-
公开(公告)号:WO2011163004A2
公开(公告)日:2011-12-29
申请号:PCT/US2011040263
申请日:2011-06-14
Applicant: INTEL CORP , ZIMMER VINCENT J , XING BIN , ROBINSON SCOTT H
Inventor: ZIMMER VINCENT J , XING BIN , ROBINSON SCOTT H
CPC classification number: G06F9/4401 , G06F11/073 , G06F11/076 , G06F11/1092 , G06F21/14 , G06F21/572 , G06F21/575
Abstract: In one embodiment, a semiconductor integrated code (SIC) may be provided in a binary format by a processor manufacturer. This SIC may include platform independent code of the processor manufacturer. Such code may include embedded processor logic to initialize the processor and at least one link that couples the processor to a memory, and embedded memory logic to initialize the memory. Other embodiments are described and claimed.
Abstract translation: 在一个实施例中,半导体集成代码(SIC)可由处理器制造商以二进制格式提供。 该SIC可以包括处理器制造商的独立于平台的代码。 这样的代码可以包括用于初始化处理器的嵌入式处理器逻辑和将处理器耦合到存储器的至少一个链路以及嵌入式存储器逻辑以初始化存储器。 描述和要求保护其他实施例。
-
公开(公告)号:DE112016007289T5
公开(公告)日:2019-06-19
申请号:DE112016007289
申请日:2016-09-30
Applicant: INTEL CORP
Inventor: ZIMMER VINCENT J , YAO JIEWEN JACQUES
IPC: G06F12/14
Abstract: Virtueller Speicher wird einem Systemmanagementmodus (SMM)-Prozess zugewiesen, um einen für SMM reservierten sicheren Speicher zu erweitern. Der SMM-Prozess fordert eine Seite des virtuellen Speichers an, für die keine Abbildung auf den sicheren Speicher existiert. Wenn eine Seite in dem sicheren Speicher verfügbar ist, so wird die Virtuelle-Speicher-Seite auf die verfügbare Seite abgebildet, und wenn keine Seite verfügbar ist, so wird eine Seite in dem sicheren Speicher zum Ersetzen durch die Virtuelle-Speicher-Seite ausgewählt. Die ausgewählte Seite wird verschlüsselt und zu einer externen Speichervorrichtung bewegt. Die Virtuelle-Speicher-Seite wird auf die Adresse der ausgewählten Seite in dem ersten Speicher abgebildet. Wenn eine Abbildung für die Virtuelle-Speicher-Seite auf verschlüsselte Daten in der externen Speichervorrichtung existiert, so werden diese Daten zu der sicheren Speicheradresse bewegt, die auf die Virtuelle-Speicher-Seite abgebildet wurde, und entschlüsselt, bevor auf die Virtuelle-Speicher-Seite zugegriffen wird.
-
公开(公告)号:AU2016206224A1
公开(公告)日:2016-08-04
申请号:AU2016206224
申请日:2016-07-18
Applicant: INTEL CORP
Inventor: ZIMMER VINCENT J , SAKTHIKUMAR PALSAMY , SWANSON ROBERT C
Abstract: An apparatus includes a memory that is accessible by an operating system; and a basic input/output system (BIOS) handler. The BIOS handler, in response to detected malicious software activity, stores data in the memory 5 to report the activity to the operating system. 2808676_1.docx Ac A Or cn 2 - A c
-
公开(公告)号:DE102015102678A1
公开(公告)日:2015-10-01
申请号:DE102015102678
申请日:2015-02-25
Applicant: INTEL CORP
Inventor: SWANSON ROBERT C , BULUSU MALLIK , BAHNSEN ROBERT B , ZIMMER VINCENT J , CONE ROBERT W
Abstract: Technologien zum Verwalten der Abbild-Discovery umfassen einen Server-Controller, um zu veranlassen, dass ein Server in einen Pre-Boot-Zustand übergeht. Der Server-Controller kommuniziert mit dem Server, während der Server den Pre-Boot-Zustand beibehält, um Identifikationsdaten des Servers in Reaktion auf den Übergang des Servers in den Pre-Boot-Zustand zu bestimmen. Der Server-Controller identifiziert ein Startabbild des Servers basierend auf den Identifikationsdaten des Servers und assoziiert den Server mit dem identifizierten Startabbild.
