OUT-OF-BAND ACCESS TO STORAGE DEVICES THROUGH PORT-SHARING HARDWARE
    71.
    发明申请
    OUT-OF-BAND ACCESS TO STORAGE DEVICES THROUGH PORT-SHARING HARDWARE 有权
    通过端口共享硬件访问存储设备的带外

    公开(公告)号:US20120017011A1

    公开(公告)日:2012-01-19

    申请号:US12836341

    申请日:2010-07-14

    IPC分类号: G06F3/00

    摘要: A method, apparatus, system, and computer program product for enabling out-of-band access to storage devices through port-sharing hardware. Providing out-of-band access to storage devices enables system management functions to be performed when an operating system is non-functional as well as when the operating system is active. Storage commands originating with a management service can be interleaved with storage commands issued by the host operating system. The host operating system maintains ownership and control over its storage devices, but management activities can be performed while the host operating system is operational.

    摘要翻译: 一种用于通过端口共享硬件对存储设备进行带外访问的方法,装置,系统和计算机程序产品。 提供对存储设备的带外访问可使系统管理功能在操作系统不起作用以及操作系统处于活动状态时执行。 源自管理服务的存储命令可以与主机操作系统发出的存储命令交错。 主机操作系统维护对其存储设备的所有权和控制权,但是可以在主机操作系统运行时执行管理活动。

    Using chipset-based protected firmware for host software tamper detection and protection
    72.
    发明申请
    Using chipset-based protected firmware for host software tamper detection and protection 有权
    使用基于芯片组的保护固件进行主机软件篡改检测和保护

    公开(公告)号:US20110078791A1

    公开(公告)日:2011-03-31

    申请号:US12586705

    申请日:2009-09-25

    IPC分类号: G06F21/00 G06F17/30

    摘要: A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system.

    摘要翻译: 用于主机软件篡改检测和保护服务的方法,系统和计算机程序产品。 与主机系统的芯片组的固件实现的与主机系统的主机操作系统隔离的安全分区从主机系统获取文件元数据,并使用该文件元数据来识别第一文件以便检查 篡改。 安全分区获取第一文件的数据块,经由带外通信信道与服务通信,并使用从服务和数据块获得的信息来确定第一文件是否已被破坏。 安全分区在不调用主机系统的操作系统或文件系统的情况下获得文件元数据和第一文件的数据块。

    SYSTEMS AND METHODS FOR SECURE ASSOCIATION OF HARDWARD DEVICES
    74.
    发明申请
    SYSTEMS AND METHODS FOR SECURE ASSOCIATION OF HARDWARD DEVICES 审中-公开
    硬件设备安全协调的系统和方法

    公开(公告)号:US20080244758A1

    公开(公告)日:2008-10-02

    申请号:US11694548

    申请日:2007-03-30

    IPC分类号: G06F1/26 G06F9/26

    摘要: An apparatus to protect one or more hardware devices from unauthorized software access is described herein and comprises, in one embodiment, a virtual machine manager, a memory protection module and an integrity measurement manager. In a further embodiment, a method of providing secure access to one or more hardware devices may include, modifying a page table, verifying the integrity of a device driver, and providing memory protection to the device driver if the device driver is verified.

    摘要翻译: 本文描述了保护一个或多个硬件设备免受未经授权的软件访问的装置,并且在一个实施例中包括虚拟机管理器,存储器保护模块和完整性测量管理器。 在另一实施例中,提供对一个或多个硬件设备的安全访问的方法可以包括:修改页表,验证设备驱动程序的完整性,以及如果设备驱动程序被验证,则向设备驱动程序提供存储器保护。

    System and method to exchange information between a control element and forwarding elements in a network element architecture
    75.
    发明授权
    System and method to exchange information between a control element and forwarding elements in a network element architecture 有权
    在网元结构中,控制元件与转发元件之间交换信息的系统和方法

    公开(公告)号:US07428219B2

    公开(公告)日:2008-09-23

    申请号:US10789402

    申请日:2004-02-27

    IPC分类号: H04L12/28

    摘要: A network element comprises a control element (CE), a plurality of forwarding element (FEs) and an interconnect in communication with said CE and at least one of said FEs. Communication across the interconnect between the CE and the plurality of FEs is done in accordance with a protocol that includes a binding phase used to provide a data channel between the CE and a first one of the FEs. The binding phase is further used to provide a control channel between the CE and the first one of the FEs, the control channel used to transport control and configuration messages. The control channel is separate from the data channel. The protocol also includes a capability discovery phase, a configuration operation phase and an unbind phase executed between the CE and the FE.

