摘要:
Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.
摘要:
Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.
摘要:
An example method is provided and includes providing an encrypted image to a central processing unit of an integrated circuit and decrypting the encrypted image using a cryptographic key element. The cryptographic key element is embedded within the integrated circuit. The method also includes evaluating the decrypted image in order to verify its authenticity, and executing the decrypted image if the decrypted image is successfully verified. In more particular embodiments, the verification includes utilizing an executable and linkable format (ELF) to signify that encryption has been enabled for at least a portion of the encrypted image. A processor within the integrated circuit can be provided with the cryptographic key element that corresponds to a product family of devices. The method can also include providing a corresponding image of the decrypted image to an external memory of the integrated circuit.
摘要:
An example method is provided and includes providing an encrypted image to a central processing unit of an integrated circuit and decrypting the encrypted image using a cryptographic key element. The cryptographic key element is embedded within the integrated circuit. The method also includes evaluating the decrypted image in order to verify its authenticity, and executing the decrypted image if the decrypted image is successfully verified. In more particular embodiments, the verification includes utilizing an executable and linkable format (ELF) to signify that encryption has been enabled for at least a portion of the encrypted image. A processor within the integrated circuit can be provided with the cryptographic key element that corresponds to a product family of devices. The method can also include providing a corresponding image of the decrypted image to an external memory of the integrated circuit.
摘要:
In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.
摘要:
A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device.
摘要:
An apparatus is provided that includes a dedicated appliance operable to interface with a computing platform. A provisioning process may be initiated such that the dedicated appliance responds by monitoring a port for a connection request from the computing platform. Upon receiving the connection request the dedicated appliance completing a connection and generates a random numeric or an alphanumeric string, the dedicated appliance calculating a key derived from the random numeric string or the alphanumeric string using a key derivation process. The dedicated appliance waits for the credential packet from the computing platform before establishing a secure connection between the dedicated appliance and the computing platform.
摘要:
A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.
摘要:
According to one embodiment, an end station is provided for coupling to a communications network and participation in a communications session with another end station using the network. The end station includes encryption circuitry including a first linear feedback shift register (LFSR) and an associated first interconnect mask. The encryption circuitry is operable to generate an output sequence using the first LFSR and the first interconnect mask. A first table contains a plurality of polynomials each corresponding to an available interconnect mask. The end station is operable to receive a key specifying the first interconnect mask and to use the output sequence of the encryption circuitry to encrypt an information stream.
摘要:
A subsystem for communicating a private network signalling message over a packet network and bridges for communicating a Media Access Control (MAC) layer frame over an isochronous channel and for communicating an isochronous signalling frame over a nonisochronous network. The subsystem comprises: (1) an encapsulation circuit, coupled to a transmitting user station, capable of receiving the private network signalling message from the transmitting user station, the encapsulating circuit encapsulating the signalling message within, and adding source and destination addresses to, a routable protocol frame, the source and destination addresses corresponding to addresses of the transmitting user station and a particular receiving user station, the encapsulation circuit queuing the routable protocol frame for transmission over the packet network and (2) a de-encapsulation circuit, coupled to the particular receiving user station, capable of receiving the routable protocol frame, the de-encapsulation circuit extracting the signalling message from the routable protocol frame, the packet network thereby simulating a point-to-point connection between the transmitting and particular receiving user stations to effect node-to-node private network signalling therebetween.