Wireless detection and/or containment of compromised electronic devices in multiple power states
    1.
    发明申请
    Wireless detection and/or containment of compromised electronic devices in multiple power states 审中-公开
    无线检测和/或容纳处于多种电源状态的受损电子设备

    公开(公告)号:US20070005987A1

    公开(公告)日:2007-01-04

    申请号:US11173986

    申请日:2005-06-30

    CPC classification number: H04L63/1416 H04W12/1208

    Abstract: Architectures and techniques that allow an electronic platform having a Radio Frequency Identification (RFID) tag to transmit platform security status information regardless of the power state of the platform. The RFID tag contains both an external passive RF interface as well as an internal bus interface that may allow components of the host platform to communicate with the RFID tag. The embedded processing agent may provide the ability to detect that a system has come under attack and cause suspicious traffic to be blocked.

    Abstract translation: 允许具有射频识别(RFID)标签的电子平台传送平台安全状态信息的架构和技术,而不管平台的功率状态如何。 RFID标签包含外部无源RF接口以及可允许主机平台的组件与RFID标签通信的内部总线接口。 嵌入式处理代理可以提供检测系统已经受到攻击并导致可疑流量被阻止的能力。

    Page coloring to associate memory pages with programs
    2.
    发明申请
    Page coloring to associate memory pages with programs 有权
    页面着色以将内存页与程序相关联

    公开(公告)号:US20070157003A1

    公开(公告)日:2007-07-05

    申请号:US11323446

    申请日:2005-12-30

    CPC classification number: G06F12/1475 G06F12/1491 G06F21/74 G06F21/79

    Abstract: Apparatuses and methods for page coloring to associate memory pages with programs are disclosed. In one embodiment, an apparatus includes a paging unit and an interface to access a memory. The paging unit includes translation logic and comparison logic. The translation logic is to translate a first address to a second address. The first address is to be provided by an instruction stored in a first page in the memory. The translation is based on an entry in a data structure, and the entry is to include a base address of a second page in the memory including the second address. The comparison logic is to compare the color of the first page to the color of the second page. The color of the first page is to indicate association of the first page with a first program including the first instruction. The data structure entry is also to include the color of the second page to indicate association of the second page with the first program or a second program.

    Abstract translation: 公开了用于将内存页与程序相关联的页着色的装置和方法。 在一个实施例中,一种装置包括寻呼单元和用于访问存储器的接口。 寻呼单元包括翻译逻辑和比较逻辑。 翻译逻辑是将第一个地址翻译成第二个地址。 第一个地址由存储在第一页的指令提供。 翻译是基于数据结构中的条目,并且该条目是在包括第二地址的存储器中包括第二页的基地址。 比较逻辑是将第一页的颜色与第二页的颜色进行比较。 第一页的颜色是指示第一页与包括第一指令的第一程序的关联。 数据结构条目还包括第二页的颜色以指示第二页与第一程序或第二程序的关联。

    Auto-triage of potentially vulnerable network machines
    3.
    发明申请
    Auto-triage of potentially vulnerable network machines 审中-公开
    自动分类潜在易受攻击的网络机器

    公开(公告)号:US20060095961A1

    公开(公告)日:2006-05-04

    申请号:US10976397

    申请日:2004-10-29

    CPC classification number: H04L63/1416 H04L63/1433

    Abstract: Method, apparatus, and system for isolating potentially vulnerable nodes of a network. In one embodiment a network is partitioned into subnets of varying levels of security. A client device may be assigned a network access assignment through one of the subnets based on a level of vulnerability assessed for the client device. The level of vulnerability may be determined based on compliance of the client device with available upgrades and/or patches.

    Abstract translation: 用于隔离网络的潜在脆弱节点的方法,装置和系统。 在一个实施例中,网络被划分成不同级别的安全性的子网。 可以基于为客户端设备评估的漏洞级别,通过子网之一为客户端设备分配网络访问分配。 可以根据客户端设备与可用升级和/或修补程序的兼容性来确定漏洞级别。

    Shared cryptographic key in networks with an embedded agent
    4.
    发明申请
    Shared cryptographic key in networks with an embedded agent 审中-公开
    具有嵌入式代理的网络中的共享加密密钥

    公开(公告)号:US20050213768A1

    公开(公告)日:2005-09-29

    申请号:US10809315

    申请日:2004-03-24

    Abstract: Methods and apparatuses associated with sharing cryptographic keys in a network domain. An embedded agent on a network endpoint participates in the distribution of cryptographic keys. In one embodiment the embedded agent receives and stores a shared symmetric key, as do embedded agents on other network endpoints in the same network domain. The embedded agent causes the shared key to be stored in a secure storage not directly accessible by the host. When the host wants to transmit enciphered data, the embedded agent may provide access to cryptographic services. The embedded agent provides isolation of the shared key from parts of the host that are subject to compromise by attack or infection.

    Abstract translation: 与网络域中共享加密密钥相关联的方法和设备。 网络端点上的嵌入式代理参与加密密钥的分发。 在一个实施例中,嵌入式代理接收并存储共享的对称密钥,以及在相同网络域中的其他网络端点上的嵌入代理。 嵌入式代理使共享密钥存储在主机不能直接访问的安全存储器中。 当主机想要传输加密数据时,嵌入式代理可以提供对加密服务的访问。 嵌入式代理提供了通过攻击或感染而受到妥协的主机部分的共享密钥的隔离。

Patent Agency Ranking