MEMORY INTEGRITY CHECKING
    32.
    发明申请
    MEMORY INTEGRITY CHECKING 审中-公开
    记忆诚信检查

    公开(公告)号:US20160232379A1

    公开(公告)日:2016-08-11

    申请号:US15021022

    申请日:2013-10-31

    Abstract: According to an example, memory integrity checking may include receiving computer program code, and using a loader to load the computer program code in memory. Memory integrity checking may further include verifying the integrity of the computer program code by selectively implementing synchronous verification and/or asynchronous verification. The synchronous verification may be based on loader security features associated with the loading of the computer program code. Further, the asynchronous verification may be based on a media controller associated with the memory containing the computer program code.

    Abstract translation: 根据示例,存储器完整性检查可以包括接收计算机程序代码,并且使用加载器将计算机程序代码加载到存储器中。 存储器完整性检查还可以包括通过选择性地实现同步验证和/或异步验证来验证计算机程序代码的完整性。 同步验证可以基于与加载计算机程序代码相关联的加载器安全特征。 此外,异步验证可以基于与包含计算机程序代码的存储器相关联的媒体控制器。

    Multi-dimensional attestation
    35.
    发明授权

    公开(公告)号:US11372970B2

    公开(公告)日:2022-06-28

    申请号:US16299258

    申请日:2019-03-12

    Abstract: Systems and methods for multi-dimensional attestation are provided. One method for multi-dimensional attestation includes upon occurrence of a triggering event, taking triggered measurements of a platform, the platform including a security co-processor and a volatile memory; extending a platform configuration register of the volatile memory to include the triggered measurements; taking snapshots of the platform configuration register over time; storing the snapshots in a snapshot memory; and upon request, sending the triggered measurements and the snapshots to a verifier for detection of potential attacks.

    Integrity manifest certificate
    36.
    发明授权

    公开(公告)号:US11360784B2

    公开(公告)日:2022-06-14

    申请号:US16565915

    申请日:2019-09-10

    Abstract: Examples disclosed herein relate to using an integrity manifest certificate to verify the state of a platform. A device identity of a device that has the device identity provisioned and stored in a security co-processor to retrieve an integrity proof from the security co-processor. The device includes at least one processing element, at least one memory device, and a bus including at least one bus device, and wherein the device identity is associated with a device identity certificate signed by a first authority. The integrity proof includes a representation of each of a plurality of hardware components including the at least one processing element, the at least one memory device, the at least one bus device, and a system board and a representation of plurality of firmware components included in the device. The integrity proof is provided to a certification station. The certification station determines that the integrity proof is an expected value based on an expected provisioning state of the device and the device identity. The certification station signs, using a second authority, an integrity manifest certificate, based on the integrity proof and the device identity. The integrity manifest certificate is stored.

    Verification of a state of a platform

    公开(公告)号:US11017090B2

    公开(公告)日:2021-05-25

    申请号:US16222293

    申请日:2018-12-17

    Abstract: A method of certifying a state of a platform includes receiving one or more software elements of a software stack of the platform by an authentication module and performing a hash algorithm on the software stack to generate one or more hash values. The software stack uniquely determines a software state of the platform. The method includes generating creation data, a creation hash, and a creation ticket, corresponding to the hash values and sending the creation ticket to the platform. The method also includes receiving the creation ticket by the authentication module and certifying the creation data and the creation hash based on the creation ticket. The method further includes generating a certified structure based on the creation data and performing the hash algorithm on the certified structure to generate a hash of the certified structure. The certified structure uniquely determines the software state of the platform.

    Securing firmware
    40.
    发明授权

    公开(公告)号:US10771264B2

    公开(公告)日:2020-09-08

    申请号:US16155983

    申请日:2018-10-10

    Abstract: A method for secure data protection includes generating a firmware digital certificate for a layer of firmware. The firmware operates a hardware component of a compute node. The firmware digital certificate is an attribute certificate. The firmware digital certificate includes a cumulative hash of the layer of firmware and a nonce. The cumulative hash includes a concatenation of a hash of the layer of firmware and a hash of each one or more lower layers of the firmware. The method includes authenticating the layer of firmware using a trusted data store. The trusted data store includes a binary image of an expected layer of firmware and a certificate chain comprising the hardware digital certificate and the firmware digital certificate.

Patent Agency Ranking