11.
    发明专利
    未知

    公开(公告)号:DE112005001672T5

    公开(公告)日:2007-05-31

    申请号:DE112005001672

    申请日:2005-07-08

    Applicant: INTEL CORP

    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-line server accessible by the client computer system.

    System and method for execution of a secured environment initialization instruction

    公开(公告)号:GB2419989B

    公开(公告)日:2006-09-27

    申请号:GB0601326

    申请日:2003-03-20

    Applicant: INTEL CORP

    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.

    Initiating secure operations
    13.
    发明专利

    公开(公告)号:GB2419989A

    公开(公告)日:2006-05-10

    申请号:GB0601326

    申请日:2003-03-20

    Applicant: INTEL CORP

    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialisation and secure virtual machine monitor software into memory. The initiating processor then loads the initialisation software into secure memory for authentication and execution. The initialisation software then authenticates and registers the secure virtual machine monitor software prior to secure system operations. Executing a secured enter instruction, and preventing access to a secured virtual machine monitor by a non-processor device.

Patent Agency Ranking