Abstract:
PURPOSE: A platform based verification of contents of input/output devices for deleting an infected part is provided to supply an alarm about the infected parts by verifying the contents of I/O device. CONSTITUTION: A platform hardware receives an interruption from I/O(Input/Output) device(210). The platform hardware detects the contents of the I/O device before the contents of the I/O device is exposed to a host OS(Operating System)(250). If there are the infected parts, the platform hardware offers the emergency signal to a user or the platform hardware deletes the infected parts(280).
Abstract:
PROBLEM TO BE SOLVED: To use hardware to remotely provide a platform with a bus device ID, as well as software updates, software, and drivers. SOLUTION: A management engine may be used to trap configuration cycles during a boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provide software to the platform even when the operating system is corrupted or non-functional. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To whitelist software components. SOLUTION: In a first operating environment, runtime information may be collected about a first loaded and executing software component. The collected information may be communicated to a second software component operating in a second operating environment that is isolated from the first operating environment. The collected runtime information may be compared with a validated set of information about the first software component. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide efficient software distribution and update service regardless of the state or physical location of a computer even if the computer has already been shipped and is in use. SOLUTION: The software distribution service SDS 20 queries a third party data store 3PDS and connects to a server 14, and downloads and installs a software client 18 or a barebones installer for the update software. The SDS verifies the downloaded package with the client 18 using a hash value stored in the 3PDS, as indicated in block 36. The SDS or the update server 14 (for example, a gateway 16) marks the appropriate region in the 3PDS with a flag, indicating that no further download is needed and that the download has been completed. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a computer platform for providing an anti-virus agent with an access to directly scan a memory. SOLUTION: The computer platform may comprise a platform control hub 330, which may comprise a manageability engine 340 and a virtualizer engine 350, wherein the manageability engine may allow the anti-virus agents to be downloaded to a platform hardware space that is isolated from an operating system 305. The manageability engine may authenticate the anti-virus agents and provide an access for the anti-virus agents to directly scan a memory 370 or a storage device 390 coupled to the platform hardware. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To protect a computer platform from malware. SOLUTION: An IB agent 108 that operates from an OS kernel 106 protects a platform 100 by interaction with an OOB agent 110. The IB agent 108 operates under a distrusted OS environment. On the other hand, in cooperation with a manageability engine 140, the OOB agent 110 runs beneath the OS, e.g., in virtualized, trusted memory space that is not part of the OS memory space. A secure OOB channel includes a network interface 144 in the management engine 140 and a virtual redirect block 142. The network interface 144 provides the network interface for the service 122 to communicate with the platform, even when an OS is not active. The management engine 140 can communicate with the service 122, when a malware may have compromised the integrity of the IB channel. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To delete a file infected with malware/worm/virus of an input-output device. SOLUTION: A platform includes platform hardware 150, which may verify the contents of the I/O device 190-N. The platform hardware 150 may include components such as a manageability engine 340 and a verification engine that are used to verify the contents of the I/O 190-N device even before the contents of the I/O device 190-N are exposed to an operating system 120 supported by a host. The platform components may delete the infected portions of the contents of I/O device 190-N if the verification process indicates that the contents of the I/O device 190-N include the infected portions. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for effectively executing runtime integrity verification. SOLUTION: A processor-based system includes at least one processor, at least one memory coupled to the at least one processor, a code block, and a code which is executable by the processor-based system, The code causes the processor-based system to generate integrity information for the code block upon a restart of the processor-based system and securely stores the integrity information and verifies the integrity of the code block during a runtime of the processor-based system using the securely stored integrity information. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to execute an operating system and at least one host driver, communication circuitry configured to communicate with a remote server, and an out-of-band (OOB) processor capable of communicating with the remote server using the communication circuitry irrespective of the state of the operating system. The OOB processor may be configured to receive a block read request from the remote server, instruct the at least one host driver to send a storage command to a data storage device, receive data retrieved from the data storage device and authentication metadata generated by the data storage device, and transmit the data and the authentication metadata to the remote server.
Abstract:
In einer Ausführungsform umfasst eine Vorrichtung einen Prozessor, um eine Instruktion(en) auszuführen, wobei die Instruktionen eine Speicherzugriffsoperation umfassen, die einem Speicherort eines Speichers zugeordnet ist. Die Vorrichtung umfasst ferner eine Speicherverschlüsselungs-Steuereinheit, um: die Speicherzugriffsoperation zu identifizieren; zu bestimmen, dass der Speicherort einer geschützten Domäne zugeordnet ist, wobei die geschützte Domäne einer geschützten Speicherregion des Speichers zugeordnet ist, und wobei die geschützte Domäne aus einer Vielzahl geschützter Domänen identifiziert wird, die einer Vielzahl geschützter Speicherregionen des Speichers zugeordnet ist; einen Verschlüsselungsschlüssel zu identifizieren, der der geschützten Domäne zugeordnet ist; eine Kryptographieoperation an Daten vorzunehmen, die der Speicherzugriffsoperation zugeordnet sind, wobei die Kryptographieoperation auf der Basis des Verschlüsselungsschlüssels vorgenommen wird, der der geschützten Domäne zugeordnet ist; und ein Ergebnis der Kryptographieoperation zurückzuführen, wobei das Ergebnis für die Speicherzugriffsoperation zu verwenden ist.