Trusted application migration across computer nodes
    5.
    发明授权
    Trusted application migration across computer nodes 有权
    跨计算机节点的可信应用程序迁移

    公开(公告)号:US09210148B2

    公开(公告)日:2015-12-08

    申请号:US13995511

    申请日:2011-12-30

    CPC classification number: H04L63/0876 G06F21/00 H04L63/08 H04W12/06 H04W12/08

    Abstract: An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.

    Abstract translation: 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能凭证。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。

    Data security
    7.
    发明授权
    Data security 有权
    数据安全

    公开(公告)号:US09135470B2

    公开(公告)日:2015-09-15

    申请号:US12772365

    申请日:2010-05-03

    Abstract: In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage, encrypting, based least in part upon one or more keys, the input data to generate output data to store in the storage. The one or more keys may be authorized by a remote authority. Alternatively or additionally, another of these operations may include, in response, at least in part, to a request to retrieve the input data from the storage, decrypting, based at least in part upon the at least one key, the output data. Many modifications, variations, and alternatives are possible without departing from this embodiment.

    Abstract translation: 在一个实施例中,提供了可以包括一个或多个操作的方法。 这些操作中的一个可以至少部分地包括存储输入数据的请求,至少部分地基于一个或多个密钥加密输入数据,以生成输出数据以存储在存储器中。 一个或多个键可以由远程机构授权。 或者或另外,这些操作中的另一个可以至少部分地包括从存储器检索输入数据的请求,至少部分地基于至少一个密钥来解密输出数据。 在不脱离本实施例的情况下,可以进行许多修改,变型和替换。

    Methods and apparatus to protect segments of memory
    8.
    发明授权
    Methods and apparatus to protect segments of memory 有权
    保护记忆段的方法和装置

    公开(公告)号:US09063836B2

    公开(公告)日:2015-06-23

    申请号:US12843617

    申请日:2010-07-26

    CPC classification number: G06F11/004 G06F11/1008

    Abstract: Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.

    Abstract translation: 本文公开了保护存储器段的方法和装置。 示例性方法包括拦截指示错误的中断请求; 确定存储器的第一段是否损坏,所述第一存储器段被指定为存储器的保护区域; 当存储器的保护区域损坏时,使用奇偶校验块修复存储器的损坏区域; 并且响应于验证存储器的受保护区域,产生能够使用存储在存储器的保护区域中的代码来处理与中断请求相关联的错误的中断。

    FLEXIBLE BOOTSTRAP CODE ARCHITECTURE
    9.
    发明申请
    FLEXIBLE BOOTSTRAP CODE ARCHITECTURE 有权
    灵活的BOOTSTRAP代码架构

    公开(公告)号:US20150121055A1

    公开(公告)日:2015-04-30

    申请号:US14128116

    申请日:2013-10-29

    CPC classification number: G06F9/4401 G06F9/4403 G06F9/441

    Abstract: The present disclosure is directed to flexible bootstrap code architecture. A device may comprise equipment for operating the device and an operating system (OS) for operating the equipment A boor, module may also be included in the device to execute boot operations. At least one flexible boot (FB) module in the boot module may interact with the equipment and/or OS during the boot operations to cause the boot operations to become device-specific. An example boot module may comprise a plurality of FB modules. An example FB module may verify a device/chipset identification and may control the boot operations based on the identification. Other example FB modules may select resources to load based on an OS type, may provide a boot configuration table location for use in OS runtime boot configuration or may load variables from a preload variable directory for use in configuring boot operations.

    Abstract translation: 本公开涉及灵活的引导代码架构。 设备可以包括用于操作设备的设备和用于操作设备的操作系统(OS)。还可以将该模块包括在设备中以执行引导操作。 引导模块中的至少一个灵活启动(FB)模块可能在引导操作期间与设备和/或OS进行交互,以使引导操作成为设备特定的。 示例性引导模块可以包括多个FB模块。 示例FB模块可以验证设备/芯片组标识,并且可以基于识别来控制引导操作。 其他示例FB模块可以基于OS类型选择要加载的资源,可以提供用于OS运行时引导配置的引导配置表位置,或者可以从用于配置引导操作的预加载变量目录加载变量。

    Methods and apparatus for trusted boot optimization
    10.
    发明授权
    Methods and apparatus for trusted boot optimization 有权
    可信引导优化的方法和设备

    公开(公告)号:US08892858B2

    公开(公告)日:2014-11-18

    申请号:US13810654

    申请日:2011-12-29

    CPC classification number: G06F21/575 G06F9/24 G06F9/4401

    Abstract: A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed.

    Abstract translation: 数据处理系统可以包括具有防止更新的分区或高速缓存的高完整性存储(HIS)设备。 数据处理系统可以响应于重新激活而执行引导过程。 引导过程可以包括执行引导对象的操作。 在引导过程中,在执行引导对象之前,数据处理系统可以从HIS设备的受保护缓存中检索引导对象的摘要。 摘要可能是引导对象的加密哈希值。 在引导过程中,检索到的摘要可以扩展到数据处理系统的可信平台模块中的平台配置寄存器。 描述和要求保护其他实施例。

Patent Agency Ranking