Authenticating suspect data using key tables
    62.
    发明授权
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US08024579B2

    公开(公告)日:2011-09-20

    申请号:US11647932

    申请日:2006-12-29

    CPC classification number: G06F21/57 G06F21/51 H04L9/0897 H04L9/3236

    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    Abstract translation: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    IT administrator initiated remote hardware independent imaging technology
    63.
    发明授权
    IT administrator initiated remote hardware independent imaging technology 有权
    IT管​​理员启动远程硬件独立成像技术

    公开(公告)号:US07917916B2

    公开(公告)日:2011-03-29

    申请号:US11472494

    申请日:2006-06-20

    CPC classification number: G06F9/4411 G06F8/63

    Abstract: The present invention relates to a method for removing the driver map component from being stored on the service partition and placing it on a server for retrieval at a later time. Only the actual device drivers that are required for that system will be provided. A central repository will be provided for applications and device drivers that would leverage the AMT area. The AMT IDE-R would be used to store the hook to network install, for example an IT administrator initiated network install to an unpowered system. Two situations exist in which this method will be used. The first situation involves supplying ImageUltra content to a system that is connected to the Local Area Network while ImageUltra is running. The second situation involves supplying ImageUltra content to a system that is not connected to the Local Area Network while ImageUltra is running.

    Abstract translation: 本发明涉及一种用于将驱动程序映射组件移除存储在服务分区上并将其放置在服务器上以便稍后进行检索的方法。 仅提供该系统所需的实际设备驱动程序。 将为使用AMT区域的应用程序和设备驱动程序提供中央存储库。 AMT IDE-R将用于存储钩子到网络安装,例如IT管理员启动网络安装到无动力系统。 存在使用这种方法的两种情况。 第一种情况是在ImageUltra运行时将ImageUltra内容提供给连接到局域网的系统。 第二种情况是在ImageUltra正在运行时,将ImageUltra内容提供给未连接到局域网的系统。

    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT
    64.
    发明申请
    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT 有权
    用于管理客户端的方法,装置和前向缓存系统

    公开(公告)号:US20100205375A1

    公开(公告)日:2010-08-12

    申请号:US12368882

    申请日:2009-02-10

    Abstract: A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.

    Abstract translation: 公开了一种用于被管理客户端的前向缓存的方法,装置和系统。 存储模块将软件映像存储在后端服务器的存储设备上。 后端服务器通过用于多个无盘数据处理设备的第一中间网络点在存储设备上提供虚拟磁盘存储。 每个无盘数据处理装置与第一中间网络点直接通信。 存储模块在第一中间网络点高速缓存软件映像的图像实例。 跟踪模块检测对存储设备上的软件映像的更新。 存储模块将更新的软件映像作为更新的图像实例复制到第一中间网络点。

    Authenticating suspect data using key tables
    68.
    发明申请
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US20080162932A1

    公开(公告)日:2008-07-03

    申请号:US11647932

    申请日:2006-12-29

    CPC classification number: G06F21/57 G06F21/51 H04L9/0897 H04L9/3236

    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    Abstract translation: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System
    69.
    发明申请
    Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System 有权
    提供集中用户授权以允许安全登录到计算机系统的方法和装置

    公开(公告)号:US20080148389A1

    公开(公告)日:2008-06-19

    申请号:US11612092

    申请日:2006-12-18

    CPC classification number: G06F21/575

    Abstract: A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.

    Abstract translation: 公开了一种用于提供集中式用户授权以允许对计算机系统进行安全登录的方法。 响应于尝试启动计算机系统的用户,由计算机内的虚拟机管理程序向可信服务器发送消息,以请求计算机系统的新的硬盘驱动器密码。 如果用户没有权限访问计算机系统,则可信服务器发送一个数据包,以指示管理程序停止计算机系统上的任何引导过程。 如果用户被授权访问计算机系统,则包含部分硬盘驱动器密码的分组由可信服务器发送到计算机系统。 然后,计算机系统使用系统公钥对数据包进行加密,以产生部分硬盘驱动器密码。 计算机系统随后将部分硬盘驱动器密码与用户密码相结合,以生成新的完整硬盘驱动器密码,以继续引导过程。

    Method and Apparatus for Preventing Unauthorized Modifications to Rental Computer Systems
    70.
    发明申请
    Method and Apparatus for Preventing Unauthorized Modifications to Rental Computer Systems 有权
    防止未经授权修改租用计算机系统的方法和装置

    公开(公告)号:US20080077785A1

    公开(公告)日:2008-03-27

    申请号:US11535538

    申请日:2006-09-27

    Abstract: A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the time/date value is less than an end time/date rental value. If the time/date value is less than the end time/date rental value, the rental computer system continues to boot.

    Abstract translation: 公开了一种防止对租赁计算机系统的未经授权的修改的方法。 在租赁计算机系统的引导期间,确定时间日卡是否绑定到租赁计算机系统。 如果时间日卡被绑定到租赁计算机系统,则另外确定时间日卡上的时间/日期值是否小于最多存储在安全存储位置中的安全时间/日期值 最近掉电。 如果时间日卡上的时间/日期值不小于安全时间/日期值,则另外确定时间/日期值是否小于结束时间/日期租赁值。 如果时间/日期值小于结束时间/日期租金值,则租用计算机系统将继续启动。

Patent Agency Ranking