Abstract:
In einer Ausführungsform umfasst eine Einrichtung eine Anzeigeschnittstelle zum Kommunizieren mit einer Anzeigevorrichtung und einen Prozessor. Der Prozessor dient zu Folgendem: Identifizieren einer mobilen Transaktion in Zusammenhang mit einem Benutzer, wobei die mobile Transaktion eine potentielle Transaktion umfasst, die unter Verwendung einer mobilen Vorrichtung des Benutzers abzuschließen ist; Zugreifen auf Transaktionsdaten in Zusammenhang mit der mobilen Transaktion; Verschlüsseln der Transaktionsdaten basierend auf einem Verschlüsselungsschlüssel in Zusammenhang mit dem Benutzer; Erzeugen eines visuellen Codes in Zusammenhang mit den verschlüsselten Transaktionsdaten, wobei der visuelle Code visuell codierte Daten umfasst, und wobei der visuelle Code in einer geschützten Ausführungsumgebung des Prozessors erzeugt wird; Herstellen eines geschützten Datenpfads zwischen dem Prozessor und der Anzeigevorrichtung über die Anzeigeschnittstelle; und Übertragen des visuellen Codes zu der Anzeigevorrichtung über den geschützten Datenpfad, wobei der visuelle Code auf der Anzeigevorrichtung anzuzeigen ist.
Abstract:
Verschiedene Ausführungsformen sind im Allgemeinen auf das Bereitstellen von Informationserfassung durch mehrere Drohnen, die in einem Schwarm arbeiten können, gerichtet, während Rechte und/oder Werte, die dem Inhalt zugewiesen werden, der durch jede Drohne oder durch Teilmengen von Drohnen erstellt wird, bewahrt werden. Im Allgemeinen gewährleistet die vorliegende Offenbarung, dass Drohnen, die an Inhaltserfassung teilnehmen, ihre Authentizität bestätigen können, um Vertrauen zwischen den Drohnen in dem Schwarm herzustellen.
Abstract:
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.
Abstract:
Managing the lifecycle of an electronic contract representing a relationship between at least two parties sharing a business process includes exchanging public keys for each of the parties, negotiating the electronic contact, digitally signing and verifying the electronic contract, issuing role certificates to participants of the shared business process, the role certificates defining authorization of participants to perform at least a part of the shared business process and for using the public keys, registering, by the participants, to receive the electronic contract, distributing the electronic contract to the participants, and performing the shared business process by the participants. Updating the shared business process may be accomplished by modifying the electronic contract and redistributing the electronic contract to the participants. Terminating the electronic contract may be accomplished by modifying the electronic contract to halt authorization of the shared business process and redistributing the electronic contract to the parties.
Abstract:
Enforcing authorization in a shared process between at least two parties by identifying a sender of a message requesting an action as part of the shared process, determining the party of the sender, associating the sender's party with a business relationship between the sender's party and the receiver's party as defined by an electronic contract (without relying on a trusted third party to provide a common rooted key hierarchy), identifying terms and conditions of the electronic contract corresponding to the shared process, and verifying that the requested action corresponds to the terms and conditions and is allowable for the shared process by the sender. The electronic contract includes a first section to specify at least one party, other than the at least two parties, that represents a namespace corresponding to a domain of cryptographic keys, a second section to associate the at least two parties liable under the electronic contract with a public key of a cryptographic key pair from the domain for each of the at least two parties (without relying on a trusted third party to provide a common rooted key hierarchy), a third section to provide at least one of mapping of role names and sub-processes of the shared process, and a fourth section to allow each of the at least two parties to digitally sign at least a portion of the electronic contract with a private key of the cryptographic key pair for each of the at least two parties.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to initialize a platform. An example disclosed apparatus includes a boot loader manager to prevent operating system loading in response to detecting a power-on condition, a context manager to retrieve first context information associated with the platform, and a policy manager to identify a first operating system based on the first context information, the policy manager to authorize the boot loader manager to load the first operating system.
Abstract:
This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates.
Abstract:
Technologies for utilizing trusted messaging include a local computing device including a message client and a local trusted message module established in a trusted execution environment. The local trusted message module performs attestation of a remote computing device based on communication with a corresponding remote trusted message module established in a trusted execution environment of the remote computing device. The local trusted message module further exchanges, with the remote trusted message module, cryptographic keys in response to successful attestation of the remote computing device. The message client forwards outgoing messages to the local trusted message module and receives incoming messages from the local trusted message module. To securely transmit an outgoing message to the remote computing device, the local trusted message module receives the outgoing message from the message client, encrypts the outgoing message, and cryptographically signs the outgoing message, prior to transmittal to the remote trusted message module of the remote computing device. To securely receive an incoming message from the remote computing device, the local trusted message module receives the incoming message from the remote trusted message module of the remote computing device, decrypts the incoming message, and verifies a cryptographic signature of the incoming message, based on the exchanged cryptographic keys and prior to transmittal of the incoming message to the message client.
Abstract:
In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.
Abstract:
A computing device is described. The computing device includes input/output (I/O) circuitry to receive sensory data and a trusted execution environment to monitor the I/O circuitry to detect one or more context characteristics of the computing device and to authenticate user identity based on context characteristics.