Abstract:
PROBLEM TO BE SOLVED: To provide a system preventing a service distributed to consumers by a service provider from being compromised though there are many malicious users on the WWW and the information provided by many devices is not fully reliable. SOLUTION: The system includes a client platform accessing a service provider over a network. The client platform receives a request from the service provider for platform assessment and verification. The client platform collects platform information and performs assessment and verification. The client platform may then receive the service of the service provider. If integrity manifest comparison indicates that the client platform state is not good, then the client platform will send a failure notification to the service provider indicating that the client platform has been compromised. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for automated modular and secure boot firmware update. SOLUTION: An updated boot firmware code module is received in a secure partition of a system, only one original boot firmware code module is automatically replaced with the updated boot firmware code module. When the system is next booted, the updated boot firmware code module is automatically executed with a plurality of boot firmware code modules for the system and without user intervention. The updated boot firmware code module is written to an update partition of a firmware volume, and the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To more efficiently and effectively protect software agents, in particular, critical software agents in a VT environment. SOLUTION: Methods and apparatuses for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, with a plurality of security domains being stored in one or more registers of a processor of the physical device are included. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if a preferential domain of the first security domain is different from that of the second security domain. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To securely perform antivirus scan.SOLUTION: The invention includes a manageability engine 116 having a second processor which operates independently of a central processor. The manageability engine 116 can receive out-of-band communications regardless of a power state of the central processor. The manageability engine 116 receives a virus signature file signed with a private key of a remote computing device via an out-of-band communication channel 126, stores the signed virus signature file in a system memory, confirms the signed virus signature file using a public key stored in the manageability engine 116 corresponding to the private key of the remote computing device, and performs antivirus scan of one or more files stored in the computing device using one or more patterns in the signed virus signature file.
Abstract:
PROBLEM TO BE SOLVED: To perform remote management over a wireless wide-area network using short message services. SOLUTION: A method and device for remote management over the wireless wide-area network include receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To prevent a local agent and components within an operating system for performing virus scan from being changed by virus. SOLUTION: A device 100 includes a storage medium 108 to store files and a manageability engine 116. A manageability engine 116 accesses a virus signature file. The manageability engine 116 then performs an anti-virus scan using patterns in the signature file to compare to one or more of the files. The manageability engine 116 then reports the results of the scan to an external agent. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus for configuring data plane behavior on network forwarding elements. SOLUTION: The method includes receiving, within a network element control plane, protocol configuration information extracted from a protocol application utilizing a network protocol application programming interface. The received information is processed using a control interface corresponding to the network protocol. Once the protocol configuration information is processed, the control interface programs one or more data plane forwarding elements of the network element according to protocol configuration information. Accordingly, by providing similar control interfaces for several network protocols, inter-operability between components from several vendors is enabled. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
A method and apparatus for configuring data plane behavior on network forwarding elements are described. In one embodiment, the method includes receiving, within a network element control plane, protocol configuration information extracted from a protocol application utilizing a network protocol application programming interface (API). Once the protocol configuration information is received, the protocol configuration information is processed using a control interface corresponding to the network protocol implemented by the protocol application. Once the protocol configuration information is processed, the control interface programs one or more data plane forwarding elements of the network element according to protocol configuration information. Accordingly, by providing similar control interfaces for multiple, network protocols, inter-operability between components from multiple vendors is enabled.
Abstract:
A method, device, and system for sharing media content with a sink device includes performing a cryptographic key exchange with the sink device and generating an authorization key in a security engine of a system-on-a-chip (SOC) of a source device. The method may also include generating an exchange key as a function of the authorization key and a packet key as a function of the exchange key. Such key generation occurs in the security engine of the SOC, and the keys are stored in a secure memory of the security engine.
Abstract:
The invention relates to providing security for boot image exchanges by using data tunneling to protect a boot image download to a remote boot environment of a computer system. An authentication channel 503 is established between a client 501 which implements a Preboot Execution Environment (PXE) and a remote boot server 502. A remote boot image exchange then occurs between the client and the server in which the client sends a boot image request and the server responds by sending a copy of the boot image, characterised by the use of a data tunnel 504 in the authentication channel to communicate data related to the boot image exchange. The data tunnel may be a type-length-value (TLV) type or attribute-value pair (AVP) type and the tunneled data may be the entire boot exchange itself 505 and may also include credentials 506. Upon completion of the exchange the client executes the received boot image from within the resident PXE environment.