Extensible pre-boot authentication
    1.
    发明授权
    Extensible pre-boot authentication 有权
    可扩展的预引导认证

    公开(公告)号:US08201239B2

    公开(公告)日:2012-06-12

    申请号:US12214830

    申请日:2008-06-23

    IPC分类号: G06F21/00

    CPC分类号: G06F21/575

    摘要: In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a full disk encryption disk in a pre-boot environment, executing the PBA using a chipset to obtain user credential information, authorizing the user based on the user credential information and stored credential information, and storing the user credential information in a PBA metadata region of the disk. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,本发明包括一种用于在预引导环境中从全盘加密盘获得预引导认证(PBA)图像的方法,使用芯片组执行PBA以获得用户凭证信息,授权用户 关于用户凭证信息和存储的凭证信息,以及将用户凭证信息存储在盘的PBA元数据区域中。 描述和要求保护其他实施例。

    Extensible pre-boot authentication
    2.
    发明申请
    Extensible pre-boot authentication 有权
    可扩展的预引导认证

    公开(公告)号:US20090319806A1

    公开(公告)日:2009-12-24

    申请号:US12214830

    申请日:2008-06-23

    IPC分类号: H04L9/32 G06F12/14

    CPC分类号: G06F21/575

    摘要: In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a full disk encryption disk in a pre-boot environment, executing the PBA using a chipset to obtain user credential information, authorizing the user based on the user credential information and stored credential information, and storing the user credential information in a PBA metadata region of the disk. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,本发明包括一种用于在预引导环境中从全盘加密盘获得预引导认证(PBA)图像的方法,使用芯片组执行PBA以获得用户凭证信息,授权用户 关于用户凭证信息和存储的凭证信息,以及将用户凭证信息存储在盘的PBA元数据区域中。 描述和要求保护其他实施例。

    Trusted application migration across computer nodes
    7.
    发明授权
    Trusted application migration across computer nodes 有权
    跨计算机节点的可信应用程序迁移

    公开(公告)号:US09210148B2

    公开(公告)日:2015-12-08

    申请号:US13995511

    申请日:2011-12-30

    IPC分类号: H04L29/06 G06F21/00

    摘要: An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.

    摘要翻译: 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能凭证。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。

    Data security
    9.
    发明授权
    Data security 有权
    数据安全

    公开(公告)号:US09135470B2

    公开(公告)日:2015-09-15

    申请号:US12772365

    申请日:2010-05-03

    摘要: In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage, encrypting, based least in part upon one or more keys, the input data to generate output data to store in the storage. The one or more keys may be authorized by a remote authority. Alternatively or additionally, another of these operations may include, in response, at least in part, to a request to retrieve the input data from the storage, decrypting, based at least in part upon the at least one key, the output data. Many modifications, variations, and alternatives are possible without departing from this embodiment.

    摘要翻译: 在一个实施例中,提供了可以包括一个或多个操作的方法。 这些操作中的一个可以至少部分地包括存储输入数据的请求,至少部分地基于一个或多个密钥加密输入数据,以生成输出数据以存储在存储器中。 一个或多个键可以由远程机构授权。 或者或另外,这些操作中的另一个可以至少部分地包括从存储器检索输入数据的请求,至少部分地基于至少一个密钥来解密输出数据。 在不脱离本实施例的情况下,可以进行许多修改,变型和替换。

    Methods and apparatus to protect segments of memory
    10.
    发明授权
    Methods and apparatus to protect segments of memory 有权
    保护记忆段的方法和装置

    公开(公告)号:US09063836B2

    公开(公告)日:2015-06-23

    申请号:US12843617

    申请日:2010-07-26

    IPC分类号: G06F11/00 G06F11/10

    CPC分类号: G06F11/004 G06F11/1008

    摘要: Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.

    摘要翻译: 本文公开了保护存储器段的方法和装置。 示例性方法包括拦截指示错误的中断请求; 确定存储器的第一段是否损坏,所述第一存储器段被指定为存储器的保护区域; 当存储器的保护区域损坏时,使用奇偶校验块修复存储器的损坏区域; 并且响应于验证存储器的受保护区域,产生能够使用存储在存储器的保护区域中的代码来处理与中断请求相关联的错误的中断。