TECHNOLOGIES FOR SECURE OFFLINE ACTIVATION OF HARDWARE FEATURES
    1.
    发明申请
    TECHNOLOGIES FOR SECURE OFFLINE ACTIVATION OF HARDWARE FEATURES 审中-公开
    硬件特性的离线激活技术

    公开(公告)号:US20150381368A1

    公开(公告)日:2015-12-31

    申请号:US14318278

    申请日:2014-06-27

    IPC分类号: H04L9/32 G06Q30/04 G06F9/44

    摘要: Technologies for secure offline activation of hardware features include a target computing device having a platform controller hub (PCH) including a converged security and manageability engine (CSME) and a number of in-field programmable fuses (IFPs). During assembly of the target computing device by an original equipment manufacturer (OEM), the CSME is provided a list of hardware features to be activated. The CSME configures the IFPs to enable the requested features, generates a digital receipt including the activated features and a unique device ID, and signs the receipt using a unique device key. Signed receipts may be periodically submitted to a vendor computing device, which verifies the signed receipts, extracts the active feature list, and bills the OEM for activated features of the PCHs. The vendor computing device may bill the OEM a maximum price for PCHs for which there is no associated signed receipt. Other embodiments are described and claimed.

    摘要翻译: 用于硬件特征的安全离线激活的技术包括具有包括融合安全性和可管理性引擎(CSME)的平台控制器集线器(PCH)以及多个现场可编程保险丝(IFP))的目标计算设备。 在由原始设备制造商(OEM)组装目标计算设备的过程中,CSME提供要激活的硬件功能的列表。 CSME配置IFP以启用所请求的功能,生成包含激活的功能和唯一设备ID的数字收据,并使用唯一的设备密钥对收据进行签名。 签署的收据可以定期地提交给供应商计算设备,该设备验证签署的收据,提取活动的特征列表,并为OEM的PCH的激活特征收费。 供应商计算设备可以向OEM收取没有相关签名收据的PCH的最高价格。 描述和要求保护其他实施例。

    PARTITIONING ACCESS TO SYSTEM RESOURCES
    3.
    发明申请
    PARTITIONING ACCESS TO SYSTEM RESOURCES 有权
    分区访问系统资源

    公开(公告)号:US20160182238A1

    公开(公告)日:2016-06-23

    申请号:US14574969

    申请日:2014-12-18

    IPC分类号: H04L9/32 G06F12/14

    摘要: In one embodiment, a processor has at least one core to execute instructions, a security engine coupled to the at least one core, a first storage to store a first immutable key associated with a vendor of the processor, and a second storage to store a second immutable key associated with an original equipment manufacturer (OEM) of the system. A first portion of firmware is to be verified based at least in part on the first immutable key and a second portion of firmware is to be verified based at least in part on the second immutable key, the first portion of firmware associated with the vendor and the second portion of firmware associated with the OEM. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,处理器具有执行指令的至少一个核心,耦合到所述至少一个核心的安全引擎,用于存储与所述处理器的供应商相关联的第一不可变密钥的第一存储器,以及存储 与系统的原始设备制造商(OEM)相关联的第二个不可变键。 至少部分地基于第一不可变密钥验证固件的第一部分,并且至少部分地基于第二不可变密钥,与供应商相关联的固件的第一部分和 与OEM相关联的固件的第二部分。 描述和要求保护其他实施例。

    System, Apparatus And Method For Independently Recovering A Credential

    公开(公告)号:US20190042725A1

    公开(公告)日:2019-02-07

    申请号:US16021275

    申请日:2018-06-28

    IPC分类号: G06F21/44 G06F21/60 H04L9/08

    摘要: In one embodiment, an apparatus includes a non-volatile storage to store a seed value and a signature that is based on an iterative execution of a function for a predetermined number of intervals. The apparatus may further include the security processor coupled to the non-volatile storage, where the security processor is to independently recover a credential for an updated version of the firmware based at least in part on the seed value and a security version number for the updated version of the firmware. Other embodiments are described and claimed.

