Address verification for direct memory access requests

    公开(公告)号:US11768967B2

    公开(公告)日:2023-09-26

    申请号:US16966314

    申请日:2018-03-15

    CPC classification number: G06F21/79 G06F21/85

    Abstract: An example apparatus can receive a DMA request from a device, where the DMA request comprises an address and an ID of the device that uniquely identifies the device and wherein the device is a bus mastering device. The example apparatus can access a range of addresses using the ID of the device. An example apparatus can determine whether the address is in the range of addresses and can process the DMA request responsive to verifying that the address is in the range of addresses.

    PASSWORD UPDATES
    5.
    发明申请

    公开(公告)号:US20210365546A1

    公开(公告)日:2021-11-25

    申请号:US16982198

    申请日:2018-07-31

    Abstract: Examples associated with password updates are described. One example method includes receiving a request to modify an administrator password in a basic input/output system (BIOS). The administrator password may be updated. A first password tied to the administrator password may be identified. A first updated password is generated by concatenating a character string to the administrator password. The character string may be generated based on a password policy for the first password. The first password may then be updated to the first updated password.

    Protecting basic input/output (BIOS) code

    公开(公告)号:US10296353B2

    公开(公告)日:2019-05-21

    申请号:US15749468

    申请日:2016-01-25

    Abstract: A method of protecting basic input/output system (BIOS) code. The method includes, with a relocation information tool executed by a processor, refactoring a number of data sections within a number of handlers of the BIOS code to tag a number of variables within the handlers. The tags indicate which of the variables should be protected at runtime. The method further includes generating a relocation file comprising a number of relocation addresses identifying locations of a number of dynamic variables that change at runtime. The relocation addresses point to a location within the handlers different from an original location. The method further includes, with a loader, loading at runtime the relocation file as part of a BIOS firmware image and adjusting data access to the dynamic variables in handler code to identify the location of the dynamic variables based on the relocation file.

    DEVICE LOGIN AUTHENTICATIONS
    8.
    发明公开

    公开(公告)号:US20240104174A1

    公开(公告)日:2024-03-28

    申请号:US18264630

    申请日:2021-03-10

    CPC classification number: G06F21/31 G06F21/57

    Abstract: Examples include a CPU coupled to a controller, the CPU to receive a user credential usable by the login executable code to perform device login authentication, determine a first hash value based on the login executable code, determine a second hash value based on the user credential, obtain a third hash value and a fourth hash value from the controller, wherein the third hash value is a reference hash value for the login executable code, and wherein the fourth hash value is a reference hash value for the user credential, compare the first hash value to the third hash value, compare the second hash value to the fourth hash value, execute an OS login service using the login executable code responsive to the first hash value matching the third hash value and the second hash value matching the fourth hash value.

    Update signals
    9.
    发明授权

    公开(公告)号:US11755739B2

    公开(公告)日:2023-09-12

    申请号:US17288548

    申请日:2019-05-15

    CPC classification number: G06F21/572 G06F2221/033

    Abstract: An example of a first computing device may include firmware, a controller, and a processor. The processor may be to generate a trust state message, to be sent to the controller, indicating the firmware of the first computing device is operating a trusted environment and utilize the firmware to validate an update within the trusted environment. The controller may be to assert, responsive to receiving the trust state message, a trust state signal to a second computing device indicating the firmware of the first computing device is operating the trusted environment The assertion of the trust state signal may be to enable the second computing device to install the validated update.

    Recovery via backups of recovery information

    公开(公告)号:US11599426B2

    公开(公告)日:2023-03-07

    申请号:US17052411

    申请日:2019-02-11

    Abstract: An example computing device includes a controller to control operation of a firmware subsystem of the computing device. The controller is separate from a main processor of the computing device. A memory stores subsystem data that is useable by the controller. The subsystem data includes recovery information executable by the controller to initiate recovery of the subsystem. The computing device further includes recovery coordination instructions. The recovery coordination instructions determine integrity of the recovery information as stored on the memory and. In response to determining that the recovery information lacks integrity, the recovery coordination instructions initiate recovery of the firmware subsystem using a backup of the recovery information and perform recovery of the firmware subsystem using an update to the firmware subsystem.

Patent Agency Ranking