DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAM
    2.
    发明申请
    DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAM 有权
    软件程序运行验证的完整性更新动态生成

    公开(公告)号:US20090172814A1

    公开(公告)日:2009-07-02

    申请号:US11967928

    申请日:2007-12-31

    IPC分类号: G06F21/22

    CPC分类号: G06F21/64 G06F21/51

    摘要: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.

    摘要翻译: 测量引擎为软件程序生成完整性清单,并使用它来执行主动平台观察。 完整性清单表示程序代码的一部分的完整性检查值。 测量引擎计算内存中程序映像的比较值,并确定比较值是否与预期的完整性校验值相匹配。 如果值不匹配,则确定程序的图像被修改,并且可能触发适当的补救动作。

    Dynamic generation of integrity manifest for run-time verification of software program
    5.
    发明授权
    Dynamic generation of integrity manifest for run-time verification of software program 有权
    动态生成软件程序的运行时验证的完整性清单

    公开(公告)号:US08364973B2

    公开(公告)日:2013-01-29

    申请号:US11967928

    申请日:2007-12-31

    IPC分类号: G06F21/00

    CPC分类号: G06F21/64 G06F21/51

    摘要: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.

    摘要翻译: 测量引擎为软件程序生成完整性清单,并使用它来执行主动平台观察。 完整性清单表示程序代码的一部分的完整性检查值。 测量引擎计算内存中程序映像的比较值,并确定比较值是否与预期的完整性校验值相匹配。 如果值不匹配,则确定程序的图像被修改,并且可能触发适当的补救动作。

    Methods and systems for cryptographic access control of video
    7.
    发明授权
    Methods and systems for cryptographic access control of video 有权
    视频加密访问控制的方法和系统

    公开(公告)号:US09094733B2

    公开(公告)日:2015-07-28

    申请号:US13977529

    申请日:2012-03-31

    摘要: Cryptographic access control of multimedia video is presented. A method includes generating as metadata an access control policy (ACP) associated with video, the ACP including authorization rules and cryptographic information associated with an encryption policy; encrypting the video according to the encryption policy; and encoding the encrypted video with the authorization rules and the cryptographic information, which may be used to decrypt and render the encoded video. As an example, an authorized receiver device having credentials and/or capabilities matched to the authorization rules may extract the ACP information from the encrypted video and use it to decrypt and properly render the video. The method may further include visually encoding the encrypted video with at least portions of the authorization rules and the cryptographic information, such that the visually encoded video is renderable as the video by an authorized device, but is renderable as visually unintelligible video by an unauthorized device.

    摘要翻译: 介绍了多媒体视频的密码访问控制。 一种方法包括:生成与视频相关联的访问控制策略(ACP)作为元数据,所述ACP包括与加密策略相关联的授权规则和加密信息; 根据加密策略加密视频; 并使用可用于解密和呈现编码视频的授权规则和密码信息对加密的视频进行编码。 作为示例,具有与授权规则匹配的凭证和/或能力的授权接收机设备可以从加密的视频中提取ACP信息,并使用它来解密并适当地呈现视频。 该方法还可以包括使用授权规则和密码信息的至少一部分来视觉地编码加密的视频,使得视觉编码的视频可以由授权设备呈现为视频,但是可被未经授权的设备呈现为视觉上难以理解的视频 。

    Seamlessly encrypting memory regions to protect against hardware-based attacks
    8.
    发明授权
    Seamlessly encrypting memory regions to protect against hardware-based attacks 有权
    无缝加密内存区域以防止基于硬件的攻击

    公开(公告)号:US08799673B2

    公开(公告)日:2014-08-05

    申请号:US12651432

    申请日:2009-12-31

    IPC分类号: H04L29/06

    摘要: Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction.

    摘要翻译: 公开了系统,装置和方法,并且用于无缝地保护存储器区域以防止基于硬件的攻击。 在一个实施例中,一种装置包括解码器,控制逻辑和加密逻辑。 解码器是对处理器和存储器映射的输入/输出空间之间的事务进行解码。 控制逻辑是将事务从内存映射的输入/输出空间重定向到系统内存。 密码逻辑是对数据进行交易操作。