TECHNIQUES FOR DISTRIBUTED OPERATION OF SECURE CONTROLLERS
    21.
    发明申请
    TECHNIQUES FOR DISTRIBUTED OPERATION OF SECURE CONTROLLERS 审中-公开
    分布式操作安全控制器的技术

    公开(公告)号:WO2017030619A3

    公开(公告)日:2017-04-13

    申请号:PCT/US2016034468

    申请日:2016-05-26

    Applicant: INTEL CORP

    CPC classification number: G06F8/41 G06F21/00 G06F21/57

    Abstract: Various embodiments are generally directed to techniques for supporting the distributed execution of a task routine among multiple secure controllers incorporated into multiple computing devices. An apparatus includes a first processor component and first secure controller of a first computing device, where the first secure controller includes: a selection component to select the first secure controller or a second secure controller of a second computing device to compile a task routine based on a comparison of required resources to compile the task routine and available resources of the first secure controller; and a compiling component to compile the task routine into a first version of compiled routine for execution within the first secure controller by the first processor component and a second version for execution within the second secure controller by a second processor component in response to selection of the first secure controller. Other embodiments are described and claimed.

    Abstract translation: 各种实施例通常涉及用于支持并入多个计算设备的多个安全控制器之中的任务例程的分布式执行的技术。 一种装置包括第一计算设备的第一处理器组件和第一安全控制器,其中第一安全控制器包括:选择组件,用于选择第二计算设备的第一安全控制器或第二安全控制器,以基于 比较所需的资源来编译任务例程和第一个安全控制器的可用资源; 以及编译组件,用于将所述任务例程编译成由所述第一处理器组件在所述第一安全控制器内执行的编译例程的第一版本,以及响应于所述第二处理器组件的选择而由所述第二处理器组件在所述第二安全控制器内执行的第二版本 第一个安全控制器。 描述和要求保护其他实施例。

    CLUSTER COMPUTING - NIC BASED OS PROVISION
    23.
    发明申请
    CLUSTER COMPUTING - NIC BASED OS PROVISION 审中-公开
    集群计算 - 基于网卡的OS规定

    公开(公告)号:WO2012040606A3

    公开(公告)日:2012-05-10

    申请号:PCT/US2011053045

    申请日:2011-09-23

    CPC classification number: G06F9/4416

    Abstract: A network interface card with read-only memory having at least a micro-kernel of a cluster computing operation system, a server formed with such network interface card, and a computing cluster formed with such servers are disclosed herein. In various embodiments, on transfer, after an initial initialization phase during an initialization of a server, the network interface card loads the cluster computing operation system into system memory of the server, to enable the server, in conjunction with other similarly provisioned servers to form a computing cluster. Other embodiments are also disclosed and claimed.

    Abstract translation: 本文公开了一种具有至少具有集群计算操作系统的微内核的只读存储器的网络接口卡,由该网络接口卡形成的服务器以及由这种服务器形成的计算集群。 在各种实施例中,在传送时,在服务器初始化期间的初始初始化阶段之后,网络接口卡将群集计算操作系统加载到服务器的系统存储器中,以使服务器结合其他类似配置的服务器来形成 一个计算集群。 其他实施例也被公开和要求保护。

    MULTI-OWNER DEPLOYMENT OF FIRMWARE IMAGES
    24.
    发明申请
    MULTI-OWNER DEPLOYMENT OF FIRMWARE IMAGES 审中-公开
    多媒体图像的多业务部署

    公开(公告)号:WO2011156738A3

    公开(公告)日:2012-04-05

    申请号:PCT/US2011040020

    申请日:2011-06-10

    CPC classification number: G06F21/572 G06F2221/2141

    Abstract: A method, apparatus, system, and computer program product for multi-owner deployment of firmware images. The method includes obtaining a signed firmware image that comprises a first code module signed by a first code owner and a second code module signed by a second code owner. The method further includes obtaining an updated first code module comprising updated code for the first code module, verifying that the updated first code module is signed by the first code owner, and updating the signed firmware image with the updated first code module in response to verifying that the updated first code module is signed by the first code owner. The signed firmware image may further comprise an access control list that authorizes updates to the first code module by the first code owner and updates to the second code module by the second code owner.

