-
公开(公告)号:DE10196006B4
公开(公告)日:2008-07-24
申请号:DE10196006
申请日:2001-03-14
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: The present invention is a method, apparatus, and system to generate a key hierarchy for use in an isolated execution environment of a protected platform. In order to bind secrets to particular code operating in isolated execution, a key hierarchy comprising a series of symmetric keys for a standard symmetric cipher is utilized. The protected platform includes a processor that is configured in one of a normal execution mode and an isolated execution mode. A key storage stores an initial key that is unique for the platform. A cipher key creator located in the protected platform creates the hierarchy of keys based upon the initial key. The cipher key creator creates a series of symmetric cipher keys to protect the secrets of loaded software code.
-
公开(公告)号:GB2405974B
公开(公告)日:2005-04-27
申请号:GB0426493
申请日:2001-03-21
Applicant: INTEL CORP
-
公开(公告)号:GB2405973B
公开(公告)日:2005-04-27
申请号:GB0426491
申请日:2001-03-21
Applicant: INTEL CORP
-
公开(公告)号:GB2405973A
公开(公告)日:2005-03-16
申请号:GB0426491
申请日:2001-03-21
Applicant: INTEL CORP
Inventor: HERBERT HOWARD , GRAWROCK DAVID W , ELLISON CARL M , GOLLIVER ROGER A , LIN DERRICK C , MCKEEN FRANCIS X , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND , NEIGER GILBERT
Abstract: A method of remote attestation for a special mode of operation comprises storing an audit log within protected memory of a platform. The audit log is a listing of data representing each of a plurality of Iso X software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
-
公开(公告)号:GB2377794B
公开(公告)日:2005-02-16
申请号:GB0225050
申请日:2001-03-21
Applicant: INTEL CORP
-
公开(公告)号:DE10196005T1
公开(公告)日:2003-03-13
申请号:DE10196005
申请日:2001-03-23
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: A technique is provided to execute isolated instructions according to an embodiment of the present invention. An execution unit executes an isolated instruction in a processor operating in a platform. The processor is configured in one of a normal execution mode and an isolated execution mode. A parameter storage containing at least one parameter to support execution of the isolated instruction when the processor is configured in the isolated execution mode.
-
37.
公开(公告)号:AU4921801A
公开(公告)日:2001-10-15
申请号:AU4921801
申请日:2001-03-14
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: An access transaction generated by a processor is configured using a configuration storage containing a configuration setting. The processor has a normal execution mode and an isolated execution mode. The access transaction has access information. Access to the configuration storage is controlled. An access grant signal is generated using the configuration setting and the access information. The access grant signal indicates if the access transaction is valid.
-
公开(公告)号:AU4521200A
公开(公告)日:2000-07-24
申请号:AU4521200
申请日:1999-12-08
Applicant: INTEL CORP
Inventor: MAKINENI SIVAKUMAR , KIMN SUNNHYUK , DOSHI GAUTMAN B , GOLLIVER ROGER A
Abstract: A method is provided for loading a packed floating-point operand into a register file entry having one or more associated implicit bits. The packed floating point operand includes multiple component operands. Significand and exponent bits for each component operand are copied to corresponding fields of the register entry, and the exponent bits are tested to determine whether the component operand is normalized. An implicit bit corresponding to the component operand is set when the component operand is normalized.
-
公开(公告)号:HK1072308A1
公开(公告)日:2005-08-19
申请号:HK05104209
申请日:2003-03-26
Applicant: INTEL CORP
Inventor: HERBERT HOWARD , GRAWROCK DAVID W , ELLISON CARL M , GOLLIVER ROGER A , LIN DERRICK C , MCKEEN FRANCIS X , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND , NEIGER GILBERT
IPC: G06F20060101 , G06F
-
公开(公告)号:GB2405974A
公开(公告)日:2005-03-16
申请号:GB0426493
申请日:2001-03-21
Applicant: INTEL CORP
Inventor: HERBERT HOWARD C , GRAWROCK DAVID W , ELLISON CARL M , GOLLIVER ROGER A , LIN DERRICK C , MCKEEN FRANCIS X , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND , NEIGER GILBERT
Abstract: A platform has a protected memory for storing an audit log. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
-
-
-
-
-
-
-
-
-