Method, apparatus, and system of forward caching for a managed client
    1.
    发明授权
    Method, apparatus, and system of forward caching for a managed client 有权
    受管客户端的前向缓存的方法,设备和系统

    公开(公告)号:US08285821B2

    公开(公告)日:2012-10-09

    申请号:US12368882

    申请日:2009-02-10

    IPC分类号: G06F15/177

    摘要: A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.

    摘要翻译: 公开了一种用于被管理客户端的前向缓存的方法,装置和系统。 存储模块将软件映像存储在后端服务器的存储设备上。 后端服务器通过用于多个无盘数据处理设备的第一中间网络点在存储设备上提供虚拟磁盘存储。 每个无盘数据处理装置与第一中间网络点直接通信。 存储模块在第一中间网络点高速缓存软件映像的图像实例。 跟踪模块检测对存储设备上的软件映像的更新。 存储模块将更新的软件映像作为更新的图像实例复制到第一中间网络点。

    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT
    2.
    发明申请
    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT 有权
    用于管理客户端的方法,装置和前向缓存系统

    公开(公告)号:US20100205375A1

    公开(公告)日:2010-08-12

    申请号:US12368882

    申请日:2009-02-10

    IPC分类号: G06F12/08

    摘要: A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.

    摘要翻译: 公开了一种用于被管理客户端的前向缓存的方法,装置和系统。 存储模块将软件映像存储在后端服务器的存储设备上。 后端服务器通过用于多个无盘数据处理设备的第一中间网络点在存储设备上提供虚拟磁盘存储。 每个无盘数据处理装置与第一中间网络点直接通信。 存储模块在第一中间网络点高速缓存软件映像的图像实例。 跟踪模块检测对存储设备上的软件映像的更新。 存储模块将更新的软件映像作为更新的图像实例复制到第一中间网络点。

    Apparatus, system, and method for authentication of a core root of trust measurement chain
    3.
    发明授权
    Apparatus, system, and method for authentication of a core root of trust measurement chain 有权
    用于认证信任测度链核心根的装置,系统和方法

    公开(公告)号:US08433924B2

    公开(公告)日:2013-04-30

    申请号:US11612367

    申请日:2006-12-18

    IPC分类号: G06F21/00

    CPC分类号: G06F21/57 G06F2221/2153

    摘要: An apparatus, system, and method are disclosed for authentication of a core root of trust measurement chain. The apparatus for authentication of a CRTM chain is provided with a plurality of modules configured to carry out the steps of retrieving a decryption key from a predetermined location on the device selected for authentication, decrypting an authentication signal using the decryption key, and communicating the decrypted authentication signal to a user. In the described embodiments, these modules include a retrieval module, a decryption module, and a communication module. Beneficially, such an apparatus, system, and method would reliably verify that a link in the CRTM chain has not been corrupted, modified, or infected with a computer virus. Specifically, such an apparatus, system, and method would enable verification that the hypervisor has not been corrupted, modified, or infected with a computer virus.

    摘要翻译: 公开了用于认证信任度量链核心根的装置,系统和方法。 用于认证CRTM链的装置设置有多个模块,其被配置为执行从所选择的用于认证的设备上的预定位置检索解密密钥的步骤,使用解密密钥解密认证信号,以及传送解密密钥 认证信号给用户。 在所描述的实施例中,这些模块包括检索模块,解密模块和通信模块。 有利的是,这样的装置,系统和方法可以可靠地验证CRTM链中的链路没有被破坏,修改或感染计算机病毒。 具体来说,这样的装置,系统和方法将能够验证管理程序没有被计算机病毒破坏,修改或感染。

    APPARATUS, SYSTEM, AND METHOD FOR AUTHENTICATION OF A CORE ROOT OF TRUST MEASUREMENT CHAIN
    4.
    发明申请
    APPARATUS, SYSTEM, AND METHOD FOR AUTHENTICATION OF A CORE ROOT OF TRUST MEASUREMENT CHAIN 有权
    用于认证信任测量链的核心的装置,系统和方法

    公开(公告)号:US20080148064A1

    公开(公告)日:2008-06-19

    申请号:US11612367

    申请日:2006-12-18

    IPC分类号: G06F12/14

    CPC分类号: G06F21/57 G06F2221/2153

    摘要: An apparatus, system, and method are disclosed for authentication of a core root of trust measurement chain. The apparatus for authentication of a CRTM chain is provided with a plurality of modules configured to carry out the steps of retrieving a decryption key from a predetermined location on the device selected for authentication, decrypting an authentication signal using the decryption key, and communicating the decrypted authentication signal to a user. In the described embodiments, these modules include a retrieval module, a decryption module, and a communication module. Beneficially, such an apparatus, system, and method would reliably verify that a link in the CRTM chain has not been corrupted, modified, or infected with a computer virus. Specifically, such an apparatus, system, and method would enable verification that the hypervisor has not been corrupted, modified, or infected with a computer virus.

