Providing Integrity Verification And Attestation In A Hidden Execution Environment
    3.
    发明申请
    Providing Integrity Verification And Attestation In A Hidden Execution Environment 有权
    在隐藏的执行环境中提供完整性验证和证明

    公开(公告)号:US20110145598A1

    公开(公告)日:2011-06-16

    申请号:US12639616

    申请日:2009-12-16

    摘要: In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,处理器包括微代码存储器,其包括处理器指令,用于创建和执行在系统软件不可见的隐藏环境中执行的隐藏资源管理器(HRM)。 处理器还可以包括扩展寄存器,用于存储包括隐藏环境的至少一个内核代码模块的测量值和至少一个内核代码模块的验证状态的安全信息。 描述和要求保护其他实施例。

    Hardware-based device authentication
    4.
    发明授权
    Hardware-based device authentication 有权
    基于硬件的设备认证

    公开(公告)号:US08850543B2

    公开(公告)日:2014-09-30

    申请号:US13726140

    申请日:2012-12-23

    摘要: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain is received and a secured microcontroller of the computing device is used to identify a secured, persistent hardware identifier of the computing device stored in secured memory of the computing device. A secure identifier is derived for a pairing of the computing device and the particular domain based on the hardware identifier and domain identifier of the particular domain and the secure identifier is transmitted over a secured channel to the particular domain. The particular domain can verify identity of the computing device from the secure identifier and apply security policies to transactions involving the computing device and the particular domain based at least in part on the secure identifier.

    摘要翻译: 识别计算设备参与与特定域的安全会话的机会。 接收特定域的域标识符,并且使用计算设备的安全微控制器来识别存储在计算设备的安全存储器中的计算设备的安全的持久硬件标识符。 基于特定域的硬件标识符和域标识符,导出计算设备和特定域的配对的安全标识符,并且安全标识符通过安全信道发送到特定域。 特定域可以从安全标识符中验证计算设备的身份,并且至少部分地基于安全标识符将安全策略应用于涉及计算设备和特定域的事务。

    Out-of-band host OS boot sequence verification
    7.
    发明授权
    Out-of-band host OS boot sequence verification 有权
    带外主机操作系统启动顺序验证

    公开(公告)号:US09367328B2

    公开(公告)日:2016-06-14

    申请号:US13536859

    申请日:2012-06-28

    摘要: Embodiments of techniques and systems for out-of-band verification of host OS components are described. In embodiments, a out-of-band host OS boot sequence verification system (“BSVS”) may access system memory without detection by a host OS process, or “out of band.” The BSVS may access host OS components in the system memory and may generate signatures from memory footprints of the host OS components. These signatures may then be compared to trusted signatures to verify integrity of the host OS components. In embodiments, this verification may be performed during a boot of a host OS or on demand. In embodiments, the trusted signatures may be pre-stored by the BSVS before a boot; in some embodiments, the trusted signatures may be previously-computed and then stored by the BSVS. Other embodiments may be described and claimed.

    摘要翻译: 描述用于主机OS组件的带外验证的技术和系统的实施例。 在实施例中,带外主机OS引导序列验证系统(“BSVS”)可以在主机OS进程或“带外”检测的情况下访问系统存储器.BSVS可以访问系统存储器中的主机OS组件 并且可以从主机OS组件的内存覆盖区生成签名。 然后可以将这些签名与可信签名进行比较以验证主机OS组件的完整性。 在实施例中,可以在主机OS的引导期间或者根据需要执行该验证。 在实施例中,信任签名可以在引导之前被BSVS预先存储; 在一些实施例中,可信任签名可以被预先计算,然后由BSVS存储。 可以描述和要求保护其他实施例。

    HARDWARE-BASED DEVICE AUTHENTICATION
    8.
    发明申请
    HARDWARE-BASED DEVICE AUTHENTICATION 有权
    基于硬件的设备认证

    公开(公告)号:US20140181893A1

    公开(公告)日:2014-06-26

    申请号:US13726148

    申请日:2012-12-23

    IPC分类号: H04L29/06

    摘要: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing device. A secure identifier is derived based on the seed and sent for use by the particular domain in authenticating the computing device to the particular domain for the secure session. The particular domain can further apply security policies to transactions involving the computing device and particular domain based at least in part on the secure identifier.

    摘要翻译: 识别计算设备参与与特定域的安全会话的机会。 计算设备的安全微控制器用于识别对应于特定域并且存储在计算设备的安全存储器中的安全的持久种子。 基于种子导出安全标识符,并将其发送供特定域使用,以将计算设备认证到用于安全会话的特定域。 所述特定域可以至少部分地基于所述安全标识符来进一步对涉及所述计算设备和特定域的事务应用安全策略。

    SECURE ACCESS MANAGEMENT OF DEVICES
    9.
    发明申请
    SECURE ACCESS MANAGEMENT OF DEVICES 有权
    设备安全访问管理

    公开(公告)号:US20140096231A1

    公开(公告)日:2014-04-03

    申请号:US13629881

    申请日:2012-09-28

    IPC分类号: G06F21/00 G06F21/04

    摘要: Systems and methods may provide implementing one or more device locking procedures to block access to a device. In one example, the method may include receiving an indication that a user is no longer present, initiating a timing mechanism to set a period to issue a first device lock instruction to lock a peripheral device, relaying timing information from the timing mechanism to a controller module associated with the peripheral device; and locking the peripheral device upon expiration of the period.

    摘要翻译: 系统和方法可以提供实现一个或多个设备锁定过程以阻止对设备的访问。 在一个示例中,该方法可以包括接收用户不再存在的指示,启动定时机制以设置周期以发出第一设备锁定指令以锁定外围设备,将定时信息从定时机制中继到控制器 与外围设备相关的模块; 并且在所述周期期满时锁定所述外围设备。