Abstract:
PROBLEM TO BE SOLVED: To provide a system preventing a service distributed to consumers by a service provider from being compromised though there are many malicious users on the WWW and the information provided by many devices is not fully reliable. SOLUTION: The system includes a client platform accessing a service provider over a network. The client platform receives a request from the service provider for platform assessment and verification. The client platform collects platform information and performs assessment and verification. The client platform may then receive the service of the service provider. If integrity manifest comparison indicates that the client platform state is not good, then the client platform will send a failure notification to the service provider indicating that the client platform has been compromised. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To achieve end-to-end security with traffic visibility. SOLUTION: A combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag by using an authentication key, in parallel with the generation of the cipher text using an encryption key, where the authentication key and the encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in an AES-GMAC mode. Using a two key, single-pass combined mode algorithm preserves network performance by using a limited number of HW gates, while allowing an intermediate device to access to the encryption key for deciphering the data, without having to provide to that device the ability to compromise data integrity, which is preserved between the end to end devices. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system, a device and a method, for effectively managing a subscription request for a network interface component. SOLUTION: The processor-based system includes: at least one processor, at least one memory coupled to the at least one processor, a network interface component, and a management controller. The management controller may be configured to receive information related to a subscription request for a virtual machine, generate configuration information for the network interface component based on the subscription request, and provide the configuration information to the network interface component. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
Abstract:
Apparatuses and methods for page coloring to associate memory pages with programs are disclosed. In one embodiment, an apparatus includes a paging unit and an interface to access a memory. The paging unit includes translation logic and comparison logic. The translation logic is to translate a first address to a second address. The first address is to be provided by an instruction stored in a first page in the memory. The translation is based on an entry in .a data structure, and the entry is to include a base address of a second page in the memory including the second address. The comparison logic is to compare the color of the first page to the color of the second page. The color o the first page is to indicate association of the first page with a first program including the first instruction. The data structure entry is also to include the color of the second page to indicate association of the second page with the first program or a second program.
Abstract:
An electronic apparatus has an embeded firmware agent having instructions for selectively operating in a management mode and an embedded controller agent operating independent of a host operating system and selectively invoking the management mode. A bidirectional agent bus is coupled in between the embedded firmware agent and embedded controller agent to transmit messages between both the agents. Manageability and security operations that can be performed on a host system having these cooperative embedded agents.
Abstract:
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
Abstract:
Classification of network data packets includes a determination sets of one or more filter-identifiers where each set is associated with a respective data-packet classifier field. A result-set of filter-identifiers may be derived based on an intersection of the filter-identifier sets.
Abstract:
The application group filters (56) into disjunct sets. The position of wildcards in different dimensions (32, 34, 36) determines the set a filter belongs to. The sets are searched in the remaining dimensions (86, 126, 128) separately. The final set of filters is in an intersection of the results of the previous searches.