    摘要翻译: 网络元件包括控制元件(CE),多个转发元件(FE)和与所述CE和所述FE中的至少一个通信的互连。 通过CE和多个FE之间的互连的通信根据包括用于在CE和第一个FE之间提供数据信道的绑定阶段的协议完成。 绑定阶段进一步用于提供CE与第一个FE之间的控制信道,用于传输控制和配置消息的控制信道。 控制通道与数据通道分开。 该协议还包括在CE和FE之间执行的能力发现阶段,配置操作阶段和解除绑定阶段。

    Method and apparatus for run-time in-memory patching of code from a service processor
    76.
    发明申请
    Method and apparatus for run-time in-memory patching of code from a service processor 有权
    从服务处理器的代码运行时内存补丁的方法和装置

    公开(公告)号:US20080083030A1

    公开(公告)日:2008-04-03

    申请号:US11540373

    申请日:2006-09-29

    IPC分类号: G06F12/14

    CPC分类号: G06F8/656

    摘要: Methods and apparatuses enable in-memory patching of a program loaded in volatile memory. A service processor identifies a program to be patched and an associated patch for the program. The patch is loaded into memory, including applying relocation fix-ups to the patch. The service processor directs the program to the patch in place of the segment of the program to be patched. The program implements the patch while maintaining program state, and without suspending execution of the program.

    摘要翻译: 方法和装置使得能够在加载在易失性存储器中的程序的内存中修补。 服务处理器识别要修补的程序和程序的相关修补程序。 修补程序加载到内存中,包括将修补程序应用于修补程序。 服务处理器将程序引导到补丁代替要修补的程序的段。 该程序在维护程序状态的同时实现补丁,并且不会暂停程序的执行。

    CONTEXT-AWARE PROACTIVE THREAT MANAGEMENT SYSTEM
    79.
    发明申请
    CONTEXT-AWARE PROACTIVE THREAT MANAGEMENT SYSTEM 有权
    背景知识主动威胁管理系统

    公开(公告)号:US20150195301A1

    公开(公告)日:2015-07-09

    申请号:US14359969

    申请日:2013-11-19

    摘要: This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about external activities (e.g., provided by remote resources) for threat assessment and mitigation. A device may comprise, for example, a hostile environment detection (HED) module to coordinate threat assessment and mitigation. The HED module may accumulate internal activity data (e.g., from security services in the device), and external activity data regarding a system environment and/or a physical environment from the remote resources. The HED module may then assess threats based on the activity data and determine automated and/or manual mitigation operations to respond to the threats. In one embodiment, visualization features may also be used to, for example, visualize threats to a user, visualize automatic/manual mitigation operations, request user confirmation regarding the performance of manual mitigation operations, etc.

    摘要翻译: 本公开涉及上下文感知主动威胁管理系统。 通常,设备可以使用内部活动数据以及关于外部活动的数据(例如由远程资源提供)来进行威胁评估和缓解。 设备可以包括例如恶意环境检测(HED)模块来协调威胁评估和缓解。 HED模块可以从远程资源累积内部活动数据(例如,来自设备中的安全服务)和关于系统环境和/或物理环境的外部活动数据。 然后,HED模块可以基于活动数据来评估威胁,并且确定自动和/或手动缓解操作以应对威胁。 在一个实施例中,可视化特征也可以用于例如可视化对用户的威胁,可视化自动/手动缓解操作,请求关于手动缓解操作的执行的用户确认等。

    Implementation of robust and secure content protection in a system-on-a-chip apparatus
    80.
    发明申请
    Implementation of robust and secure content protection in a system-on-a-chip apparatus 有权
    在片上系统设备中实现强大而安全的内容保护

    公开(公告)号:US20140129827A1

    公开(公告)日:2014-05-08

    申请号:US13694221

    申请日:2012-11-08

    IPC分类号: H04L9/32 H04W12/06 H04L29/06

    摘要: A content processing integrated circuit includes a system-on-a-chip (SoC) that further includes a processor to receive an authentication request from an external device for authenticating if the SoC is permitted to receive encrypted content from the external device, and to receive the encrypted content once the SoC is authenticated. An authentication processor is provided and coupled to the processor to authenticate the SoC to the external device when the processor receives the authentication request, and to generate a decryption key for decrypting the encrypted content. A decryption processor is provided and coupled to the processor and the authentication processor to receive the decryption key from the authentication processor and to decrypt the encrypted content with the decryption key. A wireless display system with such SoC is also described. A method of implementing a secure and robust content protection in a SoC is also described.

    摘要翻译: 内容处理集成电路包括芯片系统芯片(SoC),其还包括处理器,用于从外部设备接收认证请求,用于认证是否允许SoC从外部设备接收加密的内容,并且接收 一旦SoC被认证,加密的内容。 当处理器接收到认证请求时,提供认证处理器并将其耦合到处理器以对外部设备进行认证,并产生用于解密加密内容的解密密钥。 提供解密处理器并将其耦合到处理器和认证处理器以从认证处理器接收解密密钥,并用解密密钥解密加密的内容。 还描述了具有这种SoC的无线显示系统。 还描述了在SoC中实现安全和鲁棒的内容保护的方法。