摘要:
Apparatus and systems, as well as methods and articles, may operate to handshake with an operating system to indicate a network connection state at about the time a driver is initialized, or when a state of network disconnection is sensed. A wireless network connection may be opened at about the time a request from the operating system to utilize the network is received.
摘要:
Apparatus, systems, methods, and articles herein interact with an operating system in a network client to simulate an “always connected” network connection model. Upon activation, a network driver implementing embodiments herein indicates to the operating system that a network connection has been established, whether or not an actual connection is established. Some embodiments may also present a pseudo network address (e.g., an IP address) to the operating system in the case of a virtual network connection. Upon sensing an actual physical network connection, embodiments herein may handshake with the operating system to establish a real network connection, including communicating a network-assigned network address to the operating system. The operating system may in turn report (or continue to report) an active connection to application programs so that a user need not repeatedly re-activate the network connection manually. Other embodiments are described and claimed.
摘要:
A system may include a memory having a unique identifier that uniquely identifies the memory. A package may be communicatively coupled to the memory. The package may include a processor, an identifier storage, and a boot storage. The identifier storage may store the unique identifier from the memory. The boot storage may include instructions to control booting of the processor based on the unique identifier in the identifier storage.
摘要:
A system may include a memory having a unique identifier that uniquely identifies the memory. A package may be communicatively coupled to the memory. The package may include a processor, an identifier storage, and a boot storage. The identifier storage may store the unique identifier from the memory. The boot storage may include instructions to control booting of the processor based on the unique identifier in the identifier storage.
摘要:
An apparatus may include circuitry to permanently and inaccessibly store a first private key that is a shared secret between a manufacturer of the circuitry and a first vendor of first encrypted media information. It may also include a key ladder to provide plural layers of encryption to the first private key to generate a first result for decrypting the first encrypted media information. A cryptographic module may encrypt the first private key to generate a second result for a security purpose other than decrypting media information. The module also may include a key ladder, and the apparatus may include other key ladders using the private key.
摘要:
In one embodiment, an operating system may assign a product ID to the game controller that matches the product ID provided with or for the game controller.
摘要:
Apparatus, systems and methods for enhancing cryptographic engines against attack are disclosed. In one implementation, a method is disclosed including limiting a cryptographic device to a first number of cryptographic operations, and reconfiguring the cryptographic device to limit the cryptographic device to a second number of cryptographic operations. Additional implementations are disclosed.
摘要:
An apparatus may include circuitry, a cryptographic module, and a key store. The circuitry may hold a private key associated with first media information. The cryptographic module may operate on the private key to generate a number of first control keys for decrypting the first media information. The key store may hold the number of first control keys from the cryptographic module. In some implementations, the key store may include sufficient storage to store more than one control key from each of a number of different crypto modules. In some implementations, the key store may receive multiple control keys simultaneously or nearly so. In some implementations, the key store may output multiple control keys simultaneously, or nearly so, for decrypting multiple streams of media information at the same time.
摘要:
In one embodiment, the present invention includes a method of validating secure code using a first processor, loading configuration data into at least one configuration register of a conditional access unit if the secure code is validated, and preventing access to the configuration register(s) during normal operation. In such manner, encrypted content to be processed by the conditional access unit may be protected from unauthorized access. Other embodiments are described and claimed.