    Abstract translation: 一种用于多所有者部署固件映像的方法,设备,系统和计算机程序产品。 该方法包括获得包括由第一代码所有者签名的第一代码模块和由第二代码所有者签名的第二代码模块的签名固件映像。 该方法还包括获得包括用于第一代码模块的更新代码的更新的第一代码模块,验证更新的第一代码模块是否被第一代码所有者签名,以及响应于验证更新带有更新的第一代码模块的签名固件图像 更新的第一代码模块由第一代码所有者签名。 签名的固件图像还可以包括访问控制列表,其授权第一代码所有者更新第一代码模块,并由第二代码所有者更新第二代码模块。

    SUPPORTING A SECURE READABLE MEMORY REGION FOR PRE-BOOT AND SECURE MODE OPERATIONS
    25.
    发明申请
    SUPPORTING A SECURE READABLE MEMORY REGION FOR PRE-BOOT AND SECURE MODE OPERATIONS 审中-公开
    支持安全可读存储区域,用于预引导和安全模式操作

    公开(公告)号:WO2012018525A2

    公开(公告)日:2012-02-09

    申请号:PCT/US2011044621

    申请日:2011-07-20

    CPC classification number: G06F12/1433 G06F12/1491

    Abstract: In one embodiment, the present invention includes a method for determining whether an address map of a system includes support for a read only region of system memory, and if so configuring the region and storing protected data in the region. This data, at least some of which can be readable in both trusted and untrusted modes, can be accessed from the read only region during execution of untrusted code. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,本发明包括一种用于确定系统的地址映射是否包括对系统存储器的只读区域的支持以及如果配置该区域并在该区域中存储受保护数据的方法。 在可信和不信任的模式中,这些数据中的至少一些可以是可读的,可以在不可信代码的执行期间从只读区域访问。 描述和要求保护其他实施例。

    METHOD FOR REDUCING PLATFORM BOOT TIMES BY PROVIDING LAZY INPUT/OUTPUT ABSTRACTIONS
    26.
    发明申请
    METHOD FOR REDUCING PLATFORM BOOT TIMES BY PROVIDING LAZY INPUT/OUTPUT ABSTRACTIONS 审中-公开
    通过提供懒惰输入/输出抽象减少平台启动时间的方法

    公开(公告)号:WO2013116073A9

    公开(公告)日:2013-09-26

    申请号:PCT/US2013022856

    申请日:2013-01-24

    Applicant: INTEL CORP

    CPC classification number: G06F9/4406

    Abstract: Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed.

    Abstract translation: 公开了用于增强系统引导处理的方法,系统和计算机程序产品,其更快地启动操作系统,因为诸如用户输入硬件设备的某些设备可能不被初始化,除非确定引导过程的用户中断是 有可能。 也就是说,尽管暴露了设备的接口,但除非发生对接口的调用,否则不会发生初始化。 描述并要求保护其他实施例。

    METHODS AND APPARATUS TO PROTECT SEGMENTS OF MEMORY
    27.
    发明申请
    METHODS AND APPARATUS TO PROTECT SEGMENTS OF MEMORY 审中-公开
    保护记忆部分的方法和装置

    公开(公告)号:WO2012018529A3

    公开(公告)日:2012-05-24

    申请号:PCT/US2011044744

    申请日:2011-07-20

    CPC classification number: G06F11/004 G06F11/1008

    Abstract: Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.

    Abstract translation: 本文公开了保护存储器段的方法和装置。 示例性方法包括拦截指示错误的中断请求; 确定存储器的第一段是否损坏,所述第一存储器段被指定为存储器的保护区域; 当存储器的保护区域损坏时,使用奇偶校验块修复存储器的损坏区域; 并且响应于验证存储器的受保护区域,产生能够使用存储在存储器的保护区域中的代码来处理与中断请求相关联的错误的中断。

    MULTI-SOCKET SERVER MANAGEMENT WITH RFID
    28.
    发明申请
    MULTI-SOCKET SERVER MANAGEMENT WITH RFID 审中-公开
    带RFID的多插座服务器管理

