-
公开(公告)号:US10397112B2
公开(公告)日:2019-08-27
申请号:US15383848
申请日:2016-12-19
Applicant: Intel Corporation
Inventor: Shlomo Avital , Avishay Sharaga
IPC: G06F15/16 , H04L12/741 , H04L29/12 , H04L29/08 , H04L12/707 , H04L12/743
Abstract: Technologies for communicating with local components of a computing device include intercepting a name resolution request from a host application, resolving a hostname included in the name resolution request to obtain a network address assigned to a target destination of the network packet, and transmitting the network address to the host application in response to the name resolution request. Such technologies may also include receiving the network packet from the host application destined for the network address, determining whether the target destination of the network packet includes a local component of the computing device based on the network address, and transmitting the network packet to the local component of the computing device via a platform network in response to the network packet being destined for the local component of the computing device.
-
公开(公告)号:US20230216878A1
公开(公告)日:2023-07-06
申请号:US18068672
申请日:2022-12-20
Applicant: Intel Corporation
Inventor: Shay Pluderman , Omer Ben-Shalom , Shlomo Avital , Tzipi Wales , Elisheva Zobin
IPC: H04L9/40
CPC classification number: H04L63/1433 , H04L63/102 , H04L63/105 , H04L63/108
Abstract: A method of preventing exploitation of a vulnerability of a computing system includes generating a deprivation token to cause disabling of a selected one or more features of a component of the computing system to prevent an exploit of a vulnerability affecting the selected one or more features; and publishing the derivation token to at least one of a computing system manufacturer computing system and an enterprise information technology (IT) computing system for distribution to affected computing systems.
-
公开(公告)号:US11570199B2
公开(公告)日:2023-01-31
申请号:US17132531
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Shay Pluderman , Omer Ben-Shalom , Shlomo Avital , Tzipi Wales , Elisheva Zobin
Abstract: A method of preventing exploitation of a vulnerability of a computing system includes generating a deprivation token to cause disabling of a selected one or more features of a component of the computing system to prevent an exploit of a vulnerability affecting the selected one or more features; and publishing the derivation token to at least one of a computing system manufacturer computing system and an enterprise information technology (IT) computing system for distribution to affected computing systems.
-
公开(公告)号:US20170331738A1
公开(公告)日:2017-11-16
申请号:US15383848
申请日:2016-12-19
Applicant: Intel Corporation
Inventor: Shlomo Avital , Avishay Sharaga
IPC: H04L12/741 , H04L29/12 , H04L29/08 , H04L12/707 , H04L12/743
CPC classification number: H04L45/745 , H04L45/24 , H04L45/7453 , H04L61/1511 , H04L61/2015 , H04L61/2023 , H04L61/2514 , H04L67/1002
Abstract: Technologies for communicating with local components of a computing device include intercepting a name resolution request from a host application, resolving a hostname included in the name resolution request to obtain a network address assigned to a target destination of the network packet, and transmitting the network address to the host application in response to the name resolution request. Such technologies may also include receiving the network packet from the host application destined for the network address, determining whether the target destination of the network packet includes a local component of the computing device based on the network address, and transmitting the network packet to the local component of the computing device via a platform network in response to the network packet being destined for the local component of the computing device.
-
公开(公告)号:US20210120028A1
公开(公告)日:2021-04-22
申请号:US17132531
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Shay Pluderman , Omer Ben-Shalom , Shlomo Avital , Tzipi Wales , Elisheva Zobin
IPC: H04L29/06
Abstract: A method of preventing exploitation of a vulnerability of a computing system includes generating a deprivation token to cause disabling of a selected one or more features of a component of the computing system to prevent an exploit of a vulnerability affecting the selected one or more features; and publishing the derivation token to at least one of a computing system manufacturer computing system and an enterprise information technology (IT) computing system for distribution to affected computing systems.
-
-
-
-