    METHOD, APPARATUS AND SYSTEM FOR GENERATING ACCESS INFORMATION FROM AN LRU TRACKING LIST
    6.
    发明申请
    METHOD, APPARATUS AND SYSTEM FOR GENERATING ACCESS INFORMATION FROM AN LRU TRACKING LIST 有权
    用于从LRU跟踪列表生成访问信息的方法,装置和系统

    公开(公告)号:US20110320742A1

    公开(公告)日:2011-12-29

    申请号:US12822034

    申请日:2010-06-23

    IPC分类号: G06F12/00

    CPC分类号: G06F12/123

    摘要: Techniques for generating access information indicating a least recently used (LRU) memory region in a set of memory regions. In an embodiment, data is stored in an entry of an LRU tracking list (LTL) based on a touch message indicating when a memory group has been touched—e.g. read from, written to and/or associated with a memory region. The data stored in an LTL entry may include an identifier of a memory group and/or validity data specifying whether that LTL entry stores a set of default data. In another embodiment, access information may be generated based on the memory group identifier and the validity data.

    摘要翻译: 用于产生指示一组存储器区域中的最近最少使用(LRU)存储器区域的访问信息的技术。 在一个实施例中,基于指示何时触摸存储器组的触摸消息,将数据存储在LRU跟踪列表(LTL)的条目中 - 例如, 读取,写入和/或与存储器区域相关联。 存储在LTL条目中的数据可以包括存储器组的标识符和/或指定该LTL条目是否存储一组默认数据的有效性数据。 在另一个实施例中,可以基于存储器组标识符和有效性数据来生成访问信息。

    SECURE REPLAY PROTECTED STORAGE
    7.
    发明申请
    SECURE REPLAY PROTECTED STORAGE 有权
    安全重置保护存储

    公开(公告)号:US20140223198A1

    公开(公告)日:2014-08-07

    申请号:US13997896

    申请日:2011-12-20

    IPC分类号: G06F12/14

    摘要: Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks.Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various components.

    摘要翻译: 本发明的实施例在闪存设备(例如,串行外围设备接口(SPI)闪存设备)中创建底层基础设施,使得其可以被保护免受用户攻击 - 例如,替换SPI闪存设备或管理员 - 中间(MITM)攻击,即时修改SPI闪存内容。 在现有技术中,单调计数器不能存储在SPI闪存设备中,因为所述设备不为计数器提供重放保护。 用户还可以移除闪存设备并对其进行重新编程。 仅主机平台无法防范此类硬件攻击。 本发明的实施例使得诸如SPI闪存设备之类的安全标准存储闪存设备能够实现用于安全存储的数据的重放保护。 本发明的实施例利用闪存控制器,闪存设备,唯一设备密钥和HMAC密钥逻辑来为各种组件创建安全的执行环境。

    SECURE REPLAY PROTECTED STORAGE
    8.
    发明申请
    SECURE REPLAY PROTECTED STORAGE 有权
    安全重置保护存储

    公开(公告)号:US20130159727A1

    公开(公告)日:2013-06-20

    申请号:US13631556

    申请日:2012-09-28

    IPC分类号: G06F12/14

    摘要: Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks.Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various components.

    摘要翻译: 本发明的实施例在闪存设备(例如,串行外围设备接口(SPI)闪存设备)中创建底层基础设施,使得其可以被保护免受用户攻击 - 例如,替换SPI闪存设备或管理员 - 中间(MITM)攻击,即时修改SPI闪存内容。 在现有技术中,单调计数器不能存储在SPI闪存设备中,因为所述设备不为计数器提供重放保护。 用户还可以移除闪存设备并对其进行重新编程。 仅主机平台无法防范此类硬件攻击。 本发明的实施例使得诸如SPI闪存设备之类的安全标准存储闪存设备能够实现用于安全存储的数据的重放保护。 本发明的实施例利用闪存控制器,闪存设备,唯一设备密钥和HMAC密钥逻辑来为各种组件创建安全的执行环境。