Security plugin for a system-on-a-chip platform

    公开(公告)号:US11263352B2

    公开(公告)日:2022-03-01

    申请号:US16936999

    申请日:2020-07-23

    Abstract: Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.

    Memory scanning methods and apparatus

    公开(公告)号:US11080401B2

    公开(公告)日:2021-08-03

    申请号:US16657669

    申请日:2019-10-18

    Abstract: Memory scanning methods and apparatus are disclosed. An example apparatus includes an address identifier to, when an entry of a paging structure has been accessed, determine a first address corresponding to a page of physical memory when the entry of the paging structure maps to the page of the physical memory; and a scanner to: scan a threshold amount of memory beginning at a physical memory address corresponding to the first address; and determine whether the threshold amount of memory includes a pattern indicative of malware.

    Memory scanning methods and apparatus

    公开(公告)号:US10452848B2

    公开(公告)日:2019-10-22

    申请号:US15798109

    申请日:2017-10-30

    Abstract: Memory scanning methods and apparatus are disclosed. An example apparatus includes scan manager to identify a physical memory address that has recently been accessed. The physical memory address is identified as having been recently accessed when an access has occurred within a threshold of a current time. The apparatus also includes a scanner to scan a threshold amount of memory beginning at the physical memory address, and determine whether the memory included in the threshold amount of memory includes a pattern indicative of malware.

    MEMORY SCANNING METHODS AND APPARATUS
    34.
    发明申请

    公开(公告)号:US20180046806A1

    公开(公告)日:2018-02-15

    申请号:US15798109

    申请日:2017-10-30

    Abstract: Memory scanning methods and apparatus are disclosed. An example apparatus includes scan manager to identify a physical memory address that has recently been accessed. The physical memory address is identified as having been recently accessed when an access has occurred within a threshold of a current time. The apparatus also includes a scanner to scan a threshold amount of memory beginning at the physical memory address, and determine whether the memory included in the threshold amount of memory includes a pattern indicative of malware.

    Efficient key derivation for end-to-end network security with traffic visibility

    公开(公告)号:US09832015B2

    公开(公告)日:2017-11-28

    申请号:US14557125

    申请日:2014-12-01

    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1, client_ID),  (1) client_key_LSB=AES128(base_key_2, client_ID+pad), and  (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.

    METHOD AND APPARATUS FOR SECURE NETWORK ENCLAVES

    公开(公告)号:US20160261570A1

    公开(公告)日:2016-09-08

    申请号:US15085114

    申请日:2016-03-30

    CPC classification number: H04L63/061 H04L9/083 H04L9/321 H04L9/3247

    Abstract: Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a central network authority. Packet processing logic receives a key and an identifier from the central network authority. Security protocol logic then establishes a client-server security association through a communication that includes a client identifier and an encrypted portion and/or an authorization signature, wherein a client authorization key allocated by the central network authority can be reproduced by a server, other than said central network authority, from the client identifier and a derivation key provided to the server by the central network authority to decrypt the encrypted portion and/or to validate the communication using the authorization signature. The server may also provide the client with new session keys and/or new client session identifiers using server-generated derivation keys if desired, protecting these with the client authorization key.

Patent Agency Ranking