Abstract:
A privileged domain includes a function of a Basic Input/Output System (BIOS). A request to access the function of the BIOS is routed to the privileged domain.
Abstract:
A system comprises a basic-input-output-system ('BIOS'), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user.
Abstract:
A trusted platform module (TPM) management system (10) comprises a computing system (12) having a basic input/output system (BIOS) (24), a TPM (14) and an operating system (30), the BIOS (24) configured to, in response to detecting an unavailable state setting for the TPM (14), report to the operating system (30) a lack of presence of the TPM (14) on the computing system (12).
Abstract:
A system (1) for sharing a trusted platform module (TPM) comprises a TPM (130) operable to execute an operating system (OS) (121)-level process, the TPM (130) operable to pause the execution of the OS (121)-level process and execute a non-OS
Abstract:
A computer system (100) is provided that comprises a processor (134) and a Basic Input/Output System (BIOS) (110) accessible to the processor (134). During a boot process, the BIOS (110) determines an integrity measurement for the computer system (100) and modifies the integrity measurement based on a user authentication.
Abstract:
A computer system (100) is provided that comprises a processor (134) and a Basic Input/Output System (BIOS) (110) accessible to the processor (134). During a boot process, the BIOS (110) determines an integrity measurement for the computer system (100) and modifies the integrity measurement based on a user authentication.
Abstract:
Virtual device control in a computer system is described. Examples include: obtaining a device configuration policy from firmware in the computer system, the device configuration policy defining global access permissions to at least one embedded device in the computer system applied at boot time. Obtaining a virtual device configuration policy established for at least one of a selected user or a selected virtual machine (VM), the virtual device configuration policy defining additional access permissions to the at least one embedded device. Establishing a virtual hardware definition for an instance of the selected VM executing on the computer system based on the global access permissions and the additional access permissions.
Abstract:
An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock the storage device during a procedure to transition the electronic device from the lower power state to a higher power state. The predetermined information is different from a credential for use in unlocking the storage device.
Abstract:
A system (1) for sharing a trusted platform module (TPM) comprises a TPM (130) operable to execute an operating system (OS) (121) -level process, the TPM (130) operable to pause the execution of the OS (121) -level process and execute a non-OS-level process.
Abstract:
A virtual user authentication system (10) comprising a virtual machine manager (VMM) (16) communicatively coupled to a user operating system (OS) (12) and a service OS (14), the VMM (16) configured to receive keystroke input destined for an application (20) executing on the user OS (12) and communicate the keystroke input to the service OS (14), the keystroke input processed by the service OS (14).