METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS IN SIGNED GROUPS TO DEVICES USING A DISTRIBUTION CD
    1.
    发明申请
    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS IN SIGNED GROUPS TO DEVICES USING A DISTRIBUTION CD 审中-公开
    使用分发CD将设备中的直接证明私人密钥交付给设备的方法

    公开(公告)号:WO2006019614A3

    公开(公告)日:2006-12-07

    申请号:PCT/US2005024253

    申请日:2005-07-08

    Abstract: Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated signed group record of encrypted data structures from the removable storage medium, and verifies the signed group record. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key, when the group record is valid. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Abstract translation: 在安装在客户端计算机系统中的设备中的签名密钥组中提供直接证明私钥可以以安全的方式实现,而不需要在设备中的显着的非易失性存储。 在制造时生成并存储与设备中的组号一起存储唯一的伪随机值。 伪随机值用于生成用于加密持有Direct Proof私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构被存储在可移动存储介质(例如CD或DVD)上的签名组密钥(例如,签名组记录)中,并且分发给客户端计算机系统的所有者。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果没有,系统从可移动存储介质中获得加密数据结构的关联签名组记录,并验证签名组记录。 该设备使用从其存储的伪随机值重新生成的对称密钥来解密加密的数据结构,以便当组记录有效时获得Direct Proof私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。

    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING A DISTRIBUTION CD
    2.
    发明申请
    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING A DISTRIBUTION CD 审中-公开
    使用分发CD向设备传送直接证明私人密钥的方法

    公开(公告)号:WO2006025952A2

    公开(公告)日:2006-03-09

    申请号:PCT/US2005024486

    申请日:2005-07-08

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo­random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a removable storage medium (such as a CD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the removable storage medium. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Abstract translation: 将直接证明私钥提供给安装在该领域中的客户端计算机系统中的设备可以以安全的方式来实现,而不需要设备中的显着的非易失性存储。 在制造时产生并存储在设备中的唯一伪随机值。 伪随机值用于生成用于加密持有直接证明私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构存储在可移动存储介质(例如CD)上,并被分发给客户端计算机系统的所有者。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果不是,系统从可移动存储介质中获得相关联的加密数据结构。 设备使用从其存储的伪随机值重新生成的对称密钥来解密加密数据结构,以获得直接证明私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。

    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING AN ON-LINE SERVICE
    3.
    发明申请
    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING AN ON-LINE SERVICE 审中-公开
    使用在线服务向设备传送直接证明私人密钥的方法

    公开(公告)号:WO2006023151A2

    公开(公告)日:2006-03-02

    申请号:PCT/US2005024374

    申请日:2005-07-08

    CPC classification number: H04L9/0844 H04L2209/127

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo­random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Abstract translation: 将直接证明私钥提供给安装在该领域中的客户端计算机系统中的设备可以以安全的方式来实现,而不需要设备中的显着的非易失性存储。 在制造时产生并存储在设备中的唯一伪随机值。 伪随机值用于生成用于加密持有直接证明私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构存储在由客户端计算机系统可访问的受保护的在线服务器上。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果没有,系统将使用安全协议从受保护的在线服务器获取相关联的加密数据结构。 设备使用从其存储的伪随机值重新生成的对称密钥来解密加密数据结构,以获得直接证明私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。

    A PLATFORM AND METHOD FOR ESTABLISHING PROVABLE IDENTITIES WHILE MAINTAINING PRIVACY
    4.
    发明申请
    A PLATFORM AND METHOD FOR ESTABLISHING PROVABLE IDENTITIES WHILE MAINTAINING PRIVACY 审中-公开
    在维护隐私权的同时建立可确定的身份的平台和方法

    公开(公告)号:WO0201794A3

    公开(公告)日:2002-09-26

    申请号:PCT/US0119223

    申请日:2001-06-14

    CPC classification number: H04L9/3265 H04L9/3271 H04L2209/42

    Abstract: In one embodiment, a method for utilizing a pseudonym to protect the identity of a platform and its user is described. The method comprises producing a pseudonym that includes a public pseudonym key. The public pseudonym key is placed in a certificate template. Hash operations are performed on the certificate template to produce a certificate hash value, which is transformed from the plarform. Thereafter, a signed result is returned to the platform. The signed result is a digital signature for the transformed certificate hash value. Upon performing an inverse transformation of the signed result, a digital signature of the certificate hash values is recovered. This digital signature may be used for data integrity checks for subsequent communications using the pseudonym.

