Data protection keys
    1.
    发明授权

    公开(公告)号:US10057223B2

    公开(公告)日:2018-08-21

    申请号:US14866901

    申请日:2015-09-26

    Abstract: One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure hash digest with at least a portion of a data stream or a hash of the at least a portion of the data stream.Another embodiment provides a server system. The server system includes verifier logic. The verifier logic is to verify that an attestation identity key (AIK) public key associated with a received Trusted Platform Module (TPM) quote corresponds to an authenticated client device.

    Providing A Multi-Phase Lockstep Integrity Reporting Mechanism
    2.
    发明申请
    Providing A Multi-Phase Lockstep Integrity Reporting Mechanism 审中-公开
    提供多阶段锁步完整性报告机制

    公开(公告)号:US20140359754A1

    公开(公告)日:2014-12-04

    申请号:US14464874

    申请日:2014-08-21

    Abstract: In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,处理器可以强制黑名单并且根据多阶段锁步完整性协议验证耦合到处理器的设备。 这种执行可以防止设备在验证之前访问系统的一个或多个资源。 黑名单可以包括根据多阶段锁定完整性协议未被验证的设备的列表。 描述和要求保护其他实施例。

    Continuation of trust for platform boot firmware
    5.
    发明授权
    Continuation of trust for platform boot firmware 有权
    继续信任平台启动固件

    公开(公告)号:US09223982B2

    公开(公告)日:2015-12-29

    申请号:US13782512

    申请日:2013-03-01

    CPC classification number: G06F21/575 G06F21/57

    Abstract: This disclosure is directed to continuation of trust for platform boot firmware. A device may comprise a processing module and a memory module including read-only memory (ROM) on which is stored platform boot firmware. On activation, the processing module may load the platform boot firmware. The platform boot firmware may cause the processing module to first load a trusted pre-verifier file to load and verify the signature of a hash table loaded from the platform boot firmware. The processing module may then load firmware program files from the platform boot firmware, calculate a hash for each file, and verify whether each program hash is in the hash table. Firmware program files with hashes in the hash table may be allowed to execute. If any firmware program file hash is not in the hash table, the processing module may perform platform specific security actions to prevent the device from being compromised.

    Abstract translation: 本公开旨在延续平台引导固件的信任。 设备可以包括处理模块和包括只读存储器(ROM)的存储器模块,在其上存储有平台引导固件。 激活时,处理模块可以加载平台引导固件。 平台启动固件可能导致处理模块首先加载可信任的验证者文件以加载并验证从平台引导固件加载的散列表的签名。 然后,处理模块可以从平台引导固件加载固件程序文件,计算每个文件的散列,并验证每个程序散列是否在散列表中。 可以允许在哈希表中使用散列的固件程序文件执行。 如果任何固件程序文件散列不在哈希表中,则处理模块可以执行平台特定的安全动作以防止设备被破坏。

    SYSTEM AND METHOD FOR IMPLEMENTING A TRUSTED DYNAMIC LAUNCH AND TRUSTED PLATFORM MODULE (TPM) USING SECURE ENCLAVES
    6.
    发明申请
    SYSTEM AND METHOD FOR IMPLEMENTING A TRUSTED DYNAMIC LAUNCH AND TRUSTED PLATFORM MODULE (TPM) USING SECURE ENCLAVES 审中-公开
    使用安全包装来实施受阻动态发射和信号平台模块(TPM)的系统和方法

    公开(公告)号:US20150186680A1

    公开(公告)日:2015-07-02

    申请号:US14633701

    申请日:2015-02-27

    Abstract: An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.

    Abstract translation: 描述了使用安全飞地实现可信的动态发射和可信平台模块(TPM)的装置和方法。 例如,根据本发明的一个实施例的计算机实现的方法包括:响应于第一命令初始化安全飞地,所述安全飞地包括可信软件执行环境,其防止在飞地之外执行的软件访问软件,以及 飞地内的数据; 以及从所述安全飞地内执行可信平台模块(TPM),所述可信平台模块将处理器或芯片组组件中的一组平台控制寄存器(PCR)中的数据安全地读取到分配给所述安全飞地的存储器区域中。

    Trusted Computing Base Evidence Binding for a Migratable Virtual Machine
    7.
    发明申请
    Trusted Computing Base Evidence Binding for a Migratable Virtual Machine 有权
    可迁移虚拟机的可信计算基础证据绑定

    公开(公告)号:US20160149912A1

    公开(公告)日:2016-05-26

    申请号:US14554467

    申请日:2014-11-26

    CPC classification number: H04L63/0876 G06F21/57 H04L63/0457 H04L63/0853

    Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,至少一个计算机可读介质具有存储在其上的指令,用于使系统在计算系统的安全平台服务飞地(PSE)处进行密码地签名,并使用安全认证密钥(SGX AK),公共部分 与物理平台的可信计算基础相关联的可信平台模块认证密钥(TPM AK),以形成认证的TPM AK公共部分。 还包括用于将经认证的TPM AK公共部分存储在PSE中的指令,以及响应于从虚拟机(VM)相关联的虚拟可信平台模块(vTPM)处从请求者接收到的认证请求的指令,所述虚拟可信平台模块(vTPM)已迁移到 物理平台,向请求者提供存储在PSE中的认证TPM AK公共部分。 描述和要求保护其他实施例。

Patent Agency Ranking