Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device effective for verifying inclusion of a platform in a data center. SOLUTION: The present invention relates to a server comprising a secret key used for verifying whether the server is included in a data center computer system or not, and comprising at least one token for sealing processing the secret key in the server. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an effective method and a device for validating whether a platform is included in a data center. SOLUTION: A machine-readable storage medium providing instructions to make a machine perform processing when executed by the machine carries out steps of: revoking a current cryptographic key pair held in the optional number of servers in a data center computer system when it is determined that one of the optional number of servers in the data center computer system is damaged; generating a new cryptographic key pair associated with the data center computer system; and storing a new private key of the new cryptographic key pair in the optional number of damaged servers. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an effective method and apparatus for verifying whether a platform is included within a data center or not. SOLUTION: A server comprises: a private key to be used for verifying whether a server is included within a data center computer system or not; and at least one token for seal-processing the private key to the server. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for allowing execution of a system management mode (SMM) code during secure operations in a microprocessor system. SOLUTION: In one embodiment, a system management interruption (SMI) may be first directed to a handler in a secured virtual machine monitor (SVMM). The SMI may then be re-directed to an SMM code located in a virtual machine (VM) that is under the security control of the SVMM. This redirection can be accomplished by allowing reading from and writing to the system management (SM) base register in the processor. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and an apparatus effective to verify whether a platform is included in a data center. SOLUTION: An inclusion verification relates to a server comprising a private key to verify if the server is included in a data-center computer system and at least one token to perform a sealing process of the private key to the server. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an effective method and device for validation of inclusion of platforms within a data center. SOLUTION: A machine-readable storage medium providing instructions to cause a machine to perform processing when executed by the machine carries out steps of revoking a current cryptographic key pair held in the optional number of servers in a data center computer system when determining that one of the optional number of servers in the data center computer system is damaged; generating a new cryptographic key pair associated with the data center computer system; and storing a new private key of the new cryptographic key pair in the optional number of damaged servers. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for execution of a secured environment initialization instruction. SOLUTION: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates a process by halting the execution of the other logical processors and then loading initialization and secure virtual machine monitor software into a memory. The initiating processor then loads initialization software into a secure memory for authentication and execution. The initialization software authenticates and registers the secure virtual machine monitor software prior to secure system operations. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
An apparatus and method is described herein for providing a test, validation, and debug architecture. At a target or base level, hardware hooks (Design for Test or DFx) are designed into and integrated with silicon parts. A controller may provide abstracted access to such hooks, such as through an abstraction layer that abstracts low level details of the hardware DFx. In addition, the abstraction layer through an interface, such as APIs, provides services, routines, and data structures to higher-level software/presentation layers, which are able to collect test data for validation and debug of a unit/platform under test. Moreover, the architecture potentially provides tiered (multiple levels of) secure access to the test architecture. Additionally, physical access to the test architecture for a platform may be simplified through use of a unified, bi-directional test access port, while also potentially allowing remote access to perform remote test and debug of a part/platform under test. In essence, a complete test architecture stack is described herein for test, validation, and debug of electronic parts, devices, and platforms.
Abstract translation:这里描述了一种用于提供测试,验证和调试架构的装置和方法。 在目标或基准级别,硬件钩(Design for Test或DFx)被设计并集成在硅部件中。 控制器可以提供对这种钩子的抽象访问,例如通过抽象层来抽象硬件DFx的低级细节。 此外,通过接口(如API)的抽象层向更高级的软件/表示层提供服务,例程和数据结构,这些层能够收集测试数据,以便对被测单元/平台进行验证和调试。 此外,该架构可能提供对测试架构的分层(多级)安全访问。 此外,可以通过使用统一的双向测试访问端口来简化对平台的测试架构的物理访问,同时还可能允许远程访问对被测试的部件/平台进行远程测试和调试。 本质上描述了一个完整的测试架构栈,用于电子部件,设备和平台的测试,验证和调试。
Abstract:
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudorandom value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.
Abstract:
In one embodiment, an integrated circuit device comprises a trusted platform module and a boot block memory unit covered by a common package. The boot block memory unit is in communication with the trusted platform module and provides boot information to the trusted platform module. An example of the boot information includes a boot block code.