摘要:
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
摘要:
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
摘要:
A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
摘要:
A trusted platform module is presented that is capable of creating, dynamically, multiple virtual trusted platform modules in a hierarchical organization. A trusted platform module domain is created. The trusted platform module creates virtual trusted platform modules, as needed, in the trusted platform module domain. The virtual trusted platform modules can inherit the permissions of a parent trusted platform module to have the ability to create virtual trusted platform modules themselves. Each virtual trusted platform module is associated with a specific partition. Each partition is associated with an individual operating system. The hierarchy of created operating systems and their privilege of spawning new operating systems is reflected in the hierarchy of trusted platform modules and the privileges each of the trusted platform modules has.
摘要:
A Write Broadcast system and method uses a base station to write sent data to all or some selected number (sub group) of tags in a base station field simultaneously. By unselecting the tags that have been successfully written to, and requesting a response from the remaining tags in the field (or sub group), the system determines, by receiving a response to the request, that there are tags in the field (sub group) that were unsuccessfully written to. Another Write Broadcast signal is sent to these tags. The system is useful for quickly (simultaneously) “stamping” information on the tag memory of a large number of tags in the field of the base station.
摘要:
A micro mirror array including an upper wafer portion having a plurality of movable reflective surfaces located thereon, the upper wafer portion defining a coverage area in top view. The array further includes a lower wafer portion located generally below and coupled to the upper wafer portion. The lower wafer portion includes at least one connection site located thereon, the at least one connection site being electrically or operatively coupled to at least one component which can control the movement of at least one of the reflective surfaces. The at least one connection site is not generally located within the coverage area of the upper wafer portion.
摘要:
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
摘要:
A system and method is disclosed for selecting certain subgroups of radio frequency (RF) tags for querying, communicating, and/or identifying by a base station. The base station sends commands to a group tags within a RF field of the base station. The tags use control logic to determine whether or not they meet certain criteria sent out by the commands. This may cause the tags to change state which either prevents or allows a given tag to participate in an identification process. In this way, a given subgroups of tags meeting certain criteria can be selected for querying, communicating, and/or identifying.
摘要:
An exemplary embodiment uses a novel adaptation of a tree splitting algorithm applied to Radio Frequency (RE) tagging technology to identify many tags in the RF field of a base station. The embodiment uses the tree splitting algorithm to identify a single tag in a field of a plurality of radio frequency tags. Once the single tag is identified, the identified tag is placed in a Data_Exchange state where the base station can access data from the tag memory by using information that identifies the tag.
摘要:
A master entity is capable of broadcasting commands to a plurality of three-state-selection machine slaves. Transitions from one state to another are effected on instruction from commands in a sequence of commands broadcast from the master. Slaves move to another state when they satisfy a primitive condition specified in the command. By moving slaves among the three sets, a desired subset of slaves can be isolated in one of the sets. This desired subset of slaves then can be moved to one of the states that is unaffected by commands that cause the selection of other desirable subsets of slaves. In the embodiments of the incorporated U.S. Pat. No. 5,673,037, certain subgroups of radio frequency (RF) tags are selected for querying, communicating, and/or identifying by commands from a base station. Commands from the base station may cause the tags to change state which either prevents or allows a given tag to participate in an identification process. In this way, a given subgroup(s) of tags meeting certain criteria can be selected for querying, communicating, and/or identifying.