Protecting software environment in isolated execution
    6.
    发明申请
    Protecting software environment in isolated execution 有权
    在孤立执行中保护软件环境

    公开(公告)号:US20060206943A1

    公开(公告)日:2006-09-14

    申请号:US11386269

    申请日:2006-03-21

    IPC分类号: H04N7/16

    摘要: A processing system has a processor that can operate in a normal ring 0 operating mode and one or more higher ring operating modes above the normal ring 0 operating mode. In addition, the processor can operate in an isolated execution mode. A memory in the processing system may include an ordinary memory area that can be accessed from the normal ring 0 operating mode, as well as an isolated memory area that can be accessed from the isolated execution mode but not from the normal ring 0 operating mode. The processing system may also include an operating system (OS) nub, as well as a key generator. The key generator may generate an OS nub key (OSNK) based at least in part on an identification of the OS nub and a master binding key (BK0) of the platform. Other embodiments are described and claimed.

    摘要翻译: 处理系统具有处理器,该处理器可以在正常环0操作模式和高于正常环0操作模式的一个或多个较高环操作模式下操作。 此外,处理器可以在隔离的执行模式下操作。 处理系统中的存储器可以包括可以从正常环0操作模式访问的普通存储器区域以及可以从隔离执行模式而不是从正常环0操作模式访问的隔离存储器区域。 处理系统还可以包括操作系统(OS)nub以及密钥生成器。 密钥生成器可以至少部分地基于OS nub的标识和平台的主绑定密钥(BK 0)来生成OS nub密钥(OSNK)。 描述和要求保护其他实施例。

    Method and apparatus to retain system control when a buffer overflow attack occurs
    7.
    发明申请
    Method and apparatus to retain system control when a buffer overflow attack occurs 审中-公开
    发生缓冲区溢出攻击时保留系统控制的方法和装置

    公开(公告)号:US20050044292A1

    公开(公告)日:2005-02-24

    申请号:US10644399

    申请日:2003-08-19

    申请人: Francis McKeen

    发明人: Francis McKeen

    IPC分类号: G06F21/00 G06F3/00

    CPC分类号: G06F21/52

    摘要: In one embodiment, a method is provided. The method comprises encountering a function call instruction that calls a called function during program execution; saving a return address in a first stack and in a second stack, the return address containing an instruction to be executed after execution of the called function; executing the called function; and determining if the return address stored in the first stack matches the return address stored in the second stack.

    摘要翻译: 在一个实施例中,提供了一种方法。 该方法包括在程序执行期间遇到调用被调用函数的函数调用指令; 在第一堆栈和第二堆栈中保存返回地址,返回地址包含执行被调用函数之后要执行的指令; 执行被叫函数; 以及确定存储在第一堆栈中的返回地址是否与存储在第二堆栈中的返回地址匹配。

    Providing extended memory protection
    8.
    发明申请
    Providing extended memory protection 有权
    提供扩展的内存保护

    公开(公告)号:US20060225135A1

    公开(公告)日:2006-10-05

    申请号:US11095719

    申请日:2005-03-31

    IPC分类号: H04N7/16

    CPC分类号: G06F12/145 G06F12/1063

    摘要: In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a protection indicator of a protection record maintained outside of an application's data space with a memory location, and preventing access to the memory location based on the status of the protection indicator. In such manner, more secure operation is provided, as malicious code or other malware is prevented from accessing protected memory locations. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,本发明提供用于系统的存储器的扩展存储器保护。 该实施例包括一种用于将维护在应用程序的数据空间外部的保护记录的保护指示符与存储器位置相关联的方法,以及基于保护指示符的状态来阻止对存储器位置的访问。 以这种方式,提供更安全的操作,因为防止恶意代码或其他恶意软件访问受保护的存储器位置。 描述和要求保护其他实施例。

    Method and apparatus for detecting and protecting a credential card
    9.
    发明申请
    Method and apparatus for detecting and protecting a credential card 审中-公开
    用于检测和保护凭证卡的方法和装置

    公开(公告)号:US20060099991A1

    公开(公告)日:2006-05-11

    申请号:US10986482

    申请日:2004-11-10

    IPC分类号: H04M1/66 H04M1/68 H04B1/38

    摘要: An approach for determining a type of credential card in a reader and, for some aspects, implementing a protection approach based on the determined type of credential card. For one aspect, an indication that a credential card has been received at a credential reader is received. In response, an instruction to be received by the credential card is provided, the instruction being recognizable by a first type of credential card, but not by a second type of credential card. The card is determined to be the first type of credential card if the response indicates that the instruction was recognized by the credential card. A protection policy may then be implemented for some aspects depending on the type of card detected.

    摘要翻译: 一种用于在阅读器中确定凭证卡的类型的方法,并且在某些方面,基于所确定的凭证卡类型实施保护方法。 一方面,接收到在证书读取器处已经接收到证书卡的指示。 作为响应,提供由凭证卡接收的指令,该指令可由第一类型的凭证卡识别,但不由第二类型的凭证卡识别。 该卡被确定为第一种类型的凭证卡,如果响应表明该指令被凭证卡识别。 然后可以根据检测到的卡的类型在一些方面实现保护策略。

    User authentication using a wireless device
    10.
    发明申请
    User authentication using a wireless device 审中-公开
    使用无线设备的用户认证

    公开(公告)号:US20050250472A1

    公开(公告)日:2005-11-10

    申请号:US10839271

    申请日:2004-05-04

    摘要: A method for providing security to a computer system is described. Specifically, the computer periodically polls for a Bluetooth electronic device or other similar wireless electronic device. If the computer locates such a Bluetooth electronic device, the computer requests authentication from the Bluetooth electronic device. The user of the electronic device is given access to the computer system only if the computer recognizes the identification of the Bluetooth electronic device and is able to validate the authentication information provided by the Bluetooth electronic device through an encrypted channel.

    摘要翻译: 描述了一种向计算机系统提供安全性的方法。 具体地,计算机周期性地轮询蓝牙电子设备或其他类似的无线电子设备。 如果计算机定位这样的蓝牙电子设备,则计算机从蓝牙电子设备请求认证。 仅当计算机识别蓝牙电子设备的标识并且能够通过加密的信道验证由蓝牙电子设备提供的认证信息时,才允许电子设备的用户访问计算机系统。