METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS IN SIGNED GROUPS TO DEVICES USING A DISTRIBUTION CD
    11.
    发明申请
    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS IN SIGNED GROUPS TO DEVICES USING A DISTRIBUTION CD 审中-公开
    使用分发CD将设备中的直接证明私人密钥交付给设备的方法

    公开(公告)号:WO2006019614A3

    公开(公告)日:2006-12-07

    申请号:PCT/US2005024253

    申请日:2005-07-08

    Abstract: Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated signed group record of encrypted data structures from the removable storage medium, and verifies the signed group record. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key, when the group record is valid. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Abstract translation: 在安装在客户端计算机系统中的设备中的签名密钥组中提供直接证明私钥可以以安全的方式实现,而不需要在设备中的显着的非易失性存储。 在制造时生成并存储与设备中的组号一起存储唯一的伪随机值。 伪随机值用于生成用于加密持有Direct Proof私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构被存储在可移动存储介质(例如CD或DVD)上的签名组密钥(例如,签名组记录)中,并且分发给客户端计算机系统的所有者。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果没有,系统从可移动存储介质中获得加密数据结构的关联签名组记录,并验证签名组记录。 该设备使用从其存储的伪随机值重新生成的对称密钥来解密加密的数据结构,以便当组记录有效时获得Direct Proof私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。

    ATTESTATION USING BOTH FIXED TOKEN AND PORTABLE TOKEN
    12.
    发明申请
    ATTESTATION USING BOTH FIXED TOKEN AND PORTABLE TOKEN 审中-公开
    使用两个固定的手持式和便携式的手柄

    公开(公告)号:WO2004061628A3

    公开(公告)日:2005-01-27

    申请号:PCT/US0336110

    申请日:2003-11-12

    Applicant: INTEL CORP

    Inventor: GRAWROCK DAVID

    Abstract: Methods, apparatus and machine readable medium are described for creating and using protected key blobs that require a particular portable token be present before use of the key or keys of the protected key blob is granted. Such protected key blobs may be used to establish a level of trust between a local user and the computing device.

    Abstract translation: 描述了用于创建和使用需要特定便携式令牌的保护密钥块的方法,装置和机器可读介质,在使用密钥或保护密钥块的密钥被授予之前存在。 这种受保护的密钥块可以用于建立本地用户和计算设备之间的信任级别。

    EXCLUSIVE ACCESS FOR SECURE AUDIO PROGAM
    13.
    发明申请
    EXCLUSIVE ACCESS FOR SECURE AUDIO PROGAM 审中-公开
    独特的访问安全音频PROGAM

    公开(公告)号:WO2007021513A3

    公开(公告)日:2007-04-12

    申请号:PCT/US2006029609

    申请日:2006-07-27

    CPC classification number: G06F21/10 G06F2221/0735

    Abstract: Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.

    Abstract translation: 在平台上执行监视器,监视器能够提供对平台的音频I / O设备的独占,安全访问,在平台上执行第一分区,通过直接映射音频I来在第一分区中提供音频设备模型 / O设备从监视器到第一分区,用于在第一分区中执行的应用,并且向第一分区中以安全模式执行音频功能的程序提供对音频I / O设备的独占安全访问。

    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING A DISTRIBUTION CD
    15.
    发明申请
    METHOD OF DELIVERING DIRECT PROOF PRIVATE KEYS TO DEVICES USING A DISTRIBUTION CD 审中-公开
    使用分发CD向设备传送直接证明私人密钥的方法

    公开(公告)号:WO2006025952A2

    公开(公告)日:2006-03-09

    申请号:PCT/US2005024486

    申请日:2005-07-08

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo­random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a removable storage medium (such as a CD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the removable storage medium. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.

    Abstract translation: 将直接证明私钥提供给安装在该领域中的客户端计算机系统中的设备可以以安全的方式来实现,而不需要设备中的显着的非易失性存储。 在制造时产生并存储在设备中的唯一伪随机值。 伪随机值用于生成用于加密持有直接证明私钥和与该设备相关联的私钥摘要的数据结构的对称密钥。 所得到的加密数据结构存储在可移动存储介质(例如CD)上,并被分发给客户端计算机系统的所有者。 当在客户端计算机系统上初始化设备时,系统会检查系统中是否存在本地化的加密数据结构。 如果不是,系统从可移动存储介质中获得相关联的加密数据结构。 设备使用从其存储的伪随机值重新生成的对称密钥来解密加密数据结构,以获得直接证明私钥。 如果私钥有效,则可以用于客户端计算机系统中的设备的后续认证处理。

    System and method for execution of a secured environment initialization instruction

    公开(公告)号:AU2003224737A8

    公开(公告)日:2009-10-15

    申请号:AU2003224737

    申请日:2003-03-20

    Applicant: INTEL CORP

    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.

    18.
    发明专利
    未知

    公开(公告)号:DE10392470B4

    公开(公告)日:2007-02-15

    申请号:DE10392470

    申请日:2003-03-20

    Applicant: INTEL CORP

    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.

    19.
    发明专利
    未知

    公开(公告)号:AT340381T

    公开(公告)日:2006-10-15

    申请号:AT01944572

    申请日:2001-06-14

    Applicant: INTEL CORP

    Inventor: GRAWROCK DAVID

    Abstract: In one embodiment, an integrated circuit device comprises a trusted platform module and a boot block memory unit covered by a common package. The boot block memory unit is in communication with the trusted platform module and provides boot information to the trusted platform module. An example of the boot information includes a boot block code.

    System and method for execution of a secured environment initialization instruction

    公开(公告)号:GB2419988B

    公开(公告)日:2006-09-27

    申请号:GB0601323

    申请日:2003-03-20

    Applicant: INTEL CORP

    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.

Patent Agency Ranking