    摘要翻译: 公开了用于认证信任度量链核心根的装置,系统和方法。 用于认证CRTM链的装置设置有多个模块,其被配置为执行从所选择的用于认证的设备上的预定位置检索解密密钥的步骤,使用解密密钥解密认证信号,以及传送解密密钥 认证信号给用户。 在所描述的实施例中,这些模块包括检索模块,解密模块和通信模块。 有利的是,这样的装置,系统和方法可以可靠地验证CRTM链中的链路没有被破坏,修改或感染计算机病毒。 具体来说,这样的装置,系统和方法将能够验证管理程序没有被计算机病毒破坏,修改或感染。

    APPARATUS, SYSTEM, AND METHOD FOR REMOTELY ACCESSING A SHARED PASSWORD
    5.
    发明申请
    APPARATUS, SYSTEM, AND METHOD FOR REMOTELY ACCESSING A SHARED PASSWORD 审中-公开
    用于远程访问共享密码的设备,系统和方法

    公开(公告)号:US20080133905A1

    公开(公告)日:2008-06-05

    申请号:US11565452

    申请日:2006-11-30

    IPC分类号: H04L9/32

    CPC分类号: H04L9/0822 H04L9/3226

    摘要: An apparatus, system, and method are disclosed for remotely accessing a shared password. A storage module stores identifiers, passwords, and keys within a secure key structure of a client. The passwords and keys include a shared password encrypted with a shared password key that is encrypted with a service structure key. The storage module also stores the service structure key encrypted with a key derived from a service password on a trusted server. An input/output module accesses the trusted server from the client with a prospective service password and receives the encrypted service structure key from the trusted server if a hash of the prospective service password is equivalent to the service password. An encryption module may decrypt the service structure key with the prospective service password, the shared password key with the service structure key, and the shared password with the shared password key.

    摘要翻译: 公开了用于远程访问共享密码的装置,系统和方法。 存储模块在客户端的安全密钥结构内存储标识符,密码和密钥。 密码和密钥包括使用通过服务结构密钥加密的共享密码密钥加密的共享密码。 存储模块还将在服务密码上导出的密钥加密的服务结构密钥存储在可信服务器上。 输入/输出模块从客户端接收可信服务密码,如果预期服务密码的散列等于服务密码,则从可信服务器接收加密的服务结构密钥。 加密模块可以利用预期服务密码,具有服务结构密钥的共享密码密钥和具有共享密码密钥的共享密码对服务结构密钥进行解密。

    Authenticating suspect data using key tables
    6.
    发明授权
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US08024579B2

    公开(公告)日:2011-09-20

    申请号:US11647932

    申请日:2006-12-29

    IPC分类号: G06F11/30

    摘要: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    摘要翻译: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    Authenticating suspect data using key tables
    8.
    发明申请
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US20080162932A1

    公开(公告)日:2008-07-03

    申请号:US11647932

    申请日:2006-12-29

    IPC分类号: H04L9/14

    摘要: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    摘要翻译: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    System and method for secure O.S. boot from password-protected HDD
    9.
    发明授权
    System and method for secure O.S. boot from password-protected HDD 有权
    安全系统和方法 从受密码保护的硬盘启动

    公开(公告)号:US07624279B2

    公开(公告)日:2009-11-24

    申请号:US11173738

    申请日:2005-06-29

    IPC分类号: G06F21/00

    摘要: If a user forgets the power-on password of his computer, he can depress the “enter” key or “access” key once to cause the BIOS to locate the power-on password in memory and attempt to unlock the HDD using the power-on password to boot a secure O.S. The HDD password either can be the same as the power-on password or the HDD can recognize the power-on password for the limited purpose of allowing access to the secure O.S. In any case, the secure O.S. is booted for password reset.

    摘要翻译: 如果用户忘记了计算机的开机密码,他可以按下“输入”键或“访问”键一次,使BIOS将内存中的开机密码定位,并尝试使用电源开关解锁硬盘, 启动安全操作系统的密码 HDD密码可以与开机密码相同,或者HDD可以识别开机密码,以便允许访问安全O.S.的有限目的。 无论如何,安全的 启动密码重置。