Abstract:
PROBLEM TO BE SOLVED: To provide a system, a device, and a method for entering a secured system environment by the use of a plurality of authenticated code modules. SOLUTION: A processor includes a decoder and a control logic. The decoder decodes a secured entry instruction. The control logic, when the secured entry instruction is decoded, finds the entry corresponding to the processor from a matching table of the master authenticated code module to read out a master header and an individual authenticated code module form the master authenticated code module. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide systems, apparatuses and methods for entering a secured system environment using multiple authenticated code modules.SOLUTION: A processor includes a decoder and control logic. The decoder decodes a secured enter instruction. In response to decoding the secured enter instruction, the control logic finds an entry corresponding to the processor in a match table in a master authenticated code module, and reads a master header and an individual authenticated code module from the master authenticated code module.
Abstract:
Systeme, Vorrichtungen und Verfahren zum Eindringen in eine gesicherten Systemumgebung unter Verwendung mehrerer authentifizierter Codemodule sind offenbart. Bei einer Ausführungsform beinhaltet ein Prozessor einen Decoder und Steuerlogik. Der Decoder soll einen gesicherten Zugangsbefehl dekodieren. Die Steuerlogik soll einen Eintrag finden, der dem Prozessor in einer Match-Tabelle in einem authentifizierten Master-Codemodul entspricht, und soll einen Master-Header und ein individuelles authentifiziertes Codemodul aus dem authentifizierten Master-Codemodul in Antwort auf ein Dekodieren des gesicherten Zugangsbefehls lesen.
Abstract:
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.