对应于所识别的用户之后,引导操作系统。