-
公开(公告)号:DE112005001672T5
公开(公告)日:2007-05-31
申请号:DE112005001672
申请日:2005-07-08
Applicant: INTEL CORP
Inventor: SUTTON JAMES , BRICKELL ERNEST , HALL CLIFFORD , GRAWROCK DAVID
IPC: H04L9/08
Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-line server accessible by the client computer system.
-
公开(公告)号:GB2419989B
公开(公告)日:2006-09-27
申请号:GB0601326
申请日:2003-03-20
Applicant: INTEL CORP
Inventor: SUTTON JAMES , GRAWROCK DAVID
Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
-
公开(公告)号:GB2419989A
公开(公告)日:2006-05-10
申请号:GB0601326
申请日:2003-03-20
Applicant: INTEL CORP
Inventor: SUTTON JAMES , GRAWROCK DAVID
Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialisation and secure virtual machine monitor software into memory. The initiating processor then loads the initialisation software into secure memory for authentication and execution. The initialisation software then authenticates and registers the secure virtual machine monitor software prior to secure system operations. Executing a secured enter instruction, and preventing access to a secured virtual machine monitor by a non-processor device.
-
-