    Abstract translation: 在一个实施例中,描述了利用假名来保护平台及其用户的身份的方法。 该方法包括产生包括公用假名密钥的假名。 公用假名密钥放置在证书模板中。 在证书模板上执行散列操作以生成证书散列值,该证书散列值是从plarform转换而来的。 之后,将签名结果返回给平台。 签名结果是转换后的证书哈希值的数字签名。 在执行签名结果的逆变换时,证书哈希值的数字签名被恢复。 该数字签名可以用于数据完整性检查以用于使用假名的后续通信。

    CONTROLLING ACCESS TO MULTIPLE ISOLATED MEMORIES IN AN ISOLATED EXECUTION ENVIRONMENT
    6.
    发明申请
    CONTROLLING ACCESS TO MULTIPLE ISOLATED MEMORIES IN AN ISOLATED EXECUTION ENVIRONMENT 审中-公开
    控制在隔离执行环境中访问多个隔离的记忆

    公开(公告)号:WO0206929A2

    公开(公告)日:2002-01-24

    申请号:PCT/US0122027

    申请日:2001-07-13

    Applicant: INTEL CORP

    CPC classification number: G06F12/1475

    Abstract: The present invention provides a method, apparatus, and system for controlling memory accesses to multiple isolated memory areas in an isolated execution environment. A page manager is used to distribute a plurality of pages to a plurality of different areas of a memory, respectively. The memory is divided into non-isolated areas and isolated areas. The page manager is located in an isolated area of memory. Further, a memory ownership page table describes each page of memory and is also located in an isolated area of memory. The page manager assigns an isolated attribute to a page if the page is distributed to an isolated are of memory. On the other hand, the page manager assigns a non-isolated attribute to a page if the page is distributed to a non-isolated area of memory. The memory ownership page table records the attribute for each page. In one embodiment, a processor having a normal execution mode and an isolated execution mode generates an access transaction. The access transaction is configured using a configuration storage that contains configuration settings related to a page and access information. An access checking circuit coupled to the configuration settings and the access information and generates an access grant signal if the access transaction is valid.

    Abstract translation: 本发明提供一种用于控制对隔离执行环境中的多个隔离存储器区域的存储器访问的方法,装置和系统。 页面管理器用于分别将多个页面分发到存储器的多个不同区域。 记忆分为非隔离区和隔离区。 页面管理器位于隔离区内。 此外,存储器所有权页表描述了存储器的每一页,并且还位于存储器的隔离区域中。 页面管理器将分离的属性分配给页面,如果页面分发到隔离的内存。 另一方面,如果页面被分发到存储器的非隔离区域,则页面管理器将非隔离属性分配给页面。 内存所有权页表记录每个页面的属性。 在一个实施例中,具有正常执行模式和隔离执行模式的处理器生成访问事务。 访问事务使用包含与页面和访问信息相关的配置设置的配置存储进行配置。 访问检查电路,其耦合到配置设置和访问信息,并且如果访问事务有效则生成访问许可信号。

    Method of delivery direct proof private keys to devices using an on-line service

    公开(公告)号:GB2430127B

    公开(公告)日:2008-12-31

    申请号:GB0700524

    申请日:2005-07-08

    Applicant: INTEL CORP

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-line server accessible by the client computer system.

    Method of delivery direct proof private keys to devices using an on-line service

    公开(公告)号:GB2430127A

    公开(公告)日:2007-03-14

    申请号:GB0700524

    申请日:2005-07-08

    Applicant: INTEL CORP

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudorandom value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Microcode patch authentication
    10.
    发明专利

    公开(公告)号:GB2403047B

    公开(公告)日:2006-04-12

    申请号:GB0422098

    申请日:2003-03-28

    Applicant: INTEL CORP

    Inventor: SUTTON JAMES II

    Abstract: Microcode patches are encoded before delivery to a target processor that is to install the microcode patches. The target processor validates the microcode patches before installation. The security of the process may be enhanced by one or more of: 1) performing the validation in a secure memory, 2) using a public/private key pair for encryption and decryption of the microcode patch, 3) using at least one key that is embedded in the target processor and that cannot be read by non-secure software, and 4) using a hash value that is embedded in the target processor to validate at least one non-embedded key.

Patent Agency Ranking