-
31.
公开(公告)号:AU4921801A
公开(公告)日:2001-10-15
申请号:AU4921801
申请日:2001-03-14
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: An access transaction generated by a processor is configured using a configuration storage containing a configuration setting. The processor has a normal execution mode and an isolated execution mode. The access transaction has access information. Access to the configuration storage is controlled. An access grant signal is generated using the configuration setting and the access information. The access grant signal indicates if the access transaction is valid.
-
公开(公告)号:DE102005014462B4
公开(公告)日:2013-01-17
申请号:DE102005014462
申请日:2005-03-30
Applicant: INTEL CORP
Inventor: WILSON JOHN H , SCHOINAS IOANNIS T , YOUSIF MAZIN S , RANKIN LINDA J , GRAWROCK DAVID W , GREINER ROBERT J , SUTTON JAMES A , VAID KUSHAGRA , WISEMAN WILLARD M
IPC: G06F9/445 , G06F21/24 , G06F1/00 , G06F9/46 , G06F12/14 , G06F15/163 , G06F15/177 , H04L9/00
Abstract: Verfahren zum Starten eines sicheren Kernels in einem System mit einer teilweise oder einer vollständig verbundenen Topologie, das System eine Mehrzahl von Knoten aufweist und jeder Knoten eine Mehrzahl von Prozessoren enthält; umfassend Laden eines Trusted Agents und eines sicheren Kernels in eine sichere Speichereinrichtung, die in dem System vorgesehen ist, wobei die sichere Speichereinrichtung für jeden der Knoten zugänglich ist, und Initiieren eines sicheren Starts auf einem bestimmten Prozessor, der in einem bestimmten Knoten enthalten ist, Konstruieren eines Spannbaums durch den bestimmten Prozessor, wobei der Spannbaum alle anderen Knoten des Systems in Bezug auf den bestimmten Knoten in einer Mehrzahl von Stufen einer Baumstruktur identifiziert; Senden einer sicheren Startmeldung an den anderen Knoten, der in dem Spannbaum identifiziert ist, durch den bestimmten Prozessor; als Antwort auf die sichere Startmeldung von dem anderen Knoten Validieren des in die sichere Speichereinrichtung geladenen Trusted Agents durch den bestimmten...
-
公开(公告)号:GB2429555A
公开(公告)日:2007-02-28
申请号:GB0620519
申请日:2004-09-23
Applicant: INTEL CORP
Inventor: WILSON JOHN H , SCHOINAS IOANNIS T , YOUSIF MAZIN S , RANKIN LINDA J , GRAWROCK DAVID W , GREINER ROBERT J , SUTTON JAMES A , VAID KUSHAGRA , WISEMAN WILLARD M
IPC: G06F21/00 , G06F21/24 , G06F1/00 , G06F9/445 , G06F9/46 , G06F12/14 , G06F15/163 , G06F15/177 , G06F15/80 , H04L9/00
Abstract: An initial logical processor is used to construct a spanning tree (300) across a plurality of processors (212), and the spanning tree (300) is used to launch a trusted agent on the processor.
-
公开(公告)号:HK1072308A1
公开(公告)日:2005-08-19
申请号:HK05104209
申请日:2003-03-26
Applicant: INTEL CORP
Inventor: HERBERT HOWARD , GRAWROCK DAVID W , ELLISON CARL M , GOLLIVER ROGER A , LIN DERRICK C , MCKEEN FRANCIS X , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND , NEIGER GILBERT
IPC: G06F20060101 , G06F
-
公开(公告)号:GB2405974A
公开(公告)日:2005-03-16
申请号:GB0426493
申请日:2001-03-21
Applicant: INTEL CORP
Inventor: HERBERT HOWARD C , GRAWROCK DAVID W , ELLISON CARL M , GOLLIVER ROGER A , LIN DERRICK C , MCKEEN FRANCIS X , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND , NEIGER GILBERT
Abstract: A platform has a protected memory for storing an audit log. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
-
公开(公告)号:HK1050254A1
公开(公告)日:2003-06-13
申请号:HK03102199
申请日:2003-03-26
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: A technique is provided to execute isolated instructions according to an embodiment of the present invention. An execution unit executes an isolated instruction in a processor operating in a platform. The processor is configured in one of a normal execution mode and an isolated execution mode. A parameter storage containing at least one parameter to support execution of the isolated instruction when the processor is configured in the isolated execution mode.
-
37.
公开(公告)号:HK1050253A1
公开(公告)日:2003-06-13
申请号:HK03102193
申请日:2003-03-26
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: An access transaction generated by a processor is configured using a configuration storage containing a configuration setting. The processor has a normal execution mode and an isolated execution mode. The access transaction has access information. Access to the configuration storage is controlled. An access grant signal is generated using the configuration setting and the access information. The access grant signal indicates if the access transaction is valid.
-
公开(公告)号:HK1049721A1
公开(公告)日:2003-05-23
申请号:HK03102699
申请日:2003-04-14
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , GILBERT NEIGER , KEN RENERIS , SUTTON JAMES A , THAKKAR SHREEKANT S , MILLIND MITTAL
Abstract: The present invention is a method, apparatus, and system to generate a key hierarchy for use in an isolated execution environment of a protected platform. In order to bind secrets to particular code operating in isolated execution, a key hierarchy comprising a series of symmetric keys for a standard symmetric cipher is utilized. The protected platform includes a processor that is configured in one of a normal execution mode and an isolated execution mode. A key storage stores an initial key that is unique for the platform. A cipher key creator located in the protected platform creates the hierarchy of keys based upon the initial key. The cipher key creator creates a series of symmetric cipher keys to protect the secrets of loaded software code.
-
公开(公告)号:GB2377795A
公开(公告)日:2003-01-22
申请号:GB0225052
申请日:2001-03-23
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , NEIGER GILBERT , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: A technique is provided to execute isolated instructions according to an embodiment of the present invention. An execution unit executes an isolated instruction in a processor operating in a platform. The processor is configured in one of a normal execution mode and an isolated execution mode. A parameter storage containing at least one parameter to support execution of the isolated instruction when the processor is configured in the isolated execution mode.
-
40.
公开(公告)号:GB2377793A
公开(公告)日:2003-01-22
申请号:GB0225049
申请日:2001-03-14
Applicant: INTEL CORP
Inventor: ELLISON CARL M , GOLLIVER ROGER A , HERBERT HOWARD C , LIN DERRICK C , MCKEEN FRANCIS X , PORSCHE AKTIENGESELLSCHAFT DR , RENERIS KEN , SUTTON JAMES A , THAKKAR SHREEKANT S , MITTAL MILLIND
Abstract: An access transaction generated by a processor is configured using a configuration storage containing a configuration setting. The processor has a normal execution mode and an isolated execution mode. The access transaction has access information. Access to the configuration storage is controlled. An access grant signal is generated using the configuration setting and the access information. The access grant signal indicates if the access transaction is valid.
-
-
-
-
-
-
-
-
-