DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG
    1.
    发明申请
    DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG 有权
    使用信任记录监控和评估信任级别的设备,系统和方法

    公开(公告)号:US20140006789A1

    公开(公告)日:2014-01-02

    申请号:US13534321

    申请日:2012-06-27

    IPC分类号: H04L9/32 G06F12/14

    摘要: Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.

    摘要翻译: 公开了用于监视和断言计算设备的信任级别的设备,系统和方法。 在一个说明性实施例中,计算设备可以包括其中存储有持久信任日志的存储器,持久信任日志包括与影响计算设备的信任级别的历史事件相关的数据,以及安全控制器,其被配置为检测影响 计算设备的信任级别,并将与事件有关的数据写入持久信任日志。

    Devices, systems, and methods for monitoring and asserting trust level using persistent trust log
    2.
    发明授权
    Devices, systems, and methods for monitoring and asserting trust level using persistent trust log 有权
    使用持久信任日志监视和断言信任级别的设备,系统和方法

    公开(公告)号:US09177129B2

    公开(公告)日:2015-11-03

    申请号:US13534321

    申请日:2012-06-27

    IPC分类号: G06F21/31

    摘要: Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.

    摘要翻译: 公开了用于监视和断言计算设备的信任级别的设备,系统和方法。 在一个说明性实施例中,计算设备可以包括其中存储有持久信任日志的存储器,持久信任日志包括与影响计算设备的信任级别的历史事件相关的数据,以及安全控制器,其被配置为检测影响 计算设备的信任级别,并将与事件有关的数据写入持久信任日志。

    SYSTEM AND METHOD FOR OPPORTUNISTIC RE-IMAGING USING CANNIBALISTIC STORAGE TECHNIQUES ON SPARSE STORAGE DEVICES
    3.
    发明申请
    SYSTEM AND METHOD FOR OPPORTUNISTIC RE-IMAGING USING CANNIBALISTIC STORAGE TECHNIQUES ON SPARSE STORAGE DEVICES 审中-公开
    使用可扩展存储技术在微小存储设备上进行机会再成像的系统和方法

    公开(公告)号:US20110161298A1

    公开(公告)日:2011-06-30

    申请号:US12649273

    申请日:2009-12-29

    IPC分类号: G06F12/16 G06F17/30

    摘要: In some embodiments, the invention involves a system and method for instant re-imaging of a computing device using a sparse storage partition of dynamically variable size to hold re-imaging data. An embodiment uses a solid state storage device to hold the binary image, or re-imaging personality. An embodiment uses copy on write methodology to maintain the re-imaging personality. An embodiment allows the primary, or active, personality to cannibalize storage used for a re-imaging personality when additional storage is required. The state of a computing device may be switched to allow or prohibit re-imaging, or to prohibit cannibalization of storage. Other embodiments are described and claimed.

    摘要翻译: 在一些实施例中,本发明涉及一种使用动态可变大小的稀疏存储分区对计算设备进行即时重新成像以保持重新成像数据的系统和方法。 一个实施例使用固态存储设备来保存二进制图像或重新成像个性。 实施例使用复写方法来维持重新成像的个性。 当需要额外的存储时,一个实施例允许主要或主动的个性将存储用于再成像人格。 可以切换计算设备的状态以允许或禁止重新成像,或者禁止存储器的同类化。 描述和要求保护其他实施例。

    Systems and methods for protecting symmetric encryption keys
    6.
    发明授权
    Systems and methods for protecting symmetric encryption keys 有权
    用于保护对称加密密钥的系统和方法

    公开(公告)号:US09135450B2

    公开(公告)日:2015-09-15

    申请号:US13996453

    申请日:2011-12-21

    摘要: Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key.

    摘要翻译: 描述在执行加密时保护对称加密密钥的系统和方法。 在一个实施例中,计算机实现的方法包括从安全区域检索至少一个真实密钥,并且利用处理器执行密钥变换指令,以基于接收所述至少一个真实密钥来生成至少一个变换密钥。 至少一个变换密钥是由处理器使用至少一个真实密钥加密的至少一个循环密钥的加密版本。 处理器能够对至少一个变换的密钥进行解密并加密至少一个循环密钥。

    Securing inputs from malware
    7.
    发明授权
    Securing inputs from malware 有权
    保护恶意软件的输入

    公开(公告)号:US08996883B2

    公开(公告)日:2015-03-31

    申请号:US13994722

    申请日:2011-11-30

    IPC分类号: G06F21/60 G06F21/83

    CPC分类号: G06F21/602 G06F21/83

    摘要: A series of touch panel key entries may be secured by shuffling touch entry coordinates. In one embodiment, the entries may be secured by applying a shuffling algorithm that replaces the true coordinates with other incorrect coordinates. Then the correct data may be reassembled in a secure environment.

    摘要翻译: 可以通过混洗触摸入口坐标来确保一系列触摸面板键入口。 在一个实施例中,可以通过应用用其他不正确坐标代替真实坐标的混洗算法来保护条目。 然后可以在安全的环境中重新组合正确的数据。

    SYSTEMS AND METHODS FOR PROTECTING SYMMETRIC ENCRYPTION KEYS
    10.
    发明申请
    SYSTEMS AND METHODS FOR PROTECTING SYMMETRIC ENCRYPTION KEYS 有权
    用于保护对称加密键的系统和方法

    公开(公告)号:US20140157002A1

    公开(公告)日:2014-06-05

    申请号:US13996453

    申请日:2011-12-21

    IPC分类号: G06F21/60

    摘要: Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key.

    摘要翻译: 描述在执行加密时保护对称加密密钥的系统和方法。 在一个实施例中,计算机实现的方法包括从安全区域检索至少一个真实密钥,并且利用处理器执行密钥变换指令,以基于接收所述至少一个真实密钥来生成至少一个变换密钥。 至少一个变换密钥是由处理器使用至少一个真实密钥加密的至少一个循环密钥的加密版本。 处理器能够对至少一个变换的密钥进行解密并加密至少一个循环密钥。