Communication of information via a side-band channel, and use of same to verify positional relationship
    2.
    发明申请
    Communication of information via a side-band channel, and use of same to verify positional relationship 失效
    通过边带通道进行信息通信,并使用它来验证位置关系

    公开(公告)号:US20050010818A1

    公开(公告)日:2005-01-13

    申请号:US10759325

    申请日:2004-01-16

    CPC分类号: G06F21/606 G06F21/85

    摘要: The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire, an unused pin, etc.), whereby these components may communicate without the use of the system bus. The non-bus communication channel may be referred to as “side-band.” The side-band channel may be used to communicate information that might identify the user's hardware (e.g., a public key) or other information that the user may not want to be easily intercepted by the public at large. Communication over the side-band channel may also be used to verify that the participants in a communication are within a defined positional relationship to each other.

    摘要翻译: 本发明提供计算机系统中的组件之间的可靠的边带通信,从而可以避免使用系统总线。 两个组件可以通过除总线(例如,红外线端口,电线,未使用的引脚等)之外的方式连接,由此这些组件可以在不使用系统总线的情况下进行通信。 非总线通信信道可以被称为“边带”。 边带频道可以用于传达可能识别用户硬件(例如,公共密钥)的信息或用户可能不希望容易被公众容易地截获的其他信息。 通过边带信道的通信也可以用于验证通信中的参与者在彼此之间的定义的位置关系内。

    Communication of information via an in-band channel using a trusted configuration space
    3.
    发明申请
    Communication of information via an in-band channel using a trusted configuration space 有权
    使用可信配置空间通过带内频道进行信息通信

    公开(公告)号:US20070118743A1

    公开(公告)日:2007-05-24

    申请号:US11285882

    申请日:2005-11-23

    IPC分类号: H04L9/00

    CPC分类号: G06F21/57 G06F2221/2105

    摘要: Communication of information via an in-band channel using a trusted configuration space is provided. The introduction of using a trusted configuration space associated with a computer bus system, such as PCI Express® (PCIe™), for example, enables the design of trusted computing platforms capable of providing compliant devices with assurance that their trusted configuration registers can only be accessed by software running in the trusted software environment. Establishing device trust in the software that initiates trusted configuration requests makes it possible to secure and control access to certain secret, sensitive, or personally-identifiable information these devices may contain (e.g., a uniquely-identifying public key, as described above or certificate which the device provides for revocation purposes).

    摘要翻译: 提供了使用信任配置空间通过带内信道进行信息通信。 例如,使用与计算机总线系统(例如PCI Express(PCIe))相关联的可信配置空间的引入使得能够设计可信计算平台,其能够向合规设备提供其可信配置的保证 寄存器只能由可信软件环境中运行的软件访问。 在启动信任配置请求的软件中建立设备信任使得可以保护和控制对这些设备可能包含的某些秘密,敏感或个人身份信息的访问(例如,如上所述的唯一标识的公共密钥或证书, 该设备提供撤销目的)。

    Providing secure input to a system with a high-assurance execution environment
    4.
    发明申请
    Providing secure input to a system with a high-assurance execution environment 有权
    为具有高度执行环境的系统提供安全输入

    公开(公告)号:US20050091530A1

    公开(公告)日:2005-04-28

    申请号:US10693061

    申请日:2003-10-24

    摘要: Techniques are disclosed to provide security for user input in which a first, host operating system is used along with a second, high assurance operating system, where the first system provides at least some of the infrastructure for the second system. Two modes are presented. In a first mode, user data is passed to the host operating system. In a second mode, user data is retained in the second operating system for the use of the second operating system or processes running on the second operating system. Transitions between the nodes can be accomplished according to hypothecated user actions such as keystroke combinations, or when the user performs an action which indicates a programmatic activation of a process running in the second operating system. Where shadow graphical elements are run by the first operating system to indicate the location of graphical elements from processes running on the second operating system, this programmatic activation may be indicated by programmatic activation of a shadow graphical element.

    摘要翻译: 公开了技术来为用户输入提供安全性,其中第一主机操作系统与第二高保证操作系统一起使用,其中第一系统为第二系统提供至少一些基础设施。 提出了两种模式。 在第一模式中,用户数据被传递到主机操作系统。 在第二模式中,用户数据被保留在第二操作系统中,以便使用在第二操作系统上运行的第二操作系统或进程。 节点之间的转换可以根据诸如按键组合之类的假设的用户动作,或当用户执行指示在第二操作系统中运行的进程的编程激活的动作时完成。 在阴影图形元素由第一操作系统运行以指示来自在第二操作系统上运行的进程的图形元素的位置的情况下,可以通过阴影图形元素的编程激活来指示该程序化激活。

    Security state watcher
    5.
    发明申请

    公开(公告)号:US20060075264A1

    公开(公告)日:2006-04-06

    申请号:US10954917

    申请日:2004-09-30

    IPC分类号: G06F12/14

    CPC分类号: G06F21/577 Y10S257/922

    摘要: A security device watches over the secure functionality in a computer system. This “watcher” security device may be integrated within the computer system or may be separate from it. The security device queries the secure functionality to determine whether the state of the secure functionality is acceptable. If no satisfactory state exists, or if no response is received, then a signal is transmitted. The signal may be auditory (a buzzer) or visual (a flashing light) in order to signal to any user that the secure functionality has been compromised. Optionally, human input devices may be disabled, or a monitoring service notified, in conjunction with or in lieu of the signal. If the secure functionality includes a secret shared between the secure functionality and the user, then the security device may signal the secret. For example, where the secret is visual, the security device may display the secret. Where there is more than one element of secure functionality in the computer system, the security device may separately watch and report on more than one element of secure functionality. The security device may also display status information regarding the computer system. Some or all of the security device may be distributed via a trusted distribution infrastructure.