Facilitating varied access based on authentication scoring
    51.
    发明授权
    Facilitating varied access based on authentication scoring 有权
    基于认证评分方便各种访问

    公开(公告)号:US08955045B2

    公开(公告)日:2015-02-10

    申请号:US13630095

    申请日:2012-09-28

    Abstract: Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment. Additionally, the composite false match rate can be mapped to a score, wherein an attestation message is generated based on the score. In one example, the score is associated with one or more of a standardized range and a standardized level.

    Abstract translation: 系统和方法可以提供用于在客户端设备环境中确定多个认证因素的复合假匹配率。 另外,可以将复合假匹配率映射到分数,其中基于分数生成认证消息。 在一个示例中,分数与标准化范围和标准化水平中的一个或多个相关联。

    Multi-factor authentication process
    52.
    发明授权
    Multi-factor authentication process 有权
    多因素认证过程

    公开(公告)号:US08904186B2

    公开(公告)日:2014-12-02

    申请号:US13629895

    申请日:2012-09-28

    Abstract: Systems and methods may implement a multi-factor authentication process utilizing, among other things, a value known by a user and an item in the user's possession. In one example, the method may include authenticating a user via a first method utilizing input received from the user, authenticating the user via a second method utilizing a device associated with the user, and authenticating the user via a third method utilizing a security token.

    Abstract translation: 系统和方法可以实现多因素认证过程,其利用用户所拥有的值和用户拥有的项目。 在一个示例中,该方法可以包括通过使用从用户接收的输入的第一方法来验证用户,通过使用与用户相关联的设备的第二方法来认证用户,以及通过使用安全令牌的第三种方式来认证用户。

    Introduction of discrete roots of trust
    53.
    发明授权
    Introduction of discrete roots of trust 有权
    引入离散的信任根源

    公开(公告)号:US08874916B2

    公开(公告)日:2014-10-28

    申请号:US13629887

    申请日:2012-09-28

    CPC classification number: G06F21/57 H04L9/32 H04L9/3265 H04L9/3271

    Abstract: Systems and methods may provide introducing a first root of trust on a platform to a second root of trust on the same platform. In one example, the method may include using an authenticated code module to transfer a first encryption key from a first root of trust on a platform to a second root of trust on the platform, receiving a challenge response from the first root of trust at the second root of trust, and using the first encryption key to verify the challenge response.

    Abstract translation: 系统和方法可以提供将平台上的第一信任根引入同一平台上的第二信任根。 在一个示例中,该方法可以包括使用经认证的代码模块将第一加密密钥从平台上的第一信任根传递到平台上的第二信任根,在第一根信任根源处接收挑战响应 第二个信任根,并使用第一个加密密钥验证挑战响应。

    TECHNOLOGIES FOR TRANSPARENT FUNCTION AS A SERVICE ARBITRATION FOR EDGE SYSTEMS

    公开(公告)号:US20250150361A1

    公开(公告)日:2025-05-08

    申请号:US19019032

    申请日:2025-01-13

    Abstract: Network apparatus, communicatively coupled to a provider of services, that includes gateway circuitry to receive application programming interface (API) request data from a computing device that indicates a requested service. The gateway circuitry is to (1) select, based upon the API request data, at least one of the services corresponding to the requested service, and (2) generate, based upon mapping of the API request data to the at least one of the services, corresponding request data specifically for use in invoking the at least one of the services. The gateway circuitry is to (1) generate the corresponding request data by performing at least one programmable transformation, (2) be used in association with at least one proxy-related operation, (3) register the services for use in association with service discovery, and (4) verify the API request data and an identity associated with the computing device.

    Apparatus, systems, and methods to protect hardware and software

    公开(公告)号:US12153722B2

    公开(公告)日:2024-11-26

    申请号:US17132748

    申请日:2020-12-23

    Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.

    ALLOCATION OF ACCESS TO A CHIPLET ACROSS AN INTERCONNECT SWITCH

    公开(公告)号:US20240193284A1

    公开(公告)日:2024-06-13

    申请号:US18080635

    申请日:2022-12-13

    CPC classification number: G06F21/604

    Abstract: Techniques and mechanisms to allocate functionality of a chiplet for access by one or more processor cores which are coupled to remote processor via a network switch. In an embodiment, a composite chip communicates with the switch via a Compute Express Link (CXL) link. The switch receives capability information which identifies both a chiplet of the composite chip, and a functionality which is available from a resource of that chiplet. Based on the capability information, the switch provides an inventory of chiplet resources. In response to an allocation request, the switch accesses the inventory to identify whether a suitable chiplet resource is available. Based on the access, the switch configures a chip to enable an allocation of a chiplet resource. In another embodiment, the chiplet resource is allocated at a sub-processor level of granularity, and disables access to the chiplet resource by one or more local processor cores.

Patent Agency Ranking