    公开(公告)号:WO2012018508A3

    公开(公告)日:2012-05-03

    申请号:PCT/US2011044334

    申请日:2011-07-18

    CPC classification number: H04L45/02 H04W4/008 H04W84/18

    Abstract: Using radio frequency identification (RFID) tags embedded in processors within a computing system to assist in system initialization processing. The RFID tags provide a separate communication path to other components of the computing system during initialization processing, apart from the system interconnect. When the computing system is powered up, each processor in the system may cause its RFID tag to broadcast data regarding the processor's interconnect location and initialization status. The RFID tags may be sensed by a RFID receiver in the Platform Control Hub (PCH) of the computing system, and each processor's interconnect location and initialization status data may be stored in selected registers within the PCH. When the BIOS executes during system initialization processing, the BIOS may access these PCH registers to obtain the processor's data. The interconnect location and initialization status data may be used by the BIOS to select the optimal routing table and to configure the virtual network within the computing system based at least in part on the optimal routing table and the RFID tag data and without the need for interrogating each processor individually over the system interconnect.

    Abstract translation: 使用嵌入在计算系统内的处理器中的射频识别(RFID)标签来协助系统初始化处理。 除了系统互连,RFID标签在初始化处理期间提供到计算系统的其他组件的单独的通信路径。 当计算系统通电时,系统中的每个处理器可能使其RFID标签广播关于处理器的互连位置和初始化状态的数据。 RFID标签可以由计算系统的平台控制中心(PCH)中的RFID接收器感测,并且每个处理器的互连位置和初始化状态数据可以存储在PCH内的选定的寄存器中。 当BIOS在系统初始化处理期间执行时,BIOS可以访问这些PCH寄存器以获得处理器的数据。 BIOS可以使用互连位置和初始化状态数据来选择最佳路由表并且至少部分地基于最佳路由表和RFID标签数据来配置计算系统内的虚拟网络,并且不需要询问 每个处理器分别通过系统互连。

    Modifizieren des Zugriffs auf einen Dienst auf der Basis von Konfigurationsdaten

    公开(公告)号:DE112017004849T5

    公开(公告)日:2019-06-06

    申请号:DE112017004849

    申请日:2017-08-17

    Applicant: INTEL CORP

    Abstract: In einem Beispiel umfasst ein System zum Zugreifen auf Dienste einen Prozessor, um eine Änderung einer Topologie des Systems zu detektieren und Konfigurationsdaten oder ein Firmware-Image anzufordern, die in sicherem Speicher einer drahtlosen Zugriffsberechtigungsdatenvermittlung oder in einem EEPROM gespeichert sind, wobei die Konfigurationsdaten eine autorisierte Stapeltopologiekarte für das System anzeigen. Der Prozessor kann außerdem auf der Basis der autorisierten Stapeltopologiekarte bestimmen, dass die Änderung der Topologie zulässig ist, und kann einen Internet- oder lokal basierten Dienst ausführen, der eine Modifizierung auf der Basis der Änderung der Topologie des Systems umfasst, wobei der Dienst mit der Modifizierung in Reaktion auf eine Übertragung der Änderung des Dienstes ausgeführt wird.

    Techniken zum Koordinieren von Vorrichtungshochfahrsicherheit

    公开(公告)号:DE112015007220T5

    公开(公告)日:2018-09-20

    申请号:DE112015007220

    申请日:2015-12-24

    Applicant: INTEL CORP

    Abstract: Techniken zum Bereitstellen und Erhalten des Schutzes von Firmwareroutinen, die Teil einer Vertrauenskette durch aufeinander folgende Verarbeitungsumgebungen bilden. Eine Einrichtung kann umfassen: eine erste Prozessorkomponente (550); einen mit der ersten Prozessorkomponente gekoppelten flüchtigen Speicher (562); eine Inselkomponente, um, in einer Vor-BS-Betriebsumgebung, eine sichere Insel innerhalb eines Teils des flüchtigen Speichers zu erzeugen, um Zugriff auf die in die sichere Insel geladene gesicherte Firmware einzuschränken; einen ersten Firmwaretreiber (646), um, in der Vor-BS-Betriebsumgebung, eine erste API bereitzustellen, um es nicht gesicherter Firmware zu ermöglichen, eine Unterstützungsroutine der gesicherten Firmware von außerhalb der sicheren Insel aufzurufen; und einen zweiten Firmwaretreiber (647), um, in einer BS-Betriebsumgebung, die die Vor-BS-Betriebsumgebung ersetzt, eine zweite API bereitzustellen, um es einem BS der BS-Betriebsumgebung zu ermöglichen, die Unterstützungsroutine von außerhalb der sicheren Insel aufzurufen.

Patent Agency Ranking