POWER-SAFE DISK STORAGE APPARATUS, SYSTEMS, AND METHODS
    11.
    发明申请
    POWER-SAFE DISK STORAGE APPARATUS, SYSTEMS, AND METHODS 审中-公开
    电源安全存储设备,系统和方法

    公开(公告)号:WO2006113823A2

    公开(公告)日:2006-10-26

    申请号:PCT/US2006014772

    申请日:2006-04-17

    CPC classification number: G06F11/1076 G06F11/1435 G06F2211/1019

    Abstract: Apparatus and systems, as well as methods and articles, may operate to create a log file in a non-volatile data storage medium. The log file may comprise a header record, a trailer record, and at least one partial parity value associated with a stripe in a redundant array of inexpensive disks (RAID) sub-system. The stripe may comprise a first data strip to be updated located on an operational first disk drive, a second data strip located on a failed disk drive, and a stripe parity strip located on an operational disk drive, among others.

    Abstract translation: 设备和系统以及方法和物品可以操作以在非易失性数据存储介质中创建日志文件。 日志文件可以包括报头记录,报尾记录以及与廉价磁盘(RAID)子系统的冗余阵列中的条带相关联的至少一个部分奇偶校验值。 条带可以包括位于操作的第一磁盘驱动器上的要更新的第一数据条,位于故障磁盘驱动器上的第二数据条,以及位于操作盘驱动器上的条带奇偶校验条等。

    TRUSTED PLATFORM MODULE CERTIFICATION AND ATTESTATION UTILIZING AN ANONYMOUS KEY SYSTEM
    12.
    发明申请
    TRUSTED PLATFORM MODULE CERTIFICATION AND ATTESTATION UTILIZING AN ANONYMOUS KEY SYSTEM 审中-公开
    值得信赖的平台模块认证和利用匿名密钥系统进行验证

    公开(公告)号:WO2016077017A3

    公开(公告)日:2017-05-11

    申请号:PCT/US2015055508

    申请日:2015-10-14

    Applicant: INTEL CORP

    Abstract: This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates.

    Abstract translation: 该应用针对可信平台模块认证和利用匿名密钥系统进行认证。 一般而言,TPM认证和TPM认证可以通过使用匿名密钥系统(AKS)认证在利用集成TPM的设备中得到支持。 示例设备可以包括至少组合的AKS和TPM资源,其将AKS和TPM固件(FW)加载到运行时间环境中,该运行时间环境还可以至少包括操作系统(OS)加密模块,AKS服务模块和TPM认证和证明 (CA)模块。 对于TPM认证,CA模块可以与运行时环境中的其他模块交互以生成TPM证书,该证书由AKS证书签名,可以传输到认证平台进行验证。 对于TPM证明,CA模块可能会导致TPM证书与TPM和/或AKS证书一起提供给证明平台进行验证。

    METHOD FOR DYNAMICALLY EXPOSING LOGICAL BACKUP AND RESTORE VOLUMES
    13.
    发明申请
    METHOD FOR DYNAMICALLY EXPOSING LOGICAL BACKUP AND RESTORE VOLUMES 审中-公开
    用于动态显示逻辑备份和恢复体积的方法

    公开(公告)号:WO2007078629A3

    公开(公告)日:2007-11-22

    申请号:PCT/US2006047035

    申请日:2006-12-08

    CPC classification number: G06F11/1417 G06F11/1456 G06F11/1469

    Abstract: A method and apparatus for storing and protecting a restore environment is provided. The restore environment is stored in a redundant array of independent disks (RAID) volume which is hidden from an operating system during runtime operations. Upon detecting that a restore operation is required due to a corrupted or missing image, the RAID volume storing the restore environment is dynamically exposed so that it can be accessed by the restore operation.

    Abstract translation: 提供了一种用于存储和保护恢复环境的方法和装置。 恢复环境存储在独立磁盘(RAID)卷的冗余阵列中,在运行时操作期间从操作系统隐藏。 检测到由于损坏或丢失图像而需要还原操作时,存储还原环境的RAID卷将被动态公开,以便可以通过恢复操作进行访问。

    Virtualizing a hardware monotonic counter

    公开(公告)号:GB2523039A

    公开(公告)日:2015-08-12

    申请号:GB201509611

    申请日:2013-06-24

    Applicant: INTEL CORP

    Abstract: Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed.

    METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST
    17.
    发明公开
    METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST 审中-公开
    对政策基于组合内容的方法和装置用在对等网络WAY与信任对硬件基础ROOT

    公开(公告)号:EP2788911A4

    公开(公告)日:2015-07-29

    申请号:EP11876905

    申请日:2011-12-08

    Applicant: INTEL CORP

    Abstract: Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license.

Patent Agency Ranking