Abstract:
A system (1) for sharing a trusted platform module (TPM) comprises a TPM (130) operable to execute an operating system (OS) (121)-level process, the TPM (130) operable to pause the execution of the OS (121)-level process and execute a non-OS
Abstract:
A system (50) comprises a first operating environment (56) and a second operating environment (62). The first and second operating environments exchange information in encrypted form using a shared encryption key (K3). The first and second operating environments cooperate to change said encryption key K3 using another shared encryption key (K4). The encryption key K4 is changed upon the encryption key K3 being changed.
Abstract:
A trusted platform field upgrade system (10) comprises a trusted platform module (TPM) (14) having a volatile memory (56), the volatile memory (56) having a flag (70) for verifying physical presence in a non-ownership state of the TPM (14), the TPM (14) configured to enable a field upgrade to the TPM (14) in an operating system (OS) (30) environment based on assertion of the physical presence flag (70).
Abstract:
A system (50) comprises storage (60) and a basic input/output system (BIOS) (62) stored in the storage and adapted to be executed by a processor (52). The BIOS has an associated setting (64). The system (50) receives an encrypted value that comprises an encrypted hash of a request to alter at least one of the BIOS (62) and the setting (64). A first key is used to encrypt the value. The processor (52) uses a second key corresponding to the first key to authenticate said request.
Abstract:
In at least some embodiments, a method comprises initializing an embedded security chip (114) for use with a computer (100) and performing a binding operation between the embedded security chip (114) and the computer (100). The method further comprises, during each subsequent boot of the computer (100), validating the binding operation before the embedded security chip (114) performs a cryptographic function.
Abstract:
A system comprises a processor which executes an operating system and an application. The system also comprises a keyboard coupled to the processor. The keyboard and application share a shared secret that is used to encode keyboard data provided from the keyboard to the application. The shared secret is not known or accessible to the operating system.
Abstract:
A computer system (100) is provided, the computer system (100) having a processor (104) and a system memory (108) coupled to the processor (104). The computer system (100) also includes a Basic Input/Output System (BIOS) (130) in communication with the processor (104). The BIOS (130) selectively scrubs the system memory (108) during a shutdown process of the computer system (108).
Abstract:
A system (1) for sharing a trusted platform module (TPM) comprises a TPM (130) operable to execute an operating system (OS) (121) -level process, the TPM (130) operable to pause the execution of the OS (121) -level process and execute a non-OS-level process.
Abstract:
A virtual user authentication system (10) comprising a virtual machine manager (VMM) (16) communicatively coupled to a user operating system (OS) (12) and a service OS (14), the VMM (16) configured to receive keystroke input destined for an application (20) executing on the user OS (12) and communicate the keystroke input to the service OS (14), the keystroke input processed by the service OS (14).
Abstract:
A virtual user authentication system (10) comprising a virtual machine manager (VMM) (16) communicatively coupled to a user operating system (OS) (12) and a service OS (14), the VMM (16) configured to receive keystroke input destined for an application (20) executing on the user OS (12) and communicate the keystroke input to the service OS (14), the keystroke input processed by the service OS (14).