MEMORY INTEGRITY MONITORING
    2.
    发明申请

    公开(公告)号:US20180211064A1

    公开(公告)日:2018-07-26

    申请号:US15415450

    申请日:2017-01-25

    CPC classification number: G06F21/64 G06F21/602 H04L9/0643 H04L9/3236

    Abstract: In one example in accordance with the present disclosure, a system comprises a first memory module and a first memory integrity monitoring processor, embedded to the first memory module, to receive a second hash corresponding to a second memory module. The second hash includes a second sequence number for reconstruction of a final hash value and the second hash is not sequentially a first number in a sequence for reconstruction of the final hash value. The first processor may receive a third hash corresponding to a third memory module. The third hash includes a third sequence number for reconstruction of the final hash value and the third hash is received after the second hash. The first processor may determine if the second hash can be combined with the third hash, combine the second hash and third hash into a partial hash reconstruct the final hash value using the partial hash.

    Verifying a network configuration

    公开(公告)号:US10425282B2

    公开(公告)日:2019-09-24

    申请号:US15500919

    申请日:2014-11-28

    Abstract: A computing device having instructions that when executed by a processor may: receive, from a verifier, a request for attestation of a current network configuration of the computing device; identify network configuration rules, each network configuration rule specifying an action to be taken by the computing device in response to receiving a particular type of network traffic; generate, for each network configuration rule, a rule abstraction that represents the network configuration rule; provide data representing each rule abstraction to a trusted component; receive, from the trusted component, response data comprising i) data representing each rule abstraction, and ii) a digital signature; and provide the response data to the verifier as attestation proof of the current network configuration of the computing device.

    Integrity values for beginning booting instructions

    公开(公告)号:US10242195B2

    公开(公告)日:2019-03-26

    申请号:US15217583

    申请日:2016-07-22

    Abstract: Examples described herein include a computing device with a processing resource to execute beginning booting instructions of the computing device. The beginning booting instructions may include a first booting instruction. The computing device also includes an access line to access the first booting instruction, a measuring engine to duplicate the first booting instruction and to generate a first integrity value associated with the first booting instruction, and a measurement register to store the first integrity value. The measuring engine may be operationally screened from the processing resource and the measurement register may be inaccessible to the processing resource.

    Verifying network elements
    8.
    发明授权

    公开(公告)号:US11757717B2

    公开(公告)日:2023-09-12

    申请号:US15500918

    申请日:2014-11-28

    CPC classification number: H04L41/0866 H04L41/0893 H04L41/12 H04L41/28

    Abstract: Examples relate to verifying network elements. In one example, a computing device may: receive, from a client device, a request for attestation of a back-end network, the request including back-end configuration requirements; obtain, from a network controller that controls the back-end network, a controller configuration that specifies each network element included in the back-end network; provide each network element included in the back-end network with a request for attestation of a network element configuration of the network element; receive, from each network element, response data that specifies the network element configuration of the network element; verify that the response data received from each network element meets the back-end configuration requirements included in the request for attestation of the back-end network; and provide the client device with data verifying that the back-end network meets the back-end configuration requirements.

    Direct memory access encryption with application provided keys

    公开(公告)号:US10310990B2

    公开(公告)日:2019-06-04

    申请号:US15192493

    申请日:2016-06-24

    Abstract: In one example in accordance with the present disclosure, a method may include retrieving, at a memory management unit (MMU), encrypted data from a memory via direct memory access and determining, at the MMU, a peripheral that is the intended recipient of the encrypted data. The method may also include accessing an application key used for transmission between an application and the peripheral, wherein the application key originates from the application and decrypting, at the MMU, the encrypted data using the application key and transmitting the decrypted data to the peripheral.

Patent Agency Ranking