Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for execution of a secured environment initialization instruction. SOLUTION: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates a process by halting the execution of the other logical processors and then loading initialization and secure virtual machine monitor software into a memory. The initiating processor then loads initialization software into a secure memory for authentication and execution. The initialization software authenticates and registers the secure virtual machine monitor software prior to secure system operations. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Ein Verfahren und eine Vorrichtung werden zur Verfügung gestellt, bei welchen ein vertrauenswürdiges Betriebssystem in einen Bereich in einem Speicher geladen wird. Eine Start-Sichern-Operation (SSO) löst eine Verknüpfe-Sichern-Operation (JSO) aus, um alle CPUs bis auf eine in einem Multiprozessorcomputer anzuhalten. Die SSO veranlasst die aktive CPU, eine Komponente eines Betriebssystems in einen spezifizierten Bereich in dem Speicher zu laden, die Identität des geladenen Betriebssystems durch Aufzeichnen eines kryptographischen Hashs des Inhalts des spezifizierten Bereichs in dem Speicher zu registrieren, die Ausführung bei einem bekannten Eintrittspunkt in dem spezifizierten Bereich zu beginnen und die JSO auszulösen, so dass sie die angehaltenen CPUs veranlasst, das gleiche zu tun.
Abstract:
The method involves loading a component of an operating system into a specific region (275) of a memory by the active one of the CPUs (210,220,230) of a multi-processor system (200). The identity of the loaded component is registered. The active CPU is made to jump to a known entry point in the specific region. Independent claims are also included for the following: (1) article of manufacture comprising computer readable medium storing operating system loading program; (2) method of securing a region in computer memory; and (3) apparatus to load trustable operating system.
Abstract:
A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
Abstract:
A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
Abstract:
A method and apparatus for resetting and modifying special registers in a security token is described. In one embodiment, a register may be reset when a reset flag is true when a special transmission on a bus demonstrates the mutual locality of the associated processor and chipset. A modify flag may also be used to indicate whether the register contents may be modified. Modifications may also be dependent upon demonstration of mutual locality.
Abstract:
Microcode patches are encoded before delivery to a target processor that is to install the microcode patches. The target processor validates the microcode patches before installation. The security of the process may be enhanced by one or more of: 1) performing the validation in a secure memory, 2) using a public/private key pair for encryption and decryption of the microcode patch, 3) using at least one key that is embedded in the target processor and that cannot be read by non-secure software, and 4) using a hash value that is embedded in the target processor to validate at least one non-embedded key.
Abstract:
A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.