Single Security Model In Booting A Computing Device
    32.
    发明申请
    Single Security Model In Booting A Computing Device 有权
    单个安全模型引导计算设备

    公开(公告)号:US20090257595A1

    公开(公告)日:2009-10-15

    申请号:US12103685

    申请日:2008-04-15

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    Methods and Systems for Power Management in a Data Processing System
    33.
    发明申请
    Methods and Systems for Power Management in a Data Processing System 有权
    数据处理系统中电源管理的方法与系统

    公开(公告)号:US20080168285A1

    公开(公告)日:2008-07-10

    申请号:US11620703

    申请日:2007-01-07

    Abstract: Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions.

    Abstract translation: 描述用于管理数据处理系统中的功耗的方法和系统。 在一个实施例中,数据处理系统包括通用处理单元,图形处理单元(GPU),至少一个外围设备接口控制器,耦合到通用处理单元的至少一个总线,以及耦合到至少 通用处理单元和GPU。 功率控制器被配置为响应于通用处理单元的指令队列的第一状态而为通用处理单元断电,并且被配置为响应于指令的第二状态而关闭GPU的电源 排队GPU 第一状态和第二状态表示具有对于将来的事件或动作的指令或指令的指令队列。

    Compatible trust in a computing device
    34.
    发明授权
    Compatible trust in a computing device 有权
    兼容计算设备的信任

    公开(公告)号:US08789037B2

    公开(公告)日:2014-07-22

    申请号:US13542518

    申请日:2012-07-05

    CPC classification number: G06F21/577 G06F21/575

    Abstract: A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image.

    Abstract translation: 描述了用于执行具有第一版本号的第一可执行代码图像到设备的存储器中以尝试建立该设备的操作环境的方法和装置。 第一可执行代码图像在成功验证第二可执行代码图像之后从第二可执行代码图像检索第二版本号。 如果第一版本号和第二版本号不满足预定关系,则防止第二可执行代码图像被第一可执行代码图像加载。

    Single security model in booting a computing device
    35.
    发明授权
    Single security model in booting a computing device 有权
    启动计算设备时的单一安全模型

    公开(公告)号:US08560820B2

    公开(公告)日:2013-10-15

    申请号:US13411355

    申请日:2012-03-02

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    TRUSTING AN UNVERIFIED CODE IMAGE IN A COMPUTING DEVICE
    36.
    发明申请
    TRUSTING AN UNVERIFIED CODE IMAGE IN A COMPUTING DEVICE 有权
    在计算机设备中记录一个未经许可的代码图像

    公开(公告)号:US20130081124A1

    公开(公告)日:2013-03-28

    申请号:US13621183

    申请日:2012-09-15

    CPC classification number: G06F21/00 G06F21/575

    Abstract: A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key.

    Abstract translation: 描述了一种用于配置存储在装置的安全存储区域(例如,ROM)中的密钥的方法和装置,包括根据预定条件启用和禁用密钥以执行代码图像之一的设备。 密钥可以唯一标识设备。 可以从满足预定条件的提供商加载代码图像以建立设备的操作环境的至少一个组件。 根据密钥的配置,验证码图像可以是可选的。 未经验证的代码图像的安全执行可能基于禁用该键的配置。

    SECURE BOOTING A COMPUTING DEVICE
    38.
    发明申请
    SECURE BOOTING A COMPUTING DEVICE 有权
    安全打击计算机设备

    公开(公告)号:US20130024677A1

    公开(公告)日:2013-01-24

    申请号:US13558249

    申请日:2012-07-25

    CPC classification number: G06F21/57 G06F21/575 G06F2221/2129

    Abstract: A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image.

    Abstract translation: 描述用于执行嵌入在设备内的代码以验证加载在设备的存储器中的代码图像的方法和装置。 可以在验证为可信代码图像之后执行代码图像。 嵌入代码可以存储在设备的安全ROM(只读存储器)芯片中。 在一个实施例中,代码图像的验证基于存储在安全ROM芯片内的密钥。 每个设备的密钥可能是唯一的。 访问密钥可以由相关的安全ROM芯片来控制。 设备可以在执行验证的代码图像之后完成建立操作环境。

    COMPATIBLE TRUST IN A COMPUTING DEVICE
    39.
    发明申请
    COMPATIBLE TRUST IN A COMPUTING DEVICE 有权
    计算设备中的兼容信任

    公开(公告)号:US20120278597A1

    公开(公告)日:2012-11-01

    申请号:US13542518

    申请日:2012-07-05

    CPC classification number: G06F21/577 G06F21/575

    Abstract: A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image.

    Abstract translation: 描述了用于执行具有第一版本号的第一可执行代码图像到设备的存储器中以尝试建立该设备的操作环境的方法和装置。 第一可执行代码图像在成功验证第二可执行代码图像之后从第二可执行代码图像检索第二版本号。 如果第一版本号和第二版本号不满足预定关系,则防止第二可执行代码图像被第一可执行代码图像加载。

    Secure booting a computing device
    40.
    发明授权
    Secure booting a computing device 有权
    安全启动计算设备

    公开(公告)号:US08254568B2

    公开(公告)日:2012-08-28

    申请号:US11620689

    申请日:2007-01-07

    CPC classification number: G06F21/57 G06F21/575 G06F2221/2129

    Abstract: A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image.

    Abstract translation: 描述用于执行嵌入在设备内的代码以验证加载在设备的存储器中的代码图像的方法和装置。 可以在验证为可信代码图像之后执行代码图像。 嵌入代码可以存储在设备的安全ROM(只读存储器)芯片中。 在一个实施例中,代码图像的验证基于存储在安全ROM芯片内的密钥。 每个设备的密钥可能是唯一的。 访问密钥可以由相关的安全ROM芯片来控制。 设备可以在执行验证的代码图像之后完成建立操作环境。

Patent Agency Ranking