Abstract:
Various embodiments are generally directed to techniques for supporting the distributed execution of a task routine among multiple secure controllers incorporated into multiple computing devices. An apparatus includes a first processor component and first secure controller of a first computing device, where the first secure controller includes: a selection component to select the first secure controller or a second secure controller of a second computing device to compile a task routine based on a comparison of required resources to compile the task routine and available resources of the first secure controller; and a compiling component to compile the task routine into a first version of compiled routine for execution within the first secure controller by the first processor component and a second version for execution within the second secure controller by a second processor component in response to selection of the first secure controller. Other embodiments are described and claimed.
Abstract:
Enhancing locality in a security co-processor module of a computing system may be achieved by including one or more additional attributes such as geographic location, trusted time, a hardware vendor string, and one or more environmental factors into an access control space for machine mode measurement of a computing system.
Abstract:
A network interface card with read-only memory having at least a micro-kernel of a cluster computing operation system, a server formed with such network interface card, and a computing cluster formed with such servers are disclosed herein. In various embodiments, on transfer, after an initial initialization phase during an initialization of a server, the network interface card loads the cluster computing operation system into system memory of the server, to enable the server, in conjunction with other similarly provisioned servers to form a computing cluster. Other embodiments are also disclosed and claimed.
Abstract:
A method, apparatus, system, and computer program product for multi-owner deployment of firmware images. The method includes obtaining a signed firmware image that comprises a first code module signed by a first code owner and a second code module signed by a second code owner. The method further includes obtaining an updated first code module comprising updated code for the first code module, verifying that the updated first code module is signed by the first code owner, and updating the signed firmware image with the updated first code module in response to verifying that the updated first code module is signed by the first code owner. The signed firmware image may further comprise an access control list that authorizes updates to the first code module by the first code owner and updates to the second code module by the second code owner.
Abstract:
In one embodiment, the present invention includes a method for determining whether an address map of a system includes support for a read only region of system memory, and if so configuring the region and storing protected data in the region. This data, at least some of which can be readable in both trusted and untrusted modes, can be accessed from the read only region during execution of untrusted code. Other embodiments are described and claimed.
Abstract:
Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed.
Abstract:
Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.
Abstract:
Using radio frequency identification (RFID) tags embedded in processors within a computing system to assist in system initialization processing. The RFID tags provide a separate communication path to other components of the computing system during initialization processing, apart from the system interconnect. When the computing system is powered up, each processor in the system may cause its RFID tag to broadcast data regarding the processor's interconnect location and initialization status. The RFID tags may be sensed by a RFID receiver in the Platform Control Hub (PCH) of the computing system, and each processor's interconnect location and initialization status data may be stored in selected registers within the PCH. When the BIOS executes during system initialization processing, the BIOS may access these PCH registers to obtain the processor's data. The interconnect location and initialization status data may be used by the BIOS to select the optimal routing table and to configure the virtual network within the computing system based at least in part on the optimal routing table and the RFID tag data and without the need for interrogating each processor individually over the system interconnect.
Abstract:
In einem Beispiel umfasst ein System zum Zugreifen auf Dienste einen Prozessor, um eine Änderung einer Topologie des Systems zu detektieren und Konfigurationsdaten oder ein Firmware-Image anzufordern, die in sicherem Speicher einer drahtlosen Zugriffsberechtigungsdatenvermittlung oder in einem EEPROM gespeichert sind, wobei die Konfigurationsdaten eine autorisierte Stapeltopologiekarte für das System anzeigen. Der Prozessor kann außerdem auf der Basis der autorisierten Stapeltopologiekarte bestimmen, dass die Änderung der Topologie zulässig ist, und kann einen Internet- oder lokal basierten Dienst ausführen, der eine Modifizierung auf der Basis der Änderung der Topologie des Systems umfasst, wobei der Dienst mit der Modifizierung in Reaktion auf eine Übertragung der Änderung des Dienstes ausgeführt wird.
Abstract:
Techniken zum Bereitstellen und Erhalten des Schutzes von Firmwareroutinen, die Teil einer Vertrauenskette durch aufeinander folgende Verarbeitungsumgebungen bilden. Eine Einrichtung kann umfassen: eine erste Prozessorkomponente (550); einen mit der ersten Prozessorkomponente gekoppelten flüchtigen Speicher (562); eine Inselkomponente, um, in einer Vor-BS-Betriebsumgebung, eine sichere Insel innerhalb eines Teils des flüchtigen Speichers zu erzeugen, um Zugriff auf die in die sichere Insel geladene gesicherte Firmware einzuschränken; einen ersten Firmwaretreiber (646), um, in der Vor-BS-Betriebsumgebung, eine erste API bereitzustellen, um es nicht gesicherter Firmware zu ermöglichen, eine Unterstützungsroutine der gesicherten Firmware von außerhalb der sicheren Insel aufzurufen; und einen zweiten Firmwaretreiber (647), um, in einer BS-Betriebsumgebung, die die Vor-BS-Betriebsumgebung ersetzt, eine zweite API bereitzustellen, um es einem BS der BS-Betriebsumgebung zu ermöglichen, die Unterstützungsroutine von außerhalb der sicheren Insel aufzurufen.