Abstract:
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
Abstract:
Methods and devices are disclosed for communicating in a wireless network using multi-protocol label switching (MPLS). A network service node is configured to send identical packets substantially simultaneously to each of a serving network access station and one or more target network access stations via two or more respective MPLS tunnels in response to a handoff trigger message. Additional embodiments and variations are also disclosed.
Abstract:
Apparatus to destroy an encryption key receives an indication of a reset event (220) and alters or destroys the encryption key (225) prior to storage of the data in a persistent memory. Also claimed is an apparatus and system where a memory controller alters or destroys an encryption key in response to a reset event. The memory controller is preferably configured to zero or overwrite the encryption key to destroy it and the reset event preferably includes power loss, shutdown or restart.
Abstract:
Eine Technik wird beschrieben, welche sichere Anwendungen und Datenintegrität innerhalb eines Computersystems ermöglicht. In einer Ausführungsform werden eine oder mehrere sichere Enklaven eingerichtet, in welchen eine Anwendung und Daten gespeichert und ausgeführt werden können.