Virtual machine support for metered computer usage
    1.
    发明授权
    Virtual machine support for metered computer usage 有权
    虚拟机支持计算机使用

    公开(公告)号:US08839236B2

    公开(公告)日:2014-09-16

    申请号:US11696271

    申请日:2007-04-04

    IPC分类号: G06F9/455

    摘要: A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.

    摘要翻译: 当合格的虚拟机监视器作为可信引导的一部分加载时,以及所有其他程序和操作系统在虚拟机监视器管理的容器中运行时,虚拟机监视器为软件使用计量应用程序提供可信赖的操作环境。 如果不符合合同使用条款,虚拟机监视器还可以承载用于限制计算机的功能的锁定应用程序。 计量和锁定应用程序都以与环0相同的级别运行,处于与虚拟机监视器相同的级别。

    Virtual Machine Support for Metered Computer Usage
    2.
    发明申请
    Virtual Machine Support for Metered Computer Usage 有权
    计算机计算机使用的虚拟机支持

    公开(公告)号:US20080250406A1

    公开(公告)日:2008-10-09

    申请号:US11696271

    申请日:2007-04-04

    IPC分类号: G06F9/455

    摘要: A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.

    摘要翻译: 当合格的虚拟机监视器作为可信引导的一部分加载时,以及所有其他程序和操作系统在虚拟机监视器管理的容器中运行时,虚拟机监视器为软件使用计量应用程序提供可信赖的操作环境。 如果不符合合同使用条款,虚拟机监视器还可以承载用于限制计算机的功能的锁定应用程序。 计量和锁定应用程序都以与环0相同的级别运行,处于与虚拟机监视器相同的级别。

    Disaggregated secure execution environment
    5.
    发明授权
    Disaggregated secure execution environment 有权
    分解的安全执行环境

    公开(公告)号:US08214296B2

    公开(公告)日:2012-07-03

    申请号:US11353675

    申请日:2006-02-14

    IPC分类号: G06F21/00

    摘要: An electronic device, such as, a computer, may be adapted for self-monitoring for compliance to an operating policy. The operating policy may specify a pay-per-use or subscription business model and measurements associated with compliant usage. A secure execution environment may measure usage in accordance with the business model as well as monitor and enforce compliance to the operating policy. To increase the difficulty of attacking or otherwise disabling the secure execution environment, elements of the secure execution environment may be distributed. The distribution points may include other functional elements of the computer, such as interface circuits, or may even be remotely located over a network. An implementation method for disaggregating the secure execution environment is also disclosed.

    摘要翻译: 诸如计算机的电子设备可以适于自我监视以符合操作策略。 操作策略可以指定按使用付费或订阅业务模式以及与合规使用相关联的测量。 安全执行环境可以根据业务模式来测量使用情况,并监视和实施对操作策略的遵守。 为了增加攻击或以其他方式禁用安全执行环境的难度,可以分发安全执行环境的元素。 分发点可以包括计算机的其他功能元件,例如接口电路,或者甚至可以远程位于网络上。 还公开了用于分解安全执行环境的实现方法。

    Hardware-Based Computer Theft Deterrence
    6.
    发明申请
    Hardware-Based Computer Theft Deterrence 有权
    基于硬件的计算机盗窃威慑

    公开(公告)号:US20080320312A1

    公开(公告)日:2008-12-25

    申请号:US11766602

    申请日:2007-06-21

    IPC分类号: G06F21/00 G08B13/00

    CPC分类号: G08B13/1418 G06F21/88

    摘要: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.

    摘要翻译: 基于硬件的安全模块用于保护电子设备,特别是便携式电子设备。 安全模块可以通过看门狗定时器的超时或者通过显式消息来确定来加密电子设备上的所选数据。 此外,电子设备可以进入有限功能模式,其仅允许显示简单的消息并且利用恢复服务支持网络流量。 恢复服务可能能够使用网络流量来定位电子设备。 安全模块可以包括安全存储器,加密功能,定时器和用于在监视器上直接显示数据的支持。

    Hardware-based computer theft deterrence
    7.
    发明授权
    Hardware-based computer theft deterrence 有权
    基于硬件的电脑盗窃威慑

    公开(公告)号:US08522043B2

    公开(公告)日:2013-08-27

    申请号:US11766602

    申请日:2007-06-21

    IPC分类号: G06F11/30

    CPC分类号: G08B13/1418 G06F21/88

    摘要: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.

    摘要翻译: 基于硬件的安全模块用于保护电子设备,特别是便携式电子设备。 安全模块可以通过看门狗定时器的超时或者通过显式消息来确定来加密电子设备上的所选数据。 此外,电子设备可以进入有限功能模式,其仅允许显示简单的消息并且利用恢复服务支持网络流量。 恢复服务可能能够使用网络流量来定位电子设备。 安全模块可以包括安全存储器,加密功能,定时器和用于在监视器上直接显示数据的支持。

    Independent Computation Environment and Provisioning of Computing Device Functionality
    9.
    发明申请
    Independent Computation Environment and Provisioning of Computing Device Functionality 审中-公开
    独立计算环境和计算设备功能的提供

    公开(公告)号:US20080005560A1

    公开(公告)日:2008-01-03

    申请号:US11427666

    申请日:2006-06-29

    IPC分类号: H04L9/00 G06F1/00

    摘要: Techniques are described which provide an independent computation environment. The independent computation environment is contained at least in part in a set of one or more hardware components and configured to host a provisioning module that is executable to provision functionality of the computing device according to a wide variety of factors. In an implementation, when the provisioning module determines that particular functionality is referenced in an inclusion list, the computing device is permitted to access the particular functionality. When the provisioning module determines that the particular functionality is referenced in an exclusion list, the computing device is prevented from accessing the particular functionality.

    摘要翻译: 描述了提供独立计算环境的技术。 独立计算环境至少部分地包含在一个或多个硬件组件的集合中,并且被配置为托管可执行以根据各种因素来提供计算设备的功能的供应模块。 在实现中,当配置模块确定在包含列表中引用特定功能时,允许计算设备访问特定功能。 当配置模块确定特定功能在排除列表中被引用时,防止计算设备访问特定功能。