-
公开(公告)号:AU2011286267A1
公开(公告)日:2013-03-14
申请号:AU2011286267
申请日:2011-07-20
Applicant: INTEL CORP
Inventor: SWANSON ROBERT C , ZIMMER VINCENT J , WEHAGE ERIC R , BULUSU MALLIK
Abstract: In one embodiment, the present invention includes a method for determining whether an address map of a system includes support for a read only region of system memory, and if so configuring the region and storing protected data in the region. This data, at least some of which can be readable in both trusted and untrusted modes, can be accessed from the read only region during execution of untrusted code. Other embodiments are described and claimed.
-
公开(公告)号:AU2011285762A1
公开(公告)日:2013-03-14
申请号:AU2011285762
申请日:2011-08-03
Applicant: INTEL CORP
Inventor: SWANSON ROBERT C , BULUSU MALLIK , ZIMMER VINCENT J
Abstract: In one embodiment, a peripheral controller coupled to a processor can include a storage controller. This storage controller can control access to a non-volatile storage coupled to the peripheral controller. The storage may include both secure and open partitions, and the storage controller can enable access to the secure partition only when the processor is in a secure mode. In turn, during unsecure operation such as third party code execution, visibility of the secure partition can be prevented. Other embodiments are described and claimed.
-
公开(公告)号:AU2013215466B2
公开(公告)日:2015-12-03
申请号:AU2013215466
申请日:2013-01-24
Applicant: INTEL CORP
Inventor: ROTHMAN MICHAEL A , ZIMMER VINCENT J , DORAN MARK S , KINNEY MICHAEL D
Abstract: Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed.
-
公开(公告)号:AU2011271088B2
公开(公告)日:2013-11-07
申请号:AU2011271088
申请日:2011-06-21
Applicant: INTEL CORP
Inventor: ZIMMER VINCENT J , BULUSU MALLIK , ROTHMAN MICHAEL A , SWANSON ROBERT C , SAKTHIKUMAR PALSAMY
IPC: G06F21/10
Abstract: Enhancing locality in a security co-processor module of a computing system may be achieved by including one or more additional attributes such as geographic location, trusted time, a hardware vendor string, and one or more environmental factors into an access control space for machine mode measurement of a computing system.
-
公开(公告)号:SG188991A1
公开(公告)日:2013-05-31
申请号:SG2013018726
申请日:2011-09-30
Applicant: INTEL CORP
Inventor: SAKTHIKUMAR PALSAMY , SWANSON ROBERT C , ROTHMAN MICHAEL A , BULUSU MALLIK , ZIMMER VINCENT J
Abstract: A method, apparatus, system, and computer program product for secure server system management. A payload containing system software and/or firmware updates is distributed in an on-demand, secure I/O operation. The I/O operation is performed via a secured communication channel inaccessible by the server operating system to an emulated USB drive. The secure communication channel can be established for the I/O operation only after authenticating the recipient of the payload, and the payload can be protected from access by a potentially-infected server operating system. Furthermore, the payload can be delivered on demand rather than relying on a BIOS update schedule, and the payload can be delivered at speeds of a write operation to a USB drive.
-
公开(公告)号:AU2011286271A1
公开(公告)日:2013-02-07
申请号:AU2011286271
申请日:2011-07-20
Applicant: INTEL CORP
Inventor: SWANSON ROBERT C , WEHAGE ERIC R , ZIMMER VINCENT J , BULUSU MALLIK
Abstract: Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.
-
-
-
-
-
-
-
-
-